diff --git a/vulnerabilities/wordpress/wp-arforms-listing.yaml b/vulnerabilities/wordpress/wp-arforms-listing.yaml index 6ab007f404..b96fe9baa0 100644 --- a/vulnerabilities/wordpress/wp-arforms-listing.yaml +++ b/vulnerabilities/wordpress/wp-arforms-listing.yaml @@ -23,5 +23,6 @@ requests: condition: and - type: status + status: - 200 \ No newline at end of file diff --git a/vulnerabilities/wordpress/wp-email-subscribers-listing.yaml b/vulnerabilities/wordpress/wp-email-subscribers-listing.yaml index 3b3699841b..e94a46837e 100644 --- a/vulnerabilities/wordpress/wp-email-subscribers-listing.yaml +++ b/vulnerabilities/wordpress/wp-email-subscribers-listing.yaml @@ -6,7 +6,9 @@ info: description: Searches for sensitive directories present in the wordpress-plugins plugin. reference: https://www.exploit-db.com/ghdb/6428 tags: wordpress,listing + requests: + - method: GET path: - "{{BaseURL}}/wp-content/plugins/email-subscribers" @@ -19,5 +21,6 @@ requests: condition: and - type: status + status: - - 200 \ No newline at end of file + - 200 diff --git a/vulnerabilities/wordpress/wp-idx-broker-platinum-listing.yaml b/vulnerabilities/wordpress/wp-idx-broker-platinum-listing.yaml index f177b77ee7..50cd50a229 100644 --- a/vulnerabilities/wordpress/wp-idx-broker-platinum-listing.yaml +++ b/vulnerabilities/wordpress/wp-idx-broker-platinum-listing.yaml @@ -6,11 +6,15 @@ info: description: Searches for sensitive directories present in the wordpress-plugins plugin. reference: https://www.exploit-db.com/ghdb/6416 tags: wordpress,listing + requests: + - method: GET path: - "{{BaseURL}}/wp-content/plugins/idx-broker-platinum/" + matchers-condition: and + matchers: - type: word words: @@ -20,4 +24,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200 diff --git a/vulnerabilities/wordpress/wp-iwp-client-listing.yaml b/vulnerabilities/wordpress/wp-iwp-client-listing.yaml index 6dc0176e38..b97d6e03a1 100644 --- a/vulnerabilities/wordpress/wp-iwp-client-listing.yaml +++ b/vulnerabilities/wordpress/wp-iwp-client-listing.yaml @@ -6,10 +6,12 @@ info: description: Searches for sensitive directories present in the wordpress-plugins plugin. reference: https://www.exploit-db.com/ghdb/6427 tags: wordpress,listing + requests: - method: GET path: - "{{BaseURL}}/wp-content/plugins/iwp-client/" + matchers-condition: and matchers: - type: word @@ -20,4 +22,4 @@ requests: - type: status status: - - 200 \ No newline at end of file + - 200