From fb15470b5477ca51f830a30acd4ac5d434141976 Mon Sep 17 00:00:00 2001 From: topscoder <86197446+topscoder@users.noreply.github.com> Date: Mon, 13 May 2024 16:53:30 +0200 Subject: [PATCH] Regenerated with new updated severity classifications --- ...1598-8b8bc9dc7287ba3ce3345c56bcac0bb7.yaml | 4 +- ...1559-62059d6f1640212c35e5b3f8330daee1.yaml | 4 +- ...1102-dced04c5992536d443cadc0d8795aeb0.yaml | 4 +- ...1687-a9813318cd00104cf812206e64197a1c.yaml | 4 +- ...1810-24c78f38bf30593eb710d6e05f774c4e.yaml | 4 +- ...2108-83ae7383a40a2b386de5c8ed058c9c78.yaml | 4 +- ...2612-8889c549d7832d5315ef07e7a0f1de5e.yaml | 4 +- ...1012-5ffbaa4e2b1d5d3387454a24d1df8151.yaml | 4 +- ...1796-f505e5adff7df495d5e3883941625090.yaml | 4 +- ...2667-2250da6b6f83d2978f8b20e578c03ce4.yaml | 4 +- ...4208-1354435c4f5fd2cf36a77bfe4d9efd70.yaml | 4 +- ...6808-c74b3da5c9977a8515a2ae6aea10e45b.yaml | 4 +- ...0106-5248a5bd925434add7e3be51c0e47bf5.yaml | 4 +- ...0233-78c0fa7115ae86c26deccf0e5ec633a7.yaml | 4 +- ...1230-e46b887a41d8ee6fabb81ee3e309e2b3.yaml | 4 +- ...1244-a556f0ec8cc782b1df540c9037fded25.yaml | 4 +- ...1622-f773a7113074464a75bbe2d49bec8c41.yaml | 4 +- ...1893-5382cac551da0c76754442b2aa2316fe.yaml | 4 +- ...1894-6f396d18ad1fbb1948ad9473860ec9d1.yaml | 4 +- ...1897-be037ab5b01a52fa0b9478e50ded7b01.yaml | 4 +- ...2627-141c7f9cf7e30f994110491cc5e7c119.yaml | 4 +- ...2714-0b8de7e6634f1364f8cfc6fe68a06736.yaml | 4 +- ...2828-e6b40723167a263b6dd92aa26e882342.yaml | 4 +- ...3140-380df031c42ca1baae8054ba3ed4d998.yaml | 4 +- ...3239-2a9919a2db8ebb02104bc342de5cafa4.yaml | 4 +- ...3240-8fb46ccbfe8eb892f418af64a9d461a7.yaml | 4 +- ...3241-c96b02624922c50381a023e57cd89cf7.yaml | 4 +- ...3543-23b280de753c54a779bef1b8400aad8b.yaml | 4 +- ...3544-b9356af48d41602f5f193ab6f4ff8815.yaml | 10 ++-- ...4014-54409f2bc5984d61c42ec97047d41adc.yaml | 12 ++-- ...4139-bc3069fe10b3f1d27d4fca396970c629.yaml | 4 +- ...4153-172cb25c60ec97a4292f9de3be08e5ed.yaml | 4 +- ...4154-fb2282647c2ae8c5fc2f5ce43c10e3b4.yaml | 4 +- ...4165-f021202130cf5324996d350595ae862c.yaml | 4 +- ...4166-babd8720f51cdfc03ee525219e51d67f.yaml | 14 ++--- ...4480-b962a43c022ee33e3f132497b433375e.yaml | 4 +- ...4481-c0b95532030c59fee6c1d3ae2a188201.yaml | 4 +- ...4483-7cba36ac5159d909041a39ae02e640fa.yaml | 4 +- ...4544-a4e5a5186ca39bcba5d872b9fb372cda.yaml | 4 +- ...4893-abd2276f34ac392ae9b6a69f93290abd.yaml | 10 ++-- ...4894-7a8b8fa3bcccffed98e8c5f115c5183e.yaml | 6 +- ...5105-bea5bcb6ac9b66b08b05c172c3f9bc32.yaml | 4 +- ...5106-6d56121149ca7bd6af4818d9b53bdc87.yaml | 4 +- ...5229-95305525d7820973fed879d8dfc49664.yaml | 4 +- ...5710-ed09f8fa2b1f0c2f3b1b1ea2ddd6cf57.yaml | 4 +- ...6013-19e5f7c5a5cf8056d79bfab611f4ed1f.yaml | 4 +- ...6677-a3e785056d2140e268a5211287db4a52.yaml | 4 +- ...0197-03e041af34914994b5b4b3e20ec8ee2e.yaml | 4 +- ...0198-fbe96c78719e34780f9334cd4775f2cc.yaml | 4 +- ...0205-3f5c9085cc5ea3fa80320bca3cc4e85b.yaml | 4 +- ...0616-81cd7c7b4d1173a363d79c9374f22f96.yaml | 4 +- ...0617-0720f12ed328d9f8394eeb8c7b25a318.yaml | 4 +- ...0618-464fda924b91446d67088565fa366b6b.yaml | 4 +- ...0691-a8ccc8e656f57b6f03393d18f5ac6d44.yaml | 4 +- ...0837-6786949bf947df30c87362646165e5b3.yaml | 4 +- ...1061-4db82812dea0cad0cb375ee4495ca7c3.yaml | 4 +- ...1304-46747c4e682ceeb0ba7de6d44fbb5912.yaml | 4 +- ...1930-7ec18e3e7ba86c077b691dda2c9af2f0.yaml | 4 +- ...2068-9a47bc7022503d111499b3cff929ca66.yaml | 4 +- ...2392-f091fee54b5af87e393409f73df7398b.yaml | 4 +- ...4671-2556d7722d4548d9067588a035ce357f.yaml | 4 +- ...4733-574c183518fa14bb1a854e4b68f72a19.yaml | 4 +- ...4734-5defb55cded48a565a064567cc9f2fde.yaml | 4 +- ...5695-066a3076f693bdf1acf756f1b6327c5f.yaml | 10 ++-- ...7175-58ddfbc8f08958c578758b38baef9c64.yaml | 4 +- ...7321-57636a2970a5968684b69eba7f56b3ea.yaml | 4 +- ...1030-6639b89672c29c6f168a2b79f92361c6.yaml | 4 +- ...3890-89ecd9115fcfef013346488bc602d8a5.yaml | 4 +- ...3891-e8698e8d301690dded028c942c072a23.yaml | 4 +- ...4140-4e90b64e5c0880980f44418deca3c91b.yaml | 14 ++--- ...4168-ac62ca2ddae58ee9be23fe2a4d7fe3df.yaml | 4 +- ...4748-64ec2a96ce824196b74660ea295fa52d.yaml | 4 +- ...5158-0d1a8a5f1814698e05f7c343a752da34.yaml | 4 +- ...0682-38ee495a4defefe501f09623f3dfcb68.yaml | 4 +- ...1186-0852d9b8897d185217e138aaac4e2439.yaml | 4 +- ...3977-435be2da19b4391be47c1eff3c320bfa.yaml | 4 +- ...4257-2bb5d275fcf9ba493afcfa9fdcfc130b.yaml | 4 +- ...4518-e4bfbf2cbba7e1243929a6da3f0f2ec5.yaml | 4 +- ...4536-3074a73795d456075561a5d7473c924b.yaml | 4 +- ...4630-19c5c13179457ac1c8bd83d2fa6c9156.yaml | 4 +- ...4747-336c529affe134c8a71f1e7879ec0dcb.yaml | 4 +- ...4779-c426bf1b8239d541e948689bf4281f26.yaml | 4 +- ...4825-455782a485d876c2acfcbf2a3f64d156.yaml | 4 +- ...5294-eac8868d56d1c09282753a6f5e51eca0.yaml | 4 +- ...5295-2034cdfa4d915e35ef9771b3de5a3733.yaml | 4 +- ...5296-b64a64e861339d55f5a2f0ac25277a51.yaml | 4 +- ...5297-821019e522c0249cbe8769a0804c81b7.yaml | 4 +- ...0641-5ea2cc8533d8fd4f1c4801b0b4960d9d.yaml | 4 +- ...0700-5128144b38c4f8aac30be645fe67caaf.yaml | 4 +- ...0740-0bfa9343d868449c3d973f2c81052fe9.yaml | 4 +- ...0759-e3d831bb072ff08836a63c6a4ebecea3.yaml | 4 +- ...0760-7db34627f1b70dfb15b3a62077ab868f.yaml | 4 +- ...3129-148a48158ed2a590392455c4205415e9.yaml | 4 +- ...3130-3718fa429a69f29dc2387ac6b6099785.yaml | 4 +- ...3841-f6896d23342ecbcbdbcbfcb5cd72746c.yaml | 4 +- ...3850-e8b1937b8d22149355604761f9e2e597.yaml | 4 +- ...3851-6d0c9deb010be5b44d8bbfb44b8f1a81.yaml | 4 +- ...3852-170bc795059fb0d98227f8d8677e21e8.yaml | 4 +- ...3854-2c9dd1c9df5c34a137e9f118a0781a3d.yaml | 4 +- ...3855-e63ed950312b124c0d59757ed157173d.yaml | 4 +- ...3856-0aff17e28ef121a8c519ec81ffed16b1.yaml | 4 +- ...3857-1eca6946030b47a7e15dbf74278035b1.yaml | 4 +- ...3858-caeb5a0b48102c1758efb7acc2ae32c5.yaml | 4 +- ...3859-1def92176b2075addd1971f8bb11410a.yaml | 4 +- ...3860-ab5cb4980d96d0502a1385c5c51d0ea4.yaml | 4 +- ...3861-8cf1ee9f0e6e79fc8ffcfb9414ff6340.yaml | 4 +- ...3862-59015ab41c28db2b3674f30b01c20313.yaml | 4 +- ...3864-86bc0489b6564a6b791112624ecc4c24.yaml | 4 +- ...3865-530c76ddc7a277b970fa701ca1edf42b.yaml | 4 +- ...4106-a4aa366f217005e74322ff2bf7a0e182.yaml | 10 ++-- ...4562-c050cce5edc786cc76c2f3dcee80f148.yaml | 4 +- ...4568-8e904d0aa5c673b4683d6e95c3e351f3.yaml | 4 +- ...4618-0bc66019a5442f087e2da571324acbb0.yaml | 4 +- ...4624-0b070c6bccd03db5dad9fdc1c059c617.yaml | 4 +- ...4646-ac814100e213d264685a18f0bee470c2.yaml | 4 +- ...4803-92f2fb442048282c27cd8fc5629a2db5.yaml | 4 +- ...4926-98258e7e3672ebda27bdfc41933c5290.yaml | 4 +- ...4955-596c399ca77f6898f5eb2e3e553223f2.yaml | 4 +- ...4956-c6bafdf6d7b65e0b18711ab77d0f0098.yaml | 4 +- ...5051-ea4a5a60afde85ede6fced3685c1e946.yaml | 4 +- ...5104-5f327ec92a2ed47a19cfa74c78839e26.yaml | 4 +- ...5106-9fb1e67eb818f983f8dbfc23b2a0c064.yaml | 4 +- ...5107-47f5d0213d6a55b30c759752f9fa351e.yaml | 4 +- ...5128-a9a5808c69ac6668bf195f6fcb5a5a1a.yaml | 4 +- ...5181-41d06e1c542cc99b348ba7db58f2c892.yaml | 4 +- ...5191-052601a64f3c278014382ca43022a402.yaml | 4 +- ...5192-a5b27966569a74533de04e9d976c99c9.yaml | 4 +- ...5193-e7674c99987b6c4c7435d1f976b8d7fb.yaml | 4 +- ...5207-c4a1c6ea67bd01790c36ea2fb1f58bd3.yaml | 4 +- ...5225-aeea609833832e1baa1f0bd27367ec6d.yaml | 4 +- ...5226-3d4fded5713d977453c4246e8903bc20.yaml | 4 +- ...5254-2e3f61534eb2162d57847e92682b9bbd.yaml | 4 +- ...5257-376edc97e45ef94c79a753de3d636245.yaml | 4 +- ...5265-9bc357ece2cde706b261987c1bf85bfa.yaml | 4 +- ...5286-fb94da76ff281a4e13dbc1c86ed0929d.yaml | 4 +- ...5304-18fe02250ff137adf75ad3081c09ea5f.yaml | 4 +- ...5307-33a2e7fa2283855eea0bc65fb87d66e5.yaml | 4 +- ...5328-96bfdb264056a59de7cf266b01d0316c.yaml | 4 +- ...0287-77b2d106f56be975fb3bb74f975f0127.yaml | 4 +- ...0895-1424f14be2dcb113b8417a6cefda326b.yaml | 4 +- ...0901-4ad999fa82a381d094bc99654eb86aca.yaml | 4 +- ...0009-af8b6c1405ca4fecbb6348cbb779bff6.yaml | 4 +- ...1068-d9b7779382ec9bca0dc96d41eb9855af.yaml | 4 +- ...1785-062f64c8e6a3f6d8894bd4ff8b102cb3.yaml | 4 +- ...1834-ad3b6e67373c173a68de7fe25df960c3.yaml | 4 +- ...2371-00db16fbca7a4f9a03bd9187fe606bf2.yaml | 4 +- ...2402-0422552738ed57c09ee0769345670612.yaml | 4 +- ...2403-44d43af8a00799ed8cf48db72cbbf122.yaml | 4 +- ...2404-43262c5eaf25f49cf932dd17aa5ab966.yaml | 4 +- ...2572-260d59850520222ae9e82cf8d0c5f77a.yaml | 4 +- ...2579-bdefbe0337f0d8136e413e9977ce9dce.yaml | 4 +- ...2633-4b2830a65cedd0c5dc26608a77f72c10.yaml | 4 +- ...2759-7bcea995c31208e7b3ae2001fc2e0fd5.yaml | 4 +- ...2912-d0e94011e5fe6201731b0911afc2291e.yaml | 4 +- ...2913-d4c7d6015d840d0227eb1573d5a3b347.yaml | 4 +- ...2916-8a88cbe198527237519cb3478f4555ce.yaml | 4 +- ...2920-8e79000a55d2a7778e1f3a653b09e17f.yaml | 4 +- ...3383-41bfd816790097549bf9b2c052568033.yaml | 4 +- ...3384-91015e7f81886f4b730bb4d9cace5ff4.yaml | 4 +- ...3414-568514847d2ecbfcd9be56c047f3a92a.yaml | 12 ++-- ...3414-7849f4bf55847e7dee539697b18e4bc9.yaml | 4 +- ...3414-b7c464860f475ded8d2ed3cd59a1ad52.yaml | 4 +- ...3434-ba663052cd3e15a64b57c5574e6284ee.yaml | 4 +- ...4226-ab4d33853504febd7c01f9cee8c9c3d2.yaml | 4 +- ...4242-bf34e0d076673dbb1080a2742b54fd0c.yaml | 4 +- ...4264-d3827d64e2bdf966f3d9c111c132ea14.yaml | 4 +- ...4271-0638cf0d113b279b6ab4547692f6759f.yaml | 4 +- ...4272-a6ea9efcd2b00d833f3dd3cae90d9348.yaml | 4 +- ...4273-50d503ecab241e54444834a8beaebf25.yaml | 4 +- ...4283-ec063e4ec21933641631e905d4f64602.yaml | 4 +- ...4421-4e1daaf317e651c619a375744a295c28.yaml | 4 +- ...4422-9717160fae4fbf7e432e0ecf4fa6857d.yaml | 4 +- ...4874-c888a527d839638dab34ddfabb9982e5.yaml | 4 +- ...4921-668be2a6a44dad3bba943de0f544a515.yaml | 4 +- ...5177-ed4c279d09c7012524c7ccab923e2ae4.yaml | 4 +- ...5178-87df231a3fe89988f05561dc4a2eda17.yaml | 4 +- ...5325-552fdceb70e178ef12665118f36af7cf.yaml | 4 +- ...5327-fb045d9c371baeb404b4c5f1d77f622c.yaml | 4 +- ...5328-ca1107b3905cae6801d38dcd71b363a8.yaml | 4 +- ...5346-9088cbacca16ddb298ad417146be5fc5.yaml | 4 +- ...5349-46bf8ffa7005c6ec6cf07777085484d4.yaml | 4 +- ...5350-5b86c54747aa1057e36177e85fea660b.yaml | 4 +- ...5387-7987b5631645ef011c12aa6fb80cc221.yaml | 4 +- ...5469-f5f19df0291f0636aeea89c408a38887.yaml | 4 +- ...5856-187ba8ada5a41b0d7770ae8aebf496fa.yaml | 4 +- ...5913-ef0c35cfc8264d312ebd8c7577e88c19.yaml | 4 +- ...6312-2c3b5f42630b423898a1e16a09268499.yaml | 4 +- ...6506-f4ee9df210a60a8c7b3151780ca279b1.yaml | 4 +- ...6511-a88755371a7efc7dfaacf49c4e565b46.yaml | 4 +- ...6527-5f2c8752d84edabaa8bbd1589413f608.yaml | 4 +- ...6622-8cba549bfba1e71b314fc0d37ea95e7a.yaml | 4 +- ...6624-a72a870d8ea76185ed68595992193f58.yaml | 4 +- ...6625-0856197f54ebc4b1a325747e3d0ab80c.yaml | 4 +- ...6627-4fecc14512bd412ef7b458d7c2feb79a.yaml | 4 +- ...6628-437f867caa3099fbc234387a5d6249e0.yaml | 4 +- ...6629-ce05b3ae1fa8a55fc1f1267b8e05c4cc.yaml | 4 +- ...6630-01dd63a5f8faf96a00782f6bc3eb47be.yaml | 4 +- ...6633-53c3a2476763f7f2558688f9f26210ce.yaml | 4 +- ...6653-bc135ea3b74553b0fd14eafbe49bca73.yaml | 4 +- ...6713-72d88d4156b62bb9e1abe8555a4604f1.yaml | 4 +- ...6714-ecd06ad3b241a40ab31e78d6ecc1667e.yaml | 4 +- ...6715-a6e4580408df1cc0fd425db3d3f61102.yaml | 4 +- ...6716-944355331d4d9eab9649c96fbc1339dc.yaml | 4 +- ...6718-2f64e4cf69164182b2f4695a0a03f04b.yaml | 4 +- ...0236-ff8227d1909738ca97650b31fc8d45f5.yaml | 4 +- ...0237-62c0f4af115d106e4e2cbcfcbfb71c13.yaml | 4 +- ...0286-da11574313c0b78ab88b69a807dbc63e.yaml | 4 +- ...0731-74a3eb8891dcef7e1892db3c005e178d.yaml | 4 +- ...0736-4a9495cead71bfc76b3becea53804acd.yaml | 4 +- ...0023-c978227ed54be6d80dbe1ecf4f522c4f.yaml | 4 +- ...0026-347522eaa82eb43bdeab94627e4d0f98.yaml | 4 +- ...1407-eb8f98aa61e3c3db7506a6098f7ccbda.yaml | 14 ++--- ...1408-7b51f983a57c524a14f0aa93885b9cf0.yaml | 4 +- ...1463-4fd8626c11bff94fd8a393ce1bb61f0e.yaml | 4 +- ...1464-c346700edac77f8ba964672619183f58.yaml | 4 +- ...1758-3b4a8aeeafcd7cd5d89d3f79fbd2340b.yaml | 4 +- ...1759-8d120ab408475ea52678a65c5972ac37.yaml | 4 +- ...1765-f4124706d0e19c3b0ecdc824e2dde79c.yaml | 4 +- ...1808-7727a5f68ed648a5191d57e52492a289.yaml | 4 +- ...1852-ccd9eb7d8d7c7fdd585ed7aff289426f.yaml | 4 +- ...1916-70ddedc5487f163b43d7ace431e3f2c6.yaml | 4 +- ...2008-d80662422b2866b3d65a5445924467ed.yaml | 4 +- ...2009-afeb8327fb03504a0b5ac79fd5a442f7.yaml | 4 +- ...2107-ff845ece92fe1b8afa1885550aee0170.yaml | 4 +- ...2109-75c70b1bb438dfcca6e33d6263e0e86e.yaml | 4 +- ...2200-6ea13de5e88a490bbeb3409f32172b66.yaml | 4 +- ...2201-7fdbdd031d5c39eb7f813226abb85c96.yaml | 4 +- ...2205-9b2541766ae2ed11a30c45f083c00914.yaml | 4 +- ...2287-38106c08054956ec9ec0eb985cd6a30a.yaml | 4 +- ...2501-47c8ae751ee325a323299c1e28df1079.yaml | 4 +- ...2640-5be3d6220be540ab529a6f616f5316f8.yaml | 4 +- ...2693-b73d87f96280b93d84cc00f272e356ef.yaml | 4 +- ...2696-7851eebfd119dbcb64d57949b00c8e79.yaml | 4 +- ...2697-f8b195ad87a5a50c5754f7800933e00c.yaml | 4 +- ...2699-0e39d853b3d4654c80796b1245bb017e.yaml | 4 +- ...2700-4fb52fd64080462536a5af2ab82cbace.yaml | 4 +- ...2701-fab081bdfce9f805f8a61feef8468916.yaml | 4 +- ...2703-72f73bf14c806744336e445356e6090f.yaml | 4 +- ...2706-a61b4c2ab615ad0f80b5138981abe8ce.yaml | 4 +- ...2709-9b7bc1f0f7f491c09d5edf25ce5f3958.yaml | 4 +- ...2710-507e2521f54c5e6ca19bac49a7a788fa.yaml | 4 +- ...2714-396371aecede5680b30f6adf18b9bebd.yaml | 4 +- ...3251-bc3ead94b2639f49d2a3b634baef9593.yaml | 4 +- ...3252-888312a64923f43849174a79d906913e.yaml | 4 +- ...3253-1ce0c9b4a51f3fdac3a650bd3678e546.yaml | 4 +- ...3254-b3f583df01b20215cf8c32eded7781af.yaml | 4 +- ...3256-5031bc59caa3037821df61e5a345c90f.yaml | 4 +- ...3261-4a78286f0fa257bf74920260dae5103f.yaml | 4 +- ...3262-a760bafd1cd95a91af8a27215ef05ba2.yaml | 4 +- ...3263-d7975313aa0a75118cad6d46dc36f4d3.yaml | 4 +- ...3477-58ad613c40728469546ff0c459432f85.yaml | 4 +- ...3479-32ca157e45a11cba9d0a4e52d697d9d8.yaml | 4 +- ...3487-123845e838da3a6daa580f3b2ed445cb.yaml | 4 +- ...3491-61fcaed16881b56993f1d78f9758c2b3.yaml | 4 +- ...3526-f3bf3aa52e1e30ba08101ace5617af2a.yaml | 4 +- ...3720-42f14cb098faa7900818b46106b42afa.yaml | 4 +- ...4240-8de4556487daff9f80ef882a72ac48a1.yaml | 4 +- ...4241-0edbba73cef4d5273525e9fdeb2bcb4c.yaml | 4 +- ...4625-0244633df1d46b9b703b5c746fbc6e51.yaml | 4 +- ...4626-356feecea26ff4c40d9fa77a244963ee.yaml | 4 +- ...4693-75fb06485693f13299e4aa42a8ec1d70.yaml | 4 +- ...4944-a103c2e3cc97ab522767ac0230b22480.yaml | 4 +- ...4954-085dcf91f1430534b15ba25ebc810709.yaml | 4 +- ...5672-bc1fc73bd669dca4197ffa756353cd75.yaml | 4 +- ...5711-eaff27608bcf6deda804f06712a1b098.yaml | 4 +- ...5916-3dc139e568d48b3719f09d74e5c6ac5a.yaml | 4 +- ...5978-67c99f9c8f327331a1d82c5ff5d685e7.yaml | 4 +- ...5988-996209252b43de8bc510aae02fc9d00b.yaml | 4 +- ...6280-dcf043d6af78599175beab95bc8309bb.yaml | 4 +- ...6281-c9ddd0481037c81ec76638f9cdd36097.yaml | 4 +- ...6342-b04c389a2c7db09e215c22221497896f.yaml | 4 +- ...6797-683c8ae1178fe6f9d3ed4e7dea6abbfa.yaml | 4 +- ...6837-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml | 14 ++--- ...6991-2f795470b566b4d4e27fdf7c4b01f4e4.yaml | 4 +- ...6992-3ee736065c571005f3aa44af407146c3.yaml | 4 +- ...6993-8ed4f4b4804b54524ede760d18b29fad.yaml | 4 +- ...7129-e7c3ee180660fac9fead4fadabb98bef.yaml | 4 +- ...7233-23b973e4e6f56dde6b9f085e9af4fc06.yaml | 4 +- ...7276-acf04354988365754f4760bff4f381fb.yaml | 4 +- ...7279-b308d8dd463cbe3361a5a4c348d193ac.yaml | 4 +- ...7472-178ad27fec6356c0ff4786fef5ed9b55.yaml | 4 +- ...7475-db0677cd0c6ea98a43e8b2ad4b143537.yaml | 4 +- ...7476-272ee2a329a8d2a28bce41429783dc10.yaml | 4 +- ...7477-eb6226c8060abd8c26fc61f24da2a61e.yaml | 4 +- ...7478-b1f45416f5a631250c26ec095bcb39a3.yaml | 4 +- ...7479-ad055d1685348a8fa4aef50dfdf0211f.yaml | 4 +- ...7480-e976dbcc632c2ee3b143a7604910e2c0.yaml | 4 +- ...7481-0c860e72b162cc9055e799dc4f8c2b43.yaml | 4 +- ...7482-e4da0c9bf6d9952b4ed3e7efbc293bab.yaml | 4 +- ...0001-f364089fe838821aa5875cc23a9bf280.yaml | 4 +- ...0007-f98ba84845d04638f96a14d587800f12.yaml | 4 +- ...0008-3be3c98bb23ebc942163786ddfe2ad5d.yaml | 4 +- ...0016-95e54f65e6d0b56382227247b6627a71.yaml | 4 +- ...0018-a24ad83ed56eb98da964ec89f37324d1.yaml | 4 +- ...0023-802392d669a0739410b0400626ccc124.yaml | 4 +- ...0027-f260533813247786590cffbf5861c8f5.yaml | 4 +- ...0012-fa96cc0ae3ebc5f92e1c1a93f29e6a5e.yaml | 4 +- ...0013-f8694c41fb21641e443ef7de9264487a.yaml | 4 +- ...0016-b635a88aed40383d80b165aae1551858.yaml | 4 +- ...0377-fe5830586f1fe4c6f5f3c3dcee633ecb.yaml | 4 +- ...0378-4fd25d208fa1eb71c396970325cd56c1.yaml | 4 +- ...0380-251b86614cf3be75bb7b89fbf426f8a3.yaml | 4 +- ...0381-3f3bfd2ca93dfdb22d963aa7b5cb0c46.yaml | 4 +- ...0382-785672d467101767144e711ae7fe2d35.yaml | 4 +- ...0385-6a2ef437dbd84b379d13828c6767a7f7.yaml | 4 +- ...0392-ad9f5965c16c8246b424703d21435589.yaml | 4 +- ...0393-8e029958bdc3ff72cf62f3277afe0ddc.yaml | 4 +- ...0395-87b936573487d2a82b44f72e3ce646b8.yaml | 4 +- ...1232-93eb8e1633c7ed38fbc4ff339a075742.yaml | 4 +- ...5091-49a01bc79b6fdfb5a76a16441b827dc7.yaml | 4 +- ...5096-d80de73f9f6546e4a52cda1c1451f11a.yaml | 4 +- ...5099-91fc45f92059ad3dccdaddc100f38fa5.yaml | 4 +- ...5100-08107665cefdd5cc4f288c7614f8ef39.yaml | 4 +- ...5101-8195d0fd4f0b5ac7235f16224b2dcb18.yaml | 4 +- ...5103-d8d27a0f27f9a3ef698ef167496cc3cc.yaml | 4 +- ...5105-4673047ca29ad4630d7b8bb30f727df8.yaml | 4 +- ...1888-c3337fb47eeb04c822819fd17c433268.yaml | 4 +- ...1889-88c5b961644bad4c49d63ba50954d1ef.yaml | 4 +- ...2040-6234c54583fe97f4b335659ad6e8c2c3.yaml | 4 +- ...2274-15bbee0302a2c0acdbacef494a071dae.yaml | 4 +- ...2297-a2cc7daca48d70191ab86ec84c12d114.yaml | 4 +- ...2315-60056c59f58d08c739eaa4877baa7622.yaml | 4 +- ...2333-1d3a5e954dbca93e3fee328975ccc98e.yaml | 4 +- ...2550-20729b5326c844ceb8ab014ad17df6e2.yaml | 4 +- ...2558-9030229f25561b555ab5bd8cf6a1c26d.yaml | 4 +- ...2579-d6467913a640b127b20e07c49e842d3b.yaml | 4 +- ...2598-2b5c6ad57482cc18f3496406a2a98d3b.yaml | 4 +- ...2838-5ce9260c9b6d59d0d80e5fb0cb039b07.yaml | 4 +- ...2839-0b148460306247418981fb91f92502a9.yaml | 4 +- ...2995-1280f1445230b7ae1ede9b8d16dcfe7d.yaml | 4 +- ...3123-9324556ad1df2ab2ecb9b1f7e086b9b6.yaml | 4 +- ...3210-7983ddc66df9d17c37dd89bbc4e4f416.yaml | 4 +- ...3841-6d98c218699b93985ac97a3eec99201e.yaml | 4 +- ...3842-897a0fa8ed3a14f37db420497ce08cb5.yaml | 4 +- ...3844-ffaf15e9710e51e22815d7c14866275b.yaml | 4 +- ...3850-3a91d6c48afcaf4ec202f8da0ad11a12.yaml | 4 +- ...3870-94f4e4e5606b83b8d91c368a5ee77e4b.yaml | 4 +- ...3882-a2f350e1414d89ef0f2cdb91d69b4d0f.yaml | 4 +- ...3903-02d6de68e2eb0c0f7215999509c086c8.yaml | 4 +- ...4017-f35417e8a6d1f5736025e50e8ca1a9dc.yaml | 4 +- ...4163-80de44f32a39260a4242f01334cdbfd5.yaml | 4 +- ...4514-e94f4c2cbdc244ce8cd5d182c9382536.yaml | 4 +- ...4516-4f0f10f376030e01ed907ee127ea7f81.yaml | 4 +- ...4517-20bdedbec4b7794610e6cc496e884cca.yaml | 4 +- ...4518-96de724cebfb88ce342c3f1cd99b7f35.yaml | 4 +- ...4520-e4bec7dd7a04a9998930ce7422960fa5.yaml | 4 +- ...4521-d1ad636a904712d275c068316d9921ca.yaml | 4 +- ...4523-2dcf73eb82f83432e780c74c23beb2a4.yaml | 4 +- ...4524-75e8a53ab865623ebf98c15a4f6ef027.yaml | 4 +- ...4525-492078688f68b5c1a6aec5a98ed76f29.yaml | 4 +- ...4526-e5f4c0414a585004ed1f35745c5931f6.yaml | 4 +- ...4527-e9f65fad0edf93964d95edc6a82cf394.yaml | 4 +- ...4528-26cfa8bd44fa751562e056cb1d39d345.yaml | 4 +- ...4529-b3551195333886afba6c43fd173acb65.yaml | 4 +- ...4530-59446fd68b7784d882498e25f909137d.yaml | 4 +- ...4532-a274fd2664073f0162156778e8dac986.yaml | 4 +- ...4535-65f707df02fc4e71880af94936e28fe7.yaml | 4 +- ...4536-8a7ecb10c894553e29bd44217c769b5a.yaml | 4 +- ...4541-719947b7a1ac06fd82b24dd2b2c29f27.yaml | 4 +- ...4543-d6f933dccde3d9cca555af3f7b970f39.yaml | 4 +- ...4544-c4998932aa42fcf89b684f69330f53ac.yaml | 4 +- ...4545-7ddce7ee421f18bacb72f14e66ea1bcb.yaml | 4 +- ...4546-1bdd11fadd06cfdab7d4d06e095a85bd.yaml | 4 +- ...4547-fe69a0c777f01161eb85876f2a58c68c.yaml | 4 +- ...4550-382f2dc0e3689fe8f1bed64d23fca41f.yaml | 4 +- ...4551-4382e753da7c1d916f58a427140d32b1.yaml | 4 +- ...4552-a5f4f463543df4d2c732d202ef98faae.yaml | 4 +- ...4553-a406e3b1989f167ebfda1e3281f7073d.yaml | 4 +- ...4554-a491a4eb2f6511d2fd18eb2730601144.yaml | 4 +- ...4555-d99f0f471a2dd63c73902853b59daf4d.yaml | 4 +- ...4556-6d412503c15b02be74462a4b525012a6.yaml | 4 +- ...4557-9dadadc2ea66cec373bf71c20060be7b.yaml | 4 +- ...4559-fab645de2f6e6231ff6074be3c265848.yaml | 4 +- ...4563-2e334a9b30a8a16758bc7c2d1620372e.yaml | 4 +- ...4564-22471b3f81db400388be79d0e5d0cf32.yaml | 4 +- ...4566-011e0a807fc0a0f2b6240634cb1a2fc2.yaml | 4 +- ...4567-78372eee8a5b2f566eb2e73090f227ad.yaml | 4 +- ...4569-e248f5c6da990a6a809a8d58910d242b.yaml | 4 +- ...4571-495d298d6c0fc5fe1a9847d638c40959.yaml | 4 +- ...4574-a81e63270dce3acdb86d52d988c823c1.yaml | 4 +- ...4575-11d411cbc5ec47f84a5a874c5f4a706d.yaml | 4 +- ...4576-e0d816c541690f9c52144ee19295acfb.yaml | 4 +- ...4577-5595c7f205cd9ae7c0c1e3237881d78f.yaml | 4 +- ...4579-2d20c9ee33e7e10b4c0f0dcd5f256173.yaml | 4 +- ...4580-549e52f202fcfb1294c6d1e3496da00f.yaml | 4 +- ...4583-faf2b2d46d16f4cbc167cb1d3ca32849.yaml | 4 +- ...4584-e5c5d5728e5c08ed8fa4fe79d2c3e420.yaml | 4 +- ...4585-f4af8d356c8b91106f18b8295f1a09bd.yaml | 4 +- ...4586-40f4199a368e88456e06377e7668ed2b.yaml | 4 +- ...4587-25e2788cf757f6544d551ea3a1e2ff53.yaml | 4 +- ...4589-cf07672d5cc5a9d43b461f631786b4cf.yaml | 4 +- ...4593-11e0416c47cc399cafbb7b5feca59d4c.yaml | 4 +- ...4595-db7767ed937dfde97dcfb07b299497ed.yaml | 4 +- ...4596-894d5909f0af3672921ffb2138091248.yaml | 4 +- ...4599-d9ebf3668fe7cefc2f8b63111d50df87.yaml | 4 +- ...4600-fc176b004d2c6f19188839a3973c1a4d.yaml | 4 +- ...4601-530246c3333edec963a6035638964677.yaml | 4 +- ...4602-780fa31d43c1e72887f541f835fe2c28.yaml | 4 +- ...4604-882b62316645c3c4ca02d06b90f3ba4c.yaml | 4 +- ...4605-e5d3824dce2c042eb639b46cc57ff2d2.yaml | 4 +- ...4606-09e64e82ae55462158eeb5e726a22311.yaml | 4 +- ...4663-b970262dad30a7d484efebc698a4fbb7.yaml | 12 ++-- ...4717-934f2b643137558d27d763ac97da6357.yaml | 4 +- ...4845-acb1c7356c04fc668153a6e512559aa7.yaml | 4 +- ...4846-2c78a721f8f6bce6bce705e149277edc.yaml | 4 +- ...4848-6ccf09aa4f6f92564c1ba185250a9b6d.yaml | 4 +- ...4854-aadc81f29bdd98e82b479da656b5f939.yaml | 4 +- ...4856-bc16d03e307b2f3d476c4281bda98567.yaml | 4 +- ...4939-84f324614693ea073f92a44e128e4cc4.yaml | 4 +- ...4944-3a7bd82599c0011e05818b715925a7ed.yaml | 4 +- ...5034-48e518f6131232316ecd7bce4c25cf68.yaml | 4 +- ...5072-eacb463d459e2bbbfb442e19685437c7.yaml | 4 +- ...5155-ef20cf055251e93d9b846f8776b699ac.yaml | 4 +- ...5180-e15109a3e2bca91cb9757f33e8ccceb0.yaml | 4 +- ...5182-a37629b8951d8dca9eaa0034808a75be.yaml | 4 +- ...5183-ff68da2306359b7fb7d2ec7bcba42c9a.yaml | 4 +- ...5184-c6f782f9040ea9a039305ec1ed2ddafa.yaml | 4 +- ...5185-1f86e582a713c3bd4333747ed30a9d68.yaml | 4 +- ...5186-e6b6d80807708af0a37d88bb4f8862c7.yaml | 4 +- ...5190-f1dda6bcbed7eecbc2cee8a7403b412e.yaml | 4 +- ...5204-f22677490a8449ed9a279a27d7c29df2.yaml | 4 +- ...5324-6eae0900047437ffd3af67b0a999c0ce.yaml | 4 +- ...5344-0c3f9f93e6c155cbea9171c4ea6c8a72.yaml | 4 +- ...5389-bdf28a131c7bd7c8afd4060cccc1802a.yaml | 4 +- ...5460-5e35179f25bd306b0effea20785c4fdf.yaml | 4 +- ...6242-5ac539645eb63c949c47fcaeea5bb661.yaml | 4 +- ...6315-85912756aaaf6a5c4da322cb7b750dd5.yaml | 4 +- ...6604-8402c61711992f819817934b35ca7a98.yaml | 4 +- ...7139-b47f4196237e18a984049178586c33fe.yaml | 4 +- ...7151-0943806ea17e69fbad3f9008b6d8edaf.yaml | 4 +- ...7153-1b866013a286b8267be128b4354cf380.yaml | 4 +- ...7240-ec82173ebd40f930fa2890b83a9358a8.yaml | 4 +- ...7956-a7d43e65e4e3ff48ff1d77822c4c9c14.yaml | 4 +- ...7957-fc1ea9d8e61023700e49f1688ac8b5c8.yaml | 4 +- ...7958-2269359ddd46edefa6d111262722719c.yaml | 4 +- ...7959-80f01f8956a520ccda68d02885c8eaae.yaml | 4 +- ...8087-a2564828601d8890d4d70eda1fefb7d7.yaml | 4 +- ...8364-ee3866229b628cfe3699728232f7f492.yaml | 4 +- ...8375-5951232c0f20a63b311a79c589b973af.yaml | 4 +- ...8584-ece1da78596879174efa10393f34846c.yaml | 4 +- ...8603-1c3b4e53e5b3379877d01d32e9f8b494.yaml | 4 +- ...8724-656dd25ede0c1a0fb3db612c85cade65.yaml | 4 +- ...8809-320ea2b9c0bedd9f6c8b24cfa2e671a3.yaml | 4 +- ...8810-491436cd325d5b03202c1b421dcad671.yaml | 4 +- ...8948-c40ba36e2109a35c573b2639a4d72291.yaml | 4 +- ...8949-0cbcc4f1288df0ee24dd7a2993f69c51.yaml | 4 +- ...8955-f5690c4ae22224ef33491e3a8f293f4d.yaml | 4 +- ...9031-c4855e013484cc5dd3a682addca483bd.yaml | 4 +- ...9033-263b6b337d75675e2802e70806ebeca8.yaml | 4 +- ...9035-440665cc216f121193f817a3884e395e.yaml | 4 +- ...9036-8a33514ce48c43037c771803b9a985c1.yaml | 4 +- ...9039-f4126d8b538ac1453cb97c3958cf463e.yaml | 4 +- ...9094-415af7715839a7a4186f1ea1fe3682a1.yaml | 4 +- ...9098-5a110fd311341876d97192705d1ff40f.yaml | 4 +- ...9099-13ab8a3f776049bebae928b8bd527987.yaml | 4 +- ...9174-d4b13be2a36ff961aada7107a748559a.yaml | 4 +- ...9176-be25df600efc2e679e203dcc1fd3ddd8.yaml | 4 +- ...9179-2008dfadd96c77e37701fc89701d0b2f.yaml | 4 +- ...9260-07b6f9539cc79b55c833c05dca993fdb.yaml | 4 +- ...9305-73c7b664803cc72f6ed74c19b2560471.yaml | 4 +- ...9308-039f1cb39ecb5839b4ea52ff55c41eac.yaml | 4 +- ...9309-961c6f8ac9568871bace8745083a3696.yaml | 4 +- ...9311-d30830ee183428306dfe29b862928edf.yaml | 4 +- ...9336-d22a628e60dd0e0e47e495ea9eb75413.yaml | 4 +- ...9337-a8ffd5b000a53e3a5bfd7f4581d6cb26.yaml | 4 +- ...9338-8b7ce3f62fb6e151f58953706865b9ed.yaml | 4 +- ...9339-124b0c02e423c613251c0019e72c2c54.yaml | 4 +- ...9340-aa2e0c1ddafa9b3b45d0cc288ae14d9b.yaml | 4 +- ...9368-29127228d14d384699d6b5442d961328.yaml | 4 +- ...9391-216bc7429720f3a1737645ac0bc074a0.yaml | 4 +- ...9393-b53860895277e266b1fcb14159c31da6.yaml | 4 +- ...9394-fab925188af5751f6804af30f809b504.yaml | 4 +- ...9395-9f4b30648930a231b8f2e1e9c1a6b6c8.yaml | 4 +- ...9397-f1ba708b36938f8403e7e3c932465c6c.yaml | 4 +- ...9399-181c4a45776e23b2e4688d3d65b94f78.yaml | 4 +- ...9400-b96d233c9f831b3a15126c8efb4195dc.yaml | 4 +- ...9401-fe81b0cd67440d8b6f9d1a6ebbe2565c.yaml | 4 +- ...9413-288abda2cfd9da64eaad068ba5d6f96e.yaml | 4 +- ...9437-40737c0a7a095d43140be7cd03a62330.yaml | 4 +- ...9441-ce24f7f3b0bffd6ade8af3419aeed5c0.yaml | 4 +- ...9442-412eb3ff2c6b3450ae105bf1638dee64.yaml | 4 +- ...9443-984a23521e50b74e0baafc6841353e19.yaml | 4 +- ...9444-5804085185dabeb708155bde523d6d27.yaml | 4 +- ...9454-e689aa17f6bf2fdc2c6603a9014c4c60.yaml | 4 +- ...9523-15ed4766d27c484c5517c27d81b8d51f.yaml | 4 +- ...9570-2c08e7ca2855464050481f48ae1d114f.yaml | 4 +- ...9735-21b56747ef932af6a293d705a4f1c993.yaml | 14 ++--- ...0895-44ac07d5baafaaec1fde2cca5e220010.yaml | 4 +- ...0920-434911a5447ed5d05a669b67b9efd816.yaml | 4 +- ...0004-16949f85deca6c76da36cc5d46cabd06.yaml | 4 +- ...0090-6ef6064badb5d7b87c27535925053eda.yaml | 4 +- ...0095-cecf0eea6a928571e9c6c0b109812dde.yaml | 4 +- ...0100-57f7b5f0694f05830341c7de29cc9c44.yaml | 4 +- ...0105-6f9e9fe1fa78bdc8c8c67cbc00f8001f.yaml | 4 +- ...0111-89a35a79088c1cac6da4471e1521db2a.yaml | 4 +- ...0116-2a790c8bfc2f91a748cff8286de5f526.yaml | 4 +- ...0124-53a42a688a74a64b49721153f05dafd3.yaml | 4 +- ...0128-94b0b54aeb124f4c7a107e54a5615849.yaml | 4 +- ...1204-323a2528ecc021abe5c2c6bd363f0d32.yaml | 4 +- ...1366-5b2fbefb63fd7f965b09642c4ccecf5d.yaml | 4 +- ...1376-99e3e9aef74467dcee4f17ac700177de.yaml | 4 +- ...1383-887adced0648142cd9b714a8cbded6f3.yaml | 4 +- ...1384-f7325cb69c59d2a2951bb8ec98779e8d.yaml | 4 +- ...1385-86221a41117bb12070fda480ca17a28c.yaml | 4 +- ...1393-1e81e15f7eef3b25cd39002edd8c241e.yaml | 4 +- ...1394-e1df20c1816f9cf921b493870b0123b0.yaml | 4 +- ...1436-7a859a74f0e39d83ee989a269a737923.yaml | 4 +- ...1494-b8e3a07576df90727675ec278a1f9eb2.yaml | 4 +- ...1580-8319ea5020d449067d1800ef0c846413.yaml | 4 +- ...1784-b4ed5bad800bb63784fe65e3822d9b92.yaml | 4 +- ...1785-5eb51111eaa90d94b47d1fce5457ff77.yaml | 4 +- ...1879-0058c9636ab9a993ffe8aa9657a05d60.yaml | 4 +- ...0019-321e86531ce3a7401f2a887940f1ca1d.yaml | 4 +- ...0105-b1bcff9d2efb787a948b3f8018f345ae.yaml | 4 +- ...0106-55592f88afc85caec6c62b369547bd3e.yaml | 4 +- ...2040-b08c80c889936db0e80107b8d6e7f7c2.yaml | 4 +- ...2062-f1a34dd1cf3f3d82d7aaeb96b1997e29.yaml | 4 +- ...2069-74b60f27afca1a7a8208f5a85162c261.yaml | 4 +- ...2084-f8dda67401c83c106e4913ae42963922.yaml | 4 +- ...2089-66a96d7ee2557e873f3475f1e86dd229.yaml | 4 +- ...2194-50500b0da9551f89249fc057d52b16ad.yaml | 4 +- ...2195-ee67de5781e7fd9c2318027f775c66d6.yaml | 4 +- ...2199-66fd05b591a1b1e766cf1d8976a2f593.yaml | 4 +- ...2213-4042aa3076d5d5e05f92a43c0f9299ab.yaml | 4 +- ...2292-4a0b4f088a324947da6aaf5af5ea450e.yaml | 4 +- ...2293-0cab757218d53679bf548112d251d15c.yaml | 4 +- ...2315-cb38c4c6a570ec5691624654c5d4d34c.yaml | 4 +- ...2321-21f007f5ea27a69827ebd1e3bdac836f.yaml | 4 +- ...2324-8449cdb7230a3e1bb12d25a2395ff5c1.yaml | 4 +- ...2755-5b4876c37f7fd35309718a01d65b18f0.yaml | 4 +- ...2792-bf27f6ce9ebbfb831479a794b9f49858.yaml | 4 +- ...3173-262dd6c0036b365e35ff5544b3d1cf02.yaml | 4 +- ...3299-6a69a2fa108e4cf956a3388af5834004.yaml | 4 +- ...3300-380b3f09b95ab564acee2d8952a33e71.yaml | 4 +- ...3325-4ae9af0b470e9693506c7f0dea29cf9b.yaml | 4 +- ...3421-b63e841ec4f7ba03a92d7fcbed9249bc.yaml | 4 +- ...3429-a1f41447ffcf38fa9b963d8ece31aad9.yaml | 58 +++++++++---------- ...3439-1ea3d08c9b81a694b2e0d96737c7ca52.yaml | 4 +- ...3986-e7c178a2471ea08f4ec99b9eb663cf05.yaml | 4 +- ...4010-2fb0bdf5e86e962a718dd05b2ce83f93.yaml | 4 +- ...4039-398e2e434c59ceafeecf5e603168a0d7.yaml | 4 +- ...4062-c5e29f3bae507d53468f7991a1fb1a3e.yaml | 4 +- ...4063-5661d46a0d0f62ecdca1f908938fc469.yaml | 4 +- ...4064-32b6d6a7715e88760b71f326a4a0a744.yaml | 4 +- ...4065-1bd3cf2ded386b4330f990e160e575a1.yaml | 4 +- ...4066-13393dad61452f7f4e21c0de558fed80.yaml | 4 +- ...4089-7bdbbcae3cce706a901ef3f3a6b92425.yaml | 4 +- ...4127-ce1d4ccc883e8bf5f82fe00f2d94fe35.yaml | 4 +- ...4139-ae9135d7bf1c7296c12f3a734a25c4bf.yaml | 4 +- ...4179-ddc63b74125a60840010b54470ac437e.yaml | 4 +- ...4337-259f1c198d6aae45fe01969db446735f.yaml | 4 +- ...4465-ffbdefeb8e9807045768193f5cbcf332.yaml | 4 +- ...4697-c101bbb0e470de09f2d621ebb65fb72c.yaml | 4 +- ...5057-3120d6067a3e5e251eec4212f4e5aeb5.yaml | 4 +- ...5308-cb7fe4a1f5c046460e4d69413b578527.yaml | 4 +- ...5483-ec43ca1bf1629851ca9458501102a544.yaml | 4 +- ...5484-9098123c91e037cb8b4722ce5e0246b6.yaml | 4 +- ...5485-86cd270f4cc1442525b2973b263a3c27.yaml | 4 +- ...5528-6f67eba72e7035f4406a73d70218218a.yaml | 4 +- ...5532-63f8abf1368e7fe90270064d672ae623.yaml | 4 +- ...5533-39efec1d687062290aa82ba498987905.yaml | 4 +- ...5535-1a21904a7af165ae2d206e73642b0122.yaml | 4 +- ...5622-6aea7b52579f172c9bf983e50b0b1bb7.yaml | 4 +- ...5623-313251dbeb7159d2f2f5a878dc3f4bb6.yaml | 4 +- ...5714-f7283f346fe85f39acdb5e20af5f97a4.yaml | 4 +- ...5715-edc700db5b7f85733c96d120d88dd36f.yaml | 4 +- ...5731-026d101570c060723759d89bd6e308cf.yaml | 4 +- ...5732-eaaace6cb938cd367aee5bb46ada2d9a.yaml | 4 +- ...5733-4e2310a226a845a4294681273e42b4e0.yaml | 4 +- ...5734-5dbdb3a08effff0e267b66b5070f04cc.yaml | 4 +- ...6238-43b0481b51b9c335093961e5a3ab3d80.yaml | 4 +- ...6535-b86d996fd3fb32f4d4a2741c181e0be2.yaml | 4 +- ...6738-4e5782f54b030eb5a442bdadb5799911.yaml | 4 +- ...6805-6ffded2a3fa64429e9ee95b7a8bf44d5.yaml | 4 +- ...6920-1a4e07a5bd173dbacaf88e7f59c17b91.yaml | 4 +- ...7357-3f3928c6559acc265ac4dc8abe8f4e68.yaml | 4 +- ...7386-e35ccf6a5d1ddada5f10422331d300df.yaml | 4 +- ...7527-1a5984e73d9bda9668de2c9f32433df9.yaml | 4 +- ...7682-c271e79e457792d8093dce56ebc058d7.yaml | 4 +- ...7791-72bbf06194176f982771d77cb4853bda.yaml | 4 +- ...7806-19a0491cf914c310a86ae542abd14b9a.yaml | 4 +- ...7989-c8253916783474b27e7325c9525aa970.yaml | 4 +- ...8350-7ebd0ae08ee9eace1c6d1e72c60c16e5.yaml | 4 +- ...9229-41d56c1ae043586e69a9cbdf8e53ac0a.yaml | 4 +- ...9230-05b396118a681cd132367b6e58e8468f.yaml | 4 +- ...9233-33bb20c48315e8c455839c78ef66e1b1.yaml | 4 +- ...9234-4612690a2b5b9e2adc467251d2200410.yaml | 4 +- ...9270-a669ab86f241324d8d2f2b22eaec997d.yaml | 4 +- ...9273-c568408b66270ee8858beb6b5337a826.yaml | 4 +- ...9293-5d289d7e578bce569fb34678a49e0c92.yaml | 4 +- ...9295-7d2288f1e4c8fb646fdb55a372b6200a.yaml | 4 +- ...9297-af430c9858b5bde975d56075509bcf57.yaml | 4 +- ...9299-3f14554541d5c07fa1b8df4c175de3d3.yaml | 4 +- ...9300-7f61d132e9ad7bb4333f632fb4ac561f.yaml | 4 +- ...9304-afb15d666e098434f8ebcb7a76b5d273.yaml | 4 +- ...9306-c5aaff2cbf4515e9a35f03f837f2957f.yaml | 4 +- ...9307-0677fc472ce6636d2560dd0fee27206d.yaml | 4 +- ...9308-6a35bf1797897f8d13c75911c491ac65.yaml | 4 +- ...9309-09e6dfe7f784e608ed0fba91188d7274.yaml | 4 +- ...9317-266ba42edca3ad9aefeac2a819615d83.yaml | 4 +- ...9320-6e42e23486d09ec34675722772aa1b90.yaml | 4 +- ...9322-1bd28f72c9296305fff71e613d0c8c82.yaml | 4 +- ...9329-5b6052811294a634af9b6d15efbb8d49.yaml | 12 ++-- ...9331-81844f67a8cb300bf38ea9c090e351aa.yaml | 12 ++-- ...9339-558dd2abba5a0995e4e08d93b33b9766.yaml | 4 +- ...9342-7a4c9972726e4955d433f6a7b81c1d28.yaml | 4 +- ...9343-79ab1b5d546d12b519823b2566724735.yaml | 4 +- ...9346-ab3c3e9805ecb63c9f5865d7cc04e6fb.yaml | 4 +- ...9347-2304e691feb866a99a567fd410649f69.yaml | 4 +- ...9353-1a55c20ce9650829e57b6e448599ddb2.yaml | 4 +- ...9355-5e2cda3c648eae11638d20b64a6ac7f2.yaml | 4 +- ...9356-f5789b694dfc2fa041ad362aac79382e.yaml | 4 +- ...9357-cff9e4a18682397642168ab27f023202.yaml | 4 +- ...9360-84290819179c80fad98664a6919a3707.yaml | 14 ++--- ...9363-f7228bc923e4f7e6b922e94dc9e73ec2.yaml | 4 +- ...9373-bf5b301e59797812833300e7fc88f201.yaml | 4 +- ...9375-3a6771ca38d2c7d158262d9fbdbb7826.yaml | 4 +- ...9379-f87c4c6d53b29231a0f57635f4d257a4.yaml | 4 +- ...9380-6c9c7c812a4ff55c5f56daa5be2fd373.yaml | 4 +- ...9384-c81d2be092773595df7e11c3e43455e6.yaml | 4 +- ...9385-105cf32b00a014867c600a479b6d44a5.yaml | 4 +- ...9388-5973e024827e1b713c70489b0018d6d3.yaml | 4 +- ...9389-5ec6acde81c3a11c030c7e48fb82e3a0.yaml | 4 +- ...9390-9639beb38d5d1c45bea1fc0af8299ea1.yaml | 4 +- ...9391-6ef860020cf2393d29a3d4b7f6db6475.yaml | 4 +- ...9392-ccec5144654bab62438c0000b0cd001b.yaml | 4 +- ...9393-d7cc53ebc89a0251fb7abbabbb69e870.yaml | 4 +- ...9394-9ae9897b899214e88181a9313e35781d.yaml | 4 +- ...9395-4d92bacdb897e72bc7c9b888465bfb12.yaml | 4 +- ...9397-e2b3a3b43a72a2751316fff54c8d6a22.yaml | 4 +- ...9398-613714f5c2e87c49430822b55db25b79.yaml | 4 +- ...9399-cca20bceb29d548b71fff2c6b265d9c3.yaml | 4 +- ...9400-f1ed96d1b2d98c3026e1dd704ae2087a.yaml | 4 +- ...9402-7d8cf8e800d2870ca230bed514c737c3.yaml | 4 +- ...9405-59221c8c4cf4b83ed678f38b12740d87.yaml | 4 +- ...9407-68634c1a8c946edc4c46f0185186727b.yaml | 4 +- ...9408-7fd7a99aaec9de09c58a50b6b832a9fa.yaml | 4 +- ...9409-a800af3f915adeb03a4c49e2c0c22f5f.yaml | 4 +- ...9411-364140ec5050587d4743f8ad888c8004.yaml | 4 +- ...9412-b8b913c56ed39f29c61eb2552bb40930.yaml | 4 +- ...9416-fc97a63071c0bdeea490fe1b61f06d10.yaml | 4 +- ...9419-c23ce008dc2473271851552ad5775c2c.yaml | 4 +- ...9423-20fb78c96d003cc1a6ca252c0fdacd2e.yaml | 4 +- ...9428-5ab744233de8cca4ab1cbaa602802c09.yaml | 4 +- ...9433-7e1c6a231bffdfe14a3a2ce673d73608.yaml | 4 +- ...9434-10df21fe953fcd7c84f02b55e2e8260b.yaml | 4 +- ...9436-a4d9b1fab913268578f318671b68ca36.yaml | 4 +- ...9437-7c8cf3109f4d4b196459b75b96aa728e.yaml | 4 +- ...9438-c88811f07a28a64dae50ff3a4d1213f5.yaml | 4 +- ...9439-400e484570b51dd745ebe0689024ac48.yaml | 4 +- ...9442-3231c8774c4d66bff9d3f46fb317e754.yaml | 4 +- ...9443-5c23a6c70aea6e2ef9477919b8442851.yaml | 4 +- ...9444-62fcd76831b1e2041b5f8a95a5780c32.yaml | 4 +- ...9445-103ae57e192be7c58d97324e70895c9f.yaml | 4 +- ...9446-1ccd8092085adf5a5342024d683bb79b.yaml | 4 +- ...9447-e8e6f489ccaee4d00c096c7d8c466fc5.yaml | 4 +- ...9448-f386ff3f48b7d778335b6a97f6c41a43.yaml | 4 +- ...9449-02bdb4a60f8caf982b09839a595e4b9c.yaml | 4 +- ...9453-0e68c0b9eccc4d13ea9a31e72c5947b1.yaml | 4 +- ...9454-60f28a7307d8376de999213f19e8d5bb.yaml | 4 +- ...9455-5f432c656be335dcd6d93a860c52a8ba.yaml | 4 +- ...9457-41859e395573554f98122582c8a8f0c6.yaml | 4 +- ...9458-4fdb668b4072805be7b723dcf1d44abb.yaml | 4 +- ...9460-044e0b800aae833468f672b3d52648b9.yaml | 4 +- ...9461-18b2efc80a79b2c683b250abf8605dd3.yaml | 4 +- ...9462-d959830a068b86235ba87177aa38047a.yaml | 4 +- ...9465-61995cd0cadb8b6360d652af233c94df.yaml | 4 +- ...9468-426b7dfdb8bc5b0834ad851cf8e9ecfc.yaml | 4 +- ...9469-d1c8ca034f832b8e22c96845d2890940.yaml | 4 +- ...9493-de81b18a854ce81734a5dca6853e283e.yaml | 4 +- ...9494-76874a7b4a83992edc7c544ab3ce90f7.yaml | 4 +- ...9495-85ef6da03e1e6bb00fd985498d35a632.yaml | 4 +- ...9496-65920cbefe2613a05348e64d8746a7b6.yaml | 4 +- ...9497-79f632cd97a0ebb6e16d846a092aa9f0.yaml | 4 +- ...9498-efc5740c90ff0a59809e4e9849d0d149.yaml | 4 +- ...9500-4569fe83ce2bb42a6e266298e47ccef7.yaml | 4 +- ...9501-e655964abfea5d2b4e77a9418e2e0409.yaml | 4 +- ...9502-5d7be31521ee03a3c41d06e3d9d363f9.yaml | 4 +- ...9503-51ba94283b04aa5998cb156cf18689aa.yaml | 4 +- ...9504-a66c423ab6d157ff18cae8cbb8d16a15.yaml | 4 +- ...9505-a71d6df449db20ab9c26824728336769.yaml | 4 +- ...9506-188892e32d2c439c02d6eec7a4adfdb5.yaml | 4 +- ...9511-3b1d00a18f864c139ec613a9e0ffecf2.yaml | 4 +- ...9512-4ada8035109d6dc47e94b2c651edea20.yaml | 4 +- ...9513-4f94094a1cb01e1f7943775986788b65.yaml | 4 +- ...9516-61717663c17e62c7f08a76483f0eeff3.yaml | 4 +- ...9518-d21243f7c0461744fbee4b3ace491e32.yaml | 4 +- ...9519-7028a373145887022c971f45128fcdba.yaml | 4 +- ...9520-d51efaf8de0ecaf24f9a181bc5d20bee.yaml | 4 +- ...9523-2d450de1fce5683a098921397bf9fd03.yaml | 4 +- ...9524-5c7b076501be3d3c98666ffe30ae6a26.yaml | 4 +- ...9525-099ead226109d18c4bc71e3d4e743b55.yaml | 4 +- ...9527-c110f3311248c25cc2e6e53a20d9f8d7.yaml | 4 +- ...9528-52e4049030db45f1344545c480f7a4ef.yaml | 4 +- ...9531-0633b5d5c2288fd164f50f774a52dac5.yaml | 4 +- ...9532-f5fc5bca6e41d90a9454914bbfeeafc7.yaml | 4 +- ...9533-a3693c90a0060afc06ae1758aa95f75e.yaml | 4 +- ...9534-b91f6a56da52c114b3a84093ea345821.yaml | 4 +- ...9535-c5cd64fdc88a18d66954d78adc22f76d.yaml | 4 +- ...9536-b586a8ab64bee13c2ee807e747d50adb.yaml | 4 +- ...9537-862a8430206366dd5f1306f54a1da83a.yaml | 4 +- ...9538-c2a9c94ee32f4cfd4a8e1474373c16d3.yaml | 4 +- ...9539-503833e43a0634ab7984563e9c441bb9.yaml | 4 +- ...0765-7e99952543b7586dc6b3250a2122b0f9.yaml | 4 +- ...0769-6b1f692527a7829aa26f6946e0d77ddd.yaml | 4 +- ...0770-cf74b8fc2d5310123c3eee779bc13fa4.yaml | 4 +- ...0147-f1d9f474bbf4576d12894725bd74f389.yaml | 4 +- ...0152-885c0e7d869967a6d9428aa8fe4ebe55.yaml | 4 +- ...0112-8157d8b031515138cda4bb1e1c15680c.yaml | 4 +- ...0148-0cd25473d47849a11f534f0b196b97ae.yaml | 4 +- ...0705-b0d263ca65579d9d14b154cf891cd65e.yaml | 4 +- ...0706-2be7d29f9bb984978a5f99c0ed30a7ed.yaml | 4 +- ...0763-1b1736563be4cd48928200e2f20f46f4.yaml | 4 +- ...0867-e1b9583cb78e016115d982acbd157618.yaml | 4 +- ...0868-7567c31561b747bfa0cbc91d7005334d.yaml | 4 +- ...0869-28ac556db560c4dbe8e302546acf1314.yaml | 4 +- ...0870-a6e38c48f14b76ed761e5c6ec8e4f3ac.yaml | 4 +- ...0871-b628a5c29017f302cc9e3a317e522425.yaml | 4 +- ...0872-9c147c1fb503983534bc4ea0ae8ec8cf.yaml | 4 +- ...0873-ad22dd4e7945e819f768594bfd7f51a8.yaml | 4 +- ...0874-230f648691b91c6194be1f415c1bb8f9.yaml | 4 +- ...0875-434ae7a95fc78d705c7843354abb6396.yaml | 4 +- ...0876-01a81435c686a1247dfccda6d4fceb1e.yaml | 4 +- ...0877-b9526b8daaa2ae88bfa635ff810051bf.yaml | 4 +- ...0878-7382281cd5a556c25b2c10e2b81ec2b8.yaml | 4 +- ...0879-ac9a4353796cc2c432e6ec8cb3e235d2.yaml | 4 +- ...0880-96e3c232ce32c0e385509a8011930dfa.yaml | 4 +- ...0881-06e9ac1fc5b59d1b8d6fb6e9af4f3f0c.yaml | 4 +- ...0882-4201a049c4e3da0f1f472f8fab792578.yaml | 4 +- ...0883-268fe7ccb3ae756c66592ca513b99e93.yaml | 4 +- ...0884-492d26185e3f340adae3b16a9841dc89.yaml | 4 +- ...0885-eb8ded5298215dd0e82d0abb7c7916df.yaml | 4 +- ...0889-91308ce2ef066c70ca278e2e191864f4.yaml | 4 +- ...0891-be27c4b6992c035b340ec769cdb51351.yaml | 4 +- ...0892-b648d871623ad477887d3a2ad417ce75.yaml | 4 +- ...0893-a24d4eae978465f1c7539ec2afb5d89a.yaml | 4 +- ...0895-75c93ad74d45c10e07e436b9060dff63.yaml | 4 +- ...0896-da0195abc3fd621c83febd2fb7f0bcc9.yaml | 4 +- ...0897-9660e0224b9760d1af88fd4611d7d759.yaml | 4 +- ...0898-d59208c9d25614855049428d0906a55a.yaml | 4 +- ...0900-72e728e9748e016a77172519c9f57dce.yaml | 4 +- ...0901-e97ef8cef65f1238fc33971be91c7b6a.yaml | 4 +- ...0902-daafab6254624f5514eee093537d860d.yaml | 4 +- ...0903-f63791a8b82a8db6f6f51f822aa27ea8.yaml | 4 +- ...0911-da987af29928bc75b0d20d1e2162e5dd.yaml | 4 +- ...0912-ac061f34e871527fabbabb8afc45c209.yaml | 4 +- ...0914-373c3d1e9d0bf3f43f2574269f041f82.yaml | 4 +- ...0915-0ff521bb2f967b893b649e52f933e62e.yaml | 4 +- ...0918-2f3164fe48781902f2ffb82e4c682a7b.yaml | 4 +- ...0919-c1bbee5af74211de37a39642515f7de2.yaml | 4 +- ...0920-24f4d698ab0a491686fe5ba91eade3a1.yaml | 4 +- ...0925-12236d5bb8f3c06e72ec152e136c1986.yaml | 4 +- ...0928-1108320cabd88205cc0f43eb95edee22.yaml | 4 +- ...0929-e6b2b9642eaa28f30036533185d6907f.yaml | 4 +- ...0935-675cb8bcb438f10a9bd4c15d9cbed954.yaml | 4 +- ...0936-72b547593d28ba78083c2d30dcb45b59.yaml | 4 +- ...0939-2adf451d71caa92a7f7c155d4ef7aae4.yaml | 4 +- ...0940-d6a4a05c68d8a3214ff9eb4a728a2600.yaml | 4 +- ...0941-e253bc9eb60b3ba0170a2740ba27c2f4.yaml | 4 +- ...0942-f9c4a4753797c567682067fdd891aa71.yaml | 4 +- ...0943-11b8e915a665a007145e1d71a284462b.yaml | 4 +- ...0944-6df6e844abfccff24d48183d808487ab.yaml | 4 +- ...0945-39d9e91ebde9c4d0e5ed1e82b99b21f1.yaml | 4 +- ...0946-5b558ed2503b6bdcb6a02e6d5ffb6d95.yaml | 4 +- ...0947-e8e5df43b04b7f37f9a558b78548b1cb.yaml | 4 +- ...0949-3770a5a68072ae899f0f18af895e3c7e.yaml | 4 +- ...0950-28a2dfdb4b89718535fa7dedda6260e9.yaml | 4 +- ...0951-41d0ef3672db9c552872805c429ef89f.yaml | 4 +- ...0952-62f03cd88708d633c3bea1020189b887.yaml | 4 +- ...0953-27ec034aba5d4951c82cebc35f1cf5b5.yaml | 4 +- ...0959-2dab9495e3032fc043db0a21d11fd446.yaml | 4 +- ...0960-8435cd6b84481f3b14132a8d7f815c94.yaml | 4 +- ...0961-eec026409b2ce5ae4162f07361f714bc.yaml | 4 +- ...0962-c7d2eaa1bef247cc946f12a77351dbbb.yaml | 4 +- ...0963-1b90a29b0e05edb9e0100d5bac6dd543.yaml | 4 +- ...0964-266cec63957d7dffbe45528e32eb40a1.yaml | 4 +- ...0970-ce31848b731129452978ca83014199c1.yaml | 4 +- ...0974-656ffc00f499b97cc92334beba62fc4e.yaml | 4 +- ...0978-18c927eeaab747daf8dbc085388c3619.yaml | 4 +- ...0979-b1f4f06fa1d08e23be33495079a7bf7e.yaml | 4 +- ...0981-4f2a3c77ca82525aff6c0c722c03bbb8.yaml | 4 +- ...0982-e343250b5d78372d282c8933d6d57ce1.yaml | 4 +- ...0987-99d48d97197070fa6f8afc1ea6ec2bed.yaml | 4 +- ...0988-aa03d96ef5988adea4feb7a4e959e6b8.yaml | 4 +- ...0989-e628e638290643fc84f3ec2a1da56d28.yaml | 4 +- ...0991-348a1a0272fab4e16c4ec4e28b1cc2f1.yaml | 4 +- ...0992-f2983beb380d477fba46a5c5deed43dd.yaml | 4 +- ...0993-88013bc8aa189f38a19a59f4e02b7e1e.yaml | 4 +- ...0996-8105121190d01c38a4c87c0ee0fe8654.yaml | 4 +- ...0997-430614badd7183227eb02d22143e3a52.yaml | 4 +- ...0998-427c0efd9f4fe0120009a410add6694b.yaml | 4 +- ...1001-e52fe8ccbb854729b4cd4efd3c029a6b.yaml | 4 +- ...1004-a2b478ab05dc0dd0616e45e762ef893a.yaml | 12 ++-- ...1008-916c5b9976a17729e06d1b6fb0458ebf.yaml | 4 +- ...1009-7137b8fac252650babdfc2fa8502b307.yaml | 4 +- ...1010-875ad9422b6c5059d922fea2bec00a1f.yaml | 4 +- ...1012-753b1cfc0cff5215c4137639d86b10b2.yaml | 4 +- ...1085-658febabd8f8ee9b00c71e69efcbac2c.yaml | 4 +- ...1160-7d31af080da908940b0bf5332e53662b.yaml | 4 +- ...1564-1793fc29de6c51f3e1cf00f2d46b91e7.yaml | 4 +- ...4566-531502c1a73b5136edeed41b3c25b40a.yaml | 4 +- ...4567-6dae0916c42cb6d2e594be15be242836.yaml | 4 +- ...4812-050d7cb19f5f214c16e87b6deb3805d1.yaml | 4 +- ...4827-c124fe326fda2227cda364e6977789ed.yaml | 4 +- ...4833-acc6eb8dd4e1bc540251436012892eb1.yaml | 4 +- ...5832-06eaa8e1425630a567e0b531b6144921.yaml | 4 +- ...5833-b4ae1cbd422cc707f6a60d7100bb98f1.yaml | 4 +- ...5834-189bad7014e697047ef9a98286efd4ba.yaml | 4 +- ...5837-3556353803358c712408f57b48c86c15.yaml | 4 +- ...6565-4a8d217f64c4cdfb18ee166f8cd3bec7.yaml | 4 +- ...6634-dda97c7f3b2cab605b5ded8dc805330d.yaml | 4 +- ...6635-f53eb1a5057e991c005e324155224f96.yaml | 4 +- ...6897-793575cb782549abec6279e8981305af.yaml | 4 +- ...7168-c9150acbdbbdbe684264580cb26cfc8d.yaml | 4 +- ...7169-68cd0d8404410b84b22d009411f84df8.yaml | 4 +- ...0038-13c50b13a503600e0189283b0a2ceddd.yaml | 4 +- ...0170-49f7af60a7d6ca8e6785ad7873768f2a.yaml | 12 ++-- ...0227-26ee088c8368fd2a8bcecfc18ae8bb11.yaml | 4 +- ...0227-ab49cd0603fd2aad8bd2addfd19e8e37.yaml | 4 +- ...2000-719ff6e603e56a8355496bcf6077970d.yaml | 4 +- ...2010-c2edf18b1dc2c5d697f81727cd0bac3f.yaml | 4 +- ...2011-f04fb223e6bc1b82dc5e818d9e40fb20.yaml | 4 +- ...2020-ed4e4356cd22d0451cce02bf7c3fe0f8.yaml | 4 +- ...2022-ddf10b902ecdb6f3ecf20febec84cbe8.yaml | 4 +- ...2025-1b2dceeb5f112c4d4e1d47bb3fb62e6f.yaml | 4 +- ...2026-3faf59fe255a23ab6371375fbe88c459.yaml | 4 +- ...2027-9a2bf7d17126275dce9aeca280888e4f.yaml | 4 +- ...0991-d323b2ee541571a78879d377867cb57c.yaml | 4 +- ...1658-b300eab2789f0638494228aea0ada3b0.yaml | 4 +- ...2068-1b4409ad110c3c389ee584578fde5c3f.yaml | 4 +- ...2131-ded406378489866866417fd6ec210840.yaml | 4 +- ...2200-299e26f66452f89b69cd95a12049938a.yaml | 4 +- ...2651-c17200ba4236119c0958120e5b5ef5cb.yaml | 4 +- ...2946-c2574a7a9b79ad452c99c332f592fe5f.yaml | 4 +- ...2947-f615078fb53a8f47f20c6cb2792c121c.yaml | 4 +- ...2948-618eabaed47a418425ba258f61366c0d.yaml | 4 +- ...2949-c5c5fe7ae04b300c4245ab22359369aa.yaml | 4 +- ...2977-7d9c26b229d5c8003d8d09b623e0e129.yaml | 4 +- ...3138-c39e88fb98a263a4718fa22351cd75a3.yaml | 4 +- ...4126-e0584db35cbb9869be95ba6010b7c0f4.yaml | 4 +- ...4530-44c866df4156e18647ea081befd62b4f.yaml | 4 +- ...4718-07ca900da4dc5001e6cb25234fc6e73d.yaml | 4 +- ...4720-2bba5d9d8ab9c1e3d8162257b423cea8.yaml | 4 +- ...4721-c8fd14ca7da27ed4c689b2c4e745761c.yaml | 4 +- ...4724-77d0dd5a2fc10c56c574031709910e3c.yaml | 4 +- ...4726-c64e96aaac6f414a27f722db57e620e7.yaml | 4 +- ...4751-1a1e231870f2d36ae969bc3201047b95.yaml | 4 +- ...4842-43a98edb387e539611a5da070feef314.yaml | 4 +- ...4843-b8bed2657e8d7d4ab8d4bb6fbdc93698.yaml | 4 +- ...4844-398be83e4279f1a443c4d3cb2c5b8198.yaml | 4 +- ...4845-a6893186307907fca26272a54fd950bf.yaml | 4 +- ...4846-6c841a99daf37cae6f46cd0d753efccb.yaml | 4 +- ...4847-00968ba3e8c09884c42e4fbfc8959579.yaml | 4 +- ...4848-d1dc7536ba0bbf23ad7893c422769d48.yaml | 4 +- ...5375-251f38cefaa8d1370dc48f71e7aae210.yaml | 4 +- ...5812-84cb3311236885a9e904cbe429619629.yaml | 4 +- ...5867-933c9d4b3eacccddbe4abc821f273b41.yaml | 4 +- ...6815-718986dcd5947a1beb7efad526e28827.yaml | 4 +- ...6955-94786cf22c04d1dd0ce4fe28ab98e98a.yaml | 4 +- ...7059-95db80ffd1d934591e0e0a483a99236e.yaml | 4 +- ...7091-3dc787f0bf6215df748b832ffc87f8cd.yaml | 4 +- ...7092-7665a25ea15e9e9b2d624d595bf5298e.yaml | 4 +- ...7093-6afe85808d3f8414da9c4627bea64467.yaml | 4 +- ...7096-3504e7e5ce554ea17877d4ad4d619862.yaml | 4 +- ...7451-6435ffbe89f0f4a16cb704e9095f5d40.yaml | 4 +- ...7719-31a7c57e145b1990f031344b13acb01b.yaml | 4 +- ...7744-afd7cbc1a6da1a4ae770134f7fa61d59.yaml | 4 +- ...7753-888fd755a466f61b6b5975477e6bfb5b.yaml | 4 +- ...7780-167d9672411be44feb72a5175fd0987c.yaml | 14 ++--- ...7869-fe1f1b8568ab900402e4ee21af348064.yaml | 4 +- ...8010-5d316e62377c24672c816fca478bdf84.yaml | 4 +- ...8011-9960c486a0af8a01fba712be84f42610.yaml | 4 +- ...8012-7afc53a437871814faec30b27e8447a5.yaml | 4 +- ...8015-7bc3b9cd6e8ea033c22ca8523f43d4e5.yaml | 4 +- ...8032-dc6aa910a851ae74e5606d96e36b1052.yaml | 4 +- ...8356-aca82f89029d85161f52ea200f7cad49.yaml | 4 +- ...8487-4e7aa84fdbb125f3fa6adbf786ab8d90.yaml | 4 +- ...8488-ec758abe67d8493d911d656fdfa690f2.yaml | 4 +- ...8492-008dc0e9968f6799131ae4b8b208b112.yaml | 4 +- ...8495-8536de3de245d6a4ab6eeac77e95e618.yaml | 4 +- ...8497-fbafef1583d66ee6ba3521f29ba434a8.yaml | 4 +- ...8499-d87695af989823f3f60bb3499466b104.yaml | 4 +- ...8501-70c3e0a35f7627ffa035ef5b1d41e423.yaml | 4 +- ...8502-6e4e8347273d5c0e2b6b13d913498882.yaml | 4 +- ...8503-f47b58aa7a47ddf3e1cee744a91d58ee.yaml | 4 +- ...8504-61a96d10635962decc1ce6046743090a.yaml | 4 +- ...8505-df50b4bafe4c4501f744155f1ffc2d55.yaml | 4 +- ...8506-7e729c66876df948651c9d3837d1f01c.yaml | 4 +- ...8507-0afdcc5a66b8604c315ccd15a101d49e.yaml | 4 +- ...8508-e810e3355fe67bdcfcad0632d29d1e56.yaml | 4 +- ...8510-aea09105f0f61d6ceb820ac11ed09e51.yaml | 4 +- ...8511-e7cf3375d8a38efd1be42356dbb74de4.yaml | 4 +- ...8512-62fd42906a2acfa6303c130d21470bd3.yaml | 4 +- ...8513-05079d9697e3f59f6cb3b3fffd76d6cd.yaml | 4 +- ...8515-4533ca9d47b3b4f7b077cc893cacad61.yaml | 4 +- ...8516-b2f000587e20cf237a45ef2d6036a9a0.yaml | 4 +- ...8518-6356cf8af8f87c1115ab1b364de5897a.yaml | 4 +- ...8519-f9650549fbf42fb03bc206714accabe1.yaml | 4 +- ...8520-2e7b0b07966525201b04f4b815659d00.yaml | 4 +- ...8521-a76e6fad4bf5d5ba93f81a78338ef54e.yaml | 4 +- ...8522-af90005e3634d51c613c584f0861c0a2.yaml | 4 +- ...8523-77b95b2fd3fc9982f02a243980235615.yaml | 4 +- ...8524-924ca2bb4d17021fd01ade1e50b5f40f.yaml | 4 +- ...8525-68c192a64ec1c6719c741f7b5a598887.yaml | 4 +- ...8526-61f56b8a3def3b7154a28f2e5a9ff0a6.yaml | 4 +- ...8527-b86bab5c8fb0747eadd8257097e9b226.yaml | 4 +- ...8528-3c928fa432700e9d8d2c446de566746a.yaml | 4 +- ...8531-942951937c68cc5db7a5bc776617ab05.yaml | 4 +- ...8533-94ba05091d5c1c002f96ded27dad7e5c.yaml | 4 +- ...8535-43890f1f23768c00ae2a757d58110ef2.yaml | 4 +- ...8536-bdfa460006d70b85bf4366e301016193.yaml | 4 +- ...8538-09a7bcc8ea30f2211fb747659d8fc0b2.yaml | 4 +- ...8539-078737c487b7cb7dd59dfa47479456c5.yaml | 4 +- ...8540-721a4bb5a70d51824521f6e59c15ccd0.yaml | 4 +- ...8541-0d6d2e1e75a3d7c24aa16b9420abf358.yaml | 4 +- ...8542-83e7004306bfbb58dbc0b94ba733c14a.yaml | 4 +- ...8544-378de5a4c8a761e6f865e9b293282366.yaml | 4 +- ...8546-a6cb60a315c6c7a94894e2123d4f4da7.yaml | 4 +- ...8547-a591950f40f9d0373366c6581aa5c23f.yaml | 4 +- ...8554-8f9bc8ffd93a472c3d732de50d85129c.yaml | 4 +- ...8556-1758588699ac13a0da770bd7cd456b77.yaml | 4 +- ...8559-6e2fc253c488c9fb6b9867ac9b52ef35.yaml | 4 +- ...8561-ce946f2b4359bb7fac48391b993074ae.yaml | 4 +- ...8563-9a3fa62818d09a4c2a4693cadbb72035.yaml | 4 +- ...8566-19953c61fa61f206c9ea957d11e2d617.yaml | 4 +- ...8567-655d94e53e4a588a8f5f35013abd45f6.yaml | 4 +- ...8570-84b6699e5f738c5aa2a22a553abe9531.yaml | 4 +- ...8576-a1a48fe23ddfed810a2068245669c30f.yaml | 4 +- ...8577-324bc23c2f374afaaf9c80c2964d5db4.yaml | 4 +- ...8578-10ee5b6870d72574cd2ceacdf76db39e.yaml | 4 +- ...8579-490cf4e76b6c86f1bd637de80c3840f0.yaml | 4 +- ...8580-235127c1445e6eee4f6de6fb13cf776e.yaml | 4 +- ...8582-f2aba70ce8a44005876e1620c7a6d111.yaml | 4 +- ...8585-4146040381375fe3470534dfb0d8c368.yaml | 4 +- ...8586-20a34e507c4fa6283c8c06e9c7d18117.yaml | 4 +- ...8593-c3cfc3a43625bfa414c3f27665757d46.yaml | 4 +- ...8597-8a2f1e9cb4e65657070d3644661c86c5.yaml | 4 +- ...8598-e6cabe992a07b751187d2c7299c53fb6.yaml | 4 +- ...8600-633d0b293826c4a61b61e1d3210e0346.yaml | 4 +- ...8601-1cb146595e5a6af092ba6cf697572ca5.yaml | 4 +- ...8602-1c6e8ef696086c4cf5cf1464c84048ce.yaml | 4 +- ...8606-45a743f5d162595c13c7d51a595d52ef.yaml | 4 +- ...8607-ed2bbae23b6c0e2ec39d5d24fb1592c1.yaml | 4 +- ...8608-ad069f3a56279cbff65458936b83abde.yaml | 4 +- ...8609-b42951305c8f37d90390c15daed2c5f3.yaml | 4 +- ...8610-83aff6544a7c919044e1d77f749ea1cb.yaml | 4 +- ...8611-57123cd71067e91d2b8fed604519bb45.yaml | 4 +- ...8613-68ca9f8a242a5c678fbfe7eb11cba349.yaml | 4 +- ...8614-738043af82effea7b721b2ac598247ee.yaml | 4 +- ...8615-703cbb2bd8ca38850245b92d6dc648dc.yaml | 4 +- ...8634-f7df930f39831ca9c998366434d0f175.yaml | 4 +- ...0053-362c09e706e4df3c312dbda6ffdf171c.yaml | 4 +- ...0054-dd0f7c53e188e7bf56ca28fcdda5f28e.yaml | 4 +- ...0055-3ecd0cc847951c575bdce3ab52ae1765.yaml | 4 +- ...0056-f899587161f02b977d621dc3afe7bca7.yaml | 4 +- ...0090-6765f94f6a40bfeac4a799a7a22b461e.yaml | 4 +- ...0108-1d7d7c5febd898bd86b248bdd1c64ad3.yaml | 4 +- ...2136-b396ad7ddae66e7db7a5d4c1747eea0d.yaml | 4 +- ...2168-cb489cb39876b1f1dad08fd79397698a.yaml | 14 ++--- ...2169-791eff0c2052bc2e9edb50c4e621f28e.yaml | 4 +- ...2187-245c40ef7971bdcc79b4668a4d4b1ccf.yaml | 4 +- ...2195-ae474b19622d960a9a30327a508a7a8c.yaml | 4 +- ...2222-a980d40221670f484b92312f4acbd125.yaml | 4 +- ...2224-4f2124ce38e5b11836dd224eb87f80c1.yaml | 4 +- ...2243-d3aee972ef803bd73b594546fe5f08d6.yaml | 4 +- ...2285-237f33dd283cbe8ba991ef6c6d099f49.yaml | 4 +- ...5488-54dec93948946561e928da0b2ec5342b.yaml | 4 +- ...5489-39916ed0568dcf6437aaa303323a2034.yaml | 4 +- ...5490-e104142bc1fb6f9114a1a8ff34f8d8a2.yaml | 4 +- ...5492-bcdd353c7595eb2f2eb76b75cc1e43b8.yaml | 4 +- ...5610-fd782d56e4b98d3f89d6bafb5ab8e0f0.yaml | 4 +- ...5611-23c7538b5ae837a8600364853bf7a88b.yaml | 4 +- ...5612-ccba560ddddde5bfcc32d210efed4a87.yaml | 4 +- ...6096-367d3a73f5196cd91ac495a3ac0b62f5.yaml | 4 +- ...6097-d853b0e423f8ed0a8520b3730f92bb07.yaml | 4 +- ...6098-0ae464a32aa65e97054ff65a6cd1aac7.yaml | 4 +- ...6102-b501e58c10633b07f2bbf5ed16ac706e.yaml | 4 +- ...6103-180f313b58923b98a121e2e279750680.yaml | 4 +- ...6570-61f3e3f11790d6bb7105200ca41924cd.yaml | 4 +- ...6571-ab348c720a0710e52e24c076c92c0cb1.yaml | 4 +- ...6572-2a026b3abf7a570fa9c1168601d16d6c.yaml | 4 +- ...6573-9f041e8fa181897986208bfc1b4d15f9.yaml | 4 +- ...6574-d349201003f1e073b123310455ca065d.yaml | 4 +- ...6575-71386814122d58a47245526972d56d40.yaml | 4 +- ...6576-346d51a39433f3f2e66028061115352b.yaml | 4 +- ...6577-56b6a95b36a0bf98a099f526d08412cb.yaml | 4 +- ...6578-882cb2013f62250b85eee3042b3892e0.yaml | 4 +- ...6814-149dcf7cdb4497ad56e6c587550c43ab.yaml | 4 +- ...6817-7c8aa1bb9118332e4c00a1f8fbc13540.yaml | 4 +- ...6818-0a8a35fbbc78dd50ed9a1fd51d25c173.yaml | 4 +- ...6819-25c3fb96e305a88e28c455667db0b60d.yaml | 4 +- ...6954-8dce3163a90bed75fd5b9e557a28f3b3.yaml | 4 +- ...7723-e3f24a45c97373cce269e0ae75379f47.yaml | 4 +- ...8099-8475202b9f0509bc3f7f733c6c0c1b7b.yaml | 4 +- ...8875-b85e6f076cf78bc83dad21e66d70a2d9.yaml | 4 +- ...9061-2059eacfa2b817cc7e2dee40b1d8ccd8.yaml | 4 +- ...9063-b31baacf3424b6f807916c83cd50d239.yaml | 4 +- ...9064-fa8a087263ff15310b12026bf0398947.yaml | 4 +- ...9065-e8d59ad5e812b7bb724e8a40d7c112fd.yaml | 4 +- ...9337-c99fdfdd6f51accf3ed6f44f28e23a84.yaml | 4 +- ...9418-b810e04fd2ee9ba72626a776c33f0a7b.yaml | 4 +- ...9419-8eccd870a6d15f799494bf58d6a610b0.yaml | 4 +- ...9429-b6feac7a7902db970215a4fc933d4825.yaml | 4 +- ...9603-b2a0f64728c134eb1a214207f2b340c0.yaml | 4 +- ...0511-ad6eca81b2e556f270b3ae3f5090cf96.yaml | 4 +- ...0546-6542eb9293767f9620f37e7f59fd2a40.yaml | 4 +- ...0547-d244aad713442e8917ed457759893c6e.yaml | 4 +- ...0576-bf648a28f236904436ac42427351efb1.yaml | 4 +- ...0577-7149f44d871608d660e807410983089b.yaml | 4 +- ...0587-caa94527ec89b606495dedb1b363e9ed.yaml | 4 +- ...0602-865ecb5d1f3a9d92057b3c2510337cb0.yaml | 4 +- ...0603-363cf849a90f39fbc05b59e8ab91a270.yaml | 4 +- ...0642-3af842e4b028602d05da06af8493bf21.yaml | 4 +- ...0172-ac32959f74b06f08f41c35d9de9637f2.yaml | 4 +- ...0504-660c79b80e87c9453730e77d4013c8f0.yaml | 4 +- ...0506-3d637613552d802b9173bc064749bb1c.yaml | 4 +- ...2000-33bf8f8eb63499d2436cf7f9e5a448fa.yaml | 4 +- ...2005-53f4d866310c8c093dd280b48d69df62.yaml | 4 +- ...2006-3c224c321d9ba7c36132b340a7d491de.yaml | 4 +- ...0102-451f562a663eda2ff6d506be6cf980bd.yaml | 4 +- ...0233-a6054d32c09f0a33057b0746bec92f89.yaml | 4 +- ...0234-08b6d9dc73cde56d748bcfad89022c1b.yaml | 4 +- ...0301-81a1379b5306a9cfccfcaaf08bd3abdb.yaml | 4 +- ...0309-d2ced4606aa87805c35fba9cf8d5be3f.yaml | 4 +- ...0310-c62e1a09b5d25064f2b824e42c65ea26.yaml | 4 +- ...0371-0533a60780cf9a211a23b93d336f2dae.yaml | 4 +- ...0752-42f689e89098e402a672dac5ec8f6c89.yaml | 4 +- ...1105-66eb7f5c446de79e267dceb74a880097.yaml | 4 +- ...1244-9d3718684afa0305d0420944743522e1.yaml | 4 +- ...1366-cfd6c4a67043af04f9e4f98a73eab3fa.yaml | 4 +- ...1485-c0b1d947b4291937f57429344da7ac74.yaml | 4 +- ...1486-cd59c1c91da7bd7850f2d8eefef7525f.yaml | 4 +- ...1579-0167f45d0f324e4791bf42a58fe0f3d4.yaml | 4 +- ...2636-8a1c6c8c0e2f1e2277e0443f4946d572.yaml | 4 +- ...2895-8cfb86a7329c0d8dd964b15f121c0465.yaml | 4 +- ...3136-a3c4d74b63323bef472fb10b591d6314.yaml | 4 +- ...3137-ee6754b66c3dcc79f507ad42121825d8.yaml | 4 +- ...3832-adf6fd1cec72a101892ceb2db93bece6.yaml | 4 +- ...4028-70d9b727752f76af972d40070c1204ab.yaml | 4 +- ...4071-381d6cb0faea51f097b85258ee0a1587.yaml | 4 +- ...4846-962810e9bfe68aabdf565feb933a98a3.yaml | 4 +- ...6164-209b175b2921345ce72870696dcb5d5d.yaml | 4 +- ...6173-6d3b26eeb9dd4b508b1794df4cfed998.yaml | 4 +- ...6175-d5338c51a39110eb82434918065d2ccd.yaml | 4 +- ...6204-877bab778ddda7032844b19d4fdbee7a.yaml | 4 +- ...6206-e9caa2ebc5663770aed9ca1501187910.yaml | 4 +- ...6285-656244efbeeadce5c71da45e29bb9a67.yaml | 4 +- ...6966-6943b3fa4f51347e8c8fc20d043e8814.yaml | 4 +- ...6967-e2709c74f557b8f05efa6466674d741e.yaml | 4 +- ...7138-1318af711c3fe0fec9bc7d351421ab5e.yaml | 4 +- ...7140-05b1f0bb86ade4c6c32252e799c74986.yaml | 4 +- ...7583-87d8a616e4f6cf2eb5659e011debac27.yaml | 4 +- ...7584-c154f039f669a6109ec8e5a85b87164a.yaml | 4 +- ...7585-5c10da7a2c723b79d143625ddb915594.yaml | 4 +- ...7586-34c60f50f8424840987ed5ec10c2ec3b.yaml | 4 +- ...7866-c040e1b7f1d715ec00a05b885aa3bea9.yaml | 4 +- ...7884-d1ded0c2f1b1f7a73c6770c120be62b6.yaml | 4 +- ...7947-2c0772cee08d9dbe384d352f3239ef5e.yaml | 4 +- ...8017-f81d8e9ecaded3d70e2eeaa0f98dacf3.yaml | 4 +- ...8018-ffb6abfc1462cb6dac9fb7d1f9f94e2a.yaml | 4 +- ...8019-c799988a889ed03a659b8598e8dac08b.yaml | 4 +- ...8373-df4750e020fd99b1db3b233a3a40020d.yaml | 4 +- ...8379-d8cb62391dd6a20fc4b59fa893c8943a.yaml | 4 +- ...8460-39656d176cfde17eb173675dd34ae675.yaml | 4 +- ...8872-8b25a4024805d97b0bbe39b2b083bd09.yaml | 4 +- ...8919-74293ce2d79dd2a7920de3a46ed52f1d.yaml | 4 +- ...9287-e6738d3799e5a12b0457c2f4dc805c15.yaml | 4 +- ...9370-3ea36d65c6ea5b35072fe01e09307dfa.yaml | 4 +- ...9487-8605cf70b09f39b80921d3235eaa5a54.yaml | 12 ++-- ...9488-8b266025d0f3695c542ad07de2e9b34c.yaml | 12 ++-- ...9564-139542bed79cb071600ed5c3c1e9d45c.yaml | 4 +- ...9796-561eff22a0971cf174004fe156be75cb.yaml | 4 +- ...0101-99e4e1e27563f717d9f8c278b33423ac.yaml | 4 +- ...0149-da357866cfc2e11d1d8ab076887b6560.yaml | 4 +- ...0152-b56f368057104a536902fcd79d840f4c.yaml | 4 +- ...0153-5a29aa05e41b6793e5d21a4fcf5c84c5.yaml | 4 +- ...0154-27c270156b5cf78eb4bb31035b7f5db8.yaml | 4 +- ...0155-a8309537878561527873c9aaba1b29f6.yaml | 4 +- ...0231-f066ce4a5d628014aa8c478503783258.yaml | 4 +- ...0368-1f1264fb01a80102a1939e77505f347e.yaml | 4 +- ...0462-0c697c5c96080eeecc8327290c3e4bbc.yaml | 4 +- ...0838-8f9fba5d47d60ee8f1aec9a71b4f7e8a.yaml | 4 +- ...0963-2c888a383975451b85f071f96c07a849.yaml | 4 +- ...0964-523f9782716d9d1f6a85039ec487ef5a.yaml | 4 +- ...0966-ae7ec62fe186e1a7a30df795c82f42a1.yaml | 4 +- ...0967-c7addb8e32d754a1c27b6eb5611849e7.yaml | 4 +- ...0968-e989541539b3897cd4ab2d9eb3394079.yaml | 4 +- ...0971-c1356627585be8298fc5154daa83bb1f.yaml | 4 +- ...0972-df1246639b8669a251f2bf76a6725ade.yaml | 4 +- ...0974-e2ad97f33f7abd91ea501d6e3cf80275.yaml | 4 +- ...0977-4e93731af3497ed66d721b94ba1ecb7d.yaml | 4 +- ...0978-c459c6390d6920d9836ff6f1ec3a05e1.yaml | 4 +- ...0979-6e59234554b04ec8d40e5e3ef21541b6.yaml | 4 +- ...0982-315158d01f8d35cf2208dddc8f7964b3.yaml | 4 +- ...0983-6bed45cc7ffa2c1423965f9f86a13b79.yaml | 4 +- ...0986-a56a7a539382d6f88ae2afe6cc65c72c.yaml | 4 +- ...0988-82c5164bc77f066c7a8d33b886720225.yaml | 4 +- ...1001-ee36904a88935929b3b15a0e036819ac.yaml | 4 +- ...1002-8bc92a63825b5e282b7e5f164f2d0274.yaml | 4 +- ...1006-7d2d77fb555165867755ecf651af34c0.yaml | 4 +- ...1012-aed7ae7e4d2ac15e64bf03771c3aeb20.yaml | 4 +- ...1013-7ec2393a2db75328cb78362c45e273f6.yaml | 4 +- ...1014-1cf8853774794c9a185058bff3041a9d.yaml | 4 +- ...5212-49034c31f1dba0715c18246f4dd38cde.yaml | 4 +- ...5213-d77dd6f710585ae9ffaedbfddc152d76.yaml | 4 +- ...5214-3bc3a29ed4f22f4e728217981dd51f12.yaml | 4 +- ...5284-eaace189d52939bb1c67d181a1aa5e03.yaml | 4 +- ...5285-807cd0a33bfd97782e746e860be1d566.yaml | 4 +- ...5286-363e85a87b5e31a1dda22e9466545bd8.yaml | 4 +- ...5288-79116f6e6f3436dd311270ae51db9449.yaml | 4 +- ...5292-034ab84e882013699ca86030c39bb7c1.yaml | 4 +- ...5293-567c0bab82561630aea9403749f896f8.yaml | 4 +- ...5311-0574327d2925f2e5b1baa6cdafa54603.yaml | 4 +- ...5312-92b868ab957b2d6b33921f7b3f3c0643.yaml | 4 +- ...5316-436125bac0484b579189e9f21786e904.yaml | 4 +- ...5361-e95762dedf29574050fd40fac42c78ac.yaml | 4 +- ...5362-3ba8578c9b517b602d4e446e82ee6f17.yaml | 4 +- ...5363-485a36eabec5f4b9943990f0033b308d.yaml | 4 +- ...5364-ddb8a7f2865d6d7dbea16193f41bd919.yaml | 4 +- ...5366-c384382f7d3c6321e1b275243f5d2c28.yaml | 4 +- ...5367-f4fb22207f3c1928cb95d88c1e1f82b7.yaml | 4 +- ...5368-e8f7e29f1dbade4dd38e32bd0037d5fe.yaml | 4 +- ...5369-acbdf42f0c9734064513cf6368d19553.yaml | 4 +- ...5372-0cd68afb7b6d648c1cc92eb32c923eff.yaml | 4 +- ...5373-5e7c4bc77fb9b2b637c41f55c55733f0.yaml | 4 +- ...5374-801a0dacfdb031773ac30c73693f41e6.yaml | 4 +- ...5651-1955d2bf9e3369181a1e0d457e568aab.yaml | 4 +- ...5652-854c79af36aba0da3346494de4eaf39a.yaml | 4 +- ...5654-9052f6be826c55f21c5dca387bdd8f58.yaml | 4 +- ...5655-2f71afc8c2d9293f41fbc23cbef8e12e.yaml | 4 +- ...5656-c4fa0744bf528288e2b344cf15e3e525.yaml | 4 +- ...5657-ff98de6f26943739c7dc560ade3e2c7d.yaml | 4 +- ...5658-c4c0b94844e7f594c58f973ae84c6505.yaml | 4 +- ...5659-2fca652bdc1152658ff99e932f826e15.yaml | 4 +- ...5660-aeeb6c4c51959fc6de4f70bfbf031f53.yaml | 4 +- ...5661-9a185bb7031cc9ee6aedfd50f633a1fb.yaml | 4 +- ...5662-40faedf6e59dffdfc7f0e36dcf3aadb5.yaml | 4 +- ...5663-6e94975f5a72379b4c113015c234f26e.yaml | 4 +- ...5664-3f9a61f980dbe211de3420fd4e108af4.yaml | 4 +- ...5665-c26b1839d934a6c01fe10cd6a0d67c39.yaml | 4 +- ...5666-3e7642452405a4b08d52483d238d4dd9.yaml | 4 +- ...5667-913904da9b37e5de5dab8db2c48cdd1a.yaml | 4 +- ...5668-b32bcea1f07567d61bc53250e86795f7.yaml | 4 +- ...5669-9859097987f0e7ca79e11ace81cfa3fa.yaml | 4 +- ...5670-c3498fe08662af21fd3da077be763084.yaml | 4 +- ...5671-78f758aca2b7adcaf11ee6e697616163.yaml | 4 +- ...5672-6a9d80e8fa30f682db502c67279e3ece.yaml | 4 +- ...5673-0cfb154efea7a6cd97d79b7c9bd11b19.yaml | 4 +- ...5695-15e650b4ee038f777984c647938b664a.yaml | 4 +- ...5776-88414da74c1432faaa821c60e30d70e4.yaml | 4 +- ...6001-4c3c497ff4bf73b3f95e774197f4a725.yaml | 4 +- ...6002-aae33717a53aff7e44346754fe498f79.yaml | 4 +- ...6194-3ea0e1871dec257bfd7cde582f2ade2e.yaml | 4 +- ...6357-6c3ed40b4545418647bb281d1735150e.yaml | 4 +- ...6465-4ba37fc25b6b62478d53951a81386aeb.yaml | 4 +- ...6466-4f5e1d138ae43eaa500111874f55d52e.yaml | 4 +- ...6468-0e4fc74efc949999cf345512b761619e.yaml | 4 +- ...6469-3bc9ed0b3cbfe53ac89e5748fc0bf57c.yaml | 4 +- ...6943-dac7bdda4e28b985a7da6425e9bc4314.yaml | 4 +- ...6944-e00b98ac8c54622a944850cb2d386b43.yaml | 4 +- ...7280-ea56b6fc3599b19cc9355c178eadf7c8.yaml | 4 +- ...7543-2e6e6e36243681b3cf144f17aaebf064.yaml | 4 +- ...8729-55d5b1ab7109cbfd7cdac31ba9a767d2.yaml | 4 +- ...9020-fb28659ef74c6816e9ff94aaba73e076.yaml | 4 +- ...9034-88fcfbe0235fbfcf5894d075044bc4db.yaml | 4 +- ...9172-95115eb6cd7773daea0c3290d4bc4306.yaml | 4 +- ...9844-90d37fd2fba0470460729c814dc702e8.yaml | 4 +- ...9864-875e2588a6c7f11db1b0d18dfa5a3b24.yaml | 4 +- ...0034-19dc9eaf0f82c574889586e002e668f6.yaml | 4 +- ...0104-0dc6cfa3fba0c385fc2da9ea78090e2f.yaml | 4 +- ...0673-913680c7cc113c5e372d717a86269c4e.yaml | 4 +- ...0864-4c0f6a08d37bb188811061a17ff42cfa.yaml | 4 +- ...0866-b584bc3add37b438ea9f7d52a53c499d.yaml | 4 +- ...0869-4bc78371b9a6176130f5ed1b3336f728.yaml | 4 +- ...1557-0dd2df3f5b8d5d1265b1558506e0a48b.yaml | 4 +- ...1590-bc7687f3a38eb76862d41bf156e272e2.yaml | 4 +- ...1591-b9705619b7c26905bbb7df74ccb4fdad.yaml | 4 +- ...1871-aeb1af030c75596a2eb738838b5e8bf8.yaml | 4 +- ...2239-96e25e69c7f878ae73c7f29f99c97760.yaml | 4 +- ...2346-27f647997621b679fa1b99cbf345bdbe.yaml | 4 +- ...2516-3395165ceb6b70322e35bead04697388.yaml | 4 +- ...2517-53a30d941da402857e0ee8cdb2011b69.yaml | 4 +- ...2566-fe0f4f4fb6e560c8f83991dc7a6212ad.yaml | 4 +- ...2570-70cdf6a74f267301ff9a7a0c0a03da5b.yaml | 4 +- ...2826-068331b2d9acf141050172c5e67910ff.yaml | 4 +- ...2934-ca875a69734817c022d2b5742d18b09a.yaml | 4 +- ...3344-d25b2870a2ba1a71b2f08074d958c754.yaml | 4 +- ...3413-5164636d32af20648741053f5b9caab7.yaml | 4 +- ...3414-7116f21024cd4d3ec70934c93595bec9.yaml | 4 +- ...3478-faaf1948155c5f302388ba2e8f465a89.yaml | 4 +- ...3505-e18c42540e73da21df0e80ed6910311c.yaml | 4 +- ...3570-b24e50f88d059b7df802d8ab2740b6f0.yaml | 4 +- ...4205-092d91aed0440af0f2ea67a8f6a61ea3.yaml | 4 +- ...4216-03cfd10aef3dc88159ec608d4ac8800f.yaml | 4 +- ...4328-4ad519606c4e4a0ac9ad3558c99fc1da.yaml | 4 +- ...4364-827bc1bb21b15b99a01d332b7037ec11.yaml | 4 +- ...4467-d26dfd7d1dd47d6fd5993a9ac9d20c15.yaml | 4 +- ...4679-a7def05240ca9e7abb72b7c9c9771694.yaml | 4 +- ...4681-b61c46947c98daf3d7e5aee079c69c53.yaml | 4 +- ...4682-a4fd26323192935dbbcbf3b0527f2fd4.yaml | 4 +- ...4784-beee0c1304e0da531df84f8029d7259b.yaml | 4 +- ...4785-c94ec523ba103bad6a372ee7e463bd4f.yaml | 4 +- ...4786-424aba97fb32ef1aa4a45220d2d79ae0.yaml | 4 +- ...4787-63a6ae12fc77467bfccad91ea4a943d2.yaml | 4 +- ...4790-ba4f93258decf77226fa4331245d3364.yaml | 4 +- ...4791-6dd0e2469be8342859a9ccb068065a86.yaml | 4 +- ...4795-d02abc95243fe34c87855a6ca2a95d58.yaml | 4 +- ...4796-f255a0d01d888b1ab68c9fee4e439ae8.yaml | 4 +- ...4797-93b42b89f073fbc75b7062f5d47b5b66.yaml | 4 +- ...4798-9568a93cf21f83223317ab5745dc29b8.yaml | 4 +- ...4799-86d0c991bc6dd85c8051863807fe1299.yaml | 4 +- ...4945-00490e9d02fc53f4fe0fd6d4af30aaaa.yaml | 4 +- ...4948-3385cb8b008c9eac317535d656ebf7b2.yaml | 4 +- ...4949-71e8880d940289fc5d83f840f7f72d23.yaml | 4 +- ...4950-18d01dbad64386da194504c3f5ffe26e.yaml | 4 +- ...5109-15adc07dcc170bd663dc3c1e94fa94e1.yaml | 4 +- ...5110-0ed606409f522ba3351ac7659014c32c.yaml | 4 +- ...5112-9024f709636fd6877d65d2f3b4c1635e.yaml | 4 +- ...5113-3b5f66bc28ba8ff54368e43564c0ea04.yaml | 4 +- ...5114-5fa24ba82d6b7dec5ee5fc8a5b73d9f8.yaml | 4 +- ...5115-55f3de8c0899443e80983275ca038b9f.yaml | 4 +- ...5116-58ad5ca81c9faa1c9bf4e8d6a87f5f2f.yaml | 4 +- ...5238-b4c6a4aeabe2851a3af8facd90e9e06e.yaml | 4 +- ...5317-d69efeae16b0ba8318e8a9d732208aec.yaml | 4 +- ...5323-05dc7f00a65d6d066b60c74e22d18787.yaml | 4 +- ...5324-c5d0a251b677b3b951be5050c3700b32.yaml | 4 +- ...5327-342fee676d86d87109d08378d8dcd0b0.yaml | 4 +- ...5328-af8e3b1753f58bd7e46c4cccec8f000f.yaml | 4 +- ...5329-5bda221acefc04e8d84a3c6e2be5c30e.yaml | 4 +- ...5643-01d841cc481bc716c0f7b858b4f11c39.yaml | 4 +- ...5645-379056d331237206cad69e45d8d3007e.yaml | 4 +- ...5647-01e6da1e967018241a8f36efe6fd50ba.yaml | 4 +- ...5649-243ee6cead272cdb6dc2ad831bc4986e.yaml | 4 +- ...5660-7700c6b035beec7a0abef5d3cdd6b1cf.yaml | 4 +- ...5713-b87197a613662b55350c2f2781a87102.yaml | 4 +- ...5769-8f10a7f44536cd7d542d4c451e6c6b46.yaml | 4 +- ...5770-35ff0530e249316fdf7a2ba6a6ea24d8.yaml | 4 +- ...5777-65fb11931177bab0fee70a7467cb7286.yaml | 4 +- ...5778-9404e968e946456749ff0111b0225ba5.yaml | 4 +- ...5779-a977aa9a4c9e6ea956efab1274f3c128.yaml | 4 +- ...5781-281277016a09cf7dcda0f71c2e15f07f.yaml | 4 +- ...5817-19a8a46d3531a17a737d3cfe8d4f708e.yaml | 4 +- ...5827-697b3f7f41c78660c9aef82a5b73a231.yaml | 4 +- ...5828-a5333a81df962bfc4dc1ef98d3ece12b.yaml | 4 +- ...5830-1189677e87fccd5ba86b3b7c8e3828fd.yaml | 4 +- ...5831-95fcd32657de195d1ff10c3dd6c72f1b.yaml | 4 +- ...5832-354f6d128f8dd6bd63a76dae47bd8628.yaml | 4 +- ...5834-52ad3a4045cbc52c94981ea4e45a3cca.yaml | 4 +- ...5835-1fb46247dc51fca766c3b6cc15fb0753.yaml | 4 +- ...5836-1e6683ba97d940c27fa31053738ff471.yaml | 4 +- ...5837-3d333cad26fc8b3d5422c9b862bc540d.yaml | 4 +- ...5840-d27b9b5016915435f37e3d3e6a022f76.yaml | 4 +- ...5841-9534faef8d85288ee99452de6c7c430a.yaml | 4 +- ...5842-40be5fedd5539e32999075c425fecfed.yaml | 4 +- ...5864-d4f39f41edde6809c1e3f1995c35c774.yaml | 4 +- ...5865-49ba2e496df198082592a83af2dd4d61.yaml | 4 +- ...5866-11611891705bb620b2fbc93feb153c11.yaml | 4 +- ...5868-5c818a45f2a9dcd466f195a8752dd840.yaml | 4 +- ...5869-b9eb31c713b27c04fd47230e22de33c0.yaml | 4 +- ...5870-67f647f4edf0dc956943ef2a579b4258.yaml | 4 +- ...5872-9e304c0c2d27a9a5e4112a85cbe97828.yaml | 4 +- ...5873-7bf1226ebc8c449ae85cc65e327ee63d.yaml | 4 +- ...5889-7381977dcbbf38890f97270b77e9814a.yaml | 4 +- ...5896-164e2c0c315709a0cb3bf1d13c08e3b1.yaml | 4 +- ...6117-1cfd262b55edc365cf2f57c5e6d1da2e.yaml | 4 +- ...6118-4ee123ab64de9526a768d6e54f2c4b2d.yaml | 4 +- ...6217-46c3b494b5cc3ea133b4b6c9ec9dce06.yaml | 4 +- ...6222-77ce3568929dc53b56e0c4f8840c178b.yaml | 4 +- ...6223-85dfbc95d4932a9f83bfee5a6b2585d0.yaml | 4 +- ...6251-e1335c6f9c71ba603c44dff8a99e9a32.yaml | 14 ++--- ...6289-c3c6968289de386f0f53996017935a1d.yaml | 4 +- ...6332-fee563db4bd1e05c4270644fa9c809a1.yaml | 4 +- ...6520-d9419931966f7a4ced3c49a3cc9a6932.yaml | 4 +- ...6522-0598f02cdb42ad5878825a4305d0cd60.yaml | 4 +- ...6523-9691566897b1cf3f102fa4ca66fa2b90.yaml | 4 +- ...6524-192f3751511f8b242f0945f1aac116aa.yaml | 4 +- ...6525-d4f973711f83e484b1ab150d8a07fcda.yaml | 4 +- ...6780-628434356b9e4de217bb4ae54139a78f.yaml | 4 +- ...6781-ff109dde1d54495dd369e80dd2dbfb9f.yaml | 4 +- ...6931-9153236cbe43b83fd86d1f43d04bc623.yaml | 4 +- ...7070-2fc40f0eebe24b9548355cb63270c890.yaml | 4 +- ...7071-1ed96ac73f1ecde8fe792ec7cdde085c.yaml | 4 +- ...7213-01553cdc4d088a5ffa18c2b6b9ad5640.yaml | 4 +- ...7229-8395989e9f463aede02be6293faac97f.yaml | 4 +- ...7230-95f9bc03677a083bf89832ea0c794033.yaml | 16 ++--- ...7231-161c93480bad1a6fddf7935d08286cca.yaml | 16 ++--- ...7233-91fd3dac9c4d5ede970602c4fc325980.yaml | 4 +- ...7236-2d2ac3176c43972722599e2c20bf65f9.yaml | 4 +- ...7237-97d25b3e88007081f13d8a53fc8698cf.yaml | 4 +- ...7239-5c3c1a4d657c9a945c9b03f1e7ed6d15.yaml | 4 +- ...7384-6786cc650f667a015a2cad75459e0a89.yaml | 4 +- ...7385-61c977fb1adb33ac70d098207834a351.yaml | 4 +- ...7386-5cb88706cc3e4d4bdffd38343a9f038a.yaml | 4 +- ...7671-f48a9fb689f8698b971abbab7d25b506.yaml | 4 +- ...7672-12b542c9c6e5694670c0b26901250872.yaml | 4 +- ...7674-7aa910c9023680190c934154781b69ae.yaml | 4 +- ...8668-57f78642fa9cede94bd35b0316b99b78.yaml | 4 +- ...8834-f9c4b5a4e9087a30d794272cce966354.yaml | 4 +- ...9109-dcbc26c1e59709ba0a55cede543653d5.yaml | 4 +- ...9110-e5552ad191b551e3319c3d216b7466cf.yaml | 4 +- ...9111-c9f41d227d49a467420a82298376145f.yaml | 4 +- ...9112-0974ad31ae0ff4ed4780871fa5a19327.yaml | 4 +- ...9198-1e95de3e52134f8f88956ec119bc2d88.yaml | 4 +- ...9541-5ff88083e32bfbabf7c17c2a2829921d.yaml | 4 +- ...9542-e612ae5fb8c05a8c56c1d21cf4568559.yaml | 4 +- ...9915-65fec51a84e4dae8b6ac8a6f543cb922.yaml | 4 +- ...9979-6dc10d5c3a8a61c313df3cbcf576a1b8.yaml | 4 +- ...9980-3042e18a6deb29dac6c8bd45ef1b1544.yaml | 4 +- ...9984-f324ead36f3eeb3ed11630cd0ba7e8ed.yaml | 4 +- ...0041-3ea050ab19cdfec8097a097615a833a6.yaml | 4 +- ...0042-4975b9673fe108360602d6969c234af1.yaml | 4 +- ...0043-38e1681925de50501e0141995c16e341.yaml | 4 +- ...0141-ce8dd1af11ff660941fa17a3827331a2.yaml | 4 +- ...0173-6bd4ae57c5ef629c5bc1d004189d96b3.yaml | 4 +- ...0180-3fb1358d568dc8245a52a721b92fb318.yaml | 4 +- ...0181-e5141ff592bd9997e23b1aad269872cc.yaml | 4 +- ...0182-7acb842ebb36fed3d48b7a27908aad70.yaml | 4 +- ...0203-727d4fbf362548e62940ac117a3d3c3a.yaml | 4 +- ...0204-6f78bc0495c69824a3ef08a95ff8b518.yaml | 4 +- ...0209-17f6998fdf35be8a6349776a3309aedc.yaml | 14 ++--- ...0210-f5204789b3d63c1e5dd223fef5d1ac5d.yaml | 14 ++--- ...0211-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml | 12 ++-- ...0212-be3f332add5d9ce678efc86e37a29e03.yaml | 12 ++-- ...0361-6d5548494ee66c8a74f29f22d03a7935.yaml | 4 +- ...5141-3c68c1399fad8442e05257bec4405849.yaml | 4 +- ...5142-30dc0670053ac012aae9f0b808f32600.yaml | 14 ++--- ...5143-42ff6519960f311906ae3110cd3f6c64.yaml | 4 +- ...5149-8f53c25a7439725994fa29007a578b4d.yaml | 4 +- ...5152-a3fbd1fe770668e38f708933d8dad89a.yaml | 12 ++-- ...5920-8ab11785066028af40a069df806e2ad0.yaml | 4 +- ...5924-a78ee203ec03252165376f049d05071b.yaml | 4 +- ...5962-808251beac3177b1d028049231c161e6.yaml | 4 +- ...5963-4ecc6299ecfad3b8f439662203eb02a8.yaml | 4 +- ...5970-c52de35daf5b13bbf0e8777d574ea5fc.yaml | 4 +- ...5972-c1ecb14191a04d9e43d6e6f80f13e749.yaml | 4 +- ...5973-236e1bbcc1e74385f1fd59662dd67917.yaml | 4 +- ...5974-89931846724982da840bead82e16369b.yaml | 4 +- ...5979-7e5b3599be6904a958ea6b2b094ad05a.yaml | 4 +- ...5983-891ca23ffb08d94e6434e60528a16c74.yaml | 4 +- ...5992-6ee5c39e29212bcfe2590b9e64dd32ec.yaml | 4 +- ...5993-299c560ce9cc99513d88a13d89852030.yaml | 4 +- ...6011-597ddaaf7d3e092f9fab20618eafe4bf.yaml | 4 +- ...6027-fc588495329f4334ef4deb847bcc6bbe.yaml | 4 +- ...6029-d03a7182da2d0e0b179ec3d956910e32.yaml | 4 +- ...6030-64d4110e0f9003166c73a24b6fad0a3d.yaml | 4 +- ...6112-d6132019cfaa7b420b3260f07bd086fb.yaml | 4 +- ...6117-8f81c40c56a58242ce344610c4f30138.yaml | 4 +- ...6267-ced2dcf72a4e26ecb3f884cfc4438e2f.yaml | 4 +- ...6703-618ad32a66dd6a63ff6bcc4f51e7ca7b.yaml | 4 +- ...7299-497a0a1ea8afe0e920601e57f5c6ccaa.yaml | 4 +- ...7411-fe2d4839032c7d1700f5ad488d4dc88f.yaml | 4 +- ...7412-e1c57fbc348dfda4a7e2fa9073819ee6.yaml | 4 +- ...7413-0e52d08abcfaa24832dc556c46587054.yaml | 4 +- ...8942-b2845f73d8f9f13ca71ed2d0d53cc21a.yaml | 4 +- ...8943-29c63f4f8f43d522bbc3e34ee2af25b8.yaml | 4 +- ...9168-42f5857c1a1a9fe3bd07b32288faed9d.yaml | 4 +- ...9567-26f35acb3c0f14eb0fe591953d190a10.yaml | 4 +- ...9568-64248c162e0a07dde805cd870763a3a0.yaml | 4 +- ...9575-899f848126483b240dc44a4870e7bfef.yaml | 4 +- ...9787-21896796785dd6864271e535041a630e.yaml | 4 +- ...9909-a0dbcf6f52eae1325b0e855594e29c09.yaml | 4 +- ...9913-84da1bcb85beb132b593a5fff336db83.yaml | 4 +- ...0195-ac28c6a1f49fbad1719d7e09c0190565.yaml | 4 +- ...0257-69db74f4852004f23d22f9fcc0555117.yaml | 4 +- ...0385-3833fde53c02f881d8b11d577a449782.yaml | 4 +- ...0568-15159729e5663620758ffbfa0eee6068.yaml | 4 +- ...1025-67be7dda8922a0b90c62a801231990f1.yaml | 4 +- ...1026-f3aa50bf420b4235c2de996ef5d37967.yaml | 4 +- ...1030-773aca706a31e2409dfb4bd8f1fa9e33.yaml | 4 +- ...1508-5b689436673a442f720046bb44c5bd16.yaml | 4 +- ...1510-1090bbe0593e4ecda3fb75c3e6d7bf93.yaml | 4 +- ...1512-74e3a5823f9cf5e58e6b984ee0054047.yaml | 4 +- ...1516-dd80fd1aa8e8ecdfc56af18872d295e2.yaml | 4 +- ...1673-a7b9bf475d14b8ef039f5657643818f1.yaml | 4 +- ...1727-8cd31768dc61f0033829ab9bfd911338.yaml | 4 +- ...1731-2e52fc4f7a8504883023eba2284cc957.yaml | 4 +- ...1732-c35f9ed6b93a44d06dd09e34e66b7586.yaml | 4 +- ...1738-84e8025814ede80f77a1696e5326822b.yaml | 12 ++-- ...2074-0088814ed74fd156e9ee132de51ef1d2.yaml | 12 ++-- ...2074-1ebbd9b3a9a4deb3ba553d086f3295e1.yaml | 4 +- ...2075-3ca2d0288841fb102eec504b49f4dc79.yaml | 4 +- ...2076-384cfba7d4e3422564ffd94f08c53230.yaml | 4 +- ...2077-6bf1979859a94fbe33542b88abb0e15d.yaml | 4 +- ...2104-84ddf5342f72d908358cc5325eb7e319.yaml | 4 +- ...2675-a32c5004dd8e3051476b1d2ace4665f9.yaml | 4 +- ...2696-731244d7e48d469d8250ca7d6169422e.yaml | 4 +- ...3126-68b5f15989ca60b284d4dce6601af76b.yaml | 4 +- ...3487-a08c651ad045a182d61e4a734b04e24d.yaml | 4 +- ...3641-8de354ee8a09f1e40abb305d774cf1ed.yaml | 4 +- ...3642-7df5e5754fb5a3c3ef39f58481635571.yaml | 4 +- ...3643-86d73827337d8244a557bb98a9e7b2f5.yaml | 4 +- ...3864-5f7ca58c2ad3d25f19da443baa193352.yaml | 4 +- ...3865-c04510d8ae6604902066b55cfed338f7.yaml | 4 +- ...3892-6844db7940c370d06922bd9c5958a18b.yaml | 4 +- ...4959-63f488767eed871fd699454a474174aa.yaml | 4 +- ...4962-45a46be6bf0ef23f92774359273b99be.yaml | 4 +- ...5020-151a3d01fba73eb2e03af896af5366b4.yaml | 4 +- ...5038-fbe96ae280b99abe5e90ec130aefb23d.yaml | 4 +- ...5364-a1ee8803b42d3b197599b6095f91fefd.yaml | 4 +- ...5535-e6c806cffb708ac14203b6a177746aad.yaml | 4 +- ...5537-eef4fef4e9f3255888f8b403eb0a1916.yaml | 4 +- ...0406-8f2ebff96481ee5356699783e44b68ea.yaml | 4 +- ...0625-3f2e88483cb032a762f3e5f925264d0f.yaml | 4 +- ...0626-fbfa55f46b34cda37b3af16eb142622e.yaml | 4 +- ...0627-57de8ad14c220bdfc73bc2840b43e6e3.yaml | 4 +- ...0628-97711fb53683ab26635f9b3f2754784c.yaml | 4 +- ...0633-c794524768b79fbeacb43dc638d96e23.yaml | 4 +- ...0634-b165aaaa725c1983b238dd197ed1a7e5.yaml | 4 +- ...3762-c2ba29e0e5ecaebf723467e306a8b7e0.yaml | 4 +- ...4145-846117b538ab9ba30f69a12efe0f9e57.yaml | 4 +- ...4315-94d04ee1ef58708b41d6145bfcae5eba.yaml | 4 +- ...4699-285685ddf3c4cea5af33e325a30ef210.yaml | 4 +- ...4948-6be16d4dc7a3396a4e2044185bf46f84.yaml | 4 +- ...5375-ee95b664445938e62cfbf4d8ed5ffe44.yaml | 4 +- ...5378-4aff32f6f1228de170ce7ff458bf1831.yaml | 4 +- ...5379-f904152cc56225725583f8016fc8d925.yaml | 4 +- ...5380-75c0e8fcf83cb7fcc7b1f70f65a50a8b.yaml | 4 +- ...6596-f9bf203df336a8e0915eb488a89feed1.yaml | 4 +- ...6672-a98e82a7c384a33ad5d0d42365168f67.yaml | 4 +- ...7344-16f2bcb5cfa3d079c1a300d23d7f7166.yaml | 4 +- ...7356-6ecc3e1b29dcd6c7c18d4d37331ca11a.yaml | 4 +- ...8038-8d7f0213118d2e7594c423ff47139a2f.yaml | 4 +- ...8649-a2161b786ba8d84bdb2a3d032cd3b972.yaml | 4 +- ...8650-ad1820dedb4cef27ae24befa1b1daeac.yaml | 4 +- ...9171-d66601db34445c53f772431589140096.yaml | 4 +- ...9172-303b76a4a36e60deb08e9b0d0435d79c.yaml | 4 +- ...9303-f9f8b8101f4a39f1a6ed5a0936c6104f.yaml | 4 +- ...5012-83ef28839c75055ae7537f111049194c.yaml | 4 +- ...5037-7961a00c8fec25ebf767309437be3781.yaml | 4 +- ...5135-47b41bc2712a70e4aff6fb8649c1924a.yaml | 4 +- ...5235-d557c696333289ec8d8f662866e89376.yaml | 4 +- ...5489-7f88047eb913450e01c938cb65d8b8a9.yaml | 4 +- ...5748-8269712f8aa3f2f54a5b3b611a3288b4.yaml | 4 +- ...5749-0fc41c225cd6f2ddbf5e247314d75c25.yaml | 4 +- ...5773-4160c9c4da480f4b3c030b1d1b582ea6.yaml | 4 +- ...5932-a0918f22ac918ae4fe62db47bcca205c.yaml | 4 +- ...5934-7d84c9a9ee6bf717c602d3a38e459b86.yaml | 4 +- ...5935-2239ca03e49ffeb792ff8f7c625fd4da.yaml | 4 +- ...5942-c41810e93c0c7c558cec6a9a4900b3a7.yaml | 4 +- ...5943-1c54e12a9145a5f1f1d234c85ecbc8fc.yaml | 4 +- ...5944-03e434d9ea9a280060b3548276610903.yaml | 4 +- ...5945-ec458e7be91893393a96a7bb4f01d557.yaml | 16 ++--- ...5946-a64ce08453bed39084d8a2cea93a9117.yaml | 4 +- ...5950-10a6f997b77b37003eabf2a216fdeced.yaml | 4 +- ...6156-7e2ae7bf2efb6bc23e281ebe6c72a235.yaml | 4 +- ...6170-bcd9ca517989975e14b7cf4813bc0e1b.yaml | 4 +- ...6172-72b80dd4bc94210ab9dd3b1876e438ee.yaml | 4 +- ...6173-7a3eb0e4a2da32f4626463054bad7fe1.yaml | 4 +- ...6174-5f51f32d184bdb8a5475d2d0cf4a68e5.yaml | 4 +- ...6503-b0b49bce1c15ad148a5058e1154b417c.yaml | 4 +- ...6656-74062d3bc6524d681fbfe5faf76c4ab5.yaml | 4 +- ...6666-c1fc6421a52e6ac7d9b0f476667cd29a.yaml | 14 ++--- ...6667-506d872307a475af76e6ae5402a1e474.yaml | 4 +- ...6669-8bb122c471113121afc3ab2c199c2c7d.yaml | 4 +- ...6670-ff2527cc6b81652aecd5a77ac2a8b673.yaml | 4 +- ...6701-28f8218d0cd81907d78e413554e9b440.yaml | 4 +- ...6702-c5f769a2ad53c678c35d169acd9dd76e.yaml | 4 +- ...6703-727d2f92da48e178eefceef10fd279f0.yaml | 4 +- ...6704-547ae69e23e79945ee41118869bf3151.yaml | 4 +- ...6707-473adc971897213907d43bcafc37522c.yaml | 4 +- ...6708-a746469ba08e7ad3eaafd923d2717c92.yaml | 12 ++-- ...6709-f10892c912aef9cf076885d5c4fde1a7.yaml | 4 +- ...6711-51e019b787984ebb59dc9257a3fe25a4.yaml | 4 +- ...6717-171d068f6ec1f7c5f7f36a222d7d8329.yaml | 4 +- ...6721-72ccbc519dc7d87cb6145ad667cfc553.yaml | 12 ++-- ...6722-b1162d19127bf06b82fd09bfd50f373f.yaml | 4 +- ...6725-728e240a198c7c451039858fc71e171c.yaml | 12 ++-- ...6729-6009aafd4759ca9a9de1f0b928158a27.yaml | 4 +- ...4046-3c2c8b06162030c304a3d8608d66a5c9.yaml | 4 +- ...4047-bb9587c8922bec5591eb7af4043b1550.yaml | 4 +- ...5391-2b0533cd6930889b564dac0001232de1.yaml | 4 +- ...5392-74d2043a574ab69cbbb11dda595211e3.yaml | 4 +- ...5530-e049cf9cff2a64ed7bf022044d018fad.yaml | 4 +- ...5579-d6f22dc7688630789d302268152d865d.yaml | 4 +- ...5611-a0f089d6e873fbb7be028eaafb4cd0fc.yaml | 4 +- ...5642-802c4864b87b89e6df06fc16568188de.yaml | 4 +- ...5650-5d5eee8781ce2674b2c2c40cb2fcc273.yaml | 4 +- ...5651-94d6413af5bdd7c5410cee1dbb9ba3ce.yaml | 4 +- ...5766-44e9876427663f96d92e4c3c678955d5.yaml | 4 +- ...5767-880b88155b22c7b6bb28fecc96be5e0e.yaml | 4 +- ...5768-52ad0bdca5afebb4c884c4a9d304e243.yaml | 4 +- ...6010-79a6d64a3a134f3b86c4ab9063f7bbeb.yaml | 4 +- ...6166-6ff8db6967b717d0cf958b73dfda5c1c.yaml | 4 +- ...6167-843fe9a3debf8db188ba99413c342e16.yaml | 4 +- ...6849-8d38cd4f2bf680c2b1b244824fc691f8.yaml | 4 +- ...6850-6125bda092f086c6d166ad135d42c4ef.yaml | 4 +- ...7055-d16f5d5a117e59e23a5a604664dfe044.yaml | 4 +- ...7228-83141551066454cfa3570b7b645030aa.yaml | 4 +- ...7239-a48a527c714ec711ca739eed07091779.yaml | 4 +- ...8417-39bc2edd346e28405d70531e51a8164a.yaml | 4 +- ...8435-5d65a7992972ebe63734d1fdf7ce6dcd.yaml | 4 +- ...8436-f7a999ea17927c5e9ebebc775b43318c.yaml | 4 +- ...8498-4e01c0b287f81a38f8a747fdacd53194.yaml | 4 +- ...8594-0b4ef9eb693a7e87ce6cfca4623c180a.yaml | 4 +- ...8596-07270c625770ea55406700bd4faf8963.yaml | 4 +- ...8615-b4ca6e1dc02a9ba7306fb5b7361185cc.yaml | 4 +- ...8658-edec211af3b7dbc24681331832d822e4.yaml | 4 +- ...8799-bea1167e010c002491bae397468a7fde.yaml | 4 +- ...9003-010a08c8c856a2f4fe4e778e18ce7576.yaml | 4 +- ...9019-52e9c784ee926500b6a7a44692c6aef8.yaml | 4 +- ...9334-493dd00fbad457efffd98380feee37ad.yaml | 4 +- ...9335-9f00578ac1259c4fd1c8b9de9165324f.yaml | 4 +- ...9371-297cb3aa5bbfd9cc7b8af82349a82915.yaml | 4 +- ...9394-a0cf0c70320b9077a478823de4b5e05c.yaml | 4 +- ...9454-eab40a7edf5f2e1a98131d79813fdf48.yaml | 4 +- ...9455-8f8b97c7d5c0b9ba282a6dfa6a5c0131.yaml | 4 +- ...9456-1d190b0241a92bf4c0712f3b939e7393.yaml | 4 +- ...9457-750b74705bdff8d7fe8b29d226f6a7fb.yaml | 4 +- ...9458-4ebf8466ab7647227779ddf8d6ac3494.yaml | 4 +- ...9459-7ec9f64a1c57f6403dfdbff51a32f9cb.yaml | 4 +- ...9514-ce70b843af38d7c69c95be8ff1b26205.yaml | 4 +- ...0652-e5ace19f8910dfb41dd382bdef641807.yaml | 4 +- ...0678-9d10b05b216e9b3725f77f2e756c3bb4.yaml | 4 +- ...0714-5159dc207c489f95e16ee89d4e708b82.yaml | 4 +- ...0746-178d99b6f6579f15b7e84dce26c43816.yaml | 4 +- ...0779-a97999937eba2822f909f308d3c02136.yaml | 4 +- ...0781-388ffda3d201191cb375824a74d92ffc.yaml | 4 +- ...0782-b0e0ed74ea2c963635231dd123335584.yaml | 4 +- ...0792-20fec9c706022c27227f812437225b4b.yaml | 4 +- ...0831-d6eff878d5e751e7448431e370bd1e18.yaml | 4 +- ...0846-1aa0482b62398dab21c7b36e9908a28d.yaml | 4 +- ...0851-99e41ed657ab27362dc617dd94edb65f.yaml | 4 +- ...0865-3a746fc902e2b6559213043452550064.yaml | 10 ++-- ...0866-d907690c5c767a972864a779d8ced723.yaml | 12 ++-- ...0867-db2d8a1251fb5f78024e34146e92e4d0.yaml | 12 ++-- ...3150-c05da70d5ed77ea30636d59ab804aaa2.yaml | 4 +- ...3174-9156a008e8a44bce922b7f9ab6484346.yaml | 4 +- ...3209-c7b7a15003ffbb80a100eb159e64a8bf.yaml | 4 +- ...3227-f8e9e8a25542e313c19a4d2c9a30bf10.yaml | 4 +- ...4123-2a2fe738939a9e67d5cb46ca54ca2af9.yaml | 4 +- ...4125-fa320a52a4bd2b6a6f52aad5ce1ea74d.yaml | 4 +- ...4126-cc4dabd01e1338fc09aa2ef444904587.yaml | 4 +- ...4127-7f32d3ac2f0177d9329a7490c025ed06.yaml | 4 +- ...4128-7cd66621baa98ee6c1094c3629ee5b9c.yaml | 4 +- ...4129-293ee203790c9494dd9271c2d0887ade.yaml | 4 +- ...4130-0680dcfefb929cf836c59db202cd40da.yaml | 4 +- ...4131-4459115a144ee37cdfb4079325938d4b.yaml | 4 +- ...4132-0f314421e3eb6001edc6ef983cf272a2.yaml | 4 +- ...4134-b14574939a93e002a63be522534dc429.yaml | 4 +- ...4135-b3f06bebea4c15ec9085029db00fb9fa.yaml | 4 +- ...4136-f08697abe75fa6ac28d5ec1f1d0bb149.yaml | 4 +- ...4137-73117910b29a1c368fce71745504290c.yaml | 4 +- ...4138-f5d87ece59db37936b3fb9bdb05376cd.yaml | 4 +- ...4140-492664286a6eb9d8fced88f47715604a.yaml | 4 +- ...4142-60796296d5bd5b2c076a796a73e81fc7.yaml | 4 +- ...4143-3129a6f1429e82e60a76e088cdf26794.yaml | 4 +- ...4145-07fde43240c3cfe047c463512be535e6.yaml | 4 +- ...4147-c1b0a376f2ef6bdd72b49e73751ed117.yaml | 4 +- ...4149-4dd145dc4bcaa7b143713cd5ced149a0.yaml | 4 +- ...4151-1184e292a35a8344c32cddb99a8fcb99.yaml | 4 +- ...4153-5e0b93fe3a022a24343b38fe5a2f7283.yaml | 4 +- ...4154-2dfa0b8f134cf415442ecf4c309e85d2.yaml | 4 +- ...4155-892437eb68b329dd17b3be2557272f56.yaml | 4 +- ...4156-ef09ee87048a20a553f4804a48eb6952.yaml | 4 +- ...4157-79fb0bcc374a70f9a1181c9553d664f5.yaml | 4 +- ...4158-175f5f197d39e1751001f35acbaf01df.yaml | 4 +- ...4159-a1fcf6f91e16b2992432e60b1b4c9234.yaml | 4 +- ...4160-dfaadc66129d4ea285875cfb5037ccde.yaml | 4 +- ...4161-7361a0798b6e7d91e3483a810ae46200.yaml | 4 +- ...4162-35d0076e41c66587aa55b1dff00355a9.yaml | 4 +- ...4163-d52a1b2d96a87813163020667b1d0ea9.yaml | 4 +- ...4164-c1844c535b6764f33ccae986eaa4a431.yaml | 4 +- ...4168-7ddd7913775f2842bdb03b5dd83ed7fe.yaml | 4 +- ...4173-a4378f0df660425c1f67e7a182915736.yaml | 4 +- ...4174-e75e8a53a3e5f421e8dff4ebc1472f1b.yaml | 4 +- ...4176-df91ebe73a45ac966511f7792447be75.yaml | 4 +- ...4178-167e61af371a8f35ae376105d3215900.yaml | 4 +- ...4179-f1a649593702eb632f6f553b9ae25e5a.yaml | 4 +- ...4181-982f78919d6ffdbae69689e67e460d30.yaml | 4 +- ...4182-d8208bd4e60d421585f9ef9118f52dc1.yaml | 4 +- ...4183-0f7d324b49374ff1264595834ad272cb.yaml | 4 +- ...4185-b9268ddd3338fe184d978d9f6b4b6b66.yaml | 4 +- ...4186-1a3c55b78621c5a0f1132cb6e90ef267.yaml | 4 +- ...4199-46151945d00d6bf25de490ff58da7c2c.yaml | 4 +- ...4200-19cf3f1ecae01908df4ff2c886d4fa04.yaml | 4 +- ...4201-98c8e6a6d80acb851afcee0bde588eea.yaml | 4 +- ...4202-5721e5b5b859df336ecc013b38726f93.yaml | 4 +- ...4203-5e6768e991caa45e72cc5f93d69cc8a5.yaml | 4 +- ...4204-2f027571e136822dc3132e7a5b6f47eb.yaml | 4 +- ...4205-88f2e8b62006d8f70eead27b7d5c23f7.yaml | 4 +- ...4206-95ed8c023906e2f70f01592d99282d0b.yaml | 4 +- ...4209-fce354233cc8042e718d5365b3a58e08.yaml | 4 +- ...4211-c52e6603b19e1ddbfb9c023a9a70f51b.yaml | 4 +- ...4216-e4cd9a4bbacdbb2aa88bdc0cb49786e1.yaml | 4 +- ...4219-bceae5f53d1ac07f2efbd28988c0d5d9.yaml | 12 ++-- ...4220-09bb804f266b350634cb031ea62ca641.yaml | 10 ++-- ...4221-9fbb2aba0f1c281c62bcad50b683f582.yaml | 4 +- ...4224-1cdb0a1c4888e43e483d5ba8e84b6d9c.yaml | 4 +- ...4228-d2e2b4003ef24e75b8d453ad2f0582ba.yaml | 4 +- ...4229-1e16eec4b6ae009a904a8e7f17b7b28d.yaml | 4 +- ...4230-1d56115c5756336039596f3db2afcf11.yaml | 4 +- ...4231-3ea0fac767d2ae2ce8f2f4784f535988.yaml | 4 +- ...4238-d1bbc50d843df9b465aead854697cdc8.yaml | 4 +- ...4242-78ff72d9346255abccb5396c4cac06cb.yaml | 4 +- ...4243-3ff23277c9ba98ae052e3b9f7bce2ce5.yaml | 4 +- ...4246-295565d6c00c49b75df12a1f75ae3147.yaml | 18 +++--- ...4247-8399de040479bedb6b313106c99e1459.yaml | 4 +- ...4248-70e9f9d703b7871b412f99e0b65bc826.yaml | 4 +- ...4249-3640b3daf83d6cd1e2aa52d4c7a270ac.yaml | 4 +- ...4250-3950561f5b69ad2aadeaa54bf293ca85.yaml | 4 +- ...4252-47d3ad7250426f9e950984c71ba1d1f7.yaml | 4 +- ...4253-f47e6eae64c804173012f23d96ac47f1.yaml | 4 +- ...4254-c719c1fa9d94cb4a4d6e24f4ded47412.yaml | 4 +- ...4255-73185f41beb88e54f54a80787c1d789a.yaml | 4 +- ...4256-76b99567dc5d8693687703220a992b79.yaml | 4 +- ...4257-ca0593eecf48a43d195a057ed533a1b4.yaml | 4 +- ...4258-b5aa1e2113ade8542174b19f6a7b50fe.yaml | 4 +- ...4259-f95a6103756f27e103bcf366ca12c670.yaml | 4 +- ...4260-f08da3e42125c87db99ab45bab5c3734.yaml | 4 +- ...4261-70fc895faebcf1fe7c1137deedd632a4.yaml | 4 +- ...4262-bd64f1f16c4920e8819a833f00007e5e.yaml | 4 +- ...4263-e94aceaf63920aa3eb4b9932eb00b35a.yaml | 4 +- ...4264-257c0e2f02ca2973a1b0fbc7bb05b9d9.yaml | 4 +- ...4265-b6405ae9eaca03d55059021293cdb417.yaml | 4 +- ...4266-3835c81a3b054f8f577b5a29958ca111.yaml | 4 +- ...4267-85a1c6e007a9a1b0879129219d595f5f.yaml | 4 +- ...4268-c3fb6f2c99d4c5f13096c4775a849201.yaml | 4 +- ...4269-85fafc88eba7f097874b28a387304352.yaml | 4 +- ...4270-9e56ce0a564cde270ffad1e5997baa50.yaml | 4 +- ...4271-b3de31ba898622222026a1275ef3dc05.yaml | 4 +- ...4273-dddec61512fe66c6bc2775d423f59680.yaml | 4 +- ...4277-509b534cfaeb00eddb901be35d0a9812.yaml | 4 +- ...4279-981460190387e68d2f348e5da885ce72.yaml | 4 +- ...4280-0446faf7e8a09fe554612052c4885eba.yaml | 4 +- ...4281-7cb2e46e237585083f0f410d32da724a.yaml | 4 +- ...4289-e2053d18b4d79ba0e416f265a7be2f35.yaml | 4 +- ...4290-41bea91ce3336d6adb86e1ea410b9aef.yaml | 4 +- ...4292-bc1bf66d22152db23406f67a4e5cfee9.yaml | 14 ++--- ...4294-295363837d1454c8802423d79b02460d.yaml | 4 +- ...4295-212daaad6857839ca091cc2dcc90e7c8.yaml | 4 +- ...4296-6ed86de0b04577fc056eab4066eb09a3.yaml | 4 +- ...4301-106707c65ee1208d448d3a7f0350d84b.yaml | 4 +- ...4302-dc95c582cdcd23384ad1f3f9c0a3bd57.yaml | 4 +- ...4303-f73561aa7a756a9f3e5287e2a9bf11ee.yaml | 4 +- ...4305-798f3fd97aa989f25f329926174d2a78.yaml | 4 +- ...4307-9c814d5a9ddaae393720aa3fbf301f85.yaml | 4 +- ...4308-93461439abae08e1620c6e9fa8825bb9.yaml | 4 +- ...4309-a7639c71f3241814b9c95f17c5919356.yaml | 4 +- ...4310-c4eb24a39e4ca07448358eb29c4b844d.yaml | 4 +- ...4311-937a14986e699492c9c7f6e0e211e4a4.yaml | 4 +- ...4312-0a730b29011862fa99f3ba28ddcb0a8c.yaml | 4 +- ...4313-93817db5fd5a790f9a8413665f75bc03.yaml | 4 +- ...4315-5b936937c8c0c4c278a2b778b73bea89.yaml | 4 +- ...4317-328e4f3efad73259f1eb9967e17030cd.yaml | 4 +- ...4319-84b15db6be01953ae7e773bc858c3601.yaml | 4 +- ...4322-067d3779b4dc783cbbb0a5aaab128700.yaml | 4 +- ...4323-dd9c5510a5d40b29d6b46c88b274a46a.yaml | 4 +- ...4324-ab1f48347ef68d08de8af611ca6f7153.yaml | 4 +- ...4327-82c66bd49c9670a47844ee08f2e1dfec.yaml | 4 +- ...4328-d5419bc1feddd2eafb9324b9b87684d7.yaml | 4 +- ...4329-578845e46f5e10ee10237d1397f1fce9.yaml | 4 +- ...4330-9051aa7c81fdec9135cd53a28b43a964.yaml | 4 +- ...4331-ed5e303cb61bf4126d5ebc5c9cfb7c58.yaml | 4 +- ...4332-a168ad5542ffc3cded569dbf621954d3.yaml | 4 +- ...4334-4c925e8fe2ce8185ac5a57769f1ea714.yaml | 4 +- ...4336-019716f1cdfed62fc1f8666dedb59747.yaml | 4 +- ...4337-a38e11881f3b1727628c06798dde0846.yaml | 4 +- ...4338-ff2c0144dd3f14c012ac895bb24d6c4c.yaml | 4 +- ...4339-ba3ebdc8660c704b12fdc576b67a35b8.yaml | 4 +- ...4340-cf0e8508a150a92dcb38be8ebc42b5eb.yaml | 4 +- ...4341-cfbef53d87854aaa058c431289304e79.yaml | 4 +- ...4343-8961ac80ff2f49ea02524bf55be03a91.yaml | 4 +- ...4344-8a961b077a643c6dcf8e7dd2b515541b.yaml | 4 +- ...4345-85ac26fe1ed37dc881dfc2a5252c3fa6.yaml | 4 +- ...4347-f424267505cbcf902cf4e60fa01acaf4.yaml | 4 +- ...4348-5f3c1d80f50fc6780cc9be3d160231a8.yaml | 4 +- ...4354-da9748807dbda454b45fa581681ad9a2.yaml | 4 +- ...4355-f2f204b71c27258d8bc3636a9cf0d080.yaml | 4 +- ...4356-92f8dddef0caee0f45322f38c33da40e.yaml | 4 +- ...4357-84b774dce1ed446fe61865bc9717d231.yaml | 4 +- ...4360-d1fe830178bd836f853d2f1e8ea1327c.yaml | 4 +- ...4362-d029a01fd5b93450433108c7576996d9.yaml | 4 +- ...4365-9a1ea12529e15f0a017ce8f0e47401f6.yaml | 14 ++--- ...4366-2cf825b0502a2430e12833bc820c6234.yaml | 14 ++--- ...4367-416feeed72e481e9c6ade025bb1108e9.yaml | 4 +- ...4369-7c4b664dcbab81960496a17b3a66e44c.yaml | 4 +- ...4377-967efd081266df53c7d5c10295955cd0.yaml | 4 +- ...4378-9b6d789ab9054bec8f3668e533e7af06.yaml | 4 +- ...4381-b156b450e510844126aa5b98c430cad1.yaml | 4 +- ...4382-39ab4c2294aa56f29beb5a701f23e19b.yaml | 4 +- ...4383-363421e443d86bf6a03f6199bd5c6045.yaml | 4 +- ...4386-d123d567f469bf81fa1efe0cec4fc6a4.yaml | 4 +- ...4390-32ce162d5a195b7dc3b119d3f49907dd.yaml | 4 +- ...4391-652b592a23d9d8ef3233d28a405d4909.yaml | 4 +- ...4392-3e4694078ceef16f755ef9eb324edfcb.yaml | 4 +- ...4393-8912ce3f5c5896ec3ae73a9aecfa4081.yaml | 4 +- ...4394-6fbfd79bf661b65b2359132741b885f3.yaml | 4 +- ...4395-d936ad16c92f96a8d361e8354b08642f.yaml | 4 +- ...4396-3c35d6ca8d97eaaa9d359ed4e523fe3c.yaml | 4 +- ...4397-f8764dadc75611aef7a1572c7ab006f8.yaml | 4 +- ...4398-6368f485fdfbfa4bcc6e9fc96c77a440.yaml | 4 +- ...4399-ca1b64ffb0ccae02fca2d23bb2d6ec12.yaml | 4 +- ...4400-426286a65b9c6cb22be8026fc66ac3eb.yaml | 4 +- ...4401-4e4e50f7a420b0e140281c805ef6a928.yaml | 4 +- ...4402-f4d44f135652b4f97e23ce29c089eca6.yaml | 4 +- ...4403-7d9cfe7c7d057a8bbf5fcb3c72a54c2b.yaml | 4 +- ...4404-4e8e6308af14cc738d0cb86b4562e1c4.yaml | 4 +- ...4405-217c5fbd6c523ea432120eff4f82682f.yaml | 4 +- ...4408-8edd86c32f445ba8a5cfcf66f80c6f54.yaml | 4 +- ...4410-10fa074ce14cd8aff4840b1abbaf6c83.yaml | 4 +- ...4412-8c8ea74da9222b97df27e5eb58a8262e.yaml | 4 +- ...4413-376e635d9c344dbb946b8ae2b1699cff.yaml | 4 +- ...4414-3976419442f6726cc8fee397bc7f22ee.yaml | 4 +- ...4415-62d375a0ef3c9366ba6ad68911a5c603.yaml | 4 +- ...4416-fe66522b1a62142749b36d39c6b2760b.yaml | 4 +- ...4418-c1380d1b7ef910c0603f14abaf611a7b.yaml | 4 +- ...4420-9285c0881d2d0d11de4e3b3a24768c84.yaml | 4 +- ...4421-b6b5ac51737dc25240c45d0d6e3809e0.yaml | 4 +- ...4423-f1749872ec46f0f647fe9218c75359fd.yaml | 4 +- ...4424-dc229c244bcfffc7d06d63944e8371c4.yaml | 4 +- ...4425-49cfc8c3d99725c4ecb38a0e0b05420f.yaml | 4 +- ...4427-6cc6a3d6d739a61d420343f25551dbad.yaml | 4 +- ...4428-6c5c77255a84fb41b6fdd26d0fd10783.yaml | 4 +- ...4429-826b0e6fc8bdc77439da0a867a102476.yaml | 4 +- ...4430-076ba2e4af7ca8a46ce67983592fc4f6.yaml | 4 +- ...4433-dad17a0f7cc6bf4dce65968822857b48.yaml | 4 +- ...4435-480067fff73f218a897f527d009097f5.yaml | 10 ++-- ...4439-e8da5022574661b62f1a47c50584d384.yaml | 4 +- ...4440-df5624fcfc60e06a94f15a6af052be53.yaml | 4 +- ...4441-56fc7e10ac8b22881c3f0ca008407e33.yaml | 4 +- ...4443-8b9fbd031d6f59226821b7faa24713d4.yaml | 4 +- ...4444-9af4513a0f46be16e18750162e487d0e.yaml | 4 +- ...4445-e422a5cf5dae135dafe01672b0f3ffbc.yaml | 4 +- ...4447-fdc1c524e165c5f1685c267f450ebcb9.yaml | 4 +- ...4448-5015ecbd471db4975c3b73948587d93d.yaml | 4 +- ...4450-7433993cea900124b0f7230cf232b44d.yaml | 4 +- ...4451-b68fe278807d5bbe8b9f9515e0348d4e.yaml | 4 +- ...4452-3b7846f9454db2dd18a15d1689f18426.yaml | 4 +- ...4453-7df4ba3c146c5caf3d402ff70333f208.yaml | 4 +- ...4454-cb10630ddc7da513be3fbc863f316ce2.yaml | 4 +- ...4455-805b776aa99780dfe83d45b24c67ce87.yaml | 4 +- ...4456-a72cf1044ce793e721c265e19c02178a.yaml | 4 +- ...4457-d3ba4c3e62ed9f2cd7ab1df9d9c7321d.yaml | 4 +- ...4458-8198c675532e8f307d66f6e19540bf63.yaml | 4 +- ...4459-72fdd3a89359bcd594b4d65638469ed8.yaml | 4 +- ...4460-c5dca15da955e97b5160cc77880cc971.yaml | 4 +- ...4461-050ac633edcdd8103878bb1a391274ca.yaml | 4 +- ...4462-2e53d704a68a2528570d9bc04622f7a7.yaml | 4 +- ...4463-46069454c6ba944e642bfecf69aa0fc3.yaml | 4 +- ...4464-2b8463e6867dce79ddd40af4dd9780fd.yaml | 4 +- ...4465-db3802f450d9e0fa899a4b52caf267f5.yaml | 4 +- ...4466-6172c422eaf36f3edbfde89320e25329.yaml | 4 +- ...4468-e97645e174e90e9260a0b981384daa6e.yaml | 4 +- ...4470-57f13a889e0cffca9cc00946f63d375b.yaml | 4 +- ...4471-315a019742ffab737ef11e333f6ddf51.yaml | 4 +- ...4472-3a52346bbe93c0a607f0387208360f6f.yaml | 16 ++--- ...4473-28ec3275d51e7b8c31fce132b1bffc74.yaml | 4 +- ...4476-ba89c7968306258a1d45a93c7b938ec5.yaml | 4 +- ...4478-0e3f0bd6a580d466d037adb8757f5f4f.yaml | 4 +- ...4479-ae76e34d6e644abc4667be59d0e2e0dc.yaml | 4 +- ...4480-895b9710054cceeb59eef3658e032c99.yaml | 4 +- ...4481-3bc0607c56016206aa45fc2de8e660d1.yaml | 4 +- ...4482-83b73a058cb79d602447680b268132d1.yaml | 4 +- ...4483-18f92d3237c36d8e0be4fe5c61fd453f.yaml | 4 +- ...4484-40c9df59c7e3df119c2dd5f1035b5b7e.yaml | 4 +- ...4485-1e506d7d0a79883a044afbbb48ac382a.yaml | 4 +- ...4486-84af63ce54f1aff066c5cbc0224ece1e.yaml | 4 +- ...4489-d660fb4211ca4d5aa389748791b62abb.yaml | 4 +- ...4490-20b7ddc5d1ffcbeda215596162f60f8b.yaml | 4 +- ...4491-beab7dee3648c51c868a41f9c4244298.yaml | 4 +- ...4492-87c27569f8277885aabdf5403aebae34.yaml | 4 +- ...4494-e6c4489ab4760cc2610080b31e1c8d78.yaml | 4 +- ...4497-26c15735f9b04a66bec91df3a0d7b981.yaml | 4 +- ...4500-c1a5d94e24ff3bf97db23d2e01bc94ca.yaml | 4 +- ...4502-cf16a38393f700cdb2be76a3ca5de2f2.yaml | 4 +- ...4503-77fadf9a7971f3244b33864c9a81256e.yaml | 4 +- ...4504-ad546711ae594c4c52f6942c35b5d00b.yaml | 4 +- ...4505-12ca01b6bd94ae75bcfa758e16b20678.yaml | 4 +- ...4506-4fef6f3c1b2c07adc38d4a7abbb8304a.yaml | 4 +- ...4508-4c7bbe6117155e4a798748fa2ed8fb9c.yaml | 4 +- ...4509-d058005189aafe6324b373d8ff03e3df.yaml | 4 +- ...4511-4e655e8637363048266492f0b32a6610.yaml | 4 +- ...4512-5db7f2428ab16ac575d716a8cfad3c32.yaml | 4 +- ...4513-2d5c4c1875b8b7afff532ee362cb19b6.yaml | 4 +- ...4514-4c347b72fa44728662f7bf8d25a3a220.yaml | 4 +- ...4515-9226076d86703169a8ae6d270bd5adc3.yaml | 4 +- ...4516-b3f5b694f8149f7215285f5a07a42c03.yaml | 4 +- ...4517-aaa45d66679ac35ae0d003ff8a8e5f48.yaml | 4 +- ...4518-994b2a0046a121a24de62a7ef6f747b0.yaml | 4 +- ...4519-8e0a508178120443600d129a2e7dbdba.yaml | 4 +- ...4520-3f8c7e452acf0c92c2be04758743dd87.yaml | 4 +- ...4521-fe8e75c60168f65685f1418c9d95c3e6.yaml | 4 +- ...4523-1924e010841990f8a5472d7ce0d4475a.yaml | 4 +- ...4524-b9cdb37818419e5c667c4243ff011f5d.yaml | 4 +- ...4525-49026b84d0c7a958dfce935cb3d41d0b.yaml | 4 +- ...4526-2420cc8c52f0171d8c5b49b0e53cd69a.yaml | 4 +- ...4528-e7db547069bdcddc296155dd435cd330.yaml | 4 +- ...4529-be71c57d44785349cf4b236716cff6b0.yaml | 4 +- ...4530-7358f712002614260dfd68c7ec8f6f4a.yaml | 4 +- ...4531-8a3943e3e4b63a520dbb0168b24f856a.yaml | 4 +- ...4533-488c9d125819772b803e742156124a9a.yaml | 4 +- ...4534-86d1730d65ed535523c7e0c21cf9f29e.yaml | 4 +- ...4535-4241318cd929615a02a622c5e7416212.yaml | 4 +- ...4538-538fbd9fdeb83d5c5aab2ed683914a16.yaml | 4 +- ...4539-c725a8bb61c1af435931beba79cf59e0.yaml | 4 +- ...4540-da919374ddf5731e45e304b65e085880.yaml | 4 +- ...4541-4fd129ac95b2130cc2038525d8a627da.yaml | 4 +- ...4543-4ce88d432edfef73000dd57a527803fa.yaml | 4 +- ...4544-c70486d9239c270e7b09b18c9bd29bfc.yaml | 4 +- ...4545-752b08f32f0cfee54f18be53421a36cb.yaml | 4 +- ...4546-3b363f50f63e2252e93a4eaf65f7fc9e.yaml | 4 +- ...4547-fe19c96913ad86b413d30430f8f6dd54.yaml | 4 +- ...4548-a4f62ab934de0d3b7e3d119485cf9183.yaml | 4 +- ...4549-66b82cf9b546b0dbf96942572438d94e.yaml | 4 +- ...4550-47bfe206cfaf86d87b1c99f3c44195fd.yaml | 4 +- ...4552-d3d0ad8926aafa9beab7b5840f982076.yaml | 4 +- ...4553-85e4c9b56c88bebde438fcf37c31b92a.yaml | 4 +- ...4554-0b2d1a45be009b6e70cf642e2a8cf8b0.yaml | 4 +- ...4555-93b21f556464132da5e236e1e43ab9a3.yaml | 4 +- ...4556-59026d3a8bc5d6798f6f8303efbe2f34.yaml | 4 +- ...4557-c02cfcdd0ba606abb55e36d23c78177d.yaml | 4 +- ...4559-1954398156051d3ad0f2e33b45b08e3a.yaml | 4 +- ...4561-604205ec49f025926385a1b0eaceae3d.yaml | 4 +- ...4563-968d2b25d7330f5b3338dbe58174f4a6.yaml | 4 +- ...4564-357b47caf5db9e0098a5f7a1e50f8dc7.yaml | 4 +- ...4565-14d0e5668206cef97d18962e8ae7b83f.yaml | 4 +- ...4566-ddc4061947d45933e373a65e6831e3d2.yaml | 4 +- ...4567-79a115d0225d5e6109d2bfb5d804fc26.yaml | 4 +- ...4568-6b33e64acf4e555f0136d2c33ebedb80.yaml | 4 +- ...4569-f08aff12bfc66296ae4f842e638dd13b.yaml | 4 +- ...4571-eea7979a3adae6620386ae2fd9256411.yaml | 4 +- ...4572-96fff1abfd750f8db5e7b15f8178a35a.yaml | 4 +- ...4574-cc890ca86d59bec43888764af28bac9a.yaml | 4 +- ...4575-f6bb81d744ef9464f6fccc27a671bc84.yaml | 4 +- ...4576-3253e2e7de1175aa67f3d6d5696567c5.yaml | 4 +- ...4577-604cc742b0731a1b0e3b91222daa2367.yaml | 4 +- ...4580-58b47ebea36b65f50bab513dec8fd081.yaml | 4 +- ...4581-2eb580b3f81928dc01b4da13b3317526.yaml | 4 +- ...4582-eae5f7c2210c1cdf959e29a045115865.yaml | 4 +- ...4586-178341479b86e6771bea046e08788d1c.yaml | 4 +- ...4587-ab94523f6e880edfade4cc9deca8c597.yaml | 4 +- ...4588-d6a49c02628ddcb69bd8644362723660.yaml | 4 +- ...4590-0f75bb052c76ac287df6a3cedb6cbaf7.yaml | 4 +- ...4591-bfb136ecd8a5fcaea8f121127bb1d532.yaml | 4 +- ...4592-9903b310d82da078ab37bcb7e6aa7858.yaml | 4 +- ...4593-b0f7eacb55c0790170a8a4009593c548.yaml | 4 +- ...4594-b8c86f67e83059075ac727a634aa1bcf.yaml | 4 +- ...4596-0b4cf00934e898c124e66c8a24ee9c38.yaml | 4 +- ...4597-43a1e8131c5398f64ddb0148cb86b0fc.yaml | 4 +- ...4598-cc8d3237ec9d31d7a17e75a3773f4b59.yaml | 4 +- ...4600-0b351fbbceddd3af3b8762c10e45e612.yaml | 4 +- ...4601-88bd79040ab3368b09f14c252d140de8.yaml | 4 +- ...4603-1d382a2cbfe1692803bdc9f5974b02e1.yaml | 4 +- ...4604-1fa01304932da158500562eabc5ce5d0.yaml | 4 +- ...4606-3850f9fd40f943ca2e9ea3445b1f1e23.yaml | 4 +- ...4607-dcf3d519c235997890c41f1336f203e6.yaml | 4 +- ...4608-08ccf69c17927ada744879c1923c390b.yaml | 4 +- ...4609-85d2798dcbad09cd3df8222f6cc3a39d.yaml | 4 +- ...4610-1bcc8deaed7a36dfed3699cc2606446d.yaml | 4 +- ...4611-ff335b153bdda68f2c4ef086e30eeef7.yaml | 4 +- ...4612-4c5051d5f52547e43ba1e2683a220c8c.yaml | 4 +- ...4613-71955a966b82cf2219c81131b80c408e.yaml | 4 +- ...4614-edbb23e6d1dd3c6d3b98a72a827de16d.yaml | 4 +- ...4615-bcff2870cae12c5758ea4c72282891f6.yaml | 4 +- ...4616-ae230608473cfc56a303443ba2385f1d.yaml | 4 +- ...4618-737595c2ea3449d9afc6f182f87c2e0c.yaml | 4 +- ...4619-186c3d28d4f62e262c488a190cb41115.yaml | 4 +- ...4620-b9227c21bfafb1eba2c9f59a2176e5a7.yaml | 4 +- ...4621-863ed304215cd2e175d9703d88e6083d.yaml | 4 +- ...4622-2335d22fc63434a5bcaa426b8fe660ca.yaml | 4 +- ...4623-8cc533b05aae8f8735d3033cbbcc92b8.yaml | 4 +- ...4625-ba6ce63fd5cf470afef6a6aae7117079.yaml | 4 +- ...4626-6e87e05f951d4532dd6f6de3b88ad77d.yaml | 4 +- ...4627-7e1dd5ec2f3ce921814a97005e4bdef0.yaml | 4 +- ...4628-14d5ec39f3f717cd0febca936a2aa6ce.yaml | 4 +- ...4629-c5997f1fef9873598e392fd29a23db70.yaml | 4 +- ...4630-13e0cdd00039aa83908edb26fc9e840c.yaml | 4 +- ...4631-87cd3b8d44051ebe8fa42c56e4d1cbb3.yaml | 4 +- ...4633-c70d49119f4b9f186615bc657f763711.yaml | 4 +- ...4634-6fb42790ec406c67546f572fbaa70d56.yaml | 4 +- ...4636-6bab7e18a95398e2980bac2c1ae0a9ae.yaml | 4 +- ...4637-97a8bbca52a057b5fde67edd446b89ce.yaml | 4 +- ...4640-6a7d0f10989c55df0c2d186c1333c6d5.yaml | 4 +- ...4641-fe4c9ec6c5f12eda6f85dea0f4ee153f.yaml | 4 +- ...4642-62e4e20027880ffdd76d60900f6cc1c9.yaml | 4 +- ...4643-5b50465ae2f78659823d6ff4bd2ffc8a.yaml | 4 +- ...4644-a060d1379e872ddbb3c1744a92296936.yaml | 4 +- ...4645-97d71a5a3da44a42d764845b5a062c1f.yaml | 4 +- ...4646-792631ba5cdfc566598ea26dfe895270.yaml | 4 +- ...4647-555fd231d361b91b6b7b333e844c48cf.yaml | 4 +- ...4651-c07bb721e301a0dbb891c103a2081934.yaml | 4 +- ...4653-13b25bc0903a03574dd9d52d17a8d7fb.yaml | 4 +- ...4654-5acef1bfe4bd1454c852e9b74429a91a.yaml | 4 +- ...4656-12ff7814319c3fed879573cad73d612b.yaml | 4 +- ...4657-1c092eb4ba33ccf4bb9feb95671821cb.yaml | 4 +- ...4658-bd06eea54f94d4f00b121a93f672de21.yaml | 4 +- ...4659-d5a9675642b3846bb1039f5b8393297a.yaml | 4 +- ...4660-d9d7cdc24ee2887d8625dc92279b0527.yaml | 4 +- ...4662-4860564c39627d424628b36fd20f6fbc.yaml | 4 +- ...4663-9d4cfba6200e394cef32d487f65ab9e2.yaml | 4 +- ...4664-b9006062d746b8caf6ca2e15e2892f35.yaml | 4 +- ...4665-f81f2c3fb0fd545df0470702817f5fe2.yaml | 4 +- ...4667-11813679c9659f7e86b27269316b1760.yaml | 4 +- ...4669-ccaa11bd28c41ea215a8627a09fdb85f.yaml | 4 +- ...4670-d3f53759db6cbb2a0f47408beaf6dbd0.yaml | 4 +- ...4671-efba52660b6ae40494c76473deb3b9d9.yaml | 4 +- ...4672-2eb3196d201c69c1b619f7192e23dfa3.yaml | 4 +- ...4673-b36315e23ade129c61fb07a902fc54b7.yaml | 4 +- ...4678-6bc3c65cb1ca8d7f84584a1599bace9a.yaml | 4 +- ...4680-f6c6555824d98b71401c19c502cb055d.yaml | 4 +- ...4681-d66fba0caf4197da913cda06e8bae43e.yaml | 4 +- ...4682-02f969afa585249fd7cbd8abedb25b46.yaml | 4 +- ...4683-f85537b61e94963bbc9d5c86e5b9998c.yaml | 4 +- ...4684-b4f2d824d6b4e83932e04d871f8fc11c.yaml | 4 +- ...4686-4cdd67f3f418a30581118cbbb5c2e501.yaml | 4 +- ...4687-075f9c166c068dd8df28c57bf8d8a51a.yaml | 4 +- ...4688-dc42737b07ffe9283fc25fc1965481dd.yaml | 4 +- ...4689-59cabb7b5299e919e0e9798126655ebf.yaml | 4 +- ...4690-4a26e6944326e51fbc6f1bb093dd580e.yaml | 4 +- ...4691-91489b941b180b4987354a4aee0df6e3.yaml | 4 +- ...4693-5017a561b2bec42e777a79d3e7f73798.yaml | 4 +- ...4694-59401ea9ce38d0433cad6f039547d860.yaml | 4 +- ...4696-9b6bff957c02c5adaec64684fd5bd810.yaml | 4 +- ...4699-91ba8b6ec0e7e434577621e62a4faeec.yaml | 4 +- ...4700-ee384374dcb64224451204e7db1b00fc.yaml | 4 +- ...4701-8979f6505c90c68150042fb786bf639e.yaml | 4 +- ...4702-7716b5ad1739bacc35b966f53febea57.yaml | 4 +- ...4704-cb748c9c9efa655b709ed263bb18ce58.yaml | 4 +- ...4705-3484031578b48515a252a1136c0592de.yaml | 4 +- ...4706-28d16d6b1cef547447e4d705dcc2a1cb.yaml | 4 +- ...4707-a63938534e67d796e6484c84d1211d1e.yaml | 4 +- ...4708-1ab755d3e95de25c386caeb2d042c3d1.yaml | 4 +- ...4709-fa8d9c6fc1b3f748c9c03e858b8946b9.yaml | 4 +- ...4710-92919ce0eb17b0cea216462cfde732e2.yaml | 4 +- ...4712-93e983f709a0a8202ff094d785febb7b.yaml | 4 +- ...4713-d10884d848b4b49b542895ed8b750487.yaml | 14 ++--- ...4714-490b87f43f2fe349a60db708b8fdfe27.yaml | 4 +- ...4716-b99ab0aa7e8eaa169d59d870ba15e44f.yaml | 4 +- ...4718-021b10291895f49c72c52c95a60965eb.yaml | 4 +- ...4720-10faa8f7dbe39946fc1591dc4a29cfc1.yaml | 4 +- ...4721-8187837c8e502d478100e3984ca296fb.yaml | 4 +- ...4723-0b686c4cb6f413d46dafa7ed933109c6.yaml | 4 +- ...4724-953e4421c93547e97fe8ff565f4ade18.yaml | 4 +- ...4726-bac170dcd3835d8bbf7c00e58b6af261.yaml | 4 +- ...4727-a56a10763fef9c6c1ee5edbd42a68314.yaml | 4 +- ...4728-cce20befda4e7caf1b066f754d7a6624.yaml | 4 +- ...4729-5de20b622f7b3426c6426e4d509bd26e.yaml | 4 +- ...4732-f6e79c74546c68ce5cae314ffc286a54.yaml | 4 +- ...4733-477f1ad4dc386cbc51b27ed2633fd23f.yaml | 4 +- ...4734-bd35c1f22ebbbba8b36bd6df988b805a.yaml | 4 +- ...4736-b62cd969ddcf5b8e9b0c69558a4a4184.yaml | 4 +- ...4737-0bc93e8d9149869cc1871c88dbbfb381.yaml | 4 +- ...4738-426067a3112463f4371753090e35be9b.yaml | 4 +- ...4740-a9f74f94f7fdfe42f50099f4c0f55e53.yaml | 4 +- ...4743-e54fc04abf0b5b0662339153e1522a1e.yaml | 4 +- ...4744-14cc2ff52c2662c5bebf9121075ccf4f.yaml | 4 +- ...4745-0b3e32c5343e2d92c6dd937071e516b1.yaml | 4 +- ...4747-cc60724a02e2069155463638fe585163.yaml | 4 +- ...4748-6ebfe44ebffa047243d43e4d8e8b6f78.yaml | 4 +- ...4750-8bca0401c2687aab215b4ddd44231c26.yaml | 4 +- ...4751-207f8d3483b6bc918c2a6bbcc21fd35b.yaml | 4 +- ...4752-1ebcfb0d802f2876f9cb0982be3e0fd0.yaml | 14 ++--- ...4753-b5ff51b3c591b9026f1ed0c5c634aabc.yaml | 4 +- ...4754-b48bd5a9b387deec2652bf65a2f60d36.yaml | 4 +- ...4755-a4073afeed9945d540c4483af566c48e.yaml | 4 +- ...4756-a51f4e9f249cf27f338341ad1f220702.yaml | 4 +- ...4758-ed713a06b3f7e4b3455b2dcdb9972457.yaml | 4 +- ...4759-732f3abc36bb4bb116e7c8687f86e2aa.yaml | 4 +- ...4760-a843323be037daf5f3b8528ace16935d.yaml | 4 +- ...4761-4c143b0897524c6ae94ca24b5d894e6a.yaml | 4 +- ...4763-a8d322ee7f2a3aae906b690c8d232e76.yaml | 4 +- ...4768-c9743e9890778c464db472a56cb6fc0e.yaml | 4 +- ...4769-e32cc6e85c9fbac88c9c7b48d1277259.yaml | 4 +- ...4770-bcf6a8a116341bcac1e69fe2f154a5e2.yaml | 4 +- ...4771-2a97538728d15bbfb55e66c4649885a4.yaml | 4 +- ...4772-439ba91c06350a9c8bb984e5dff1a4a4.yaml | 4 +- ...4773-bc9258a94f7c2dba9bd7d9f332571167.yaml | 4 +- ...4774-88a3c1a86120c49f8c7acdd40fc0ba9b.yaml | 4 +- ...4777-e36d961a443fc07bfdc5e0b939b3e6e6.yaml | 4 +- ...4778-1ff709162f10c9c6eac55480ea55c5a7.yaml | 4 +- ...4782-4ccd73756d3ff800ac0459f5347027d3.yaml | 4 +- ...4785-a9ade0513aa1dccbdad4ffd99dcceb42.yaml | 4 +- ...4786-ee37641121dd5ca3e58a921bd679af5c.yaml | 4 +- ...4787-f12b94e3ed29f6a01de55ac0eaeeefde.yaml | 4 +- ...4788-5fc1378196caf660cea9b35242972f9a.yaml | 4 +- ...4789-49a588fa69586f2484ce1bba5358bbd9.yaml | 4 +- ...4791-4e85b966f722637fb8ba38d8dce7367a.yaml | 4 +- ...4793-ce2aa47cca210105b9ad928ad1c57540.yaml | 4 +- ...4794-1f71cd156c1c7a7919178911b00bc151.yaml | 4 +- ...4796-77e642ff24948f5be818c3b7338e42ce.yaml | 4 +- ...4800-076d6aabf5652856b3ecd43b1d4071c7.yaml | 4 +- ...4803-ed27c4cd836ec804d97b971161525852.yaml | 4 +- ...4804-3ada0767be249ce4ccbdfd9339b2ad7e.yaml | 4 +- ...4807-c1a62af10487c310f7866304f28fe56c.yaml | 4 +- ...4809-aa4a0e71714152916ddf88945c46dfa0.yaml | 4 +- ...4810-b1c130064cba38fde3b249c93cb244d8.yaml | 4 +- ...4811-2bd96fa6fc397c3dffcc3e90ed6550f2.yaml | 4 +- ...4812-7f5e21acda03d1d7fde69a880719d61b.yaml | 4 +- ...4813-a5068346d1e00e358b18b96ff80d8028.yaml | 4 +- ...4815-89760f3ab457772708d08bbbb7ce1092.yaml | 4 +- ...4817-a8cfb826ae3cd1e60648ab483d0a35aa.yaml | 4 +- ...4819-4f011bf5e0985256ce0dc243eb8712f9.yaml | 4 +- ...4820-f3802a1bd27cc43cf9c93101d4cbaed4.yaml | 4 +- ...4821-a663013695ba225f715bd4ecd0b647ba.yaml | 4 +- ...4822-17f69747f5418f0c498184d7a40cd5d8.yaml | 4 +- ...4823-2a20c012892057123c0688f9b3a4ff38.yaml | 4 +- ...4825-ef34cbe0110e2c6603d8d105d71a9566.yaml | 4 +- ...4826-2c26192ebe7847230519e6e8ccb48b5f.yaml | 4 +- ...4828-f33817d1f67c73c0784fb9213086394b.yaml | 4 +- ...4829-4fea783b4afcd4b123f2e73a82fb91f6.yaml | 4 +- ...4830-86962de7248a9bc1e25d4d3ee2951f2c.yaml | 4 +- ...4832-0da88a23adab8991ac9273c6a18e2665.yaml | 4 +- ...4833-2209fd73f482335c124e2a704dbac383.yaml | 4 +- ...4834-0779481b7f80c0411ff97013b26aee05.yaml | 4 +- ...4835-21c7f53627abc5f5c7e2ab4c4c0be8ef.yaml | 4 +- ...4837-d2daaa3d964f6f32895fca6e21e6cab6.yaml | 4 +- ...4840-301d4c247a680f6ce86b39ab492df068.yaml | 4 +- ...4841-7344a2ea198088e725e4c36ccf66d66c.yaml | 4 +- ...4845-300fd59e3797ac35e26fb3e33490ca99.yaml | 4 +- ...4846-7561b8c1f99227b7381d59264fa6815d.yaml | 4 +- ...4847-81580e623be1bd11eb139b9bedb99985.yaml | 4 +- ...4848-66ac5cf55cb601e1e04c93898023eadb.yaml | 4 +- ...4850-888c0d96bb5c45a5559094f92be9b42d.yaml | 4 +- ...4854-c050d4c8a8366a715e53188fca3792c1.yaml | 4 +- ...4855-68e029abe789ad7c1ac8726ecdc73f1e.yaml | 4 +- ...4856-13647ac0f5697b4e3d7374c8bbd8f571.yaml | 4 +- ...4858-11d8ae615e422011cdb2e654cf3c2a37.yaml | 4 +- ...4860-a6117f5c5b129c85596c75822f81da17.yaml | 4 +- ...4861-498d9280bb627df5ee0fc3435bab6bb8.yaml | 4 +- ...4862-1ae4dd533f16291d906e419f9b6a90b5.yaml | 4 +- ...4864-0ad53ed111e4c9bd0fa768a28b64118e.yaml | 4 +- ...4865-386512462e991dca6695af0141e48ca0.yaml | 4 +- ...4866-f5497363e91c49e85823434d8464dab9.yaml | 4 +- ...4869-a984dcb982c3439de2d89b2a845332c4.yaml | 4 +- ...4870-c21f1786e3abdb7c657091d8024583d5.yaml | 4 +- ...4871-a48251c3741e5bdda10cc3847e3d84b2.yaml | 4 +- ...4877-f00ee035f691e855432693cfeab4496d.yaml | 4 +- ...4880-b305b8b934fd913e3c8bf40e033b8b8e.yaml | 4 +- ...4882-173ff175ba6504a9e007b9120074cdb1.yaml | 4 +- ...4883-d4b97461c23d3e553d4dc5a4ed959427.yaml | 4 +- ...4884-437b9be662132aed2b43b674efcda98c.yaml | 4 +- ...4888-680976f321c5a9425e00ce5d5ee1cc42.yaml | 4 +- ...4889-8af21f8f0c6e953daf8df61c5c7a078e.yaml | 4 +- ...4891-e1d6d92659e9b697c29f278d3aacc568.yaml | 4 +- ...4895-a97afd1d52e8ec7c0950d3b4bfa966dc.yaml | 4 +- ...4896-b4c4ff584d962e0bfb58568b73a5ecd3.yaml | 4 +- ...4897-e650ec648b3137d2000a4e41f6b87363.yaml | 4 +- ...4898-3f51c790e689dcb447adc1ee79fee545.yaml | 4 +- ...4899-5a607f07c740543865789590cbca6639.yaml | 4 +- ...4900-406776aa8100e59355ccb6cf6b38aab0.yaml | 4 +- ...4901-cb74790ba4bbb7de85dca1c3cb33c74c.yaml | 4 +- ...4902-2dfca9afbcd5108da5d0b371a8c3da93.yaml | 4 +- ...4903-eca8e288e4dc717ec25c774372f69b42.yaml | 4 +- ...4904-51d2a215a7382b06f6f66c19158d7560.yaml | 4 +- ...4905-0ac820af26b82917a9384c67560e13a6.yaml | 4 +- ...4911-d8f6d24ae9aefabd89bc3732379fc08a.yaml | 4 +- ...4912-99547d0fc21ffda2676b791122585c77.yaml | 4 +- ...4918-da6dd99d1493b082c05d60ab888f9ef0.yaml | 4 +- ...4919-38cfa7354fceb66defa5b11a8b1426c0.yaml | 4 +- ...4920-d0adb6ab141d87bc7e2689c3386228f9.yaml | 4 +- ...4922-45d861039b945e03d43af50c9dafa301.yaml | 4 +- ...4928-b1810213664dbc480df9bda4d5950322.yaml | 4 +- ...4930-9ae477d5648cc901734eab0eec621bd2.yaml | 4 +- ...4936-388ae826ccb91352f7d4e90d33114225.yaml | 4 +- ...4942-15bf765de2821299511e8bf3105d6965.yaml | 4 +- ...4944-c65dc1c886e5406e004d2361f156725f.yaml | 4 +- ...4950-f70ed327fff0a742246ce2b66447d100.yaml | 4 +- ...4951-12b3926da3c13269ad9e1faadb8734ac.yaml | 4 +- ...4952-88bf9af12ef5e38595f378ad9f2dcf87.yaml | 4 +- ...4958-30f045a25a21ac539fd3f995d744abbd.yaml | 4 +- ...4959-f523c60311785f4d77bdd4f2724550c9.yaml | 4 +- ...4960-1ea0fe6e846ccbee16701a333d122fbe.yaml | 4 +- ...4961-3384b3561233822afc35f30b762beb0e.yaml | 4 +- ...4962-7723e642214a4cc19dd0a90f922c5611.yaml | 12 ++-- ...4964-5f623b9be5a2d2349866b91146be2f95.yaml | 4 +- ...4965-2357694d03c405e4b8e1df1be34f5e9f.yaml | 4 +- ...4968-deca81735cc88aee9510bee96ebea3f5.yaml | 4 +- ...4969-cf4fa8f0c990098bbe171db8d667a080.yaml | 4 +- ...4970-cae2253667a3a6e475a01cd76266d7d9.yaml | 4 +- ...4971-56eaa7b8dc455f22f829544599237693.yaml | 4 +- ...4972-e7103d15c56bf4b3a7eff2cebe3d9729.yaml | 4 +- ...4974-e33771324145cc65657e7a62ea2644b5.yaml | 4 +- ...4975-0a3b3d0ea7c2929f39d0e12eda2eee2b.yaml | 4 +- ...4981-133afc4fd6bf43efcd46913bc74537a5.yaml | 4 +- ...4986-cf1bd6ff01752966d1624646c80166a0.yaml | 4 +- ...4988-b26100fb2d07199c87c48d6d1e20e10e.yaml | 4 +- ...4992-456677c70a49bc1c088cafa5c6ef9da9.yaml | 4 +- ...4994-0bef183926021b3705ecb7e440cd2280.yaml | 4 +- ...4995-fb9f6e5f6b739b217a3c9294b96be3ec.yaml | 4 +- ...5002-6007b8b9442eb6013d2d90e94b8a6f90.yaml | 4 +- ...5004-0ca7c41649d0f082ad6681a5a0217ff7.yaml | 4 +- ...5005-01f666d1348f15c58dad4eff11007661.yaml | 4 +- ...5007-5efd9ccd23023c6687750d4699e0bae0.yaml | 4 +- ...5010-6dabd7288f9bf1aa4314c1230eb61170.yaml | 4 +- ...5013-ac09455e90923727a5127092ab5cf052.yaml | 4 +- ...5014-fdc54b4c35b7d9b62d80ce198388bdcb.yaml | 4 +- ...5018-c42befeaabe8cc2f04b4d79fa9968af7.yaml | 4 +- ...5021-2442f509b4c40ac50640a6c02e5c1509.yaml | 4 +- ...5023-221fa8b539336ea57a6760f06055d98c.yaml | 4 +- ...5026-c914118ffbfe0c8c975fe93b917507cf.yaml | 4 +- ...5029-9424f0d1add83019568a32a2d432a588.yaml | 4 +- ...5030-fb606eac6f1cd09b63793985561a9ded.yaml | 4 +- ...5037-814d85e88dab797899057f8e016cf74f.yaml | 4 +- ...5042-6d7c8242c157e79033d5cce1ebd197e9.yaml | 4 +- ...5045-d214d99e51223f558d7540a78be5f43a.yaml | 4 +- ...5046-61e330316e7097e0d9e2b13495d29a1f.yaml | 4 +- ...5048-48b0aa896289cd47d761dfb701222bb0.yaml | 4 +- ...5049-32e884b82485fb448af167a249e58037.yaml | 4 +- ...5050-3996e754fae7512574e32b3cc63b1ef7.yaml | 4 +- ...5051-53ff289b27bc5f383393c1a07c0f7797.yaml | 4 +- ...5052-42e2e881f29393c821ce6d432bf2a46a.yaml | 4 +- ...5053-ed25dc4554a62fa61ab6134b2e367cf7.yaml | 4 +- ...5054-8c686690daafe251c11d3b5105b46fb5.yaml | 4 +- ...5056-2955aefdf1cefad709d8b720d6db9ca9.yaml | 4 +- ...5057-31af361d998f1bee646666eb75e8dde6.yaml | 4 +- ...5058-073c84bcdcba646c59175dbb887b7a95.yaml | 4 +- ...5059-8a3bfba63e8785572c67f2c51b59a6d0.yaml | 4 +- ...5060-828427f0b9437525d7829a16b68575dc.yaml | 4 +- ...5064-d561f3d81e84a307c0bd1e31854171e0.yaml | 4 +- ...5066-88ca4a7bd7c66c74cd477716cd98c157.yaml | 4 +- ...5068-b2d6fe0a5065d0107b2198e03dfa4409.yaml | 4 +- ...5069-e5651ec96e6ca99165a7dcf4611fe4ad.yaml | 4 +- ...5073-498ee45b8c7fc3083e30dce9b4fdf901.yaml | 4 +- ...5075-b4ec89e0637e2a12e7606215722e4f54.yaml | 4 +- ...5076-36566c3afb06b969f751eee41300c71b.yaml | 4 +- ...5082-1f9ac7c68fe8ba8939533494bdaf6f2c.yaml | 4 +- ...5084-9b156b803761678f004bbe691278814c.yaml | 10 ++-- ...5088-a8343a6c54d23e35a66b54c79a6e406e.yaml | 4 +- ...5090-422a760ab8a04278c237785bf5be638b.yaml | 4 +- ...5093-45cc93dab6d9a9c50a4569ff06d10d7a.yaml | 4 +- ...5094-fbd8ecc6dba160d0b0ce8ccb8069b0ff.yaml | 4 +- ...5097-d4cabd09aa67db7f89a13839c46aab51.yaml | 4 +- ...5105-0f70db17156622f62eb6b0301d900f5d.yaml | 4 +- ...5106-aa2d32a6da076063dc14a9036390d1fe.yaml | 4 +- ...5107-457136e7a482f19e1fb7eda420cd0512.yaml | 4 +- ...5108-28eb2dd9b394a6991989e0316614fa07.yaml | 4 +- ...5109-3fb7396e595eda0e4c64d906babd7ea9.yaml | 4 +- ...5117-230dca5ad7a4f65f364511571d38f472.yaml | 4 +- ...5119-b320e1c5f0dacab6b03f963021265f72.yaml | 4 +- ...5120-dcded48546674d8a7147bd7b9ee5af2d.yaml | 10 ++-- ...6609-33e169ef58595c551d71b2a0f254c1a0.yaml | 4 +- ...6754-25ab8b4cfcb0262dc70ad0a958834bfd.yaml | 4 +- ...7349-45f3255db2b21cf02cfd20c83ca9648c.yaml | 4 +- ...8121-2d9ff787627cd2e1924f86a1568cd815.yaml | 4 +- ...3124-1e3e94ac66c9cccf9af54623829f9f1e.yaml | 4 +- ...3133-66e7875aa9a79f68060a917eb8074082.yaml | 4 +- ...1567-bdf53bf0d4580f34f6ebb2e5285d2f9e.yaml | 4 +- ...2789-749a7702ffa607983798f5d2868f83ea.yaml | 4 +- ...2790-487085694140471bbcc32f33541e46e2.yaml | 4 +- ...3849-db1fed2fca8e80d33156bce8fe1dd724.yaml | 4 +- ...3850-41374c7f8d145b4ed7aa35f41d920496.yaml | 4 +- ...3851-cdd44eb1f0b901b8f5061171a068c613.yaml | 4 +- ...3852-4411dec3eca9ec1ccdcf332ed790a4a3.yaml | 4 +- ...4619-febc39f061d4ea440e6c2d9bf3acdb4c.yaml | 4 +- ...4625-f55c5d00698b3df2b8933d7fd6999c2a.yaml | 4 +- ...4626-5a577e1325bef2936221483c67cddb03.yaml | 4 +- ...4627-451bef3a18327362fa560f933f5185ec.yaml | 4 +- ...4628-a3f7dace6308a168799f4b5efdcbf0fc.yaml | 4 +- ...4629-526f9a50eb94365c6edf2a44fc6ceed7.yaml | 4 +- ...4631-90997fecd42d62efb670daec1cf651f8.yaml | 4 +- ...4632-896998a582295bc584998dec0e35768b.yaml | 4 +- ...4633-ba80b860d4e6bf99a76e42ede7281809.yaml | 4 +- ...4634-6e0c27e6aa8bbd23ae1645c9db38ce34.yaml | 4 +- ...4636-a267ad47aaacbda283b13d30d0de08e1.yaml | 4 +- ...4637-a197637cb7c671923c50bb35a3955a77.yaml | 4 +- ...4638-6aa900a875605d12f51c36a7aee68e0c.yaml | 4 +- ...4639-010922f26f33a94ab231b7f0fdab049f.yaml | 4 +- ...4641-c6c1e0bf86c779c9f71689d63880acf1.yaml | 4 +- ...4645-8bf5f589d084befe53d71ebadbbe38a9.yaml | 4 +- ...4668-d45b3048f23bdc5676881ea128b4fe4b.yaml | 4 +- ...4675-8b8a23561a8628021b8646bf3571f1c0.yaml | 4 +- ...4676-bb95d05f96d844686568bca3576c4dd9.yaml | 4 +- ...6823-958209cd1cdd4ea5cb260b87d6b618da.yaml | 4 +- ...6826-8a54587701c521af8ba2b5105bfe686a.yaml | 4 +- ...6827-707e5bb3cb201f78de35f00133c00922.yaml | 4 +- ...6828-aab671eab1f3a35319bc119c20a62b84.yaml | 4 +- ...6829-992cb2db66581f66b70df8df6297f14c.yaml | 4 +- ...6830-8a14e10c4e61da2c2574a977cb4dd78d.yaml | 4 +- ...6832-de418588fa621f09a7aaad7d1520c591.yaml | 4 +- ...6833-d08e992a9c86b0410a9dd2a576aeae42.yaml | 4 +- ...6839-99651f4102212266ab89ea9f71ca952d.yaml | 4 +- ...6841-9e36292a7ac47d63600972695d9e0b66.yaml | 4 +- ...6843-3b1c84fb06bbfd928bb6bd8a2dc656bc.yaml | 4 +- ...6844-a4b9301f609713ae947856e0a785959d.yaml | 4 +- ...6845-c63c09dfe0443988600f74c6f35feaf4.yaml | 4 +- ...6846-07056c447bdab5ad6a1bdd36170bd91a.yaml | 4 +- ...6847-852d49969bf0838b042595dfd6400dc8.yaml | 4 +- ...6848-1588d8e6d7413910cf24de603f48ae6c.yaml | 4 +- ...6849-7512032bfe4cd740c20bf708ea302987.yaml | 4 +- ...6850-e76a25dd6d02a9976e1a45024d852c58.yaml | 4 +- ...6851-098a7c1e7e4a3294c0b3e783c9234d81.yaml | 4 +- ...6852-1ca57b94b0c3924da7aeb6a7b470fb34.yaml | 4 +- ...6854-5b1c2add49d2a47b01ab11a65c17a099.yaml | 4 +- ...6854-770cacdb7e6dbbed594d0162d09eaa1e.yaml | 4 +- ...6855-a730585b1aab8262e7f092340f9d0036.yaml | 4 +- ...6857-ebb1ebcf4f2c8c10213c00b9f2126830.yaml | 4 +- ...6858-f27a4c95db01a4a56d77711f77220046.yaml | 4 +- ...6861-d096551cc11e027298b83171a2a3683a.yaml | 4 +- ...6863-ce3f05ae5116fef07efba37ae58297b9.yaml | 4 +- ...6866-e4f1d5f5dc814ad4d0bdfba0ea143852.yaml | 4 +- ...6867-23d65a0c7f78efb0a00d9004db77bb73.yaml | 4 +- ...6870-69aedfc905a5a0f0e668841416c424fd.yaml | 4 +- ...6871-622602817799a1869bfcc5c18c23392a.yaml | 4 +- ...6872-05a7a0498d570dab847e4a9ab6951cdd.yaml | 4 +- ...6873-13327063860a0ee0e2e86f1e87898320.yaml | 4 +- ...6874-992243a3e82e516c6ec6b7febbf82953.yaml | 4 +- ...6884-62786f2608f27a539a0474c4d2ebfa59.yaml | 4 +- ...6885-a479da98606812ed965dd3889c1983c1.yaml | 4 +- ...6887-7493b4e361e65fc33d302e9a8676eef5.yaml | 4 +- ...6889-cdde9db33caece636f624a4e888cbf55.yaml | 4 +- ...6893-7cfb9c8a38b02b5d1f8df2ea212c2f3b.yaml | 4 +- ...6896-a5038f440967c1bd1e883ce46373e9e5.yaml | 4 +- ...6898-4023135654a032018b1b7ca568ed38d7.yaml | 4 +- ...6905-ecadda5bda84d8a0b69e1131abec5fcf.yaml | 4 +- ...6908-1ac9ed75dda676d9de3cd3380fd4d32a.yaml | 4 +- ...6910-e587e1665fb732b10014cf1110ac13b4.yaml | 4 +- ...6911-2faa74d51969fb024a7d850a91d6917b.yaml | 4 +- ...6912-d6ab389c616dfd2cb30cbd7db8473c95.yaml | 4 +- ...6913-8eae6b3d481165727afe77f464d11a2d.yaml | 4 +- ...6915-da13e940921b9b4b286d3e79be1e9d85.yaml | 4 +- ...6916-a5da2259e66916eeb957e15e5b2a199e.yaml | 4 +- ...8314-97e559b0ee0d8f7ed9a23afb1d3a5dfd.yaml | 4 +- ...8324-41e16d89dcc64533542d0355200f7979.yaml | 4 +- ...8342-fa85581f8faec8e54a152a5a0efaf823.yaml | 4 +- ...8344-51d48891356faa4b5ee750ea40af7e8d.yaml | 4 +- ...8346-a5ce2d4f9e1b1bb323f57b01146d769b.yaml | 4 +- ...8360-76cc9ef157cda8ab12c517a7c91088af.yaml | 4 +- ...9201-65fb786a832ae70556835ff6a5bf2139.yaml | 4 +- ...9203-a7765f598fd1a7f35b5c80f721d18a4c.yaml | 4 +- ...9317-f89ee1fe18d2f93346e76054105f5916.yaml | 14 ++--- ...9328-77686428a77d266ce22bfe59b8ab3fea.yaml | 4 +- ...9329-dbbebd9fd091a5f8a7900f65f6287602.yaml | 4 +- ...9332-24e7ccbee7ca416ae56183733be3750e.yaml | 4 +- ...9334-4b6c5be1fe7b22ce9d31baa1ab6b6513.yaml | 4 +- ...9335-17d9d2647ecfd4b0be797349f3817c27.yaml | 4 +- ...9336-10474b54f82207cb48d47efc5316fa08.yaml | 4 +- ...9337-c57a50def1ef305a4e8acb9063bb5142.yaml | 4 +- ...9338-7b501f3b3223dc999faba6ed8169a765.yaml | 4 +- ...9340-eae4213a5c0782ae01f44dd9c21edcbb.yaml | 4 +- ...9343-c8b3ba4607788e0f441ac762600baab2.yaml | 4 +- ...9344-c6a3bc41ee8a2ee4ea6023cb51c1bb30.yaml | 4 +- ...9345-06dfe81bc3a355cd7801ee39e75e5076.yaml | 4 +- ...9346-071e46b1422bc01b590261a3c5a56383.yaml | 4 +- ...9347-47381a600b8cc2173f5be6a0287dc5d1.yaml | 4 +- ...9348-a6e9d3ad722034f3a564750baa53887c.yaml | 4 +- ...9349-6674d09f375c0a0c6100b633268f7e7c.yaml | 4 +- ...9351-b6ce71d23b8bb3b641046b5238bd95ce.yaml | 4 +- ...9352-ede5967c43f0c429d90aef07bf32832d.yaml | 4 +- ...9353-3cf0c7158d6fa6e72389913fb8e96f48.yaml | 4 +- ...9355-738cbcde2d8ae9b069d1cee10adc6b90.yaml | 4 +- ...9356-a29cb4528fb3dd359faf1d68a8cf9ee1.yaml | 4 +- ...9357-58a6911fd3193aa0bffa110e873b9369.yaml | 4 +- ...4074-f7ea807ec289aa8d8be34a1208e9ebb9.yaml | 4 +- ...4096-16fc618536c8b0d70612472b29c155c9.yaml | 4 +- ...4134-d8e9444efeb93debc442fb77c567fbad.yaml | 4 +- ...1836-b1767ac6c4058810b3f215f7aa0668ab.yaml | 4 +- ...4208-e3d531049fbe8d4cfc0687a776a83ff1.yaml | 4 +- ...4222-ac056be778ddfca7dda3b1e72c3f8315.yaml | 4 +- ...4225-f55d9ddf38ced2af39de4e46518b9654.yaml | 4 +- ...2358-e81493486edc65b51a46933e4d69c1ae.yaml | 4 +- ...2361-b66a39c48610a87259a172e4f5cf2fee.yaml | 4 +- ...2362-9912c297cff35bf8bf01c7b24d0db7f5.yaml | 4 +- ...2364-6c87924dbb6c43a2f1ddf339475f1f21.yaml | 4 +- ...2365-536f8f709fcfc0e34ccf2b79f3c436d7.yaml | 4 +- ...2367-51f425b2b47157be5d941492e7da4019.yaml | 4 +- ...4330-e259392e4e0f5c005c71447bf33a289e.yaml | 14 ++--- ...4331-ad74c1853755393f0d665754f820d681.yaml | 14 ++--- ...4332-28b13ccb507cfeb174aa819fc3235b5f.yaml | 4 +- ...3353-3e9db5ca5f74e03bc884849a472e7363.yaml | 4 +- ...4337-05a9cfff31ff66f2865f7b47e03322c5.yaml | 12 ++-- ...4338-e5012481eb3358496d9e8266284a0c72.yaml | 4 +- ...3408-f8c9b929aeaeb9c8fafdde93d3c6755f.yaml | 4 +- ...3409-41c658cc02437ea28ef89a50228368a2.yaml | 4 +- ...4347-c176f376f5ace8dd8c28eea850150499.yaml | 4 +- ...4349-dc3e0c6c532d55735bad2ab0a9b29d39.yaml | 4 +- ...4352-91fa130b7c3ea6431b231102505db7d5.yaml | 4 +- ...4354-fe4487fc151c051d39c023720ae70292.yaml | 4 +- ...4364-a81ba5cd5b7c78f82a652995b8b78367.yaml | 4 +- ...4366-a3f1f9f4718f614e268d95c106a320c2.yaml | 4 +- ...4367-ec6ef7f01d456e74c1ef5bcee54d14d6.yaml | 4 +- ...4368-6555d944c0da7a05c7a9f7417ba389b0.yaml | 4 +- ...4370-3262dd8277294ea89d83139475cd5b78.yaml | 4 +- ...4371-18ba5164adc930f4c13bf8eac8771529.yaml | 4 +- ...4372-e783401602a498d4131896498c1a16c5.yaml | 4 +- ...4373-1bccfaa95263e0cba6cdbff0fea9a636.yaml | 4 +- ...4376-4e4599c0d5b0830c29196e68a72f1714.yaml | 4 +- ...4378-34686e9b40a6d9c4dcc8e1fbb6d4343b.yaml | 4 +- ...4379-fdd08f1e50818f896e8c8a898740f26b.yaml | 4 +- ...4382-623ee8a736cc9ca7598f1fcb6de572f9.yaml | 4 +- ...4383-f945b2013c9f8db455b1c19cba6e241e.yaml | 4 +- ...4388-92760ee1af263e3e31758b506a58ef85.yaml | 4 +- ...4401-28932f902044dea62ee1c6a2f1f7a4c4.yaml | 4 +- ...4428-9dec9c9b266000df591dc3dcef1e7d84.yaml | 4 +- ...4779-d0a082141e820d78d2c62d7167bca620.yaml | 4 +- ...5729-a2596cd818b9e76da96ce78707638a4c.yaml | 4 +- ...0134-b59e16af89b52cabb8769776994f8e59.yaml | 4 +- ...0141-bbd390969a32b30a2e60ec6fbae2e10c.yaml | 4 +- ...0163-3928f6f30c541722320412a9e71021b8.yaml | 4 +- ...0164-590623a5d7befa81a3dd4c5d938153e0.yaml | 4 +- ...0180-1cb4591e0480a2550d32c48672d101ca.yaml | 4 +- ...0182-b13bd75954a4a1908d54b2904726ac6a.yaml | 4 +- ...0186-40a15a1270025c5cb430a29eea6824ae.yaml | 4 +- ...0190-f2687a211e25f95aa3e0981921986366.yaml | 4 +- ...0205-7a46739bfced50470df5ec8fce622b5b.yaml | 4 +- ...0209-0c15ed5f69fa39b17ef98a0065e40d8c.yaml | 4 +- ...0210-6cbcd9de8a0bffdfb0e1ab93c491bf62.yaml | 4 +- ...0211-90c7f750404de09cdcd8955a310ab0ab.yaml | 4 +- ...0215-16223cc2976f7faa5fb929bf7546e0a0.yaml | 4 +- ...0215-5dc88e8bebac4fb35e29ff329ac029fd.yaml | 4 +- ...0215-9c997af79b10bc0805f0be2e95bc48ad.yaml | 4 +- ...0228-b04ad422f3446dde9c13618b34ff98a5.yaml | 4 +- ...0230-e5558e0a5f22ef3f76543aa9614d9789.yaml | 4 +- ...0232-c0cb327a973fcb4e19ac20c22cf757a3.yaml | 4 +- ...0233-b38eda58adcd55c816f6214da161bc56.yaml | 4 +- ...0254-e1ad6d026d68d47f5c4c4162b3b2d312.yaml | 4 +- ...0255-b872392d30229399db8513dcb00793fb.yaml | 4 +- ...0267-d9b7905c602159e1d431254ae8993ca0.yaml | 4 +- ...0287-dab92fc7cb3e34a6cce738aec497ec2e.yaml | 4 +- ...0316-5bf9d91713d8c35818245877f73557be.yaml | 10 ++-- ...0328-127d546d7f94ec42c9601b4f8349bbdc.yaml | 4 +- ...0360-e9ce7b3589ea1d2e769d3fe233efa510.yaml | 4 +- ...0363-6420c7d64b9445ffc9ff5c8ed72e1368.yaml | 4 +- ...0364-f91654e07624f568e772537007d8ac97.yaml | 4 +- ...0376-ef13d8f60909d5e2009ffdcbdc23e29a.yaml | 4 +- ...0383-de4b42af1ef3e90d957d2f6f01c968f1.yaml | 4 +- ...0388-205de06070622aab10eb1bdf566b37c2.yaml | 4 +- ...0389-1b5cbc1452a8c85b5da51d915487aec1.yaml | 4 +- ...0404-2c15d4e93f6f6d616a273e49657a41e3.yaml | 4 +- ...0410-1be66c0880c6c44fa345977c011d45e4.yaml | 4 +- ...0411-d9dc418339bf1c25423bb7e18f222c8e.yaml | 4 +- ...0412-c1e85ed5dbff1aadf024b8bce56884f9.yaml | 10 ++-- ...0418-8aead4340d12e591a0e0e1fb46dd9226.yaml | 4 +- ...0420-a93b511e834ddd2e10f787cf551e0214.yaml | 4 +- ...0423-6daeff7e508f05aeef343934c15a7178.yaml | 4 +- ...0439-b5e4b4063141fbe3f98d4c057142e54f.yaml | 4 +- ...0440-b60d38a6f27b4184d7cf8b134a701e36.yaml | 4 +- ...0446-decbeaef5c23a80c05557edd9e92444e.yaml | 4 +- ...0448-b6fdd6c618695aebb9014f9dd705ea55.yaml | 4 +- ...0450-800833211422a31fa0bc329389e6ba63.yaml | 4 +- ...0478-6a54d7f93d8962555c63afb66d95fb68.yaml | 4 +- ...0493-54ef8279e490c1378421576f13667db9.yaml | 4 +- ...0499-63d4ee9917fcafc47225c3c77377bf2f.yaml | 4 +- ...0535-cc85fecce61e81ebcfd16fc13ed35220.yaml | 4 +- ...0537-14a7ffa14fbeefc172000dc0caefb552.yaml | 4 +- ...0541-9447e0c2ffa1a53245e3f3fb0bac226a.yaml | 4 +- ...0590-cad2b6b8af5079972fa1531cce991f4d.yaml | 4 +- ...0592-e1d4b31d2e512648b34fb410fc6ac542.yaml | 4 +- ...0598-a833ece3f343246705571f6788efd405.yaml | 4 +- ...0626-b5af9134a0dd9c46b02e9a0fe6e4c234.yaml | 4 +- ...0633-50aa046ee7fe3b1495c79cf309977bf9.yaml | 16 ++--- ...0642-557dc76e2c2294cd33c5721f9ecf01e7.yaml | 4 +- ...0649-404d802e6aee5b15a871049b9ffff69a.yaml | 4 +- ...0653-f044be0e1e4c22699ad8261226bc2dd0.yaml | 4 +- ...0659-52c19ba3b4c4a4e86f87839bb901d71b.yaml | 4 +- ...0661-55f4a1b139d90fca33a89ff564faba6b.yaml | 4 +- ...0662-d07cf22ef8f576e671dbb7b3eafdf13a.yaml | 4 +- ...0663-1d90f05eb3de7b1b2997cada03edccfe.yaml | 4 +- ...0674-54befb9e4a40b2daeebffb4c52b40b61.yaml | 4 +- ...0684-1663017756a06282bb3d18d015739d82.yaml | 4 +- ...0687-bb8040f6049d728dd727ac789ea87332.yaml | 4 +- ...0700-d24630671f65fdbbb367bb893bfade3c.yaml | 4 +- ...0701-1d87fdeb396f4600b280560afe2112ee.yaml | 4 +- ...0702-4aabb12734f76649f5626710ac0ad1d9.yaml | 4 +- ...0703-8ac9cdbd4cf7676c20528abcd5d7ef87.yaml | 4 +- ...0706-8bf5f3c88eae040df5c93bb90ba373a1.yaml | 4 +- ...0707-a5ae13191d707f6528df2db00d64b11b.yaml | 4 +- ...0728-823ea976111689a9bb4045475cc60c43.yaml | 4 +- ...0737-c38399df1330c2dfd449ee16ef7996a9.yaml | 4 +- ...0750-4086b1cacdc76d37665a053863a25b12.yaml | 4 +- ...0765-d8800c16823f2094a6d5c651646d84fa.yaml | 4 +- ...0770-d02f0d7121f40075980c3a177c578c3f.yaml | 12 ++-- ...0783-72a5beaa06012eefbccaf7bb2be8aca6.yaml | 4 +- ...0814-f2c3929c09b259d783ad3e308478fb8e.yaml | 4 +- ...0826-259e85ddeb38f519130917626241cfb2.yaml | 4 +- ...0840-d9a381f55de2cbcc100fd4387b57379e.yaml | 4 +- ...0863-b7954fa43e16eb8eb1a34f4e676a00e3.yaml | 4 +- ...0873-feb8ea008986699e99b1ae18448b79c3.yaml | 4 +- ...0874-7b54be45a2f07bfa9d249dae96b2b8a9.yaml | 4 +- ...0875-0afb6b2d10846bc66cf5079f2d5cff9d.yaml | 4 +- ...0876-cf20fa8408c9425d9c1e30f3c5cdbbda.yaml | 4 +- ...0884-d50bca474bfff7b87f9bd013b925f56e.yaml | 4 +- ...0887-61a927bc340bb105a879f38c8d71f797.yaml | 4 +- ...0889-b97c4bb0c30e63e1bfc74807877230de.yaml | 4 +- ...0898-edf371c1f05d5a891d28a3a64c575117.yaml | 4 +- ...0899-54aadf8fe607e5a163f75b88f9bb6921.yaml | 4 +- ...0901-085734e6e575cc721d044070dab37117.yaml | 10 ++-- ...0948-484dd45c6c89790208a6369cc9e3257b.yaml | 4 +- ...0958-cf0f772efb4c9beac6971570b02c3073.yaml | 4 +- ...0969-7ae1e981db663479bebe95d4fc6e1fb9.yaml | 4 +- ...0993-158366fe9b5b0baf92dc531e125fc491.yaml | 4 +- ...0994-198731eb0d140b29cd1b351f123496f9.yaml | 4 +- ...1001-c8a533331a66588a41e484e2593bc634.yaml | 4 +- ...1006-a9aa77a954191266292b06f87ea42806.yaml | 4 +- ...1008-a9a32f74174df8c480433ef7ce05b39d.yaml | 4 +- ...1009-7a3ab4b4d26a299b96225464ccb1d356.yaml | 4 +- ...1010-73c8c687b5d5c2441c948ce0feefccb9.yaml | 4 +- ...1020-e2d12fb1743cf7c34146fef09c867ef4.yaml | 4 +- ...1023-39c09063986ff422c9e20ab8b773f550.yaml | 4 +- ...1027-7e7d3fe35e3640caa3a72acaf61512d5.yaml | 4 +- ...1028-8e950dd64eb760b48f921b3528ca5c9f.yaml | 4 +- ...1029-6f5594aa21d74ab20f466ec04157beee.yaml | 4 +- ...1046-02a51eb116d83b932887ff5f7b3fb4a8.yaml | 4 +- ...1051-399a0cfb0032357f26f899d011d7490f.yaml | 4 +- ...1062-f1d890dd18142758b1c8cdecbd50795b.yaml | 4 +- ...1063-5e0fa9fcba55bce0a7d159ec1d8e3486.yaml | 4 +- ...1088-9a80eb4e9ae6ba3b2c9128c9152fe450.yaml | 4 +- ...1089-4f2b194ecb7432206d5e63b6f9923644.yaml | 4 +- ...1090-50f3d46f270e4758bbe32a2e3166c5bc.yaml | 4 +- ...1092-7b33af13dcbb1f6cea4e6cd4849f85c9.yaml | 4 +- ...1093-2e08f88f4d646fb37132bf634ea9d86a.yaml | 4 +- ...1094-5ff51e8e3d70f359c04a37d7bd2f99bd.yaml | 4 +- ...1095-115be693fa2aef7e78774bec69a9ed0c.yaml | 4 +- ...1103-501a1f4c716dcfc5dbf27f3bb41b2666.yaml | 4 +- ...1104-de64ee696bec8d009d778000d64252b8.yaml | 4 +- ...1112-ad0620cb04a8c4743efa183697178556.yaml | 4 +- ...1113-4d590f8cfc3cb04affd33a6ac18e5217.yaml | 4 +- ...1123-7f6d3b4e502f3e87f036376c050085cb.yaml | 4 +- ...1153-7b9f5b71ec8719bf9a8cb5694942faa9.yaml | 4 +- ...1156-01ed1eb8aac2e68ae5c276ba61ed6aed.yaml | 4 +- ...1167-3dadecf90476b3cb59a265c7ae6d0c01.yaml | 4 +- ...1168-1af02924d8ed846b859206c9bcd93941.yaml | 4 +- ...1169-0b2658951b7cfc28db2aef3263c845a3.yaml | 4 +- ...1182-1302cc789091d34c6db79147cc295acd.yaml | 4 +- ...1203-1c3db202ed4136234a7dba357e335f3e.yaml | 4 +- ...1208-d6ddc334180239abe617a7bb4b11e74b.yaml | 4 +- ...1217-f62cbc07d0c97caefc6751d0180dc663.yaml | 4 +- ...1228-3e83969edc359576afe93a3a140053fe.yaml | 4 +- ...1251-1c2da71dac8a1ffb07f1c87e262b5e0e.yaml | 4 +- ...1255-b7e40dcc40f790ccf1ceff5a8722305f.yaml | 4 +- ...1265-8d9d8e003ce03da674f1adc87ce55135.yaml | 4 +- ...1266-1ddfe592d879bc70e98e16d6c917ddd6.yaml | 4 +- ...1269-02b84b42a8b3e6e7dc009b5046e38b5a.yaml | 4 +- ...1273-70ada96da95be698f6717e6048a6ec59.yaml | 4 +- ...1275-1bdbe0eed23754132ebb7324a7cbafe1.yaml | 4 +- ...1281-b9e46f23f1c3c438cdb8dc39395715de.yaml | 4 +- ...1282-1defc4b79b3e0026fa5b8dc78f8c4d1d.yaml | 4 +- ...1294-d08f135748c79437965679674f4da9c2.yaml | 4 +- ...1298-f48a8e9c9fcbd8cc7a0d7249289e3206.yaml | 4 +- ...1299-74a8ac0075a235e0a0c14b0719aab19b.yaml | 4 +- ...1301-d8df0d0d76816bab3218aaeebd329b4b.yaml | 4 +- ...1303-dba115ec2b96e48bab904dedd2103380.yaml | 4 +- ...1320-330b086d5a163173ce80e7bcf35592b2.yaml | 4 +- ...1321-4764645e6471ac58214ba2ea5f55bde8.yaml | 4 +- ...1322-943971993cbe3a7f3e1700395fdc37bf.yaml | 4 +- ...1323-3cce740c3da6d548d8d19689826c4cf1.yaml | 4 +- ...1324-bb6d2bf0f5a8a794df5c5f921c8ed2d6.yaml | 4 +- ...1326-96b39b472ca8eccbec11e47f253c80b8.yaml | 4 +- ...1327-c27095e826fc99d4e3ff59487183eb49.yaml | 4 +- ...1334-ed930301ff6966bb2b42fba1c213a244.yaml | 4 +- ...1335-315a1c5d119a58cae4d57802c27a1504.yaml | 4 +- ...1336-3a426a819fa4af21ed44f2fbb809eae0.yaml | 4 +- ...1338-667161af8562bbf0616cde527e940c70.yaml | 4 +- ...1386-d882958bab372a69d811837406b3986e.yaml | 16 ++--- ...1387-42ee0da57f529d4a1f0ef2f4cdec544f.yaml | 4 +- ...1391-850cdc2bb11e2c84c49d36aadc35f92a.yaml | 4 +- ...1393-8e8d26048a256bd2a6af10c450c287bb.yaml | 4 +- ...1394-cde70bc716e26c33fb792a26b5c7f5b0.yaml | 4 +- ...1395-7ed4275b69b36875b8deb7c4de847800.yaml | 4 +- ...1396-074326e7470f284764101e6fc9e53f79.yaml | 4 +- ...1398-47882f7a2bc08ac13c7e58b547c2a0c7.yaml | 4 +- ...1407-9ff0528f3bdcbc7bc2a574ec76b7073c.yaml | 4 +- ...1408-fa15faecec3c0097e1e35ec5d5e47da4.yaml | 4 +- ...1409-0f884ba817e82a09c51444fd8fb9e0c3.yaml | 4 +- ...1421-e286b3a8935bca8a0217c3e2e8d64e5c.yaml | 4 +- ...1422-46244fdcad0724fd77e42ba287d7514a.yaml | 4 +- ...1424-e8eee7b13f0d955b5b5dd5ba7908051b.yaml | 4 +- ...1456-7a1aa0c88530968ed1b5b646f3180462.yaml | 4 +- ...1469-6a2b5867f4b2cb8b9df53b8ba2dbfdc3.yaml | 4 +- ...1472-eab47af35bd14f792c9512e4731e4999.yaml | 4 +- ...1506-2a429e3083a4c7d371b1df483f6771d1.yaml | 4 +- ...1512-92ee91cf72a43dfa2c90a26dd4e9aac0.yaml | 4 +- ...1538-acd2f33fed5535f04cc63cbd673f8668.yaml | 4 +- ...1540-4f73853f1fed7601f5de786bcd020099.yaml | 4 +- ...1541-93c0b4806bb82af1f99b4d0c878535e6.yaml | 4 +- ...1542-fd9a8180717056f9f1f968f01ca33f0b.yaml | 4 +- ...1549-3b9b22b591de089c72309692f7ac4907.yaml | 4 +- ...1556-f5c3047a64378a59b5a46efb892afcac.yaml | 4 +- ...1557-19a7dd3894c625a145c40adc74330444.yaml | 4 +- ...1558-c8c8f457de7ea311efa222b66a51a434.yaml | 4 +- ...1559-e96b7ac8a29e8b231c1f7265734f9442.yaml | 4 +- ...1560-f5cc690dc04197cd95b8aba840195297.yaml | 4 +- ...1562-de18c34baf9718449b89d0d38543217b.yaml | 4 +- ...1564-fd28c2a8a8ece88ce28c75cf84e47383.yaml | 4 +- ...1566-88df46a6830158391aaf7619c151706b.yaml | 4 +- ...1568-68a19dcbafa893fee0f134b5b9682816.yaml | 4 +- ...1569-fad10c5df0d12e13e57389567502ed4b.yaml | 4 +- ...1570-83711b9f4415eeef12b96843272e6f77.yaml | 4 +- ...1573-fcada36c51980400d6b77ffead4b0c1b.yaml | 4 +- ...1576-12a42b489a4f41309029bce2b7df59b4.yaml | 4 +- ...1577-5741da0b171618ff87448def21553be2.yaml | 4 +- ...1578-ca85fcbf44c8f529ecdfa95b175d7b9b.yaml | 4 +- ...1582-39407bfbd26cec40aa785db15ec93f9b.yaml | 4 +- ...1589-4490549b2215d97aa7dcad6a865e6752.yaml | 4 +- ...1593-fcfe12c9ab0b540a8002a6b623d72f95.yaml | 4 +- ...1594-7ac6b90fc34536c09d99f508147f9181.yaml | 4 +- ...1603-04389ec3013ce0dc7cd91731fa525c48.yaml | 4 +- ...1605-f8b327a38c9f793227404396765e7078.yaml | 4 +- ...1608-6b8f7b7b7105323e383724ec1fbf543e.yaml | 4 +- ...1610-0f1cce8b3f6cc44f06846edd384bb3d3.yaml | 4 +- ...1611-8f6754331835c0e520f1fdc12e539318.yaml | 4 +- ...1612-65f94ea0710a1cc5f2df8da6f9883ee7.yaml | 4 +- ...1618-55f7bc7dbafb42aecc9f8ebab372d604.yaml | 4 +- ...1624-b7b0638727516de291f017e208e485cf.yaml | 4 +- ...1625-0e6d3f2d08066d7cff85e87321056d7c.yaml | 4 +- ...1626-c6abae1f3b36418b8b7ce31e542cc230.yaml | 4 +- ...1627-a1936a4a25a96962401af7be405882a8.yaml | 4 +- ...1628-5acab9ad0ccb5e44fc932f6fa0ba244a.yaml | 4 +- ...1643-c350cdbcabbf0c6c2cbe275725809f83.yaml | 4 +- ...1644-2ea25ed58e645deebc4c9ee26219463e.yaml | 4 +- ...1645-e8c6c87a94f00d5eab313cc9a401818b.yaml | 4 +- ...1646-b3837018bee9dc0f25b1197bd329be87.yaml | 4 +- ...1647-02ff6e8f4c50ebc35c46ebd6a0282258.yaml | 4 +- ...1653-db671b595a6de4259366a24bfd717a43.yaml | 4 +- ...1654-f3750481cefda659186282ffd61f21aa.yaml | 18 +++--- ...1656-0fb4e97ee7da5e51631d72f53857a9d4.yaml | 16 ++--- ...1657-25e01eb0a9bc2abfaf531fab30be9b46.yaml | 14 ++--- ...1658-2fbd93f620678f9df8d36f97616c7078.yaml | 4 +- ...1672-151d3e08592a36d4136c6e83ca9b4d33.yaml | 4 +- ...1683-96de88df50c13b090e6e70188ce8bb28.yaml | 4 +- ...1684-bee7ee097d9c2854b2e0df3652ff1065.yaml | 4 +- ...1685-22c242de8477403c11aa170395108645.yaml | 4 +- ...1686-8eccbee0dd1899147fba577f29a00bda.yaml | 4 +- ...1687-810ed483cc25df9feef2344d7fe0063d.yaml | 4 +- ...1688-c6243b9dee6460614115df8351692603.yaml | 4 +- ...1689-8247dd9e5bbd39d391956bd6159727f9.yaml | 4 +- ...1690-8825e85de759f44127189c61a2caf509.yaml | 4 +- ...1691-3eb72b31a7a3f042d44188428aa0f9df.yaml | 4 +- ...1694-663fd6040ba08a6cf95a5d56aa372c7d.yaml | 4 +- ...1695-1bd642d2e3ff9973b88e9924e704fbb7.yaml | 4 +- ...1709-36c982ede7470d2e3e88a740557c4530.yaml | 4 +- ...1710-49498beeab40d799abe54105f37dda52.yaml | 4 +- ...1712-38a3278b44badbc6201e3e06953e0d59.yaml | 4 +- ...1717-e1e48d10961945b3a2fc571529bab9c7.yaml | 4 +- ...1749-de57c9c6347745d9dac6d12ee00f13b8.yaml | 4 +- ...1750-309733b2329b1a831e5f4ba1b62b19a8.yaml | 4 +- ...1755-5b6d277a829fbd531e952b54c0a495ad.yaml | 4 +- ...1757-4b545f99e277a5b533a4828fddfdf3e6.yaml | 4 +- ...1758-d4ee747485499e50fea0ef44831d0b48.yaml | 4 +- ...1759-1b62450f818e2ba095ee733915545ce8.yaml | 4 +- ...1760-eeca82a89fbac0124d669de2f8301089.yaml | 4 +- ...1761-cf9cb4b184f662090fa6c012e4b5ad99.yaml | 4 +- ...1763-e67b32cb7aae592e15f89a10718ce09e.yaml | 4 +- ...1764-13481b1ed77fd504fee89b917516fad5.yaml | 4 +- ...1765-c27aea985311d8d430509d848af8ed00.yaml | 4 +- ...1772-4ebbec62da7dd4744569d093e5a7ca36.yaml | 4 +- ...1776-889f2c95b741c5e0897bda79fd4658fe.yaml | 4 +- ...1777-e71ba64e3ce13e58bab0fc3eb80546e8.yaml | 4 +- ...1779-558370c6db6c7d4d1eb32adfed3a020b.yaml | 4 +- ...1780-53e03067c5c0bd571562823dadf2dc1b.yaml | 4 +- ...1781-03debccd2847f0f3861af391ac774ecf.yaml | 4 +- ...1787-85bcd61b96548b75a4bebce0af8ade18.yaml | 4 +- ...1788-b3c283ecfc25af9f10f9c937f229f24c.yaml | 4 +- ...1790-2d0401b900eef6498675d312d5732e7a.yaml | 4 +- ...1791-a27299fafee4147eee6143e446c0d4ac.yaml | 4 +- ...1792-acd84f5e4cde82a402d1c05f1e4adf06.yaml | 4 +- ...1793-dfb92d2f2c245aee84f9cb4e282df3aa.yaml | 4 +- ...1800-c1088d4a7272923461f43cf76023c143.yaml | 4 +- ...1814-04d32a3642a2c96352c83010608db77d.yaml | 4 +- ...1818-d6476ba9d1f9af74d842dc5c3e1d7008.yaml | 4 +- ...1826-6efe820f12fb9f3137c56cee070730c7.yaml | 4 +- ...1827-1f8d84e6699c9f64cbbc8919147cefef.yaml | 4 +- ...1828-4eea95bcbc22121deeeb133b73467001.yaml | 4 +- ...1829-bad18eab263a0541b49dc3dae830d379.yaml | 4 +- ...1830-179da13f00bd0c1a7dc169b4d93d8c60.yaml | 4 +- ...1831-3910ec4d645c60375887481edfe719b7.yaml | 4 +- ...1842-fc3bbad32864e7b45f7b03bfa40e7ab6.yaml | 4 +- ...1844-d34327d1e992d219d0a1381df1c090fa.yaml | 4 +- ...1846-daddd512be0305b66a7c59d444cececf.yaml | 4 +- ...1847-f7a5929579e2eeff4b02eaa7e1b6a770.yaml | 4 +- ...1885-b77d972bfa12e86d544c2057da2d9c61.yaml | 4 +- ...1889-981beced4302bc1ed44f59f5bbd895e2.yaml | 4 +- ...1894-b5996763218808f5db38a6126c890df9.yaml | 4 +- ...1895-49a29c208dcdf8c767e242ee9b07c664.yaml | 4 +- ...1896-52197fd3d372d9ca3330b7fb6abe6c1e.yaml | 4 +- ...1900-d08d0840632760096f6b8acd75a58e66.yaml | 4 +- ...1912-681d5f2f15a561b04bf2e029cc02c5b4.yaml | 4 +- ...1913-544ee7aee750c4df26fe7f3c5d3e9353.yaml | 4 +- ...1914-800e55dd995f58ca489269cf15bde8aa.yaml | 4 +- ...1915-fd55f9f1199bb3c6e4b47c897716c4d9.yaml | 4 +- ...1918-4c6e2168599e221f42c1bf26fb04cbf7.yaml | 4 +- ...1933-ac850d5730363d3bbd84ae6609135f15.yaml | 4 +- ...1939-f31b01af0e36d70ece981a2da79389f8.yaml | 4 +- ...1945-699697d906ce98da7e0a75001998e24b.yaml | 4 +- ...1952-1ab98d23b8f5715db32cf93509d555f7.yaml | 4 +- ...1956-7c4f098f276bb438e8b06c67cf08748e.yaml | 4 +- ...1957-1af6a7823a6a8a142bc89c08631d8f4b.yaml | 4 +- ...1960-51cc7451392ec09a8c7688f9ed5f409c.yaml | 4 +- ...1961-7adc7eb8c094a09a98664c4579c84eb8.yaml | 4 +- ...1964-73a4ba5237a6c747115a7db7e60454a1.yaml | 4 +- ...1967-cb362ac834e4e127112e662b8e597a11.yaml | 4 +- ...1969-1fd788f4344858c60db9f8c8da73d2ed.yaml | 4 +- ...1971-5b2ed76d9224d230598bdf2cc0cffcbc.yaml | 4 +- ...1990-2628ec35fd0d634f503face1acac9f3d.yaml | 4 +- ...1994-056a681add2c2e01374393f870550b92.yaml | 4 +- ...1995-7ed5021e959e36c29209eaf63566fdb5.yaml | 4 +- ...2001-34871fd2757b31ede448958147d678fa.yaml | 4 +- ...2039-86ee984a5b2cc7b4ab97dc8a4e8b06c6.yaml | 4 +- ...2040-22707a3d55e78cedf2f7dfb41d94bfbd.yaml | 4 +- ...2041-475d1ffae41ddc61dae5fe3b295751d5.yaml | 4 +- ...2046-1187996edf4177af89ef3ea40b60db53.yaml | 4 +- ...2050-2cf1a19662092e1fd3d184af328e1b57.yaml | 4 +- ...2071-6c06bc58e8c431cd39158598c7d3df3c.yaml | 4 +- ...2072-27463f760012793e1526cf6e69e5e624.yaml | 4 +- ...2080-a7ff75affe3888f63fffbde3a81a35a3.yaml | 4 +- ...2083-d5d7eb75824b8adafca40c78e85d9d96.yaml | 4 +- ...2089-b332e32a470aff42684e131c72a2c94a.yaml | 4 +- ...2091-182ea68949b1ee6faae255d4de23157d.yaml | 4 +- ...2093-783792bc349c3286b30c741d65b88b21.yaml | 4 +- ...2099-c27b32abd810b7ccfab57cf684c27b3d.yaml | 4 +- ...2100-328db48b412bf150c51734d4e256b1dc.yaml | 4 +- ...2101-31bb9a1a6021af8a029348a6ecc96852.yaml | 4 +- ...2114-7bb51482172811e3c51edf370ad2cde3.yaml | 4 +- ...2118-fb3335fd014953747fe67771d5c2fe67.yaml | 4 +- ...2123-1045ae974bdd8bcaee8ec5d4a243aff7.yaml | 4 +- ...2133-9d80c6cd84258efd69f77a8f06dc55b8.yaml | 4 +- ...2144-fdec704444e3056cbaed479252db31c8.yaml | 4 +- ...2148-ae77789cf095ebe5a3c15cc04f8354ae.yaml | 4 +- ...2149-af6a5ec90875038596d2be175f9973f4.yaml | 4 +- ...2151-1a94885b829a17aaf2fa1ae77773a27a.yaml | 4 +- ...2152-79f880a7e6c6b5f19edddfee4238c580.yaml | 4 +- ...1661-96bf3f16564c1ae9e8c567dffc5576d2.yaml | 4 +- ...1662-b2f452da67fdef518c0ca5b8fbefe3fc.yaml | 4 +- ...1664-94ffba477783a49fe859db6d419a4e64.yaml | 4 +- ...2169-4168c6f35e53b3bb6cbc2cd944aa14e6.yaml | 4 +- ...2170-4a64b780bf144c05e7e8310b30ac549a.yaml | 4 +- ...2172-9ed1e670781ff936317a3cc7c1d9dd47.yaml | 4 +- ...2184-cbb68fdfa6e0c8d1d1dcc60eddde34f0.yaml | 4 +- ...2186-ae1d09ace0c5a27260a5b15fa0f15e71.yaml | 4 +- ...2194-560fba5c90dc74d38384277269b51dae.yaml | 4 +- ...2215-ed46e202f3a956c555880fedcaa0b829.yaml | 4 +- ...2219-610d128e626440e80c8a487da8ac96e5.yaml | 4 +- ...2222-8d4bf28803761cae038f398e0f1dd848.yaml | 4 +- ...2233-b587c5b6b45c195ebb12bd5f55ed780d.yaml | 4 +- ...2239-e78bafbef882a9c48928d514c06bbb3b.yaml | 4 +- ...2241-3f695144fde56e5e68c9d7f131f8380c.yaml | 4 +- ...2245-e218b5d377826292a46ae91919228725.yaml | 4 +- ...2256-a42d8ff7a7669fd14fcfc52a34b52ce7.yaml | 4 +- ...2261-13d6d07ad8433fc4c13ab399af9c2000.yaml | 4 +- ...2267-b001a479011d319ceac5f48bfd2e6d39.yaml | 4 +- ...2268-dcb0952ba59e4cf6e5088fb4c3d3565e.yaml | 4 +- ...2269-b4286607d776cde455809a59a67464fa.yaml | 4 +- ...2271-570d7dad3e17c051e824f46c008efb18.yaml | 4 +- ...2271-8927f27721e1d8b23d2e73cb09a3c9b9.yaml | 4 +- ...2275-d194b7c99710bb89f1ee39dafcb5d71b.yaml | 4 +- ...2278-7420b38eef61601a8533cd300d3acef6.yaml | 4 +- ...2299-6b99b25706bc10b6938889b6d61c2c79.yaml | 4 +- ...2305-356d13b6974d8f1c305ed39531dbff42.yaml | 4 +- ...2311-3a24a068d1ed9da16159938c4295f7f7.yaml | 4 +- ...3179-ae016ddc716d42a85477445c62a5e437.yaml | 4 +- ...3183-a5138dbd3ab5f7be9499c9facaa915f6.yaml | 12 ++-- ...2325-d4a44b7e5865ae371b4706ab716f5f69.yaml | 4 +- ...2328-13464676c956740d86ef6b835803b913.yaml | 4 +- ...2340-a9e063bb904bfdeb89be1c3d634b4901.yaml | 4 +- ...2350-453fdd29f3b3ed3425776068af53e39d.yaml | 4 +- ...2351-5dcfc5ea6f05d00ca9432dc6e06a959a.yaml | 4 +- ...2352-afbbe261546ed611413e53ceb7e989bf.yaml | 4 +- ...2354-ee247de60df1bfe0f1ecd93cf598296f.yaml | 4 +- ...2355-2508566224c9697f712ccd556a0ee74e.yaml | 4 +- ...2356-2203cb02480ab13ddbd56959a93d1555.yaml | 4 +- ...2361-a04496fc12c107641a2dfaedc56869ca.yaml | 4 +- ...2370-53237b2a666711b5ed5327cacfdd45f6.yaml | 4 +- ...2371-4d3dbfcfc5bd83e1f32cd6ab14a72545.yaml | 4 +- ...2372-c5709fba92c5e77b429d3d6d877dbdaa.yaml | 4 +- ...2374-2a22d89645a206ec3980a097270f17eb.yaml | 4 +- ...2375-bbd0071d59903fe2f31999b2357a095e.yaml | 4 +- ...2377-0ac5cc81243c959ab88705244a2988b3.yaml | 4 +- ...2379-429ff280452993df8646f6def7c9d328.yaml | 4 +- ...2381-46393c1e973f37162a617bc152661e74.yaml | 4 +- ...2382-f700ae3c5b4e92d34fddc6f86f957267.yaml | 4 +- ...2384-eadc3f836bcbd93a1ac6bfbe3a4ccd12.yaml | 4 +- ...2387-bd2f40761a0dbf1803fa7290e415ab2f.yaml | 4 +- ...2388-83f22a47dbd6befc1b5b2de701a66592.yaml | 4 +- ...2389-17e239a9a613785a57f9dff8c47dabbc.yaml | 4 +- ...2391-0d2429a44660b0fd9009cfc551d51d85.yaml | 4 +- ...3911-ea71ac2a34dc7248e02bdf91d9e86e30.yaml | 4 +- ...2392-3e06725c467ed0bbc52c31de7579bce8.yaml | 4 +- ...2395-61c13420e3dc8f41c004527b0a6dcd7f.yaml | 4 +- ...3975-6ca6c33ebd7ae06f9203f7a1178920a1.yaml | 12 ++-- ...3976-87857021bf0d6b4f9e9f9a7926fd73da.yaml | 4 +- ...3979-9cac9db84fd0e9e4554d820862a40ccc.yaml | 4 +- ...2398-287b97d3800f658fb6c7787e238d09c5.yaml | 4 +- ...3980-2f087270cc2f0766f3522e85859f5682.yaml | 4 +- ...3987-a9651b358db184ef2f9f80cf3ecfa474.yaml | 12 ++-- ...3988-832185af76432ae76d6be1580f0d17e2.yaml | 10 ++-- ...2405-c232fc614c70c66e672cbac2a32ca9cd.yaml | 4 +- ...2407-8d1c748e2defc5d91fbb1dd267386d44.yaml | 4 +- ...2409-0c31a10cc87b13f4ea6563dcb29fd71f.yaml | 4 +- ...2410-bb563e95b48b650f94219f11430dd39c.yaml | 4 +- ...2411-5181665927ed9da562e36af3ea3ec2fb.yaml | 4 +- ...2412-94bc27f855a1b3e71ba6782c8361e04d.yaml | 4 +- ...2413-125fc22aa1fac173aaf79b805fc0dafc.yaml | 4 +- ...2423-6ebbfbf7f4ff52ef90502e505dd10d64.yaml | 4 +- ...2424-d6efc23acaa92418f6d5991825096389.yaml | 4 +- ...2425-7fd62997a96edc06785da25d5644aff0.yaml | 4 +- ...2426-d35fe59b43f4760392f4ec7a5eaa4ede.yaml | 4 +- ...2430-9c4cf933125615aec48f1e67f49080b2.yaml | 4 +- ...2431-6811835f1b3b62a667088ec060a91ec5.yaml | 4 +- ...2432-cbb1fea9bfad5a9264ec67a1ffb3cfd0.yaml | 4 +- ...2433-1e202ba9a2d031ffbc5309780a3c635a.yaml | 4 +- ...2434-2d86b7b96a584b0abcc7bac3e11b4cae.yaml | 4 +- ...2435-acdadfe8e1df89f0c7d26ae29b23fa05.yaml | 4 +- ...2436-31395bccdb490b805531cabc85d6de58.yaml | 4 +- ...2438-4787aca2f4649ac09a5532468944b982.yaml | 4 +- ...2441-ed507e8efb229061c654187b47c114b4.yaml | 4 +- ...2442-21742813963970be1b852e62999d105e.yaml | 4 +- ...2443-76c5ff841d2dc96506f10e16c9ef0103.yaml | 4 +- ...2444-2124b535b772d79cc24446b949f6de44.yaml | 4 +- ...2445-3cc251560d3b16f1b023b3769603bce5.yaml | 4 +- ...2448-69e740cf6c8c1abbdc55bae92d3a061a.yaml | 4 +- ...2449-0292116775ef708600542a7e8f86fd65.yaml | 4 +- ...4664-83059d16d11e2fca8e78916d3d8e8973.yaml | 4 +- ...2473-669b73ac27d820ad91a32920ca859ce3.yaml | 4 +- ...2515-292e0cc17029954da0392c71fc757409.yaml | 4 +- ...2516-8a58bcfdfe2c7ef0990c9f0e6222a7d9.yaml | 4 +- ...2517-a4b84494f2ca0459161168fd007453cd.yaml | 4 +- ...2518-93d3f42fb72b82260168d21150301cb3.yaml | 4 +- ...2532-fafa2caced18a7c0c4666d573df5d9d1.yaml | 4 +- ...2540-7c00a992b189dd605d955a517ab5ff4b.yaml | 4 +- ...2541-cac3c9ade2b34b60466d535155587563.yaml | 4 +- ...2542-474821f1bfc79c7314fe0d7eec328e34.yaml | 4 +- ...2554-47f4114397364fc89b3a25b4215574b4.yaml | 4 +- ...2555-2209fd38d31d7045610e08e5a8e2302b.yaml | 4 +- ...2556-f9bc7cdb6ab2ec4c7db8c04c4f500136.yaml | 4 +- ...2559-da98de7f074ffd80f7cb587c569cdd12.yaml | 4 +- ...5602-6e39ce305d8fc46246730df95c49bc5a.yaml | 4 +- ...5603-e066c5d256834fe1f65bdb778f74e19e.yaml | 4 +- ...5604-c09dba9091d0ee592d0a0d23f17cab8b.yaml | 4 +- ...5605-fde55a7ed22dac34f683215367ee2443.yaml | 4 +- ...5606-46ca57fda9611a4d8d3fe3eb2317d1ac.yaml | 4 +- ...5607-21b5e2cc1773e8a375d4b06283f1f75c.yaml | 4 +- ...5609-7da4dea81c55210aa215efa50cd5e1a7.yaml | 4 +- ...5610-1bbd8f2ed08db0b77690cb0df76fdffe.yaml | 4 +- ...5611-0e3b2109a8f3c98e6d7b288936c49e4a.yaml | 4 +- ...5612-0c7da527d5c5020bdc519d1c19025768.yaml | 4 +- ...5613-d173f6ac48d7132b733f53a51a70ac65.yaml | 4 +- ...5618-983af3d35ec99acfdee458670c0dbf30.yaml | 4 +- ...2563-14663e06b0c267ee32922b2e7b917924.yaml | 4 +- ...5649-5e2a21e34446161fac44e66bf2f9139e.yaml | 4 +- ...2567-7cb4dee16a7431d0aa1859c958e33f53.yaml | 4 +- ...2574-7f939cb3e37ce54ad131378445cfa889.yaml | 4 +- ...2575-daeaf69e03551f5a39540769cb2822ca.yaml | 4 +- ...5810-4b35d32175d8c6a60caf01bbc915cbc9.yaml | 4 +- ...5811-f437ea7631a9816d78b50dbf1934085a.yaml | 4 +- ...5812-a687f130dc4fb0dc3fa1596936a6c928.yaml | 4 +- ...5858-c3dca1d1ef3a946c9ddf3e33caa00021.yaml | 12 ++-- ...5858-f9078038dec7d199edb0413f76661495.yaml | 12 ++-- ...5860-bc55ea7b509124d1a77831d4400c5030.yaml | 14 ++--- ...5912-73081b1f6f4e13a9e6e969eba5e746fc.yaml | 12 ++-- ...2593-3d5b724b4980f24cb96bdfad9d38ad3d.yaml | 4 +- ...5952-e3ab5ea87cccc6d9dbd7e7c3ec127075.yaml | 4 +- ...2628-1a5f08a913b9e66bca4a1d7c16d1cb52.yaml | 4 +- ...2629-4f0560b0cde9af506953920ade591947.yaml | 4 +- ...2635-4cdab5a4c9d1ef359c9ea3e65c6cdb07.yaml | 4 +- ...6366-a74fb6f00e03de1d4dc066ebae34f69d.yaml | 4 +- ...6375-414da17bdb4a780711966608cd7b68aa.yaml | 4 +- ...2654-94f85d394521a13053659cf48cf14634.yaml | 12 ++-- ...2657-fb02750d498a9fe091fa40a841ae2cde.yaml | 4 +- ...2658-b804d82967d372f1edcb1ab799e70f37.yaml | 4 +- ...2695-3deace4984f0c809f54b31e2e6aaea40.yaml | 4 +- ...2696-211f53d8b1b52b0d7d117c8d6be4a364.yaml | 4 +- ...2709-402db9fc1f91d6a610e9186418e3f339.yaml | 4 +- ...2710-b5b3c8eb6791ecd6029bb9d46ed89ac0.yaml | 4 +- ...2711-8f60c3b6446189e3058b9237676dd33f.yaml | 4 +- ...2716-a11c0611909385052cd0aaeced3bbff4.yaml | 4 +- ...2717-dbd794ea76909c06feaaa4b067d9c221.yaml | 4 +- ...2718-14278d198b70b2e64cd570f29581f83a.yaml | 4 +- ...7231-2a14d3fb0a465f1cdb9f64f93f69aedd.yaml | 4 +- ...7235-50f3815a7306e514f6cb6f2669b958ed.yaml | 4 +- ...2737-3d60381961999c332401ff6c0d1b2fcd.yaml | 4 +- ...2762-70956e63e550605d8f25a09facb07794.yaml | 4 +- ...7628-11c10e4dc5f28f5f7b4e3c822488409f.yaml | 4 +- ...2763-9c5f430746b739fbae6902b53c806e7a.yaml | 4 +- ...2775-b95feef4ddcb37164d4f7af73136c4f2.yaml | 4 +- ...7844-261f8d0d96a6973bf1fe24c56cd5b3ec.yaml | 4 +- ...7845-c591f3e0b0e6607bb02f8ca1122eb1cd.yaml | 4 +- ...7848-afec02ed4fb861008e492afadabc92bd.yaml | 4 +- ...7852-d8468ce3a3b28bab55fbd9d9d45afc3e.yaml | 4 +- ...7853-53bd8ee68daf44e8898790dff3d4d891.yaml | 4 +- ...7854-a2c4b877b0651ff620e8169263705757.yaml | 4 +- ...7855-e08a52f680b625be47e9beebec7b3154.yaml | 4 +- ...7856-b5b013b649a98c215832bbde298896e0.yaml | 4 +- ...7859-c95f7d5b525da0435460cefad8d11b57.yaml | 4 +- ...2799-9029119eb68fd27e882d54dbd4a742cd.yaml | 4 +- ...2823-ed137f483ea3e94091bee5b4d772d058.yaml | 4 +- ...2863-c09b3bbf7fa2f9da4c4d07cfecb5595a.yaml | 4 +- ...2864-14a6574b6d9fc13262269a727d440dc3.yaml | 4 +- ...8700-37be249d4dba046bd5576085cbb2729e.yaml | 4 +- ...2887-47415a21e09795154df1ff35281901c5.yaml | 4 +- ...2903-a2ca90e41d2e5160436c08c965469eba.yaml | 4 +- ...2926-30d61c53466fa58934f9b72c5790a166.yaml | 4 +- ...2934-e9ae67bcdb286ec58db8997d8a78829a.yaml | 4 +- ...2935-d213e2e9594308f580bdffdb06a3d065.yaml | 4 +- ...2936-eef599f42089077d3f1367aba810ab3a.yaml | 4 +- ...2937-f12c6444f5c306cf6d2f74b5d9b1f8a0.yaml | 4 +- ...2940-193e887d8efbd63f7ee64b85c4a576a5.yaml | 4 +- ...9406-092e64b42de134fb4233d6bec85b9415.yaml | 4 +- ...9408-4039c397e350c84a436243d9a4f3eab1.yaml | 4 +- ...2941-5b8cbfd6e3ba79c4725fe838c412c514.yaml | 4 +- ...9410-43b828ba6ca06e13c96e8d6957a25d26.yaml | 4 +- ...9413-3ba7758def7bb999accbbcf70be2e182.yaml | 4 +- ...9414-218762f76a47ddcb2051ebcd055069c7.yaml | 4 +- ...9418-d2a99368cddd63664c69600c9b7c92a3.yaml | 4 +- ...9419-af2ae774d22378ee0a69d1768e15e475.yaml | 4 +- ...2942-e4fb6d249b711115cf1c72af2ed8bb4d.yaml | 4 +- ...9420-8078b4f9949ef9f89bc0fb06a9571b7f.yaml | 4 +- ...9422-2e3506811e52ec17c7634c4366161915.yaml | 4 +- ...9425-d9b04ea1292b41be830780f6e6d01550.yaml | 4 +- ...9428-596c1534922e10c637aff8c9e7564a21.yaml | 4 +- ...9429-989eb9c3cbf3a8a65b24266fa6fa3458.yaml | 4 +- ...2943-581efb108579060acb9ef33538e40085.yaml | 4 +- ...9430-63d2a51e3e8824195c3d41033688aedc.yaml | 4 +- ...9431-47c8baaa723b461feba125f5d75cdf5b.yaml | 4 +- ...9432-0c5b7f509db51c1a7230bd37febd24a9.yaml | 4 +- ...9433-7af5a8d75570b9733bf6f036d3311f98.yaml | 4 +- ...9436-429616022004f10edfb6da5df655ced8.yaml | 4 +- ...9437-9ea1bb5d162409cd77ba612423f2f166.yaml | 4 +- ...9438-6df2df1f538663a4b281d00b01155047.yaml | 4 +- ...9439-8d331ddadf2ec92c698925fb701e1625.yaml | 4 +- ...2944-0c91dc81841b4946dcdd188b1f4f59d9.yaml | 4 +- ...9440-bffa3ebfd0f8f4eee0788789721093cc.yaml | 4 +- ...9442-28a0fb0e5795f11d3d7f2a955c95e65c.yaml | 4 +- ...9443-164126146e9a645f77469a8e4602aa76.yaml | 4 +- ...9445-66e44ffd73c4157b210becf5e5234e8e.yaml | 4 +- ...9446-d41f2371740382f5fe12f9b2729e260d.yaml | 4 +- ...9447-4e07fbfa9287b3d698591e747048b894.yaml | 4 +- ...9448-013a3c9fa700970f10b7bbed788f507b.yaml | 4 +- ...9449-6dff8ad57b57f849baa2c45d3ecc2834.yaml | 4 +- ...9450-de7a5d3d23cd7a255b8c43340d197b1b.yaml | 4 +- ...9451-7625842be5b20a912d85c30fab35389d.yaml | 4 +- ...9454-27610b5571a30e556b64bf5b8d096808.yaml | 4 +- ...9489-783f372f4644686742e160ed2c3ab92d.yaml | 4 +- ...9495-e90caa361b62564e08e191aa073473cd.yaml | 4 +- ...2958-8e5d590ef949dabd3bb7265d663cdfbb.yaml | 4 +- ...2981-2ee20ef00c8dffbd5ed7b6a797548996.yaml | 4 +- ...2983-dff51ecf68a2a27471cd48bde63ce4a2.yaml | 4 +- ...3021-46b167768e3cac0676fa19e5201075cc.yaml | 4 +- ...3024-600b942b044271afb765e6ae63286c52.yaml | 4 +- ...3025-1ad3a36baf4c9ef732b67d8d092f21e4.yaml | 4 +- ...0337-853440dc6a0bac372d49c0a52406c979.yaml | 4 +- ...3036-c3ee6aa7cf2263de71bab964716588bf.yaml | 4 +- ...0533-6a51878e913acce27812b845eba68b33.yaml | 4 +- ...0536-dcbc0003781c6decb5bf6d916532822b.yaml | 4 +- ...0544-b58caf3062d49a3b707b9a414cc1dfaa.yaml | 4 +- ...3069-4626cb693582f4ef4c3fd754ef5fda3a.yaml | 4 +- ...3070-213c6c67e9f7d7367e5fa5ff895afa34.yaml | 4 +- ...3074-53fef4883b3ae390bd3ce74f9e9ddf6a.yaml | 4 +- ...3076-5fc74cc66f5330c5bc45fdae1ec9ced1.yaml | 4 +- ...3082-14052cb4248c1d727995c47dc9e235be.yaml | 4 +- ...3096-f6fedef4900f687723635382ff2bb4d5.yaml | 4 +- ...3097-fdd4bded1dfa98b42ec68b8794019fbd.yaml | 4 +- ...3098-02f07014b96a3edb2c7f1b16bbe0bd90.yaml | 4 +- ...0998-61ef4484d482c37a0de9af18fac5edf6.yaml | 4 +- ...3124-cf17a017c60d948b78f758c0612d102b.yaml | 4 +- ...3125-9d01a3c1450589963802e2c82f79a1da.yaml | 4 +- ...3126-912300bb987f9b62927bac6bd20872ca.yaml | 4 +- ...3128-11d8842f155c393e0c8cf7dd8d4ce45b.yaml | 4 +- ...3131-967dff727dbc42b5a7eb2d15c9e083d4.yaml | 4 +- ...3132-733ee63acd3da1891d75d0f23730ff92.yaml | 4 +- ...3135-40b96ba14c189bc5294c696f541a5a2a.yaml | 4 +- ...3136-d503115e692639756bb3a2ffdde34c03.yaml | 4 +- ...3137-aa1aed011557ee5dc2bfa06501123a9e.yaml | 4 +- ...3139-c0079d75a97eeffbdeb6d0d0f4759f91.yaml | 4 +- ...3141-17f9d007266f9a0cab0ee55eb44edcc9.yaml | 4 +- ...3142-9eff154e275679aff481294211504cad.yaml | 4 +- ...3144-aaccf9d8425eddd13e4ac4f8c70f1e50.yaml | 4 +- ...1475-eee72fcaef7d6d7710f8503cc05b2365.yaml | 4 +- ...3149-ece3289501587998363581768a050e75.yaml | 4 +- ...3150-31292a415c3bd76b8562016d2514c1b7.yaml | 4 +- ...3151-990bebfd04ffccf7784d9ed7851bc9ac.yaml | 4 +- ...3154-ed2236ee570598966dd60e4e75f31def.yaml | 14 ++--- ...3194-5ad44d8edf07e29935fd9f2a379a8bdf.yaml | 4 +- ...3194-98e27e4b860cdb80f775d8dcf8849471.yaml | 4 +- ...3208-f1ab2ba9aab33ab61ed9ab0dbb6a8c74.yaml | 4 +- ...3220-c25a227d2616b1e266b27ae90761f594.yaml | 4 +- ...2280-3f7130e05b74b1e5f65b8d9e77a1373e.yaml | 4 +- ...3237-13a0eed39cd76523725bdb9ac6f8ad2f.yaml | 4 +- ...3240-de62fa1091876ce7733352db2cec2f12.yaml | 4 +- ...3243-e5b4ec8d38e3122f17a3232664bd3572.yaml | 4 +- ...3244-dc21ebc00161a8071a291b6ff6e22872.yaml | 4 +- ...3246-5b5598cebbb5b08b875d9ea03d9a72bc.yaml | 4 +- ...3247-cefe6e830adb746b2199d03b92e9b0d3.yaml | 4 +- ...3249-4e6e2faa30d1cb67b640ff4b64c7c434.yaml | 4 +- ...2587-62e712c4c51e2629997a1a286dd08453.yaml | 4 +- ...2776-0ce7e54d96c7e37996c0287c3e487a8b.yaml | 4 +- ...2970-eeb643b56c37992255be8d889b1e9ae2.yaml | 4 +- ...3300-e23a8ff0f941885439bb6eaa6879d8d2.yaml | 4 +- ...3302-bf15f8f75324665dbab0a976954762a4.yaml | 4 +- ...3191-2ee541e9c869c15a8b871966c41047ce.yaml | 4 +- ...3201-83cdeca9a177bee255e863b7e36aae57.yaml | 4 +- ...3334-3fc9a3fcf79cc1897ce2e887e3d3f73c.yaml | 4 +- ...3336-6be2333e24bb1c10a3a6c889899366b0.yaml | 4 +- ...3342-aec751941690d89755638c950f64d01d.yaml | 4 +- ...3343-dda12396183ee405a0b6804083230616.yaml | 14 ++--- ...3350-e445dff1dbcdaa9bae7b0592b35676e6.yaml | 4 +- ...3361-80c655d3d796ab546d2bd2d7a2a197bc.yaml | 4 +- ...3366-90e136f1c49e3c12cb6162b882a23711.yaml | 12 ++-- ...3374-219e356df9406ff61a0cdb8030ff8ed2.yaml | 4 +- ...3380-c7389b248c40364239ac72c9e1e9985e.yaml | 4 +- ...3383-18ceaed7f43455d18367a3a1c3285ab3.yaml | 4 +- ...3384-674e9e8ffc19e4d579a57273137742ea.yaml | 4 +- ...3391-3c6cc9490d009d5c5e5a38130b58bb8c.yaml | 4 +- ...3392-e4bd7eea0fd05e8e2fe20b6f0c6b7046.yaml | 4 +- ...3393-7b65c39ddbda37096522c90c94a9d953.yaml | 4 +- ...3394-92aa647881d350b340f99ec0dcdafcc3.yaml | 4 +- ...3943-629a86e61ae281b9190188a5f16e6d8f.yaml | 4 +- ...3395-c8d77620d025f09aeefa4638ee5b37e1.yaml | 4 +- ...3960-aa18dc73a5ad2f3458b2829a667a4dbe.yaml | 4 +- ...3969-5dac27116865bf3a33881aeb2e87a891.yaml | 4 +- ...3970-51577bdf9a059e7edb1dda702623d2b6.yaml | 4 +- ...3987-05c2167f7f1f78fa58c980d418931b2c.yaml | 12 ++-- ...3400-76570c8af26fd8add3788aed77d646fa.yaml | 4 +- ...3401-8d874ea95f55c0ec9bb8e08a17ec4807.yaml | 4 +- ...3402-5a93acfe5c571ac99fbd0be363e6f484.yaml | 4 +- ...3408-7fe1343755ae3216e2612ce9dec35f72.yaml | 4 +- ...4148-8eae7ffaabe0ed4cfdd5b1537b7b4d67.yaml | 4 +- ...4154-ac9050df076297964363495b9c075e7f.yaml | 4 +- ...3416-4578c261077bba561117707849a7d191.yaml | 4 +- ...3417-1b6d42c938576bb7e9892a86129f9bc5.yaml | 4 +- ...3418-6e8d8a68dd9873805b5f71eb69761022.yaml | 4 +- ...3425-d27196962105bff471a16f16aa617461.yaml | 4 +- ...3426-46e70ce2d5b65ea57e5b89cf696f0367.yaml | 4 +- ...3427-34e1ea4c84115991aa9040d8463cc384.yaml | 4 +- ...4344-ea695aba033f5eaa6e1bbebc4ad1cb3b.yaml | 4 +- ...4347-cb8528ea228de7c195be74b03a1cf056.yaml | 4 +- ...3441-a6ad4e1a267f3d946e1e2e12d5bebc25.yaml | 4 +- ...3451-8e787a46ad14cecfaea14ee098f61614.yaml | 4 +- ...3462-4f5affe3e6d10944ac86113d1e4881da.yaml | 4 +- ...4648-5c305c85e58387c07315e703af6d187a.yaml | 4 +- ...4650-ddd0e9486fe68ad8ba91d2369f80747b.yaml | 4 +- ...4654-a5a6d2493729bf3090ce1785835756c3.yaml | 4 +- ...4656-ab0d8c25a4b5735f6b566693ae1e6b91.yaml | 4 +- ...4658-300ac7058f885b1b1ecbf0131074eaf1.yaml | 4 +- ...3469-d368d355a42efc82f9add75ee0c1d079.yaml | 4 +- ...3477-bff7cd3ae66179edd6f79145d30bd8a6.yaml | 16 ++--- ...4839-11efe70fd2ae23707bfcf341a18862cb.yaml | 4 +- ...4853-b4bab111be528a55d6c4bef04962870e.yaml | 4 +- ...4868-d03a599615f97ee32ed6c9f069046608.yaml | 4 +- ...3490-d8db32c50c0bea30a973b5af0530e9fa.yaml | 4 +- ...3494-6f528eadb66a9354628a303cdece4106.yaml | 14 ++--- ...3506-38bcc8fc23f5e64dd2298c12f27f47b2.yaml | 4 +- ...5235-ec9c194a00305798df823bbd977744c9.yaml | 4 +- ...5242-535595f4b0854a5ba3ef769bc0a6d8a1.yaml | 4 +- ...5277-9fa773be7e5cdf580182e19b1f6e77fb.yaml | 4 +- ...3536-9572375f1a63fe71cfefeb901690b502.yaml | 4 +- ...3537-226373864d57cc20f7f59dea62a55c3b.yaml | 4 +- ...3538-200b5675cd7f93f9a3a59f8b16a025dd.yaml | 4 +- ...3539-16fe73a759651a7d3bcefdb3b3d57eae.yaml | 14 ++--- ...3558-7ae4217671bcb5c8f6efe46ca1b8db85.yaml | 4 +- ...3568-ca0bad06790922b16f5da17ee6db4bb8.yaml | 4 +- ...5725-f00922a5d35b3c6ca276e64048795ab0.yaml | 4 +- ...5726-371f210cfb55319010fd16b3a7c4efca.yaml | 4 +- ...5730-40341532c7f84f3b54f6d735c45b3460.yaml | 4 +- ...5882-95b4227a0d3d41c249f2bf8ed2c425e5.yaml | 4 +- ...3601-af386a5b7a4c4897059c13e07ba6a1c2.yaml | 4 +- ...3609-e01c69283b147d24245068f3ebce49d9.yaml | 4 +- ...3610-c5989c384ff1fa34fed277024ca7c660.yaml | 4 +- ...3618-d06ebbe7f6b16be606d476a52581f74c.yaml | 4 +- ...3622-21019b02ab939e1588f34c6a653e9f06.yaml | 4 +- ...6282-3a32aa7a18d47ef0f7438986ced63310.yaml | 4 +- ...6284-6dc63a693616ad13933a53bb0a4503d9.yaml | 4 +- ...6285-31f526f5fc6023df268597ecb0e81e2e.yaml | 4 +- ...6288-dc8ff7d3332154eb2062f549788da3cc.yaml | 4 +- ...6292-acd433b1de86848d8124ba9bb8ed6ee0.yaml | 4 +- ...6296-adf2d29be020721f57ebc8e5c323f1bc.yaml | 4 +- ...3631-c6fe3e98ca720b92fad33bdf271aacdd.yaml | 4 +- ...3632-809d63af1f69964de8a6d451fb63eac3.yaml | 4 +- ...6340-845e9efdcaa8e86ee95dfb613d1c9636.yaml | 4 +- ...6341-d1f3834e2f95aaed2e601e83a20e5d59.yaml | 4 +- ...6346-b87b09efd2ae58c86dc8e5fdf3e23221.yaml | 4 +- ...6347-56be40d6cceb101df1647cdc9530b1ac.yaml | 4 +- ...6352-2f992f86ff54d554aa2e677bbff33be5.yaml | 4 +- ...6355-c452417a821be37f2cab44c35d2fb224.yaml | 4 +- ...6356-b758c0c37fd1d990bf9268c1c848eb10.yaml | 4 +- ...6358-d05a6b8d7f246d51e5c6639ab5b124d6.yaml | 4 +- ...6365-c67d4649ea18743c5c7a2e3701c4b78b.yaml | 4 +- ...6373-498c92520d857cb30ad7df8aa299fc2f.yaml | 4 +- ...6375-02e92fc9d8edd2a31ef37844cc4fdd57.yaml | 4 +- ...6378-f7eaf9b938a6df4b39be6616b2432caf.yaml | 4 +- ...6379-10647c17dbf9c37ea854931ce84957f9.yaml | 4 +- ...6383-9c32419221ff25df45de1a2bef4b454c.yaml | 4 +- ...6386-aed64fd523c0d1b492fdf86a110cd8b5.yaml | 4 +- ...6388-099d72d33b89027185d04eec96bd1d04.yaml | 4 +- ...6389-83e4f665f1af2e601634717e68062856.yaml | 4 +- ...6394-f99fe05b2429bd9e4943506324d48d85.yaml | 4 +- ...6401-6cf5df1f5906c35e420af33d77451aff.yaml | 4 +- ...6404-7a3d9d99e440e4df9bd78305e509f883.yaml | 4 +- ...6405-f4919b10c6f7c2a14e1c7d5b8a3f99cb.yaml | 4 +- ...6417-27fde2e6c4a806f7a102ac0a7cda9a14.yaml | 4 +- ...6418-6293b091bc766206bb45c5e76ab63e4c.yaml | 4 +- ...6425-03b179e5beb399c252262dca2e1c2a47.yaml | 4 +- ...6428-f5bd530013958004252bd14d740d1932.yaml | 4 +- ...3677-21d84dd234ad676a469c1b281a9da497.yaml | 4 +- ...3679-884840a442619cbc5a7daf95f85cb6cb.yaml | 4 +- ...6791-0b90da005dc4b695e711677701780a3d.yaml | 4 +- ...6798-57d7eb4c0bda23c172922977bec66f98.yaml | 4 +- ...3688-c453f0ecd6a4881debc7f71c36086298.yaml | 4 +- ...3689-8afa46038c928522e1a939b693fa3626.yaml | 4 +- ...3690-535ebdfe2ca4cb1641e4a25814726229.yaml | 4 +- ...3694-d016ddea2985e3c1ec3f3ed31d67329b.yaml | 4 +- ...3720-2ce3da9cb13ca01fe4975c718c0361d4.yaml | 4 +- ...7328-4dec1d95d84aa9956ba49479ab4962de.yaml | 4 +- ...7330-363aa4459971c85215990cb3c8eb5496.yaml | 4 +- ...7335-6fde6e46382738cc90cbede415252e23.yaml | 4 +- ...7338-d5a23abb517a497649fa5fae9ebed1d6.yaml | 4 +- ...7339-a2ba0d175d26a5652fc4c3dde4656860.yaml | 4 +- ...7342-d3a3435dfd803c8984d494bbdacab67a.yaml | 4 +- ...3739-d89cd4d50e467aee5b89a046ed25a308.yaml | 4 +- ...7402-a3cdd5fc08475bf0155bcdf233d6ccac.yaml | 4 +- ...7403-473bd673aad6ebbb1666b1cd91242034.yaml | 4 +- ...7404-d039001c0af8cb5076be473a89522a72.yaml | 4 +- ...7405-367b17bcc7fd153764ffbb7e174fed0a.yaml | 4 +- ...7405-415ed972729f96565976948d92875199.yaml | 4 +- ...7407-e067b113a87087f2914c0d765908e157.yaml | 4 +- ...7411-31a8072de701550e4edcf2604b9e23bf.yaml | 4 +- ...7412-fdec0718eabbae53872d03fa70d141a9.yaml | 4 +- ...3747-1b89b5eb4288496d851956ba01f7ee38.yaml | 4 +- ...3750-3b38633cbeac82c001940cb4aed44709.yaml | 4 +- ...3753-c206b1ef471fcab481cc325e40071db1.yaml | 4 +- ...7599-bd26ccd939104e13f73f569b312459d6.yaml | 12 ++-- ...7601-54bc1daf26907dc59a5c7876a142ff1b.yaml | 12 ++-- ...7603-1951707b594e6f4a4e8e4243b43c9841.yaml | 12 ++-- ...3762-127ab045dd12eca20b1f05cdaef8b291.yaml | 14 ++--- ...3762-ed8996a111dbc40e1e02c2318552499b.yaml | 4 +- ...3763-3ae6c1779315005d2af44a96ee77af2d.yaml | 14 ++--- ...3763-bd1638a89aa7173589958124d15f2afb.yaml | 4 +- ...3764-b7888b843ebf167b77c4d303a6db54de.yaml | 4 +- ...3768-221016fc8948bfb930fdcdca33f79836.yaml | 4 +- ...3769-8e5a5c6c98d5ff17214ae536b2646317.yaml | 4 +- ...3776-2624b69820d22e5b5127f2b411babf77.yaml | 4 +- ...3794-39f38e457d08269c0a24a582767d3dfd.yaml | 4 +- ...8055-df308cf6b44530f23e6aa9e16f45633a.yaml | 4 +- ...8057-9e3753c62120a17f21550a2c92d7d0fe.yaml | 4 +- ...8058-26e6e5cc3851b03fa772529952303fc4.yaml | 4 +- ...8061-80eb51ecba5ec678d038fbafb9f76a3a.yaml | 4 +- ...8067-09740a555ab133389f0f6571fce0ae84.yaml | 4 +- ...8068-0bf76c13f5d059f24c33a04b1579ea8d.yaml | 4 +- ...8073-1f2a06a643f40ca267bd342499fdc692.yaml | 4 +- ...8074-5c2247e17c791b6fdfbffdac85a13840.yaml | 4 +- ...8079-897959e22c40ecc199bf5dc5042856a0.yaml | 4 +- ...8085-353927ae64af5c6eafc196b5f94afe9a.yaml | 4 +- ...8086-9485da9dcc7a2c1f998297394d9f2737.yaml | 4 +- ...8093-52b9b171189fecca507b9059a4e2fc92.yaml | 4 +- ...8095-37fc83c506180cf381ac5dfbd233eafb.yaml | 4 +- ...8104-4f4db8cd21765548f8ac243b07d65419.yaml | 4 +- ...3811-7bd73acb3e7a0bf377aeb77c95eb6b8a.yaml | 4 +- ...8135-b019cad8ad64e7103a4ef60d49f6dea3.yaml | 4 +- ...8137-4570eda0c03b7f7b441d2c3a25dcd80e.yaml | 4 +- ...8139-29636b68c2f3ab161e7a045474b91034.yaml | 4 +- ...8139-54337cab42839ec3b613ba98b54eca17.yaml | 4 +- ...8140-83717a76e7400e087835909cd79a400f.yaml | 4 +- ...8141-1a3d5e6e024266b84857a352fd89d5d4.yaml | 4 +- ...8144-5fc70b9a54a47a4a18b6ce16ce7c23ba.yaml | 4 +- ...3822-6fc6438dcbfd4ff68526e6d482fa74a2.yaml | 4 +- ...3823-2f0c52f572204949d9dfa707ba4715b5.yaml | 4 +- ...3824-d5f34e92eea10518421633a7bf6a6987.yaml | 4 +- ...3828-66fc8c140dcc821532233cac0866d8de.yaml | 4 +- ...3829-335b776cd554e8913d4f10e98e262ec0.yaml | 4 +- ...3830-3e7f60a3df49d0f7fb4057d158598ecf.yaml | 4 +- ...3831-eab309830ae20eeb18b4936d022eab3a.yaml | 4 +- ...3832-2b23e7bc36f5649501747aa394af6972.yaml | 4 +- ...3833-7e3662ab11c3565756d75a405c4e3374.yaml | 4 +- ...3834-44fe84770decd19120a8d913bc09bfe5.yaml | 4 +- ...3835-03920cd9ca5ff22b06a994a5f8a5fb1c.yaml | 4 +- ...3836-714e1a158166a33a7b439bd28dcdaa32.yaml | 4 +- ...3836-c4ddc0489c7fc6327da43ce100fae835.yaml | 4 +- ...3837-15a33f4bb5e2d06a85f82ec34f8865fa.yaml | 4 +- ...3838-94f3a814c03c449b36cb253d7f80d949.yaml | 4 +- ...3839-5b728c0f0ab67d66edeb4ee534a33e19.yaml | 4 +- ...3840-a6981c5b5578853614f986e96039441b.yaml | 4 +- ...8454-a98db6a35902de5cbf34db4eed4ead5f.yaml | 4 +- ...8456-a9cc73f9037d9cdf674a96fc1a0c0e0f.yaml | 4 +- ...8460-b3b2af8cc00699a0018afcc81e707f41.yaml | 4 +- ...8461-1695c167f694fa63c272f7b2c5254e2e.yaml | 4 +- ...3848-f267d62c47f700236f07eb0616a44f03.yaml | 4 +- ...3849-7f2ad53d025d64620bae59b467d70f5b.yaml | 4 +- ...3850-ef26eea08cd48a0673b556bc7ad08135.yaml | 4 +- ...3852-a514896a8210fef61861b6a5fb93d0c5.yaml | 4 +- ...3855-540d765197d5d77b942283129699e946.yaml | 4 +- ...3856-d103dcd12252c06ef076f4cb74df842f.yaml | 4 +- ...3858-d2f186fae58d1b5afd77fc5306fc26bf.yaml | 4 +- ...3860-240ee5ac158ce434b1247f54a6208c44.yaml | 4 +- ...3861-c3f3aac4022202f47e3ad7f05ff237dd.yaml | 4 +- ...3862-435e5a4b20bcaf9d0c9ffb3797d6604e.yaml | 4 +- ...3865-9e9c8555eaf480676d3bf05dbd493869.yaml | 4 +- ...8703-2cfa41593b5c54dbbe7f94408a704c8b.yaml | 4 +- ...8704-73f794bdb6d5d5ebc6d4220191ef5dda.yaml | 4 +- ...3879-6b187667244750832b7e539032f73d81.yaml | 4 +- ...3880-6e0c5ff8c6831d302f08813c9570b138.yaml | 4 +- ...3881-509c39acb39a633805d6b569fc41a485.yaml | 4 +- ...3882-da896910a5cacf8279e4d7de14e16a7d.yaml | 4 +- ...3883-24b1f52e6cf57fe2a2edbecda487edee.yaml | 4 +- ...3891-4d29004b4f45680a61808cd7f630a100.yaml | 4 +- ...3892-ef86ab7f523579cf61ae7ca65b0017ce.yaml | 4 +- ...3897-9760015c4d350e201fad6b9179af7df3.yaml | 4 +- ...8971-c0fe1fee8a4f48d20fef6e8a451cadaa.yaml | 4 +- ...8974-46fa110da1e59fdc31ecff31d6e6ec62.yaml | 4 +- ...3898-9d26ce45ae3e2b9cd30cf1aaa62ddd92.yaml | 4 +- ...3899-f6f5e5b83dd05b47087018ab93dc70c8.yaml | 4 +- ...3904-89e45ac29496786a2f26bbad510d04b9.yaml | 4 +- ...3906-9f2fa558a3b450f42672af408bb3b106.yaml | 4 +- ...3907-c0684cce94d057969c2bd8df09557f34.yaml | 4 +- ...3909-5f015fc98ebe61708b30f8e106c0dca9.yaml | 4 +- ...3911-e4dfba623e207111ac2894d0b05e0171.yaml | 4 +- ...3912-f2f2b27ba49b35955a269b199809763e.yaml | 4 +- ...3919-38ff57a3a79c762236aaaeaffc92c374.yaml | 4 +- ...3922-bada82132f6cbfd33d5760be8742a9cb.yaml | 4 +- ...3923-e8ed3a408ffed7b696f1556afff0400c.yaml | 4 +- ...3925-0b4ca30f3ad4ec80ff7de93b32a4ae21.yaml | 4 +- ...3926-cbceddd57d7051d45761e4fa44eca556.yaml | 4 +- ...3930-3ca2c37cf2bcc2a6f7bd7d384d01930f.yaml | 4 +- ...3935-038cd4d7f3a85c2e02153b9f3d732338.yaml | 4 +- ...3936-3251ec6afe785e3bef31ff4841e744c5.yaml | 4 +- ...3937-cdfd3455a6f46d912895a672ab21e1b5.yaml | 4 +- ...3946-cfe5fa3015f2fc55d2b05163019ba81a.yaml | 4 +- ...3961-6547c1d240217acd0e74acb8773a56d3.yaml | 4 +- ...3981-64ebdeacfb7857f81240b567b724e6b3.yaml | 4 +- ...3983-8648ead24f8ede303ab8621f146c3147.yaml | 4 +- ...3984-91cbfc58418f178a67da5f57d5fe8aa8.yaml | 4 +- ...3985-affad12bbe06868aff921eeaa6373196.yaml | 4 +- ...3986-8a4ffb5cbc3cc45c48f96fc0d6e8fdac.yaml | 4 +- ...3987-85a882f3a47555e7fcebe3d512a6eae9.yaml | 4 +- ...3991-7457dd966d0c4c8ae20cdc84ea24da94.yaml | 4 +- ...3999-39e0cd9a1bb57b7c976fa340879a57c5.yaml | 4 +- ...4000-bbc1707c7a5ee3103ec07e525a958c37.yaml | 4 +- ...4004-2930d925944c874731b469b90d98e5da.yaml | 4 +- ...4005-40014647f15550cd9dd8d5556a2d8ae1.yaml | 4 +- ...4010-f33065d14f70bf7433189e427d984bdc.yaml | 4 +- ...0128-585b04156d64682d18676fed41ed4dfa.yaml | 4 +- ...0131-67889b4ef1ae0d338be85daad64d3e7e.yaml | 4 +- ...0132-bd3f97a6db76b6dcae059be482b558f5.yaml | 4 +- ...4016-2594adb9a7b091439405e835629ab066.yaml | 12 ++-- ...4017-58678de90c143fa9b35140b23ca7ba6c.yaml | 10 ++-- ...0191-ddabc756c7ddb5aa3f2db005373f60ba.yaml | 4 +- ...0192-7796a6543f11d887deb3ec9c31928648.yaml | 4 +- ...0195-bc6751aa5110381a68bfe443bb0b5c6b.yaml | 4 +- ...0200-180565f2bb1ffb1d14acebaf2b798b98.yaml | 4 +- ...0203-13af69fc3b4639d4eee1c5f8765f3113.yaml | 4 +- ...0203-9036eb8b1e0f76afba77e37799b01f92.yaml | 4 +- ...0203-bcf8e746293c2a8c7e07a4dcb5e63f07.yaml | 4 +- ...0203-fc8048569d06ebc90ac21a7212b76518.yaml | 4 +- ...4021-ca60ddb788ce2ba7421ade305d793252.yaml | 4 +- ...0211-6377ab76651d16deea08b67670c91822.yaml | 4 +- ...0213-d8076a607a4a2cad3434e6393a4159d1.yaml | 4 +- ...0215-e4bedac25bcf1a2f58f7010119167cc3.yaml | 4 +- ...0216-cf8da83f0f83eb1a574fe335e5527411.yaml | 4 +- ...0217-a281a6daee68ba362dc7d77d71441ffb.yaml | 4 +- ...0218-299542a4c8b3958179820e8901ce5f1d.yaml | 4 +- ...0219-0f224f68bb34d36af769db2549696ba9.yaml | 4 +- ...4022-ffa9b508bdc94d69f110d4734885da09.yaml | 4 +- ...0223-347f040de616333a1a9814dd7bc708c0.yaml | 4 +- ...4023-d5d38bc96ea3d80c250cd1535165fc1d.yaml | 4 +- ...4024-44a36b31780ae752545fe7f279378677.yaml | 4 +- ...4028-1385e98bb73a78a4b3298f9d107fe144.yaml | 4 +- ...4030-64b8d0d829a31289bbb915ba2b2eb077.yaml | 4 +- ...0311-7d46d3a81ec6bb63cad62cde0afab07a.yaml | 4 +- ...0312-78446893c956fc1d75ddd7c2d7c876e7.yaml | 4 +- ...4042-b4cb9ba45757222ec6c9dc1b2fa44488.yaml | 4 +- ...4043-32ed4b36d9532730d50e66214a30b7fa.yaml | 4 +- ...4047-96ff12fd53b9282c4a2c4aeb674ac66e.yaml | 4 +- ...4060-b03939b1629e023f1100df8dea055a3b.yaml | 4 +- ...0632-b1ced039ec3e12066bd1cc12c97938c8.yaml | 4 +- ...0671-cd934d4abb39f62a28c7ae7b5501f68f.yaml | 4 +- ...0672-f0281688d74f818cfad7334eba1cc561.yaml | 4 +- ...0686-f890a87599d700193f94857dcecd8b3d.yaml | 4 +- ...0687-883ac125446954bc56b63a659310e326.yaml | 4 +- ...0692-6fb4ed5587f0486cce5c1d786ad4230e.yaml | 4 +- ...0694-6c5199d39eb82de60e28b6acd63ef12d.yaml | 4 +- ...0695-ea58f8019f8858d1a6e5612496c6cdb0.yaml | 4 +- ...0696-73ae88fd78bf0becac09b57aa5f8c767.yaml | 4 +- ...0697-2f1a45c352b73e0646091d728f0d1831.yaml | 4 +- ...0699-146da8f6895b52d2f71daced48bc4bb3.yaml | 4 +- ...0700-e2fa4c8a4519773eef901f4abb2bc665.yaml | 12 ++-- ...0702-53dce218cb6cdf713c943d61cbe1c885.yaml | 4 +- ...0963-dcd836cebf0e20586e7baffdfe54c10c.yaml | 4 +- ...0968-942a0a0ff8bd16dd5a3f3bf1e155403a.yaml | 4 +- ...0975-baea03495f30d429cbcc479e7010d90b.yaml | 4 +- ...4101-67cbbeb086472c18cc998dc3852acd0d.yaml | 4 +- ...4102-14fedf42454dd570b7c4db0f006340a9.yaml | 4 +- ...4102-34cb9813e7e0af12dde3e7fb63dcabc4.yaml | 4 +- ...4103-67ad0ff7411e0b10941fca10e62b3adc.yaml | 4 +- ...4107-a6b4638155101fd9dca73e44a2714579.yaml | 4 +- ...4108-519740287ea130c472e2b41307bc4416.yaml | 4 +- ...4109-f7ab3183d6a1c8faf8c7fa4cce5c285d.yaml | 4 +- ...4110-a2935a109cadc5c6b15de3c6e258096e.yaml | 4 +- ...4112-aa821804338bfa52c597bf95613d3cbf.yaml | 4 +- ...1132-26aceda847c1eb3f25bb17474245905f.yaml | 4 +- ...1134-65a9527890576df98e6c12dd65024410.yaml | 4 +- ...1136-dbe0cc2eb5dbae77d4244d0de7839b9b.yaml | 4 +- ...4114-cb7c43df76e71bb6d20f5f4c8a5d90eb.yaml | 4 +- ...4115-b0561191aff3bb3e5af8336a71c1ffcc.yaml | 4 +- ...4119-6ccadf7e1366ca3249cc5950850c4bdc.yaml | 4 +- ...4124-76f3b72582acb97747f26a7d73d169e0.yaml | 4 +- ...1315-f68243f27ec6cdc816f3b8c11a5b90ea.yaml | 4 +- ...4142-cf862152b16dd1f39286055ed51b17b7.yaml | 4 +- ...4148-41a31043d8f2b87b33721864ecd51995.yaml | 4 +- ...4150-cadc46493e5e64619719bfd06035e262.yaml | 12 ++-- ...4151-a3fa9aa05831cbe48f93e588aa23d79b.yaml | 12 ++-- ...4152-8df0bbe5e4c9e759af91d2ae7c77ecd4.yaml | 12 ++-- ...4153-4f98def5aafbaedc907582ddf709a1ef.yaml | 12 ++-- ...4154-82c2c907402b124f31a2f373f11be562.yaml | 4 +- ...4155-cad4f56715717797069f7a87850b72f0.yaml | 12 ++-- ...1554-4c2a731e32a3d9201839b73fb37eef51.yaml | 4 +- ...4156-8a640d3ed297a8a63d17c701796646c2.yaml | 12 ++-- ...4157-aa986981c75263be7a2313fe5bb981c0.yaml | 12 ++-- ...4158-9ac93e930052c6b551d522a1a37f90fe.yaml | 12 ++-- ...4159-53c528c4b38bd34834da864bf5436a73.yaml | 12 ++-- ...4160-b3fb140ad00234395ef28e4892077821.yaml | 12 ++-- ...1608-488a5177633c5d61ff8bef1899fcdb13.yaml | 4 +- ...4161-757bd659f9146e7fed02497d3559c2e8.yaml | 12 ++-- ...1612-2474a94365b10412bcdef71534b7cdd2.yaml | 4 +- ...1615-9bc085475e51bc522ac86c43319af153.yaml | 4 +- ...1616-e05fa458a1f240ccb4e1b67dcb2e1cc1.yaml | 4 +- ...1619-285b140dd354e7b55f93f22538da9394.yaml | 4 +- ...4162-c747e3cc597300516c2ada9764e8c1be.yaml | 12 ++-- ...1620-2163947a7faebedb99b02ea382f621f0.yaml | 4 +- ...4163-9c0847af71db5cbde2297c6d8117181e.yaml | 12 ++-- ...1634-7f361b8e267eec159cd338045858bebf.yaml | 4 +- ...1638-4332f8cf6f6916ee73d377911664daa1.yaml | 4 +- ...4164-4b9ef62a2d3dd2d1bbf6db4d54a3bb14.yaml | 12 ++-- ...1640-6d6e0436ccffe0043617b48128024cf4.yaml | 4 +- ...1643-7dc4797d3de860817ed6ac2d09e72ea4.yaml | 4 +- ...4165-f4eafb52aedd774a77d6abb99f32e10c.yaml | 12 ++-- ...1650-d5a15b7cded52d19f32afbdd2169bb8f.yaml | 4 +- ...1652-cbf15a410baf5df5c6e73ec81eccde3a.yaml | 4 +- ...1655-6736c43448ceec0a8c35031a10886cda.yaml | 4 +- ...1656-b870ae481ac77b6b40f8ab9a7e8f35ed.yaml | 4 +- ...4166-1ac52ae7a1da8b0bd7a9bd3597d76efd.yaml | 12 ++-- ...1685-4954ab56551b4ce703a0899a0107deda.yaml | 4 +- ...1685-f7bbd778de1c9c53d31f5ab55d2c4192.yaml | 4 +- ...4169-f5d278de8a6f52f6b1d00da3aecdfc57.yaml | 4 +- ...1692-236c93e0abdcaccaa98b96d0eb756aaf.yaml | 4 +- ...1695-0cc0200594a7eced582455e86333c795.yaml | 4 +- ...1698-cd6ae30437be0309f27d9b8ec11e2caa.yaml | 4 +- ...1781-10b89b9db07084a443cbeed71b129af6.yaml | 4 +- ...1785-04b351a32ea4d9e14665cfe5ee1edb27.yaml | 4 +- ...1786-a5de647c0bebb3ff3775ad99edcea819.yaml | 4 +- ...1788-c15a76ab76b6bacb9d3a014790c1e98c.yaml | 4 +- ...1790-23b8ee7d3cf1c8b343f01dee0e6b0127.yaml | 4 +- ...1791-87d13bf13b6be6962a557c3627b3cfe7.yaml | 4 +- ...1805-761ad1a5f416d5f845100fe45755bedf.yaml | 4 +- ...1831-c8baa9ed85af66dd4a921b8f2c5af1ac.yaml | 4 +- ...1839-ff3790cb0753cd7ef435623008e69310.yaml | 4 +- ...4196-447bef3440e263d45c541524d37bf6b4.yaml | 4 +- ...4197-3ca395cf4457963d99cc7df0953a3124.yaml | 4 +- ...1978-8e8dcc759eccd2518e9fba14e695c093.yaml | 4 +- ...4198-bde0dbf50dee086cf6c52ee659134929.yaml | 4 +- ...1980-a43440257ec4eba085c1ac2ce540e1bf.yaml | 4 +- ...4199-89d3c8a11ff10e6756f75032f0181833.yaml | 4 +- ...1995-e82a3788d5ee1ba0ec33b3e0db2276c0.yaml | 4 +- ...1996-f93d99515ef4e6bdea2dd530448d23e4.yaml | 4 +- ...4200-29259c5b25c72133b49fdd41585cc3d7.yaml | 4 +- ...4207-cb1c5b7fa2f66db14c90c48d844c8b70.yaml | 4 +- ...4216-53813c475afa70818392401295ac8091.yaml | 4 +- ...4217-18bb670f149f3ce453ab41abb0ba94e6.yaml | 4 +- ...4226-24b6c342cef1d8274544190481da6dc0.yaml | 4 +- ...4227-882bdd3fdb6681642f156a22924c9a36.yaml | 10 ++-- ...4230-5cdc77b83509c234be9fd2621b4d50a6.yaml | 4 +- ...4236-defc78f281b1b753471f78628f828031.yaml | 4 +- ...4237-2ff5131571517bfee0f572e860d19db4.yaml | 4 +- ...4242-8f14563b89ae2fb865ea87d5f251bc48.yaml | 4 +- ...4243-9741c51413af2327faa27cd2e2fade6e.yaml | 4 +- ...2459-617785fa7c971048a906a08d626203c0.yaml | 4 +- ...2460-1b0051f6cdacf52fc28a89570f274917.yaml | 4 +- ...2461-8c3657d5aee544c7f980b9786567d40a.yaml | 4 +- ...2462-aea3cbfb921c1d1330c879b8f85a35d1.yaml | 4 +- ...2479-33c4d0a0f515bd1cedf9cdcf55231d10.yaml | 4 +- ...2485-1a1fe1dc5dd307bb721b18dad6e53951.yaml | 4 +- ...2494-ed79806268ad8e12ebf6df82f872530a.yaml | 4 +- ...4256-20b8b7b7f0087daadf58f3d74ba2a999.yaml | 4 +- ...4260-012d37d1a0419e2b4d417ad1bf8624b8.yaml | 4 +- ...4265-77c6557ed6d5a269f424f3a44bdb8307.yaml | 4 +- ...4266-66ff52bda667dbc0abbc88dbfecf89ff.yaml | 4 +- ...4268-c9f14b3efd68aaad972afe4c5e7676c3.yaml | 4 +- ...2699-e3ac7cfb196d6042fdf4cb82d4ed4384.yaml | 4 +- ...2880-e720f99baaecf49f6cf9a7d54ee9d187.yaml | 4 +- ...2884-41ebdf42bbd34392f33d2e300bcf1f22.yaml | 4 +- ...4290-dfe9d916adc4339b514e6f246a1ff502.yaml | 4 +- ...4297-8757d0b374234a37718f99a73c9ea57a.yaml | 4 +- ...4299-7746f8e1b3332b64c44418f10c52b872.yaml | 4 +- ...4302-84f16791aafe87d42cf363331892fb65.yaml | 4 +- ...4309-914f38027718514db2df33bcbfa5d9b6.yaml | 4 +- ...4323-b8c54b7d77df783a3aa06fe35c635411.yaml | 4 +- ...4324-41a8bca5b4e509ff5992617799743aa0.yaml | 4 +- ...4327-1a3ebcec002fbbf2625550387d2d42c9.yaml | 4 +- ...4330-607d97f75ca23282557e4dc2fc682915.yaml | 4 +- ...3450-04699771b766f0fc714834ca199fc5ab.yaml | 4 +- ...3453-08963ed44b1cea3058d5d701a7dc7bd5.yaml | 4 +- ...3458-f9f9f8843b8a77c541ca723acfae2e44.yaml | 4 +- ...3459-d6b551c8eebbc07aebd60fb21b086030.yaml | 4 +- ...3461-0d198fa5a9097295a41f947e62ed164f.yaml | 4 +- ...3462-fbcd8cab0390c5423cc4977a1f1be996.yaml | 4 +- ...3463-8d1ec64befa71150df8d15ca9a46e658.yaml | 4 +- ...3469-e740d0f5f3811a1aac1ce94a356e0d8f.yaml | 4 +- ...3471-2326f2ccfd7003acca183b6e98abdbd2.yaml | 4 +- ...3472-e081d559a96dc283eb19909827c9469c.yaml | 4 +- ...3476-f8057967039523304998e4a1e27c496f.yaml | 4 +- ...3480-9fb8bc0ed140e27215d75f6096a9ee6f.yaml | 4 +- ...3481-bf87097eab97d5618311a5d6293581ee.yaml | 4 +- ...3482-5da504c8dee91299e78459069ad88795.yaml | 4 +- ...3488-739c3b6a5da1b82e1034ec2752c5a42f.yaml | 4 +- ...3491-2b7649bf0d1b33f22a628883cdb8312a.yaml | 4 +- ...3497-5f3b219095913ca0ac8eaef4013782dc.yaml | 4 +- ...4351-72e98d054dd35c38c2ccedc1b3e556e3.yaml | 4 +- ...4352-9b3e1e16f60897007a08c1914eadf98c.yaml | 4 +- ...4355-1a6e413024d8d1ae95c30f6878f11970.yaml | 4 +- ...4356-381f90bef3e067367c93c00d3b2f3da3.yaml | 4 +- ...4358-462fb716ec2f0ec4e2f418a785fb1df8.yaml | 4 +- ...4359-74b1a71215563001aea36d2a3bce8f35.yaml | 4 +- ...4360-ee3fe625ab8f88885d07211e8987b8d5.yaml | 4 +- ...4362-babd847e079fcdd7a546f8f906593529.yaml | 4 +- ...4370-bc5e61b065b355ecda981dfb9a91839d.yaml | 4 +- ...4371-4d7353aae0306a1d0c2e5c68f3406ced.yaml | 4 +- ...4372-1da82cb5548de3f68423707825b69043.yaml | 4 +- ...4373-6435ac4f9788a7cece5b6014e8487e16.yaml | 4 +- ...4381-ff57e42e57104b9d5c57fd329587cf27.yaml | 4 +- ...4384-4203dc94ef5199d201031e3f384724b9.yaml | 4 +- ...4385-7737e8caafd57ae5760281e5e46a68d7.yaml | 4 +- ...4391-b3d167dc589e1f7c398305699f98be68.yaml | 4 +- ...4392-176b60254015c7171bdde001bfef506b.yaml | 4 +- ...4393-e18789f54f5a5fe13b8ddacd79d408fc.yaml | 4 +- ...4394-ffe84a5da8ea35eb24ec280a71f71719.yaml | 4 +- ...4410-4e977ded44741d82f1c08a16943badd0.yaml | 4 +- ...4431-4a8f4a33d3fd03ddfa522524f9449c10.yaml | 4 +- ...4431-6bedb1579a7e4736e9514fa8e953db76.yaml | 4 +- ...4442-1e89a13fba73865588209c9be692cd21.yaml | 4 +- ...4448-81dceb70d6b123bc1dd5fda793f142c3.yaml | 4 +- ...4449-6d5213a5628e216eb9e2a763fb4762ea.yaml | 4 +- ...4451-f793e64947f92282a534916c8b501137.yaml | 4 +- ...4453-d875c7330364cd8c2a286deccf313956.yaml | 4 +- ...4576-246a1b75793883d17dc885e0bfc6e4bc.yaml | 4 +- ...4578-4dd1db9fbfcd7d8c0bd7134fb7dd4c2e.yaml | 4 +- ...4458-957e4d84091168909dcf10979c3f829e.yaml | 4 +- ...4580-69fd4d1a3d07810924c63e0b65d11e51.yaml | 4 +- ...4582-b0a5bbc946df09d6c3b0cc9fe2eebc81.yaml | 4 +- ...4585-48cb81f29289d3dff74b9ff9eb6ca258.yaml | 4 +- ...4586-d9ed7ea48d292aeb09b5a69dca626c8b.yaml | 4 +- ...4459-10f63d314e85015ce49d2337fc605c93.yaml | 4 +- ...4590-f34299764af595ef815c30af6bd496f7.yaml | 4 +- ...4591-ba0f1a7c1e75b12eba4e62626fd27944.yaml | 4 +- ...4594-395ce3ec44ad4bf8f5ea06caea1ca7c5.yaml | 4 +- ...4595-4ff6298b795b2324bce636d08965d81d.yaml | 4 +- ...4460-5a9c4861ed09ce785a6f69836ddbac67.yaml | 4 +- ...4625-e785890064729677b76cdb50e8ed4af9.yaml | 4 +- ...4626-97aa7aa2977bb6f3604b4b418beecdeb.yaml | 4 +- ...4627-0a5cc290bf065b9d61dd8d6424548f9c.yaml | 4 +- ...4628-2d4f6a1b39a4cc9b06569630fa151900.yaml | 4 +- ...4629-719aecac015dde0f14f4cf5400965308.yaml | 4 +- ...4630-564f40d4fe0ef114f55053468e52e333.yaml | 12 ++-- ...4631-0bb8bade373073a31c7eae43154f4462.yaml | 4 +- ...4631-3a92cf2d3b454c13398f20f7a203cccd.yaml | 4 +- ...4632-8bc6ce24c222c874630a145ef16e8d93.yaml | 4 +- ...4632-ab2b677573aede58b8661a8c8b875adf.yaml | 4 +- ...4633-4a463e7ba518b96c1fea8ec0461b05e3.yaml | 4 +- ...4634-829eb8aa5088a8dfbd751ae2143f350b.yaml | 4 +- ...4464-ef2ccc3b2c02ce044d17cf1db08c67d1.yaml | 4 +- ...4465-ea22f32ac37f9f8e0f263b4584b31b1a.yaml | 4 +- ...4466-638d34b4766f8e2a63bed27bf53ab9d8.yaml | 4 +- ...4467-7932b82c356f203f76bc21fa22bfac04.yaml | 4 +- ...4468-30317bfce905faf2637e9a9df56ecb43.yaml | 4 +- ...4469-4ae0743589a43c31ae78715c1bb792c2.yaml | 4 +- ...4470-46456613c7a836ce3b1a8f48d3151f77.yaml | 4 +- ...4471-9da0817673d4e46e6fd57b591efba31c.yaml | 4 +- ...4472-1523648bd0f24adc2a26d45bbae47ace.yaml | 4 +- ...4473-6ec64fa1d5347bc867f5cb9d59094e81.yaml | 4 +- ...4473-d17eaa15397a887312aedfb1919c156f.yaml | 4 +- ...4734-840d0f5e27379db8cc72bc8207e84fc7.yaml | 4 +- ...4735-da7f33487455bd9ca64c5f5b0b3257c0.yaml | 4 +- ...4736-6c023e252025477e682e7148561b6604.yaml | 4 +- ...4737-873b15a500e300080bf17fdd62b04ccc.yaml | 4 +- ...4738-d94e06192974b1fb1b08b2e10b17630f.yaml | 4 +- ...4739-bcb8383c6f8589761d6cb6fb2a6e00e4.yaml | 4 +- ...4474-f32c6b2b7d3eb58c4682087aa288b3f1.yaml | 4 +- ...4740-20e49640b2d172fe60c3e66f7c5c2961.yaml | 4 +- ...4741-c6bb0e4c31a358c9eb072ecaccea302f.yaml | 4 +- ...4742-c74241ceba44be19e7ba6e8fb09c27d6.yaml | 4 +- ...4743-da0336a411f4f619331fc9d86a24bec5.yaml | 4 +- ...4475-934106ff95d7bc443b715a08222f1f73.yaml | 4 +- ...4476-c202e0ac545cb4289f68113596303c38.yaml | 4 +- ...4477-4f470840b5c22d9fdd8f597a9956aef0.yaml | 4 +- ...4478-7115ada113c9b929bcb0dd07d0bf9d4f.yaml | 4 +- ...4479-88443ca5df44ae2bdc297b09180bef0c.yaml | 4 +- ...4480-a875d85b1acd34789210b1b8be6e7c70.yaml | 4 +- ...4481-3816de1a2f06ca9d6d7c8b9dfb0a51bf.yaml | 4 +- ...4482-4b6f3787781ed281c4bf315d7815f11d.yaml | 4 +- ...4483-474fa03f5b39570acd09bb99c310528b.yaml | 4 +- ...4484-164f540fc7a38170dc136b3ff3864ea3.yaml | 4 +- ...4485-c7b94497207a62b415298f2f46cd674e.yaml | 4 +- ...4486-d785c662ffdd5bb603cbd342128e597d.yaml | 4 +- ...4487-6139caeaed9293c95d17b26944e3e8d5.yaml | 4 +- ...4488-022d6e4b68c3750efdb62382e3088ee3.yaml | 4 +- ...4489-0a19ecfdd9174c31fe37388d883b8078.yaml | 4 +- ...4491-c5db9aebd1fc40e9e4c7b7eca92c3a88.yaml | 4 +- ...4496-17d0dd4ca47cd3783ad012601e5033f4.yaml | 2 +- ...4497-ebb8de96320f3c64a91f6dbb13b596fa.yaml | 4 +- ...4501-aef5861873c712667e57c762ed3ff81e.yaml | 4 +- ...5066-e20e9bcb00e5e945a6bb2c24c79d65cf.yaml | 4 +- ...5069-24fe066591faebd7c14b911941c41812.yaml | 4 +- ...4507-cb472ca260be89964a7f7e562d3b7648.yaml | 4 +- ...5070-9b415d0d3fdf05f04e00c8b364d66a56.yaml | 4 +- ...5073-c4daa9433506094793f25873e18663b9.yaml | 4 +- ...5074-f8b3cfa96a6263fb75e4e2e3d0d2b588.yaml | 4 +- ...5075-2764a8f5acae96c89d7440a05722c172.yaml | 4 +- ...5077-a02d18d0740894600f021e06a20fd2de.yaml | 4 +- ...5078-78588e22a79e99f07ccbdc69fa52af87.yaml | 4 +- ...4508-5ccba34100497998aa68e15dc82c8875.yaml | 4 +- ...5080-5c12b38e55523c2abb1229db17d7b69c.yaml | 4 +- ...5081-93ed6654d55bf39f7e0ea24a9224f858.yaml | 4 +- ...5082-1b12a289a671c54e3c29dcf0a118316b.yaml | 4 +- ...5082-3b610f84d98a5bc8d0e6aaa3b08f5054.yaml | 4 +- ...5082-4032a78ffdb0269b83ac44db0e50cdc3.yaml | 4 +- ...5082-4ef1f0520c09d9782f1be91688816f9a.yaml | 4 +- ...5082-6e7fd75d5000c1a779cde51d0f7b0d94.yaml | 4 +- ...5082-805e4862296df1b32dd279bbfd5412a7.yaml | 4 +- ...5082-ce7addd0eabe078cf96d1fb6e8d32578.yaml | 4 +- ...5083-51b25af2629d0400d7625bb870546310.yaml | 4 +- ...4509-65043d39bf222f68f6c9850d424ae1bf.yaml | 4 +- ...4512-e128c0c0167442ae481665888471e921.yaml | 4 +- ...4519-873b35008af518fb3d54c42d47368243.yaml | 4 +- ...5348-3b7bdb3a8404e199e1deb34a5f3502a4.yaml | 4 +- ...5349-0eda30de3bc2dbaa94da2af30caf268c.yaml | 4 +- ...5350-4a300ce6f6f831fce9cb1c19680cdfa4.yaml | 4 +- ...5351-eef54adf293c01cfcd3711ba2746f5e0.yaml | 4 +- ...5352-f626e9df68cec35c776cf1191c5c3f5d.yaml | 4 +- ...5353-4177059b270800f6cdd2567297565b05.yaml | 4 +- ...5355-a48d0e7d0d0abab8208c9ac988b86701.yaml | 4 +- ...5361-cbd2f40afcea324b1b6628d63c264b5b.yaml | 4 +- ...5363-f2c966f060ba4e0ec53591e455e174f0.yaml | 4 +- ...5364-c5b846fbda39bbc2b213c6450fb38da1.yaml | 4 +- ...5368-5d3b862e6e4baaf71b24925f067433ca.yaml | 4 +- ...5369-4de563d96c4862070b39ddbeaaf2aa52.yaml | 4 +- ...5373-9ab73d918da016b8bea0197df7034889.yaml | 4 +- ...5374-c1c98038e2071b40fa92b1876951feb1.yaml | 4 +- ...5375-4857da40460f492fd61121c6a3d9ad96.yaml | 4 +- ...5377-7ae73592996d92a88095adedd13bc8f2.yaml | 4 +- ...4542-950a80cc7b38cd4c46587704ae88fbc4.yaml | 4 +- ...4544-d7a376bac039b7fcdb01d011343f232a.yaml | 4 +- ...4545-efa61bc9a560990c025c5047443643f6.yaml | 4 +- ...4546-47ec4d19442547ad0d7289d6f4804147.yaml | 4 +- ...4547-47ed991bbc14dda7a2d912876312ff28.yaml | 4 +- ...4551-0a49b86c658b566e0874b7c8c6fd8f9c.yaml | 4 +- ...4555-738fbfc3eb4f88850a59e7c7149f1534.yaml | 4 +- ...4562-bee37332f6e8a8436cc61a9d140d558a.yaml | 4 +- ...4570-a631956fae26932cfe37dec9f8eea277.yaml | 4 +- ...4571-7d9695bdca873940197ea6a55e88c78a.yaml | 4 +- ...4576-05c1130a0be4b028fb1b748819924a55.yaml | 4 +- ...4577-aeef249fc57afd724305e4aa12ba4e2c.yaml | 4 +- ...4578-bb335261eec45408126dfda83cd4c302.yaml | 4 +- ...4580-227a5c7ee9b9e5c6c608ba88b684ac16.yaml | 4 +- ...5803-41cad88ff79d9f1a300cb623d000ffea.yaml | 4 +- ...5805-319371b7283fd7e2cb3c7db7ca64946f.yaml | 4 +- ...5807-fe1c7e5641b372bf56ee629133d6f4e5.yaml | 4 +- ...5811-767aeb59e47dca848d0413b31cb3f81a.yaml | 4 +- ...5811-db46aef04d74b6695e5a22627a3163f0.yaml | 4 +- ...5812-21d6fb0129ec0276cbb256583b4e5048.yaml | 4 +- ...5813-dfec65d3ffe11067030127a9c011404a.yaml | 12 ++-- ...5814-7d771013dd99d35b0d7273344b75ad3f.yaml | 4 +- ...5816-6edbfbf441adea692ef285720c58a9cd.yaml | 4 +- ...5817-673bbf1cbb44b5f720028f2010c7e907.yaml | 4 +- ...5818-8e499ffbdb5eeef7ac0a6adb29663778.yaml | 4 +- ...5819-3a1e41088675792a5f4e28fc34263cd0.yaml | 4 +- ...5820-8e805369c6f828c8254ff169ce6c85f4.yaml | 4 +- ...5821-3c7165ed170542d9a48b7ebd75bdcfa2.yaml | 4 +- ...5826-04bb16712ffe510bd42325a97d792814.yaml | 4 +- ...5827-9390ac5e66dccc4c03531e3f70a3187f.yaml | 4 +- ...5829-9a16f7dd8fd77a0633f39e5cb1c0fe95.yaml | 4 +- ...5832-7b1133cf795e5004c4eb6459afb4af96.yaml | 4 +- ...5835-da56011233283b841dd7c13f7f29d7e9.yaml | 4 +- ...5836-6855332cd5767d389db903e31b1c4f88.yaml | 4 +- ...5839-054cca949d3d20e70e41393d4d7ba0fa.yaml | 4 +- ...5839-d23e433446769426d4aae17f6fe2a04a.yaml | 4 +- ...5840-ade8d23b5006403a0ff80adcff26f453.yaml | 4 +- ...5843-f451ba2e71b9d178f196c4bee4c708ef.yaml | 4 +- ...5844-a4e88b3da711b27ab40f6efd4bb4e5fa.yaml | 4 +- ...5845-01aa5492a4b5bc7532a3a46a182927f8.yaml | 4 +- ...5846-bf2853efc06d31fecebbff0926f79cc8.yaml | 4 +- ...5847-475773ebaa71f55189abb950928342c8.yaml | 4 +- ...5848-e13fa86cb5f0a76818b71a18a333569e.yaml | 4 +- ...5849-860fdeef59df60170db304dfbf6f0b2b.yaml | 4 +- ...5850-3dfe4a41b3f6685dbbc11ea86f232a73.yaml | 4 +- ...5851-2207307382a7e5b71273a639c041b28d.yaml | 4 +- ...5852-14ef39181771488f76a78ebc7f182128.yaml | 4 +- ...6175-48cf291038d407d0c14437de80bf836d.yaml | 12 ++-- ...4619-4f0e3223d5ea7b01c767c6e564ea2ada.yaml | 4 +- ...4622-4d7cf09bd61a740d1d041e4a547bb223.yaml | 4 +- ...4623-fada6798d03eaae704cdbb04f45c1dff.yaml | 4 +- ...4624-ee05a64bbaf03a516917796674375367.yaml | 4 +- ...4625-de60bb7a2d8edb4c8b70880b7d8f6006.yaml | 4 +- ...4626-d66ad8d87de6007b46efcadeba262d7e.yaml | 4 +- ...4627-178a0b2872232b9ff07f79c6391e0625.yaml | 4 +- ...4628-51e05e1842b40dddcacbdfa060eb58f3.yaml | 4 +- ...4629-c1072dc6be25d5ca69ffa07a2d068093.yaml | 4 +- ...4648-68309fb63b5db886058ca866de7b117b.yaml | 4 +- ...4649-2124f2372d43d33c582fb413bf11d2cf.yaml | 4 +- ...4650-77bff58a02745412cca836e0af8ecf6c.yaml | 4 +- ...4651-421ff303fd144872eafd938e0ed53208.yaml | 4 +- ...4652-5826ca6dc34aaca6ed2393f60977f5a4.yaml | 4 +- ...4653-601f7b212435b0908f5157de31e9c323.yaml | 4 +- ...4654-99e94192bf6d19eb379533764c917cb6.yaml | 4 +- ...4655-229b28e3351ab434cc4be3a1c3322160.yaml | 4 +- ...4656-1085089f2339a1b75325ca6667c1e32b.yaml | 4 +- ...4657-52f3f56cac58e66f1b3bbe271591fbea.yaml | 4 +- ...4658-cd17a32212236705de6be45ec4d31053.yaml | 4 +- ...4661-b224632750bfc8c01cfd4c8878280cb5.yaml | 4 +- ...4663-44b1b2f0eb9245a5807308d2327328e8.yaml | 4 +- ...4664-c7884dbfd12febc95a975f955686dac3.yaml | 4 +- ...4666-d5d53242307fbcb60f1d07b6a75cb319.yaml | 4 +- ...4667-507b936e6df45800b9063c2207c957aa.yaml | 4 +- ...4668-e2ec209c741fed7cc95066eb8c9d077f.yaml | 4 +- ...4669-add895115f53c9c7df4b8eacc636e203.yaml | 4 +- ...4670-ca93f191e3639f84afcc1a9b1fea599a.yaml | 4 +- ...4671-4706d1b1438785969ae30d4549fd166c.yaml | 4 +- ...4672-02744bc958048e60b6fe8becee3f2311.yaml | 4 +- ...4673-bc63c69c92e0f2828459114bbefab4b4.yaml | 4 +- ...4674-747cb2b72097d91ef1564458b7d2e373.yaml | 4 +- ...4675-cfdb8d7325e93947d2061002a4b258f4.yaml | 4 +- ...4676-8b5e55916d6d52550d91a97ed666547f.yaml | 4 +- ...4677-8015d391de62b785680b52c5ead73093.yaml | 4 +- ...4678-d10130ec70ac5e95df8a68d13ca495cb.yaml | 4 +- ...4679-e7037db773bf01752d04e36ac2a2c9a0.yaml | 4 +- ...6796-04585caadf98109f09006297093db829.yaml | 4 +- ...4680-b4cd17df95bd140cf7c61464c7525ad6.yaml | 4 +- ...6800-eaef067d144406da863b2f1698405be1.yaml | 4 +- ...6804-8972c0084426af137e3ac2a4f9b562c5.yaml | 4 +- ...6807-9c2789fd4f31da6a3e682d3cde6291b3.yaml | 4 +- ...6815-f546949dea525a0c95c8895c66b00552.yaml | 4 +- ...6816-7075591051dde0bd8bf5f75302619dd9.yaml | 4 +- ...6817-b142fb65f777c01f09af0b6a529becd3.yaml | 4 +- ...6819-bbd95e8edaa114935e8c46570e7cf3d6.yaml | 4 +- ...4682-6dc5d6d271c910589d9f7947458f0df6.yaml | 4 +- ...6821-0f6f97ec8d1cc89cf7cec3ff35c09656.yaml | 4 +- ...6822-4d6bafb19843bc6d71a91327064ee112.yaml | 4 +- ...6838-05e6db992de66a60c66b532d0b52e5c0.yaml | 4 +- ...6840-497602ea4705020cbc78a0b19d427eba.yaml | 4 +- ...6844-32884b4069e08a6e3a456b6d9b5e62d6.yaml | 4 +- ...6845-cabe168b618270b5c6e54c5ab98ed27e.yaml | 4 +- ...6848-586527cb70d024f19104907acee04683.yaml | 4 +- ...6849-90c5798f111069225c0a9b9bba314556.yaml | 4 +- ...6850-1f6ddf0ce56b9b9d3d870c2c339aeff1.yaml | 4 +- ...6852-fe0115e4206583520304b505b1843190.yaml | 4 +- ...6854-e9635d2750ec3cdec7963e531110e8e5.yaml | 4 +- ...6855-03f17f31cd71196d3e8108e1dfd1705d.yaml | 4 +- ...6859-9cd804229a710db23428eb806db45e23.yaml | 4 +- ...6860-ed44a5e289d05299409a4dd60c060b57.yaml | 4 +- ...6861-7d4c259ea0aa11707d8270b3e5db8568.yaml | 4 +- ...6863-54c83422727dbe8ec911e59f2a60998f.yaml | 4 +- ...6867-09395db7be64b2d03b62fa45ed0398d7.yaml | 4 +- ...4697-c25b123faba0bdec0e1756161a7f2a1e.yaml | 4 +- ...4698-faa5c662684f3e34d87e4c432d1f9f4a.yaml | 4 +- ...4699-6833c69669f3b6c1ff537772ca9a9c7f.yaml | 4 +- ...4706-c0043e4e0fc4abc274a0b7326af041c1.yaml | 4 +- ...7137-87a2603e70828cd5276b845c0ebcc6ab.yaml | 4 +- ...4714-9b4ecfa65ce2bd75653c853011940f82.yaml | 4 +- ...7142-957e023e162fd65b104346c605f19c7a.yaml | 4 +- ...4715-8afca71d6fa766e9a24060d9214388e1.yaml | 4 +- ...7150-b8a6e7f15ae6e5ea9f7d57f9d81da663.yaml | 12 ++-- ...7151-cd695a94c9ddf898661512e7b5a151f2.yaml | 4 +- ...7155-5a964b37d1f769e559a3b5969ea09bec.yaml | 4 +- ...7157-0b1be450ec6216c739b3d0139ea02732.yaml | 4 +- ...7158-58928e38edbab233a84020a472a44caa.yaml | 4 +- ...4716-3f71ab9bea10d44c97baaae5fd797060.yaml | 4 +- ...7160-f8238c64411cb9dd2c01251b0ae0655a.yaml | 4 +- ...7163-83d9cd71e386193f00255f0781416f64.yaml | 4 +- ...7167-d47618ad7b3ff873ed22aa3e5efab3e0.yaml | 4 +- ...4717-4e10d6d81d87afd9b8cf214ddcd496ad.yaml | 4 +- ...7170-ba7ba7554cf607d5d507c2c2d4751a5b.yaml | 4 +- ...7171-80529a3b54852ed1b40d1078928149a9.yaml | 4 +- ...7173-78c3981cb87a9d312796397fd5fb8a1d.yaml | 4 +- ...7176-69e238d5564cebaab229183900098117.yaml | 4 +- ...7179-d0ac90c02958fd486fae19ccf9cfd8db.yaml | 4 +- ...4718-76176e7d0b3c59c6f85d0f00865be579.yaml | 4 +- ...7182-63a838c07fa7f4dbcc749cd4ec305acf.yaml | 4 +- ...7183-b62755f81eca9dc431fe91f1c1c5e844.yaml | 4 +- ...7420-32de7cdd0bd82a27d1f9a9185ff54e70.yaml | 4 +- ...7421-41830c974de1f3419028654a94a429d1.yaml | 4 +- ...7423-21fdda375898746027e6f9dda342b8cd.yaml | 4 +- ...7425-e36fdcdf09b5a64eac64f879dc48947d.yaml | 4 +- ...7426-17731af892dc35dbe7d98abcc5958a1a.yaml | 4 +- ...7427-aa680f4ce8dad5699d078d5a407ddd10.yaml | 4 +- ...7428-e44a87677c68a494baa8ed72b523a10f.yaml | 4 +- ...7430-be2315835d7b2267c9fa00b942855a61.yaml | 4 +- ...7432-568ee8060d1c0b8a7ff761ffdaf606b0.yaml | 4 +- ...7434-9d9c7f9cf0e3be8bd05b705703e8905b.yaml | 4 +- ...7435-57987a7ef285cce42daf7bbeebe78cfc.yaml | 4 +- ...7436-3cae7fcdb0832a80c22b613ce2425d20.yaml | 4 +- ...7437-02b515a3d90192b157fb5edc5ea88a55.yaml | 4 +- ...7438-d11c386e86541e81dcae4e94a2860a10.yaml | 4 +- ...7442-8d1c622642cdaf2469921f84335dfe12.yaml | 4 +- ...7445-7d6d3ed82fbce25bd8d4d72adc5dbb85.yaml | 4 +- ...4745-64194ddc20aa7461447b4d03da264c07.yaml | 4 +- ...4747-048a39e7d237e8f103e054f25cf72eb4.yaml | 4 +- ...4749-bb6c1374b9c3f1f7e4fbd5d4ecd1156f.yaml | 4 +- ...4750-6ee9ba365ca511bfc329f7df63da810e.yaml | 4 +- ...4751-367b7f8831e5629ea2336d98cf86a14a.yaml | 4 +- ...4752-59655d2ccadb8aa0cfd1aeca8138f97d.yaml | 4 +- ...4753-6cf87515d30763cb39f9dddd78a854d6.yaml | 4 +- ...4754-97fb5b5839a832ac7ff02fb0d708c5d7.yaml | 4 +- ...4756-8e4fe58479cedd644fbbd3b418e0b682.yaml | 4 +- ...4757-b3a8e8167569aa6cba2a5950875c8b0e.yaml | 4 +- ...4758-7e3117bf0f4e61f1c6678c5ed0029bc5.yaml | 4 +- ...7587-48d179450e001d6e5bb006bf4ba5d2a6.yaml | 4 +- ...7588-8c2e6071ee4d4b147b6cf4ef074e12d8.yaml | 4 +- ...7589-7f12ff16273eb990bb45ef4156cd86e1.yaml | 4 +- ...4759-f31fcdd6accb0c61ba4b73c6a548d97d.yaml | 4 +- ...7593-fdaa7c7a6a16dd831123dd45077162f8.yaml | 4 +- ...7595-8c03b52626997e166cccabfb7426db2b.yaml | 4 +- ...7596-5a62a90392d8e5e62d1e1ad4b9531478.yaml | 4 +- ...7598-39af241a774d2dcd3cc32b6204b6cb7b.yaml | 4 +- ...7599-48a8d2f0d5a63315df776c831690e09c.yaml | 4 +- ...4760-5e1a23f981a78be569054daae1a85203.yaml | 4 +- ...7602-63379065ec53581cef23820054e2a064.yaml | 4 +- ...7604-4fe952dc4f33b2225826338b2a3f9203.yaml | 4 +- ...7605-c4be63bba4a89fa3e83779737577feda.yaml | 4 +- ...7606-e46a5a03ceb7f18070858cdd9f1f8b5c.yaml | 4 +- ...7607-650d3965dc4c579880213651d87a4777.yaml | 4 +- ...7608-f442fd7af4f1450884ccd37204471581.yaml | 4 +- ...4761-689bba03a0123069bb521d413df5bf54.yaml | 4 +- ...7610-5bcd1f7720b268a32568c458d817b9bf.yaml | 4 +- ...7611-4ebc9d9cf2e6c0b8863f7b05c2ec1bcd.yaml | 4 +- ...7613-e91e697ef1f971cda16c40acfd5a2dfb.yaml | 4 +- ...4762-41bbba0b761effafe973f064cede1988.yaml | 4 +- ...4763-8616181357e5ec901fe630838e957487.yaml | 4 +- ...4764-f7783b1b95259bfc99e8cabc59fcdb30.yaml | 4 +- ...4765-4d83bba8058d5550f9120708c18d4b23.yaml | 4 +- ...4775-0c1c0e5907f82c480480fd236d7507d7.yaml | 4 +- ...4776-16f9ec159f7aada4bb87cabf3c4d9411.yaml | 4 +- ...4777-0063be3832ab01645d83916172a49901.yaml | 4 +- ...4777-1c682460ea1b975e2214df2ecfd2a316.yaml | 4 +- ...4777-3cdf082bedfada27b24599e0f1cfd2ca.yaml | 4 +- ...4777-4162fc0aa9f89a19a3b0d9a16f341e8b.yaml | 4 +- ...4777-548b1bf05be2eb1395c8483d4525a9fd.yaml | 4 +- ...4777-56e13ca8937773de3612c03bb63c62f7.yaml | 4 +- ...4777-5baab614c3a64c60d1e33947fef5d35a.yaml | 4 +- ...4777-9fb1ec0e705e68a81b6b6afdf66e55e5.yaml | 4 +- ...4777-b9a97b0935a5ed2529aec7b450e17238.yaml | 4 +- ...4777-dac296fb931bf261709dca85eb4e38f9.yaml | 4 +- ...4777-ee646c363ad3189cf7438d75312013e3.yaml | 4 +- ...4777-f8952c598fe28f01e932d940cff08de2.yaml | 4 +- ...4781-3091ac7532eaab098f714acca62716d7.yaml | 4 +- ...4782-b375402f4d94456be8a455efbe0b59a8.yaml | 4 +- ...4783-b830431516693664401f38e9ff6fdd82.yaml | 4 +- ...4784-9b8d61323342cf7cc549ce8c8f2716e5.yaml | 4 +- ...4785-24e6c274146f1f712f8edfca9e42b8b8.yaml | 4 +- ...4786-cb800bf450a42c7a99ab39154ac260ab.yaml | 4 +- ...4787-7fb1bb76537e399dfae9ca2dc54c6a8c.yaml | 4 +- ...4788-ed0ef3463be2d5aaf2ed1f44e5427cec.yaml | 4 +- ...4789-0ee2773c0417239ca9eb51cc09f9c94f.yaml | 4 +- ...4790-1f645d98bf29f7b2e378ac42457eb0cd.yaml | 4 +- ...4791-ba63b488e2407e68ac5be6c07d4b813b.yaml | 4 +- ...4792-95eff066a45135b12edbc92f481f5d74.yaml | 4 +- ...4793-c371054500c25911223fb4e88ae17274.yaml | 4 +- ...4795-603a30eceae4e23d58fec3225b0d2f29.yaml | 4 +- ...4824-8bfdb58ec24e0630da2bd7f7847728ae.yaml | 4 +- ...4825-d3ed4033e1c7b404f15d64bf377cadc7.yaml | 4 +- ...4826-6284e6441b25b9ea2f8b947793590242.yaml | 4 +- ...4827-d83c363445764249cee1964637302b09.yaml | 4 +- ...4828-263cb8027fbba6881585c49ec8985e2c.yaml | 4 +- ...4829-de70b1243fed8f47eec92e24941c2439.yaml | 4 +- ...4830-cc7679b7eedbbcc9700c025bd91811bc.yaml | 4 +- ...4831-f1d7c5edd451960671d8bd82cadc646e.yaml | 4 +- ...4832-dff478252e53a4d48eba850e27632073.yaml | 4 +- ...4833-7b03e9c7a48a7a487481072b229c74d2.yaml | 4 +- ...4833-7eee22ee9d7eafb911cff5c522c34cc9.yaml | 4 +- ...4834-e983f7dc1644cbc367524173b0bfd556.yaml | 4 +- ...4835-b594ed2c30b3954ae4ee7c97ed6645b0.yaml | 4 +- ...4836-27fbae7541522bd11e17939b8913ef50.yaml | 4 +- ...4837-1cb9694a410b975eefa3459fd9bd670b.yaml | 4 +- ...4838-ac790c964325ea0370bae2df48218a78.yaml | 4 +- ...4872-a49761e8700910d2b10517900bb96f1c.yaml | 4 +- ...4888-7f2753bfc2a0c6bb0434db7d475ab03d.yaml | 12 ++-- ...4905-1aa8a227283e43da0f41a656224571d0.yaml | 4 +- ...4931-f5711bcfafc45228fc0a872f3e3fae05.yaml | 4 +- ...4932-faa8cb9cb5e4fa47467175ce98c14091.yaml | 4 +- ...4937-0c52b9ced5fad811a9c32501960e026a.yaml | 4 +- ...4946-0259b7e0abb7a82246638a669050bc8a.yaml | 4 +- ...4948-473a1cc0b0ec6c93a83a85cc6eeee218.yaml | 4 +- ...4949-76eba8cd8a4e862710149dc77a310969.yaml | 4 +- ...4950-218c9a934953359a2e2d8f63be0a287c.yaml | 12 ++-- ...4954-8c1942cb96af03432bec152c3b3fb8a0.yaml | 4 +- ...0033-c8829397a00680f2b905cec73a59a77f.yaml | 4 +- ...0034-d9a90b73211e016b68ca1b3072e7a420.yaml | 4 +- ...0059-87cb25b1c7747f5af4e409cfd05ed832.yaml | 4 +- ...0060-a609881cbf31d06f5f3320cc98e71e76.yaml | 4 +- ...0061-e8b437aec6c6d5cf835be562d11e2a03.yaml | 4 +- ...0062-c623741b8b5dbd96eac005af1ef14987.yaml | 4 +- ...0063-6c1c86676b3f6a00f366fd4021465d09.yaml | 4 +- ...0064-a04fa743a93c3af81940f7c153cec33e.yaml | 4 +- ...0065-5c4c3c093dd69f631ab63d22386e6148.yaml | 4 +- ...0066-c4c4cf320f9d5a30f314d45c9905f1fd.yaml | 4 +- ...0067-2049615ded6008298be273ad480dccbb.yaml | 4 +- ...0068-bfa3bdf21b692d54c0876a9ef34f70f6.yaml | 4 +- ...0069-75529ea91935af94487230f89ef485d5.yaml | 4 +- ...0070-7dc366f5379f56890e8af348e04eb10f.yaml | 4 +- ...0071-e352fc57a2782b7212eb2f2b84743eba.yaml | 4 +- ...0072-e8bc31ae76ca92a9ee7834937815ba80.yaml | 4 +- ...0073-119ed13ee8d9c38858fd75fb1eb0a4cd.yaml | 4 +- ...0074-78c7195ce152d6d5bdeab7f38e20a1db.yaml | 4 +- ...0075-b196a1a5480d68e35f21f441524da412.yaml | 4 +- ...0076-6f48b6d420d1eeb4f46e78496cf4eb1b.yaml | 4 +- ...0078-3cd33ca20c9c9eda3e3eb14910cde0f4.yaml | 4 +- ...0079-33080b0d5149a7811a842330fcd02a9a.yaml | 4 +- ...0080-03f52e4edfa7408cb52c9d72fc195004.yaml | 4 +- ...0081-5d2c8f0682b9df406ab0b4c99151d03e.yaml | 4 +- ...0082-0afedca0afb43a5850c9c8a9aae6b215.yaml | 4 +- ...0087-ee107d9cd894fe54bb677ea3e5052c7f.yaml | 4 +- ...0088-94a65bcd2f84366f6216e3f9b19f7582.yaml | 4 +- ...0094-21d62382cf0e1f6a821aaecd2963e3e4.yaml | 4 +- ...0095-13ec2bdc85df7c3571b35167e7c009d7.yaml | 4 +- ...0096-74ccbff13cedef341c14f509a30bb49c.yaml | 4 +- ...0097-b852d5115d07ebbb3d6948d1d5619495.yaml | 4 +- ...0098-f2a5202240be9077b802b53424bd6267.yaml | 4 +- ...0143-fbdeefe8fdc61a2e9093fee1505ec5f9.yaml | 4 +- ...0144-828638ea1963a58b890deaf22836b2cd.yaml | 4 +- ...0145-dbff9a993e10a4f80cd4718f67303541.yaml | 4 +- ...0146-f4ee020375ee3d79fbe799a7df61d461.yaml | 4 +- ...0147-5ba06f6e9e576d3b96edab291a35b673.yaml | 4 +- ...0148-9266ca4886b0c646b2489433a5137061.yaml | 4 +- ...0149-a32e0707f724d294df7bedd19626586f.yaml | 4 +- ...0150-8f88ca251b34c3f9441215db0d0eb986.yaml | 4 +- ...0151-17199c68a13d9adf35ea73d24856f5f8.yaml | 4 +- ...0152-f8b65cf3e0a27eff31bc4c61ee628d1e.yaml | 4 +- ...0153-eaecffa52785ff552863c4cf8f09811c.yaml | 4 +- ...0154-164be8fbabac441285f1a369205bd8e3.yaml | 4 +- ...0156-7195efc84ea5b8977b30b3313bab7ab8.yaml | 4 +- ...0157-c43c8e4dbb43df481e0c6cf7578539a9.yaml | 4 +- ...0162-a426d8604178ea06fd441814d816d538.yaml | 4 +- ...0165-e82bd49c08eee13d3a8a750e759d2e98.yaml | 4 +- ...0166-b143f95f119acbc330075f594bca9125.yaml | 4 +- ...0167-318af4e7ad8fddddeacf6d8489b19638.yaml | 4 +- ...0168-d767c0b5d303daf65b04ebec294c7e3f.yaml | 4 +- ...0169-fe0f3dd2df39b34940cdb1e352238936.yaml | 4 +- ...0170-1ab07ec0caa3cd50e192c36d8dc28388.yaml | 4 +- ...0171-cf29ff4800b24e4ea96e524c408240d8.yaml | 4 +- ...0172-1856c5e867bf1d120f63e6e0b7edcd33.yaml | 4 +- ...0173-c470f8f5625ce2e9f7a4e073bc31fb3b.yaml | 4 +- ...0174-05c834cda01a386b0744c30fe4c1b224.yaml | 4 +- ...0175-32a522f1c04399b883d41fab9d9aff30.yaml | 4 +- ...0176-0df72c1ea599347d49ac94e58a15317d.yaml | 4 +- ...0177-98df1be3acb90063bf3d77ddbcd92918.yaml | 4 +- ...0178-633a7d922fc914b18ddc7d21035ab39d.yaml | 4 +- ...0212-aedd5bdd6732fba44f64193c96bef864.yaml | 4 +- ...0220-38e29be67779459d45a16e8dcf062abc.yaml | 4 +- ...0230-c77161a5bde1c663570a6c8d07d1524e.yaml | 4 +- ...0231-2f369022c90ab11184f498c7e18175e1.yaml | 4 +- ...0233-0bd5595821e6e021ded7947ef04d5401.yaml | 4 +- ...0234-97e524444c79464d138f78b1bdccb0af.yaml | 4 +- ...0252-ab86f3a4c1a5f2be4ec7926458a9f257.yaml | 4 +- ...0253-2a7a5a205e77ded07268b829f167efa8.yaml | 4 +- ...0254-c2be66a7e8a99421d368476b2dea75ed.yaml | 4 +- ...0255-dead64d1305225210f2390b6b61b5201.yaml | 4 +- ...0259-63e8aaca3bf1d75703f616e718360745.yaml | 4 +- ...0260-33420cd1d54a09491bc3d21e0f948bd1.yaml | 4 +- ...0261-5aea692cc96187a31807c0f2f26416eb.yaml | 4 +- ...0262-5f97cab1c787955760a43df34e0be9d5.yaml | 4 +- ...0263-aea7c598ba9d4fa4ffd8fc15ef6dd40c.yaml | 4 +- ...0267-5829eead4c96879234a4f24b2d7f9ad4.yaml | 4 +- ...0268-e462c11578c3d7efd1d373387e69d961.yaml | 4 +- ...0270-f801c1aeb4734b7133d474f559fadcb5.yaml | 4 +- ...0271-7e2bbcff98524a357bbf2e605454a087.yaml | 4 +- ...0272-1873bca252baceb5719ad4cfda8c952f.yaml | 4 +- ...0272-2d88339f87e8f539294930b47234f049.yaml | 4 +- ...0273-fe4470deb32fffc7ae711831b5c4f60c.yaml | 4 +- ...0274-89a1787cccb90fd10317497361aed1fe.yaml | 4 +- ...0275-c10b1142778769e9493bfb35c88879e4.yaml | 4 +- ...0276-d8d38e7154b358bc9b031a2ad78ce806.yaml | 4 +- ...0277-6351a80c46e754ccfc255c93464a7133.yaml | 4 +- ...0278-db82d66ee6f616f5c7fafadef247b8d1.yaml | 4 +- ...0279-1749acb4ff55d423ebb0f0a82a7c5808.yaml | 4 +- ...0280-d246c52e9d4725c7b245a84d679cf9a0.yaml | 4 +- ...0282-3989a9901d352d6a2f1182e6cf00355e.yaml | 4 +- ...0293-d708fed52a98da33c7b5f777938fb90a.yaml | 4 +- ...0294-0b95cfad1999ef6bac1ef79ebeeb624d.yaml | 4 +- ...0295-1d6b909d9b4a86a23d05301fe792416a.yaml | 4 +- ...0328-88444b55ba593f6267560d3998cc950b.yaml | 4 +- ...0329-7df4e23827630859e3a047cf49f19af4.yaml | 4 +- ...0333-6880997a756b467547a9370c60ac6681.yaml | 4 +- ...0335-4a71f65ecef18d04fe003f6a65b7d9e2.yaml | 4 +- ...0336-aef6ec9f420d3aef577ad115ead987ef.yaml | 4 +- ...0340-250d58918649c83e91a9349c1cb1cbf0.yaml | 4 +- ...0360-6c261a297dbcd9991a82748059272596.yaml | 4 +- ...0362-be668a1f67bf2032bc65bfbd87433e2e.yaml | 4 +- ...0363-29145e5db5dd5627b3607ea1e36f49b2.yaml | 4 +- ...0364-ba00ab2a2755c54cd7d0683aa28f5913.yaml | 4 +- ...0365-ecc9ca2eedeba9a7eb9cef5703953450.yaml | 4 +- ...0366-58b316530bd9635132dfd03a76f490ff.yaml | 4 +- ...0367-fa96acbf0fe29f0b0c48fe458fac9bfe.yaml | 4 +- ...0368-daa26206b4813de7be1eac00b5b9eaa0.yaml | 4 +- ...0369-1dba374d8f67142177f857791fc4897a.yaml | 4 +- ...0370-ea35e08ef79a30cf67846c992e562b69.yaml | 4 +- ...0371-db16305504754334b65159ac40ded503.yaml | 4 +- ...0372-a14026f64e5ecc9508ff272952e95205.yaml | 4 +- ...0373-e6a664a291db10911439b7200ec5f058.yaml | 4 +- ...0374-081112230905e11fac17a07fd3185d02.yaml | 4 +- ...0375-4e96720039ccc700f05ab77c703ff32b.yaml | 4 +- ...0376-6f075010900e43673686fc0d208260ff.yaml | 4 +- ...0377-53a6ab0ca5df0931f86a3cb0e36625b5.yaml | 4 +- ...0378-f9a2a8b78b336f59f7555c63172782ec.yaml | 4 +- ...0379-2d33cf6aadd9c85f7e657c07e30320a8.yaml | 4 +- ...0380-50401a72166a704fa2626edd9085598a.yaml | 4 +- ...0381-6a1e5a3fb07b5d9291ff1e62a0f08cd2.yaml | 4 +- ...0388-1fdf26dc57df471e3029b947067853d6.yaml | 4 +- ...0389-a7620f303af6467e51bdd4f84801b80c.yaml | 4 +- ...0395-9fdc305e956b483dd32edefc410a0147.yaml | 4 +- ...0399-fddf50b89fd6e037cc6266b73dceb03a.yaml | 4 +- ...0402-357fbb3649272b57b08a032d33621319.yaml | 4 +- ...0404-9bcf64c7dbe781ab40d3670dc81b8e8c.yaml | 4 +- ...0418-0c9e1bdf3a0788fe28746e6155355583.yaml | 4 +- ...0419-a7ddbb09fcd7198bac10f4c61d87a90f.yaml | 4 +- ...0422-6ee3ff55725bf2e5894fc0e814f92fd5.yaml | 4 +- ...0424-3b3f96c33b07ec89b36c294dbf4ced51.yaml | 4 +- ...0429-bc7de59ba516744b35b1924de01c50d6.yaml | 4 +- ...0431-466048d1971518e0b30eb580a52cc9ff.yaml | 4 +- ...0439-69c9678050af93b08d000bd2cd1bbedb.yaml | 4 +- ...0446-3f9ac076d173ecd9afccb09cd7195bfc.yaml | 4 +- ...0447-dd26803b22794f717e5726511579315e.yaml | 4 +- ...0467-129be45dc62378c19cbd82aa0287c865.yaml | 4 +- ...0477-eb2326275a758827f7cb2f8622cad6ce.yaml | 4 +- ...0487-fd075b6c9853246b5cc33cafcab17a0c.yaml | 4 +- ...0489-09f92d564944a33a7811dc40429fdb32.yaml | 4 +- ...0490-14de97dccf48252d3b3ac5a2e5d0250f.yaml | 4 +- ...0491-1a925f12b1905f4ad4c8d17bba7bb15a.yaml | 4 +- ...0492-1735d30fe988ff978861d4dbdb0c640e.yaml | 4 +- ...0520-8ca33f13028f0931d0d1467c7211048d.yaml | 4 +- ...0526-b16694416bb8375e384e3d9eb2224580.yaml | 4 +- ...0535-28e3179254b4fd139125a16ede646345.yaml | 4 +- ...0536-8e3ce96babe760c2cb16640799a8d0b9.yaml | 4 +- ...0537-95618d186dc4c7ea88896374745039e9.yaml | 4 +- ...0538-a735151e1a4f287ab4567ad75cce9a30.yaml | 4 +- ...0539-bb81738a1483724d89303a6a2b8b759f.yaml | 4 +- ...0540-876486fa06bffb3829a9c77f08f98e1b.yaml | 4 +- ...0541-2dfa9da72134b3fee9c376ecca6fe446.yaml | 4 +- ...0542-7a94ec5884e06f0a302f2bb4d1ea7e80.yaml | 4 +- ...0543-fa4a6ca6cb5f0ed29a506220c9fcc52b.yaml | 4 +- ...0544-1b107fac39fc60c6674fcf9f0d2a0f84.yaml | 4 +- ...0545-da8a9590fd2919ac3b910c3614df54d5.yaml | 4 +- ...0546-a7309b89079395b33b2cb7915ba03d32.yaml | 4 +- ...0548-243f75a6da65f6edc93ed6a1b9eaec80.yaml | 4 +- ...0551-f45bff66b36c1cb9f233929a488ca421.yaml | 4 +- ...0553-608358cb0a02728075caac1560a96687.yaml | 4 +- ...0554-f4c35f9c74d06655cf517936ec3bc387.yaml | 4 +- ...0556-9dbce4bd062a39cef5c1a852c279047e.yaml | 4 +- ...0559-6238c45309a73e1d06001135fffb48d2.yaml | 4 +- ...0579-f373bbafc03e475d3ffabbbd84f90eda.yaml | 4 +- ...0583-06ebadedd58b7ae3403fa022e6ae3a90.yaml | 4 +- ...0584-30ce892560143a1889e7a76a4e09b69d.yaml | 4 +- ...0585-f74b8b0e3c6cf42f9c7d68f58857b310.yaml | 4 +- ...0586-c08b2158511f440bda6243887c732dc7.yaml | 4 +- ...0589-074f8cb869df86a1b6d64a4a39d460b8.yaml | 4 +- ...0604-af40b53dc8c1c75f92915027f96fff8f.yaml | 4 +- ...0605-9eab813e12b4ac048e7bde30bc6ba691.yaml | 4 +- ...0619-d320263520ce22890af78fdf485478ad.yaml | 4 +- ...0630-d15c506a6326f67745ff7867b3d43cbf.yaml | 4 +- ...0631-286f920ff3d0f48835cc5b28e8181446.yaml | 4 +- ...0660-c9194ffc50bb3f8abe6f00ef14c4cdc5.yaml | 4 +- ...0684-3831d6e441ebd610665743a8c0a63dc7.yaml | 4 +- ...0688-1e853b05728a99a8747a224a5333ce69.yaml | 4 +- ...0689-5ca6c532bc755bf0bf6cce4098713b54.yaml | 4 +- ...0691-bd74a2b3418b2ca97de6f6d3609c3ea2.yaml | 4 +- ...0692-f16e74cd433857af6e0b58aa13a15fac.yaml | 4 +- ...0693-867cb44fcfb4a79db1df0d5c41aba304.yaml | 4 +- ...0694-cb9d0b1e1071125567f9f9731a764d07.yaml | 4 +- ...0695-2f98768ab3ca0c5e24ef32eeb6e8633c.yaml | 4 +- ...0708-7ec1193c499ff8ca62486bd031ee3b72.yaml | 4 +- ...0709-1cd960c12693f517a3ddc1f2dd996093.yaml | 4 +- ...0710-547f6d438086b7c901daed3b548b280c.yaml | 4 +- ...0711-414ea88c3052f2317af7072cb92eace3.yaml | 4 +- ...0712-84c888c9934970f66e3e629431140250.yaml | 4 +- ...0713-30f703a8acc3080fb74debd07614d86d.yaml | 4 +- ...0715-893145b250531536b2c0fa0f1e330f2c.yaml | 4 +- ...0716-0b0e708bccfb3aa959792527101f43e8.yaml | 4 +- ...0717-be4129faca04d80ed9ac385cd5b2bcc3.yaml | 4 +- ...0718-98f5671f8000cd41848d0242c4d503d1.yaml | 4 +- ...0719-094fc0c37d514333a53dda18143a300a.yaml | 4 +- ...0720-d79b94a0512e6933bbccf753fd89114f.yaml | 4 +- ...0731-18a9792159e3a4315eefb0545c165734.yaml | 4 +- ...0749-59a12b62de2e9aeb74cd74615dde1cd6.yaml | 4 +- ...0764-3c52a879e5c7f6b209aeea9f28acf059.yaml | 4 +- ...0765-123e18f5d341b41bb59091344f2c4c88.yaml | 4 +- ...0768-f27c37237edad62fdf365ba901d07da8.yaml | 4 +- ...0772-2e5b9dabe10dfc18a46871d43fa96491.yaml | 4 +- ...0820-be510149fd1b62e5b5bb38762ffb0573.yaml | 4 +- ...0823-4871efeec934efc06ef8f938e4a88d59.yaml | 4 +- ...0844-04f146ec33992e5efff05a0bd40f659f.yaml | 4 +- ...0865-af4d8c78cfc5d18ffd2467d3a5581338.yaml | 4 +- ...0873-437b56ebf4aacc7667a38732c9abf4be.yaml | 4 +- ...0874-f10af2927781e57c830660efc5735cb4.yaml | 4 +- ...0875-8f211e542f6f3ea8f0872b9525089564.yaml | 4 +- ...0889-0ca0bd9c39bf258c51c77483b135b8f5.yaml | 4 +- ...0890-051c86487ea054ab8374342c3d7fd783.yaml | 4 +- ...0891-295c71d391fe6f97f05c0f5bc739be92.yaml | 4 +- ...0892-84478af058257dde74ad587387b8e0c5.yaml | 4 +- ...0893-49fe99f51fd3a93a572d1c7ee54d4741.yaml | 4 +- ...0894-fe4c4bb2122cdad1871934e83ec97820.yaml | 4 +- ...0895-d4baf5319f8e6cff227085b65be4db6a.yaml | 4 +- ...0900-55621d6fc615b8d4a345ef4a0a4b8e73.yaml | 4 +- ...0911-88b0cb27fd508341f3181a16f7fa23a3.yaml | 4 +- ...0924-d9e5ab172446fd3be8d4dddf9dcfa63e.yaml | 4 +- ...0955-4ab5b9d0741d36fdeb0d5b8e06672d39.yaml | 4 +- ...0958-25a10466c42d47292b8a71c862e9a26a.yaml | 14 ++--- ...0993-380d905325ab5069c99a7e476a1a4f89.yaml | 4 +- ...1016-18457ce0add8e02185ec82dfe3cc1c14.yaml | 4 +- ...1019-0aa92148d99c1bca8d88494c39b853c4.yaml | 4 +- ...1021-65248f15aa94ab7dabcc81cdc7d86180.yaml | 4 +- ...1022-48db89bfccb085b8a9e9bacdc76c0af1.yaml | 4 +- ...1023-a77598a8619865ebfa5a440835fd61e6.yaml | 4 +- ...1024-2f2d8b93ad701e19ec6f3207f936eef8.yaml | 4 +- ...1025-1057cae23f85520832f9b7c2f9fe55c7.yaml | 4 +- ...1026-eb91f445c10e82b7c3e98be1062a0e24.yaml | 4 +- ...1027-051ffefc51104be6bb17d2b5cf41b941.yaml | 4 +- ...1069-ec46b5347c7ba7bc9f7cdc74d17b2526.yaml | 12 ++-- ...1090-4f005a53f32a91b958c425e9676f1ab9.yaml | 4 +- ...1110-04f24d8a77ed9613e08490a191c4df98.yaml | 4 +- ...1119-4393e503b4c5e360e86d4cf75de99b91.yaml | 12 ++-- ...1120-c518ac9593781d65f764a219f04b0aec.yaml | 4 +- ...1121-3d832eae81d276110b2fb05b6aea23b7.yaml | 4 +- ...1122-fece4721182fa2d84ab761adf04133ca.yaml | 4 +- ...1124-00935a43a6eeac3216e5733aff1322b8.yaml | 4 +- ...1125-9346f7a9d2f3883e949e211cd3195670.yaml | 4 +- ...1126-6baff9c0f37923203f19e1b9ed3bec89.yaml | 4 +- ...1129-0b46297c5a1cfd566b6a7dde332d02ec.yaml | 4 +- ...1155-2f7ae6b5d7fdabeafa201dc90bcb50c1.yaml | 4 +- ...1159-1609915cce06136e2f0af7da1d5a5d40.yaml | 4 +- ...1166-0a55a8c44319eebd91a4589219732011.yaml | 4 +- ...1166-50ee1df3b648d8ffe7c8bf72d2de42cd.yaml | 4 +- ...1169-1ec906f849b052ad86a65e59b4ad588d.yaml | 4 +- ...1196-5ab0380f0225cb3f813fd2faf9e0804b.yaml | 4 +- ...1207-5f2adc5ca6dedc40903aa1f1e563d920.yaml | 4 +- ...1208-15a164b8d7acefaa3a7ae7d37647554e.yaml | 4 +- ...1259-28e170e893975e3ad314a1e6dd206e77.yaml | 4 +- ...1273-bce590a02f073327d2ec7a566a982db1.yaml | 4 +- ...1274-ea2779881d033f74603b414138c61a0a.yaml | 4 +- ...1323-53951cc6c6fc3a1b6dbee499dbf71331.yaml | 4 +- ...1325-fe922fd0e38d640f64cea8429582a5c0.yaml | 4 +- ...1333-9a0b6c64179538a07b644a9798c3ccee.yaml | 4 +- ...1334-2a1f9d077aaf4e3fadb41e60e62e6854.yaml | 4 +- ...1335-dea1282ba49458404fbdca77bb502b69.yaml | 4 +- ...1336-7fabd60d3b2198be95329f47bacc886f.yaml | 4 +- ...1337-76ac5b6d638212e0347ed800db5531d1.yaml | 4 +- ...1338-a0e3ff5d3be6b2d76d2f97e392703cee.yaml | 4 +- ...1339-0fee961f47a5a9afb9a972a5a5342a98.yaml | 4 +- ...1347-6aade0ab1cd3e84f1c328d12c13c28e5.yaml | 4 +- ...1374-a159294bbf51e0b7e5b555bc0921d9bf.yaml | 4 +- ...1375-528f5db23cd029b151a95682806084f9.yaml | 4 +- ...1381-9ba2b29c37ba8aee356eadac5eafa36d.yaml | 4 +- ...1400-042678d5382067c26f9d9ead263e484c.yaml | 4 +- ...1403-13c73556a747c83cbb4df9719464f4fd.yaml | 4 +- ...1404-0e821b289513241b63396beff87653b4.yaml | 4 +- ...1406-1671dddc3e7743782d8ec72b0e2ab60c.yaml | 4 +- ...1408-0641eb85b540308df0a59914e6860d1d.yaml | 4 +- ...1414-30df02f445ade717ac7c0e2991062171.yaml | 4 +- ...1420-83c0864a3df9b4d7703e76d7c2b55658.yaml | 4 +- ...1425-5c29a3cc888c2b8f4800d87269906f2c.yaml | 4 +- ...1426-b470f5de6fb2ae7a347b8e6eaf7d8ee9.yaml | 4 +- ...1427-be54fbb88b07e1793c0aea3459743537.yaml | 4 +- ...1469-ba0174f27e21e2789733491b8587f8b7.yaml | 4 +- ...1470-90a088835020a5c787dfade0eee8a2e0.yaml | 4 +- ...1471-10b51d35ae6aafbea477ae24a9c22ccc.yaml | 4 +- ...1509-99958bc5af6b387619c59f0368c5fbd3.yaml | 4 +- ...1525-dc0678502bda1f209b1b74a11263e93c.yaml | 4 +- ...1549-e9f3d7aebb0ed7cd4a6a52dea34e70b2.yaml | 4 +- ...1554-e5b4920cbbb8f5f8f7e1a259b30101c9.yaml | 4 +- ...1575-3c9418584b935e41a1f48b31c0a5f181.yaml | 4 +- ...1597-e9eec5a929c2311a5540a7010e91443f.yaml | 18 +++--- ...1602-6098ffaf0f2018e72b2fddb1b0994b64.yaml | 4 +- ...1614-050cddb029ad5e41b8d75ac57910a3a4.yaml | 4 +- ...1615-6cf0838d8f56929452bab2f8ff3f1bd8.yaml | 4 +- ...1649-711d5e4371b5307e83aafa75e094a16d.yaml | 4 +- ...1651-f715c92150b63b8634910eb743badf7e.yaml | 4 +- ...1660-5ef5a5a8c6cb4692922673fc79eb4970.yaml | 4 +- ...1661-7d1a4c06854607da91f0cfd973b64e55.yaml | 4 +- ...1669-13e2a2185dde6af6bd269d22e183dd35.yaml | 4 +- ...1839-cad557e1501fb237a72952936969ee8d.yaml | 4 +- ...1840-31672843b36374c6d9bc9abf980ac503.yaml | 4 +- ...1843-5821b8bbdf52273dc284ba9fb20cfb12.yaml | 4 +- ...1844-b1c3c2103a95130385060251902a6b08.yaml | 4 +- ...1861-377e66001fb8e84db9266941f39f3e9d.yaml | 4 +- ...1865-874a492260299c7a5afa8a7cc7cbcac9.yaml | 4 +- ...1868-9ffefef754ef7b05c84f3b0ba93de0df.yaml | 4 +- ...1869-bda0e76aad71129453d100395876792d.yaml | 4 +- ...1874-69231840a822d24bacb2d776a5d46cf4.yaml | 4 +- ...1888-50115b9c428a5ad33912876ac3e59d68.yaml | 4 +- ...1889-01ea85ddd8a050d4ed49539de0e44b17.yaml | 4 +- ...1895-c31135ea82eaff9efa9c5f32111bb6e0.yaml | 4 +- ...1905-44f42e89daa3749af5c9d461caa7bbaa.yaml | 4 +- ...1911-388e6ad87200512eea2e328c413a87c2.yaml | 4 +- ...1913-47ea06b51e4d84465dbdc7ce5332226e.yaml | 4 +- ...1917-d2b59825f91765366d354ae0bca502ca.yaml | 4 +- ...1928-dca77da230ccc48431ba72fffaf1572c.yaml | 4 +- ...1929-fc23a4effa46a10b3b1c7e7c56d41874.yaml | 4 +- ...1930-cda6fd724330a43ee464ed21db562f0f.yaml | 4 +- ...1931-e73d249d01ad89f85ce6653e71044320.yaml | 4 +- ...1938-880d7d40699b96b833547889085219bd.yaml | 4 +- ...1977-ffbb08b3382f9c076d19dfa65caa3e3a.yaml | 4 +- ...1982-daaaa272b2f5cd2cb1ddbf8cf5560d23.yaml | 4 +- ...2009-977a0355e694b9d265545981130653f2.yaml | 4 +- ...2026-9fd302216733e7b16fde39fa0da8b2af.yaml | 4 +- ...2029-a5227115c16c80c1d90e0210cfd39bd1.yaml | 4 +- ...2031-cfb712440be870231ef705d9454b409e.yaml | 4 +- ...2066-0716e418df849204967cfc79352f5ba7.yaml | 4 +- ...2079-514e5589e35f6de5b251e63d9ba1561e.yaml | 4 +- ...2082-0caf8903231ef8666af5245315083b74.yaml | 4 +- ...2083-9de5506c980e28c9e55c18a88ab23a5f.yaml | 4 +- ...2084-7daa2f9a38772e28d5c088d50297e34a.yaml | 4 +- ...2085-ec83c952597cd4d48032e81f82ee4086.yaml | 4 +- ...2086-b8c50e487b4b0337b88f73b897d2ea2b.yaml | 4 +- ...2111-62f024d1a6544d8128f328de7ec4ed81.yaml | 4 +- ...2113-c98cc11ba230cb93eea39872b453bb99.yaml | 4 +- ...2114-3c32e113f430e95dd1bba8970b964bc4.yaml | 4 +- ...2143-165d37e436f1584c4d3db5b3ec68fd79.yaml | 4 +- ...2168-4c56b6bb234842fef87202ea54089581.yaml | 4 +- ...2169-1b628b6e919f163c78dec1ae22685875.yaml | 4 +- ...2170-dbd78c6bc37635ee7558d00a91a8165a.yaml | 4 +- ...2171-e1ab43eefd1268f41af50d790136abb5.yaml | 4 +- ...2172-948fbb4659b9489d63a6dcbbe5ab82b2.yaml | 4 +- ...2173-ee566a4e5dfcb43b5aa7224c7fc505bf.yaml | 4 +- ...2174-6a3c999f177d3f3a9005f7b86b4e26cb.yaml | 4 +- ...2178-6d0e53ee77e3c1fef450b5cd709f1ad9.yaml | 4 +- ...2179-ae1b1a51b391401549de89991091def2.yaml | 4 +- ...2188-29c3e0ef4de33c7a54c9e5adeed782a1.yaml | 4 +- ...2189-b3370369626f0cd7746a33baa8f9c6f9.yaml | 4 +- ...2201-263813b94544d66ca6de0f83221d4012.yaml | 4 +- ...2223-0769a7de02fdecf0755ac761d0a440c1.yaml | 4 +- ...2224-70a47ff6f5488e7468e76cf5273bfb81.yaml | 4 +- ...2225-437f4f4319341eb71e66802d9a46e647.yaml | 4 +- ...2229-bd5ef70cad456cfb810c3a196f6a2a81.yaml | 4 +- ...2237-64ddeafe0a6eb1f3dc3db9049ece872d.yaml | 4 +- ...2249-86ba8169e30edfd0fbeaaac7e702dfce.yaml | 4 +- ...2252-9576bd28245508413e199ad3d8acfb19.yaml | 4 +- ...2254-b309eae3300d9042c3f3d6f98d0437a7.yaml | 4 +- ...2261-dd3770633c5e3f81d160a943bc75a752.yaml | 10 ++-- ...2677-12bc7ed9ac4b4df7c9585c5a1693f987.yaml | 4 +- ...2679-91762f25ca1ba53290ed2c419bfe3a07.yaml | 4 +- ...2680-43886ab11181377f0791e69c2c423b63.yaml | 4 +- ...2683-cc0d4514b7c79b3cb4d1496328155c24.yaml | 4 +- ...2684-a6ba6de400353cbaf7c7146b43b770d6.yaml | 4 +- ...2685-4f38551b81bcc12b9f18d5f308341508.yaml | 4 +- ...2690-0b18a98b24cbdb105ec0fbddf0f9fc1f.yaml | 4 +- ...2696-a7668a1f316cb3a4a10463e8f1f4e787.yaml | 4 +- ...2698-9be84376d34a812060ad8aba2e71f1f0.yaml | 4 +- ...2699-09213ac628577f10fc1f9d7850e68118.yaml | 4 +- ...2701-e077433f57a559397a844ed63a88920a.yaml | 4 +- ...2702-5e80d211739bf78fc6d29ff73646a991.yaml | 4 +- ...2707-01c7f6a7ff2da57d8e46e6c08e382c32.yaml | 4 +- ...2708-e82a5c99393c73fafe048a1ee03cc574.yaml | 4 +- ...2711-c94bdab6658e87ec5036df9af1fd3f36.yaml | 4 +- ...2712-71cf8d6f1781f11cff9af8b811c7f0b2.yaml | 4 +- ...2713-5096ea0bd77ac20a45ea75149ea1f0e9.yaml | 4 +- ...2715-c4c58ad76c633d16084174a989d36082.yaml | 4 +- ...2716-6bf95a000c0173a075e212bc6eeb873d.yaml | 4 +- ...2717-527f36f790da1a74645e814e4fe52934.yaml | 4 +- ...2720-e52be0435f55047670368cd34b580535.yaml | 4 +- ...2721-edd20f1acfb98b2d0a1653edfc88a6dc.yaml | 4 +- ...2275-054a823a88fd659044cb1d5f3fc034a5.yaml | 4 +- ...2280-85863960848d10abf7509addf7ced106.yaml | 4 +- ...2284-fb8070a3ea093b2b03c1a0de45c253ff.yaml | 4 +- ...2286-f0b0a230f7453036382fc231a8391538.yaml | 10 ++-- ...2287-f0869bd6c833a2dcca8d781669a8f39f.yaml | 4 +- ...2288-08e36a5e429e15172c47a461c7457404.yaml | 4 +- ...2299-301e81e7a190a838bf006476907547b4.yaml | 4 +- ...2300-6c834138798466361126510722b04f6a.yaml | 4 +- ...2302-730361678b13f8f0736a72594b63e5d4.yaml | 4 +- ...2304-f2c467fe9ec6884b9a3fd8b065881ed3.yaml | 4 +- ...2305-1c63696c8009b48d027fd7d86fee0dcb.yaml | 4 +- ...2320-1ed11c7c0b7e8b4ad6e63123437cef8f.yaml | 12 ++-- ...2321-2c53b255c00d529e8b580e9b919c837b.yaml | 12 ++-- ...2324-5bdb93ed09679c782c93a7aa96190eff.yaml | 10 ++-- ...2333-faac6d1ff1697000b9b14ca585be6ab0.yaml | 14 ++--- ...3490-2bb4b724bd1a7da8929a5d331260d484.yaml | 4 +- ...2351-4b446531318d71c375cbec3251c138e5.yaml | 4 +- ...2353-8ecff4070b265868b558d6084036a925.yaml | 4 +- ...2354-a6450bbcf1d391d632396e4291c55731.yaml | 4 +- ...2359-648072cf9e5d6b428e895ff9cc55e265.yaml | 4 +- ...2362-03747b0c7844da2a502c367644e13831.yaml | 12 ++-- ...3639-b093b4fe361511a13e571267d2dc54e9.yaml | 4 +- ...3640-aca127a8ed0bd7922687fe103f18d74f.yaml | 4 +- ...3641-de9e079bb83ef0de7a86b06c72e28cbc.yaml | 4 +- ...3642-cacc6911c40efb999d1fe86f0d0191d6.yaml | 4 +- ...3643-aab60d7e635c7cb328946a00c5cb0802.yaml | 4 +- ...3644-1700178605ea1a028eb5734d4a1eaad7.yaml | 4 +- ...3645-f6463e889774b4038473eb08cfdfa039.yaml | 4 +- ...3647-f7d812f744f4c9ca71f204033cc41839.yaml | 4 +- ...3648-2aa015126a1a525f86550f7ae828f7a6.yaml | 4 +- ...3650-8f1eedab61ce04ff36cedd6b1737dcab.yaml | 4 +- ...3651-49a8bd4f442f3ed7ef68fc2e1242b1b6.yaml | 4 +- ...3652-3959344c0c7e5999442d4341d93fe901.yaml | 4 +- ...3653-ef3286d81d94e9b713e6b4a272249cba.yaml | 4 +- ...3654-74a58305bbc22438aab63e645d576e4d.yaml | 4 +- ...3655-ebaaeb684636cb787d78e7b3c484407e.yaml | 4 +- ...3657-cabb923e0e757cd8efc2802197c2fa24.yaml | 4 +- ...3660-04f298147815233cd89825cce559844d.yaml | 4 +- ...3663-3b5c9ebf6b5cbb215fd772c13336a403.yaml | 4 +- ...3664-8451bc0b3344f88890ab58dfe6424c23.yaml | 4 +- ...3665-7bfb92cd98981d6d2231287741115d7d.yaml | 4 +- ...3667-558e7a9aa7fa3c2ac2fdb51e4f62875d.yaml | 4 +- ...3668-560e75b141006ad846ab2e105e9e507e.yaml | 4 +- ...3669-089c7908dc4fffc678d9e3d75fcc62a9.yaml | 4 +- ...3670-cedfa6f88d2bc9a6561954401e5a9b61.yaml | 4 +- ...3672-85f432bf2dbf8ba147f83f3469bc9104.yaml | 4 +- ...3673-c8c3c4e396d486583b9e49a37e519b53.yaml | 4 +- ...3674-40022e8f0d8dd6d5dda3b842e2bc95ed.yaml | 4 +- ...3675-19694fc6eba31e53a1ac14bdaf6f6028.yaml | 4 +- ...3676-2ff1bc044255f45b7cf3b45392cb2e17.yaml | 4 +- ...3678-6fafcaccee81c5d3208247d34dd3565c.yaml | 4 +- ...3679-37413a766ec0b67c1d3586422811e23c.yaml | 4 +- ...3681-6e8db758b1055e1e1edd16d20fa3c329.yaml | 4 +- ...3682-276fdddefb69d404e325809486a9c5a4.yaml | 4 +- ...3683-e6a4bf4b7def7461fd0f2bf14330f22c.yaml | 4 +- ...3684-b238fd34b5c3e924a09fd674d5421611.yaml | 4 +- ...3685-248c17eb0194783cca6065d1efba6689.yaml | 4 +- ...3686-065f57f30aadd88480dc295cfdb7429a.yaml | 4 +- ...3687-de2bc693a1c312889ab71164989a7177.yaml | 4 +- ...3688-362e89b41145042eb5431e45e53b6db2.yaml | 4 +- ...3699-941ae6e3f270ab1852f33bed4b21e75f.yaml | 4 +- ...3700-edb6cbfc2b955228bcb748bd996c120c.yaml | 4 +- ...3701-c3d61b837adb4506fbea73b489e751f0.yaml | 4 +- ...3702-8c52e6f03af939f0f311c40af30d7f63.yaml | 4 +- ...3703-2638501c4f697eb3fd2442b86e278a44.yaml | 4 +- ...3706-5585b9de0a3cacd6beb8b8edc279fcc3.yaml | 4 +- ...3707-da04799a8ee55b9edffd7e84cb258c78.yaml | 4 +- ...3708-4f85b81befb670bebb2829a27d7eeb09.yaml | 4 +- ...3709-d8720ff7be23b66bec0bd659c201c502.yaml | 4 +- ...3710-c57529c85cbb2380b599b6f25e5d1cbd.yaml | 4 +- ...3714-a75e8600265672ffbfe8fc90d6a06636.yaml | 4 +- ...3715-bd931f434035df45531eaa63d35d55b4.yaml | 4 +- ...3717-cb4e42488e82603fdda3ed8a6057c4fa.yaml | 4 +- ...3718-06f0f6d997d3961c4576d91935933f05.yaml | 4 +- ...3720-569c4e32e955a5a711d57f73a7ff1bf2.yaml | 4 +- ...3721-df593141a2030e92d8b8a063fe09a284.yaml | 4 +- ...3722-08485cb22c15bc9351789c0be0e79565.yaml | 4 +- ...3723-8b5e824a12086cc74066614f2e4e51cc.yaml | 4 +- ...3725-d28bd5fd4f3450ea3f311605e6d65b1d.yaml | 4 +- ...3727-309fdaa44a67ee8c05b1363fafbc2e7a.yaml | 4 +- ...3728-d86c9fbec6faeed6e24c9e1120c7e0c6.yaml | 4 +- ...3729-7f4172230ab5f4cfd3c2df5f07ea6d4e.yaml | 4 +- ...3732-764235f1dad8997c7feda04c94cf2850.yaml | 4 +- ...3733-277494a31c77da0ae18248d4fccbad90.yaml | 4 +- ...3734-e37188c1de6df4d33488960fa6e214fa.yaml | 4 +- ...3745-6d4992572a9f9bd5311ba2254f8b32c1.yaml | 4 +- ...3746-5bb6026096b7bf370409b664b0a819cb.yaml | 4 +- ...3747-88e0ecb64f4709b7a4173b13eb85c3b6.yaml | 4 +- ...3748-d432b5b11d667b6f9fe5cd55370cdb88.yaml | 4 +- ...3785-d864c9b876d3aee646e414b358c69b64.yaml | 4 +- ...3786-fb9e76e2a53a99a1061be745850fe380.yaml | 4 +- ...3788-38be090459bf4011b3b41398d60796a6.yaml | 4 +- ...3789-d025df7fa9c98e92f3b558a7323cb34f.yaml | 4 +- ...3790-79c1e1544a74f2c87544fd2e816d236c.yaml | 4 +- ...3793-66aaa6f41f27e2a7e948bc3c3424d334.yaml | 4 +- ...3794-42f2aed82645b4c22a964230d4cf5c0e.yaml | 4 +- ...3798-9cf47a9aaadc1341f9d7d43e1e7e02f2.yaml | 4 +- ...3799-0fb85e5ea92cfc0152cd39c07cc97431.yaml | 4 +- ...3800-0445de609fc885d2b170effe241e7510.yaml | 4 +- ...3806-73efd5c8bcd4c1bfe4df6f8b395749d7.yaml | 4 +- ...3807-2c9039886374ff786c4c2e679732fd8d.yaml | 4 +- ...3808-eca4f2076644e75e750957ea6e558bad.yaml | 4 +- ...3809-4d66daf76c1a504d8951d5442d44e0d6.yaml | 4 +- ...3810-f526a0fb0a181d070234f458832b61bd.yaml | 4 +- ...3811-2cf2ecadfdb85fc26b2f2d1670a74a60.yaml | 4 +- ...3812-71e56d0f97e8b4d7649e09ad58dd5927.yaml | 4 +- ...3813-dd53e1988ec5b5d25424d4247fd55d9d.yaml | 4 +- ...3815-1179313cfd258782fb4aa71495304bc0.yaml | 4 +- ...3816-e71a52c7f200dba2edfeb838eff9f8f3.yaml | 4 +- ...3817-03f092a688a4fa72580d80fe6ada5bb3.yaml | 4 +- ...3818-e5cd3f1b72f8c188bcce67a3cd5ccf0a.yaml | 4 +- ...3819-1b30aff662020c0b4f39f0c4b04b2958.yaml | 4 +- ...3820-93365cd3a26ee2a497f31876bb4917f2.yaml | 4 +- ...3821-a73b50da5126e009aa2afaa408141c1f.yaml | 4 +- ...3823-d8eaeaf9f69a4b2de6a788086b60bfc0.yaml | 4 +- ...3824-808f401d9d8c5d86d169e876e53df971.yaml | 4 +- ...3826-64cea71514683366dc6b4c2ffb6a6e72.yaml | 4 +- ...3827-e258e8570aa5a2a07663517678c9341e.yaml | 4 +- ...3828-2349a7bd555a58451ac9e6f7145fe711.yaml | 4 +- ...3829-9a422d0a1f5b287c75a0c4e8af0a5fc9.yaml | 4 +- ...3831-37317046e94cf4102e2b78af213fc732.yaml | 4 +- ...3832-f48aa8ce150f50f9f99d4d22650a952e.yaml | 4 +- ...3833-e9fd5a8f4cb940c05dfbd60e736ab50a.yaml | 4 +- ...3861-573c28c014e533996385e54c5801eb5e.yaml | 4 +- ...3862-4703f57dd95a665cc36f6d5726f726bb.yaml | 4 +- ...3863-537feb2660b274ef93e595158af0eec1.yaml | 4 +- ...3864-1f531b026c2443d4ba9e4c6118234d6d.yaml | 4 +- ...3866-6b38cc619c1f1d13c6fce974aa8b5a90.yaml | 4 +- ...3867-f3522c3cb0ccfb1220b311f9a238555b.yaml | 4 +- ...3868-bdd35485646018dc29c3dede2e0cfc31.yaml | 4 +- ...3870-cfda816b6240f8a3b82f71453a31052b.yaml | 4 +- ...3871-63f1bf4087d9427b6d24f67f8ffe6d66.yaml | 4 +- ...3872-91afdd80e105f88c419657c28ec390b7.yaml | 4 +- ...3873-3b3faa72335204be9fd1e5395bb7377e.yaml | 4 +- ...3874-cb44b891144850987aa067ef65bfd80b.yaml | 4 +- ...3875-bc281b421f8fff950362929962ab0019.yaml | 4 +- ...3876-bf60bab5b44140ba04d1559cd2178f30.yaml | 4 +- ...3877-62705338d1951d661bb8e5bc23d5b61e.yaml | 4 +- ...3878-5237dfae31b24b8180bcd6193ab8bd7f.yaml | 4 +- ...3880-9084030bbc61cd11a5b8832a564811a7.yaml | 4 +- ...3881-ae8255f2994549b36706bb9a56ad3c0f.yaml | 4 +- ...3882-1a33452c961e3444957f4bc07615cf79.yaml | 4 +- ...3883-cf0e16a0243bc8e5fbe7907a0ee34454.yaml | 4 +- ...3884-0ba2d63b51e45936904968ed820d3fb0.yaml | 4 +- ...3885-62b74eeb9a66bc4a3cf51fa299ef8a9e.yaml | 4 +- ...3888-f745637cf5ff648ecffd79a7f071d200.yaml | 4 +- ...3889-c39c9d651b411fa109fee2b8c3a1d9b8.yaml | 4 +- ...3891-dd78e64b2b479493968a1e6217c98447.yaml | 4 +- ...3892-d65055d7026996d94428cd7d953a60fd.yaml | 4 +- ...3893-3a84f9286ec25d34a996b5cb4ee829c4.yaml | 4 +- ...3894-65bd3240ae8121decf63d5f24c3d008f.yaml | 4 +- ...3896-e9eaa7084ed183eefbf2977e6f156e8c.yaml | 4 +- ...3898-487e89618ab2c9b35b3c1576f9f20c5d.yaml | 4 +- ...3970-32eb01ee606ecc19d89dc769776b1c92.yaml | 4 +- ...3972-243adc14e5399e777d2255721eb66201.yaml | 4 +- ...3975-cb184c0a5bf632bde9de97505ce638ee.yaml | 4 +- ...3977-73dd9496dc7942d3595fe6b58faa41a3.yaml | 4 +- ...3978-11a9c2fdd6ced3454ae2f484273892ee.yaml | 4 +- ...3980-d4435c597b00bf3290ee73c887974569.yaml | 4 +- ...3981-22b31e4572f874fba75c72ff00d007de.yaml | 4 +- ...3982-f018dd006c86a273640a9091528e99af.yaml | 4 +- ...3987-4d9fd3b2756396c2e2474f36f3b3ed72.yaml | 4 +- ...3988-3b65f76db2b87c51279c14c330d16347.yaml | 4 +- ...3989-49f8b17fd3f7202d469cd36057801698.yaml | 4 +- ...2399-f3d365dcf43ab1e2b6ca241869ef39d2.yaml | 4 +- ...3990-42471f956508e099a58e2e33212c947e.yaml | 4 +- ...3991-e064d299c84a7a932db5e1b086223b4a.yaml | 4 +- ...3994-1243017811fac8a9f67c1c02c6c11406.yaml | 4 +- ...3995-500071d87ecb0967bf74f13aaaaabbd7.yaml | 4 +- ...3996-a51251f0d703aa8b0485bf4eda435396.yaml | 4 +- ...3998-89a7d7a1b88043a7292e56fadd9f32f2.yaml | 4 +- ...3999-49a596fa960c73e741b497015244d412.yaml | 4 +- ...4001-1520c53880fff07e37200c6f21a3681b.yaml | 4 +- ...4002-9f08d8940e734966b92051cba3f5ff32.yaml | 4 +- ...4003-690de1b98dd30a46cb8901aa5c2f16aa.yaml | 4 +- ...4004-e990d85401ec922ea084ebafd475f1d6.yaml | 4 +- ...4005-44d79c88f80918a39ad3735f87916ce8.yaml | 4 +- ...4006-d03335b5fcf3342ce30e3d6994089bf1.yaml | 4 +- ...4009-4fc88bb474bb1a0cdd35b01d04f15578.yaml | 4 +- ...2401-1b8adc4375e4968834c6e9a5908156bc.yaml | 4 +- ...2404-8a9c908ec048eb5db70aedddafa15d74.yaml | 4 +- ...2406-75fa36bac06fa043ebc71b72e7bf53b3.yaml | 14 ++--- ...2407-90aaaaca062b8a7ccd7c1e4f2b79b8c4.yaml | 12 ++-- ...2414-b65c2cbf689ff5e6c36de8e6ea88fb1d.yaml | 4 +- ...2415-80701456edd5634e54dde4f94f03d86e.yaml | 4 +- ...2433-6fe67f9ebf1fd28c0850e6428387bc2e.yaml | 4 +- ...2435-e95a6a45d70dd7149f957cc2dea209d3.yaml | 4 +- ...2436-97602b372ac2dff313ee6b7601be8c2a.yaml | 4 +- ...4372-a772a1bfbb77e4750a15c026120428cc.yaml | 4 +- ...4374-639d631ea2d71e82d52ba35e11baa85c.yaml | 4 +- ...4375-0881f47c3594ae8da08c18a925e96922.yaml | 4 +- ...4376-9bd31a69895b603beba548b13ee3a848.yaml | 4 +- ...4378-bc0cf3a754a6fbdff0b7d35751f27209.yaml | 4 +- ...4379-55c8be1b98f905c0f97aa18a603d7cea.yaml | 4 +- ...4381-b2640c0e1d9759721b91219a63bf25ee.yaml | 4 +- ...4382-eab3c1f0807691261d40289ccf106a32.yaml | 4 +- ...4383-03657cd383df53489c98f2c2003d74b0.yaml | 4 +- ...4385-0b903181e53a3afd2853d8a217d8de8d.yaml | 4 +- ...4386-4cb7b1b325a065f19e4694c97bc6e095.yaml | 4 +- ...4387-fbacd93e40e029ab5294ff6e4faadc80.yaml | 4 +- ...4389-f60d70179169d7470d698c285c73d2aa.yaml | 4 +- ...2439-73550b54c3b3918e019ec5d1a646e218.yaml | 4 +- ...4390-b205c6392eb0136cf0df5ea96fc73a56.yaml | 4 +- ...4391-acf9697c1a09f246be4d3f2a957b0449.yaml | 4 +- ...4393-cf48a696f82d0831c89a84db8271161e.yaml | 4 +- ...4394-bd8810c05731a418d8d9a50b27d4228d.yaml | 4 +- ...4396-12086c6161e4cc7ce0b879de54cf11f6.yaml | 4 +- ...4397-33be367e25256f8164e300b3a7daf9ad.yaml | 4 +- ...4398-8e2fcddafd26ffe986aba71521006509.yaml | 4 +- ...4399-15e84b289a1503987417bb5a8a9db81a.yaml | 4 +- ...2440-183bcbf1ecc01c4bcdfd0244c1054c88.yaml | 4 +- ...4400-94366e72b8b16247e4525177a190a390.yaml | 4 +- ...4401-f7f88d86922c2be2737227c4eb89350c.yaml | 4 +- ...4402-4f49b393f88ca9ff4cbed10f183193ed.yaml | 4 +- ...4403-40b2967e127caf7495ebfc36b3279860.yaml | 4 +- ...4406-8a828053bf646bd38f0facf7c997017f.yaml | 4 +- ...4408-b6af58199f4bb361c122e5469834d6a6.yaml | 4 +- ...4410-7505baf43f2a97f13623d8a9e01f067a.yaml | 4 +- ...4411-aec5b406433b53e4f92df5e66d0bb478.yaml | 4 +- ...4412-446660b2783c8caadc3d9d08f86fa99d.yaml | 4 +- ...4416-1d838507fd655633d89fdd3f677085f8.yaml | 4 +- ...4418-e0a3631cbe633a42d5989c02ecf7206b.yaml | 4 +- ...4419-50b07daf945144cbfd99133630410da2.yaml | 4 +- ...2448-3e54e940d7f7e91b150b3a2075b3abc6.yaml | 4 +- ...2450-d03e7c1b36748ce86c160cf6fe252332.yaml | 4 +- ...2452-bafdacae26c88640cb6e30b25ba66a73.yaml | 4 +- ...2470-9327431607715dc8ad5049b0a62ebe4f.yaml | 4 +- ...2482-f2d03c372af597128c556a16b6de11cf.yaml | 4 +- ...2484-3662e536f344cad7ead518a87b44f9b9.yaml | 4 +- ...2489-38876a8a5fbfd61cde5369e484f937f2.yaml | 4 +- ...2490-6cfb5c63bbc7af6b76f9e01d4d2fe2ac.yaml | 4 +- ...2492-9ee0bf881f08cd3cb60239af7879852d.yaml | 4 +- ...2493-3222e9d54de5c7b5bf110a40b9d38190.yaml | 4 +- ...2494-d934ac1748b53a01cebaf8d5ba82ca90.yaml | 4 +- ...2495-c5e8439f52a72fc808844ece6ad38bdd.yaml | 4 +- ...2496-6b34c883ba2362a8ae8903a4773f143d.yaml | 4 +- ...2497-e9ae8122ab019b9f575d632976e78882.yaml | 4 +- ...2498-b5e2905f3fa25ed5a268cff184f71b6b.yaml | 4 +- ...2500-c0501d6ec7222ce135cf1060e0209955.yaml | 4 +- ...5021-bb190962067ba33976cc3f88e434b44c.yaml | 4 +- ...5022-c2cbb8ef0136e2fd003d5d3fa4115b69.yaml | 4 +- ...5023-ea72a950c1ec7c195be94a36b1f4a88b.yaml | 4 +- ...5024-00aaf3a917048a24cf4188f68658ad92.yaml | 4 +- ...5027-c2f2835d90a3f3c6d22ed640d7b5a35a.yaml | 4 +- ...5028-bc617b508aff51ac43ff170f5e7c19e9.yaml | 4 +- ...5031-4270b682ebfb5d58e498fa26615a2af8.yaml | 4 +- ...5032-8d6a1c8b6a0bd1e0976b28104afac768.yaml | 4 +- ...5037-66b0b9e68fee422256033ff3686e7914.yaml | 4 +- ...5039-1123677072a0d47589707f79eb0e7e54.yaml | 4 +- ...5040-6211c1f22472d646cc232f92f882834f.yaml | 4 +- ...5042-bca2d75657a1c7a6e99c08d66b7b4e2e.yaml | 4 +- ...5043-c974ccf1587cec2eccea9add62a9571f.yaml | 4 +- ...5044-68edca1ac76c8646936a8dc6a3f4659d.yaml | 4 +- ...5045-202c703bcd7494b0db3a9f2aa3a2b6de.yaml | 4 +- ...5046-110726f45fe770f212d1aee89f3bb57f.yaml | 4 +- ...5047-fb36faa4bab8a0d1c4868c63043ddd1b.yaml | 4 +- ...5048-36f733a53254d69782057e16be93c1ec.yaml | 4 +- ...5049-f239cdbdbea64adf739686a8765fc6ab.yaml | 4 +- ...5050-2b8f19b8c01bfb1b9a5352e232b91e8f.yaml | 4 +- ...5052-0cfa07456732530e831220894e1919de.yaml | 4 +- ...5059-9bcf1b21f2afb149521c1b2b2eae8a87.yaml | 4 +- ...5060-3d269a7750029141d9d3783312ca3377.yaml | 4 +- ...5061-a749224e64254fa4b744badbc098456b.yaml | 4 +- ...5062-18e973bad98be5b94dffe02819323b60.yaml | 4 +- ...5063-9f2f326dd2b99a9ab7152b99b148e34c.yaml | 4 +- ...5064-f030486cf056eab3637611e650524a05.yaml | 4 +- ...5068-f5a034fa03b4780f360af411f657fb5a.yaml | 4 +- ...2527-2fe05eeb0f074422838b91d061a270ed.yaml | 4 +- ...2529-a61a2dfac8b16f216b2c313ed531d97e.yaml | 4 +- ...5442-230d51cfd302c1eecd4d3a3387befab9.yaml | 4 +- ...5444-1a072d8df8f66c1d4b2649edb7db538a.yaml | 4 +- ...5445-c93f15f45e4694eec856b57673b454f8.yaml | 4 +- ...5446-9a4a86b73d09899b1f2fa163f3660f75.yaml | 4 +- ...5448-63705f2cf5933c3d0b8cb680facff791.yaml | 4 +- ...5451-20277bf2aad5677f3f9bd4eac5f630c9.yaml | 4 +- ...5452-a3fcccf439bdac9208ecc47d006e929e.yaml | 4 +- ...5454-5d1bfbb84afa64ba47c235dccca370e2.yaml | 4 +- ...5455-7a725b90d4cc282b22e04990737c3b98.yaml | 4 +- ...5456-e9d4c2285e81f24a0ebb73201d5c6506.yaml | 4 +- ...5457-ed271342f2446f50a4b4b39df1d986d6.yaml | 4 +- ...5458-dfc5edcffb51809997c1a8d53e1c44ad.yaml | 4 +- ...5459-67558508f8127f6d47b6b0749495c9d6.yaml | 4 +- ...2546-e3973fedf7a8f63d43b3386884883485.yaml | 4 +- ...5460-70088a82bdb29c81346c08fa9d47c687.yaml | 4 +- ...5461-c33e053383feb22bc4a0a09a68717fb4.yaml | 4 +- ...5462-4c313c7653b942a477e04e3a6c17f18a.yaml | 4 +- ...5464-f7f846ee6a2643596409a73557db5ac2.yaml | 4 +- ...5465-d4c59ee10654dc665fe7870643db894a.yaml | 4 +- ...5469-3d0e7652c5954cde6070c6634683929c.yaml | 4 +- ...2547-a766deff845672c22971718a646cf246.yaml | 4 +- ...5477-fcbd76097c62e0d5592f5bd058f1a16f.yaml | 4 +- ...5479-4f7a95f2553b4e4ec80b6d04a6fbc8bb.yaml | 4 +- ...2548-fcd65c8735954219062dc7bc27977dbf.yaml | 4 +- ...5483-4b7a2f690ab23a9c56fa493203cfb340.yaml | 4 +- ...5484-d3f480cf02dc331ee92b8ba5f6c29338.yaml | 4 +- ...5485-adbb6fa0fc2db14e16c1a1b09c0380c9.yaml | 4 +- ...5486-7379020b548b14b7be62b539ae5d76a2.yaml | 4 +- ...5488-498a64542dbb51a5eba70d23bf7af5b7.yaml | 4 +- ...2549-a8cea4062eea92bba71d4c0d54416fa2.yaml | 4 +- ...5490-1c50317ba4f62105b747a16f1bd9f458.yaml | 4 +- ...5491-7438f6c5de0164c1ebbfea6f43fc0dba.yaml | 4 +- ...2555-fc8e4381ea5ebd79c418e0830ad7aa41.yaml | 4 +- ...2556-666b2fb2c881bde28dcf6538f4e79c83.yaml | 4 +- ...2557-2d27e10efdfec8fc58acf4cf64107b4a.yaml | 4 +- ...2558-181f8727807ba64411fbc27b7d06a7f7.yaml | 4 +- ...2561-24e92d0b5bd4d59ca9bd929ad9b17b1d.yaml | 4 +- ...2562-b4794af8b89126f30163809c87b8527e.yaml | 4 +- ...5699-86f850e8e3017abf354eb04e885cbf48.yaml | 4 +- ...5702-ac00155c6073a79243073e436990a17b.yaml | 4 +- ...5704-d58b2eb7209b77e10a0a7be6a3ad7570.yaml | 4 +- ...5705-fc6f44579727101979a58b50043c9f62.yaml | 4 +- ...5710-7abc665e21c65fbf0435b861d32be85d.yaml | 4 +- ...5712-7173b1dd80c7cb39c8dbdccb921d11e8.yaml | 4 +- ...5715-2b733e03ac956657b279c0c2e7178248.yaml | 4 +- ...5716-4e902ac20277ef72a0ba4b9fef3685d6.yaml | 4 +- ...2578-e74780b7e51cbe82d58b11a6033838ff.yaml | 4 +- ...5781-5edfe37e0774673d507ae94c41a64138.yaml | 4 +- ...5782-bb6a55b0c6e726b2a2ecec4b50c8f7ea.yaml | 4 +- ...5783-3ff2a2ae71a0269c8c6a199dba440423.yaml | 4 +- ...5784-e6b604fdb9cd729f08feb0319847d447.yaml | 4 +- ...5785-872e77979f08b8dfa6cf8411f0e84c8f.yaml | 4 +- ...5786-6ae4507849a8e19efb73377acf163d95.yaml | 4 +- ...5787-3f433c20605e0478560f661cae839ad8.yaml | 4 +- ...5789-0bb4c4e55d3bd7066abf4b3e5c409eb3.yaml | 4 +- ...2579-6001aefe4ed5d867371bbaa565b1d288.yaml | 4 +- ...5790-7bd424eb93435e30d87b1474845a32ce.yaml | 4 +- ...5791-ed8d60dbc212a2488ceb5fdf43131cd0.yaml | 4 +- ...5792-55fba5060ceecf0350eb52f214341712.yaml | 4 +- ...5793-3ca3d61f633582fe10aacbed8816c6e5.yaml | 4 +- ...5794-2b837a9bfbedcec8d35d48ea5080f6cf.yaml | 4 +- ...5795-2344762ab01ebc08578d7b685bed6e58.yaml | 4 +- ...5796-2820cb8fd83fcd8f6cd4181103e215ab.yaml | 4 +- ...5797-c05c9af186400589f780a92d671602c2.yaml | 4 +- ...5798-76ca7c77b83fa68f077aef4f9085d916.yaml | 4 +- ...5799-583b3f0f882e9563f461b70129fd6f7b.yaml | 4 +- ...2580-3184746777b9e1e2355cf98fc7ddb576.yaml | 4 +- ...5800-c75d16ff72ec9720f6fa40f4e6a40b23.yaml | 4 +- ...2584-5498e556e2216200fd56232f5d1a8034.yaml | 14 ++--- ...2592-98163a520e2e6ad1b536bf4759e7aff4.yaml | 4 +- ...5958-0a74f9768178c52be7335a4414a065a0.yaml | 4 +- ...5959-7c93e57058800cc97d4580d0e8797ab3.yaml | 4 +- ...5962-73da8bcc97724050406ff5bdd6471c84.yaml | 4 +- ...5963-23c92f364f22c50ebf1609484d67aa5e.yaml | 4 +- ...5964-8a9da35b1949b285490ef29120cda9a5.yaml | 4 +- ...5965-accdbc7387e8cd352346b508525444ba.yaml | 4 +- ...5966-4e2e155c281ae60022e2ed5429179c85.yaml | 4 +- ...5967-05f8485e11de79d6aa39de126de0f4e7.yaml | 4 +- ...5969-41d911400ca8ace536dfd110ed4dbc79.yaml | 4 +- ...5969-9baae5fb51d9dd1141e1931574d9d7be.yaml | 14 ++--- ...5972-71669f91f6c03ce43a9b92fdae9360cb.yaml | 4 +- ...5977-0fbf5aeb9219f7fac5b857b809c640a1.yaml | 4 +- ...5978-c17395d57aa530c1ca072f07b2b709c1.yaml | 4 +- ...5979-c6bd3ba187d60fb65a038a39af19f9cc.yaml | 4 +- ...5981-3c4ad527262d00d607d5c7466a5e3a23.yaml | 4 +- ...5982-a8a2129053b6265336aaeb65bc0c164a.yaml | 4 +- ...5983-11a5b3d7c20edce1773adda5ec308996.yaml | 4 +- ...5984-9a176796080675b246543fba168c027a.yaml | 4 +- ...5986-96955fd433f50860fcfbf43e30334f40.yaml | 4 +- ...5989-b1fa67bf969fdb68e71efc5cd730124e.yaml | 12 ++-- ...2599-8871ef770441f03d651279dadfcbfd9f.yaml | 4 +- ...5990-3a1a2462f10e12efaa2197ad33a42396.yaml | 4 +- ...5992-2ace3607ba6999f91533535a3a2816d7.yaml | 4 +- ...5993-e7e948bfa89ef889d57ad4a644f6ffc0.yaml | 4 +- ...2600-59797dde213a6367a6157622c3715782.yaml | 4 +- ...6008-8a2fdef7cc698ec15988b37831ded08d.yaml | 4 +- ...2601-55c5d66fcb1a0e14740f101ab90eeba9.yaml | 4 +- ...6010-6481182e7ac4b130cac34d43758d1847.yaml | 4 +- ...6012-4fd05a735543332a71cc4808699480af.yaml | 4 +- ...6013-30299c84e4a810a5d91c885ccad19e9f.yaml | 4 +- ...6015-f938f1ab4ea9e7929903077ead3a87cb.yaml | 4 +- ...6016-ace70e46c2c11dce25895020e8f9ce37.yaml | 4 +- ...6017-fe5cb5dd50547aaa395139fc837a5f8f.yaml | 4 +- ...2606-131875d333b38df6cd9a906f0f1d6d15.yaml | 4 +- ...2607-1f2e03d503f5681dd8b4d168bb6a5e29.yaml | 4 +- ...2608-03e8fea4abe393774ca83cec29070e62.yaml | 4 +- ...2627-e448c9e4b5c0c1a44cb7637de9906bfd.yaml | 4 +- ...6325-6a99396550744ae560a5320a1b153079.yaml | 4 +- ...2634-eceee40ae071bd0838ed35de0f0e77bb.yaml | 4 +- ...2636-054cd3c24ebffa75be93ee2056e1824c.yaml | 4 +- ...6515-59c7d1a679853ce7b01d642a9cdae84d.yaml | 4 +- ...6516-c4cb405587c7aac808cc9a0330f4a287.yaml | 4 +- ...6517-2f94c3f833650d494dcd027c8f5b2a1d.yaml | 4 +- ...6519-fed0833f3ebebd240e7a0f4e9421be22.yaml | 4 +- ...6520-f8ef60664eb207643cf086f83584b3db.yaml | 4 +- ...6521-67ada1785c1a67660530280a293c0d89.yaml | 4 +- ...6522-0e94306a43ae08419eb38c17f3bdf17f.yaml | 4 +- ...6523-4b4ac88975e8590a6a5fd0cf4302a336.yaml | 4 +- ...6525-3a87cd2c194cd815db2ec636b84e643a.yaml | 4 +- ...6527-7341f9a401e387eb541b7f0ce957b3d9.yaml | 4 +- ...6528-644c7cae519f04e689e17393d43159b0.yaml | 4 +- ...6533-c592d86340244bb94d180507b23fa5a8.yaml | 4 +- ...6534-f62d90a1456165ae9d04c07d4bf69a25.yaml | 4 +- ...6536-a7c9f85c93718ea45a6837bae9a163d3.yaml | 4 +- ...6537-7a7c093f97491b5547b10f0abf94cd54.yaml | 4 +- ...6538-66589665af0b647ad01185928e32cee5.yaml | 4 +- ...6539-eec11cac81b9e7efcb35b893f28148cb.yaml | 4 +- ...6541-caf355595af5171fa75c6b8b0c04dfb1.yaml | 4 +- ...2655-5530cad0a9767bd88d96d829bf733779.yaml | 4 +- ...2684-ca9ee22d1cc41a724720db8fe33326bf.yaml | 4 +- ...2688-6bee4ceb90dc1010814fe03431f27200.yaml | 12 ++-- ...2706-cc96636e9196394b50c931f7bad41740.yaml | 4 +- ...2707-3337ca8e284defa05fd45bda9b3ec176.yaml | 4 +- ...2709-9da08dd717e53fc804ec0889b3c45692.yaml | 4 +- ...2711-cdfdacefadee3ac15d930a67722d11e2.yaml | 4 +- ...2714-7690dbacbae8cf712fa24f47448d84aa.yaml | 4 +- ...2715-6f02fa76246cc8d01472e29b6032ad8f.yaml | 4 +- ...2716-ea3614c57e168b5cbba1a64665aa3e41.yaml | 4 +- ...2719-3dc309d6eba7a3765b70c365b5153ae1.yaml | 4 +- ...2735-f995ec2617f1d8e01a76eb96ebc10f06.yaml | 4 +- ...2736-a69ac85c2f382d8b82f7f44fd083ec69.yaml | 4 +- ...7412-0eeb168325aaf2fd5bb4eb1250e0882d.yaml | 4 +- ...7413-bfcfe2a24b673f9c7c3adba8fe6586b3.yaml | 4 +- ...7415-c8fa2e9308164baca50265fff2c3437b.yaml | 4 +- ...7416-09af6d4d8c4435a3e0935a8eb5df6c7f.yaml | 4 +- ...7419-6d87a6f7248c4528f7d5ef6ed7c11eba.yaml | 4 +- ...2742-96bcbe0539bed3ce58849487848c2a2e.yaml | 4 +- ...7422-b9cea09f7ed512cb1aad12f24e857815.yaml | 4 +- ...7424-4b89abc62fd406d908566683e2dcbf5a.yaml | 4 +- ...7425-f63b97efbb567f61e36df93bf47a02fe.yaml | 4 +- ...7426-9efb6c4b18285974b32863549d5c9405.yaml | 4 +- ...7427-f670252b93de10e17e15c533cbe48519.yaml | 4 +- ...7428-6c042e8ea6605a500a8eb10aee943be3.yaml | 4 +- ...7429-e541a07e8afe605f1bf04dc95e06d38b.yaml | 4 +- ...7432-9de482ee3d956ce585f6bd7d5fa3f9c1.yaml | 4 +- ...7439-bf579b9a08de0f44c24def81bc3a2891.yaml | 4 +- ...2744-d1b821dbb873ab8f28cd2cb8f033062c.yaml | 4 +- ...7440-f2d9478a61ae546bc6c42d7e589dc8be.yaml | 4 +- ...7443-be0ba3aacccf6ba5116887341d902b74.yaml | 4 +- ...7451-c57f6caa20d50f7b5d4102cef52235b3.yaml | 4 +- ...7452-0ad7f5a9c3342b7aeba5a03db14c71d0.yaml | 4 +- ...7453-057556914142c489ed57ccffe54665f7.yaml | 4 +- ...7454-9454be14498ff26da96354e9b5fc82b2.yaml | 4 +- ...7456-99f1c42a705f1b7c13a404d5bf315c5f.yaml | 4 +- ...7460-e62ea330281841ac90814f51a2e6e358.yaml | 4 +- ...2757-2724145ee24f5785e7f7e4619d00fbc8.yaml | 4 +- ...7605-20b79e43dd02b60a0996dbe99e7ba439.yaml | 4 +- ...7608-f595c203a77330422dba7245cce84dcd.yaml | 4 +- ...7609-0822b2c02c49629a19bf084eb6d8580a.yaml | 4 +- ...2761-ee6d7181de7e06427ee243be8abb06fb.yaml | 4 +- ...7610-73d72f655c3b804018b0ad6a3a400257.yaml | 4 +- ...7612-68354cec14dcc6c8c5561bd362f6a851.yaml | 4 +- ...7614-20fefc27d9160f7f5b2c386f22a44380.yaml | 4 +- ...7617-ff8293f84b21b2955bef22aebfa62b32.yaml | 4 +- ...7618-9a7bc6474013942cb9ad4b06ba961bd0.yaml | 4 +- ...7620-9376ca64ef0c10c441ff62358957edd7.yaml | 4 +- ...7621-a521128c60a3e4447b1ae62129a4837e.yaml | 4 +- ...7622-a6e719c0412296476082fdb1b971690e.yaml | 4 +- ...7624-47522a4a3dc3a65ace6791fdc8ad2676.yaml | 4 +- ...7625-db3e14a64935e9816ff1fc8cb2d49569.yaml | 4 +- ...7626-a63f1210dd076ac1af75bbdfb4936df5.yaml | 4 +- ...7627-b8484e4bbe43b173d4b67998a26e2ce3.yaml | 4 +- ...7628-50ade2845c53f4bbe684ddfabd1bfd64.yaml | 4 +- ...7629-a344469158b924b0533b76919c9daf70.yaml | 4 +- ...7630-2d63f6e8d357472c9ca1e82cb0bc121b.yaml | 4 +- ...7631-3824f011eab5214f502db246222a2a64.yaml | 4 +- ...7634-a725115e3c0edf17f7d3885d6b810646.yaml | 4 +- ...2764-02fac00b4da69e9fe78fc7130f860fe9.yaml | 4 +- ...2767-12fc948c06bbe2558fcf0a602f5f480e.yaml | 12 ++-- ...2781-20bfb39c28e57afafa73126a681ef707.yaml | 4 +- ...7923-4131547f48ef03f81376294e8bfec1f9.yaml | 12 ++-- ...7925-7d646a32d0c4bc3814bc480ca69d5434.yaml | 12 ++-- ...7926-5f7a0857cd225d8f715faf1ad377962f.yaml | 4 +- ...2795-6a2386cdcd3910d335805b9ddf952385.yaml | 4 +- ...2796-b285571aa8961228c020fb748a563a39.yaml | 4 +- ...2802-8461759ea5a4f2c3230ae2ba89953371.yaml | 4 +- ...2805-4b6c9f5939660218c2639c17b2048a97.yaml | 4 +- ...2811-c8b00e3a8ae7ee111daecc90a5a50970.yaml | 4 +- ...2812-c5b5b783e98de972c2044e0acdd3ca83.yaml | 4 +- ...2813-4790b4ad8b25152cb39533647a69d638.yaml | 12 ++-- ...8154-0046efcaf372ceea3cbda093fc9866d7.yaml | 12 ++-- ...8165-133f9da4970886f2c6daa016271571ae.yaml | 4 +- ...8168-97c1ceb18f16975e668ed8d0bd718768.yaml | 4 +- ...8169-35d6cb483985201ac59c669cec20a881.yaml | 4 +- ...8170-42bbb29a21ceaaa3011864640412a5ea.yaml | 4 +- ...8174-9babf2cf45788c102d8f9d4588bf3e93.yaml | 4 +- ...2833-1589d579faac8c7d72195578a8342786.yaml | 4 +- ...2836-84e13e367dca55445350e25af8c4c3b9.yaml | 4 +- ...8367-8f7f33ee1e4675fee4c38d5051fea8e5.yaml | 4 +- ...2841-4a9af0a7a0f9267c64d43cbcc0f6e60e.yaml | 4 +- ...8414-da0d789e3ff0c2c8ea9e944c14348b70.yaml | 4 +- ...8415-d432100581e1c6943b259719e2daead5.yaml | 4 +- ...8416-cf02434258a49a4a00aa24a96c05817d.yaml | 4 +- ...8417-9d49312a2bc1a33dff873907673334c5.yaml | 4 +- ...8422-1e549d9fdcaec4289273d20aedde9604.yaml | 4 +- ...8423-81c4580372e23b6ce41423bd5b13253e.yaml | 4 +- ...2843-194154b98ea167d5243ca3bc6185dc5f.yaml | 4 +- ...8491-a6e5defdd0b61862c997e167d9ee2576.yaml | 4 +- ...8492-7f3bbc96f4be604cf6114ca81b08ca3f.yaml | 4 +- ...8494-fa3064d32c24f2074e60835d6d0ebe62.yaml | 4 +- ...8496-702ceb7e56323b84fbe97e278b8eb74c.yaml | 4 +- ...8499-96440e1a43df69d4a2a108bd78a1d55e.yaml | 4 +- ...8532-0c8164317d8680b32c0889f7b19b5e0b.yaml | 4 +- ...8533-e859444e797e41b8d664b82e23a899ba.yaml | 4 +- ...8534-f2a0a0a17a439c3fab0b66d207898f19.yaml | 4 +- ...8535-7e792191472cdad1fee49805adc5397c.yaml | 4 +- ...8536-296dca83f7d30b213a3d42f8baefd9aa.yaml | 4 +- ...8619-87e4105fcd662623c87dc5371d2bcde2.yaml | 4 +- ...8620-589eb0de3c09a1f6b4b85bf3ecf20784.yaml | 4 +- ...8621-a81a5bf9125eeee92e00bfdaa83c90ee.yaml | 14 ++--- ...8622-97f7a332ae5645762ec8464bbe228dfc.yaml | 4 +- ...8659-e15e05d52edf8dfda475d35365b1fa33.yaml | 4 +- ...8660-6f97964629a2d8890727a9938703cfc3.yaml | 4 +- ...8661-92d1ed4c27e6f1a39ae5c39770d54c23.yaml | 4 +- ...8663-f2bfced9bfd91f1f83f4f10d9e2a4e2c.yaml | 4 +- ...8664-6028fbb33888953a639d7f4fdb105b84.yaml | 4 +- ...8687-3f03bc4b4b5619e488422c5b9dbcc730.yaml | 14 ++--- ...8689-1f7578af7b08d6f0682dfe557a69cb45.yaml | 4 +- ...2869-dcbc79daa691cad653de67a9ff1a5707.yaml | 4 +- ...8690-1bed895aa03e840b8e1fbdc433b64dc4.yaml | 4 +- ...8692-0f680b0fba849d5d9ea4bc12dadd3c2e.yaml | 4 +- ...8693-843692451d0aaf769ef716bbf02853d2.yaml | 4 +- ...8695-9d9f04adbd773a74d47487580aa614ff.yaml | 4 +- ...8748-3199c52f1f975758dfffb8998d727e53.yaml | 4 +- ...8751-60ae23854ab0f767b1c82b0fb6a8dc96.yaml | 4 +- ...2877-a29260605777cb6f82b580e66c46fcb9.yaml | 4 +- ...8773-bf1fcb74e30994cb355bab78b549e730.yaml | 4 +- ...8774-f9cb3c789647691d2de33bca14ad9edd.yaml | 4 +- ...8775-4b1052f9f0f7a36afef9bbca9c94d0af.yaml | 4 +- ...8778-fd43c9edc7bf436e03f5d59fcc9642f0.yaml | 4 +- ...8783-45a6c5ecbb4131cfd2ebe25ca43d9a26.yaml | 4 +- ...8785-6f2bfa44316597918db6902f22101641.yaml | 4 +- ...8788-fb290f4001663ab9b3572ec6c32d0eb5.yaml | 4 +- ...8790-f7b0dea7fdc53cc395c11a147701c107.yaml | 4 +- ...8931-77f1b741caca90f6e233d10f62410685.yaml | 4 +- ...8932-f7b23b7f219bdfa01165ca96135e1423.yaml | 4 +- ...8933-a26164aedf80b474ee438ebcd8be6953.yaml | 4 +- ...8934-c18b0aa1f2de13dec1ee3b9448c0e5ba.yaml | 4 +- ...8988-1f532de1970706b80de4de5a54d3380e.yaml | 4 +- ...2899-5a9c8ffeceece98dba6df9f5a0d59a78.yaml | 4 +- ...8990-800d496f51d819e5732256fbd162712b.yaml | 4 +- ...8991-79edec65d658aad88495c54f54d3669a.yaml | 4 +- ...9093-216a466c53c0f9dbd8311fa0afa66753.yaml | 4 +- ...9094-16f12614c7a820b2ff0d5295346d446f.yaml | 4 +- ...9095-73c59415c469f5d4853f326fdd664c56.yaml | 4 +- ...9096-0bc37b5f5d5498d8771db41a1e16a982.yaml | 4 +- ...9097-69bbdafafddf73eabec5b44d29b3cf8b.yaml | 4 +- ...9099-1ea409fe86fe5baf6c5d95a328e05b6b.yaml | 4 +- ...9102-440a978024c68b2f27be0eeba3cb55c2.yaml | 4 +- ...2916-05f450dd8aa4062aa24fbf2823c60c4a.yaml | 4 +- ...9170-e5a8f42155cebe6939f0ccac8621a6a2.yaml | 4 +- ...9173-7e41870e8c673b23f19244598ea8ebcd.yaml | 4 +- ...9174-8f9a4b2e27aff6f1c97baa2ca96cfe9f.yaml | 4 +- ...9197-13e3b44160360e3746c78b8d29452ac0.yaml | 16 ++--- ...9237-f208b8c044d71b8d44e9868aaf03997a.yaml | 4 +- ...9239-4813c58962647ae4a6f05165adf752a7.yaml | 4 +- ...9387-fcb2137e4fd0eeb6eaa0769932ceae96.yaml | 4 +- ...9422-0bafef3453580e19c740978e87d842b6.yaml | 4 +- ...9423-5b5a80245567937203123aecaa90cc27.yaml | 4 +- ...9428-bfcc2c70b2c01ba809a238ca61e5f88c.yaml | 4 +- ...9429-2612ae00d02e310a6680f563b8b56eab.yaml | 4 +- ...9431-9583c7a118279761c36edb998dbf641d.yaml | 4 +- ...9433-b1770f9eb849f830c90d98a4a92d2baf.yaml | 4 +- ...9434-b4a1c53e99884a28029186adce52a970.yaml | 4 +- ...9435-c5c657b48dcb3ae9c728f121d2d0aa85.yaml | 4 +- ...9436-60b8d6d9997cb1264cf24cce0caa381a.yaml | 4 +- ...9437-6869d4da7d1da9e6712437e8840c161b.yaml | 4 +- ...9438-96b2063a0950eb9d73bc44532d96a2af.yaml | 4 +- ...2964-b7ed33471f1469ef97fb3b870c3b3d8e.yaml | 4 +- ...2967-c3680e3206f99027fb5f3986ae69948a.yaml | 4 +- ...2987-755ac9508c7a76c31cd7d0edf80b8b6e.yaml | 4 +- ...2995-4ad4d0b506ee721748cb73d977e55c9e.yaml | 4 +- ...2996-67e0a9fec932f5d791c2a1af30baf3c7.yaml | 4 +- ...3023-5c5967c0bbcbea315d0f076aa78401d0.yaml | 4 +- ...0476-e5b5400c624e25843b2372f9abb89d26.yaml | 4 +- ...0477-5b09bbfafab13caa853913e46666c79b.yaml | 4 +- ...0479-f7de3a4183d7c85f1508bd7bcbb56139.yaml | 4 +- ...0480-8b501a3e440ee475a390c14b78d1469e.yaml | 4 +- ...0482-e83a61f4951a190bf506663021152379.yaml | 4 +- ...0486-3715092a367ddcdb9354396fe5cef26a.yaml | 4 +- ...0488-947aab9c660d0a41bcf7e37fa45491b8.yaml | 4 +- ...0490-28d8e466f42a7ea620fa3fe2f98c9634.yaml | 4 +- ...0492-ae760478256ed9e96e189f019a687210.yaml | 4 +- ...0495-6ecaac8965c567964f683839f3212253.yaml | 4 +- ...0500-7a378944e613d1b359a5928a9883a2f4.yaml | 10 ++-- ...3051-903fd5007a29b9028410d0ffded470cf.yaml | 4 +- ...3053-2ef42991bf5a3f6fe661eaa83837878d.yaml | 4 +- ...3063-cb1e1ee6d4a86d7ed0a6cb77ed172c33.yaml | 4 +- ...0745-88404ad5e8128c3699e3c229a21a2eba.yaml | 4 +- ...0746-aa0b3a997f2af2400ed5816a52c96615.yaml | 4 +- ...0748-afa229bd02db847384791980963680d0.yaml | 4 +- ...0749-a4c0765b0c52463caf31b82bc7711eb8.yaml | 4 +- ...0750-ad88df41b076143465006e1296e02fd7.yaml | 4 +- ...0751-bab2d740e6550ac0744f9a04322bcfe9.yaml | 4 +- ...0752-c96e975122963919f6930b9c017e5991.yaml | 4 +- ...0777-ebdf981fa373e4823561a65bb577a1a2.yaml | 10 ++-- ...0778-bb853e4203fd77e0eccd7981cc19970b.yaml | 4 +- ...0780-0fd2b55ebd627169d7e7b82b7b9c0e52.yaml | 4 +- ...0783-517aef4b1533709bdbf95e8d657f10e6.yaml | 4 +- ...0784-3b8474b2759e8c9d48abfea5292a608c.yaml | 4 +- ...0786-1772bca649ab5b99b71eb70af7333d0b.yaml | 4 +- ...0872-9d98910f079017bb745e5dfdd7b3a383.yaml | 4 +- ...0873-8438c9473d07feba9507b08f7b2ca394.yaml | 4 +- ...0874-b434181ec4dda3f7c495c50067c97199.yaml | 4 +- ...0875-6608e81097680e6fc28899a61a6c4d0d.yaml | 4 +- ...0876-00d2f835919a4763491bb6e0afc99ba1.yaml | 4 +- ...1073-a2374460bb7e70d55eb2c8c43ce8140b.yaml | 4 +- ...1079-13d220693e087642304f87b309abc136.yaml | 4 +- ...1080-f213f0cf0f29187e1d444e194fee045d.yaml | 4 +- ...1091-5127fd9a578ab8f75789be1aab665dea.yaml | 4 +- ...1092-49c0957ce7beb86c6cd3610ef85cd2a3.yaml | 4 +- ...1212-572e59930dcc24f750ce3dae22510652.yaml | 4 +- ...1213-f10d7adc04b5a73f4d72dd21d3e9038b.yaml | 4 +- ...1214-10b5f73ced4f4ae8f40389dd6e188b1c.yaml | 4 +- ...1215-90f8bc64469472ae0cd3174d5b6a7976.yaml | 4 +- ...1217-2ccf4a97a0b2b289a9997f10c05da014.yaml | 4 +- ...1218-4d37b5938e435e55d1b784b692eb0059.yaml | 4 +- ...1219-ce4d8c6c1d15b00a6a80a41c19c0a53f.yaml | 4 +- ...1221-2f2309313c5bda581e3b02314b8c850b.yaml | 4 +- ...1228-514273203d780a9cda87e275d81e2d5f.yaml | 4 +- ...1232-d8a9eea8aa488b4edc83d1161c57f57d.yaml | 4 +- ...1234-2da3bb827430b38a292fe600fab2f658.yaml | 4 +- ...1236-dd27ae18a86029fffd366285509782e0.yaml | 4 +- ...3124-495b1b12b50b14325e42d32d8b21fb76.yaml | 4 +- ...3125-eef58a96354df2086d4576efe4313ff1.yaml | 4 +- ...3126-5676c8d193c6c7c7c19f827a6027fe03.yaml | 4 +- ...3129-7d73c621a5e8b7d0767350621fede4eb.yaml | 4 +- ...3130-cd46d97404c66642d7eaa5afb0766ece.yaml | 4 +- ...3131-4acb0dd741daeb068a56799abff8a41c.yaml | 4 +- ...3154-ca565e6cb88aa754dd01e131a2eefadc.yaml | 4 +- ...3155-75f34276d9b10d0195d546eabefff833.yaml | 4 +- ...3170-01793590016afb66f5a418a945e41a09.yaml | 4 +- ...3175-a8d129ffa611a0e2860f9a0cb3ae87ba.yaml | 4 +- ...2094-c787c6531ee0637047c0b6f0c28238e9.yaml | 4 +- ...2095-024b2767e265d1c0c5a095406c0967d5.yaml | 4 +- ...2102-d611c750b72176ae3a8cea6f7095bd28.yaml | 4 +- ...2103-da386ce90f0520e508b80fb1a2e2a0c2.yaml | 4 +- ...3211-6cf9abd0a55631980f6943dc1552464b.yaml | 4 +- ...2110-427edef992d7f7fdd62c26fd579e2341.yaml | 4 +- ...2116-03278634b9340d2d49106fefa161e7cd.yaml | 4 +- ...2118-5727788917ca5dc70c5a2a8fc41d6ea0.yaml | 4 +- ...2119-7fa8eef52402bb269ab6eda7703db35e.yaml | 4 +- ...2120-2719d6731668b9065520117203a3303c.yaml | 4 +- ...2121-8d3590a739a7dcd2c4eca80910f2eb77.yaml | 4 +- ...2126-f2eb2411647af07955e8ded396c4583e.yaml | 4 +- ...2127-63aab415fe29b03c8068882fbb1507f4.yaml | 4 +- ...2128-6c67c1bd228e1520f2b8d5bf20bbed3b.yaml | 4 +- ...2129-3220945a9ad1b5aa7c5c294cafd443a6.yaml | 4 +- ...3213-da10288b29dd37bfe67b8eab58492860.yaml | 4 +- ...2130-e487dc2fff22059c80c2edae74cd9a80.yaml | 4 +- ...3219-6c5fd9bdbd84a5f94cf449613dea61df.yaml | 12 ++-- ...2237-8d422c3c7895b2b4d7494cb28df2efe5.yaml | 4 +- ...2237-9132b473713ba452ca61cd28b37b6336.yaml | 4 +- ...2238-e3e7d2debbf761854054ecabf536826d.yaml | 4 +- ...2239-a392159f37a0ade5203b528da67d0e66.yaml | 4 +- ...2240-27976922dece0aca2bde50f6320bde6f.yaml | 4 +- ...3225-5fb9bec95a707650ef979fd037b97227.yaml | 4 +- ...3226-2b836e0762bdbf59a8ee2eb5384418f5.yaml | 4 +- ...2291-c8bc852e0f629926f8c3b976dbc68f47.yaml | 4 +- ...2292-5010f538683e4ce673730780a1277a01.yaml | 4 +- ...2293-c3986a6ffb844160a08c3a8660d4bd5e.yaml | 4 +- ...2294-0a7db26507a2752830d796f872bfc74f.yaml | 4 +- ...2295-38d608cacdc80db417ded65078eef410.yaml | 4 +- ...2299-82dd4087673f4e5c2cbc42c8ad11ddcf.yaml | 4 +- ...3244-42b4c4c9ef55b9cbba64c1b7340638c8.yaml | 4 +- ...3245-6ffb854c265938eec5a761ac2ea74cda.yaml | 4 +- ...3248-54afcc25e30c13f6fd81531108a460de.yaml | 4 +- ...2496-cfab52d3443d4e82a03b0d2f0889ab4f.yaml | 4 +- ...2498-2e8ccf164adc8951aa826c00f9317ffc.yaml | 4 +- ...2505-6046df75d04ba248b7035ff17b16ffc4.yaml | 4 +- ...2506-efbea6db4c4deaef4b1a0846e33065cf.yaml | 4 +- ...2507-05692bb82558cd77ced2449a9947331d.yaml | 4 +- ...2508-6221ac90696b9d40486e73f6a756b92e.yaml | 4 +- ...2511-946e2c8cf66089d544e720fc4e253df1.yaml | 4 +- ...2513-c2ccbf305342f3ecbc58cb5dfedcc25d.yaml | 4 +- ...2515-5914d2a62c6e9fda2e52358bd6a051ee.yaml | 4 +- ...2519-313015abf6a4029981fb303ae0c8c403.yaml | 4 +- ...2520-d5eec60f27d6879accd492bf02988af0.yaml | 4 +- ...2574-f1d5eaff1a5d538327565db0438aa59a.yaml | 4 +- ...2575-eb2fd42fe2d2e213e39c0b11404601e5.yaml | 4 +- ...2576-f129897036a69e5c156d976b88efd3ed.yaml | 4 +- ...2577-539276d00e4422db414565e796e54c45.yaml | 4 +- ...2578-468f187fbaef8b522a9247e1a677ec05.yaml | 4 +- ...2579-53da943f73d7c6e6cd21ccb312450cb4.yaml | 4 +- ...2580-f70dd0265071b25825ed4ac0daac6966.yaml | 4 +- ...2581-3243534248880dc4d13208e428d3bdd1.yaml | 4 +- ...2582-147a2c380c511ff89f6007b5ad85a430.yaml | 4 +- ...2584-994e6758795c8c6e11e9f43c7bd4ac1c.yaml | 4 +- ...2585-eea2926eb15d95f90b3df3b2873dbe1c.yaml | 4 +- ...2586-97e81ce09ae72195c5b04d7f6a992589.yaml | 4 +- ...2591-416f60ea7c83625605d6748aec7fe39d.yaml | 4 +- ...2595-6c441629c885cb1da3fc16e4bca4f23b.yaml | 4 +- ...2596-910100abea99ef6c374051083d0fe4ff.yaml | 4 +- ...2599-13830cbd72a32fb533758edb07ec60b9.yaml | 4 +- ...2600-50ad7e6a87a7ec0f76525597202c2f2f.yaml | 4 +- ...2601-437e935b70b10e1a496119f3d8fbac5b.yaml | 4 +- ...2624-20e7688da466978fa975c03a8c97cece.yaml | 4 +- ...2738-bce2c57392aa12eefee039fe25226280.yaml | 4 +- ...2741-2cc77b5ea4b45b7ee724687c14467261.yaml | 4 +- ...2743-62fe87d4141e78303e17a76d693266f0.yaml | 4 +- ...2746-36407f459596fb4be9dff24b707a16b5.yaml | 4 +- ...3279-7f9e6cd367e17f5d58e3f74e4dd23702.yaml | 4 +- ...2793-7d14368de367a2adadf4a2871484c186.yaml | 4 +- ...2795-0250c115051a0a19911ae4becfbbb8c8.yaml | 4 +- ...2796-971d7261bd1edf88014f77f83ee8b436.yaml | 4 +- ...2798-4ae509b53172b618cff3a0afd6c091e5.yaml | 4 +- ...3295-0115c4f456db0247c3530a55e2dfe13e.yaml | 4 +- ...2957-a68d2dddb296088b38bf42abce9933d3.yaml | 4 +- ...2958-f083409bbde8131959cd560116eb8b78.yaml | 4 +- ...2959-4afe438c3219ba223c08f05567ce5890.yaml | 14 ++--- ...2959-57ce58b6230c68936a87b493b14f2285.yaml | 12 ++-- ...2962-636baab4ac31da3f60a0d64060238890.yaml | 4 +- ...2963-8943f00b83bb9af4ef7c839b2bef305e.yaml | 4 +- ...3208-5b40ee65b1caa7d96e4e60846451b515.yaml | 4 +- ...3209-b91a2480651782f3bb16ba3659354dba.yaml | 4 +- ...3210-f0470adcfca34e53051811d10184b858.yaml | 4 +- ...3211-2cdd87e3f80dc46e464c425f1498ee45.yaml | 4 +- ...3213-0da2272f6fad3d314fe055d518112eb5.yaml | 4 +- ...3215-8d570fcab536c9b0d9a14e0fe3f1fda7.yaml | 4 +- ...3216-11d5ca6aae21b29aac64f7355ab7d838.yaml | 4 +- ...3328-1b076d88024e9e8fa50fb517fb49e6d5.yaml | 4 +- ...3310-d8d7674d520927a7ad2ed94f66363231.yaml | 4 +- ...3311-27391e149ab2871748f52ce997dd4e34.yaml | 4 +- ...3317-d1c23493ccad67b72beabba59496692f.yaml | 4 +- ...3318-1a8df042079c3b5a71f5229720de76a0.yaml | 4 +- ...3322-64fa318eea101296cd3a97fbe96ebb75.yaml | 4 +- ...3323-ab42ec9d60829884112a87fe093b6c61.yaml | 4 +- ...3328-249f3208e9e6f6c1af58b4828d3f6027.yaml | 4 +- ...3329-b832c46935cda704a801fdf109478436.yaml | 4 +- ...3330-9f39bbe8da0a79b61b743c5fac55c881.yaml | 4 +- ...3331-d801fbca464a51e293e83c92692f388d.yaml | 4 +- ...3333-83ba977a44de14ef1ffafdedd6dd629e.yaml | 12 ++-- ...3342-d95100aaa0c0f9fcb84493d4239628ac.yaml | 4 +- ...3343-3d14b08568400569a677dd320c2e823a.yaml | 4 +- ...3344-c35094b437e27c460747dae02d21159c.yaml | 4 +- ...3365-e6a704ce234334d9f31ac517092f1bb0.yaml | 4 +- ...3369-e7894ec8416d5b9bca834efe054366ef.yaml | 4 +- ...3372-30c4f098df3ec040d50017f604f86e26.yaml | 4 +- ...3387-01d1d88da52813ba88f89d4ae266435f.yaml | 4 +- ...3392-20e2ffcefe24845b4b4e6344c91c5c95.yaml | 4 +- ...3922-287536d4e13889455f637b6c851d2004.yaml | 4 +- ...3923-06cd0f178ae533c7b94126d052d17b3f.yaml | 12 ++-- ...3923-d566c0816c38ea6ca24760850c1eaf4a.yaml | 14 ++--- ...3924-1d1308e4009a475d471dafd71ee14d32.yaml | 4 +- ...3927-bce926ab22529c16e0539f0acc228409.yaml | 4 +- ...3928-beccbd5d983b56da7098c3b6df8c3b57.yaml | 4 +- ...3929-3b5f830cc2d293978dbe39244d121ee0.yaml | 4 +- ...3994-971075c7b5684cf126577f8a88b91254.yaml | 4 +- ...3995-e07e7d71dc600bc27e4f1c11c365c393.yaml | 4 +- ...3996-a8def04824c95aa61e5602395bc3c9b4.yaml | 4 +- ...3998-f48220ff86f125e37c7a8dfee9752f3b.yaml | 4 +- ...3999-3025abb89074bfece497106ff98a8953.yaml | 12 ++-- ...4003-e7840c043e4c24ed6e535dc7a65aee86.yaml | 4 +- ...4004-615764f544ee769c8562683adf2e3c22.yaml | 4 +- ...4006-0caf4f2b6437a679adbb5b527c6703b2.yaml | 4 +- ...4007-5c72e030a59da55164488a0121d8367a.yaml | 4 +- ...4009-0e6b771f58abc47bc1cd00cdb88a6b13.yaml | 4 +- ...4013-29bc9c14cc220941303188c45b9daf29.yaml | 4 +- ...4018-69235207b58aed8fe2c8ecd662e7a82c.yaml | 4 +- ...4019-66d45612d48c50a420406488ffbcd2d8.yaml | 4 +- ...3403-d335e6c8c52890984157995f488f49da.yaml | 4 +- ...4030-3faec85547682ca0daca65d7bcfe4f48.yaml | 12 ++-- ...3412-8ab353496a7495d9f3fe5d5531e368eb.yaml | 4 +- ...4168-1540a4d1322834c5a338a51354b58ee1.yaml | 4 +- ...4170-d9e29420afd04acd93625f8acad7ad8f.yaml | 4 +- ...4172-adeb22f24ece0b4bc846eeeff12f100f.yaml | 4 +- ...4173-ffdf4101e49b7fe440cdcd6bd244561e.yaml | 4 +- ...4179-1d9266ecaa07d410393e4d47b4c9954f.yaml | 4 +- ...4183-4b751d7bee414741f3c79461b74b4584.yaml | 4 +- ...4186-924d818a306e9e6b06f3cb1274c2304e.yaml | 4 +- ...4187-cfbef64f1e1fba4c3a45a9c3c672157f.yaml | 4 +- ...3435-e95622a863397746d0d019b16e681085.yaml | 4 +- ...4368-c02729e12026bce3dd84d6631a92ade6.yaml | 4 +- ...4369-46799564b7a9d79d9f58df7d68a85824.yaml | 4 +- ...4372-376bf43456853b74eb2f520d8ce53233.yaml | 4 +- ...4376-a483253d605901e000058299d42af1c9.yaml | 4 +- ...4377-2e12d42eb302e6a61f201e211fa0da28.yaml | 4 +- ...4381-919cf6f31f29222aa869aeeb40e21222.yaml | 4 +- ...4382-e63e30ec60f147aa93db545efe75d6f6.yaml | 4 +- ...4383-df9102694b36792bdabf02d0dae189bc.yaml | 4 +- ...4385-554b3becffafc2d7533a6574bfe4f7de.yaml | 4 +- ...4387-903a37844bea1fdaf4cd48ec6980337e.yaml | 4 +- ...3447-3ac7913de6e3ab3bdc9b5e42fbbe516c.yaml | 4 +- ...3459-4f3805308ff329789ed39fb1a7c50453.yaml | 4 +- ...3492-2cc21eace9abb2004f2ff03d1c79dbc9.yaml | 4 +- ...3499-11a45c98dd2f844970dab94e4b84b3d9.yaml | 4 +- ...3501-e2849c772d6e6f64d56860e36e54564f.yaml | 4 +- ...5037-c3e49cc5a301ec2fc03ff611d9afd783.yaml | 4 +- ...5040-349038bfb8ad974ae4bba5615712f5b9.yaml | 4 +- ...5041-99ed4f84114970decbe599553d25ef62.yaml | 4 +- ...5045-c3880379f0826cf949058267ed182aec.yaml | 4 +- ...5046-a835e225538d98a6a0f49f942c25b6a5.yaml | 4 +- ...5048-de725b70e5d07ce131e255467578f038.yaml | 4 +- ...5049-3b50ede48b2cfc5cc49521992d3d9653.yaml | 4 +- ...5050-500730a31af9acbaf8945d735529d69e.yaml | 4 +- ...5090-99f4448a717d374af03d744cdc0eb9ad.yaml | 4 +- ...5093-f9e11f76930ee22e20526313ed9f389b.yaml | 4 +- ...5094-1c68ed9adb5cb9e4bd046ceebf588774.yaml | 4 +- ...5095-bbbaa8f4798af45f432fee689b1a5feb.yaml | 4 +- ...3510-3fbce7126258b6f86e3d8d39cbcb69cc.yaml | 4 +- ...3575-acd3eef162930a0876122d4b56734acd.yaml | 4 +- ...5776-5558112c84605e9bc74e93c1eb9fbe3b.yaml | 4 +- ...5776-71b25caf3907e04060e0d61d5bb4a2e5.yaml | 4 +- ...5777-362ad579ac93dd9d0975339b992aaf7d.yaml | 4 +- ...5779-05c88cf821e14c133b503ea979e12c4d.yaml | 4 +- ...5875-f66a440cd899e10b9d3c84e8064d84c8.yaml | 4 +- ...5876-249dbfd7183b6684ad412dc7f00e598b.yaml | 4 +- ...5878-ff2f93ef83cef5530210b6c4053efbfa.yaml | 4 +- ...5879-b89386d59e4ac2c68e4b5b1c7b8ceed1.yaml | 4 +- ...5881-3df49792a8ece76a8d711abde91f5cbd.yaml | 4 +- ...5882-55664802ca8a80e3857f1283c80160e1.yaml | 4 +- ...5910-88a3fac791c3551827ed85f785e74c8c.yaml | 4 +- ...5911-4493ed5056e4671039baf554adba702c.yaml | 4 +- ...5914-c710e29aeb4a754ea209ddfa89b2e510.yaml | 4 +- ...5915-f291a0b96ba11ad5b48df58ad86c38db.yaml | 4 +- ...5916-477398bcb43958a50c7a7519798e0391.yaml | 4 +- ...5918-8a651f3bc7f119f869db333cd8567d87.yaml | 4 +- ...3601-4c2b5bad649e24fd03a9941d8a2a227e.yaml | 4 +- ...3636-0a72b6924fec36fec1dd6c3deccd8793.yaml | 4 +- ...6381-5296c4f305bae7ac7b64bb4111846d67.yaml | 4 +- ...6382-9fd777f73c4ef625b6fdbf9d8363a65e.yaml | 4 +- ...3645-ec6c4566c5b89e861708c86d4c662f99.yaml | 4 +- ...3647-2c744f500a4cb530f5a915c698c40d99.yaml | 4 +- ...3650-5ef4178486944c845329dc8d7715fea8.yaml | 4 +- ...6503-5e63735b86336209453cce97844f636d.yaml | 4 +- ...6504-47cb3cea5c7ee929fdb9a30f97cd8b93.yaml | 4 +- ...6505-9b10289c81ee712ffc41aaeeec7d52b6.yaml | 4 +- ...6508-74041a1cd73f08568e0ec3ed47a172de.yaml | 4 +- ...6510-804968d490234b5a152e19bbec2ea599.yaml | 4 +- ...6512-d7fca3e11b3b0863de2f43ab6c4390c1.yaml | 4 +- ...6516-1f34156a3d4672d58e020bb5b55f0b64.yaml | 4 +- ...6518-f768e79079373c221f74efaccdcb8674.yaml | 4 +- ...6519-325c2ee814ddc7331db5383ec03956d1.yaml | 4 +- ...6520-a85ca9a2b7f246b28c6ccf181717216e.yaml | 4 +- ...6526-373dd0a06bd13b32d55487814dbab124.yaml | 4 +- ...6527-ebe4222fc5927e1301c1b27600c1ee1b.yaml | 4 +- ...6529-a2b34dc7c637e9503c30ea45277c4ce7.yaml | 4 +- ...6530-401b607f5d2e6f27bfcb5e6df2983f64.yaml | 4 +- ...6531-65871570265ff3cbf8c9f9629c5ab326.yaml | 4 +- ...3667-2a0968e3dc51c0d6442ac11d19f9e211.yaml | 4 +- ...6677-f2cabdaf778fd02d270ecff63ff16022.yaml | 4 +- ...6678-d7e80e6f1bf77fdb58c4ef0772ba692b.yaml | 4 +- ...6679-d75adb1e1a8470a2c11b41a61ac1c215.yaml | 4 +- ...6680-165f51757c849b44f8513611b7cd23ef.yaml | 4 +- ...6681-ad516406623ae6ecf9dab15916a4b830.yaml | 4 +- ...6683-c23d0468fa1aa29e9cff4258e8e5f1b7.yaml | 4 +- ...6684-144ed0d6a5cb015106c17c6c273b534a.yaml | 4 +- ...6688-401f06c28c1cd430ed4024172948f5b4.yaml | 4 +- ...6692-a7963745ff69e39eb4bbcfe48cff5818.yaml | 4 +- ...6694-3b5accdca91dd653d9fdbf15959cc447.yaml | 4 +- ...6695-80e328ca936017b96ab31fe4d42f9f3e.yaml | 4 +- ...3677-e3fb45d4e1d6f55f124a91bc17024113.yaml | 4 +- ...3706-3d9f543216228e07e8805addbdc60815.yaml | 4 +- ...3707-f60eec61fd032c9a9193cb04ba124ce1.yaml | 4 +- ...3708-161c9677e95eb847dc432eddc65db142.yaml | 12 ++-- ...3713-602df06e81e9929680d21f57b3d3e3d7.yaml | 4 +- ...3721-00703f6574c6499c4c754c18b06e2fac.yaml | 4 +- ...7388-6da6015396d12ad265b2f5a24810c5e3.yaml | 4 +- ...7389-6104fab3d6323129ecb2671e037b46ea.yaml | 4 +- ...7394-422c4f76899e03c0666b1907832b3ab3.yaml | 4 +- ...3746-3492aa2f8ff8d594f214ebc3c0f6df74.yaml | 4 +- ...7866-49120404cfb8d5621438564fe9eb32bd.yaml | 4 +- ...7867-efe780e12c2c72ceb89cb957cd97aaac.yaml | 4 +- ...7869-476134bec82a295d4478418acb3a1fc0.yaml | 4 +- ...7870-ac9e437a3a3be183da02189f782c1fad.yaml | 4 +- ...7872-c19f8aaf85e78b37bfb8827bc7a43d0f.yaml | 4 +- ...7874-3400f4eb6ff8887592360d9448530f42.yaml | 4 +- ...7886-4a61498f6efba74cb49bf8c1a7045be1.yaml | 4 +- ...7887-f1f206bccc7ec9ca4ed21059b6547361.yaml | 4 +- ...7890-d5de86927ffadedc80433179f0132f85.yaml | 4 +- ...7966-1e01dff414d04212c3c6453a2d281edc.yaml | 4 +- ...7970-2569de726bff5107260fe23150979031.yaml | 4 +- ...7971-e39ea928bd894c6c2a483c3234cd1111.yaml | 4 +- ...7976-5344d2a9421d4134e013b9ef9543b210.yaml | 4 +- ...7980-c6eebad0122883aa540363f1389d9ced.yaml | 4 +- ...7983-47deea3f06e73d1d92fa8e2918f9b61e.yaml | 4 +- ...7986-5f0a636903de630172f072592f6edff3.yaml | 4 +- ...7987-c5fe48358feae544a0b21efff11ac6fd.yaml | 4 +- ...7989-a80bdd8568c61aa45e987adfac4d1b71.yaml | 4 +- ...7993-8b316c2c5c57a5bec4fddd68dace9cd3.yaml | 4 +- ...7994-6866d09139386202bbed5983be370086.yaml | 4 +- ...7999-719fa4e7b6c83ab485c9d95f46e8edb7.yaml | 4 +- ...8000-8629a041445673190f74e67cf1a4f264.yaml | 58 +++++++++---------- ...3814-1ced58320fa56965f50860e215f3e06d.yaml | 4 +- ...8383-a96c597219ed29fc68772417c5a3093c.yaml | 4 +- ...8386-740df732c021f2878fae481d2ff89873.yaml | 4 +- ...8387-7666fb1e1d2345dc70da7aee12ac3253.yaml | 4 +- ...8391-a3ea3eadba50d012fd5181689a40ff84.yaml | 4 +- ...8393-706995907d69bd14e09ce77802032800.yaml | 4 +- ...8394-bfeb7be408c868527d6e4e4ae715a094.yaml | 4 +- ...8395-bb2e17c35167609647005349850505d1.yaml | 4 +- ...8397-ea5c3acfd64b155268d32c3228d1c82f.yaml | 4 +- ...8475-a9d63cf96793705be5a47f94a1b589be.yaml | 4 +- ...8476-0b15ae4e67ed167e4179722b43d42dc7.yaml | 4 +- ...8477-800d1ab574434819322506f176feb04a.yaml | 4 +- ...8479-5d0daee3984605beba0293322e7ea274.yaml | 4 +- ...8480-37d5b7622ee837d13b79238620e127af.yaml | 4 +- ...8482-107104bc14e921090e757f0c5c64d34d.yaml | 4 +- ...8483-417113d5b23fd45edbcf8209f3cff8e9.yaml | 4 +- ...8513-3bdb0d0ea9cf8219d34566c6858ae4f8.yaml | 4 +- ...8516-4a822bfcb4b13bd5154ea0a206a03b5b.yaml | 4 +- ...8517-b7300a2ec84dffd7f0d27ca9d7ff574b.yaml | 4 +- ...8518-2504b2285582e1e86e6e013779bb055f.yaml | 4 +- ...8519-373c4ea18f9baeef2872a78ab527c078.yaml | 4 +- ...8521-4f6c9e5f134bc3a7357c0b3f26384141.yaml | 4 +- ...9157-cdc0a1afbf2cc009eea0f7deda8a5515.yaml | 4 +- ...9161-78755e457e479cae23d5dca42eeac5db.yaml | 4 +- ...9305-c1cf31deca47ab06031c32c6f87e918a.yaml | 4 +- ...9307-e3ee06b08069cc90d373b87f289545a0.yaml | 4 +- ...9309-b40b112aba812047c066895073435f9d.yaml | 4 +- ...9310-5a8b95e9d623c8f7e9c70ff9c8a761a0.yaml | 4 +- ...9312-bb65f92eeb63b478b2f218d634d42a06.yaml | 4 +- ...9313-e6b2cb8bfdcceb721cbe5b7ffbe02c9a.yaml | 4 +- ...3956-54fd19cb983e5e5bd13d627c9c0487ab.yaml | 4 +- ...3957-54c49ed92754fe9b72ea28cef486ac0b.yaml | 4 +- ...3958-be653cd14bcab55a461716f49e0f0156.yaml | 4 +- ...3977-c451f687ef3559dbeeebe92c1e87ed44.yaml | 12 ++-- ...9919-c41eb0b63074858e7a2ad3fb4237d823.yaml | 4 +- ...9920-fc89ed1d43552a7a477f16e3ec9d6e29.yaml | 4 +- ...9921-1a6bdad9f927d9cadf5b74b8297f6ad5.yaml | 4 +- ...9922-855366bc54f67a90854fe071e412ecdb.yaml | 4 +- ...9924-99f94d5f6f5961794646e333f2e12898.yaml | 4 +- ...9926-90c77c994b57286cd58b89b0a94442a5.yaml | 4 +- ...3996-0786d35a357f001d251a3bbf5eef2d35.yaml | 4 +- ...9987-9b48b8479f4c58ab28f6369c437cd823.yaml | 4 +- ...9988-506b320d59fe9094f7b88764f2b3b6fd.yaml | 4 +- ...3999-1209e60c33aa42384c4d16b88f0a5ed8.yaml | 4 +- ...9990-001a8dbb2842e703a09732c4c42c632c.yaml | 4 +- ...9992-c1f8f105aad937fe6b4d3f7e729e9b4d.yaml | 4 +- ...9993-01583a85c3bb765e7b9d1e3e575dd138.yaml | 4 +- ...9994-744209b23a7e6299f52186bba738be87.yaml | 4 +- ...9996-124a6a229ba4bdf103aa1881e7bf0b04.yaml | 4 +- ...9998-6bcabc3b4e69486405e1172846710922.yaml | 4 +- ...9999-42b34351cf4116e30de29d20e17168cb.yaml | 4 +- ...0002-21b746fb77ead6544f6c7dbfa1edc718.yaml | 4 +- ...0003-b61b6ac3b97f0d01cb8ed1723488895c.yaml | 4 +- ...0004-9c485cf198874e1abdd12011232fd4df.yaml | 14 ++--- ...0005-3e264890774be501312d562a2e66b9a4.yaml | 4 +- ...0007-62cb33b4f205d311d390e62fba25cd36.yaml | 4 +- ...0068-62768c2e4740e3e20150e0c67af690b3.yaml | 4 +- ...4019-c3c6f65072fe37bbbc2ef7dbe119003d.yaml | 4 +- ...0197-652d56be5b505867587dc16b9cc45713.yaml | 4 +- ...0200-9f65d6fc085d85b53357bd33fa3d4834.yaml | 14 ++--- ...0203-8aaee0ca0357561b8fb5f4652479c99b.yaml | 4 +- ...0204-aa05d3117d6e609391e83e8b970f2625.yaml | 4 +- ...0206-aab17c6b24a2dfba03255d9a47e0c674.yaml | 4 +- ...0207-6f7b5cdd2c06fd389f02600d38bca12e.yaml | 4 +- ...0209-a3e9ff26d980a2a3e39533f0b78e5d83.yaml | 4 +- ...4021-4092810de68e3fe8831c5002fea9ea96.yaml | 4 +- ...0213-d3b5c660c8e70bcaeca06e534455619d.yaml | 4 +- ...0215-9c1a7ab296fd9381f729867ce6c145d6.yaml | 4 +- ...0219-c85d6be596b55b91d137e8053b85f064.yaml | 4 +- ...4022-ab1eb5a48a622a49086f766ee1ce86ba.yaml | 4 +- ...4023-64408a501c37fbcf42b9db6bc5338336.yaml | 4 +- ...0326-cb9adf9824210ad3d3e7d6f714b65556.yaml | 4 +- ...0327-0c5c03e535c02675bf0d5fbe19ae065d.yaml | 4 +- ...0328-d0bff2c3c4777b0c5230adf64beddf0b.yaml | 4 +- ...0329-0e96d2ec3c953050a17aaa45bf8227cd.yaml | 4 +- ...0331-9ea3c82ee3ff18eecbc44a826a19457f.yaml | 4 +- ...0334-b127fca718a0b357c2daf67816c8cec2.yaml | 4 +- ...0335-38c76ee17f970b2f9f7455a9aafdaf8f.yaml | 4 +- ...4035-38f522639c782f75ecbda00625777030.yaml | 4 +- ...4040-1c5c778d8970e8a4e068e0dd69740d62.yaml | 4 +- ...0552-642950df2f7522b38841579e45f2fa32.yaml | 4 +- ...0557-1aa0e79be369c61efc2c0807922659cb.yaml | 4 +- ...0560-53afece9446695901fc03dfbb692e04f.yaml | 4 +- ...4059-00e848a455a7983930f44875cace1026.yaml | 4 +- ...4060-41758ee37f85a4ada05dbd855bba9b0b.yaml | 4 +- ...0603-7a420ee74601bcf08094df0c89e9ad5e.yaml | 4 +- ...0604-b9008bcb5ccd36f2981a1df579798a3b.yaml | 4 +- ...0605-8a6899bd3b3c6951efcee5344ca06fff.yaml | 4 +- ...0606-b7ae92a9935669b4053689b9e0cbb221.yaml | 4 +- ...0664-183ebb9bdb87985c4ca10ea8af8836ec.yaml | 4 +- ...0665-67ad930884b5b87d29530a8be64ff268.yaml | 4 +- ...0668-b2cea8a198e9a575447977f949754486.yaml | 4 +- ...0669-4783eb0d865a9f683c0f42594f272a3d.yaml | 4 +- ...0670-6663c4e8258a97ca80d8e61f0b37ac68.yaml | 4 +- ...0672-c9799f12c2184eb30d64cc5143268b5b.yaml | 4 +- ...0674-2b45864828a1aff6937ee7dc2951db60.yaml | 4 +- ...0675-8417ca6ea2b385ef6685bba03ed8d8b5.yaml | 4 +- ...0676-423f90da633eb79297c96d8f0abf8be5.yaml | 4 +- ...0677-673a5e282a31715aadad077526dcf5b4.yaml | 4 +- ...0678-675d927de3b1b53ecaa9209929290da6.yaml | 4 +- ...0680-a3fa83da79405e5abf7cb2c0fd1ed37b.yaml | 4 +- ...0681-b86dfb6f9dd8aa205cbc3842be669c7a.yaml | 4 +- ...4109-3c9dac2ddd3bec2b9b5eb5b21c8ec91e.yaml | 4 +- ...1127-92de377343f9b56c26e4f5ac1766852a.yaml | 4 +- ...1128-1c48d6771b0e3d17023908b8bdc75005.yaml | 4 +- ...1132-9d69b5dedc1dea8d291f6cedb75f3be2.yaml | 4 +- ...1133-eed5959a62db993b12da83da9d803446.yaml | 4 +- ...1136-5a0364c13a90f16b0ef1e911c302d0f2.yaml | 4 +- ...1239-09573bbd55ffbde9d233ad38438e8f66.yaml | 4 +- ...1240-8930cf2379d26f27d4dfc818449f89c9.yaml | 4 +- ...1241-3d8dd9beb9e2d1b17d8d01ef045ea5d3.yaml | 4 +- ...1242-ed4eb2c4883d6e7594e77a8d9e41fb0a.yaml | 4 +- ...4140-51b67c232457e0e4e3e29917fed2f232.yaml | 4 +- ...4141-0d112b75baa32165ac17ae118d62fed2.yaml | 4 +- ...4142-7705126a4ed4d1dc1d9561088cab0d7f.yaml | 4 +- ...4153-137251846c7319666c4983642238e856.yaml | 4 +- ...4160-669481af47f05337ab733ec932b4b377.yaml | 4 +- ...1649-c5037c5f6ce141975f7a422878dcc1cf.yaml | 4 +- ...1656-267d7435385a9582ef7c8199e8931303.yaml | 4 +- ...1657-ca4ae9210ad5c6416e62ede162724557.yaml | 4 +- ...1661-714adebc0f79250fa11c7babb8af735a.yaml | 4 +- ...1664-e1e05c3d687b12217db0b7b57b7d94d7.yaml | 4 +- ...1665-941ef3ed4e3d287ad92a76b5c6b10f89.yaml | 4 +- ...1666-9bd703646402672c6e3df139cb8847d8.yaml | 4 +- ...1671-d3760060833c9e24b772fab4457401bf.yaml | 4 +- ...1683-4150b6c5ffc14f9f916be876839f27fe.yaml | 4 +- ...1685-1b283946c80a7878d62493f2e843e97b.yaml | 4 +- ...1687-5354899032ab4aab5f7e436527798ae7.yaml | 4 +- ...1688-cf39fd16fb8f788c8db751f0dadfb29c.yaml | 4 +- ...1690-6b2cae5676cc752aa89b0a0ababa3a92.yaml | 4 +- ...1695-d12af8e80ae1c421ffa919ff53dc2e47.yaml | 4 +- ...1728-dd783793d1579786f0da18d50db26b6a.yaml | 4 +- ...1729-572ada3e2b5cfd266bbe4d55b671ea76.yaml | 4 +- ...1731-a18a9d03d5ff2c74e7d4dd874ea75ae5.yaml | 4 +- ...1733-0adc72a8beddf445761ccd2b42cda0f5.yaml | 4 +- ...1734-027f8eecce0a5762cf1bc3cc2ca92e8d.yaml | 4 +- ...1735-4eac7176009c682727808e01e866ef23.yaml | 4 +- ...1736-8758f22404dd62cde026b1679050e44a.yaml | 4 +- ...1737-861a2a6e66a953eb50c087718b438c88.yaml | 4 +- ...1797-9e153a23809280911bab79339940a337.yaml | 4 +- ...1800-52d99f3d726c6a2b0f9591cf7e9202f7.yaml | 4 +- ...1802-9a23102fb64a765611d796440b87f458.yaml | 4 +- ...1803-bb0ef31fb16bd70576b63c47a36e1c9e.yaml | 4 +- ...1804-53fb886a588d15854380c3b94bdeab19.yaml | 12 ++-- ...1805-27ee53c7765f3cc7ca36cbf7ac963e20.yaml | 10 ++-- ...1847-18ae8fd1e9cb93487e81ac53ef4e167a.yaml | 4 +- ...1848-24a3397fbf299aff4ecd7a231ef53936.yaml | 4 +- ...1849-a6ade812b7794f2ce71092e01b3f3441.yaml | 4 +- ...1855-6c7076324759f17d9672657f46020f5a.yaml | 4 +- ...1857-b512f326cf614df599ebd00014aea201.yaml | 4 +- ...1859-b3374ece5f330b0776522f2f5130afbd.yaml | 4 +- ...1862-6cdecc6c25d61ef54d3cce62a39d5781.yaml | 4 +- ...1865-55b1133e21935d007c80035f80fa6446.yaml | 4 +- ...1866-41e70074e724b3d58c82d2325b25db5e.yaml | 4 +- ...1869-bd68d113848e70b56a089eb9f2977075.yaml | 4 +- ...1870-53abed64d2c7da6e29618b2b45471eff.yaml | 4 +- ...1873-cef3df52a6e193270f584096ae2ab14a.yaml | 4 +- ...1875-169725f2f4440d7e4d2c8758f176453b.yaml | 4 +- ...1948-bd04f483d63aabca8f2d0d86dcbe84f9.yaml | 4 +- ...1949-7c92e9b689e3db3a0760660dea080463.yaml | 4 +- ...1951-85898493501c4d75829911d4553b254e.yaml | 4 +- ...1955-e5a55bdcc25518bd7b994104c01d9391.yaml | 4 +- ...4213-669be7a13bf58d1940739fe39615ab4b.yaml | 4 +- ...4238-0dc878d77e3a3194c72fdd6ba3814c5b.yaml | 4 +- ...4239-ce5b36195b53746aaff59fc078e530e9.yaml | 4 +- ...4242-cb4a0a7493c7105139c64a6aefea1dd1.yaml | 4 +- ...4243-1e47a59c0ad1f7f985e2120ccff4f8d1.yaml | 4 +- ...4245-6173b7b86957899221b3529556dc4a8a.yaml | 4 +- ...4253-67e61488b97755fd204f3e38d91bbcf2.yaml | 4 +- ...4254-584e49f9f9bb47c562f3e0a8463d6240.yaml | 4 +- ...4271-27268d0b59c1274c726da2859a7e1b6d.yaml | 4 +- ...4274-6fc26492de3e14b8a03318635a942d46.yaml | 4 +- ...4276-08a30537532865cd761666366968e42d.yaml | 4 +- ...4277-be08bf68983d62c13cc53ac7ac785641.yaml | 4 +- ...4282-735922333648d19765f3918bee1c33f6.yaml | 4 +- ...4283-7ebfb915654b21bb1907517d4349fa05.yaml | 4 +- ...4289-619a199c4aef0c8ec4b0e45c8c920810.yaml | 4 +- ...4293-1a67baf6167d3af7ea57dc54d855070a.yaml | 4 +- ...4297-0ce6b6a0e9e78d060d6ca04414281584.yaml | 4 +- ...4298-93f5b1d9d41a68948272932dc6addd39.yaml | 4 +- ...4300-9ab53108097247c27c02dfd755c3ffcf.yaml | 4 +- ...4311-739af30ba304d3e19c7edf50976bcb67.yaml | 4 +- ...4314-23d1479acb7980e0e80c8871beec9664.yaml | 4 +- ...3493-f56dc5bbdc913e57ded42347de5ef8aa.yaml | 4 +- ...3610-fc6e5379eaab092cc08185fd85a10348.yaml | 4 +- ...4372-e320d6afe142ff2886379823eb8759ba.yaml | 4 +- ...4374-b5b3726a38a0d1a56eeda75879ed92d9.yaml | 4 +- ...4376-0bd471365f33bde2fc9b3cf18367b907.yaml | 4 +- ...4386-daec7d39bacac9f0d791f41eb89b64b4.yaml | 14 ++--- ...4388-fb01f61580a3daa6743e2536b3904a23.yaml | 4 +- ...4390-ffda73ee0ac47c439700ae8ebfad208d.yaml | 4 +- ...4402-de6bb81e5776b8853821078d5af9e37e.yaml | 14 ++--- ...4142-a7d769783ca2c437e9a1a4760da51769.yaml | 4 +- ...4145-843f515046670d7a382e75e7e4f584c1.yaml | 4 +- ...4148-3e0d971821f286a488f83631df3f9e8f.yaml | 4 +- ...4149-825f1e0aa5ff97544f2d8803cf6504ca.yaml | 4 +- ...4228-a274b1ec9586c121ed58c6cb9eda6a2b.yaml | 4 +- ...4229-54520ac61a70e176cb0b123fca675fcd.yaml | 4 +- ...4423-5dfd39caa2a4a17a9d81b2bcb48fe7a9.yaml | 4 +- ...4230-584864f4cdfe17f88fd042ba6424f8ca.yaml | 4 +- ...4234-87f838d84fa79999236dcd79f1342013.yaml | 4 +- ...4239-92ee681763fb9cdadb89c1275ea24df6.yaml | 4 +- ...4242-c5c3a05f327c9f5ee9273cd2dd422a24.yaml | 4 +- ...4244-b1493cf8f77a9e357e523e1844c8f281.yaml | 4 +- ...4258-d4b2be233d46cfcba65da98993b34434.yaml | 4 +- ...4262-3d078edbe634b7f5d57ec87a78fa8d02.yaml | 4 +- ...4263-6685df96c78b040fc19a70ee58d84842.yaml | 4 +- ...4264-19cdc4c29e421f2a623449d500d3da59.yaml | 4 +- ...4265-3c0e91d24d36a9cd6d874ce52fecf15c.yaml | 4 +- ...4266-01ec13470a183f703d9497a5409e83a8.yaml | 4 +- ...4472-90e033d103f597ab6ef613db20a319e8.yaml | 4 +- ...4477-6e286583f72963c211e1187360769087.yaml | 4 +- ...4478-0a2ecbcc02c5fdd93dc20fd7c66c9f62.yaml | 4 +- ...4479-9a1755a05c804d6305bb91e5146a62c4.yaml | 4 +- ...4460-3e6fcba7da4eb2d07480c9678c589c91.yaml | 4 +- ...4469-be030cdf4529b191ea63fd886a20439f.yaml | 4 +- ...4482-9d2a99598a00b93d061f40c1f9bcc177.yaml | 4 +- ...4984-a8af060628ffa49f9121f24c1f544243.yaml | 4 +- ...4985-848807325cc6df7207551325cd628ce9.yaml | 4 +- ...4986-af9a5eb02914599951c2e164f6765355.yaml | 4 +- ...4987-a2f77566f40955cc7451f648aaec112c.yaml | 4 +- ...4988-5bdecbba58ada95bd7bc5fd2be57ef44.yaml | 4 +- ...4990-10360815e5a20aeed5671b4b975451a1.yaml | 4 +- ...4500-32b3fdbe7b7f22c46479a3e9393eb06a.yaml | 4 +- ...5000-0436bd17a7ce2057f085dec6812cf1d3.yaml | 4 +- ...5001-80f967b027a6da96dccfd0c385ae1ac0.yaml | 4 +- ...5002-009b7c3c01cbc1b8e5b1583fe598205f.yaml | 4 +- ...5008-2958b08ce41d2a089d276808ef68e4bc.yaml | 4 +- ...5010-036ea79db83fe96391d5364e9f6a5d01.yaml | 4 +- ...4502-5ebef968ecfba23771708b1d7c8b6112.yaml | 4 +- ...5045-23aac587b81f89d6096ca89681943380.yaml | 4 +- ...5046-86e875acdb3922f4740414dff44b0215.yaml | 4 +- ...5049-803fd151825baa056b93685e93955a54.yaml | 4 +- ...5050-9fc3c2f298b108af257176fa3092141b.yaml | 4 +- ...5051-7348256da9fa27f63ea541c99917352a.yaml | 4 +- ...5053-0eba82d1fba78dd21145988eca694adc.yaml | 4 +- ...5055-8b6490d616c3b0afd9a25ca2623da6a2.yaml | 4 +- ...5056-d517a1f1b39fbb25ce31405c236e39dc.yaml | 4 +- ...5057-c0963c297f9f408e178419f30ee7e022.yaml | 4 +- ...5059-f295e8a8427ef02d3b3be1982f4ae5fa.yaml | 4 +- ...5067-be653a8d2bee2421f88f0e6d66ccc0f3.yaml | 4 +- ...5069-ff831311ec70debdd240fd0dff910b29.yaml | 4 +- ...5072-feb8c11c4ef0641488804a4e83e4b8c9.yaml | 4 +- ...5073-9cb69a500db940ecfdbb3ba869c26c38.yaml | 4 +- ...5074-9c6b12242aa8d580a35fa22bad685fff.yaml | 4 +- ...5101-72807f145d4d787ee0d78e0f3adf0196.yaml | 4 +- ...5110-d090aa5f37413bd2a82801bde518653e.yaml | 4 +- ...4514-d3e919ff7a9e64072ba58c94844a6e21.yaml | 4 +- ...4520-4f8b60559007de9693d6bd6dbd7b9937.yaml | 4 +- ...5271-1a920eb903d024c035ef8c5bd825169f.yaml | 4 +- ...5272-beb09afd16c7dbf0c14aa5a401d0f673.yaml | 4 +- ...5275-b8ab2dfdf20e4fafe82ff439f5e1b3cf.yaml | 4 +- ...4536-decd0181d7e39da44fe0e5d9af5455c7.yaml | 4 +- ...5604-c4a2060e848f8147ede668274113eb5f.yaml | 4 +- ...5607-93d2bfa4a5e5debcba57e4ef188367d5.yaml | 4 +- ...5608-66eed7c58e1298fa04981c6c1b2ea3cc.yaml | 4 +- ...5609-788f2a7e634374198c6c99e174e2830a.yaml | 4 +- ...5628-95716c495ba3e1d4d76a3b64760b338f.yaml | 4 +- ...5630-f65c67e968e15596bef3448601bb7b39.yaml | 4 +- ...5631-63e26d4ba1974966e333b4b151a2c5df.yaml | 4 +- ...5633-828d5e38dbe1047738a24a003f9a3134.yaml | 4 +- ...5635-dd8a374519ab8fd8464df00ba9945d8b.yaml | 4 +- ...5636-f9b95c5df8218e5c27a0db54debfd7c6.yaml | 4 +- ...5640-44f7bceac9641de69745cf2de93af035.yaml | 4 +- ...5644-62cbd308ef66719516de2026de43669c.yaml | 4 +- ...5646-d7c844e32ca0ede6715df38694de53b3.yaml | 4 +- ...5652-894688b32a41816c9ef521e84f097274.yaml | 4 +- ...5657-fad17491d46d93aa052a2c5d2ff91e1e.yaml | 4 +- ...5658-4671c56fe35cfb879a2471b3343a30c7.yaml | 4 +- ...5747-9d391b643840d9b9d7ead6e546f2d7b1.yaml | 4 +- ...5751-45f2df14510cef20714306c6b2b6f810.yaml | 4 +- ...5754-95ad70daa5a42e22046c057a639de555.yaml | 4 +- ...5755-ed89c8160fc54a5150ed5e4f427981e4.yaml | 4 +- ...5758-cd1cf1735f71561e3ab5315052ee03d0.yaml | 4 +- ...5760-b26f381c9f7354f3462011430c6f3516.yaml | 4 +- ...5764-4634b65a3b88602069115a32b9310bb1.yaml | 4 +- ...5765-028f2396fc3224cdf799828543a80de4.yaml | 4 +- ...5766-b01ef863c43e07a65402f06b0d7b0757.yaml | 4 +- ...5767-27310a1dc2397e2cac54db00506a62d4.yaml | 4 +- ...5768-cd42ea5f361eb592a86690da9944867b.yaml | 4 +- ...5829-72d17698c8eeb0073ce356c8f5c5e968.yaml | 4 +- ...5830-2cc161db9aab9dca8c45963425559bbc.yaml | 4 +- ...5832-352c9721f769a69dbdfdbca5d48088a2.yaml | 4 +- ...5833-8668394708fedca0791c9dce209e6c21.yaml | 4 +- ...5835-04c216a7711f03f2d76acb6a4f7b0e8c.yaml | 4 +- ...5837-b8296fd7e9d3d8c36b36cd4afd336fd3.yaml | 4 +- ...4597-64166b21a8975f062b52f4886bce7163.yaml | 4 +- ...4598-49bd4bae2777384dde2f9b06bf68d410.yaml | 4 +- ...4599-9c882237ff7863bee4225b027eaf1086.yaml | 4 +- ...4600-9d0741a170ac5d20bebb10f83abadeaa.yaml | 4 +- ...6066-b53850514eba837c1bf2ca4cf00a35b7.yaml | 4 +- ...6068-4589a6370d5dbea689df46df9c5577a1.yaml | 4 +- ...6069-2689d661f3ccd51f254bc58895e1f11d.yaml | 4 +- ...6079-c4ac8ff1dfd268623baae850718c4ab2.yaml | 4 +- ...6080-5543057e7022cfec9b8ae11fa6f72d5e.yaml | 4 +- ...6082-ae16dab4cf6e57b86cebb9a4da6eafa8.yaml | 4 +- ...6083-7de52979e23084c59771c8210cf92e97.yaml | 4 +- ...6084-d61c42f727c04f01365911b7fc14a3d5.yaml | 4 +- ...6088-667e350f42b763781ac08f9d6c648e0b.yaml | 4 +- ...6091-44b23b8882e9805e87909dc573565952.yaml | 4 +- ...6093-ed6d1649ba9976ebdf4a57c36e036026.yaml | 4 +- ...6146-e85a48bb53d03fe4f0288a0ec1595649.yaml | 4 +- ...6147-3d30a7e8f0b8f6bc4309468a15c7f314.yaml | 4 +- ...6148-f655e8b1894773f9d99ee26fcaeba800.yaml | 4 +- ...6149-c842576ba599cc503a47eb67c0e70851.yaml | 4 +- ...6154-a6097b32439b60cacd59d47b3a1c8c61.yaml | 4 +- ...6192-5f27ace6d76e064e4061fdf808767b2d.yaml | 4 +- ...6195-8cd08637ffa8c2d1ca3b360f63505422.yaml | 4 +- ...6196-109bcc0df2db9108727b125f1715f024.yaml | 4 +- ...6197-aaf49aa53f803817d024c6faf4d05d87.yaml | 4 +- ...6199-feb2ed9a776f1da5d8e1058653f64bda.yaml | 4 +- ...4620-b3c2fa102dc78b18cc1d35e379c8dc7a.yaml | 4 +- ...6200-4d6efde8bb592c906d33a37bc632b9bf.yaml | 4 +- ...6201-cbd733c7ebdd096e6d282497c4c8eb45.yaml | 4 +- ...6203-2e06d0c89a5dc3c234768757cec7f855.yaml | 4 +- ...6205-c12fe9671d21c1c91257ccad7444bd6a.yaml | 4 +- ...6206-7c87e8f104753303f633f63d1aeebd8d.yaml | 4 +- ...6210-59d95b9687e55d617dd1230a739e9c20.yaml | 4 +- ...6211-42a6391e7ed0fe5a4ef825a270130c8a.yaml | 4 +- ...6212-1bacae6a1e466eb95d42535d2732f49e.yaml | 4 +- ...4626-75b95cd57aa6f181317402e50b5298ac.yaml | 4 +- ...4627-cc5f050077abe9bc4430ea7311dee63b.yaml | 4 +- ...4636-34d2a65b3d8097e555cf3aab3134db2d.yaml | 4 +- ...4637-a6bc1c4f18d7c787b94d2c3a536d60d6.yaml | 4 +- ...4643-bbc7fa54925890b55e253bb27ea68d3f.yaml | 4 +- ...4646-9431aa52549a30a720033bb06c5049ca.yaml | 4 +- ...4648-a0746efee95fbf7d166096b25b7d8be2.yaml | 4 +- ...6605-0f483e5b57556e64c6fcbf6984188e67.yaml | 4 +- ...6606-f021a9b99ee30b184dab1f6f57a36751.yaml | 4 +- ...6607-e3f695a2140d0d6b1618f7ffa872601f.yaml | 4 +- ...6608-bd8336f3b7891bca7cf2acd9eb9176f8.yaml | 4 +- ...6609-033552000c57d4d0e9b8f1077c9a1953.yaml | 4 +- ...6610-b2aa6adf9a3ecfeb3a1e73b7feaface1.yaml | 4 +- ...6612-dee11a999eea8acc0c1d0780e652bd48.yaml | 4 +- ...6613-2e36e1fd5443dd09871a6501069bddbb.yaml | 4 +- ...6615-0ab200e48d96a6ca5d84cfe7a3d18007.yaml | 4 +- ...6628-12dbefa5509a29120cd218ac3cfa3bd8.yaml | 4 +- ...6631-bc983a8f571310dd96f9e038e97c3ba7.yaml | 4 +- ...6632-de64d2f517270fa27d42f881da4c6d98.yaml | 4 +- ...6633-782e75e9ade7cd09f2f9dfc0e07ecdf7.yaml | 4 +- ...6635-255ea4aa4e6fb6ceab7bcf43313eab50.yaml | 4 +- ...6637-177a143182cd744b54e19a39a4cfbfd2.yaml | 4 +- ...6639-31e1dd2369472619e89b67df12c89fa8.yaml | 4 +- ...6640-9a2c39e647de10bdf5506fe83c7446b4.yaml | 4 +- ...6641-3884d9a5a5a83b7a3dc7015b6e93594e.yaml | 4 +- ...6642-c3f117930fe59986e129269f444e98be.yaml | 4 +- ...6644-98193019af2a73f9695ff639de4023e0.yaml | 4 +- ...6782-549edad2ce245fbc28f77db9aee80ff6.yaml | 4 +- ...6783-f8654e70b61d2e52e5f038a5f0414371.yaml | 4 +- ...6784-13f1e3e1ecb400323f6ac6db56c9c266.yaml | 4 +- ...6784-145fd589f9d6e521c8599d0e3d4550d9.yaml | 4 +- ...6821-c051ed74380d85e155152ed23876ff43.yaml | 4 +- ...6823-d16be1a4a8c6ae781f11c50d01685d10.yaml | 4 +- ...6824-fe295018c777f28527f026c1db66229d.yaml | 4 +- ...4686-c2b458a87e9095667109688e878e4bb7.yaml | 4 +- ...4691-8558d7a24f00d0b4c6ef650bca69a892.yaml | 4 +- ...4716-cd5bfb58064b9745ccbd3f1f59ac312b.yaml | 4 +- ...7177-dc961a43bf6645987863e2268d4c98e4.yaml | 4 +- ...4718-bb75a2fa99f691c300cd6cf18948e14d.yaml | 4 +- ...7181-147226d7fc59bc73ef79b60eb67e7365.yaml | 4 +- ...7183-fa1fef40b905a2c3c8c8c056ae496c09.yaml | 4 +- ...7184-11e3031fc351fbc9a833e9b97e46b6a6.yaml | 4 +- ...7187-8fa029836e390a41910a91e1df99c734.yaml | 4 +- ...7188-290105b1777b3869c2f6dcc0140c3419.yaml | 4 +- ...4719-3af100998fbed69cbdecde044b4ff026.yaml | 4 +- ...7190-2c1fdb69500dc831bd46062ddc0d2b02.yaml | 4 +- ...7223-b5b7bc46aa5c73951c7934c79faf05ff.yaml | 4 +- ...7225-258545baa917b7571f477b428889162e.yaml | 4 +- ...7226-43333653570b3a1b8a29a02f94914583.yaml | 4 +- ...7227-3329f436b3e9299453177bb21ca6d4b2.yaml | 4 +- ...7228-ba96af4ca3ffeaa3bcc3879d978146cb.yaml | 4 +- ...7229-34bed79fb50712c291365a8ff729b6f4.yaml | 4 +- ...4723-ce4e21b72cfe20823efba4862db87109.yaml | 4 +- ...7231-2dbf94e1363346187fd0d9415f21a87d.yaml | 4 +- ...7236-1ae1b0bb4039a24aa303fbc722996071.yaml | 4 +- ...7239-6956ece992f5fba93947f810cb6c0062.yaml | 4 +- ...4724-3e761f82934df2ab4021a24d8a5d3f17.yaml | 14 ++--- ...7240-4965c11c4afc77625d19c06034b78a11.yaml | 4 +- ...7241-f86a366b83ee22a3c8a02c83ac209077.yaml | 4 +- ...7242-28b0382bdb3605846c741b0b29e57d1e.yaml | 4 +- ...7243-13034f6a839e821ee8d8b6496142d778.yaml | 4 +- ...7245-16ea15328c267590894ffee4442a84eb.yaml | 4 +- ...4725-f09df8170b914522627f58aeacdfb8a8.yaml | 4 +- ...4726-b6be8c11fad37e887646a283e9c47ba4.yaml | 4 +- ...4728-60eda95192a20425ef3765da3a807a07.yaml | 4 +- ...7504-b58bfdaaa39d4e7d694c40523cac0a71.yaml | 4 +- ...7505-ed7ec795a9e5769e2593c8bc7106e945.yaml | 4 +- ...7506-624a2aa57869ce0516a56db0d2b7ba1e.yaml | 4 +- ...7509-fd2527f160b6f8cee6c4ddf5aa4628c1.yaml | 4 +- ...7511-8f29322bf5d9ac8d382567725e776aae.yaml | 4 +- ...7512-bc43f57bd35ee24fbcd374ea171e9e72.yaml | 4 +- ...7513-3587db01a7a28244ee4173daa03a691b.yaml | 4 +- ...7514-68ab25be74477c215ab2a821dbee384e.yaml | 4 +- ...7515-99cc5f18cba37431e326c7c04591a219.yaml | 4 +- ...7516-4f664c5f9a6ed3cf0ca52dbb21a8c73c.yaml | 4 +- ...7523-ef92930a59c0704397081e4543f7586d.yaml | 4 +- ...7525-5b36fd20286674ebec29c5f8c3b598c9.yaml | 4 +- ...7526-9c920cf674baacb0579f3b1f4946e20e.yaml | 4 +- ...7527-267f0e0e2934a72d1de6f6f1105dcde9.yaml | 4 +- ...7528-7b1e0db7c2338cbba544192fa7f81810.yaml | 4 +- ...7530-20764e34dd96746ac27cacdf816c512f.yaml | 4 +- ...7533-c8561a6d177892f154af9b7c10500c01.yaml | 4 +- ...7544-b5350d73ee034ae7067ab3d2b696ae06.yaml | 4 +- ...7545-6d25ab79e6e7aca51a4387e7aae24c9c.yaml | 4 +- ...7546-78ddb3e5efc137c9989117bb477a197f.yaml | 4 +- ...7549-19e34a16c1a810dff7996ec5d94f691f.yaml | 4 +- ...7550-37dbc4d1c954090682035935efde0d58.yaml | 4 +- ...7554-2e3087c002dc76b9a7567526587e8736.yaml | 4 +- ...7557-5a91aad28267261ebd2de3c8343f1995.yaml | 4 +- ...7558-4d3c4e1a467914ea53537050432b3938.yaml | 4 +- ...7646-3efeefb310fc267db6d3c82c2278b44a.yaml | 4 +- ...7647-99d724e78c6e3ca9e817c7ab41561c22.yaml | 4 +- ...7648-405b16e90fe11a6da428eb58c52f2070.yaml | 4 +- ...7653-276bf528dcf846639fd31e2f34582a53.yaml | 4 +- ...7654-192e415b611335b3538e5f2af9fbc394.yaml | 4 +- ...7656-33bea64d5937abef2b137f0af05c7eb5.yaml | 4 +- ...7657-66d0aaa8dc75cc7c0b323f4705b3d63d.yaml | 4 +- ...7658-17ad0651e8a5c8de6d9430b66387dde0.yaml | 4 +- ...7659-dcfc7774787e2e0bae54fdcbcdce15a5.yaml | 4 +- ...7660-aa1854785cf9c11ed11fbc4dacf9e3b9.yaml | 4 +- ...7661-93d3ba9b108e1112ee15e322299a4fea.yaml | 4 +- ...7662-af9b404439d9589515c5ec4e6d7f1ef0.yaml | 4 +- ...7669-cdefed7ec787c02fefebf6f17656a114.yaml | 4 +- ...7679-fc19ca606bef9f853ea0565c4043c5ce.yaml | 4 +- ...7680-d88df7a254a138ad74fa62f540e9ec2c.yaml | 4 +- ...7681-c27f182f563d1fb6d07ba79eda84b6fe.yaml | 4 +- ...7682-878f413ec190d0a95a0db0404871c06a.yaml | 4 +- ...7683-5e2f11a884ccbe34c9944f9c84b1340e.yaml | 4 +- ...7689-a2f2e6465cf5db9cbb966e235c714c1c.yaml | 4 +- ...7691-e884ca510b37335b1134220e4cc6625b.yaml | 4 +- ...7692-31993563048effdc0827881e9344d84c.yaml | 4 +- ...7693-b8421311d76851450148e6c1e68c8aa3.yaml | 4 +- ...7698-010c2fa504f8e0c5ce7acdd2e0b14e5d.yaml | 4 +- ...4772-8fcdb0b13a5576b5ff2b34a21c31cbb9.yaml | 4 +- ...4773-40cf6c93cbbc13dcb57a60ba2f57fb5f.yaml | 4 +- ...4774-9872ae4cefad3c4ed3119e4c32d1b891.yaml | 4 +- ...4775-5ef4900200b4415e3b14a42418354f64.yaml | 4 +- ...7754-7b26661f47c6a54bac357fc46b5b57fd.yaml | 4 +- ...7755-c121370e7ba5758271f409501c03a844.yaml | 4 +- ...7756-9ad568f26d284db1bbd80573c9ce9895.yaml | 4 +- ...7757-cbc652a67aafb71a7a53197a032b3a41.yaml | 4 +- ...7759-6fb60bc9485708489fdd72c16e1fb82c.yaml | 4 +- ...4776-a9a638b4142268e1bac6a40ef293c66b.yaml | 4 +- ...7760-6092ac059aadb6e2fb447935fafb717a.yaml | 4 +- ...7761-0a3a5e7befa978af91189dd0693b7678.yaml | 4 +- ...7762-808772ef0715e55e48845eb09fe27708.yaml | 4 +- ...7763-440ba93423360c612c2bdc92f81276f2.yaml | 4 +- ...7764-2fe97b6a7d11daeda44ed66f389013e0.yaml | 4 +- ...7770-f83868d3a00a9fcf53648bc46fb152f1.yaml | 4 +- ...7772-2e2946ff7ceba7ce385ae21a430029fb.yaml | 4 +- ...7774-b9a10340d1ee615f8f2aaccc216ca7f7.yaml | 4 +- ...7776-0cc0c3f4bf4487c2d84931d62250a698.yaml | 4 +- ...7777-03ab94cbc5738569e6dbfc88111c85a5.yaml | 14 ++--- ...7778-def2f7014de695ca135f23616af5b3ad.yaml | 4 +- ...7780-78a77e4a1a5aa34cbb515f8d429a5d22.yaml | 4 +- ...7781-c88aacc0c258c2583886d5df08f00e4f.yaml | 4 +- ...7784-be4d0822a09dabbfb60c56eb78326475.yaml | 4 +- ...7786-9e79ec7559a564921e41d0c7103ccb78.yaml | 4 +- ...4779-ef952e49d818ad8d9f5105858ddc8b74.yaml | 4 +- ...7793-4ba662d6b707785ba4b6d4f4f14b8096.yaml | 4 +- ...7805-34721fea6a2d4e3ec618e5f696ce767f.yaml | 4 +- ...7807-68962a84ced90a9ac882bf37153f6810.yaml | 4 +- ...7808-7c19600be6bfdb748bd3e60c37bbe32a.yaml | 4 +- ...7809-cdf9a047d5c0c62c170cfb4f220b5807.yaml | 4 +- ...7810-61e6a79f794c5261dca1b1de62bb1bb1.yaml | 4 +- ...7811-881cc93528fb94be5fa214f77b12a3dc.yaml | 4 +- ...7812-414a4199455e61f63d4f1a06e321a38b.yaml | 4 +- ...7813-e9bfeb55edc6f8bed127152a2312d037.yaml | 4 +- ...7814-0d15cc8e701957684f6f3b30c5023ccf.yaml | 4 +- ...7815-1c0f40dcfb4caae9a4327cd7172a7b18.yaml | 4 +- ...7816-3ebd40bb61580d15dfcd12d2fb7e83aa.yaml | 4 +- ...7817-1c709780f30cba2883c1f114a8ebe301.yaml | 4 +- ...7820-00aa1f64cb2e6c80b8a5546f8e6d1be0.yaml | 4 +- ...7821-c754ba54f7d343b7382e51da7c21880e.yaml | 4 +- ...7822-50550f19ed80806cbfb18739f79665ee.yaml | 4 +- ...7823-27f44594eb9e99ef9e1059fc3d01b99d.yaml | 4 +- ...7826-a27c4dd18076acddac4a93fd8d6716aa.yaml | 4 +- ...7827-a83b5885cc29169b3a804ccaa82ed3fd.yaml | 4 +- ...7828-12a5a8360002b901fa077eaf0cb0a07a.yaml | 4 +- ...7829-5e36e98c6255c04628e65e3d6f66d61f.yaml | 4 +- ...4783-7b378f7b5f801637805b2f7c350d9359.yaml | 4 +- ...7830-a6d4da7080e5e33e606a2bdd628cb1b5.yaml | 4 +- ...7831-697b1f32d4ef6920c80a41e74d1c7116.yaml | 4 +- ...7832-aa754ad2c8b3fd090579a6c1c7b9d91c.yaml | 4 +- ...7833-69bd71812f8b19e052624d1ea9f84cfd.yaml | 4 +- ...7834-d813a33aa115d1d1e87017777577752a.yaml | 4 +- ...7835-a088cd6d5872bf40384c1e2afa0283ab.yaml | 4 +- ...7838-c2bf3837de0efe09eb976b0292e9ae9c.yaml | 4 +- ...7839-9daff448e161c27a1010bad80a987a15.yaml | 4 +- ...7840-204d25ca766e5be5a84be69d8f92acaa.yaml | 4 +- ...7842-457555c66db611fbfa678adc71e787e6.yaml | 4 +- ...7843-1319960b548fb4b068018632e6f16db7.yaml | 4 +- ...7846-37948e20cc8aeb00d7f629d9bf7d79ee.yaml | 4 +- ...7847-fd0b6587604276cef3b941ba57f9f4bd.yaml | 4 +- ...7849-9c222eb6bd53905ec6dff84bf0b52c03.yaml | 4 +- ...7850-efd8e3487b0ad4544e466658a022b655.yaml | 4 +- ...7851-c6a7ed723d2b968d4f9df70823302086.yaml | 4 +- ...7852-da040359bca67615913785734db30059.yaml | 4 +- ...7853-6ae7e30bc28b46b135c2064dc2c025e6.yaml | 4 +- ...7854-b5b52d178ac9e73e1f7151b15d18b267.yaml | 4 +- ...7869-026833d334ad1214ad9b4e4b3b4251a9.yaml | 4 +- ...7871-d34228fe0ea5aea58ceb8ad3c32ed940.yaml | 4 +- ...7872-ee5b4c2ac22e2de04acc625e8a8d31f3.yaml | 4 +- ...7873-c4cf1ef74f307e3d974c13ea6edd24eb.yaml | 4 +- ...7874-7bfb8a8c7905e357c4c4b5df9d93b6e7.yaml | 4 +- ...7877-14db06c015099db1b01fba0887a78991.yaml | 4 +- ...4792-87909a557eede328b649d626c4448f38.yaml | 4 +- ...4795-43c13d89c14426ecb661544b7d24f058.yaml | 4 +- ...4796-cba7d92a9ae2afc427a931dcb7ec0c7f.yaml | 4 +- ...4797-6341ec05f42eea92884ac2a29b84c8c0.yaml | 4 +- ...4798-48546947f3dbea6a3d1c0687b8db90bb.yaml | 4 +- ...4799-d255ee9fa48bc6c366622d018f796d6c.yaml | 4 +- ...4800-76c4f32766bf14b6bbf96fbeaaac68ab.yaml | 4 +- ...4805-728966d9c09b57c99055d67de463c279.yaml | 4 +- ...4808-8e3b2acb0664262c6a53a39a282fbea3.yaml | 4 +- ...4810-932d8591d976abf910e4179bc489f078.yaml | 4 +- ...4810-c74224b712fc0c2fb7b3dedfadd9ee64.yaml | 4 +- ...4811-392e3e13340828fa089ab176edcbfb0e.yaml | 4 +- ...4820-e8a960f3022a61734bef50d7f60e4d17.yaml | 4 +- ...4823-9a466e34216ffe71aad25917ff6bfb32.yaml | 4 +- ...4827-3a0b06a228abc56684c0fecc37877b4c.yaml | 4 +- ...8272-20311a33f3f379efbba8f0342b6a65da.yaml | 4 +- ...8273-2c9e7a14e26b36ebcb4ba9bbe208df94.yaml | 4 +- ...8274-7255e5fa9e3ec3cf7fa69588c79329ad.yaml | 4 +- ...8275-61b7e681fc2aebd347be4e6d876bf4f7.yaml | 14 ++--- ...8277-86c50499cb2301a82786d4f168d5a72c.yaml | 4 +- ...8280-f1b98a2e76b778879a86c711e73365c4.yaml | 4 +- ...8287-3832b3b7c5502757f733258a03de8f45.yaml | 4 +- ...8289-a4a103535f33f8f1f9687c4a0228f8b0.yaml | 4 +- ...8300-bf9717887c7854e5283687233b3eaf88.yaml | 4 +- ...8317-5b28a734c59e3ed66297833eac37980a.yaml | 4 +- ...8319-12219750d7664db4408ea75c73fa706d.yaml | 4 +- ...8320-f4526bcdafc950c9e06f1e8880692066.yaml | 4 +- ...8321-779279c30a67e49a16a563a554fb708b.yaml | 4 +- ...8324-de2f88d15a1b5aecd6a16f406646e9a9.yaml | 4 +- ...8327-07b010f0b7d81d013a7b9731f936031d.yaml | 4 +- ...8329-67c3c53f919818b53462cf301e3b0e2a.yaml | 4 +- ...8332-7bbbf63e0874145284bff009623a4860.yaml | 4 +- ...8333-9c19725e7330d8a4aba8b2ac8de32961.yaml | 4 +- ...8336-ecb72206512391b63853fcec98ca443c.yaml | 4 +- ...4838-a54fbae2de8a8e13d0527ba702d34945.yaml | 4 +- ...4839-69657f4112d937c57fc4155d562b7525.yaml | 4 +- ...4840-7b6a78f327e3069338279750b3f26ae1.yaml | 4 +- ...4841-50baee01b43a26ee8e4d58a0c9e6da8f.yaml | 4 +- ...4842-aa4bf5d698c5cb8e5401cc2cfa4e07c6.yaml | 4 +- ...4858-51cc1e2fa9b76200d8c0e1cffbbd6dc5.yaml | 4 +- ...4861-0fbaccf0dcc3983d2d26c8ef7aee1143.yaml | 4 +- ...4862-a9fb42c2dd47680db83577cec894ace4.yaml | 4 +- ...8737-3b9f3653c0029d132688d85fbc757af3.yaml | 4 +- ...8739-23f358a9d40cae78b36e38b231af07ae.yaml | 4 +- ...8740-308ac408c3111d0f21a07a5be08fe876.yaml | 4 +- ...8741-9f74a97e65247db4961da7465a48826a.yaml | 4 +- ...8742-c66ec1dc83585f4762c2bc3e6a57c02b.yaml | 4 +- ...8747-38cbe872337aaa11f53f5f047e11de00.yaml | 4 +- ...8749-80c6230c139aaee435c35c9df894dae1.yaml | 4 +- ...8750-e26003fb15eb8dfdd3862b141bc3094e.yaml | 4 +- ...8751-c5af09461da9c502c3934cc475901e6e.yaml | 4 +- ...8757-f12b5bbfc5d1dcce9a91a5751dceea95.yaml | 4 +- ...8759-7ba0ab8627448e04a3557ed6ccce144f.yaml | 4 +- ...8760-320a6f011d285ddb19c436d57e994504.yaml | 12 ++-- ...8761-fd87adc782adc661fc2721ea4df8055a.yaml | 14 ++--- ...8762-dfd0d896b1397455913caf7f911dd62c.yaml | 12 ++-- ...8764-ca496e63542b74a88b0b8dd7fd0ebb0c.yaml | 4 +- ...8765-b24c287a46f17f82649a53242631be85.yaml | 4 +- ...8766-20391a519d77c31bd1c976dfdc89ed20.yaml | 4 +- ...8770-7c5c2b955a800f0567ad6425eb1a8e69.yaml | 4 +- ...8774-99da104892c6f75f32c9288294b2b02d.yaml | 4 +- ...8776-85fcd9779448a368c2c74d702cd2f30d.yaml | 4 +- ...8777-bdfd3cb15fc22fa823679d0ba1d3fc73.yaml | 4 +- ...8779-de737cfbceda5a83bf3527f7e7cd5395.yaml | 4 +- ...8780-525630ec5598f74dd721d94a531fba2f.yaml | 4 +- ...4887-51944a4f6212afc8f585f1bcea51f2d6.yaml | 4 +- ...4888-0fc896a4acc44efa8900b336ff580b9b.yaml | 4 +- ...4889-f19f31f075dbc06538f36ae8e36c55d3.yaml | 4 +- ...4890-c27c21f00fd5cfc7fcc406cc847e2987.yaml | 4 +- ...4893-b80148cb4f7c1ba75ee55b0181d810f7.yaml | 4 +- ...9149-d34575a4acf043c178e1c507a8583e51.yaml | 4 +- ...9150-56a618b5c71170cabc6b19e08404193b.yaml | 4 +- ...9151-fc53f712d57ef35888a981283b03a790.yaml | 4 +- ...9152-1adc9982ddc5e20d6e411f5dbc1caf02.yaml | 4 +- ...9154-82603c2847e2ca1ee15bc23d829fbc4a.yaml | 4 +- ...9156-e6ae143c6a0d21493b73e68beda81a51.yaml | 4 +- ...9157-308319ee878eb47d99190ad100843184.yaml | 4 +- ...9158-c2e6ea5d855361966f47fc5dcb8b0259.yaml | 4 +- ...4916-ec75720f681f6e8a0dfa73dc2af48726.yaml | 4 +- ...9160-69291e6d8dee217b57f3dde758dcad0f.yaml | 4 +- ...9161-ce76e5efada5037a3e4a2325d3d70d7f.yaml | 4 +- ...9165-0f5e9e59b2ad6fbf734b7cc14c76890d.yaml | 4 +- ...9166-a37d3498c6bbcc050576781692b33c90.yaml | 4 +- ...9167-95d14048da02f26059f2e07a39b028ec.yaml | 4 +- ...9168-b9ebb0412655a1be395c1fd4d44393e3.yaml | 4 +- ...9169-b6c1a6adb8481fecb3d92549d2f5a5bd.yaml | 4 +- ...4917-ec4b1b9fc14ecc8856f3a0b0d90e5205.yaml | 4 +- ...9173-22fe25cfef73eeb94b97da8f9108cc4a.yaml | 4 +- ...9174-12fb9fdf8190804b70dbaba2fb2c9085.yaml | 4 +- ...9175-44b3ba415f16865ebb1bd98068348f19.yaml | 4 +- ...9177-c6789a8c4ddf7f4894074b67cbbeecc0.yaml | 4 +- ...9178-a27af52ed355aaf16d2ba0f06827a926.yaml | 4 +- ...9179-7d0df8a0008135defe46e0244de6dafd.yaml | 4 +- ...9180-0a33d637c29ba75c2b509bcefbd3461e.yaml | 4 +- ...9181-0d45a6acc266b9099e698fb6465812c3.yaml | 4 +- ...9182-802be145d30a4aee303b74232b95831e.yaml | 4 +- ...9184-39f54e5675da547fbcee34c5030b35da.yaml | 4 +- ...9188-5fc14f2bf72ff01c08c1f94583d480b0.yaml | 4 +- ...9189-28f21eddf2463cba2cb6b77e1419e5f9.yaml | 4 +- ...4919-c1259d5d6340f1a9bb2b4b54cbfddf23.yaml | 4 +- ...9190-f94ad2e40424de33128764065d19c984.yaml | 4 +- ...9191-d52f1aa2c59f42390d8192c949633ea4.yaml | 4 +- ...9192-a9a1d45bfcbca6c173ea125c110bda5d.yaml | 4 +- ...9193-614c612f12b893f0f92f502ce23d7035.yaml | 4 +- ...9195-a5430dc528533c2edeaccbfbb9028a8f.yaml | 4 +- ...4924-c7c8e86fe8e5b4d368e1042cf3070ec8.yaml | 4 +- ...4925-03e1e5461591c1057ed60beb9b3bae79.yaml | 4 +- ...4938-1a98182627ada5df6f3381c144225d78.yaml | 4 +- ...4941-b5f79719a2f0199ef2281b12f3375388.yaml | 4 +- ...4943-df6b45b19424e9077c2131a407f92c61.yaml | 4 +- ...4944-24dc0fb35229c989c41ed2754572ea29.yaml | 4 +- ...4945-885fb17b6662f56f045b926c01f35175.yaml | 4 +- ...4947-327db16d1bb219d0ce7124ea14eed0f3.yaml | 4 +- ...4948-47a69422b8abe1dcc847b3db9997fa97.yaml | 4 +- ...4950-706745fef06bc5b6b3083d2b8e19d2e9.yaml | 4 +- ...4960-09629550fe11748b689836fcea30749f.yaml | 4 +- ...4961-fa365da8fb7be5a7c14e80d68226de79.yaml | 4 +- ...4962-73b8394a2820dad4a75a3855507d242d.yaml | 4 +- ...4963-4ece1b2368b1b6541fd5808b6263c140.yaml | 4 +- ...4968-7251846dd87f32952c517012f5416bb3.yaml | 4 +- ...4970-04f39942fc16c2a7c2f6145e385c8d07.yaml | 4 +- ...4971-5614f511e973e614fd375402d8486642.yaml | 4 +- ...9742-d0405f3a6546530ea0089cf284177266.yaml | 4 +- ...9743-669f088fb31a1c784e368a7e51016243.yaml | 4 +- ...9745-1777236d571c6ec2a8def6ba8c1b858a.yaml | 4 +- ...9746-e22a3c007f773a45322f383ac43c3a2c.yaml | 4 +- ...9747-bcd6b988167c1612bb5048004783e4f5.yaml | 4 +- ...9754-d1e689eb00e15a822c5a4bc69f8d4926.yaml | 4 +- ...9755-1c97daee437b7051f2d3a3601380f79a.yaml | 4 +- ...9756-0b82fadb36c481a1a5ef36694d259943.yaml | 4 +- ...9757-44e9c5f94ff15d80337fbc26acc2f9ad.yaml | 4 +- ...9758-bba48b2b3db8c722b3183d512e2cbe2e.yaml | 4 +- ...9764-662b0d4e06b53c4127af628452071119.yaml | 4 +- ...9767-a18213c9c980e2ab86f946c3cc789f65.yaml | 4 +- ...9768-40b17fbc397976bb918c3ad479c78a68.yaml | 4 +- ...9770-a70d444a7f2c0c5012e01420603941d1.yaml | 4 +- ...9777-61ed528306912302d784398edae3cbb2.yaml | 4 +- ...9813-6e313c2d32fa44151bb5398004b93815.yaml | 4 +- ...9814-5e582ef605e9fe0c0d1cac86ea21ae85.yaml | 4 +- ...9817-40dad92f1e274f70a2212adefbc68e38.yaml | 4 +- ...9818-d242d8704b7ccc1eaddd7fe775c62763.yaml | 4 +- ...9819-bb8100b665f7be766e2f2566af0a9770.yaml | 4 +- ...9820-b240c0fd3b8e35e0e7b7374ee39360eb.yaml | 4 +- ...9823-48cb8d5c20069dd21ff6f85ee4f57b84.yaml | 4 +- ...9825-f1943d1009d5a9a5f1799b0883b7d043.yaml | 4 +- ...9828-8f2275f20711e7ff52e234ab96188172.yaml | 4 +- ...9829-cb03fd3d39a18ba5fc9dfbdcafc632b1.yaml | 4 +- ...9830-349353b08ad0d6204581635fb97a9527.yaml | 4 +- ...9831-bb05c43d4858d2cd6e99aeda4ad6534f.yaml | 4 +- ...9832-27b5597908113501f4beb8489633cce4.yaml | 4 +- ...9833-e57055214b95f532f53777eeb789b4ce.yaml | 4 +- ...9835-757377e3d1b7b4a16326ff93c76bfa77.yaml | 4 +- ...9836-5f63dbab28102f21dce668e1dd09a569.yaml | 4 +- ...9837-b2367564b8e810af49ec2f68b7f40f1d.yaml | 4 +- ...9838-0ed3cd48ec0b8d5d59c0c2a69ba7db3d.yaml | 12 ++-- ...9839-0e249eccad21574e2f41d6b727c12756.yaml | 12 ++-- ...9841-d9b7d332948d93ec19ade23944fe8ee3.yaml | 4 +- ...9842-28d27bb70102b6a3ff9c97ba43afec20.yaml | 4 +- ...9845-05abcb4b1243c795ddc0ecd996fc16e3.yaml | 4 +- ...9846-2ba7e464285026388de6685dba844dbc.yaml | 4 +- ...9847-c19853d6227a07842c1d1043daa343e2.yaml | 4 +- ...9848-b53f2739c791cac0974587f72b226309.yaml | 4 +- ...9849-30441a12301c990d7aaae2342a03a490.yaml | 4 +- ...9850-1697fb18453f32ca7e1c0790f12f9bda.yaml | 4 +- ...9851-e4179682cad3bde3b1674a51f6f83b60.yaml | 4 +- ...9852-62cee29d32c85b3a5dc1219c65c05aa1.yaml | 4 +- ...9856-9c331f426cf6396a6a2c802b7f7eeb8d.yaml | 4 +- ...9858-325931d9fc1c27761908e3875605b580.yaml | 4 +- ...9859-fe796847eb830527572fd03364591cba.yaml | 4 +- ...9860-4c439a45b0012520f242bad12e03107a.yaml | 4 +- ...9861-fb9c081792eb804457cb99e8fe8f106d.yaml | 4 +- ...4994-ab57e6fe4cbafa10ab5f9c2c276102ac.yaml | 4 +- ...4995-6520a4a851336aa904cc04b7b33623a5.yaml | 4 +- ...4999-c7a804f58a12769a69ea7efb7fd135b4.yaml | 4 +- ...5001-797d8c237b397ae53a63dd9186307bf3.yaml | 4 +- ...5005-4113301795a9f6abc828e53db152bc61.yaml | 4 +- ...0368-700e36ec39fe3e8c88c494279e29f4d3.yaml | 4 +- ...0369-046fbaec2a225aa81dc9d68e003387fa.yaml | 4 +- ...0370-43cb177771740873ed7f858ac79c4db6.yaml | 4 +- ...0371-51ed12a9f2c55cf6d27dee66a25ab3d5.yaml | 4 +- ...0373-d805d4a834d45dbc023ff957c63ddbf7.yaml | 4 +- ...0374-4532b4dbcf2e547347daa5207db523f5.yaml | 4 +- ...0375-1cc23bdae3a780fc80463f59518007e6.yaml | 4 +- ...0377-2583c8c1dd1479446cbf085c6134c883.yaml | 4 +- ...5041-61b51e0560f095cce3544140b3170777.yaml | 4 +- ...5048-eff7610d5a81227a5c58edb7e81bb7b8.yaml | 4 +- ...5049-1a4de07092fc301c92fce8ed74ad446d.yaml | 4 +- ...5050-5c2752426bec20e3d652e4f604fa0685.yaml | 4 +- ...5051-1c049cc07d2d3d3aff9e887e6aede6d7.yaml | 4 +- ...5057-e408b7193fb2b136537798455a49df5e.yaml | 4 +- ...5062-c499c5763cb0c8fadcbd79a7862db8b4.yaml | 4 +- ...5063-d5afc9936d3ec0ef2f1ebf204d2b6f90.yaml | 4 +- ...5071-1db1c2d5f1fad40eb6b6cd9715e502a3.yaml | 4 +- ...5073-0e32b41ab13a7d99daea1bd1091ef1a3.yaml | 4 +- ...5076-a3ba5f2761ca9302a85775ee3b727b37.yaml | 4 +- ...5082-8c87a28bec934dcd5364cbdca924c771.yaml | 4 +- ...0822-07141f22dbd69d711616f0823783fd10.yaml | 4 +- ...0823-72b05538a975fe47e341442f2bdeeabf.yaml | 4 +- ...0824-a841f648b0bdbeeaa745d6da10e2cfec.yaml | 4 +- ...0825-ff7d4698a1b99dc4dd381f78e045f0a7.yaml | 4 +- ...0826-34dac14ec559cdbb5998de7d415317dc.yaml | 4 +- ...0827-35886a1535b89d1815cbc273329902f1.yaml | 4 +- ...0828-74982fb1ee6ee7e80b9e6c7f6db4f09f.yaml | 4 +- ...0829-c0866523c68fe7ee32f439546ea1ce87.yaml | 4 +- ...0830-54eacca3ec158df026692c600567e01e.yaml | 4 +- ...0831-f3d1f4048a78d100d7199aa687dd970a.yaml | 4 +- ...0832-26e086c596fe6398b20ed3be8129cc9d.yaml | 4 +- ...0833-aaee16898f3cb4f4d7a9fcaef31839c3.yaml | 4 +- ...0834-a56026625ece44a82e5e6eba005e9ec0.yaml | 4 +- ...0836-418ebe6c7dbfef34adbdede493bce943.yaml | 4 +- ...0837-e2d3306782ffc6dc1c4428ce58ed053c.yaml | 4 +- ...0838-65a7e9e5db9a5af53a8c05db52ac919a.yaml | 4 +- ...0840-701997e59be83cd9ba4ad233278f4aaf.yaml | 4 +- ...0841-31c57dd6605d62ca0d6cd98ec04a3787.yaml | 4 +- ...0842-4e3d792205a2fddf6adf72e5213cb0d5.yaml | 4 +- ...0843-030658ba5cc0f002fdffef84e42ae14b.yaml | 4 +- ...0844-2f15c2e1797d3dce53478e732579afa9.yaml | 4 +- ...0845-7539302587926b426117aef883b56a59.yaml | 4 +- ...0846-d2f77ed0cac474a6437fa2cee0cecb6e.yaml | 4 +- ...0847-2ddf644540fef01e3b57f8fb75bbef89.yaml | 4 +- ...0848-e8f10c1130d647962cf4e7ae1be8e563.yaml | 4 +- ...0849-aa33e37a5a268fafeb4ae3c73aa43c7a.yaml | 4 +- ...5085-95d0775d6527d5eae5d7126ad333b363.yaml | 4 +- ...0850-5d14f17d0a9567bc2e5e172cd96c2e2f.yaml | 4 +- ...0851-fb1f94792250765f89467bf81e536614.yaml | 4 +- ...0852-3617ec07999a872e306f9b352b63ebdd.yaml | 4 +- ...0853-796ca63acc83e02954fe943ab729646a.yaml | 4 +- ...0854-24ebe2280a642d19c25498acc13aa5f7.yaml | 4 +- ...0855-c47827133b1c48070f46a59d37c27728.yaml | 4 +- ...0856-156cbee34f493f34443d5f3b942f355c.yaml | 4 +- ...0857-2d0f997ee92e7b6c06625a4a937305f5.yaml | 4 +- ...0859-1ed0f12e4f8286a9294dfd9901458db7.yaml | 4 +- ...5086-54ab7472cf90fa30b87c2b5f7b48020b.yaml | 4 +- ...0860-1dec4b557f1e0bf62d3ecb5bf357937d.yaml | 4 +- ...5087-f28d0839e906933601f8e3530cfcec02.yaml | 4 +- ...0874-ed883dae9c66c1836affaf918e96286d.yaml | 4 +- ...0875-6892cd1d0b697581c7511a564b22d2f3.yaml | 4 +- ...0876-8085a553b4ae6877292f03c349db3efa.yaml | 4 +- ...0877-44c408e8dae2b7e08323b9972af77572.yaml | 4 +- ...0879-405731b58f15425302771df60a27b5be.yaml | 4 +- ...0880-376f3b7be651ac6251ca8825ec683915.yaml | 4 +- ...0881-304412fedec296474e9a664baa039b40.yaml | 4 +- ...0884-393e2e191f65056b760ec314dc828cfa.yaml | 4 +- ...0885-589dfcdba354fa240bd819df50a6a8aa.yaml | 4 +- ...0886-873e76363814bb4471e426a80a606dee.yaml | 4 +- ...0887-bdeaf570096cf99a20e12f37d41beaeb.yaml | 4 +- ...0889-4a6425bd134427fc325c845997202a57.yaml | 4 +- ...0891-f34776806e968812940c4c4d5f82b503.yaml | 4 +- ...0896-22ec989ac05e231b0a72ec153f660e8e.yaml | 4 +- ...0897-6e4ac4275a14e860f6690b3cd168f08e.yaml | 4 +- ...0898-da89f8a86000f654eccfee96ffe3f6a3.yaml | 4 +- ...0899-b8512840012a562de1323a1815a4b21e.yaml | 4 +- ...0903-dc74f0149670643ede0c882a9a3fc584.yaml | 4 +- ...0904-79decf1a0edb8491c84a287af6c9aee1.yaml | 4 +- ...0905-896c32b149ebcd3122663a40d0461f18.yaml | 4 +- ...5096-ec9f1feec044e5447ec3ac663c7a05af.yaml | 4 +- ...5098-c8dbdfc73ab33e8afe0f3263d7ef0673.yaml | 4 +- ...5099-dd02ae8823de431da5d5d52246acd7ff.yaml | 4 +- ...5105-f4c2701ff75483ce690141623ec5eff4.yaml | 4 +- ...5108-2b77677bf3f1770d1f2637876cb7abee.yaml | 4 +- ...5109-d9f0423766ca387f95476b5cd1e1b1e4.yaml | 4 +- ...5110-127715120e5f598c6f6d3ae7380f9898.yaml | 4 +- ...5114-6f26e9f01d61af85a0a5abec46c6e923.yaml | 4 +- ...5116-1a055ae19ed953176d3ae4b152c78d6b.yaml | 4 +- ...5119-292cb08d9cd5bb1cf7550652732f7a0a.yaml | 4 +- ...5120-549345c10b291ab93f71309abaa38002.yaml | 4 +- ...5121-66174d632ca5e11403564d89ab52d0f1.yaml | 4 +- ...5124-6c1bbce4c7a429a52d508c4dfbc689a9.yaml | 4 +- ...5125-2abba35343647b8a829e092f6dec80ee.yaml | 4 +- ...5126-da29ae9abf29175dd27fb6efb7642506.yaml | 4 +- ...5127-cedcad8fb42c104219ce15d5179e2ec0.yaml | 4 +- ...5128-91e768f9e801d14e24ca5019cd490f0a.yaml | 4 +- ...5134-d3595d30820755045dbe80d57c0f600c.yaml | 4 +- ...5135-0591772600d7345412c5914adc415e3f.yaml | 4 +- ...1356-12b01b43b57b8f272157206cf06dc3ef.yaml | 4 +- ...1357-9549871153d587a10461e3eb973b5757.yaml | 4 +- ...1361-081b4b5984322d0654bd5e7e3e37d073.yaml | 4 +- ...1362-b8cf7f35198731bb7bfb27771c37478a.yaml | 4 +- ...5137-01f45554766c9d4c4656369fac530065.yaml | 4 +- ...1370-b8a0ef29774cb506ae49e9736f363d94.yaml | 4 +- ...1371-5ca89842f69cd4e87dbd74d08645e3d9.yaml | 4 +- ...1372-cc04fc647a83c5a0bf41904a11665f19.yaml | 4 +- ...1374-3b122e7dd636f2979e4419665efeeeb4.yaml | 4 +- ...1376-c6a13766dfee309169a154d6bf63adc3.yaml | 4 +- ...1396-9ac7de23b3d67dbdcd278f6e1494759d.yaml | 4 +- ...1397-07a16aaf94526ab4a5492ec25d7bc965.yaml | 4 +- ...1398-1c74e3df9173084b9bb7ea805c234e58.yaml | 4 +- ...1399-9a6e06a6f52e0f7856e09ef8ac51eff2.yaml | 4 +- ...1401-8495527ac09a59599c4f06adeea443c8.yaml | 4 +- ...1403-bb149be73e11ebe0c3b568543b54c91e.yaml | 4 +- ...1404-b91180f6c8ba3f8d6ff100d044a9837c.yaml | 4 +- ...1410-31c57eb5baf7bb0acd957fca651b5df2.yaml | 4 +- ...1413-7ac0863d03c3cdd406341dca9d25711a.yaml | 4 +- ...1414-514cd5f6862b902abdfe45e0c2ceab5f.yaml | 4 +- ...1415-57ba3dbc250a048ad4a278836ea777a0.yaml | 4 +- ...1417-f64345cda7b5204d1b37828da4e7e5ea.yaml | 4 +- ...1418-cbde558e3503539352816240255a9c09.yaml | 4 +- ...1421-61bd18cfe47ff36978c91845f9ffc1e4.yaml | 4 +- ...1422-5178d59b66e68e951d4f7950c9fe1897.yaml | 4 +- ...1424-248f6a7272fbf1cbf24050ac1a199f58.yaml | 4 +- ...1470-219b72efe5cc6f0e217f743d6fbc88d5.yaml | 4 +- ...1471-1e6a2a2317e6c0646d9912b475c2283c.yaml | 4 +- ...1474-4be3fece7979d31adacbce90e5c628f3.yaml | 4 +- ...1477-ab3814e3ae070036041f3fc37ac29f36.yaml | 4 +- ...1479-26189f152df8893b52731b2bdd16e94e.yaml | 4 +- ...1480-6a4904a703851349707d8d3d078c2123.yaml | 4 +- ...1482-f1ab4812b24f2e95426a9a9673c2032b.yaml | 4 +- ...1485-e6cf650c13f11df4cb2b334fe314415e.yaml | 4 +- ...1492-a5beaca14051398b5a8cac72b33e8606.yaml | 4 +- ...1493-90dc0d96ef7711389c28489eadab8c4d.yaml | 4 +- ...1494-e78a0243a637937a0520333d07ecbb4e.yaml | 4 +- ...1495-17db65035566800d21b599e4302d577c.yaml | 4 +- ...1496-90191aff4f4fd94ead6048a6f9309bb7.yaml | 4 +- ...1497-2fa400cde48ebbb1e062c53ea041ad86.yaml | 4 +- ...1498-df5510828b9908f177a3676bf0d29efa.yaml | 4 +- ...1499-40b2ce035ef569465fd6e4b21f17410c.yaml | 4 +- ...1500-9ed7e89f3675608a54d511e5410f33f1.yaml | 4 +- ...1504-1c6832c32d7ec7d1a800137a443af3a0.yaml | 4 +- ...1506-d88f90595d62f553e29356fc831883af.yaml | 4 +- ...1507-be8ed34a1e61e6308ab867606f425e64.yaml | 4 +- ...1511-a64fce4b936462ae9966af0a7b1ddcf3.yaml | 4 +- ...1513-51cc9e8778ef47abd167df4053287906.yaml | 4 +- ...1514-de7d8d5a0d1dee1ddf8eeecb2547d31f.yaml | 4 +- ...1516-3fa1d19f6ab4b3b413035e0d19283cea.yaml | 4 +- ...1517-13cb55c1f508982488cee2289cc6f8a4.yaml | 4 +- ...1519-6360ed6ca296565a491121426d09e439.yaml | 4 +- ...1520-a720a32e95724b99f716e58fddc9c585.yaml | 4 +- ...1523-7afdbaf504234dadcc9587b5a57a9cbb.yaml | 4 +- ...1524-20aadb46b84139edf712ada2a54996af.yaml | 4 +- ...1526-7d02fb68117844792850ad968e93d6a6.yaml | 4 +- ...1527-e9e7f1f63804b5a7bd339f4d7bcd16e9.yaml | 4 +- ...1532-88a06d86ce607df4ff6b1b9039ea93cb.yaml | 4 +- ...1534-997d1000e8574991f2c13cb7aa2ef7b7.yaml | 4 +- ...1536-f99e157b145b06140fa576ea488dbce3.yaml | 4 +- ...1537-b6e9ca61c7913b93778f0505c3d8b45b.yaml | 4 +- ...1541-389e4423679f1c467a852761b85f3cfd.yaml | 4 +- ...1545-27d8b6ae177490f4dc5980ca233d4dfe.yaml | 4 +- ...1546-b658c34d6189136c251e0b8d8e225774.yaml | 4 +- ...1547-239bba6a118f3c2dcf8340e2790b882b.yaml | 4 +- ...1548-5644317bfa18cf11b8235cb40790b4ed.yaml | 4 +- ...5161-cc4b9c34f1deaedc9df4457eb9089929.yaml | 4 +- ...5162-0aceb58e1789a00f8987ade1ad5f4576.yaml | 4 +- ...5163-f48e8a5fbf1e696f1cc387a7e678c77c.yaml | 4 +- ...5164-a2e597896da84d8e5ead12576f9d50bb.yaml | 4 +- ...1666-a1b975d388fb5bea73a488037353b7d6.yaml | 4 +- ...1669-e4183cf6c320dd4a4188939a38d36eca.yaml | 4 +- ...1670-211b4e2e29da3a6c7a3f6f46fc11c764.yaml | 4 +- ...1671-a3e402dfd0b7363889b8931013656dea.yaml | 4 +- ...1673-1162e5c3375a29dda16c38290874b6a7.yaml | 4 +- ...1674-3b7a2e7b6f89f58e23d11ffebc1efd41.yaml | 4 +- ...1675-1cbbbacebab6eafbabdd1ea3e6ed8c33.yaml | 4 +- ...1677-157cdd8bc992e58c6e6f6337bc97b4c2.yaml | 4 +- ...1678-5e9722517850435a4c6751ba68e3f182.yaml | 4 +- ...1679-9cbc81546b21a100994e807b3ec7d261.yaml | 4 +- ...1680-24df3873e0b9065e19944f2b69074a09.yaml | 4 +- ...1682-be854f0427cbc7550be4b51c5093b09f.yaml | 4 +- ...1684-a21c37325364d975a3c7e649a4cca551.yaml | 4 +- ...1685-a6734b6686a1620a7fb5250d66545fe3.yaml | 4 +- ...1689-b2f775a90d3415bc2313e385ff781703.yaml | 4 +- ...1691-bb1322086ee5fb78a847811248987555.yaml | 4 +- ...1692-704e8a4e646ad70dffa4b5a4a231b7e5.yaml | 4 +- ...1693-2317e44c2f1aa246df478fdf378e128f.yaml | 4 +- ...1695-f3431b49cff580f3171934059274a2a5.yaml | 4 +- ...5177-902c45e06d6e22c072a9fbbf19901e92.yaml | 4 +- ...5181-9f99c3916170112c6519a28e2f1378e6.yaml | 4 +- ...5199-ae8fa6f84b5149157cb1430a27dde4d8.yaml | 4 +- ...5200-d7435fb5e236cc613a20b63eff30b011.yaml | 4 +- ...5201-a514048fb251bf33fbe7f38a2147dc40.yaml | 4 +- ...5205-e958f1600aa0e32635d67ccd172b77c5.yaml | 4 +- ...5209-9fa7c4fbd0089213898129a94fb855e3.yaml | 4 +- ...2117-639feb49244de37ebd2501828b79541b.yaml | 4 +- ...2118-af96d1868fb4ef94535942e6a7a96e89.yaml | 4 +- ...5212-5d770457008ba85c2ccd6a7b3ee7247f.yaml | 4 +- ...2124-e835818e3176559c0f65d870084d0fe9.yaml | 4 +- ...2125-f282e15c376140f7b66d206f8f96f3e6.yaml | 4 +- ...2131-02e1028b272d28de63335e7341b29e10.yaml | 4 +- ...2132-bc021f50f994b63de0e089ca7983044c.yaml | 4 +- ...2133-9cd32e924e90d865dad41a30260e1347.yaml | 4 +- ...2134-9764fa1268021fb445ed7c1cafd9a12b.yaml | 4 +- ...2135-b4ff9a96de0f409f95e972962d7a3e6d.yaml | 4 +- ...2142-803648dc94dbeaf482d25b8433d5ee7f.yaml | 4 +- ...2175-2e0473e7d7a7731e63b2d6908a232799.yaml | 4 +- ...2177-cf6efc26f721b1dd6c09ef244ad0a9a5.yaml | 4 +- ...2178-78aa7f4c0fd135cd902e3c93c245e07f.yaml | 4 +- ...2180-dafddc9bea1e241db1766d412621b738.yaml | 4 +- ...2182-6f4ecb36b96c9dd745bf20e36b1a7043.yaml | 4 +- ...2186-85987e7f67f649cd4fc002f1b0337124.yaml | 4 +- ...2189-9f41ca20cf9aa5ad6ef84f69ddb6f680.yaml | 4 +- ...2191-b0923245191ee8b19827587a90615915.yaml | 4 +- ...2192-3c962311490d35eba5d44b2a55482b65.yaml | 4 +- ...2193-99586092e2e0a8d37b070fc12b9ea29f.yaml | 4 +- ...2194-d5fb85be1bce7f68e1b15520cd177f7a.yaml | 4 +- ...2195-f4bf91007a25d09c25ce2d7dd70ab2fa.yaml | 4 +- ...2197-d53d7fc7db0d940484e982ea2d1a452b.yaml | 4 +- ...2198-9e0ed51792e9270a576ac0d1dc550b71.yaml | 4 +- ...2199-ec1e17ee6b9dff2a9b24906383f33988.yaml | 4 +- ...2201-bc684639838d61cf579a672d96063b79.yaml | 4 +- ...2202-bd39f2dcd48837d67c4b40b69f78df98.yaml | 4 +- ...2203-746dbfeca03bdbf3d2fc4d83e4a0ed40.yaml | 4 +- ...2204-2c6114a75a15d3b058a7dc1004291c25.yaml | 4 +- ...2205-c00b8bf14565edfcbae67925492b03f1.yaml | 4 +- ...2206-130eab166dc7b7692723d0cf797df7b0.yaml | 4 +- ...2207-0df580dacb0df6a2ca5f274d2d7147c5.yaml | 4 +- ...2210-84ccfe3dbfa257fc01b0e4c65174ef35.yaml | 4 +- ...2211-ab18ce3ab5c885047a8f794ed3023e87.yaml | 4 +- ...2214-0a3c0452d5847fbc8bf97c2978948097.yaml | 4 +- ...2217-8f3437550e10d6083b697e38767da0b0.yaml | 4 +- ...2219-3ddf708feedcea3e47167b185d508195.yaml | 4 +- ...2220-6589f8f5c2b9c61e1e02d46bf871ed81.yaml | 4 +- ...2224-b6ad60014841f75188893319dd4470b9.yaml | 4 +- ...2227-88cd9d196e2b824c736badcdf2c60486.yaml | 4 +- ...2228-843511a1c7a253d8815f1011e5416ca7.yaml | 4 +- ...2229-ca80be8d82d9f4b7b474971b5f658d56.yaml | 4 +- ...2230-672dfc933502a4edaa8116764ba522b6.yaml | 4 +- ...2231-1fe649382158471b98650df856d70fee.yaml | 4 +- ...2232-0927d29209569b3fa6ca414e42a83816.yaml | 4 +- ...2234-2b5138240155c353b3e1835e93054ec3.yaml | 4 +- ...5228-5a06b4b0b81af48987e3d90166388572.yaml | 4 +- ...5229-4c337287b3ea29b58d22de863f5e59bf.yaml | 4 +- ...5230-4951c2f84359ebbaf9ae45fa01138a5f.yaml | 4 +- ...5231-423344ebaf15b72d32ea50cd38a95167.yaml | 4 +- ...5232-a57182d433f774a0b7467b555b805817.yaml | 4 +- ...5233-238d49dd6e9480e47ebe9505e3055120.yaml | 4 +- ...5234-f9f7aa614950622531a31e76990cf4c8.yaml | 4 +- ...5235-7f87928645d2c31cf00fa75d4b3905c3.yaml | 4 +- ...5237-e0d43cef694a102644215555aaaf71de.yaml | 4 +- ...5241-d3213062fc9b1a2c7b785c61361d34fc.yaml | 4 +- ...5243-16cbd69900a20c2a15cc998b66c6e30e.yaml | 4 +- ...5250-12eb7534db6d3a6b596836d9096b1dfc.yaml | 4 +- ...5251-a7efe3d7340eefdf74e75d3be0901882.yaml | 4 +- ...5252-64d859df68bf3f0a0838ef413ae7d21e.yaml | 4 +- ...5291-0fe998643673fbc89bdce1d6f1c4acbf.yaml | 4 +- ...5292-dea0414e4a9baf8defc1d9528b3ab197.yaml | 4 +- ...5295-ec95efd2e63d9d89b0c3d769bde2a40b.yaml | 4 +- ...5307-9580adf700b409fcf11b1b8ce6a8f986.yaml | 4 +- ...5308-a5c381dc4cbdb7060fc30ca87a13ef99.yaml | 4 +- ...5314-04bca0e78f8b136ea82b1c4e9e1fafd4.yaml | 4 +- ...5315-8f06cbf2f40450a7e41adaa2e12c5c0e.yaml | 4 +- ...5334-2196f2a72b0d78d150ae68d55da0fd92.yaml | 4 +- ...5335-469ce07115e491efc4cb1c8371dce59b.yaml | 4 +- ...5336-93a89e746de1b01ce58a8098e6937879.yaml | 4 +- ...5337-76bb7b1a62378179c2a3a748f3a4ef7c.yaml | 4 +- ...5338-7ba8529af3436a78498f1c21893b7e85.yaml | 4 +- ...5343-c01322d993d29040f70fca990f38339c.yaml | 4 +- ...5352-89ce07ac930dc51991979cb98280bbb8.yaml | 4 +- ...5355-d27639e06760fb0c9830c5a72e87ab5f.yaml | 4 +- ...5357-b915266e3686714da03f11dc90c6893b.yaml | 4 +- ...5362-65a9626411491f24b8c3f89e82e2b81b.yaml | 4 +- ...5381-b1bb95f8c4ff39f12ce42050633fe6ba.yaml | 4 +- ...5385-e1ad7ec25f4d848d78b5d1ca911d7ff1.yaml | 4 +- ...5386-8cbb632e23e9fd1207c7a31fa3fa33cd.yaml | 4 +- ...5387-1389f4413b4c34ddc59ef4e67e6f0a3f.yaml | 4 +- ...5411-1d54b8b23176b36e6deb663d5a8ceaf5.yaml | 4 +- ...5412-09c9edd801d535f8b0dc361310e2bb14.yaml | 4 +- ...5413-21bae7dd0ccc10547daf0010edb807de.yaml | 4 +- ...5414-fedbaf9b75c3966253ac9d4ff4472b7e.yaml | 4 +- ...5415-21adcc5933f66f0dc2a717df7e950d3b.yaml | 4 +- ...5416-a0259835bb015f0f8ae0efa060f9f185.yaml | 4 +- ...5417-e27d960770a662cb31ee7005dde8fb3c.yaml | 4 +- ...5419-7e168d2cbd20b0d5ec60c962781efa94.yaml | 4 +- ...5425-91dbc533a6be524b4d3d9619ad71cbbc.yaml | 4 +- ...5428-f917f02f001372c0ed6a2cbacd402eae.yaml | 4 +- ...5429-2e8c881d695b74f611068f96c80b3487.yaml | 4 +- ...5430-ec203a9e69230c2878eb1812f2101d77.yaml | 4 +- ...5431-74c124627aef7bceecd485cb551c158e.yaml | 4 +- ...5432-179abbcb3a9b789dc00b8e0d8f532b6a.yaml | 4 +- ...5433-5b0c7f3f3f3d8554824f38539044b215.yaml | 4 +- ...5434-d47a1b6b1cff7517a2e9c1cfb877c153.yaml | 4 +- ...5435-7138d2ba8421f62a9d8f037aab75e745.yaml | 4 +- ...5436-67a5e177b639db224cce52014e47431a.yaml | 4 +- ...5437-eac77b73e6b9904c178e050ff0c75895.yaml | 4 +- ...5438-b5617dec0fcbbbc761aa88231d94be83.yaml | 4 +- ...5439-6068fa535a8253f59a90a4115ac59459.yaml | 4 +- ...5448-7ae915288e9c3c74b018a1157e470354.yaml | 4 +- ...5458-4e81e30f96ac2459f5d1b33071468659.yaml | 4 +- ...5464-08b8cede6b6ee0e0f3a91f475dfd1447.yaml | 4 +- ...5465-bee21ffa7faff706d4db361bca23b6c3.yaml | 4 +- ...5466-aaaf4480d575f84ecd3c01a63e4a0287.yaml | 4 +- ...5467-fcc1cf4316d93103b20ebe799631fe04.yaml | 4 +- ...5468-5e71c24603564ca342c0b82fb64d9b20.yaml | 4 +- ...5469-7907c4688f5f43998579c328082a69f9.yaml | 4 +- ...5470-12af00d20d6054e6e52d985c87c55f02.yaml | 4 +- ...5504-2bca208b2748ce062cd1cca09cfae994.yaml | 4 +- ...5506-6bb3656a861d0a80040f9af45e87952f.yaml | 4 +- ...5507-a73f55993da6bf41bdb201284b107f4f.yaml | 4 +- ...5509-b9ee2994c48a1ce98dffc9faf5d855b8.yaml | 4 +- ...5525-83eca41cb757159390f58937921ee2df.yaml | 4 +- ...5530-7e83efd5775fb18032b0a614d3a4dbf4.yaml | 4 +- ...5533-196434d911f0f2030523284b9ab4ed7d.yaml | 4 +- ...5565-0d3480d611d68322f3807ad912f13fa3.yaml | 4 +- ...5566-c3292186ff6270827e326f6eecd76002.yaml | 4 +- ...5567-01bea8ce6854ad71bd30075dcae56490.yaml | 4 +- ...5577-d6f90ea934e0ed467a2133d2d162346d.yaml | 4 +- ...5583-49548450e8e603c888246b4324b9abfb.yaml | 4 +- ...5604-9f49ea16b14f6c2511df8453564cbeeb.yaml | 4 +- ...5605-c2468d3ae2dd3b63e789f3e42f85078a.yaml | 4 +- ...5606-dacff2143dd0506c8bdad1a273f67459.yaml | 4 +- ...5613-a39aab4c2ab62bbbd835d18cf4082e05.yaml | 4 +- ...5614-b4a41681eefe755efd70571167096dd9.yaml | 4 +- ...5615-05ead7ef23623d246fc2b9a535b5761b.yaml | 4 +- ...5618-2885ef88741e4fead832f53749584e1b.yaml | 4 +- ...5621-f125bb3227f74edc5c60e8c9d6eb9da3.yaml | 4 +- ...5638-4281d6cbf86b1cb2ecab3675e42347ac.yaml | 4 +- ...5639-50a35a271362419338fef58cbfdfbd44.yaml | 4 +- ...5644-e4f7324bab65bcd3d88d8e669baede29.yaml | 4 +- ...5645-74effda90864a740ff398e9c12c52b1c.yaml | 4 +- ...5651-b9f4dda3ee3f676f0c301784c74a1eb5.yaml | 4 +- ...5658-76a5d195529e4a00633fd456330950cc.yaml | 4 +- ...5659-8e5650d777bfcceefcb0d09b97742288.yaml | 4 +- ...5660-359a63479caac5270f841c962366bff8.yaml | 4 +- ...5661-0445d2e77118d710e79ad9b8b4807a1f.yaml | 4 +- ...5662-6e76234b4d1dbafb645996466faffb64.yaml | 4 +- ...5663-433814dea51a33a792f1c14558ec0d69.yaml | 4 +- ...5664-597aa63a54783e43984bca6c0a5bda16.yaml | 4 +- ...5665-b7d244a1858960d6b7b8f5a6b3a02579.yaml | 4 +- ...5666-5600898416ea4451dceafd9acde6424d.yaml | 4 +- ...5667-20d48d249a9d91a3d81b3c5c649e28eb.yaml | 4 +- ...5668-35617caa27e1534d5543f128d4268283.yaml | 4 +- ...5669-b18da97ec3842241538c439eaed13219.yaml | 4 +- ...5672-8be88bbbbf187ed081686352f66fd170.yaml | 4 +- ...5674-95ff4ff837620d6ea480a2d73422a590.yaml | 4 +- ...5691-fdf2ccd0e27bd38fe570f70f1b82c105.yaml | 4 +- ...5703-a045ed71aa954e6a2d839e45661eb192.yaml | 4 +- ...5704-95b40623fcd88a0f55eead954c03a159.yaml | 4 +- ...5705-0ade74287dacdefe3e19153b1abafe0f.yaml | 4 +- ...5706-768fa7749718c2471763f91755f4694f.yaml | 4 +- ...5707-afa388cb5079dcd3f29d050e7cf600e7.yaml | 4 +- ...5708-2e27bbe1226fc43e3aceee610de45550.yaml | 4 +- ...5709-b5c74375abda0734f64c322204bc8108.yaml | 4 +- ...5710-6d13564fb4f4f025b03f3bb2e7eff230.yaml | 4 +- ...5711-50be407197651ee72b3d338a1eac693d.yaml | 4 +- ...5712-d08dba75a00314181a7ea312016fdabc.yaml | 4 +- ...5713-00f8b2060d8c742440ee6fd7c2090104.yaml | 4 +- ...5714-6bb233f728b21686bbc5b5d256c952f1.yaml | 4 +- ...5715-2c3170861d7bd02e32a5482d1f26ddd0.yaml | 4 +- ...5737-9cffec44ea772b6c67672a3ffd4bf0f4.yaml | 4 +- ...5738-4b9b30de695a6c7d318c6f418b6450d0.yaml | 4 +- ...5740-e11138180e51155554e951dfca6551c2.yaml | 4 +- ...5741-eda45ed9fd55d54d8bc8631b38650581.yaml | 4 +- ...5742-078c8808dfcbfebd119f13a67915c352.yaml | 4 +- ...5743-a6d339b3bc08ee880c9c68cfd52a0937.yaml | 4 +- ...5744-3937fc851cb1ff4a5bb8e086fcf8881e.yaml | 4 +- ...5745-ccb9140dfd14809f1b9eb83224f5c145.yaml | 4 +- ...5757-91cfe4c5d855055ec913db3b32084f9f.yaml | 4 +- ...5761-106e6826f0718372efc6e503171c8663.yaml | 12 ++-- ...5762-3978ba038f6fabf500896400bafac46f.yaml | 4 +- ...5774-4187eb8bb2c5fe78d6c93246f1bd60b8.yaml | 4 +- ...5798-c365c40f61838d38a40469cd2e67b28b.yaml | 4 +- ...5809-248e31ef2c55014a53d3afdb1f6ae07b.yaml | 4 +- ...5815-940c3e462fa88340681bbbfe05c2ceb9.yaml | 4 +- ...5817-f3d8bdcc3c7e14d05b34d12f8fc7e52b.yaml | 4 +- ...5819-0b5a4c4a0addd6f794e40840ce70fde3.yaml | 4 +- ...5820-25a9f7730c5842083500e9e166082efc.yaml | 4 +- ...5822-230e494196dc43c26e1062437fc400cf.yaml | 4 +- ...5823-0439b5ba8ec01f6ad565e8fbfefdff7e.yaml | 4 +- ...5823-75dc3c235e29287a43892beb13ca3ae4.yaml | 4 +- ...5860-cecbfeb5d8e878e2a09fb45c42f38adc.yaml | 4 +- ...5874-838e3be64c22dc1203b2c46a22794d70.yaml | 4 +- ...5882-54815dfa4753d9cdf9883b354532f577.yaml | 14 ++--- ...5886-a04852934ccd4497c8403afda3917aa6.yaml | 14 ++--- ...5905-5c8e28251cab5b1205b7a87c4a2a1426.yaml | 4 +- ...5911-5c48a008fb4b7cf800ee3deda45c5f7c.yaml | 4 +- ...5922-427e946f25b6c94eeb7fca443cbb0fb9.yaml | 4 +- ...5931-58b37148ce0bdaa5522c3559b2f37ff0.yaml | 4 +- ...5939-5185077331b584e736df6ae601c45310.yaml | 4 +- ...5940-e4874305a11ba506fee5f820a68e7e63.yaml | 4 +- ...5942-62fa04687cc3a59a6c68564d31d19c75.yaml | 4 +- ...5943-84ca5039f02eeb82650dbead88aee202.yaml | 4 +- ...5953-fdd08ff4357466d1ef831234fd4686a2.yaml | 4 +- ...5955-73e00ca7db916ed6c728c1ea942e0577.yaml | 4 +- ...5956-1044e73f9f4c90a4318631b027811f47.yaml | 4 +- ...5980-e0096662f4021341254048a6332cbd3c.yaml | 4 +- ...6000-f3aaaced779e642f2bb1c29db02ea02e.yaml | 4 +- ...6005-34378358cea5d52c68afc57717376111.yaml | 14 ++--- ...6009-caff8f6f354132f41c0e30a99b04fa75.yaml | 4 +- ...6035-be6b3b7884ff27a71c7f24387abeb572.yaml | 4 +- ...6037-60704a9704a6bd75205a7bd8179ee4be.yaml | 4 +- ...6048-c13a04653b2bd4332fed19d99c861058.yaml | 4 +- ...6067-8d7a863f5c4efdd21d67e64b56b84820.yaml | 4 +- ...6077-5ed7439fdc6a179319e68a6091db0e8d.yaml | 4 +- ...6081-1d70e5d002efa976ab87b56edcf9f0b9.yaml | 4 +- ...6082-ace575e194919fed8a75c5778dd0bfab.yaml | 4 +- ...6090-27287fd1e5df71f58411b21feefa43bc.yaml | 4 +- ...6091-fd1e677494c37ae823f0277f9b7da0c4.yaml | 4 +- ...6113-84e23826180e38f8c23713de5476118f.yaml | 12 ++-- ...6114-cf9463289c46f678c704f21fa0d76e71.yaml | 12 ++-- ...6120-2711228331aed4ad8d57b410230e7202.yaml | 4 +- ...6133-956616cf620f8b1a830cdf6f68014a5e.yaml | 4 +- ...6136-f18de85deaea25c6fbd01540999d6426.yaml | 4 +- ...6139-54b8dea2a513397d549565f2d6307194.yaml | 4 +- ...6141-00a2a2e9797fc1a0dfdb2c0093e34725.yaml | 4 +- ...6155-933559cdad5a8cb46fa09f456890e810.yaml | 4 +- ...6158-537515ca49a9f4b41a11d36cd380e6f4.yaml | 14 ++--- ...6163-1dcb303214a4e16964564ee6c958b8e1.yaml | 4 +- ...6165-00fcc0e6d0a51f0c0f6ca9266dccfbaf.yaml | 4 +- ...6187-68293564bc63bf678c3143661b510396.yaml | 4 +- ...6196-07cf727b65166fc33c537ed10a4a1542.yaml | 4 +- ...6219-631d4cb99a459c16e4abfaa250ae1a0d.yaml | 4 +- ...6220-3e3dbd541f7f8bdbabf98ab3f7d5763f.yaml | 4 +- ...6222-f4e8b028120d672af95b84876878fcae.yaml | 4 +- ...6225-63222bd033aa9c6bf238fe6f7d23725d.yaml | 4 +- ...6242-187d65743de5f807e3a3561c30924b2f.yaml | 12 ++-- ...6244-68358961295abb7462ad91426e0c3310.yaml | 12 ++-- ...6289-7dfff8c4900f7bbdbc49f6aa2df77488.yaml | 4 +- ...6290-fb48c2712fa8a78f7a012c1644582d5a.yaml | 4 +- ...6294-9df0586fa1f03eb4aff1b246f09e907b.yaml | 4 +- ...6295-81727806f0ca35ac1a1911812f8bc5ed.yaml | 4 +- ...6327-f19b67578553b4899e4857d2a0013f9e.yaml | 4 +- ...6369-96488db43481ee059de402cf95554483.yaml | 4 +- ...6373-ab0a99467dd011ce171b426da9ac5ab8.yaml | 4 +- ...6384-ec4121cea31885fa26a199486b7f74e3.yaml | 4 +- ...6446-447e8d03dfe04fdb92ac705bfa6b054a.yaml | 4 +- ...6447-3d6ad1520c77aad1133699654b17aff7.yaml | 4 +- ...6449-8d379cb370e88332eb6d842ed734aa6a.yaml | 4 +- ...6456-1f98c7de637a490b84e9178dba93c59d.yaml | 4 +- ...6485-a517ff8b627b981a1fe850768f04bf42.yaml | 4 +- ...6486-da3f3594c596e882f29a46f5eb088351.yaml | 4 +- ...6488-dca1a97a6a5540d73d22b80fbffbb729.yaml | 4 +- ...6494-a4bcc5ba22f6cf25dbecf393d91d5f77.yaml | 4 +- ...6496-a2bc40be2dd87e9dcd0977a6fdf140d6.yaml | 4 +- ...6497-6b95e055e3edeffca7582f29e2098070.yaml | 4 +- ...6498-5e5f3cf37fc64d7bac2aaac542661852.yaml | 4 +- ...6500-9868f32ae613992060ba083e76a3d3bf.yaml | 4 +- ...6524-bed91f2c82382c1fad6f81b58becdcb8.yaml | 4 +- ...6525-55933111032f4be98ad6ab7b8ab899fc.yaml | 4 +- ...6526-00301543cb972104eceace7da89e80f4.yaml | 4 +- ...6528-37ebb1547ffcf7ee914afd4ab2a7338e.yaml | 4 +- ...6529-0e6778305a28eacf186b54844a0e5ea0.yaml | 4 +- ...6530-4f1dddafa18fba59ec7aef53cc2b0d3d.yaml | 4 +- ...6541-3108293e567a66e53a5d8bbabea561b6.yaml | 4 +- ...6556-94b50ea832a6fb6b13dcb5407b94970f.yaml | 4 +- ...6558-0ced1508729f529a88bdefd2f552e467.yaml | 4 +- ...6561-f05edbcd117bd78991a113d104243207.yaml | 4 +- ...6583-7e3d963887f74672e4d9f1a2c2d7ff76.yaml | 4 +- ...6591-4f73bdbdeaed18569d9edce85c2c628c.yaml | 4 +- ...6594-3394a8c6bca4050b8fcb857b11ee3b36.yaml | 4 +- ...6598-54778688cb39f84f341e249c6ffef279.yaml | 4 +- ...6620-9886017b189939b50d12738a1b1a19c5.yaml | 4 +- ...6624-0c813c83aee456b071e95980f729e012.yaml | 4 +- ...6626-628e944f1865bad285b75e5824e5bb82.yaml | 4 +- ...6627-7b9a92238f85900b8c03567a6a71f188.yaml | 4 +- ...6632-5f5be8778a8041dd72149d1e03212c77.yaml | 12 ++-- ...6635-009566ddcb125b1bb12196db82871dc9.yaml | 4 +- ...6636-c16c01b270f8ba46731b798dbc4b70f0.yaml | 4 +- ...6637-8450871a53e20b19adaa61e1434e59d8.yaml | 4 +- ...6638-53d09e4ac030b1b8d99973338cf6e155.yaml | 4 +- ...6645-035b152afda993b6317a93d2886e872e.yaml | 4 +- ...6684-912a26e9536c81b126d2560cabd51139.yaml | 4 +- ...6694-b957cb5f454b449f583a6eef42317102.yaml | 4 +- ...6695-c8a7f0039447f90c8cdf2d5bac0144d4.yaml | 4 +- ...6700-9a25bf02d1d516ebfa83ea0a4af36e6d.yaml | 4 +- ...6701-a884ba3ced03b9e7f96ca4d17e7aff9b.yaml | 12 ++-- ...6732-d90dc94bb51dfa2f24514c386a4ae9c2.yaml | 4 +- ...6733-00ca2c99ad053400f72b1ad04cedfa49.yaml | 4 +- ...6738-98aaf1a94b96eeb1d120f5b84c22c6ea.yaml | 4 +- ...6742-d0a21350c57dcbddba5f33bc0580065b.yaml | 4 +- ...6744-e37e5d73321c4c6eb17ee3379b565090.yaml | 4 +- ...6747-a94721f1db6a21d7268903bae3160d03.yaml | 14 ++--- ...6776-d37560ff6c6a3603574d27509821e565.yaml | 4 +- ...6781-058a642e0573877c079f2c954605d344.yaml | 4 +- ...6782-d0f1f9dc5f8553a777fe29b0dbac4733.yaml | 4 +- ...6783-b64173f040b81fec7a1fc17ca0c0ce07.yaml | 4 +- ...6785-baeb593e80daf8c0e9aa6de629d61f7e.yaml | 4 +- ...6798-a69ba668991cc895684ef6a2a0130022.yaml | 4 +- ...6801-915f28ed1e0ddfda2fff50d4304f5401.yaml | 4 +- ...6805-e0ef3d1097adeccc2f12bfdbdbab9d9c.yaml | 4 +- ...6806-55749978c55c3ff34eeaa5813711f342.yaml | 4 +- ...6807-616c8823c1cd69f1db936287f2d1fa7d.yaml | 4 +- ...6808-d7b2973ce1bce5f224e9a3aa96df9db7.yaml | 4 +- ...6809-8199a4f2b40a6eabf0daf50bba86ea3b.yaml | 4 +- ...6825-8ce49b249ec2d999d67fd390598bddc7.yaml | 12 ++-- ...6826-d89b8d067839983b7d38b29c3f8dcaaa.yaml | 4 +- ...6827-79c84a24ae01cae4e07f5d580bc271de.yaml | 4 +- ...6842-987b044c3bb6f7d497d7cc053aa32728.yaml | 4 +- ...6843-1a89597b1bd6bb139b0cbb0c2a6cdcf9.yaml | 4 +- ...6846-d3109a73b6d87d8103efae9f126590cb.yaml | 4 +- ...6854-b2885ea30200f7cd94ec6f28c25609a5.yaml | 4 +- ...6855-e8a21df86ab8f777d41e6648745d6563.yaml | 4 +- ...6875-95f3dcaa4b86abab69cc1c0fd09f80aa.yaml | 4 +- ...6877-a371f0288a138d0c57e459d338c39157.yaml | 4 +- ...6878-40d20dcfc0a9c20d06ce00b51231e085.yaml | 4 +- ...6880-1390282d7da53f6dd62f69c33ae3d8da.yaml | 4 +- ...6883-6a4b9abd38157d4627731558a0b86be9.yaml | 4 +- ...6884-459b18886f45ada6d060921939e88905.yaml | 4 +- ...6892-c34557dbe7e75a157fffc6005c83f4ba.yaml | 4 +- ...6922-801d1a90cceafe559a3466d4f67a8f10.yaml | 4 +- ...6924-8372eec64ff21987a44ee27a8993e766.yaml | 4 +- ...6925-7222dd54a342eb0ec1d2eb49f0d0425a.yaml | 4 +- ...6933-116a3711d1ab72d436ec5c35678ceddf.yaml | 4 +- ...6934-b0fbe8ed2bd5ede12fc8dff6720e9fab.yaml | 4 +- ...6938-c7a8bc13237071ee5b2f66d58803bacf.yaml | 4 +- ...6941-fa11673c89d7f49c85f8e69d02b295a6.yaml | 4 +- ...6953-150204c3648be383cc7b37e155a5d6bc.yaml | 4 +- ...6954-de1ce77814c2edc391436dd273126a1e.yaml | 4 +- ...6957-31bfcad1a946ead477cc4d9cae0f33ff.yaml | 4 +- ...6958-c3b5c2246526b047e580623567471684.yaml | 4 +- ...6959-9bf910117bdf6862d3ee1c26c92e6b91.yaml | 4 +- ...6964-92efa25c2b07bccd1145767fcc736dac.yaml | 4 +- ...6965-33493821da381511f179da2cf195b351.yaml | 4 +- ...6967-85f6ac4895a90413fa74a9e82058c7a0.yaml | 4 +- ...6969-4c45cf0c9392dc7bd44f9128bee077ba.yaml | 4 +- ...6971-5143c97c48d7dbc931ae167f87839db5.yaml | 4 +- ...6979-2d6698f89f32609adbc6e12eed98ca62.yaml | 4 +- ...6981-2a19a88ce4a92a9c8fbf2df45764b32f.yaml | 4 +- ...6982-6d61e0b46b881d3a5609918a45b30992.yaml | 4 +- ...6983-a8aacb001d1b5ea46e16ff44cb2daa72.yaml | 4 +- ...6985-3a0831746763e4cc6e13a3b507a11959.yaml | 4 +- ...6986-1f31c2ba6ee46d152a9920d8ef0adb22.yaml | 4 +- ...6988-411de6e419140a33390e4cf84e25eb26.yaml | 4 +- ...6990-17ab37dbc7beb458edc5925614c59dfa.yaml | 4 +- ...6991-255053b922939496ac6eb4ab1dee395c.yaml | 4 +- ...6993-134091eb792475d128936c227b127601.yaml | 4 +- ...6994-7ec69e14aaa720fc8a2decec00730012.yaml | 4 +- ...6996-3558264fbd3bd3c84b28ca0ff40cd986.yaml | 4 +- ...6999-7a55c80cef31b1897125e271418538f4.yaml | 4 +- ...7002-69b19f14e2d5ec73b6d0b29b5ce933ea.yaml | 4 +- ...7019-c03b6eeac707e2faa28a70a9e28fd5e0.yaml | 4 +- ...7029-6576cec6cc72bf932987474c7e82dbd1.yaml | 4 +- ...7030-fd0ae4740c5dfc4422b8f4b3f77edf83.yaml | 4 +- ...7044-c7afeb04136868c455da71b1177f088f.yaml | 4 +- ...7048-06b7c4127350d50d75ab6e5a40c02f95.yaml | 4 +- ...7064-d5f51941abb9e332fec6da6716857cba.yaml | 4 +- ...7068-4e625904aaffe65e8919040e5c5d03d6.yaml | 4 +- ...7069-750d46ec675a067e58f6ca5aa716c8bb.yaml | 4 +- ...7070-9a66ad8b0967001fd55d0d45f6e42869.yaml | 4 +- ...7071-1092f82974f0d44c05422ba456183db5.yaml | 4 +- ...7082-e69997328ca18e69bd3343eedbb036ad.yaml | 4 +- ...7084-d7a48a2145831cedc1837e88079bf034.yaml | 4 +- ...7085-9a645fa828e0b867db978ce345a20000.yaml | 4 +- ...7086-4d2ea21aa8044b97f6f856b2ca032bba.yaml | 4 +- ...7088-71268622d169b66d5da459dba61f1b1c.yaml | 4 +- ...7089-99ad02b61917183fbf0c75dc39e4e9c8.yaml | 4 +- ...7115-891807496f9388f784feeff012bb9ac8.yaml | 4 +- ...7154-870c7bd1810589217dfd341e2045182a.yaml | 4 +- ...7167-8ee86188c71251e99a8f09d6e9fff31b.yaml | 4 +- ...7168-bf3890ad3455b3c44beacb3bebc6b11a.yaml | 4 +- ...7198-d64722e01dc579e8e1b721ed84873800.yaml | 4 +- ...7199-54a6c2fc6f1decd20e0ec9cd229454ec.yaml | 14 ++--- ...7201-5c5b5355efecc468361938b2443e7783.yaml | 4 +- ...7202-e34616bfa39928844a257bee23d26881.yaml | 4 +- ...7203-280e3b3d0994374de6814f38b2990648.yaml | 4 +- ...7225-001b828c3c08777c5f66954153002511.yaml | 4 +- ...7230-4fbe78a27e0a415c3958fe330e75a188.yaml | 4 +- ...7231-a8c0b404c2334a1ce94afe05ce1ef335.yaml | 4 +- ...7233-9b85cc5dac11e87b56eb1483e446220f.yaml | 4 +- ...7239-49ce77ee7ff4dfc9b11f4efe4714eccb.yaml | 4 +- ...7246-b60f7befa67eb443974e00d882b10881.yaml | 4 +- ...7251-ec6e68cb23a447be8fad62b8d99d082d.yaml | 4 +- ...7253-6ceb62cda68f33df94c6d2d8223676b0.yaml | 4 +- ...0201-c7b36bc8204aa5070cf82a1f950c7e42.yaml | 4 +- ...0203-b7d7504fc6882ec831aaed54e5e753c7.yaml | 4 +- ...0212-82dd6e10056d4e2acdde095ee3c87000.yaml | 4 +- ...0216-cc3e06da44808e338c8d593b5ba332ad.yaml | 4 +- ...0233-83c99024de6733ef722985ade6213db3.yaml | 12 ++-- ...0235-4534912fcab3ecf2a9fe501762efc225.yaml | 14 ++--- ...0236-2c733617d0e1924a092044fd73aaa5a5.yaml | 14 ++--- ...0237-9a365d69136d08070aadedc43ca85c95.yaml | 14 ++--- ...0248-15118c222c3d3efe10e0b60b12d7cf6e.yaml | 4 +- ...0254-982e9cfa43c440d5e945696eaf09286b.yaml | 4 +- ...0255-f594e103526836b64061a1f68427567d.yaml | 4 +- ...0256-97fda38a75735b5bdc9de194b151a883.yaml | 4 +- ...0326-63b73f38de8e42ff42c365ddf35b05de.yaml | 4 +- ...0326-d5a4a92d920eb71aaeb7667326f31fb1.yaml | 4 +- ...0334-9ac2eb6aa79c6ee262cfc473810b750d.yaml | 4 +- ...0365-4e867da6f1b40e5f079dbf8385eca830.yaml | 4 +- ...0367-8b1647a7cae04c475a434c97e40430f4.yaml | 4 +- ...0369-e79dfaa6d6a126465f94617b43a94699.yaml | 4 +- ...0370-0b7d0113722a4b24cdf6bdf7adba767c.yaml | 4 +- ...0371-8cd4e41bc9637a2e580f2b8d0e6a5222.yaml | 4 +- ...0372-56d2c56931ff57a31974c2c98619fbfb.yaml | 4 +- ...0376-c1aa3c18402d6565768dc2655ac439f3.yaml | 4 +- ...0377-a12053c70cb8a7dc00df12e53f227856.yaml | 4 +- ...0378-e074a411b9f033a38afc60d73e72553d.yaml | 4 +- ...0381-948461229b764fced19a13ef5ba11252.yaml | 4 +- ...0382-563c86924064bbeed4e8a4af90017e06.yaml | 4 +- ...0384-55265bc94a3e60f3cd5f796b692a1dbf.yaml | 4 +- ...0385-5f87f741e48b627a6080cd7b2aa94d46.yaml | 4 +- ...0399-1cb42f62394546a329e0486aa05cce34.yaml | 4 +- ...0405-fd93b73cf46336153d1b2692824ed6b3.yaml | 4 +- ...0420-f49ac78d75e6d3fb0dc3afda46d041dc.yaml | 4 +- ...0428-5f88cf9fcaa2bf2f8f88d764e30b12bd.yaml | 4 +- ...0438-a01bc9677b84a6e36d4cf67ad2a5dc30.yaml | 4 +- ...0442-a8dfb144a96e09ab6fe557b583b0e2e1.yaml | 4 +- ...0445-c3136cf32a8ee994d42daa37c82bd5e1.yaml | 4 +- ...0447-a516963ffdc1c41b00bc8d54c0948a03.yaml | 4 +- ...0448-e5a323ffcfde2fc677ad46470b3d50f7.yaml | 4 +- ...0449-a33517bbb57428ced1cfd6968a2c3a6b.yaml | 4 +- ...0506-2a3ca00c5df2d9ec07efb3c8b755e2fe.yaml | 4 +- ...0508-6738f168d7a8aa50cafb43b72d6946b9.yaml | 4 +- ...0516-aba156d650d00c8cf56ce115df0a8a51.yaml | 4 +- ...0559-d68b3bd827fa2538356da72861992193.yaml | 4 +- ...0561-36882e902da34c7275792dd2c6fee99b.yaml | 4 +- ...0566-0489a9c545313d7845eb08297287eaa5.yaml | 4 +- ...0585-1a9b2b84b94bf133577af40ec3afb2be.yaml | 4 +- ...0586-c945e86e64bc195e431c6da83e2cc2c3.yaml | 4 +- ...0593-020ad3f8f39e050397b159e81ed4f1b3.yaml | 4 +- ...0594-f3efba04fcdce6cec3efa7cec92aedc6.yaml | 4 +- ...0595-d4c78d8203546198e179a467ececd0d8.yaml | 4 +- ...0596-1dd9869669e4a7c4f20b2235d2df68c5.yaml | 4 +- ...0597-f98418e2a88f3c300252df6d0a548031.yaml | 4 +- ...0598-1af00ca27a5fbf01cb83385e2b154d55.yaml | 4 +- ...0602-bff9375a673f8d2d232dddd7e1d5201a.yaml | 4 +- ...0604-2c9cfaa1b4268406a1d78df84c0cb895.yaml | 4 +- ...0608-b10ae50c79331d4dcb069789ed2ad609.yaml | 4 +- ...0611-af6803b7659222cbe48ed01e4976d1d1.yaml | 4 +- ...0612-96403daec96064716d990b4ed68fc604.yaml | 4 +- ...0614-9dd081367b7c3b91dad73b336bd866df.yaml | 4 +- ...0615-6cd803f0fa2a9a46d6f2307a3acf4872.yaml | 4 +- ...0616-bd26cb20f513a11738059a698b560137.yaml | 4 +- ...0617-01c368446b8700dac5340c9b9ddef1fe.yaml | 4 +- ...0618-875a676a20644f9b257dd61453cbe7b9.yaml | 4 +- ...0621-ce6741d54beed2d67ba4497c046c28fc.yaml | 4 +- ...0625-b0586fa88a487c798158f25ead9b6004.yaml | 4 +- ...0626-bfd48818a8f8d2ed09939883a8a76d0e.yaml | 4 +- ...0629-ff847df8e45ccd8c8631d5e2f3e5787c.yaml | 4 +- ...0630-2565b37cf24425d8b3b9a64e0058d4a4.yaml | 4 +- ...0631-3f2cad5626e189b4a9fbbf4f777a78e7.yaml | 4 +- ...0656-fb622d8a3e8e58dd4ad557e902dc2f9e.yaml | 4 +- ...0657-75603149f92181c053a67aa413d7458b.yaml | 4 +- ...0658-2f6907ee5c2cac6fd791f40374c04e13.yaml | 4 +- ...0659-da73522010deacccd257b4e9a1315635.yaml | 4 +- ...0662-f5917cabea5f4d2844b07d04e1880958.yaml | 4 +- ...0664-12cfc5e2c42c1035bf0a62b514ef0564.yaml | 4 +- ...0668-f22c4e2a2ebc3ea71e41c368cf894811.yaml | 4 +- ...0673-d7741f047915382e7e65e25c2ecaf00c.yaml | 4 +- ...0678-eee696eab23205a2046e2b67a8b48808.yaml | 4 +- ...0679-15626a5f31201ec9a6bcc2f5d39038c5.yaml | 4 +- ...0685-6eed35694a75496bc23819374091960c.yaml | 4 +- ...0688-380fec032d7d63f91e53bba15b6960ee.yaml | 4 +- ...0689-30ced7d36e2903b8ecf83d1c6ae8e869.yaml | 4 +- ...0691-7d0952eb6cd34263da0c111b4d2da259.yaml | 4 +- ...0697-6cad3fdbb1d6f65f827e62fa999a9d63.yaml | 4 +- ...0698-72000fe0c780a49eca561c11357809c0.yaml | 4 +- ...0699-780696e15f2e9c20283c58547979c77d.yaml | 4 +- ...0700-0cd1e08a1b0cf9639f9192490f465d8f.yaml | 4 +- ...0703-7e2dc330bdadb62eadfb9a21217d5798.yaml | 4 +- ...0719-713789bc3ffbd71b9430af55e34d0b0b.yaml | 4 +- ...0766-aa0d08f997d780bef53fffda596a65a2.yaml | 4 +- ...0779-8100bca7f40bd5eec7ce73b26e775600.yaml | 4 +- ...0780-47817571e00845c157bd7b162b48263f.yaml | 4 +- ...0786-d482e085c2e103ed9accb9a0cd94ae4d.yaml | 4 +- ...0791-89b2790236539e015ae4e5bc957d832c.yaml | 4 +- ...0792-cdab814f5acb52d3219d4930f7ee1f81.yaml | 4 +- ...0797-1fba8e9934d599624fea9971897c6598.yaml | 4 +- ...0820-654c8b4c06cccd2b893fe7f42cd13fff.yaml | 4 +- ...0823-2f36bf28ff455df3f6e5bee8596dc834.yaml | 4 +- ...0824-d0e696248d665e9f0a517c6587bde743.yaml | 4 +- ...0825-bebe54861e63e8c1edcba180c7d233b2.yaml | 4 +- ...0826-5f28fbeb41c87c1968016458f52b73af.yaml | 4 +- ...0828-4eaf37cfdef1b74dc7b626ac3436d2c6.yaml | 4 +- ...0829-6fee77f4c30ccce8c47c0e8979fa4163.yaml | 4 +- ...0834-0fb47ccc27ee413d414cd8b0ba979166.yaml | 4 +- ...0835-a2114fc45474e481aea36dcc9b5f1c4d.yaml | 4 +- ...0836-6a28dfe4469613c00410a3afcd856457.yaml | 4 +- ...0837-91833325e07473e81e8f172735b05fa1.yaml | 4 +- ...0838-dbb7ef50cd218fd39017d67c755de559.yaml | 4 +- ...0844-7d2e01fb5142e419d7f12bc8417804ab.yaml | 4 +- ...0869-f64da1b37b4c50e68b9872eff4ca509b.yaml | 4 +- ...0871-31a5f54f51f59ec02334f6066d4afc3a.yaml | 4 +- ...0873-498902087f55cd027211cbff49f69fac.yaml | 4 +- ...0895-2c9be73a62038f3d8273efbfe3ddeeff.yaml | 4 +- ...0896-a48a705bfc66279fa96d49ee01ec64a4.yaml | 4 +- ...0897-b00000526bce4d638ca8288e0858fb40.yaml | 4 +- ...0898-9273f5ba0fae5fff2a4a50e2ed96c406.yaml | 4 +- ...0900-e41adc177b897ccc45ae52e5f4de56b3.yaml | 4 +- ...0902-9feb5154944f3d4b90bd9e0974af5d4e.yaml | 4 +- ...0903-61ee64923a0fe1e6df3a4bb79ec27733.yaml | 4 +- ...0904-fccc44e164a0cbb0e0c232ae976cbb5f.yaml | 4 +- ...0907-6e45966d9ef8042467981ba9a26f57f6.yaml | 4 +- ...0908-504571f3f4f99ae23a7efdf0aa6a64d7.yaml | 4 +- ...0913-d1fe516e72277a6efd50d79a0cef3b2d.yaml | 4 +- ...0951-04f6cc7c3ad39880573726a5f936d0a4.yaml | 4 +- ...0952-4ba36f479c72328d41a5d7367a3a95ba.yaml | 4 +- ...0954-c784400f0eb0916fb123587bb1f7a008.yaml | 4 +- ...0956-4cd083213286b4e4a8589cde5bcde660.yaml | 4 +- ...0957-c1749d6ed9c579e061b6c82357a7d855.yaml | 4 +- ...0961-9b450d4afbc0c12b819c42370b2e9a09.yaml | 4 +- ...0963-b6900545e2e4c40eddb286d1788c8880.yaml | 4 +- ...0966-76ebe4a4bfefd9bdb89c2aafde46a61c.yaml | 4 +- ...0973-f5225829b9851280f9730cc7388f8c93.yaml | 4 +- ...0977-e56f591ae1b5802507934b44dcafdc98.yaml | 4 +- ...0983-326d3f5baee82478e64ca11a4a66dbf4.yaml | 4 +- ...0984-4d89ea84ae0150939c78e1551488e87a.yaml | 4 +- ...1038-a0f8dbe86bd25cb76ecd0536100264a1.yaml | 4 +- ...1041-785b1c3458487127cc883fbac1f1ef7f.yaml | 4 +- ...1042-4750f217b4fbd830bf2a4ee2b5c1530d.yaml | 4 +- ...1043-2f9298ab3f6a9cf7ac470aa68de57def.yaml | 4 +- ...1046-813e33d3439eeca37bb846e820e1b423.yaml | 4 +- ...1047-92df025ccfa89a1351393b8f44caea90.yaml | 14 ++--- ...1049-4086933ae9a93ef9f0adb45c61ef5080.yaml | 4 +- ...1050-67ac2a423d1da6f86cbac7c3e9485c2b.yaml | 4 +- ...1051-3b8bb6063c635c2a8333462322de6a1f.yaml | 4 +- ...1053-2f07eb6c891e38765db750c63d86a120.yaml | 4 +- ...1054-a2e4cd3309d1f111f649373058fb4d50.yaml | 4 +- ...1055-6a1e6967396b1126582c6ee0a5fede17.yaml | 4 +- ...1057-a09c2c9abc79ca137e522820700cc3d7.yaml | 4 +- ...1058-e42a9ef463fb91cd20488d17488f8aed.yaml | 4 +- ...1061-3e71b451d444e56f20cac2bd5a92795e.yaml | 4 +- ...1068-64f66ce5bf8a7c60ba469ac77d7c053d.yaml | 4 +- ...1069-b1d3b6bac2cc1e1f3e245ca1837d27ff.yaml | 4 +- ...1070-c33a17581ea3c88326cc98d137f0e313.yaml | 4 +- ...1073-3171c38b67df36d18560a0a3bce363f3.yaml | 4 +- ...1074-73d0b7fc0e78937e14e64656fc0eec81.yaml | 4 +- ...1078-e8c4ecddb52fde1de74da4b2c7a57560.yaml | 4 +- ...1079-64b00495d7288bbf7260545472f9a87a.yaml | 4 +- ...1080-ac5ea49d172b7aeae239859f4682fe56.yaml | 4 +- ...1081-f9ee3cd75d7f36da24c7816038266548.yaml | 4 +- ...1083-aa5a6a671fb5da473aaf8781afbfa3bd.yaml | 4 +- ...1089-4f4ea79c6be4308e1d54d5b19b226c52.yaml | 4 +- ...1090-0f06a0233bd37a56c0b489be748f0408.yaml | 4 +- ...1091-433406de2bcd419520bb9dde58f80311.yaml | 4 +- ...1092-9e24f5f31aefd98727b13ebb0dfe3151.yaml | 4 +- ...1093-37d8f4614be006df7ea5c5c8ccf22b6a.yaml | 4 +- ...1095-c4ae84dae7d5de9c58b9c493377ad809.yaml | 4 +- ...1106-91995026ff620283dce0ded1573ce367.yaml | 4 +- ...1108-f9def0ceb1a6b24330f85d2a5c68b378.yaml | 4 +- ...1109-3472d41d965a1eba1565dbf3f6f91c0c.yaml | 4 +- ...1110-2e10545dd7017e6f584fc20c4f8e8985.yaml | 4 +- ...1118-f884e1e5931aac898c331db3ff9b0a47.yaml | 4 +- ...1119-788617c7c507dc55ce43d126204f73e2.yaml | 4 +- ...1120-13f75b4807aa41447c76b6287198f0e6.yaml | 14 ++--- ...1121-019da25ecceb2c42293b8bf9c83a7180.yaml | 4 +- ...1122-470fcf5d296c10b95ff256d3ed543789.yaml | 4 +- ...1123-8aeb2b8f9fd8f5408bc5cbce23cde23a.yaml | 4 +- ...1124-0518a583283f442e889b7000a0f04a7c.yaml | 4 +- ...1125-42040b470560c747a13bf2788592d50b.yaml | 4 +- ...1126-5610b8d447f64bccab677eca7d6526f5.yaml | 4 +- ...1127-3fbde3febf513db2a577aee06321eb0b.yaml | 4 +- ...1128-7feda050b3f384761620a931ffec2f7f.yaml | 4 +- ...1129-f0ac080b3744a919181119313b1bddf9.yaml | 4 +- ...1130-2d87227c0a1b8cce209867e1a3357d5b.yaml | 4 +- ...1133-015631a41e17e7c68847b5f1f1c1e6e5.yaml | 4 +- ...1157-005e163e7b395198e1ed48634c687240.yaml | 4 +- ...1158-5a3c975faaff05174a403394f594d251.yaml | 4 +- ...1159-2109981df34c3c3e10e9a3ff3ab51437.yaml | 4 +- ...1160-e2f4a51da7010a4270e848488a346f79.yaml | 4 +- ...1165-a6227d9d923140efcf18978d7c277e53.yaml | 4 +- ...1166-23084d0a675ec1fe2de5f06c696330cf.yaml | 4 +- ...1171-200d6c881afb4e097be1558e49c07780.yaml | 4 +- ...1172-1a4b02751bb2128579758045cc80caa1.yaml | 4 +- ...1173-b7e69e83c8c59004ad0e6d101ab301ac.yaml | 4 +- ...1176-164d8e023bea2a9cf66601d6c8d87f66.yaml | 4 +- ...1177-dabe11ac9a89ef7717da39d4e9cb7dcc.yaml | 4 +- ...1178-12303619a441af1cb4218513536dee14.yaml | 4 +- ...1203-ed938d6748a55c68d3afc00fc2604d10.yaml | 4 +- ...1204-dc129067ca38c26e19992abcd62ec625.yaml | 4 +- ...1205-5b8de369a947d5ef9762408c0a15df35.yaml | 4 +- ...1206-827537b84b4ae3840c51006c12ccc5df.yaml | 4 +- ...1218-5837868c169d6f2b8a500d8da35501e2.yaml | 4 +- ...1219-455ef09d7d7d2085e1e76af071d802ad.yaml | 4 +- ...1229-ebdc4e179afbae0e73d5291d7befe15e.yaml | 4 +- ...1234-f3fab83347fba28adb4199c2198991f2.yaml | 4 +- ...1235-3c3007d2c808c5107195ff3e0b9f940c.yaml | 4 +- ...1236-84d7b8eee39d9201723ad33de86e3865.yaml | 4 +- ...1237-5adfa5eb8fa56a7df3a28304be530aa5.yaml | 4 +- ...1238-e064b41fe8a39fcee76359d8531bca53.yaml | 4 +- ...1239-998f619282ed25afacc39847ff214ad0.yaml | 4 +- ...1242-53bbdc5768caf77b3864368c8b4ad9d8.yaml | 4 +- ...1273-750a764136a41cb3d1ef7fa35a4e6897.yaml | 4 +- ...1274-7598877f4e713405d9e74bfad63425fb.yaml | 4 +- ...1276-8e520f19b2730c335f2344f32b135ff7.yaml | 4 +- ...1277-1fa0a5990488e25fdbc5ceea9aa094d8.yaml | 4 +- ...1278-7e2aa27b61aaa1e5ca65bdc32112a6a9.yaml | 4 +- ...1279-fce0c7de1ac72dbab0de3f1d5f219540.yaml | 4 +- ...1282-83be75cbe83d286de0e56bf13cde5945.yaml | 4 +- ...1285-f83002599a8aabe9f476ac830785a4d7.yaml | 4 +- ...1288-84ecfe35530dba1d6d850c87907091be.yaml | 4 +- ...1290-96ed0838fd20f84264d3c063e2ba926e.yaml | 4 +- ...1291-7d6d564d16561c7bab08d495e46b51fb.yaml | 4 +- ...1293-44eea350bc1338780b2a377c7a4acfdc.yaml | 4 +- ...1296-4f15003c85cf67398b6ba79713bb96a7.yaml | 4 +- ...1307-305aa37d733d46f38e2d556cd38a63ea.yaml | 4 +- ...1310-6b050fdad6f07dfeb11a710487994604.yaml | 4 +- ...1311-7310ba3269deb60929ca945cac8767e0.yaml | 4 +- ...1315-e39757704ab66d7ab58f6ee33ac96e65.yaml | 4 +- ...1316-2581131a04f529b6a1d76a0e92f4b955.yaml | 14 ++--- ...1317-566fe474170295f900e413573209c71a.yaml | 4 +- ...1318-49fc80b8d756a56dfe95c5a6032f1087.yaml | 4 +- ...1319-4df3cdb7c674def16735b8e037827c43.yaml | 4 +- ...1320-98364cc3fafc257904edef9d7b1a931a.yaml | 4 +- ...1322-a3e8c0ce1e12ba9e5616261592070d69.yaml | 4 +- ...1323-6440d16b09a3de3d5784ee99cd71888c.yaml | 4 +- ...1326-045b6020dfc1ed99134f3177a28e643d.yaml | 4 +- ...1327-0b6d48f80755becad907191d56a4faea.yaml | 4 +- ...1328-d7690abd96f47b63d2e6b2b27468ddeb.yaml | 4 +- ...1331-97f6d832d77568cb83cbfd8ed5696c11.yaml | 4 +- ...1333-05afb40274ed6e7e7ee85f9181367788.yaml | 4 +- ...1337-b8c540477ad8f7b59e43be9ed6a57e18.yaml | 4 +- ...1340-88f9434afbf3660fe0710b500aa999f9.yaml | 4 +- ...1341-4d70d402016d1f4b86f60918b22119da.yaml | 4 +- ...1348-efcaa0147762fa54393728f49e9affeb.yaml | 4 +- ...1349-70a205acd44742a9f8e261e79a40ad0f.yaml | 4 +- ...1352-095d7ac917f72e37e9bb35fbb61b06e5.yaml | 4 +- ...1357-7cb2639ce12fe262360726f38fcd9d92.yaml | 4 +- ...1358-974e69c005824474ea421d11c0a2e8fa.yaml | 4 +- ...1363-5c300627494a1ad1099275af163a3e49.yaml | 4 +- ...1364-6b5638f86300bb8cb925bbc8ddae3c32.yaml | 4 +- ...1366-e3b2d19a0133da498045d08d6862f535.yaml | 4 +- ...1368-73f67eef9808ee2307cc661b7742b37f.yaml | 4 +- ...1370-7a445b6bbe1f19472fb82aa1ab2d7a3a.yaml | 4 +- ...1371-ffa89e4112fdba734a5ff64b0534aeff.yaml | 4 +- ...1377-14492d14fdb2635abb58842e5c9c262d.yaml | 4 +- ...1379-9f77fe459a0e5283ffcbf11ae93f5733.yaml | 4 +- ...1380-459e9e8ff0ce6dbbd756036aacf40336.yaml | 4 +- ...1382-8665b291868b7068ace3fa9c23d3b9d6.yaml | 4 +- ...1386-26c3585e6e7fad9c8d3a82c1982ff984.yaml | 4 +- ...1388-3787d9c397d58c6e8f2c674f16ffe8c1.yaml | 4 +- ...1389-ca8deb8cc99a7e80212ae873b89f0b6b.yaml | 4 +- ...1390-134f2819e254034a77fb510bfe9b93c9.yaml | 4 +- ...1391-54120e3f5fb914e9169ba2eee6152b5b.yaml | 4 +- ...1392-68cc06979ff8bb95723bb04a557ffaae.yaml | 4 +- ...1393-3546c72d408f5a6ead5d764bba6d4ef6.yaml | 4 +- ...1396-a06dc2822d205c30829a39942b5c0aee.yaml | 4 +- ...1397-b8980aa84f8cc55308551be159a27546.yaml | 4 +- ...1398-b7beb3a7782030a0bf8580cffcb377f0.yaml | 4 +- ...1400-50358f3970bdc1205a29969915a6519c.yaml | 4 +- ...1401-81e5332e3881680e9eac9f42ea7f36ca.yaml | 4 +- ...1408-ce05c14849e5f32e89c54867b5580301.yaml | 4 +- ...1409-0e94d67e78f08a20056789a0d440afe2.yaml | 4 +- ...1411-328a1085ce78b77ac077833dbb3621ab.yaml | 4 +- ...1413-4ab49877e45f4a964303177554e78a85.yaml | 4 +- ...1414-824dccfdb78b425ce34b0edfaef506c4.yaml | 4 +- ...1416-a64ff7d479ea82b36b6d5de70a97fbae.yaml | 4 +- ...1419-421c48e1cd35997d3959562c69cf5279.yaml | 4 +- ...1421-cbef84b88c0a2eb6e68bde27c710114f.yaml | 4 +- ...1422-9260b43e6ac9e5101461f0e5b3ca5c55.yaml | 4 +- ...1424-b1b366ca92b9c54e2c2fcc9208d3c99a.yaml | 4 +- ...1425-ebf721c6b992d7c7bdcbf869b188ed93.yaml | 4 +- ...1426-e5cbcd667f6374a7cacb1531a9b3233c.yaml | 4 +- ...1428-f4f911fdf61cb94da9a5aa199fbba441.yaml | 4 +- ...1429-88c402ced2fc7c5811d5e082ac94297b.yaml | 4 +- ...1434-7678a4c43bf3743b099ecbdc547aa500.yaml | 4 +- ...1438-47760446230886f970132bba81795035.yaml | 4 +- ...1445-ffddbf496e7aaec02b6e7ddf918beed0.yaml | 4 +- ...1447-5adaf21161b5d5d8e7d95c715efbd0e3.yaml | 4 +- ...1448-6150ea7134cb72d73e6e7ce3f51ab46c.yaml | 4 +- ...1449-2278ff8679ddb3e8d29bcac77bb31452.yaml | 4 +- ...1450-373cd634451823c6ebf5fcda405d8cd5.yaml | 4 +- ...1458-f7fd1f97dac21964944e06746d183317.yaml | 4 +- ...1461-fc5e0217c3dc9969d4594ab0394109b5.yaml | 4 +- ...1463-ffbfea6a2970df28e2afd4173682647a.yaml | 4 +- ...1464-7278c1d5f51388c1851434ad959c1788.yaml | 4 +- ...1465-c4f6d0a939cffb23c47ad426a3f0d45f.yaml | 4 +- ...1466-6b0cd31bdd2edf441adfecb677828dc9.yaml | 4 +- ...1467-9449b2c65db0c3fbbcb51d4c753869a4.yaml | 4 +- ...1468-49fe6661a7e83dfa08fd330a80312c71.yaml | 4 +- ...1487-8e81f52602da7d34f1be2c2a8e304501.yaml | 4 +- ...1492-739e325811d595a476c8a9d5ed5b690b.yaml | 4 +- ...1496-ec1b9ba6cd34426926dd05163ef9cdaf.yaml | 4 +- ...1497-6f08ab84e1cb8caf7e2c6c058fbbbb3c.yaml | 4 +- ...1498-70c45809c8b9b14259a0bbce1a7bc3da.yaml | 4 +- ...1499-911f38a48744ee0cba908ae42a0febe1.yaml | 4 +- ...1500-7df172b3edf3e84909e57255e5af7560.yaml | 4 +- ...1502-78fae6f744a75ffe299dd93a24365b9f.yaml | 4 +- ...1505-9f9b469ed3c99cc2601f251ee6ef9e63.yaml | 4 +- ...1506-4856ea4fa23608af898ff19809065029.yaml | 4 +- ...1507-889847d33809b1d03070e688df75ac6b.yaml | 4 +- ...1508-7c8990ed736a3cb5113e28a3af38b444.yaml | 4 +- ...1510-edf5537839b9111e9296303d5a76a556.yaml | 4 +- ...1516-bf5cbdf8020a636cc9f21e15a59d9023.yaml | 4 +- ...1519-6819e71a564d878e4f4419dfc409235b.yaml | 4 +- ...1521-52d465c21905272814a823dbfaac019a.yaml | 4 +- ...1533-a3c60d763b55ba109d8e7ef5cc4b73cf.yaml | 4 +- ...1534-7832435d7568bbf632e364a36f5e57e1.yaml | 4 +- ...1535-ea7c82866444834be834917feb8c07e7.yaml | 4 +- ...1536-cbede89175ad7b3a47d5ac8fb29d35bb.yaml | 4 +- ...1537-8bd60d8d3ae1eb23eefce0f380d89e1c.yaml | 4 +- ...1538-125b5a46ac07b4fbf1d6669e65082c22.yaml | 4 +- ...1541-b108894447f4647f7c71dc35d7e7ee8f.yaml | 4 +- ...1559-8eaf2fbb99993016796df5f74fcedae5.yaml | 4 +- ...1562-792043f233fdfdf73c23cd58a8394e1e.yaml | 4 +- ...1564-8bdef51e6a9551cb787f034110fc0fe2.yaml | 4 +- ...1566-b6235d62fa0b8b99245758e77840a37a.yaml | 4 +- ...1568-d2de41ee5b97d7c9433fd01d3f1c9751.yaml | 4 +- ...1570-88e8a642963113f357e180145695e08e.yaml | 4 +- ...1571-348b2d2c08f931f9d2b3643ac2152b3a.yaml | 4 +- ...1572-bd4d77259e44439674b77141abd7a906.yaml | 4 +- ...1582-73bf56678d08f13f561affd2573b6e8a.yaml | 4 +- ...1584-8fa6b82859e5d82c0a64a9973f57957b.yaml | 4 +- ...1585-80129a218b0d8978bbb5382fd0cace63.yaml | 4 +- ...1586-24a60434e502bd4fe3a3e9f654b441e8.yaml | 4 +- ...1590-05c61ba0f98849485be0002b6c76289c.yaml | 4 +- ...1637-b160f2225fa61e39751381696b9f32c3.yaml | 4 +- ...1641-0a2080d70a92fba8a8847abac6eea304.yaml | 4 +- ...1645-8b372eebc313c06900867e460f19a6e4.yaml | 4 +- ...1649-dd16da990120154a69703f2e9dcba084.yaml | 4 +- ...1650-2f5fc8a76419fe6bea249f884a02d85d.yaml | 4 +- ...1652-bf5e4013e055d945f3801300e58d2936.yaml | 4 +- ...1653-c408e44047c03520c426eb804c18a88a.yaml | 4 +- ...1660-7b68da6e2373d2ac5c585efcf03c710b.yaml | 4 +- ...1664-41e0b9bc5daa86f41c29f0c4deb81563.yaml | 4 +- ...1668-9abc850c93257e8269e3f6780cf7c973.yaml | 4 +- ...1679-1003d8c4cbec4c692768d02c2deb833d.yaml | 4 +- ...1680-5332275b2ed1bab71594c8fbd6d44f11.yaml | 4 +- ...1684-89238e69360283d59cda9a307dc44ad9.yaml | 4 +- ...1685-d57b4e44c91b72a924430dae58b27aa4.yaml | 4 +- ...1686-179df283f6f4faa0dd973e427dd4bc30.yaml | 4 +- ...1687-5cee27767ae5190db018a1cdcac6e39b.yaml | 4 +- ...1688-60fd57f03f391911c0b737f75f701788.yaml | 4 +- ...1690-fcef50fc4ab0d04c6eb8673c640961fc.yaml | 4 +- ...1691-9f787a2ef36698ab9d958e79e9a7609e.yaml | 4 +- ...1692-facd15a60590ce98592dd0da5f942c33.yaml | 4 +- ...1693-3992d1400a14226b637a309e355d88df.yaml | 4 +- ...1697-b9bdab270fe39bf9e158152b28713054.yaml | 4 +- ...1710-1b768170ce1555d79635fdd71ff99339.yaml | 4 +- ...1712-1ad6aee2c1707dc46ec5695ab78feced.yaml | 4 +- ...1716-7fb9197171618e79a095c113a75de482.yaml | 4 +- ...1719-a742d112c80df865f27dc03fd5bad80a.yaml | 12 ++-- ...1720-1ab35ec2ada14325b98997bb858be8c8.yaml | 4 +- ...1723-dee8b4970935a0806a128f5493b5e0f3.yaml | 4 +- ...1730-b5d8ae30fccbde3a30e869d152e37902.yaml | 4 +- ...1731-176d59252e2a1ced83fc8440cad1b0f5.yaml | 4 +- ...1732-b2a85d8fd51446e550fee890b46b39fe.yaml | 4 +- ...1733-82ccd5e1aeac71fd905aec731ee6d6b0.yaml | 4 +- ...1745-3fcde9cc662e3ad45e20c993057641fd.yaml | 4 +- ...1746-9fed5404f994e2e62aad7f01b29dde3c.yaml | 4 +- ...1751-ee13651f12379100949dbc5d6ec901e8.yaml | 4 +- ...1752-bbb0e39e4c65975737c298f09a794bf6.yaml | 4 +- ...1754-9980c05da6f848a401a8e11f20123173.yaml | 4 +- ...1756-fc1bee3fb68d7c35aad200db5adf3590.yaml | 4 +- ...1758-c713f885667125d83707da22fe966bb2.yaml | 4 +- ...1759-5e4d2604a5e90cd0dc912e39171976ad.yaml | 4 +- ...1761-50ffb87c6ba7528dcf0d0be367e8a965.yaml | 4 +- ...1763-0f9348eac96a42ea06d72213f997cb8e.yaml | 4 +- ...1767-07a77988897e3af64d686b49eda84d8d.yaml | 4 +- ...1770-85f58ceac5f2aff68a6dbc6ee57ae093.yaml | 4 +- ...1771-e9ad128afe18da7565a18caa795c2ef0.yaml | 4 +- ...1772-6182145f7b993029088ccd0a82af0476.yaml | 4 +- ...1773-3f477473c5a3237b1cf487ce20b4000a.yaml | 4 +- ...1775-b5ffaf80d661d564c9b660398c6daa12.yaml | 4 +- ...1776-6038d8499b4a66981281a09913dec32b.yaml | 4 +- ...1778-338378bbb7402de89fbb870142f8402e.yaml | 4 +- ...1779-1c83a92e446554fa5dca6a3142ee08a1.yaml | 4 +- ...1787-45ed5bc2a620f7b73012888c5d094ada.yaml | 4 +- ...1789-4cb0701b6db05c073e2060623ec2f204.yaml | 4 +- ...1790-8d9637ff6f7495cd146495e0fed931b5.yaml | 4 +- ...1791-291a48e25bfa003aa951458172971d46.yaml | 4 +- ...1792-8c74a48bb6b992ea1d77056b8703ebf9.yaml | 4 +- ...1793-16c74e447f178d9a81be3266e07ecdda.yaml | 4 +- ...1795-fc942581b6d806c7e158aaa084482451.yaml | 4 +- ...1796-d97caddab7bd05fd7de5182cc29d4629.yaml | 4 +- ...1797-dea805289f838218c2f4999e6fa41c84.yaml | 4 +- ...1799-aec7b68517be6133995e008e368392d0.yaml | 4 +- ...1802-1d3dbd02fa5b7205872c8a687215c897.yaml | 4 +- ...1805-16bf911b12f5300e0830fe4fc1eb1ed0.yaml | 4 +- ...1806-0698a66e8bb0aa2a8b088a7a1889cbc2.yaml | 4 +- ...1807-65c990e02c196c01529c8a603f8098c6.yaml | 4 +- ...1808-5f9c4587b984a64216df76781ce699a0.yaml | 4 +- ...1809-70ab06ad0d2802465de5c71330534e85.yaml | 4 +- ...1840-9af98782950e2bb2fdcec622ba259511.yaml | 4 +- ...1841-86b92217e832cff4cd144076070304be.yaml | 4 +- ...1842-83ebb5cd5f6dc281ececf75915c27b14.yaml | 4 +- ...1843-5a61a27c8209633543dc7131ccce0c7b.yaml | 4 +- ...1844-83c485f2e43507746d6f598a094e8632.yaml | 4 +- ...1846-36493737cc718a786fc3dabd10944cc2.yaml | 4 +- ...1849-11af501cd400c11d4471a7dd2fad2f1e.yaml | 4 +- ...1850-9eed014edec42d5cd4860053e291ce89.yaml | 4 +- ...1851-67b32c2b2aa638ff335d272cd6273e53.yaml | 4 +- ...1854-61d212d2e307b78bf3e793271bc28e50.yaml | 4 +- ...1857-3a32b3729ec435ff7a8be0b786f133fc.yaml | 4 +- ...1858-e6650062a97ccf46abe2dbd6696321ce.yaml | 4 +- ...1859-091efbe9d1188b98a534caa4402e018b.yaml | 4 +- ...1860-1198314be1810779166a4e03d8729a10.yaml | 4 +- ...1861-52d5b418dd2173338819829d8805e340.yaml | 4 +- ...1862-754ce0f32f23ec71660fa4b4da98462b.yaml | 4 +- ...1870-7af76cb753c181fa25d318d1a52543d2.yaml | 4 +- ...1872-3e24dfff2b5771f43f4fe5ad4a241e28.yaml | 4 +- ...1893-7e74a978e0fcd8ce34e332a78ac6415d.yaml | 4 +- ...1894-a36b6c8064388eb19a8195201a1f8d8d.yaml | 4 +- ...1895-86218768d044c8a0a41ad3c63743810a.yaml | 4 +- ...1896-1064e143eb72cf1f7f6e0379aeb06d2d.yaml | 4 +- ...1897-b56d867b606b433de9a6f7e49a5d4259.yaml | 4 +- ...1904-55dfb8067a9d9a28485a43b25b96a7c4.yaml | 4 +- ...1905-96ab3b40e77e6543e8b3a6fdd1944579.yaml | 4 +- ...1945-2b5549b3c83c7777a1b6e0311c345bd4.yaml | 4 +- ...1946-81d04df7ff5b0fa9ae3cc7f6b2f9eb6d.yaml | 4 +- ...1948-860548571db1d3ac7f3a8905c5f28f8d.yaml | 4 +- ...1950-26d0ee067e8dc6608c7e062864b37750.yaml | 4 +- ...1951-bbfdb718b30267886c66b70ab8a80fee.yaml | 4 +- ...1957-86bbc19d9e21d4915eb630a058d87bcf.yaml | 4 +- ...1959-cf2b6bb9f998ed8bc8db5b63bcf57bd0.yaml | 4 +- ...1960-9d840efd84947ddae0da773e8bea6c66.yaml | 4 +- ...1974-c8bc0703f7a40b6110052093d1b42354.yaml | 4 +- ...1977-49049729ee40c19e1754ddd17e7749a5.yaml | 4 +- ...1978-5ca6e072da0718d54bf45a16b11714b0.yaml | 4 +- ...1982-70efeee5b28a1c15fdfabb1bea0a8d31.yaml | 4 +- ...1984-3f304f35d6ee539a7dae259777309bd7.yaml | 4 +- ...1985-59892014ec81eb27e2ab381aff54e186.yaml | 4 +- ...1986-da8ac31a9cff4acdc3e67efcf5be4751.yaml | 4 +- ...1987-e2f5ffd9a4d18c5b5627131fa4317643.yaml | 4 +- ...1989-c564c36d083131df8b70721d4380612a.yaml | 4 +- ...1990-03faf5c8e4483bcb72677008477fdf8f.yaml | 4 +- ...1991-7db9573a3e8af958ed29c7bf6f04dd8e.yaml | 4 +- ...1993-3d89fb86525a43be8c098b0f455b9af2.yaml | 4 +- ...1994-cc02f6870e1e296858d0d36136b32112.yaml | 4 +- ...1995-0d0a2f550b1652e990ebb3d0da6393ae.yaml | 4 +- ...1996-24ae12d6b29ac4b2b659477fd814db52.yaml | 4 +- ...1997-a6cbba6a06f8c16a716b48b44610ad62.yaml | 4 +- ...1999-7faa2f91e19a5cd476ef97768ff54f4e.yaml | 4 +- ...2000-7dae15c1486a66b7dbaca3afb1f366c1.yaml | 4 +- ...2006-c9946499e4c79e58a3887d0481784464.yaml | 4 +- ...2008-033ec25d9b806257f1f1c6f477525749.yaml | 4 +- ...2018-b55e1b34aba62c4a9df9aec2a27f5d8a.yaml | 4 +- ...2025-bf0f79649962d2d1514ad595e16e29b6.yaml | 4 +- ...2026-0585d1bea582d0ee6fb87cab95609406.yaml | 4 +- ...2027-426ec193e6b1f2e068f34932123c6dcd.yaml | 4 +- ...2028-03413c94281e9bdcb28cf85f17f56cbd.yaml | 4 +- ...2030-a7ecc95184b3ade18a4afbbf2cc86f31.yaml | 4 +- ...2031-f10237083d4fb8765ca105c0d369da21.yaml | 4 +- ...2039-36fca09be33f968137213dd9d8d406cb.yaml | 4 +- ...2042-a391f7553cca71ac204345c2d728e50d.yaml | 4 +- ...2043-561149d23bc984dc77ee30065a13dd2f.yaml | 4 +- ...2047-7a76232802e20b0ab3fa4ab939317696.yaml | 4 +- ...2079-92680d6145a8b866d3fbe1493fdcbbd3.yaml | 4 +- ...2081-3ced01544afaf258ab773262adacbb46.yaml | 4 +- ...2084-7648aa79e50b7fbff0359c4b0f9eb60d.yaml | 4 +- ...2085-d1cffa60eaefa9d562794ce4c0d0f8a6.yaml | 4 +- ...2086-d69e956d6cb0947d53013e6316065cae.yaml | 4 +- ...2091-214593575ac1d3e95584c0521e8c5928.yaml | 4 +- ...2101-f991f9853892bf031ebb72c811af6b0f.yaml | 4 +- ...2102-473ae39f2c9b117fd21ddfea3f742daa.yaml | 4 +- ...2108-9158a4f23cb6df7f396a1ff79ad04a19.yaml | 4 +- ...2111-33af423ffa646dbaa07cc6063b09bc62.yaml | 4 +- ...2115-b383deabc0a5d3fd85420cbb993138a3.yaml | 4 +- ...2117-97ebb96fdd3db87faf02d7c0a7e706c7.yaml | 4 +- ...2118-87dbe2addf6a62fa336594e2b679e9d7.yaml | 4 +- ...2120-25aa395084f363ecfd02447bcee9b684.yaml | 4 +- ...2121-5ecb61edb8f014ffed25792497a59fa8.yaml | 4 +- ...2124-9b9cbf166c5c9952b460a90920fbb492.yaml | 4 +- ...2125-6b955e7831b4476315ace7bb8d5f3ecb.yaml | 4 +- ...2126-46672cc6093b70f0f99b8c9c1af2d835.yaml | 4 +- ...2127-37e749759243317adc52896293ee760e.yaml | 4 +- ...2128-880737228fe55f5d920474a43f87af97.yaml | 4 +- ...2129-23e0e7010272bc0edbef97452d9c2437.yaml | 4 +- ...2130-3712f3d2b17172eb0c737744e9767b9d.yaml | 4 +- ...2131-ca90bdb25f0c955406427bf755373f05.yaml | 4 +- ...2132-825ff2ff95290127035d7fc582cf6f47.yaml | 4 +- ...2136-13b1426aee2c11f321401f7155b3cd3d.yaml | 4 +- ...2137-f92fdb8def6ac7c07ce14435754a7ffa.yaml | 4 +- ...2138-93b41408a78e1823934fe3d9ee7379d0.yaml | 4 +- ...2139-e3418f180f0cc9cfc471a66e2f29ee79.yaml | 4 +- ...2140-6a22eab260469991c892609c3554e5c2.yaml | 4 +- ...2141-b79883c3437a6dd7938862f157254782.yaml | 4 +- ...2142-909eee3c64db045125d6a0e9ea1350a2.yaml | 4 +- ...2143-74e928a44773876c1faeda39f648c8c1.yaml | 4 +- ...2144-71c8544bfd8e2585abc3fe4c509dc5e8.yaml | 4 +- ...2159-4d80f38d93d7f5f929f7caeb5348b571.yaml | 4 +- ...2165-e3109d7817fd480896a3a3bc464556af.yaml | 4 +- ...2170-12bc74e09861e7d74d799801df685593.yaml | 4 +- ...2172-504399029097a5e86b5ba9c9da19637b.yaml | 12 ++-- ...1743-dd16f95f6d8f39d62500d48f9193456c.yaml | 4 +- ...1744-e101fa87e9e9a3f0059378f1f396b6c6.yaml | 4 +- ...1745-ae9a6b8dc34a1a7bd8079dc738c03df9.yaml | 4 +- ...1747-1ecaadeb4176f89b0523e2b0bb90c06a.yaml | 4 +- ...1748-fad6995dafdb43e5ee26d12d1d4dc9b6.yaml | 4 +- ...1751-9593057fd73362b3675fc833e6f4bac6.yaml | 4 +- ...2181-46443215df27c06259cb9cb549f79f5d.yaml | 4 +- ...2183-c8eb6bc5db7f4876cb01e7f978c6ef1d.yaml | 4 +- ...2185-1453924550bc29c555e5d4ba1d470f33.yaml | 4 +- ...2186-6fe1ccb7efc24357409ad5ff0b713ab1.yaml | 4 +- ...2187-435ab56c3c78663cfa598710697f9daf.yaml | 4 +- ...2189-88c1256a33fa14ef83ca4797e8fc907d.yaml | 4 +- ...2202-7b1460489673c879f7bd7cd256d22891.yaml | 4 +- ...2203-6b109b8afc142f70c57afa63265ae2e5.yaml | 4 +- ...2210-712959520f4dede71b7a2d9e44002c33.yaml | 4 +- ...2134-905c45437d6ba639495cb537666e1306.yaml | 4 +- ...2135-bb5370676c8e655ad72a3791cdb04f1e.yaml | 4 +- ...2137-437bae7c2a82ed4347741e0e69e1ae61.yaml | 4 +- ...2140-b32ca2d76fc3293d68526cfa723e6bfe.yaml | 4 +- ...2141-47d88a978c6902943e13680f899b8407.yaml | 4 +- ...2146-62957aaeb6104548f77744232edc7490.yaml | 4 +- ...2147-20e967f496e19df1e9123f3c23d87252.yaml | 4 +- ...2150-20c420e00e7776a25487d5218d4e77bb.yaml | 4 +- ...2151-bd9f222927714cfcc0530ce81d7d73ca.yaml | 4 +- ...2152-d62fba94114c42d1399d83bf9ba0a989.yaml | 4 +- ...2153-56e0af85bfab5155d836999c55aea415.yaml | 4 +- ...2156-c34456b0a354174a8b99c79db450a526.yaml | 4 +- ...2158-635219c62d7cd225129022aedb4232a9.yaml | 4 +- ...2159-c2e59525aa8afa93502c3fb0824f336b.yaml | 4 +- ...2161-48f754f17606d4479811452c8745b0f0.yaml | 4 +- ...2220-978cbd8cd586092e7c39e28ce0b70684.yaml | 4 +- ...2222-7909b368603f8e81e96e69064ab1be28.yaml | 4 +- ...2226-eb48e0d7cc280c7a495d24563f61a7d5.yaml | 4 +- ...2283-c21b3a23e799a524e3a35bb5025290a6.yaml | 4 +- ...2290-521091f698c90705cd994fe26c1eef68.yaml | 4 +- ...2292-0c05bed3e63ebe0076e41774e5d167dd.yaml | 4 +- ...2295-21d5c5e61124efe0fdb8d063c0f79f9f.yaml | 4 +- ...2296-63b258c691616cbc41ef567bfa0329d4.yaml | 4 +- ...2297-3af00e1da087fccdad50b389a0a1a76d.yaml | 4 +- ...2298-7aade2b2966b32522e64422bd2ebd245.yaml | 4 +- ...2302-79d3f2b9565b075a8be7591881880990.yaml | 4 +- ...2303-8e2647d10010d639fca262268ba703d9.yaml | 4 +- ...2306-b9040953fd9d7380144b780f2d4080d6.yaml | 4 +- ...2310-f48987de7fcf2018d5328a03cdd21065.yaml | 4 +- ...2237-fe65855ff8de2259da21136e19e15ee9.yaml | 4 +- ...2238-3bfe779738faac39c2783a057e7fba45.yaml | 4 +- ...2239-b898553c18a3c26f0a1b011522df0006.yaml | 4 +- ...2249-dd731c24df053ea79b95f5153fe19979.yaml | 4 +- ...2250-85070818b2a0ed18993539089f99013d.yaml | 4 +- ...2252-e42d0569342324174ad2b7b5b34acfd1.yaml | 4 +- ...2255-65769acec1aefbf22b461433a4ab976c.yaml | 4 +- ...2256-31709e141c457255c2ab0ae7529088be.yaml | 4 +- ...2258-5ab78d017180c321a2a306a692c78211.yaml | 4 +- ...2273-f0d72e9f2bbc50f42260a8f158b94cfc.yaml | 4 +- ...2278-d0c7733d559f41b4b35373b971b25453.yaml | 4 +- ...2280-b4d70a86acec874506b4ab2dcb06e399.yaml | 4 +- ...2286-f0d3919ed390e73df44ed1542e1a826f.yaml | 4 +- ...2287-f1c3c3df1834bde215592ceeafa99ec0.yaml | 4 +- ...2289-97dd2eef8600f91fddf3cdf090566811.yaml | 4 +- ...2290-83e91dab60d5a445ab0bd5d25903d462.yaml | 4 +- ...2293-5d6957b18909422bd5f841b070340ee6.yaml | 4 +- ...2294-471be969472b8d0ef26e1ed1be3ca7b8.yaml | 4 +- ...2296-730408927df5a002660d3bc7f56fa1f5.yaml | 4 +- ...2298-6af7c3d9958b5f30ac2537a2fdf59735.yaml | 4 +- ...2303-2411b4426d78f7ca35565f6c5d4b0e5b.yaml | 4 +- ...2304-b8a793584d2186fb4e0aa8046771e551.yaml | 4 +- ...2305-42392b45ae66f65286752e395147b8a3.yaml | 4 +- ...2306-ea2d65615410e5461dba977dc309841e.yaml | 4 +- ...2308-1b9ddc8767486e6841efc7560084f93c.yaml | 4 +- ...2309-f1e3da63f99b2cc6fa2a68c3535839bf.yaml | 14 ++--- ...2310-12c0516e02b16dc0e022502178a348b1.yaml | 4 +- ...2311-c75774e4c2c9b9851693b07aeb2b25ad.yaml | 4 +- ...2324-fe85729fdce83d2abcd870326a089bf5.yaml | 4 +- ...2327-13ea368d9bd0647c7fbc9fa83359351c.yaml | 4 +- ...2328-458c0d6ab63df27e3e21cbe7fc77cfd2.yaml | 4 +- ...2334-1024fb2bb768926b2f10b7f06d6c4de1.yaml | 4 +- ...2335-3da99f6ccd8b569aa4895183dacec31a.yaml | 4 +- ...2336-c446e0b00a3a4561bee5779481d638d6.yaml | 4 +- ...2341-8913b61e532a835b143f97f633aefd8d.yaml | 4 +- ...2342-4875a2fe8d20d1fa49a472eba79255a0.yaml | 4 +- ...2343-003889b218e2b00be9012c017586c0d2.yaml | 4 +- ...2344-907496c3b43ef59b87d499ec04fd4467.yaml | 4 +- ...2345-16b2d22f9ed4777d1430ed12968eaafe.yaml | 4 +- ...2346-61cc715601cb540fc69b978e74da1091.yaml | 4 +- ...2347-4d6ff8c8afd1310bcbc6da555c1c2ca4.yaml | 4 +- ...2348-dd93174b0504049ccc03e08eec846159.yaml | 4 +- ...2349-4eb5559b22a18e9337a5880d5e2f32aa.yaml | 4 +- ...3500-73e0ed91223d9a0bf611aaf9c6ef87bb.yaml | 4 +- ...3501-b6e604dc0c4bb898e75726aff1be1de2.yaml | 4 +- ...3502-dd54abc9fa7f2f5d5c6010fa1c8c3d7f.yaml | 4 +- ...3504-208c19b89658d8f67c58a70365a86a8d.yaml | 4 +- ...3505-68faa1f3e16f9348cbcda9eee2cb1dfc.yaml | 4 +- ...3505-6fd235aefa59090c5fd7d5db3ca17c7f.yaml | 4 +- ...3506-6e954d80cfdd10ddfc11dcc5cbf99755.yaml | 4 +- ...3507-124137503555ee97714094a30a8333d0.yaml | 4 +- ...3511-53696e5218de6a7c32a3a9109583afd7.yaml | 4 +- ...3513-f53efc19e67fc15708f7aff7dc031f4c.yaml | 4 +- ...3514-935ebeacc0c73d89223e844fd2aaeaeb.yaml | 4 +- ...3516-3049339e7a57ef7848a40fe1f1e47b95.yaml | 4 +- ...3517-b0ee79ee6bfacccc5c859ba67a33f0de.yaml | 4 +- ...3518-ac40665ad4ef3b69656a095a1b2358ab.yaml | 4 +- ...3521-7145c40ff1e0db4687c083ce378fc607.yaml | 4 +- ...3523-0f93fc1c537d4354bd5e942ea05347cf.yaml | 4 +- ...3524-2498bc224a94ac1ba539a681f69b7ef6.yaml | 4 +- ...2369-fdd365ece4b9b292b937aee693d1c5a6.yaml | 4 +- ...3825-5d739fff0b557fdd4318a7044651d1e4.yaml | 4 +- ...2384-c5f695dbb7b3e9a0ae3b6a589e6824c0.yaml | 4 +- ...2392-10dffc5e6c324ec1dc8ebf67decddde7.yaml | 4 +- ...2395-b71f43cf539320adcdf753a5632e031f.yaml | 4 +- ...2399-ee8591e5f3f55c96d9835c88a6740c39.yaml | 4 +- ...2401-a7d2f24ba1d738c469db3701e7d249a6.yaml | 4 +- ...2402-7585bdd855a3ce213df577df1a0cf7c5.yaml | 4 +- ...2404-cca7855a039dbac1182b0b2fae34c3b0.yaml | 4 +- ...2417-a3ab87ca43ceb26b3f09e3ed0047a2de.yaml | 4 +- ...2423-467ae4d6a0b8db0e5b6c781618b2d3ee.yaml | 4 +- ...2428-ffd9211fd118d563cf07134a00f95502.yaml | 4 +- ...2436-85706ca0d20495fdfed005cc638cab53.yaml | 4 +- ...2439-c957720e1b76962412e197bc09cb35e8.yaml | 4 +- ...2444-b76f091c58ac292a18fb46e2a8af44ec.yaml | 4 +- ...2456-e96409adbbb169ea331189d4d409f4de.yaml | 4 +- ...2457-b0b1da93e1bc1134b2188925015af3dc.yaml | 4 +- ...2458-54dc33c4a20161d9ec4e865b2de44997.yaml | 4 +- ...2459-58b2abf7cb460597ca6a6d20fc9fbdcc.yaml | 4 +- ...2460-778205eb09884149dafbca785f8423fc.yaml | 4 +- ...2468-f70dc70f946daa66696d6fbc7263d880.yaml | 4 +- ...4704-d42480a2d6aa4bbbab085fa708ce9549.yaml | 4 +- ...4707-62e4a961ffac0b881f8af1cc15505b69.yaml | 4 +- ...4709-71a9b86af5e18a20f6a7538c29ad1df9.yaml | 4 +- ...2471-c4af1e64fbcb95f3b91e16ac0f449bf5.yaml | 4 +- ...4710-59dd174ba212cc11295537a27e4487d1.yaml | 4 +- ...4711-f4f0c2c884affbdbf175616a0bb1ff76.yaml | 4 +- ...4712-132f29f7cba1678c467fb85b9d9b820e.yaml | 4 +- ...4713-8b6ee3af1a9508cfbedefd1fe07951b6.yaml | 4 +- ...4714-8140a3945a877628cd9d34a767c59437.yaml | 4 +- ...4717-362ca4d6e33d614fc53fac12799f63e4.yaml | 4 +- ...4718-453cdccb9ec27998718a08f552017bc2.yaml | 4 +- ...4719-33149871db85e014a52f28e4a7d38f17.yaml | 4 +- ...2474-b00282494ef0f9932dc7277c14e145b9.yaml | 4 +- ...2475-1071684e8b4fbe11ac61e0256dfaba92.yaml | 4 +- ...2476-e5433fd914f5f7bdfa5093c95eaa7f18.yaml | 4 +- ...2477-16a0db053a94923b7846b57810e1f6c8.yaml | 4 +- ...4796-2b95a61584d1fb1af349c6d1aaeab17d.yaml | 4 +- ...4799-26df4386152f6b2123dc8be12dc2c025.yaml | 4 +- ...4801-881bf0ba98d7fd08888e0831b881248d.yaml | 4 +- ...4803-c2d16b936c79c5f7cc118ed34032bc44.yaml | 4 +- ...4804-d1c63a8bf0beafb1c82149091059ec86.yaml | 4 +- ...4805-65d839a96475e08e7231c85cc5b59ef7.yaml | 4 +- ...4831-7346b5c5cde69749b42ec0dfced7a750.yaml | 4 +- ...4833-857593f7e35e0afc65d726bb57f2b738.yaml | 4 +- ...4834-a16906c099275dafdc8327b1b913b90b.yaml | 4 +- ...4835-b9712f471d4d13ca925287df646b0e0b.yaml | 4 +- ...4836-aafc1366408bf54fb9b81d829a07db37.yaml | 4 +- ...4837-bb1647b449a57413306bcf1ebbfb2090.yaml | 12 ++-- ...4838-600afe426493b29bf5509da4cbb82add.yaml | 4 +- ...4839-b00e5b46c74081e9862bff90f3aaef92.yaml | 4 +- ...4840-a5718896caa8539c5806c104b13a2ecf.yaml | 4 +- ...4841-073e94466d93432fc20ff7757afbfb89.yaml | 4 +- ...4848-061a0160582ddd92c54f532180e67c97.yaml | 4 +- ...4850-bf3863997447d609f7f8dc8d30e7d4d2.yaml | 4 +- ...4865-b33caca512f21869a1112d26d070a67d.yaml | 4 +- ...4868-2d5254568244460078b2f5ebf11d2614.yaml | 4 +- ...4871-9f5f23c716774bbd462d447842ecf871.yaml | 4 +- ...4880-783d77b98a5b328f4a28ee2d5345a1f8.yaml | 4 +- ...4885-b2ee5069c05c98988181a6b0620a514c.yaml | 4 +- ...4886-3ec6520097de3a68210e828e99c83fad.yaml | 4 +- ...4888-1ed8420474aea4653c484035b79e8e05.yaml | 4 +- ...4889-bef2b57812116d5514b05222293f3067.yaml | 4 +- ...2491-b041552e80a8d76e86ae11341bcea94f.yaml | 4 +- ...2492-1e3008e9a413fca6d1323b62a2743a7d.yaml | 4 +- ...4928-c0ae11bcf65a3a05752255a9835cc822.yaml | 4 +- ...4930-b4d222d7f6fbba49026992c33a4f820f.yaml | 4 +- ...4931-c52273b2cf56d5474ff79f10bc5133f6.yaml | 4 +- ...4934-fa47ef3a071af26f7cb8467307b46f4c.yaml | 4 +- ...2499-a40320a58f3885e7d8eeeafc625b97f0.yaml | 4 +- ...2500-be833eb15318e91b50173179ef1ced63.yaml | 4 +- ...2503-f6158c89533171b67393d05399849800.yaml | 4 +- ...2504-a19b0ea5f3c4659620b13f7e795adf29.yaml | 4 +- ...2507-600dd698b59252da2334c219e30a3a4b.yaml | 4 +- ...2509-e67596c37a8f5cfdbaa53a0b072da6d5.yaml | 4 +- ...5092-87df5cc36f24c1b7dd693537f9d2db36.yaml | 4 +- ...5093-96454af8a6ce5f0b120ae58c0cde8af3.yaml | 4 +- ...5094-14d59d1dd0d6c11dea03161b864cfb49.yaml | 4 +- ...5097-a904a832d065a78b4632aa6c156ad613.yaml | 4 +- ...5098-d431a2f9901a2f7f0f42332dd7577612.yaml | 4 +- ...5099-9b90abd6d830325819c48ecc09f52c5d.yaml | 4 +- ...5101-87058e9c1b26afbdd8a6e1c7e1f576f5.yaml | 4 +- ...2513-15be6de4677a81d9742115b7d4dbf93c.yaml | 4 +- ...2536-0412effdb25dc1c079b5ac901ba8eb41.yaml | 4 +- ...2538-48da01905911b9839c3e0f5a4a5539b0.yaml | 4 +- ...2539-0a02674a461ee92c9bdab38333dc64d2.yaml | 4 +- ...2542-22880b987be0b07f46689049fd2458ff.yaml | 4 +- ...2543-954c99838450703e2f9d2a807b32e669.yaml | 4 +- ...5592-2c732f7d3e8ac28c93dbfa9cd10c3d81.yaml | 4 +- ...5593-320cc739be80667a41b7c33bc9c3ac5f.yaml | 4 +- ...5594-94a42c523ccdb6324d7b897f6e9c739d.yaml | 4 +- ...5596-ccf7ae7c58d11c91be50450cab57d66e.yaml | 4 +- ...5597-c2f057b1286b0479a330a6cf26c60c67.yaml | 4 +- ...5598-c2bef3c139a7a3ae094de8e562cf6429.yaml | 4 +- ...2578-245098f6b0653f99e8181fe1d0b4d9ec.yaml | 4 +- ...2579-421ea02f0f2faaa78ee159ebbd1f2ea2.yaml | 4 +- ...2580-d18e40088a787bdccb931530c8848277.yaml | 4 +- ...2583-40c38cbf6914f34e30e735daee9d90f9.yaml | 4 +- ...5902-65d716f9ae4f07532a2c4f0b876ee91a.yaml | 4 +- ...5907-2da7a3f2515edfb050506d62d2d86fdd.yaml | 4 +- ...5908-a0b0c399b7514c70fcf0e05e68ca4408.yaml | 4 +- ...5909-1196705650803cf1c8c204bb4b542a25.yaml | 4 +- ...5912-aa8a8d1534c979b4a72d9c8bec09fbff.yaml | 4 +- ...5915-f9cd598e625ead7b114953b55ded2f31.yaml | 4 +- ...5916-0fa49314c689285a17b374209d3a5887.yaml | 4 +- ...5917-c10fda9bfdd3663d875e2a0fc2207f2e.yaml | 4 +- ...5918-bb8913e248b8c353b00d004e9ca5f930.yaml | 4 +- ...5919-d21e7c2b8075bc32648e9e728716b83f.yaml | 4 +- ...5920-84f2aef7f11acfd2b73b896d3ef7cd04.yaml | 4 +- ...5922-bf0e4365c0a80682381fd05937032a09.yaml | 4 +- ...5924-0a08727c9a8cc242989bfe2a49030a2a.yaml | 4 +- ...5926-bcfdb3c82ae0485dc6fcdad4aba69c36.yaml | 4 +- ...5932-ca722f2c2467f4f9c95321209d16faa6.yaml | 4 +- ...5934-240756f87690e8bd859858034bc8c975.yaml | 4 +- ...5936-dc226a4fd8674625d0b38158fd388bcd.yaml | 4 +- ...6019-57cd30237a115f155e6a16a851952284.yaml | 4 +- ...2603-0bea880f7043c5054d61f7e9d6ba4d2f.yaml | 4 +- ...2623-b4aa2ee32c8d094c0d7d3b9c1a221104.yaml | 4 +- ...2650-d621d242ab564fd8e6e924445af60a72.yaml | 4 +- ...2654-f02efca96aea9cf0bcb75d72789d8419.yaml | 4 +- ...2655-a2edba0b6f9194a358b22756bbd79a75.yaml | 4 +- ...2656-9fe142798845207512b358a2cd4c8c4d.yaml | 4 +- ...2661-3fe433fa04cbd74a4139a79417d6ceaa.yaml | 4 +- ...2662-a4e1a6eed6af75293ee8acc33aa5bb7f.yaml | 4 +- ...2664-5f4d629f81f40ae82d44c4c8c94e12ba.yaml | 4 +- ...2665-07fd6d4168c19a2706208ce105fc7279.yaml | 4 +- ...2666-9196735e9e9fe6dd44235b7e0a53bb60.yaml | 4 +- ...2688-1fc5887f904fbbe1b31241f4769801b5.yaml | 4 +- ...2693-c53a6d31c98dcde7fc34b4079f07942b.yaml | 4 +- ...2702-5d017f957b0d5736d3f04d80942cf97a.yaml | 4 +- ...7188-59a7cb3ce7ab42429819a5af71285080.yaml | 4 +- ...7189-877e1c3b42118075385c29c980e6d4e6.yaml | 4 +- ...7190-43eedc047028750edf0998930243bbd6.yaml | 4 +- ...7191-5621a7def81227d66a22e352451dbd2f.yaml | 4 +- ...7194-7524f5b14f92599cfeabd0dc20123b14.yaml | 4 +- ...7195-b5016fe0cbf526aff24bd66f2a8d0464.yaml | 4 +- ...2729-e70c973ee52c3a8cad3d00694281c5e4.yaml | 4 +- ...2732-6d39c5dd9e079ccbe9ac0c1a99d74a94.yaml | 4 +- ...2733-8e1e2ed917edbc0807da4afd84ddc7ed.yaml | 4 +- ...2734-1c83761e8850a90348fc378dc1547a09.yaml | 4 +- ...2735-7f9f186670238d7e784b2f81e1301181.yaml | 4 +- ...2736-dd7568e4d3ea5ea32920ba4a6563336b.yaml | 4 +- ...2738-8536531e312b5b608fd436fcd26ad3ab.yaml | 10 ++-- ...2744-13599838064c197e9952281d09390ec7.yaml | 4 +- ...2750-dc46778586f851feacb609ba4df93bd9.yaml | 4 +- ...2751-b68fc6d974fd5ff5ec00e24e4a23388f.yaml | 4 +- ...2752-324d03958cfaceefa9e17d53cf4690e2.yaml | 4 +- ...2761-cc71ce3f07c7a7f6d2e0e309f25463b5.yaml | 4 +- ...2765-7f5926ab268dbc1681fd3a5de983583a.yaml | 4 +- ...2781-4227a0d8303b8be51d7b7784befed50f.yaml | 4 +- ...2783-b5027c0ff3d1a1043ee2d2b4a208d677.yaml | 4 +- ...2785-cd4c918fd5ff72f1664fbf0ef99c4299.yaml | 4 +- ...2786-e18fa2425147eac664779a4e7540108b.yaml | 4 +- ...2787-40e8b36488a6eac28e891fecfb75c2fd.yaml | 4 +- ...2788-3ed56e73a3a43b54020334fdf48e4e7f.yaml | 4 +- ...2789-47a1a7c3503abffa7dc09bb7e0a3a05e.yaml | 4 +- ...2790-8dd7019aa8a80d139d621978f8455f94.yaml | 4 +- ...2791-4069751e80b8d8e6ebfbb3d8b76ab1b9.yaml | 4 +- ...2792-ea8fafa1914b33a7541d6d71c9272dbd.yaml | 4 +- ...2794-b24d1d3e12abe16b131b78c39c76f1e6.yaml | 4 +- ...7949-56de812058629ef41442e0db5d74e172.yaml | 4 +- ...7950-20f2364245cca99badf62beb26ca57f1.yaml | 4 +- ...7951-410043251186f9da5efcd4c944487f1e.yaml | 4 +- ...7953-d5383d4e717242611eb588cd04425c5a.yaml | 4 +- ...7955-90f8c1652860b9223ed16176900d2afd.yaml | 4 +- ...7960-61d643ab5e58be99a89f898a95037035.yaml | 4 +- ...7963-2b1c5b57df30a34984198b5c1016c519.yaml | 4 +- ...7964-79737b0e5975df19862e5152b14611f3.yaml | 4 +- ...7965-6ab516426049dc622ee1b94cc628b61c.yaml | 4 +- ...7966-63d1e14f304a4cf01bbcbf655abc19a8.yaml | 4 +- ...7969-d82977967e8370fff3f7aa446912e4fd.yaml | 4 +- ...2797-72b3ee0aa0ee9a6370b95e5e332c6b93.yaml | 4 +- ...7970-492dc981351dd6fd004e149962bdd870.yaml | 4 +- ...7972-815613664281ce9641a420b93ff49909.yaml | 4 +- ...2798-af78f3c1214fac33b65ff5feb5cc1cdc.yaml | 4 +- ...7985-0e504336a10f995a3d5ffd0688becb4a.yaml | 4 +- ...7988-c849c5ba3c9b4616d8436c9196e9a011.yaml | 4 +- ...7989-950a4b8c92825a575ac3cedca47edcba.yaml | 4 +- ...2799-234019268f52489cd57bd03c8706abb6.yaml | 4 +- ...7990-fb202acb909978e8641eabe44749f8ea.yaml | 4 +- ...7991-1e4fd26a738e660824e15332d3d7697a.yaml | 4 +- ...7993-be21de51738bde44b4ff85eb79707aec.yaml | 4 +- ...7994-27280f97d7c2f094c66e491abb0e38cf.yaml | 4 +- ...7995-77d3a7baf2067b9573aef8e72c5d2033.yaml | 4 +- ...7996-643403eb7ff5706c9caf1f0a5a756401.yaml | 4 +- ...7997-f7c4402196deebd8e7afa93ed50fb9fe.yaml | 4 +- ...8003-fc3a86631dfc485c0a87a802663d412e.yaml | 4 +- ...8004-21f9461e5270818af4357d314ab90f57.yaml | 4 +- ...2801-248ab13a1cecf5e500d9ad5e3403c1b5.yaml | 4 +- ...2803-8951eb99c398a311cfe985bad4ff4e0c.yaml | 4 +- ...2830-f897c75665f54f7b712469c3a1014b0b.yaml | 4 +- ...2831-2ac1b11dfdd4d8aec9aef19739eee675.yaml | 4 +- ...2836-46d7cdc90f6e4788d19f634ed2b57174.yaml | 4 +- ...2837-45fa634ab986eb98d5523af1f02322fd.yaml | 4 +- ...2838-7d701d3a30fca3143559ca73fdb370ec.yaml | 4 +- ...2839-3bb3b1b877c8539475d5edd92db3636e.yaml | 4 +- ...2840-6039d2569df090d7d3093a78e0441287.yaml | 4 +- ...2841-46f9477f32da89d305905e8493b5f75e.yaml | 4 +- ...2842-b4ee9cff24049609b5e28a42cf47dee5.yaml | 4 +- ...2845-757fc98134d873ee7c2bce4cfa1cf695.yaml | 4 +- ...2846-364c4ddc9c54073c09edf9a8678d0eaa.yaml | 4 +- ...2847-8e67911649c9d62ea26bf9814db29d96.yaml | 4 +- ...2864-deb298ce4863a239756c2bf229347f46.yaml | 4 +- ...2867-77904fe78351f83bbdf488cb644ca3d1.yaml | 4 +- ...2868-00621ef6c76184f88ccca1414d74fac7.yaml | 4 +- ...2871-eb721251db16f750bb7b6d9b4bcc4dbd.yaml | 4 +- ...8850-ab25c765042411f076e2c34c06b3fa2a.yaml | 4 +- ...2888-55e2a4b9a97cda212301452238552f00.yaml | 4 +- ...2889-fbce84a8ee57be3789217c9b7a75a712.yaml | 4 +- ...2890-6b17719b7745b3293d6a68a531034051.yaml | 4 +- ...2906-74ed56a742e6bfe4ae7f688057f0e58c.yaml | 4 +- ...2907-0fe1889336697580123eb1971e124832.yaml | 4 +- ...2908-62601b5430c03a6d792da3905efea1b8.yaml | 4 +- ...9089-414dd30601a3a8e396da28322c360c9c.yaml | 4 +- ...9090-f6ef0668f114bdc3d35c493842c984d6.yaml | 4 +- ...9095-c2ad47353175f44f004de63cfd387b37.yaml | 4 +- ...9096-df39b25c059b85a56edd3d99d606296d.yaml | 4 +- ...9097-103b877d6c6654d012dcfb8c68378ae3.yaml | 4 +- ...9098-d827c61ecd6e1b49bd9f088b6451ceb2.yaml | 4 +- ...9103-406a8beae5e2073e89eddace606a906a.yaml | 4 +- ...9104-64923c9a5ffa9c7e5e2ff84955e346c3.yaml | 4 +- ...9105-2aa273895136d445a6cf0ea6a1d06c8e.yaml | 4 +- ...9107-19c52dd7e875a0e50693de27a767788f.yaml | 4 +- ...9111-d10ca8810c9a238a95e8c428f2cea03d.yaml | 4 +- ...9112-ac3cdb02dfa19f5b0080855ac08f88be.yaml | 4 +- ...9114-c1281bc3be6489439619d6a7c7e1abac.yaml | 4 +- ...9115-0f96dcc46121deff356e0d1a5d840b39.yaml | 4 +- ...9118-d8b5bd57572fb9305d66b7bd52b02101.yaml | 4 +- ...9122-768117af17895fd2573e769996b5a89f.yaml | 4 +- ...9124-1c25b9d9b10bd77a049e735bb0a8965a.yaml | 4 +- ...9129-453edd08020fcb6cf7997bc23916e6f1.yaml | 4 +- ...9134-f0ebaf7908d2916224db8f5d1ff59d88.yaml | 4 +- ...9135-98b35360d65753a713db3a25c694f42c.yaml | 4 +- ...9136-edd8e3c62f3b71f626ad36553a59802b.yaml | 4 +- ...9140-9d05bf270be054dfc1695e62a3911511.yaml | 4 +- ...9141-6736ec787d23e7bd8e0a13fc8e0e88d8.yaml | 4 +- ...9143-8f38e1cb39832821632517021044a8d0.yaml | 4 +- ...2919-ae54bb23e01b89e4ec06d2fb932844c4.yaml | 4 +- ...9220-ba28eba12a04215286d701e542084879.yaml | 4 +- ...2923-ff7e8af2c4256f9a091a352140252d3e.yaml | 4 +- ...2924-20f6bee077964f1739b79a57d0927952.yaml | 4 +- ...2925-49f8c3ec41639ad41107106a61b3b652.yaml | 4 +- ...2936-49b75b404a9ba001add19a1df795abd7.yaml | 4 +- ...2946-925ecf8dc9bb2b2baefb9be7dfe4e0e0.yaml | 4 +- ...2948-46a2cdc68c7e07f12ed856fe3a47afc0.yaml | 4 +- ...2949-6ae6ba71c1c511094e234e44db33e39b.yaml | 4 +- ...2954-8fe65facf4fd0cb40e8b7fae00de182d.yaml | 4 +- ...2956-6d7a079131a28ced1afc399eed5de96c.yaml | 4 +- ...2958-59d35e08e05da774933855f91366b645.yaml | 4 +- ...2962-68d0e40bde0f989b020b573553c376d1.yaml | 4 +- ...2963-e23aa6f9657419fe19f8c4bed7c9e59d.yaml | 4 +- ...2967-6d00e8bb2297cf89cd61e97ee33f9584.yaml | 4 +- ...2968-f0134606fede470163532ed054b5ffbb.yaml | 4 +- ...2972-1afdb113a8eb638275401757c0567e46.yaml | 4 +- ...9761-1387aa003d8d347fdc448b66fea447f4.yaml | 4 +- ...9762-aedb89e2581210acfc64d10b1fcd7670.yaml | 4 +- ...9763-a210c90325ac6434534abb97976ad7c8.yaml | 4 +- ...9764-49b132283a9d5d5c8363ef530fb522a7.yaml | 4 +- ...9765-098bdb5ff12e782e87bacda8082a6346.yaml | 4 +- ...9766-2d2a726dfea1c83cf2d93df104a8c8d5.yaml | 4 +- ...9768-069688784bb13290b6aea0da4a233825.yaml | 4 +- ...9769-6a48e7c9d0ebe158b3f7430c9e7962df.yaml | 4 +- ...9771-e474bd135ff4b7c6170c11705966b7d8.yaml | 4 +- ...9772-c4c3dacc97e2d49842f4e491e4abe511.yaml | 4 +- ...9775-d5fd81597164f2848144dc46b48d8bc3.yaml | 4 +- ...9776-3bc30bc01f7305f10a41312e9c39291f.yaml | 4 +- ...9788-5b013c9961d2008bd8c1b51839f147f0.yaml | 4 +- ...9789-5fad00879c22741100673bb27b7a3e06.yaml | 4 +- ...9793-ef3aa6c6954785fff0d13c0cd6f5cb85.yaml | 4 +- ...9795-babf60986b5038101853937d0a274e12.yaml | 4 +- ...9796-ac9cb365e503376aa31ed761706bf88b.yaml | 4 +- ...9797-0ddb5ade9834993cf7b74808814bcc80.yaml | 4 +- ...9798-b4bd8b09c6fbcb29788bc8bbefcbcdc0.yaml | 4 +- ...9799-b0298fb4feee8bd9ed9da9efccd4ef90.yaml | 4 +- ...9801-5800bdb88427729dfe9beda3923c95e4.yaml | 4 +- ...9802-749aff0fcc167e558bca750035ba1596.yaml | 4 +- ...9803-783b91bae7d265f558a1870f59bc1ef0.yaml | 4 +- ...9804-0cc8ff0d29654f0f83c0bf1830dddb43.yaml | 4 +- ...9807-6970693f733e5a846cb7f76630b73d22.yaml | 4 +- ...9811-ced2048e66568ff23a7c9306db5ed20b.yaml | 4 +- ...9812-ada9bfaee2bdcdae8c612fda04e8585f.yaml | 4 +- ...9813-ef918f495b11d984490181ededbf81f0.yaml | 4 +- ...9814-776b8b2ca961da26b6b406dc75d9298e.yaml | 4 +- ...9815-f5fc5ba02aa4560ef332189f36172c97.yaml | 4 +- ...9816-4246ff71c6ef488c4b4e4889ffbb362f.yaml | 4 +- ...9817-c364b3be5ae879c7f6b82ff2d4ab8d09.yaml | 4 +- ...9818-e39a71ad2e4c4fe07f9341861c3e2c8f.yaml | 4 +- ...9819-450b5eb205eb4e03e4e00eea052c76d9.yaml | 4 +- ...9820-439e5eee55387eb3328692c215048cd9.yaml | 4 +- ...9906-cd3ec729b30fa6c24f2c8dc5202be75f.yaml | 4 +- ...9908-baef1d0e01440a39ac30bd5826a2469a.yaml | 4 +- ...9909-d60ef1067dd86b18895f878c5b5156fd.yaml | 4 +- ...9910-7156ef80890822c55e70bd957b9a6411.yaml | 4 +- ...9911-e068f616c0efa424554358743fa4c2b1.yaml | 4 +- ...9912-9fca0dd0c7f34e6a746c8a219eb28b95.yaml | 4 +- ...9913-57be4142bba97742b3c54d88f289eda5.yaml | 4 +- ...9914-b90da7474429ff0560b494c992f7386d.yaml | 4 +- ...9917-313b605e10bb673c24b20248a65978eb.yaml | 4 +- ...9921-a442b3cb4140cc0565b34b0085780b5e.yaml | 4 +- ...9922-3adbda03e672466ae4cf2477d48f1715.yaml | 4 +- ...9925-2f1e25e867c081cf048f4dbc7240dbff.yaml | 4 +- ...9926-898754090db0c7c53df1a53b0a6b37dc.yaml | 4 +- ...9927-b1e2122cdc23a9d17ef80227bd4601b9.yaml | 4 +- ...9929-678114ef3e2b187e51ff0be3e7f2cb83.yaml | 4 +- ...9930-306b847d2e6035c47912eb7c67152660.yaml | 4 +- ...9932-407035e57e51b9b24244b7b6677f36c6.yaml | 4 +- ...9933-1b71c9c29fdfc5dbc008529fa648dbe1.yaml | 4 +- ...9934-b5ac41047b1437d9d41eb11c7b522d30.yaml | 4 +- ...9935-e224a4cb8b7e311ea14d699136e59c51.yaml | 4 +- ...9936-026772a7c84514935eb2f122e1212bd7.yaml | 4 +- ...3005-c82aa7ec69ca20e438896d99f7ba7b77.yaml | 4 +- ...0177-34bbbe6df5443652a8ecc2885cf36469.yaml | 4 +- ...0178-7a5d96cd355dcc2c5701c024f2ba7043.yaml | 4 +- ...0179-8b94055b335b8fd181b35e0e5b73b692.yaml | 4 +- ...3018-b90105c25730b4d746a6acc92069913e.yaml | 4 +- ...0180-5e1243e1e25d813c82b94fbe494798e2.yaml | 4 +- ...0181-95d961d91144502a2fa4a99f5da6e669.yaml | 4 +- ...0182-54345d40684c0a52baa3c3ff4f72b60d.yaml | 4 +- ...0183-eb66f71390c85b359c35c7747a93043f.yaml | 4 +- ...0184-a665c3284fcafde64dfe52ce15a964ef.yaml | 4 +- ...0185-e0e7d7ae87e3b7c89bbdeabc1a752e7d.yaml | 4 +- ...0186-58cf3685b6d061649f14b9a15a1de69b.yaml | 4 +- ...0192-565c3a27c2a7060808c53a2711e80a32.yaml | 4 +- ...0193-dada2db55c799a5508c295a160b1fcaf.yaml | 4 +- ...0197-5b5631c6755ba3e58cfcfbe9ec90f71c.yaml | 4 +- ...3020-91917d1d663ea184f4f2f69e04c99474.yaml | 4 +- ...3021-ff23d770fb11fdc3c77523a1486cf3a6.yaml | 4 +- ...3022-65f544c282d9d1cc0fbf1f6438a4d682.yaml | 4 +- ...0222-fe13beada39d84f2847878b7d4da45e8.yaml | 4 +- ...0228-59d8f9139af0fff2996b4a871907966d.yaml | 4 +- ...0229-87bce74e2816b9152b22f0db777f7371.yaml | 4 +- ...3023-59df5359f3dd97e1bd86b18fcb289b4e.yaml | 4 +- ...0231-ab754796885789e2785d22756395f374.yaml | 4 +- ...0232-007d55abdcc3037b38fa1f4866ebcef6.yaml | 4 +- ...0234-dee36755177c71d5de078f0f334f5c8c.yaml | 4 +- ...0235-2428c4eb87b4651b0b610c5b37e29f17.yaml | 4 +- ...0236-1fcba72eb855bf7a2b762f45f8e9327d.yaml | 4 +- ...0237-63a1aadd7fd62f660af4d37169d1f541.yaml | 4 +- ...0238-534d85fc0380423c37750b4f71b369b0.yaml | 4 +- ...0239-51be17f4121e81eef8733d9b91f0a025.yaml | 4 +- ...0240-dc0d3deddd939ceb7da2b7a2e45dc103.yaml | 4 +- ...0241-4ca548e170bb0185c3dab51f55775413.yaml | 4 +- ...0242-23ce5fe03a72b8b92f4c0373c289ac85.yaml | 4 +- ...0243-8904938c0e9840b0a2511b1de74ee529.yaml | 4 +- ...0244-62fad85c6fa5b7fb3d8634d94c62f43f.yaml | 4 +- ...0245-2701fe0e6794c06d119a81cdcc54c2d8.yaml | 4 +- ...3027-7fcf2911100968a88895e890aa0259dd.yaml | 4 +- ...3030-05ea715911776cce9345bba9207f2978.yaml | 4 +- ...0422-8305b529a6785da6470d8457740ff920.yaml | 4 +- ...0423-9167001bdde424000d6bf79c1d596a20.yaml | 4 +- ...0426-70740ef575420bdce3307b7d6efb0e97.yaml | 4 +- ...0429-ac7ff3acb8eeb83f868977100c1901f2.yaml | 4 +- ...0430-2021aef7227818f1c21db36c31bdbd79.yaml | 4 +- ...0432-f176e53a42ca2011d6f5c8a03ade6f30.yaml | 4 +- ...0433-050701771ca0e37751fe39d80669e4d1.yaml | 4 +- ...0434-0f98500a56d8bff1fd15d46c8720db00.yaml | 4 +- ...0436-a85aa1b9a47ecb9d1b901a00495b06ae.yaml | 4 +- ...0437-c115c2b38773f756d29db80a784da83d.yaml | 4 +- ...0438-2ff60d0958c013f69d2bb2b8a6cd708d.yaml | 4 +- ...0440-9036b0b68d189e2a08606b1361a322c6.yaml | 4 +- ...0443-7cf1733a0fcabc72e1599e5c6fa6e184.yaml | 4 +- ...0444-c982dae5e8a9922c1cd4de17c56c6264.yaml | 4 +- ...0445-d0db52345c07a6211225ddd6537e55c1.yaml | 4 +- ...0446-6323dfe519d667ba98cb2cb3a674b49d.yaml | 4 +- ...0448-d94ab49d4d8adfed309a34be052981f9.yaml | 4 +- ...0450-e82baab8930846897895cd56a53f4176.yaml | 4 +- ...0451-682168a7f6b8d8c54e16ca072c08d0b8.yaml | 4 +- ...0452-1320225def4406c9e713cc329abaeb70.yaml | 4 +- ...0459-77df5424b8737ee4b8f9f9f20e1fee34.yaml | 4 +- ...0463-3174ef274fa543dfe91589efb1d4f079.yaml | 4 +- ...0464-9590c9a713d41dcccd250e79c2d68a75.yaml | 4 +- ...0465-822954310f58c5920d9c99a5b8f20e8a.yaml | 4 +- ...0466-405af1244e8e91b41a724bfd16213a75.yaml | 4 +- ...0467-86a5e7d3d7ed00baf83310ad8f227a5e.yaml | 4 +- ...0470-982ffbf6beec794e0b1ae79fe9b1aaa9.yaml | 4 +- ...0477-db671eee30eadb2b3e6d738cfc02d4cf.yaml | 4 +- ...0478-5eb89c28ff961004bce910abdba4c1a6.yaml | 4 +- ...0483-dfaf8f13c7a5730a90b10c23bd27623b.yaml | 4 +- ...0484-f0986ec848116bdaf85ff2fe79a684cc.yaml | 4 +- ...0485-b7d8017025d96230e362095b35be8556.yaml | 4 +- ...0486-15ea5684525ea85792493d1e42c50ee1.yaml | 4 +- ...0487-48b15a3295f54b70d085f78d5d278b00.yaml | 4 +- ...0488-1c48bf4d484ac338c2e58423c802cdcb.yaml | 4 +- ...0489-55c899bce76676ae0bd2f27011d06ab7.yaml | 4 +- ...0491-865589c83192a271d43a839d1c2dd482.yaml | 4 +- ...0494-60929a68cddca1a94650b63066730255.yaml | 4 +- ...0495-32c41bb49a17f6a6d495a0dfbe10790b.yaml | 4 +- ...0496-7e6a3b2c412bc3d13ddc87f480a49f5e.yaml | 4 +- ...0497-00eeb6c21c5d722501b60770e277f490.yaml | 4 +- ...0499-aa8353adb3620cf0044ffd866cd1ea46.yaml | 4 +- ...0500-c805577cc74fac959884880eefb7ff71.yaml | 4 +- ...0501-9ecbfebe7e10d279275667a070df122b.yaml | 4 +- ...0504-12373fb4bdec1cf1197ea716e420bdce.yaml | 4 +- ...0505-dd67ce4e359afe3a28fa3105db87a235.yaml | 4 +- ...0507-bc5e92508a73c7bd5e881af5254740d1.yaml | 4 +- ...0508-e2b770c20c0fc55c7a4f89e727dd45de.yaml | 4 +- ...0509-eb3ea92b0c5a4b0e8e1f707fd264374b.yaml | 4 +- ...0512-38f8a2f1ccb6fa8679c01ae474dc43d3.yaml | 4 +- ...0513-8781e1672be1a467451ab0b40e4c7713.yaml | 4 +- ...0515-644174d3b6cb573b8ad1e776e7aafb01.yaml | 4 +- ...0517-3f5afe1c06de95e459f12d16b7792b0b.yaml | 4 +- ...0519-6765d661ee89fff8539766bb02e51a4e.yaml | 4 +- ...0520-894cd49c8916bb82c60619f3c2cf8165.yaml | 4 +- ...0524-8b4bc04c0594b1b6d09d20b68880906b.yaml | 4 +- ...0525-b4011099159d4b47f74f5b5034151fc1.yaml | 4 +- ...0528-08f37baf7169a857040ffc59c0868398.yaml | 4 +- ...0529-8e6b1c0313de5c2d10a529693b2cd5e4.yaml | 4 +- ...3053-42f191921072c4fed5defc1af6bdccae.yaml | 4 +- ...0530-8661844c33fd37e07467aee782d9dedc.yaml | 4 +- ...0531-ca8f431f36e53f60c13e3a9b6d7eff7f.yaml | 4 +- ...0533-64461a08e8c73126cafa25fcfb24f7b4.yaml | 4 +- ...0534-7ca52430035acd6a97700e0a1293791e.yaml | 4 +- ...0535-bdcfb7f870a9c9d99dad2a66d5149c6d.yaml | 4 +- ...0537-0c0c3155e7f5976c6ad290b0d35fa570.yaml | 4 +- ...0538-5457d1ce3892ed5603310b359ae787b8.yaml | 4 +- ...0539-8712cc1632e225c594b19df34ae596ee.yaml | 4 +- ...3054-ed94652247c936f26c87589210c8b78f.yaml | 4 +- ...0543-41404190c9a7f512053b049611a997bf.yaml | 4 +- ...0544-6ab5c2b9e9da3c807bbb85a9044847fe.yaml | 4 +- ...0548-931565033fc7a18f04b3f4a474f02d5f.yaml | 4 +- ...0549-6077f7a94c87d9a1b005a233e3c6fd5d.yaml | 4 +- ...3055-2304b21574018f9296b7348b5813fb8e.yaml | 4 +- ...0552-2bf5272ec6d886fad7b7b1d47db7c04d.yaml | 4 +- ...0553-f762f226f7d0453e8c9973d68200bc39.yaml | 4 +- ...0554-ab9e9f7a6a475ad09ac9f13cde54db19.yaml | 4 +- ...0555-507dc7ea634baa930020adb83f291cb6.yaml | 4 +- ...0556-fcb752a84e136c08d10cbe281ed9acb9.yaml | 4 +- ...0557-d882520450a9e95c908e1ad71ca03592.yaml | 4 +- ...0559-8be8bdb7ee929f691ca61327631de08d.yaml | 4 +- ...3060-eca3d823dd426887bd9194913fe758fe.yaml | 4 +- ...3061-4d5b5eea5b0d303e259444505b764438.yaml | 4 +- ...3064-cebe60a1cf2dde46346583e6502d2df4.yaml | 4 +- ...3067-68254971cbcf2fc6d5bd7c51c76b34c5.yaml | 4 +- ...3068-f388cd40277e7ac72bbf02fcf8235c63.yaml | 4 +- ...3071-e066b94b3267fad45f35322be08f0f07.yaml | 4 +- ...3072-f830b550290522c771fc5d5f581ec239.yaml | 4 +- ...3074-c24b6fa8b7a5214338fb56e211d63730.yaml | 4 +- ...3075-bbfbe8576da0ded63051e9606f0a7198.yaml | 4 +- ...3097-2964883e1950fef80d801f06f14eb92b.yaml | 4 +- ...3107-11a2580b3d0abb5ce4a2d1b75225b077.yaml | 4 +- ...1077-bc2f6ff7db9bb1af0cb3049e6fc69b8c.yaml | 4 +- ...1089-74239a2c7d59745dfff630629648ba8b.yaml | 4 +- ...1094-8cd6ae2b6361cbc9077a21e229786a98.yaml | 4 +- ...1098-0732f852b649541967c753671f29b37b.yaml | 4 +- ...1099-ce1baa6ffb742e3e4c86c030e2aaf287.yaml | 4 +- ...1101-bec7b3aa816a59f17fd4e32834f42e90.yaml | 4 +- ...1102-0b0d398d1a79ae77845de8705631a4db.yaml | 4 +- ...1104-ecee6fe6f960c3e32d930eed8f81ac9e.yaml | 4 +- ...1108-a5c9dfe234305fe9b3c82a7200b4785c.yaml | 4 +- ...1114-e51458c52ee75e442332748b235c894d.yaml | 4 +- ...1116-2dba3f9d9e05a82800f2a05f03266828.yaml | 4 +- ...1117-beebd9357e523ac8ce9429685a86283c.yaml | 4 +- ...1118-06564215bf3fbac51cfe3cf6be605864.yaml | 4 +- ...1119-abc7b516295a7f19088f575460d378b0.yaml | 4 +- ...1120-d39f34ed184a71d23a5de1e368d430bb.yaml | 4 +- ...1121-f0164790773e35acb9b1d44f4c95382b.yaml | 4 +- ...1229-a2af19cf083e10d02f6ef64bbfb896ec.yaml | 4 +- ...1230-0cf023eb74228b9523fd8b71152bf7de.yaml | 4 +- ...1232-b4a06dd8a8b5f551ef3c31a46e092a4e.yaml | 4 +- ...1233-7848dbbabd9f06e0c602290bde397eb1.yaml | 4 +- ...1234-5f2b7d6e36647de882c9475f5d8d8b2a.yaml | 4 +- ...1236-1e54d333594befa754c49d164d26005e.yaml | 4 +- ...1240-17700405f02a76d34273fd6f63bdac56.yaml | 4 +- ...1241-3bfe2176ab2d6339c4363df34b9c843f.yaml | 4 +- ...1242-08c2f711dab885b1524ebbd7b0782f00.yaml | 4 +- ...1243-20d94fa7cbaa795926bd10e9c360bcb7.yaml | 4 +- ...1244-fe10205699bf88a71e4460031e80e0cf.yaml | 4 +- ...1248-bcb990d5b998ea9f0d9516d80108b489.yaml | 4 +- ...1252-a59e139d7834d1f343a41f6f77f479a9.yaml | 4 +- ...1257-064670bf29900df44464bedf16a7db27.yaml | 4 +- ...1258-08841c16939c6ce6bfc6679725ea1281.yaml | 4 +- ...1260-44337a15956fb6efe76c43a84f40d4df.yaml | 4 +- ...1261-e3632f2772b0c1ed9b46e568946ebc5c.yaml | 4 +- ...1266-b59d3f14536598579f52eca567b11500.yaml | 4 +- ...1267-af1c4837148181f6207e66eb6c3b9ff3.yaml | 4 +- ...1270-74c47f2edddbb589b4230d596bf5f1e4.yaml | 4 +- ...1273-32e7faa52a05f68e7c002ae73c9e64c8.yaml | 4 +- ...1274-8d8dc52792f8d60124d8fa4fa4f53a0c.yaml | 4 +- ...1275-e40a3e8ea03e0231ec1106a753934528.yaml | 4 +- ...1276-466267eb695f096848ba3c66efa093ba.yaml | 4 +- ...1278-5830898462cdce464207b0d4b8cd2848.yaml | 4 +- ...1280-211d17907ac598fe9fa7fe583c9712b5.yaml | 4 +- ...1281-2552c36873674cea120ccc38e69f7427.yaml | 4 +- ...1283-eb7c2afb91d54b1e8be36c66e317f588.yaml | 4 +- ...1284-ef5a725ea594e708f6f726a1ed538862.yaml | 4 +- ...1286-20a2e4a6290983370284d76170f55741.yaml | 4 +- ...1287-33bc7d755c896ae147d69853031aefe1.yaml | 4 +- ...1291-4a6b08579b21c259b0bca4ce2e0b2904.yaml | 4 +- ...1292-467a5580ac1383352cd27bfadc2d264b.yaml | 4 +- ...1294-a561a450756c85ce3eedf88a4f646811.yaml | 4 +- ...1296-6afeb2ce393f64d78e2ee60294c65cf9.yaml | 4 +- ...1300-731324aeee016bb6f029892372fbf4ce.yaml | 4 +- ...1304-d57f8fd6151dd1d65a65a746b8a04b7a.yaml | 4 +- ...1306-6bd5ec9d4799550acfbe6978f43129c9.yaml | 4 +- ...1307-d90e5ac159925d0ab3971b3b6d358c41.yaml | 4 +- ...1308-5f94fd73fc44e0e8d375d47e5fc1e6c1.yaml | 4 +- ...1344-7876e3e9a0cea227500debf5d1a1674e.yaml | 4 +- ...1345-d78cf00c59cb04a1784e89b4d96527fd.yaml | 4 +- ...1346-2b7b5dc8c00ef5d0c5596161adf932c4.yaml | 4 +- ...1347-6e8a9152de2bbc5b83be5ce9d45091f1.yaml | 4 +- ...1348-f50a0c6a3334b6a9833d56ea2fa95097.yaml | 4 +- ...1349-827f2e843a499f08614a8388df30f388.yaml | 4 +- ...1350-a0dc813b81ea3eaaf35abcdfd0e51d08.yaml | 4 +- ...1352-bbb33bf45ae299a4c2e1d54441bd6458.yaml | 4 +- ...1355-9ed3ad19217255e206c74e32650683d5.yaml | 4 +- ...1356-e27368e4785bcd7f22809f69244573f8.yaml | 4 +- ...1357-dd1f48796d4f00ba40c7555318c798d9.yaml | 4 +- ...1358-aa9afd9a4b3e913533a4ca30d7c2f62e.yaml | 4 +- ...1359-9460e33e1600fa49d2559c8b2959f093.yaml | 4 +- ...1361-c7b13d17993dc7e235bed80189f9bc22.yaml | 4 +- ...1366-1cf2042a7f76cab8ad8de631e6023745.yaml | 4 +- ...1367-4f22cc4c7f59ad21868eda159380a421.yaml | 4 +- ...1368-6a8cda00f1080a3aa286a272f860fd12.yaml | 4 +- ...1370-9466631ad739782449cdf9fdc36419ff.yaml | 4 +- ...1375-867cda99b5370418b92599a3b962874f.yaml | 4 +- ...1386-086335e3764d29c07c7d7cc4e2750c93.yaml | 12 ++-- ...1387-90c4cbfb7712449319d9759e0ded5087.yaml | 4 +- ...1421-4a55514451127aed8c9fafcd15f7c892.yaml | 4 +- ...1423-6194829f785c406e2e428c86316d96c5.yaml | 4 +- ...1430-bfb67ddb86bdaa0fb13f07ddf26fc0aa.yaml | 12 ++-- ...1432-bf0fefcefc90da6dc2662202215f7095.yaml | 4 +- ...1435-6ac56b73dfbde68009426ab1366ff6c2.yaml | 14 ++--- ...3161-a2e686465d8672ec5bf29632e66237cf.yaml | 4 +- ...3162-fc806cfd6ed4dc072c39a0980e8091bc.yaml | 4 +- ...3167-675e6b4bb186a17f8fbe362e07f780dc.yaml | 4 +- ...3188-f46955793d003bf5208172175382fed1.yaml | 4 +- ...1925-0ef9782b82fa8d84264b6b12b21ce750.yaml | 4 +- ...1926-330ef9633d0984d1501cc01b4833593f.yaml | 4 +- ...1927-73c1cd9e5bfe098bfeb3d4b81b96f05b.yaml | 4 +- ...1928-f8df3f710c2acd675329722d570c9bc9.yaml | 4 +- ...1929-87fe64aef58d57af2256ba27b8518630.yaml | 4 +- ...1930-1cdee5629acdb013a2031fc71ce18e3f.yaml | 4 +- ...1931-e66b394b6ca847ce34ca3e1d63c12c27.yaml | 4 +- ...1937-8e9a9f02c6675b20e9272fbaa352217c.yaml | 4 +- ...3197-20984fc62bd28bb51dbd02e6ae5eacfc.yaml | 4 +- ...3199-3d06eee6979cba3a65776c3770040194.yaml | 4 +- ...3206-793865077bcac4ea4b5fe53bac436ec4.yaml | 4 +- ...2078-351dfe17aa9c41d161fbfba3138330fd.yaml | 4 +- ...2079-8cb4e5d28c572c7b2415f308b23aba3c.yaml | 4 +- ...3208-c87a07214ae94f7db769181aa46e6e3e.yaml | 4 +- ...2080-f19084b39601e7bc7ba34fa7ad78104e.yaml | 4 +- ...2081-7ec734b1370cfa2c11baf0ce838e63f7.yaml | 4 +- ...2083-27956200aea3cb3bd27e1108bb27c97b.yaml | 4 +- ...2087-0c6025826e5726423a84ca94ebcaa441.yaml | 4 +- ...2098-6868a3f667554717afcb5780d663774e.yaml | 4 +- ...3210-1f71e71cd24bceed84937a152a603cb2.yaml | 4 +- ...3211-2b72a770047348328de1929b10696b75.yaml | 4 +- ...2110-83be4877901e862ff402253df3e3d6d7.yaml | 14 ++--- ...2125-32308cb2a86eba1af06f28c633448e1e.yaml | 4 +- ...2126-25e251a3406c9b35d33175212bd58aef.yaml | 4 +- ...2127-4976580f662d856b0ec790e30c784e5a.yaml | 4 +- ...3213-b595d6fc7446c3f09ff44c55f79ffecc.yaml | 14 ++--- ...2132-4eab0b03120e29e0608c25e79fc1f7b1.yaml | 4 +- ...2134-fdb7464284f0e3f92d05bc404992df2d.yaml | 4 +- ...2135-51b13cbe3f0c79746e5808bdafa8107c.yaml | 4 +- ...2136-1fb9c20f2dc722c53163029233b7680b.yaml | 4 +- ...2137-580004f61a42f3e8c462a7bbd946dd47.yaml | 4 +- ...2139-f7d71098b8867ed535059e5ab72f5309.yaml | 4 +- ...3214-9456cea40ce6ea28f05bb2ff20b05594.yaml | 12 ++-- ...2140-61f36ff0df93fb03b2b83d8b189aa894.yaml | 4 +- ...2142-965d06634426ae72a55053fa07ab23f9.yaml | 4 +- ...2143-5bb8fe4f6089667dd51c2e2e1a9444ca.yaml | 4 +- ...2144-4cfd2c744e2f57cb62950af3a51becf5.yaml | 4 +- ...2146-5012da2be4de20cb472aea0abf71670b.yaml | 4 +- ...2147-97d382f4c9bc6b17c25a76a092e5b852.yaml | 4 +- ...2148-700d1cfad4bd0fa3b320c8b805e07813.yaml | 4 +- ...3216-b989c8fa7ed8639e2ece01754bff0c0b.yaml | 4 +- ...3217-6bec264de722325d8055d26873b10d23.yaml | 4 +- ...3233-f9cdd85e870155975fbf07ebd6c11543.yaml | 4 +- ...3237-c180a9b603d8380fb7d1168376590f63.yaml | 4 +- ...3239-769f278ef7d8854e596567a95f8b276a.yaml | 4 +- ...3240-3445f10edb771a060415612c26e8b8f1.yaml | 4 +- ...3241-8ecac7c0d333dc76f1706559fa2ff22f.yaml | 4 +- ...2428-164235cec7e149cb5686d35550cc5b45.yaml | 4 +- ...2429-012dc707b39ddca593987305dcc50476.yaml | 4 +- ...3243-087ab6a6409aed64b5c6d0e8d25ec639.yaml | 4 +- ...2430-910b5f5663169fdea4f0325e6cf734a0.yaml | 4 +- ...2431-da2b51f042521776402cd06473b8ac45.yaml | 4 +- ...2432-01230d7023712cf52d185f89bc18a400.yaml | 4 +- ...3244-cefa3854b69334bef3c2d36906bda58c.yaml | 4 +- ...3245-af797cbd3361f1f4f2cd0edf1a785a5a.yaml | 4 +- ...2453-30d5fcaaf29f4724e74da8c497e40f5f.yaml | 4 +- ...2454-169d659b2a655a618a75f90fea3adcb4.yaml | 4 +- ...2456-c26f84b3b737dca9d0e2ab2c400f43b7.yaml | 4 +- ...2457-c23e4efbffee4d6fedc761f6f4283de6.yaml | 4 +- ...2506-0f0d0d2c6b89a442a33118c19c04ca9f.yaml | 4 +- ...2508-f509147c445359dac8de4743426be1bb.yaml | 4 +- ...2509-f77ac51d7f87288e232b2c219c40d8d5.yaml | 4 +- ...2514-8119e5403d3a32487dee582a940781b5.yaml | 4 +- ...2515-688329ccf7bb0b49cbf94f9e95fe056a.yaml | 4 +- ...2516-4ff702381866f61703ebf71fe12af15e.yaml | 4 +- ...2517-b81dbbcc402e93364fc6c79f5c55b224.yaml | 4 +- ...2518-fe3ee4088bc486320d241799be9d47af.yaml | 4 +- ...2519-e977a8524d61ac2824626ef17aa0bef1.yaml | 4 +- ...2520-5207af68b5cb6f829d0bffea5881c5d4.yaml | 4 +- ...2522-4690da6a9cd43936031eeb63dbe5ba89.yaml | 4 +- ...2524-2862da944ba4b374cef11881cc898ccb.yaml | 4 +- ...2525-755306c8577963b7e9a15f996cc38136.yaml | 4 +- ...2526-52d571dc3064574a067b92facc54ed54.yaml | 4 +- ...2529-179886cc2bdc18bcdb57983a57be1a6f.yaml | 4 +- ...2530-f4692d4ecdfbe84f92ac77014c0e0a83.yaml | 4 +- ...2532-43f4c20972d989cec8564607e81e3507.yaml | 4 +- ...2534-b107934a8aab930d1fab2cf0f27d13f6.yaml | 4 +- ...2536-28c3e191fb5a4aac43fb323a1cacb211.yaml | 4 +- ...2539-91e729c82f2d9f67d872d81509700a6c.yaml | 4 +- ...2540-39995b4a98bd80010d8be7d8f66f2d38.yaml | 4 +- ...2548-4f768a2e6ed5431813ce2815c2416c7e.yaml | 4 +- ...2551-ac1431b1561b6c549c99a1b7125f3596.yaml | 4 +- ...2552-460e4d77e94c99909f00493d8717ec60.yaml | 4 +- ...2553-683819db80183ccca71d3fa32fe3879a.yaml | 4 +- ...2554-aa7769527923a5d7ef3aff0dbf4c6e9e.yaml | 4 +- ...2556-268b053a1bfe487ee9a98a976d059155.yaml | 4 +- ...2560-d93a6b7f14b256d2a3a93d0625fdf894.yaml | 4 +- ...2561-9ebf12f531ac825152bdbeecae0483e1.yaml | 4 +- ...2564-cd3ebd9e5b8349096037121f145eb200.yaml | 4 +- ...2565-41d7dedc3e3a9c3e6b69d336c29a1195.yaml | 4 +- ...2566-88ba893aacf7da3ba8fb038d6bba0a0b.yaml | 4 +- ...2567-63e9460ae343812c425f6b6a9cf8cd2b.yaml | 4 +- ...2569-f9974cc25b2b5474809876c63c837de9.yaml | 4 +- ...2571-deed3fa156af1c41e337b8275419b59f.yaml | 4 +- ...2573-dc87f7ad02889b2fba3b573d8f507b49.yaml | 4 +- ...2575-e12b4eb0afaf97081bdd86d34fb980c9.yaml | 4 +- ...2577-c8761ad8d517d60679bd97ecd8a6c050.yaml | 4 +- ...2579-901a8544f8fe096e9fdc9630ea2bd15f.yaml | 4 +- ...2580-f99c7ac14f9b6aff3ca4eaa0306e77ee.yaml | 4 +- ...2581-fa0a09e9f8b4c6d9a874ba45527ab6cd.yaml | 4 +- ...2584-d844d4bb69ae6b349312f77792834a3c.yaml | 4 +- ...2589-40a18728cfe568ff4c836d2215f1bab4.yaml | 4 +- ...2590-668f9a8a460ad561a2838627b58d495b.yaml | 4 +- ...2591-8a00d4110806870e5118fa117a1c5da6.yaml | 4 +- ...2592-261bb3f8fcb24ed57cf7abcc44aedfa4.yaml | 4 +- ...2594-76e71bc12b464dcb30907399a9d0eccf.yaml | 4 +- ...2596-eeffd2576729af4c20ea0d0989cea07e.yaml | 4 +- ...2597-ccfe47d5faf99f962197429daac2a562.yaml | 4 +- ...2598-4012f134749539452de47052e41b95bf.yaml | 4 +- ...2601-a738a6df1d7af94fbdfc3f2ebe12ab82.yaml | 4 +- ...2602-a3fe0d186555bfccf2ee6cc4060fb41e.yaml | 4 +- ...3261-4c7136348e958aecb57a2e8c3842e1af.yaml | 4 +- ...3265-223f6e5ecb381f112c575b56d5d37f09.yaml | 4 +- ...3266-5289bbf92c9bdc3c3c0e4f0086563240.yaml | 4 +- ...3267-7fcbda1cfae66ee74a18ccdfe4753dbb.yaml | 4 +- ...2675-87d943234d9fd7c1b966ece253dc1110.yaml | 4 +- ...2677-6243447eedf5d12aac34558af1ea267e.yaml | 4 +- ...2678-8c789a924b584ff9b2a3b88bc5b7e816.yaml | 4 +- ...2679-31aeecdc666490a1580c3359e75e5fff.yaml | 4 +- ...2680-f93c186c199b2993e134631be68ea0a1.yaml | 4 +- ...2681-332edd099b0a24d5cedbd6ff5e1c921f.yaml | 4 +- ...2682-c0add8aac27f340c1c289e5c63a1598d.yaml | 4 +- ...2684-f59ad0e4ed3c2f1220e9486cbde45cae.yaml | 4 +- ...2687-75a6b15f48d4510d78d2b82a83179681.yaml | 4 +- ...2688-9d13f1d3852ef39a0de552cc88d8fec7.yaml | 4 +- ...2689-51018cf0109648dade76eaf03756855f.yaml | 4 +- ...2690-cad14760637700672da85dda380a58c3.yaml | 4 +- ...2691-7734e62aac4f36040cb75f80a344eeea.yaml | 4 +- ...2696-d3e0f1a758bd59446de5b7d7cf2ab987.yaml | 4 +- ...2697-3b452da100c4d01a4273d3119ce13da9.yaml | 4 +- ...2701-26e6b2b2c87cae333c1a6a8f12b3eb26.yaml | 4 +- ...2704-a84b96611f097506467644350038a82b.yaml | 4 +- ...2705-3e021672a349a4fa909b6c3fa423b85d.yaml | 4 +- ...2706-a0061c960a93fff2adc1360d0d280001.yaml | 4 +- ...2707-bd950fa0617ccb3a0edff5978b31a09b.yaml | 4 +- ...2710-c0cb61dd6fecf2d07db617deb2e20095.yaml | 4 +- ...2711-4696541fdc76b8ee098f38a67fea2a75.yaml | 4 +- ...2714-74f803f6a35ab9fee5ff5f4a7905da8e.yaml | 4 +- ...2717-49f4f7442b45f88ffafdd0b100d2831c.yaml | 4 +- ...2718-d8bfc01f0d93fad4fb2e1a339254a3ed.yaml | 4 +- ...2719-980a1e8d0e2c9d6875260534aa15c2ab.yaml | 4 +- ...2722-058f94a7273615ab6b78bfcaa4aea16c.yaml | 4 +- ...2723-18a7728320d1ae3570e8bc349a822d19.yaml | 4 +- ...2725-078909fc07244cccae3451c5f9a6996f.yaml | 4 +- ...2727-9fc19dd6fd6294d34dede89f8670266f.yaml | 4 +- ...3275-5ea4e509f820ba7667284a234b2ed4c9.yaml | 4 +- ...2775-83ccb1e8ea2bc379358acbb752bc4542.yaml | 4 +- ...2776-2f1276a08770749aab26a12f9e94025f.yaml | 4 +- ...2777-ef0878d0c845446e359ff8868f1f69d3.yaml | 4 +- ...2778-2613b63d2aee689ccf6be1c1b97a178f.yaml | 4 +- ...2779-c13eb59a9d6116b65835e8ca21a2d0eb.yaml | 4 +- ...2782-77f47958ca9f6f3aca917f2faa21c35a.yaml | 4 +- ...2783-afe32fcbbc30cab4f3e35a08cf6d7b9b.yaml | 4 +- ...2784-2606febac98b5b77708f94f9707ab5ad.yaml | 4 +- ...2787-a8ed8c08b34ae95a0c525696512c70ee.yaml | 4 +- ...2791-b940c9ab9a01a68eea4a5776ab2199d7.yaml | 4 +- ...2792-ec5f1fa417ea6d6d86b4d82ac0f5e65d.yaml | 4 +- ...2797-e30e15a9c4996773efb6051e3f90c9c4.yaml | 4 +- ...2799-f26d5492f0770f1b4f41cabb1dbfd120.yaml | 4 +- ...3280-c3fe9adbef48906de6288ff04a6a51a9.yaml | 4 +- ...2801-7bdd14c359e34ad7380502271a0ac656.yaml | 4 +- ...2802-bcaba1132a8ac1a695b97d03ca9be0db.yaml | 4 +- ...2804-7ef847bd47bcec43447f7d6368de1312.yaml | 4 +- ...2805-7cc4115eca0cf9c161547f1b88d6e0eb.yaml | 4 +- ...2807-a4d2edadf2ab61a5bc7487773709b53f.yaml | 4 +- ...2810-d937680a60653a1af5b2a6c9c069ec41.yaml | 4 +- ...2812-4a1b15e037b0e674a6b8abd0386af8e9.yaml | 4 +- ...2813-c380050a7e76482fb19d38cf49fcde28.yaml | 4 +- ...2814-bf4905bcfa1e978b4bbdcf9e3f9b15d3.yaml | 4 +- ...2815-ab9e9f1fd2829128e3bb4bce435b5cf7.yaml | 4 +- ...2817-916825c2b82546703e1e58fc1213738b.yaml | 4 +- ...2818-4f95fbf5d542e431aaee4d569011a0a0.yaml | 4 +- ...2819-36e8e0f9a5511d98ca66f925304a3a33.yaml | 4 +- ...2820-ea8ebad551118883e1feafe80a786b1f.yaml | 4 +- ...2821-79e3222cd5781d3ee2de3dbd9ec9763f.yaml | 4 +- ...2822-153f878c481a2d3c062b001804128554.yaml | 4 +- ...2824-8c8032347c8a676583142ccf856ffd1b.yaml | 4 +- ...2826-0d1db255d715c554771e21ce6d36684e.yaml | 4 +- ...2828-cb1263fe7cf23ae55fdda5b42af76fdf.yaml | 4 +- ...2829-c639be60406ab3b6aefe17af97aa1a3c.yaml | 4 +- ...2831-7e7c2d3094ebf66ce262024cc34ea145.yaml | 4 +- ...2832-64bb9b276a0e4073663c51a2aaebe19f.yaml | 4 +- ...2833-53b64c2cc89e0070db555cf593bc5061.yaml | 4 +- ...2835-2178e4e9767ddbb5794b39d1005e082d.yaml | 4 +- ...2836-1691930e201b6c9ce529fab20806ab3a.yaml | 4 +- ...3285-511ef268c5ca19fe7d62dddd9e13f37e.yaml | 4 +- ...3287-0f5c5f0145a23c33dd91c0c052718e6c.yaml | 4 +- ...3293-aeff462ac51a8748cbda344eafd679be.yaml | 4 +- ...2948-cb6fa6f6958986304e8bc18c130022ba.yaml | 4 +- ...2949-2143d39c6a447e17fa955c9d29e9190e.yaml | 4 +- ...3295-89a71e03ca88d2c02f3be0f2c0d21756.yaml | 4 +- ...2951-cb8a70925c9490ee47d5d493a807b6ac.yaml | 4 +- ...2954-f3852e2e998f0a9723c8ace5e7ebc48d.yaml | 4 +- ...2955-61c688c55eb7ee42da571c3fb1a2e6d3.yaml | 4 +- ...2956-8e63763711ef860c6f3f1ec391c10df2.yaml | 4 +- ...2957-72add1c0a6273b20aaa451b8bcfd56cd.yaml | 4 +- ...2959-0e449c9a497e53b142f5674fb22e2a1f.yaml | 4 +- ...2960-cec3580e3bef11008dce66e6706b0fc0.yaml | 4 +- ...2961-db7f8fed7cd5746da95374c4a1d925a5.yaml | 4 +- ...3307-7bd8b052dc6ab5494250ef14b3571b9d.yaml | 4 +- ...3308-c9c8b6f666802b2f51aa7a2059e8cf31.yaml | 4 +- ...3309-236ec29d3a581237ffdca9038176da82.yaml | 4 +- ...3333-c900b7eac90dcb368c77b66b5bee17b3.yaml | 4 +- ...3337-01e0b89afcfee7ee0b87257825f06c59.yaml | 4 +- ...3338-f731e8529b33108bde99e03616dec459.yaml | 4 +- ...3340-72c77f134254f33afbd956d2661ee799.yaml | 4 +- ...3341-c1fa4ca90d68aef3b1e407c4bbb8f6e9.yaml | 4 +- ...3342-b16f008700574256ab90c1f92968c3fa.yaml | 4 +- ...3343-74e59a3e9ea29768b5d0afa832d7eb55.yaml | 4 +- ...3344-d1fde79ddb6f5cce29eedf02f3d4b354.yaml | 4 +- ...3537-10655f6004e5353e2b6a2b5ad40ac777.yaml | 4 +- ...3539-0c1df7bc0f650153d4deab14ee137704.yaml | 4 +- ...3540-a2599bd3c91638fd59172f5a65248fdd.yaml | 4 +- ...3541-c71bf414dec349bec3e4220e85ee81e5.yaml | 4 +- ...3542-4ff3f91a93b3247cebd7620836598b68.yaml | 4 +- ...3545-854e0c6e8605c626361126b016b08a27.yaml | 4 +- ...3546-e261de97ae518fadfa674900f6884131.yaml | 4 +- ...3547-9fc89469f8a530afdf83c67ae386fe4e.yaml | 4 +- ...3549-e2b6dedf58550635a9af3b0cb010148d.yaml | 4 +- ...3550-923b7799c6c4b8b6606ee152480bc325.yaml | 4 +- ...3555-2b061e047e658e61d8ebbd4e7e809bba.yaml | 4 +- ...3556-4a822947b182a8ad769234c031d65105.yaml | 4 +- ...3557-778530516424ce1a3968690bf84c44c4.yaml | 4 +- ...3558-69dc88dae2977364ee23f133476679d5.yaml | 4 +- ...3561-bf873db96785a26a3145cbfaa5b26d6e.yaml | 4 +- ...3563-38fb7f7c173d005d7a2c4887d0346c93.yaml | 4 +- ...3564-8a9cd0a3b3bf0281b86f1864c19141dc.yaml | 4 +- ...3565-ea61aaf0b841c4447233caa711d245e0.yaml | 4 +- ...3566-5b3434af05805f54d95301c9d2bfe97f.yaml | 4 +- ...3568-c32e665e9be4b817092efeaf96853d74.yaml | 4 +- ...3570-a94be3f467ceacb837ea20db05393018.yaml | 4 +- ...3572-fdbe6ed30963d2d89b9e4d6d9ea6d03d.yaml | 4 +- ...3573-ad0ff157f5be17af68fa4347894dd5e7.yaml | 4 +- ...3574-d6b6bc643ec1ba18798cef4b6b37fe69.yaml | 4 +- ...3576-e4bdb79e642b57f61de774ae24d8a0ad.yaml | 4 +- ...3586-f6467ad8511f5004bea6f7b6c2cbc45b.yaml | 4 +- ...3587-80ad6ff6a41f2684b99adffd0cc6275a.yaml | 4 +- ...3588-a5afc25e9a9bba6762e73f63456f868e.yaml | 4 +- ...3589-7229f0a7ed96aafb75936c9e304ee19f.yaml | 4 +- ...3590-fdf5e229c491f2ee061576794ec1d5c1.yaml | 4 +- ...3591-b86559278d78c8a80909bf3088ee795a.yaml | 4 +- ...3593-a4a6f5b9e735cb14d76827d4a578ff1c.yaml | 4 +- ...3594-9dd9621e217d263471711af1462b33c0.yaml | 4 +- ...3595-5ad76356f82ec882d88e003164818843.yaml | 4 +- ...3596-2e12923b4994409fb95da9b1bf700385.yaml | 4 +- ...3597-00fe1d8fca57ad1440836b41da0ce6fd.yaml | 4 +- ...3598-498bbeebfd7d1067e2db21072dfc82ff.yaml | 4 +- ...3627-b0c570c63a16100d4cac08a03560c9a1.yaml | 4 +- ...3628-ad605f98f0b12012c381eafdf54cfada.yaml | 4 +- ...3629-272755bdeeb1adc01a4352f800652c09.yaml | 4 +- ...3630-e66a7b75dd0639134f09eee91026a929.yaml | 4 +- ...3631-7188ef26349164dd23042500cdbf31b3.yaml | 4 +- ...3635-a073e10124aebcae7675d30da8592a4c.yaml | 4 +- ...3636-f6874af8a1671c63716fd288efc17414.yaml | 4 +- ...3639-104344c0b7a013be4ee55f379fbf7b52.yaml | 4 +- ...3640-f9b0e5543d8b6fde32af392e9a980e57.yaml | 4 +- ...3641-38fb53416dee6ab7b6bba5cadf55c4c5.yaml | 4 +- ...3642-dd776d5a9d71139420b6706ccdb1e25f.yaml | 4 +- ...3643-b02147be7bebef844df5583704a48a3c.yaml | 4 +- ...3648-7675af1bd6eb113efdfef786b75aea68.yaml | 4 +- ...3649-75f9430e21b1ffadf43723a73937595b.yaml | 4 +- ...3652-c20c39f747c7f70cb8ab495d6417a431.yaml | 4 +- ...3684-2aaf513c887290d1b06e4a97482b6da3.yaml | 4 +- ...3685-0eadfcaa632fa9ba5901b3c6b61b28a7.yaml | 14 ++--- ...3686-37917ea4c5b30e9a2f479f087050ff0a.yaml | 14 ++--- ...3692-0b26b05fd72223ab78d0eb64dadbd40a.yaml | 4 +- ...3693-065fb6634c2979f9a8dbb1a289a68a9b.yaml | 4 +- ...3694-e224c1cc32d6c05f266106ae47b5db38.yaml | 4 +- ...3695-c912d868bff6df29fc1013dc04c342d0.yaml | 4 +- ...3696-7559c037fdee829f7bf9775d464accd0.yaml | 4 +- ...3697-d3779debb6d6eb8ad0d25988128d76ec.yaml | 4 +- ...3907-15e90fc31ab3dfba5bcef7edbbc05f6d.yaml | 4 +- ...3908-bc4814d8e32bebe97767bb786c515063.yaml | 4 +- ...3909-238730b48c414c2efa3f90f95ede4e1a.yaml | 4 +- ...3910-317667951b7644dbd1a4529b628afac3.yaml | 4 +- ...3911-c85a39b22a9266777e8fa557a3826f56.yaml | 4 +- ...3912-2f3fe53a50f6ba1e34fffa48d4d3ffac.yaml | 4 +- ...3913-5b3901e02ad2424b1793990cd718f093.yaml | 4 +- ...3914-ba61abda2c1a03aab77d7d30f615bf9e.yaml | 4 +- ...3915-b42518648b89a6c8b5bea17f9a27b0ef.yaml | 4 +- ...3916-4e988801588842dadfebdadb774a426e.yaml | 4 +- ...3918-d5f5796dec9da2bb7306be7b46162089.yaml | 4 +- ...3919-3b2e242a0e8c63c5936cb035e1688322.yaml | 4 +- ...3920-9547ac03aa22594531f4f7ecb05105d2.yaml | 4 +- ...3921-1f09731ddd1d1af88db90bbc4fec3ba8.yaml | 4 +- ...3923-2850eb23becb886717557cbcc134de27.yaml | 4 +- ...3925-48e682e482ecb4079ded015fff88c4de.yaml | 4 +- ...3926-e3f2fb4bebde6fbab715925584422191.yaml | 4 +- ...3927-43352935e72ef2b8411f13007515e249.yaml | 4 +- ...3929-9461e6fbc59ff2af30e33bb31e92efcb.yaml | 4 +- ...3931-8564c9ce49cff70553493d3be285f932.yaml | 4 +- ...3932-1b2984fc633af00dfb52c6ca6adba0af.yaml | 4 +- ...3934-43b8fe08466d27ab3e4146e678872b9a.yaml | 4 +- ...3935-063d32b817099e0883314c45f9a14882.yaml | 4 +- ...3936-2a1202a3beb6f69088b7b47e3927398f.yaml | 4 +- ...3937-87e99280c7fbf3c8ad55c6ac46aa584a.yaml | 4 +- ...3938-74b3b474a158916fea4c408dcdc1f32e.yaml | 4 +- ...3940-eb5eba3fb055e3f1a65941e7a11b92d0.yaml | 4 +- ...3941-db0b66a5d47c2843954a651061f51619.yaml | 4 +- ...3942-cff018203a21cbec2137aca8bbff35f1.yaml | 4 +- ...3943-4d6b9908316d738d104a51fdd9ba9967.yaml | 4 +- ...3944-31cb28ae35765828074fe75a48e7d24a.yaml | 4 +- ...3945-fd2502bc424033ec4b34f2309e987add.yaml | 4 +- ...3948-a75aed58343a47e8c366c92bf6c30f08.yaml | 4 +- ...3949-e69e5ad6d5e1c350a8e72b9f067b0efd.yaml | 4 +- ...3950-e83ff3d04c646c58cf810db301109219.yaml | 4 +- ...3951-8d6f7061c576076509b8f92171f21824.yaml | 4 +- ...3952-df4c2356c55ce196a7dc2c935ff36c73.yaml | 4 +- ...3953-e75bbb3acde201345699c9ea2b1c0b80.yaml | 4 +- ...3954-a2a9df8b3604a4aa48635001d225e7fd.yaml | 4 +- ...3955-81558dbfc1c686b52278115bcc212692.yaml | 4 +- ...3956-a100f718edfa547990462b4c8b9cca8f.yaml | 4 +- ...4366-39af102f2f1fef516b0141731bd29ae6.yaml | 4 +- ...4370-7aa0e1773e8e5c34cf563aa138c0d2da.yaml | 4 +- ...4371-ac531ca44d844146efaf8a60c7e71d41.yaml | 4 +- ...4372-de3ad2c14ae092820725df486681b852.yaml | 4 +- ...4374-e8533877c8cc904267c19512d475d608.yaml | 4 +- ...4375-2681315eb5322b6e8d1489c4efcc7445.yaml | 4 +- ...4376-48efc81cbefdf18882ef324fd2ff057b.yaml | 4 +- ...4377-278430bfff21cdcd8521969c19275f0f.yaml | 4 +- ...4380-d06ae0bd2926a035277d571533319f2e.yaml | 4 +- ...4381-269c54556a1ca81f568118ffc940071f.yaml | 4 +- ...4384-9a44744af3993590fe3bf014b0ad32e9.yaml | 4 +- ...4386-599f329db78aa16926991b18378d93d9.yaml | 4 +- ...4387-b3367042bf6f7f08c7f7fe623f66bded.yaml | 4 +- ...4388-52a132f231403e0d19dffecc858bc7bc.yaml | 4 +- ...4389-de2cc205752867abbe773a0b92ad0ea7.yaml | 4 +- ...4390-81e36fcfaba8f47f8b0cb1d0a7f67af8.yaml | 4 +- ...4412-00bc7306212a1f1532879484863c8f21.yaml | 4 +- ...4413-1e57a0095a9d05c5ba61b4bee5ed304a.yaml | 4 +- ...3489-8639b20a2b1f76694c89791c1b2d91eb.yaml | 4 +- ...3490-96587021500f654fee1593a976493ca2.yaml | 4 +- ...3491-1fa869ed52b230924c8c94b2bfb591af.yaml | 4 +- ...3494-a94f9a8cf90bb953afc0d4af139b3df4.yaml | 4 +- ...3499-c5f80f50585482477dae3983763ad356.yaml | 4 +- ...3500-7b0e7eea2756aa9a3fb9bd9d76ac83fe.yaml | 4 +- ...3517-7c56383fa31fa34806b79179038f9c39.yaml | 4 +- ...3520-b77c5c4f0c4cc702e5668e3bdfcce6f7.yaml | 4 +- ...3546-766e921c63902196b3dd14a962737125.yaml | 4 +- ...3550-61bcaa4eb5a8e67da44b4e8cf864a6f5.yaml | 4 +- ...3553-b38686638c5362ebcaa7af99aefa8146.yaml | 4 +- ...3554-d92c57db44864e6e406520d1e97fd01f.yaml | 4 +- ...3560-ecf4e36c0bf9bffe5d8065599df28f54.yaml | 4 +- ...3581-4d573fe9c428ad3a04750d4555eab402.yaml | 4 +- ...3585-5c801a046ddb1fac8004d7794f007242.yaml | 4 +- ...3588-7da918d3fc3e2e8630ac4c982d69874d.yaml | 4 +- ...3591-dc2ceae7a9d01dd85dd05b54d27673ad.yaml | 4 +- ...3595-388546e2e07357a0226d8ddb30b48362.yaml | 4 +- ...3598-7ccdd8fc797e3fab9fea1a77280ae2aa.yaml | 4 +- ...3599-74ceb3dd0e91d385e16d6cd94c463dea.yaml | 4 +- ...3601-3172cfdf5fc8b7e358c053d42d06583b.yaml | 4 +- ...3606-a0b780503648451776551c0d1ff9b442.yaml | 4 +- ...3607-5e68a3cd88ecb3d8410d3d1d23bfef75.yaml | 4 +- ...3628-3155b6afdeb6949fabf56095cff40791.yaml | 4 +- ...3637-d46f40f2ab613d8e339074ed1d986191.yaml | 4 +- ...3645-298ee3ac56fa2818652ccdcf0f94081c.yaml | 4 +- ...3647-285480d3186a91d1e0ed6c347ab46652.yaml | 4 +- ...3650-b81f70d3babfec3365a985059b1ef475.yaml | 4 +- ...3662-76fc4346fbb39fa45316aca65b7d5177.yaml | 4 +- ...3664-5decd5b15e9e99b50c1cb7b49d2f0314.yaml | 4 +- ...3665-149aa3cdb8f6dba02a1015d8c51445b9.yaml | 4 +- ...3670-fb54b510af0f0d5e8604602a7c9ddbef.yaml | 4 +- ...3672-08de41cb2b0c0b28a5deead53bb308d8.yaml | 4 +- ...3674-1f04a4a11c02a582deff94a7681096d8.yaml | 4 +- ...3675-f2cad193bfdf87038af8a439971f7167.yaml | 4 +- ...3677-80866fdc72be2b54c095a4fd7f7db5e4.yaml | 4 +- ...3680-0e079d604a8bf155d8a2cb48193c6100.yaml | 4 +- ...3682-cb4f2a317f426735af573c79456925c6.yaml | 12 ++-- ...3692-c512399e58b223011a17608d4b51ac26.yaml | 4 +- ...3703-630df0c98158fef2598199d5ff83a48f.yaml | 4 +- ...3722-174bf1d87b8761ea6f77723705dffc85.yaml | 4 +- ...3724-ab2437d4d93bac74a9eb7aad2f952033.yaml | 4 +- ...3725-c6ebd7f92a6a9f141b0c9e1fd40276a5.yaml | 4 +- ...3728-eeb15b3523994497219c24e4ab9f075e.yaml | 4 +- ...3730-3097ab413126701a31b2c663342da851.yaml | 4 +- ...3732-88d4547a92050d1b28fb4357c26c8ac0.yaml | 4 +- ...3743-966b2e78a79b5d63896247b963e8d55a.yaml | 4 +- ...3747-bc2b1b1b8cc260b904b43a53b27b1dc7.yaml | 4 +- ...3752-f264ee9267574176bc2aef0a4dad14ac.yaml | 4 +- ...3755-d0c53aa3e05b1c3e9ba3c621e2806fb1.yaml | 4 +- ...3807-68e18ce0101bb6035f701d461eb70415.yaml | 4 +- ...3808-98b3c6ab8f905b035d160d1673b90dca.yaml | 4 +- ...3809-10147d7844868b2801a0e636a99a05eb.yaml | 4 +- ...3818-670002c777730edbb2cb892efe1340bc.yaml | 4 +- ...3819-8abead7c575d5ff9d8bcc0c1daac4379.yaml | 4 +- ...3828-995df7f208463f40decef18bc20c7cae.yaml | 4 +- ...3831-82e1dbec0eac00504fe2d5c8d1c53a7b.yaml | 4 +- ...3849-902cce6bbff4fff8307b6fb241b9a8f3.yaml | 4 +- ...3868-0a3b78fadad1468caa114f49c5837f3b.yaml | 4 +- ...3869-5b09804fb0f54f039756dc2dbfaca10d.yaml | 4 +- ...3883-62c7b160f34bc3f3dc184557c1c06a9e.yaml | 4 +- ...3885-a48eaf0c735b82aaff5677d4812dc0a7.yaml | 4 +- ...3889-fffeaa1f78027e80b8c9ac73b2739073.yaml | 4 +- ...3890-554f77c669d0419c047d6805cc30482d.yaml | 4 +- ...3891-72139ddfa4b65d7bc5dd06dc24f01748.yaml | 4 +- ...3893-f4bbfecaa3b9697ac9c466359f202f2b.yaml | 4 +- ...3895-e6aa8433ac2636bbe0e1dd25466b1760.yaml | 4 +- ...3897-74192cf75d7a306906b056f839712e82.yaml | 4 +- ...3915-0b02214c516fa5bc85822569a5b642f2.yaml | 4 +- ...3916-f58e0fb779a935f032e6158130723d4e.yaml | 4 +- ...3918-1e104d6bab1fb28ec84c0ed01b4f6113.yaml | 4 +- ...3920-466a1f62f3b9e3cbc883b22ebc0c11de.yaml | 4 +- ...3923-c20cb20ff14b1ed9f84a7525784a41bc.yaml | 4 +- ...3929-f50e7448551c79441add3846b2a5874b.yaml | 4 +- ...3936-aa24420637d5fac56ca63b2271fa8b9f.yaml | 4 +- ...3939-b0853238e27436d970fc9e4c9b697d95.yaml | 4 +- ...3942-44e1f2ffb01f5ea3ea36f27a7c236058.yaml | 4 +- ...3952-e81a4620e336feb8f24131c8ad7dbdcc.yaml | 4 +- ...3954-f95f25f2a333f8597e744c121fcbe5fe.yaml | 4 +- ...3956-d5266edec4a9e9c793fa60a9c89f4ac5.yaml | 4 +- ...3974-430f35a9a91f48c97c43930a9ef1c8e0.yaml | 4 +- ...3985-27f5aa34f1beb8f61eb1e953a98567c3.yaml | 4 +- ...3988-4db0da089db1959632856d530ba9ce1d.yaml | 4 +- ...3989-885b11bd05584acc3850df4149714f79.yaml | 4 +- ...3990-01300894d57947b3560cabf2dbbcd115.yaml | 4 +- ...3991-092f1fde35361407c0c7db51482b885d.yaml | 4 +- ...3994-1b5a3539f272e50644f8022d37b4430b.yaml | 4 +- ...4000-820928972f49f35fc134f49ec2dd204c.yaml | 4 +- ...4003-da6c348f533c2442c083b7568ed9771b.yaml | 4 +- ...4014-7b33ec746697457281bd9e42aec2f348.yaml | 4 +- ...4033-411b1116f71957083ea7a80c47e56945.yaml | 4 +- ...4034-2d42369e26f63aede3d7de3de1ae9995.yaml | 4 +- ...4035-931f5de56d92dfa4c2d39579eb08aff8.yaml | 4 +- ...4036-f499e4efa4d99d7d76254d2c3b103977.yaml | 4 +- ...4085-2b530454070b0701fff7ade24fa23420.yaml | 4 +- ...4092-27d3cbadcfb0487ad424f81cd866c990.yaml | 4 +- ...4107-74f6871329004558f0dbc4c0f34288a7.yaml | 4 +- ...4135-2f5edb5bb8d4702a159f34742943af0d.yaml | 4 +- ...4156-622d5312417c1581aa63ff2faa690a9c.yaml | 4 +- ...4158-924efae616f0032d8047ad716d24a484.yaml | 4 +- ...4185-4a3c747c05de1c383de7ec2aa84fdb32.yaml | 4 +- ...4193-c2d76074465a6dcb60332d83861a2a8f.yaml | 4 +- ...4203-17011bf78eb7cb3c3509ef0727f15b97.yaml | 4 +- ...4209-19fda0443580ba364718d6332aa05bd3.yaml | 4 +- ...4233-1fa3ecb606b6c8eedf4f6c369e031dd5.yaml | 14 ++--- ...4234-0f097e6e2a639803a729d611f2124080.yaml | 4 +- ...4265-5f2ebf4302880b4451790eb5366fdd55.yaml | 4 +- ...4275-24bb86aa2326eca80531d492521a5d29.yaml | 4 +- ...4277-35cfad6b28404a58bea291114a1dac41.yaml | 4 +- ...4280-5442adae59d3e3922670d74f56222668.yaml | 4 +- ...4281-56c2ef2b70cad0dbe9025809ba135de2.yaml | 4 +- ...4290-579cd3fc5c2399656d85cbe343c14eef.yaml | 4 +- ...4316-55354669981e5b8e2367ee7fd327c426.yaml | 4 +- ...4324-d27fa19d4b96ffbe2e62694bb7f786a1.yaml | 4 +- ...4329-1eee2854f94957b31e7d0d2d3c4c5271.yaml | 4 +- ...4334-21942b6e9d955d0155ca56bc416fed6c.yaml | 4 +- ...4335-3cd75b090f3018ee840ae18474ab15b1.yaml | 4 +- ...4339-dea28b24d7e53b89e98cd471b0652d7a.yaml | 4 +- ...4372-0aea1b28544eff7de492a84d0e135b73.yaml | 4 +- ...4383-e1512d94164bf44f71f33d2c22c01840.yaml | 4 +- ...4386-c5cb3504c5d5a8aca1e1480362831116.yaml | 4 +- ...4397-5b6638dc9ccd4becc08f9931fb9023fa.yaml | 4 +- ...4398-9cd02c8d638c4cb01b2d319013b9422d.yaml | 4 +- ...4411-3155835b4a53204a1664eff58384d4a4.yaml | 4 +- ...4417-8f62194e57a27510760b3cae99e669fe.yaml | 4 +- ...4430-dd8649decc08f39c4790db22c44b5be7.yaml | 4 +- ...4433-8279425e8ad5b9257ee709bdcae15c73.yaml | 4 +- ...4441-ed9d6de2b2caf08fa88d82aee7a4dacf.yaml | 4 +- ...4446-32b155c617c0c335f9330107a2737ef9.yaml | 4 +- ...4448-e9df6b62593e703fd734b693ccc67b68.yaml | 4 +- ...4449-fd0c27ea93cffb5177b96e76bbc2aa5f.yaml | 4 +- ...4481-145ab093189c598c1d7c84674ba9b14b.yaml | 4 +- ...4487-56a40035beb7c39c52fc3da1e76c20df.yaml | 4 +- ...4490-4f3dfe26281afe74af18534af8dcf024.yaml | 16 ++--- ...4542-7485c7376b8dcdbe05490b2d21b9e0de.yaml | 4 +- ...4567-52e89cc1870832c0bf35fd7b63eefddc.yaml | 4 +- ...4574-a96bb943a1852ea0b2e688a3b3910413.yaml | 4 +- ...4605-f5d920633ee9565486368ab785adab3b.yaml | 4 +- ...4630-b7edfb498be50e4270697b56ff65997c.yaml | 4 +- ...ator-5be710df65d6bc92f524c90909df2f99.yaml | 4 +- ...lery-e9ae08724abba099d4b3758d3e5c0730.yaml | 4 +- ...hare-862c51605ec18beb1576064976f304a2.yaml | 4 +- ...ayer-98fa09468510e4f3d608da204df8d702.yaml | 4 +- ...ewer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tats-ea643024832757f9f2006e750b2fb2aa.yaml | 4 +- ...tion-dc23dda4be9febbbe1e1b634c133ec2a.yaml | 4 +- ...load-2961759aa56e979f7c4730d8320eec28.yaml | 4 +- ...load-b935aac9392ea74d48c16c20e8b0b995.yaml | 4 +- ...olio-2961759aa56e979f7c4730d8320eec28.yaml | 4 +- ...olio-b935aac9392ea74d48c16c20e8b0b995.yaml | 4 +- ...ider-2961759aa56e979f7c4730d8320eec28.yaml | 4 +- ...ider-ae8b89aaa7a588f83d4c4781cadfd7d8.yaml | 4 +- ...ider-b935aac9392ea74d48c16c20e8b0b995.yaml | 4 +- ...hout-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...thor-c3b408a5f882549523fb91707173e697.yaml | 4 +- ...ages-498e3e358d7cb9235d23b7fd787ad310.yaml | 4 +- ...rter-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...sibe-d4ff7ccda72ef3d478471c54ece0f540.yaml | 4 +- ...lity-c41141bd67c49cd259895cd7c78b521d.yaml | 4 +- ...cker-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...cons-c6ab36823a7ccb132d76b57507e4ea5c.yaml | 4 +- ...ions-eb03f1b5d95ef0a7d7a29907029d610c.yaml | 4 +- ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...duct-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ment-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...port-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...elds-c99833151ca554dccf2540548a5b3a40.yaml | 4 +- ...laid-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tion-a7284d3f83c86c028a5b0cebbf2cf2ad.yaml | 4 +- ...inwp-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...time-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dget-1ccff55ca83ceb7924ebbc45fc9187e7.yaml | 4 +- ...rter-2021111b9f6ef5ab3859ee3ee5bee180.yaml | 4 +- ...rgpd-a8caff9400eec85f908551f99981c4c5.yaml | 4 +- ...ages-f95a4bd79444a6bb4c86f62647865224.yaml | 4 +- ...ders-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...book-8ffb6f085ca0e1f89a621d273438f0fc.yaml | 4 +- ...tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...menu-57689f801f3390e9106eb400e17d855b.yaml | 4 +- ...menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ixel-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...n-wp-0eddba28d26b374b7f8490ca46c51c29.yaml | 4 +- ...ixel-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lder-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lder-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...oser-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-api-60d12634c1b8de8d81af0efb8a90411b.yaml | 4 +- ...this-4df8f94a1b3a10a0e93c979447a9e37d.yaml | 4 +- ...this-63618d1b2772f81d989c25189b57727a.yaml | 4 +- ...oxly-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dget-b022913a2c1b91275126aaf3b57a5b27.yaml | 4 +- ...ogin-8e89a9166eb8a31b3f0788c884713593.yaml | 4 +- ...team-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...eiro-b56b643a394756ad5a6e6d10ca73e89c.yaml | 4 +- ...nify-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lugg-9a9ae078aa8492b142c833f71cc23292.yaml | 4 +- ...r-wp-32ccd5e0c657d764432d8a2599e1ffbc.yaml | 4 +- ...r-wp-97317cfba5a4e1ac31624c57d27d0191.yaml | 4 +- ...ager-0f106f68230dd3847df5cac404354f2e.yaml | 4 +- ...ager-b07982a67f16a7148433f4d658429720.yaml | 4 +- ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ager-c848309da304f217f6ed4776631e8c6d.yaml | 4 +- ...tics-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...7-db-09b9a87909e1abd2b1771c596b468a9f.yaml | 4 +- ...-pro-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...elds-74d01cddad4cc8a47fb2dbd74bd23ca7.yaml | 4 +- ...-pro-877a1559edb434fbb6761e8bcd1aaf40.yaml | 4 +- ...ield-f0cdadcff316feb53fd77aca416bb2f6.yaml | 4 +- ...acer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-aa979abd3b3cb9b7bb1cd2ef795b502b.yaml | 4 +- ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...nter-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ager-0b8752438dda7aa69e32a586e9110978.yaml | 4 +- ...ager-a17b58f6876bd5740a12242958831995.yaml | 4 +- ...tewp-3205ac6df5d6745a5d1c210179723168.yaml | 4 +- ...gate-6748230cb5270a84b852b5bff3631f4d.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...more-0d10f95dc02c34323ca2661d596c206b.yaml | 4 +- ...more-28696fa61d6f901911f226ee59d9bc21.yaml | 4 +- ...more-d42fbc843251d5f50991be5b8b42b3d6.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-pro-a0309fc6dada5d85650b4762bb282066.yaml | 4 +- ...-pro-e17e90463e6889aa07cbb8b7927771be.yaml | 4 +- ...ubot-515bfb8e519273db685ebdf46ba27554.yaml | 4 +- ...page-4c92870ff7a0f182a44699dda7bffd35.yaml | 4 +- ...ndar-9e62074ce42abae7e7fbef8d4e799261.yaml | 4 +- ...odes-154de88e6cddd165b6ff204a5922a0ba.yaml | 4 +- ...odes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...odes-bbd2aa17be72216554254e2d8e755d19.yaml | 4 +- ...pack-6b8b57f1101c92df559274dfef436538.yaml | 4 +- ...pack-bc257f9f7078df85b51c2e5181af811d.yaml | 4 +- ...pack-f0ea860f14b0b0ca566ac38e74715e9c.yaml | 4 +- ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tion-7757d5b35907f5f49944633dfa8351f2.yaml | 4 +- ...tion-baaba4f56b4f175e80057b4999371a96.yaml | 4 +- ...wall-d6e02747846dc962e1ab5d119bbf94ea.yaml | 4 +- ...lkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tion-090eaec5db6a3b5e9520804055acdec3.yaml | 4 +- ...gram-87c10838d1b8a43254afbf05b7f964c2.yaml | 4 +- ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...izer-aff79341750b1cf6ce299e2e5a87675c.yaml | 4 +- ...ular-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...hing-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...e-it-9d4c7c94456d7936525f7973a9574896.yaml | 4 +- ...menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ters-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ugin-d4f178ca51b9a3854e944ff01429b4d0.yaml | 4 +- ...spam-6dd6322d887c160ebd9dfa555a077a3f.yaml | 4 +- ...opup-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-txt-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erts-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ctus-34166a606544203d0a234746ff259ddd.yaml | 4 +- ...ctus-5efe3bb103834ebca4e7ce81f7b0fd92.yaml | 4 +- ...font-81f4538f2765df23f8b4f561b33039aa.yaml | 4 +- ...-log-e186fa859c9eb38cc8ef0cb73e6a43b4.yaml | 4 +- ...ript-1487ac20915c63a985fc090bb178b2a8.yaml | 4 +- ...ript-3a24ca5d79101db2344acd5815fa20cf.yaml | 4 +- ...tion-79139d2e0a7eb5022bea3408ba7847f1.yaml | 4 +- ...base-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...orms-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ages-7deebe50bd92a2450bb0ab52d4fabce8.yaml | 4 +- ...-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...orms-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-gwa-1baba58fdf15d4d0a7d4d7886ec16e9b.yaml | 4 +- ...-net-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ents-d7661df8620c7b906e4301d69849100f.yaml | 4 +- ...alex-00e15cae549764aa48f28dd7ae0bb1cd.yaml | 4 +- ...-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ebox-a5bc98329e35c128c91f3ce8a71c6a41.yaml | 4 +- ...-box-5174039d89c7d18d794fb10cf1a282f0.yaml | 4 +- ...-box-c5104058a36ba87cb65f65ec0059bc5e.yaml | 4 +- ...oads-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...hing-e548c20619f1bf8ad1418368ebd16e42.yaml | 4 +- ...r-wp-90dcee7cddc408bda7d7da416498432f.yaml | 4 +- ...stic-d7479b175a0668ffbe5af726e8c140b2.yaml | 4 +- ...ckup-e30a273c4e2ac5b93368dcb61feeb896.yaml | 4 +- ...uler-2042c2ccb1432ca181653532b126746f.yaml | 4 +- ...ways-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...only-de02ae500f9a57c33a0ee01cf27ee98f.yaml | 4 +- ...ress-1f87f7a2adf09634e0df0bd21922373b.yaml | 4 +- ...ress-50e1ba859aba6574e04bc19be7d2a72d.yaml | 4 +- ...pics-e9ae76ec6425c2521c80399f801c780e.yaml | 4 +- ...ions-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...sion-811048b3ad2eacb5c29f4e0546b22dd5.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...weet-d6f0e617de1a3c82f777a89829211e90.yaml | 4 +- ...dons-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...some-1c7d78d4a78d0f2d3396fece72367d31.yaml | 4 +- ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-txt-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ring-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rity-607c512f0481cf565f88f66597dbe101.yaml | 4 +- ...rity-98d2f4e2c6a41f3ef336107b39e46630.yaml | 4 +- ...rity-bc0054c93edc82fecefb873208e2d77c.yaml | 4 +- ...rity-ed72aeba76ce6c9e43fa074b4806ae70.yaml | 4 +- ...tton-c390ab25927b32a9c95c398ffd819321.yaml | 4 +- ...tact-61a7db517f3679fdc65455e830f0b650.yaml | 4 +- ...ator-2817b00f145ff05ea405982ca6e4d8ab.yaml | 4 +- ...ider-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...orms-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ogin-c30d74ab3c1dc1a9e7b14ed816c12f35.yaml | 4 +- ...hina-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ster-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...pare-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...nion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...page-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...pack-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dget-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ckup-81a6f5ecaf1c598cd2e1db2f58c01ff9.yaml | 4 +- ...erce-9c98e07f9de6c1ac362dea3f4f9b98af.yaml | 4 +- ...tson-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...essx-fa751f89fc374e558e8d01ea059343f2.yaml | 4 +- ...ices-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...king-279486597ac6d210058519567f6297ca.yaml | 4 +- ...king-2f651d26ae436687bdff9a8abab4a173.yaml | 4 +- ...king-6a265db2a9121f4da4875337b8e6751f.yaml | 4 +- ...ndar-88138db1d1aea177c6151b845da287ff.yaml | 4 +- ...ndar-88cc9361682247d3851fe23cf11de139.yaml | 4 +- ...form-ce69ee3276348a391868ff2589e7f8b7.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...king-8e84c6d55a38a50c9e90b28855791a03.yaml | 4 +- ...okit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...helf-6ab8d1e005858a4b8a6347eda74e7ac7.yaml | 4 +- ...erce-f91c2602522656e11d82af368c387634.yaml | 4 +- ...lder-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...ages-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ents-2954406cfff461fdbbd41cca0f0b5dbf.yaml | 4 +- ...ents-37fef8959e103795e5217ab4860bd85a.yaml | 4 +- ...ents-3a30cbb34610b918136a671069241bbf.yaml | 4 +- ...lkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erio-25ee6eba4f05265a07353f4c20de2e87.yaml | 4 +- ...ling-5394ed5bbbdcf7b65cff8921a9a68e7e.yaml | 4 +- ...orms-f47477188afe1a9a9b869f9c5c6fafbb.yaml | 4 +- ...rizy-2ea9b11139987a1bb9095ad4e4be45bc.yaml | 4 +- ...nder-48dead1c8e1154d67ccc9e390d285269.yaml | 4 +- ...ager-f85f5bca86f0fe8e61b822a458c1b11f.yaml | 4 +- ...form-122921564a68def720b196881ac65cfb.yaml | 4 +- ...orms-4f1bcfb6c80585124e17859286f212d2.yaml | 4 +- ...-acf-6f39f76c23209b8f553defb1d25caa0d.yaml | 4 +- ...orms-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...elds-cff8c4e5924684eb6753231ae69511fb.yaml | 4 +- ...bers-aa1e46c69c06ec911dde69a16f67cb87.yaml | 4 +- ...view-3d4fe5743b4cfd3fb11de9a33d55f7f3.yaml | 4 +- ...ress-533ee8fa484df21d792f06431e1c5c50.yaml | 4 +- ...ress-863062f7cb6b2bf7365f623cc8d292ad.yaml | 4 +- ...ress-af97e64423b75225062fc5e60d8e5fa3.yaml | 4 +- ...ress-b60bae014d152f2a394bd09bd7490303.yaml | 4 +- ...ress-d0fd9cc44e353f2e6039b73677016f83.yaml | 4 +- ...edia-098044594b04ab841c349ed64a192c47.yaml | 4 +- ...edia-af05e39beae4ccc85b4b7733a1dfc389.yaml | 4 +- ...edia-c87d935ed7b249bf9a1f11f3472af3e0.yaml | 4 +- ...edia-d489286ed41649bac6a4b978b2c38ed0.yaml | 4 +- ...edia-dc0051edab31221e49ae9364dcda380b.yaml | 4 +- ...post-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...load-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lete-24cf0801a4963f154c38e24267fc828d.yaml | 4 +- ...tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...heet-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...oast-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...bute-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ator-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ents-246b8b56564018f48400096509996111.yaml | 4 +- ...ents-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rity-5dceb192e7c190761b3c97b152cbfe74.yaml | 4 +- ...tton-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ages-0c97fc31b35102d21ddbee9abbb4d9fd.yaml | 4 +- ...form-139d1504f66cd87031fd329a5f49ab94.yaml | 4 +- ...orms-768674b25e725613816286a9dc3c4233.yaml | 4 +- ...-pro-af5db143583f026b4ec13d0e53264642.yaml | 4 +- ...ndar-05d1ff035c1fc3b076e51a7b5c7af2a9.yaml | 4 +- ...lder-fdb6580a9b4fe182559a2e3ed6c65f0e.yaml | 4 +- ...tory-aefc22c7a60a7d5e0b05b0ef2a479b2b.yaml | 4 +- ...nced-df1f9aa06bdcfa30c9c48b598c66ff46.yaml | 4 +- ...tion-8a7e1f1e76c1a5624370361e3f4014b1.yaml | 4 +- ...acle-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lift-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...erce-691ef5f746f46ce4f71b48e893324dcb.yaml | 4 +- ...-url-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...pops-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...hang-755b5e97b09ddabb36f708e4895b834c.yaml | 4 +- ...ools-c59a23b4a74b5a776a9442e033941d2d.yaml | 4 +- ...rify-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...xton-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...elds-5f06348f7bb36613ac049dfd554c46bc.yaml | 4 +- ...ping-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...yler-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...zoho-22168446272a333f9aeaf32a63eb65ac.yaml | 4 +- ...quiz-5ad18bbfeb4c12a137de8b17b7553a5c.yaml | 4 +- ...quiz-bb66f4ac76af234c75b6841b7c13994a.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...itle-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lder-08b024925f5d1dcafa4385a333501904.yaml | 4 +- ...tbot-8142bc3541567011d52df62ad2e24883.yaml | 4 +- ...haty-54240ff4b4cecbac0ff14d99813212f2.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...pace-d8f2805c892cce30b8ee704118111dfd.yaml | 4 +- ...tton-f34bb308bdc8bf0abc4007f19af318c1.yaml | 4 +- ...ddon-cbd9c033d999d7b582bab8aeab6cd501.yaml | 4 +- ...olas-9b88069f10fdb904873358d79983304f.yaml | 4 +- ...ogin-5ac185ae82fe98b391f7b0249d150337.yaml | 4 +- ...cons-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-top-07e8e438f9983a0ea397db3cccfb2a0b.yaml | 4 +- ...-top-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...ugin-45e600351b047339fd78ec95bb2976bd.yaml | 4 +- ...volt-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...icky-8edea37489d7d07897482f68884c7200.yaml | 4 +- ...nger-1c07181abecff4187bed7fdcd8d1afe4.yaml | 4 +- ...nger-5c3ee68d8799e2236b3bc1333dfd2f35.yaml | 4 +- ...ners-9a8cd1490d53fe02691b7245088ba1a4.yaml | 4 +- ...view-664f9708c952ef16850b76782a119235.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-c148c7298cbf640c64f29d57d3ad5df1.yaml | 4 +- ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...itor-3030bade61470958bdc416b0e2c89b83.yaml | 4 +- ...view-9a51dd537aff6d05f9d6a7c50a359270.yaml | 4 +- ...ales-0a55644b51a5df02f2cc7d960c48224c.yaml | 4 +- ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ture-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...d-to-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...date-2e35c0afd479ebddda5688f51cb87b9d.yaml | 4 +- ...shop-23022d4d8e20d83e1b4a708870cdf48e.yaml | 4 +- ...shop-dececf152f183ba1e4159b4797e96e29.yaml | 4 +- ...gets-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...mons-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ions-db180c33b0677e46a0a6bb8bb9ad8a71.yaml | 4 +- ...orms-7651cce817269ea91d5fbe788e52194b.yaml | 4 +- ...sion-8ba7976e3e4bdeede76b4a3300e51140.yaml | 4 +- ...dule-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-add-2fc7a8d84b84e65f1ccfb4b2642e31b7.yaml | 4 +- ...lder-e751943c96e8083bbd38ea46395e441a.yaml | 4 +- ...stic-3f35ac18f9207e0d36c74b4e353744ff.yaml | 4 +- ...stic-8496d75762eb7cc39ecc911adbe09233.yaml | 4 +- ...fdb7-4804713458840c235ae2e000980eb782.yaml | 4 +- ...aker-60c3cd16f2597496a4651e0715286bc1.yaml | 4 +- ...ugin-bfef76276701b6af6e198a50eb02c42f.yaml | 4 +- ...o-db-681fa4a6fa6cb7b76b53c0bb6085cace.yaml | 4 +- ...mail-441ea60f05f966e781a45c27f0c1432d.yaml | 4 +- ...mail-c9506f63ff82213ed0ffcd809196c6f9.yaml | 4 +- ...list-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ople-2961759aa56e979f7c4730d8320eec28.yaml | 4 +- ...ople-500d22096689e74a2a7a6d680b428339.yaml | 4 +- ...ople-b935aac9392ea74d48c16c20e8b0b995.yaml | 4 +- ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...bars-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ctor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lide-d36d80c800d370d4009d1b192f222cc5.yaml | 4 +- ...g-v2-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...udio-573a62057c81ca4962d570ce03558e74.yaml | 4 +- ...cker-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lery-adf21f96bc20b891592eb95e06429f24.yaml | 4 +- ...lery-f0c828ee470540e4c37a94d5e7637488.yaml | 4 +- ...olor-aaa55eb82dbd089503acfbd59b1c1516.yaml | 4 +- ...osts-5edac4e24aea010bac0d630a89afdf47.yaml | 4 +- ...ents-5f9367f594e64f78f39747766e36b5a7.yaml | 4 +- ...neda-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-bar-daa176383a0d1a1f03b0870eb52cd5ab.yaml | 4 +- ...mber-62e533687797ef0b9325ac92a155944b.yaml | 4 +- ...-day-8219532133f7917d1e83bbff3f75f37b.yaml | 4 +- ...-day-95e1c7301e20b06d93d00a27ff0164ee.yaml | 4 +- ...lder-fc7104705e7470f1c2f9c7438b20c375.yaml | 4 +- ...-box-ac3838985ebca1d5500d58f039c66d50.yaml | 4 +- ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tter-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...hter-3b77b21efbe327e0220e81411dd8c94e.yaml | 4 +- ...ider-c49e2e06de0a40bb63220fc2a17c181a.yaml | 4 +- ...ency-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...odes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ager-26658d0497122e0a7345c841c1d21163.yaml | 4 +- ...orms-b5107e8a16fdf42082a09176739d6a43.yaml | 4 +- ...uite-f70de88be0d0ac1b3e5a362aa6fdf31c.yaml | 4 +- ...corp-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...inks-a4a1da4d7b74087a323eb167fd7b89be.yaml | 4 +- ...inks-b5323eb3191a74d0ae4ca412560414da.yaml | 4 +- ...e-ui-cc0bb9dcf67e5af12d7fa45c43bf04f1.yaml | 4 +- ...ypes-dc2b0f4dde9149582362d961339fc430.yaml | 4 +- ...tcha-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ager-12554d58fa3f58e451e08d638496a899.yaml | 4 +- ...erce-c4c5307df5e11c4cb59893ef8ef58c8a.yaml | 4 +- ...erce-d87bb9dcf525660329cf7bc1593d3596.yaml | 4 +- ...ogin-aa4710021e6cea364e343185a5562523.yaml | 4 +- ...-key-ebb0aac77c202e0b9298617914b34a43.yaml | 4 +- ...ider-225f7f3db7dcaeda4fe6b0e7795cf610.yaml | 4 +- ...ions-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...trwa-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...mode-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...mode-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...ntor-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...stic-22fbc746f561f8f03289b13752af9220.yaml | 4 +- ...wser-e2758e6d7a956b70bbb3456d32eb61ef.yaml | 4 +- ...ield-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ndor-8cf78197e7d698f2f23c8fbd16dab60a.yaml | 4 +- ...-day-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ents-349bcd84d9f8de30085279d049beebc1.yaml | 4 +- ...site-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...osts-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ally-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ipes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...hive-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...auto-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tter-26f3ee9e0b5d3d296c77f279bcf1dce7.yaml | 4 +- ...ayer-1da0a6197b1106904178e0b8178f3b2f.yaml | 4 +- ...stem-9badde4161dcfe466c75ad211f71fa17.yaml | 4 +- ...stic-4de4b5fb4c51e07373cc17e285c57285.yaml | 4 +- ...stic-739db2cc0c9500d655d27c730225e398.yaml | 4 +- ...erce-5db488a5ce4a9b749eec8867f89dee42.yaml | 4 +- ...rist-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...tend-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...stem-10705e3d714d3c8649004193cb95f340.yaml | 4 +- ...lder-aabb704338c74a997901edf2f42d1b76.yaml | 4 +- ...stem-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...code-53c85ef54b387a398b144244c40bd611.yaml | 4 +- ...form-4667942accde23610dd8e0b089b22f23.yaml | 4 +- ...load-1963440e9d46a424a870f14bf4b601ac.yaml | 4 +- ...ager-02ae4a0720867671dd11925e4a221a75.yaml | 4 +- ...ager-03366e13fcca1db85a35f2268a00796c.yaml | 4 +- ...ager-0fbbdf117a58185e2bf8aba144015927.yaml | 4 +- ...ager-3654cd4919a2027fb17d521b494ff35a.yaml | 4 +- ...ager-7367ffe725d32472b793d84e3d0fe0d9.yaml | 4 +- ...ager-8c46bf632b1c3634dd29de610dae2727.yaml | 4 +- ...ager-b1861af38d12189832b1b119b32a79ef.yaml | 4 +- ...ager-da52023c7620366d69c94922efd73968.yaml | 4 +- ...ager-de94c31f4187177567b889a40327a1d3.yaml | 4 +- ...ager-edb73da37a786109cf2a1c2cf12e6eb7.yaml | 4 +- ...itor-2f1f33bfd002c22ab758b0590571cc4a.yaml | 4 +- ...itor-95ac055a4400e480693a1f956a7737eb.yaml | 4 +- ...itor-fa3ec4c554fb01ca3485de73728dd008.yaml | 4 +- ...rm-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-0921939ba9d36b3bc7ef6782c794b5c5.yaml | 4 +- ...blog-d1894aa72265b74c9b59e10ca93f4375.yaml | 4 +- ...dash-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...oxes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...text-746ab5fca61ed161758f284f4d55f254.yaml | 4 +- ...suit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ting-a4b85243ad36c1329732b5275f246278.yaml | 4 +- ...bers-58dabace517bb3fd14d9bc2e6628a726.yaml | 4 +- ...page-2d87c0364307edea9fea6b2a2be6834f.yaml | 4 +- ...page-fd184e22776918171b2daf7b166b3579.yaml | 4 +- ...post-517e55dfe7f60b7457c238ed215d0a10.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...post-2d87c0364307edea9fea6b2a2be6834f.yaml | 4 +- ...post-e4d1ad7c2888a8ba91b50fa79c134af9.yaml | 4 +- ...ator-22105b80b6b00742d7d1393ced18465f.yaml | 4 +- ...ator-988ed918d003525e19a036e7fba12cab.yaml | 4 +- ...swer-515c6f7cdb52a3563e73406fbbc7b42a.yaml | 4 +- ...edia-8b0729074646bdcd5148e643a832f062.yaml | 4 +- ...font-e3c56661b9733debd3e6fea53555b839.yaml | 4 +- ...lery-b558d2c101e0c756483bb33734bc9369.yaml | 4 +- ...lery-bf282437cadf1ae50cc09a36bacba2a9.yaml | 4 +- ...rify-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...pets-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...soon-a73a6cac5bd5a80c6a22adb8c250c687.yaml | 4 +- ...soon-ea0ca66e9eeeaa433f8d74bce5e52c45.yaml | 4 +- ...ebox-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rify-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...load-61b9b26895ba1396cd862550f59dfb02.yaml | 4 +- ...lery-28fafed38b204e7345a98c45e56c485e.yaml | 4 +- ...-pro-9bee1adcf88eccf5bdf4a140784b69db.yaml | 4 +- ...nups-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...cart-db5362134a2d7eadd5e40de928930826.yaml | 4 +- ...soon-f58f1d8f11140c3bf88a5bed98434fc1.yaml | 4 +- ...ount-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ayer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dash-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...inks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...cons-65f22b1513e1da3131ee1c2793b0624c.yaml | 4 +- ...cons-9cfadb72ed62a1496ef5a1550e74d7ca.yaml | 4 +- ...cons-eb06b36db83cd57ff46c8ecced75bb58.yaml | 4 +- ...cons-f326c6f978051192fcd3f58deac7c7e7.yaml | 4 +- ...ress-7046ef2cfb73e30aa27cd120b026bf95.yaml | 4 +- ...ebar-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...able-365c4967f8ed82c8fe8be419a127bb67.yaml | 4 +- ...ials-6fa4b95e95d113650666ff28a08a093d.yaml | 4 +- ...feed-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...iews-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...iews-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...king-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...page-98fa09468510e4f3d608da204df8d702.yaml | 4 +- ...cart-3bc18d019b91d2de29e8f02de7016b9b.yaml | 4 +- ...happ-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...enmo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...care-029b8e032e0fc0a8b295cb9989f4bc4f.yaml | 4 +- ...ddon-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ntor-1f2c4e6dec405aef3fd5e6566d223430.yaml | 4 +- ...ntor-5ccd429722cafafb64349730f5cc0669.yaml | 4 +- ...rlms-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...logy-e298d4cd6c60e1657aca279370a259b7.yaml | 4 +- ...lery-5969d2a7887ae66d8279d64632cb1bda.yaml | 4 +- ...ndle-8e9ca596ac830dab2177a8b85d591379.yaml | 4 +- ...oter-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-log-628e104d3a4b1ff3a2f651b79f8f25d3.yaml | 4 +- ...tter-72825f3aadd86474681e72f8f4d9931a.yaml | 4 +- ...bers-13af706509ed275951fca2f87c67ca91.yaml | 4 +- ...cker-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-pro-ee48551d5debb82650756b153a85ffe4.yaml | 4 +- ...orms-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-ee48551d5debb82650756b153a85ffe4.yaml | 4 +- ...ewer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...r-bi-30c71081d6f65fd865fd605bc8ca0520.yaml | 4 +- ...ress-e1343ff86b6c5b93b675136f5cf7bf16.yaml | 4 +- ...form-d2114b88fcc067766472c75899b7fa23.yaml | 4 +- ...oard-b76f995a16535082b5686ca7f787e057.yaml | 4 +- ...itor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lite-1015b09d99817c2106e43f3451c30ac1.yaml | 4 +- ...lite-9319000e1757d81a7b4d434242e3b0b6.yaml | 4 +- ...eway-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...llet-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...mico-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...r-wd-f5b60cb69c042e53c0624a4896969936.yaml | 4 +- ...ndar-204a4a5eb1bb83f22931c8d30c356316.yaml | 4 +- ...ndar-c4cddbbbf9510f7f05b91c86dc3dade6.yaml | 4 +- ...kets-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...nner-eb93d0fd8aabb59ccf2ece6d36890f6a.yaml | 4 +- ...tify-5dad00a11bede1ceffdac71757dc57c7.yaml | 4 +- ...ment-d1b60cf010a4c4b99d620cf0f040e27a.yaml | 4 +- ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...plus-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...easy-2f7fd4d18b200014ffe6ce74713f97bf.yaml | 4 +- ...easy-df8b0e3e82913bd73f66e923babf0341.yaml | 4 +- ...tbox-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ites-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ntor-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...ntor-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...shop-3e4167472cc19aa7d5c770b7ff08e85b.yaml | 4 +- ...dget-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tify-a6e54ba491e72f796e7b6e74aa4dfebc.yaml | 4 +- ...edia-090b5ab75971c1cf3354717d50e20576.yaml | 4 +- ...body-98fa09468510e4f3d608da204df8d702.yaml | 4 +- ...olio-05d549bbf43422565845abd53d01ba98.yaml | 4 +- ...ckup-d1f60a6312b998075106906482a83fc4.yaml | 4 +- ...lery-358b0cd776c979c59cab288ffb33dfa2.yaml | 4 +- ...gner-29abd196b81aad745cf652b3ba722e02.yaml | 4 +- ...data-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...q-wd-37ac09d863363372a10edf05c9e9e76f.yaml | 4 +- ...ager-45db54965982ed46b91f5576d8c56bfa.yaml | 4 +- ...ager-7a87807daec2011fba4e64fcc9f8c9ff.yaml | 4 +- ...ager-8cda9bfd3e2c450e7c2c0a786c763ffc.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...t-wp-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tics-cf309d1aebaaa67d40cb82a03fbd96af.yaml | 4 +- ...lkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...eeds-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lite-6358c61bb5cba311cb2b24aa2921d29a.yaml | 4 +- ...lery-5556a133daa1113e5966da5001155a19.yaml | 4 +- ...cial-274b8b119cea9c35028782c46e1417bd.yaml | 4 +- ...uite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...cout-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ator-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dweb-57aa4255793b420daa78a4aa19aedeff.yaml | 4 +- ...ress-1790bee47ee796caaff632f15b4d5f1f.yaml | 4 +- ...ress-e50a4295f2c4d9bb583975552d8db6c3.yaml | 4 +- ...erce-39c8c0331c249c6c886fabcd8bbe5a6c.yaml | 4 +- ...ager-bd5e0701ad8f9d787d4f03d3c90929d9.yaml | 4 +- ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ount-942278840325a3151a90aba61723bd9e.yaml | 4 +- ...list-65e3ebcdd517173ee2482f46a1239a5c.yaml | 4 +- ...-all-951a6c1e508507cf69c6b78271828a61.yaml | 4 +- ...code-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...agem-ba981dbbf1ea06bbf2969e39bd0742cb.yaml | 4 +- ...lery-5a8f9f4e46e4e9903571445b91cbd00c.yaml | 4 +- ...lery-a6b7b9dbed28e3619b6105ab67bf1f0c.yaml | 4 +- ...lery-bf1b5f8a23a62c1a6be7914495f430b8.yaml | 4 +- ...lery-daf27b66517334d1a8886ba5982e7461.yaml | 4 +- ...ator-8041e4418d6dd5832b9d268c12d84f0f.yaml | 4 +- ...tton-974e55fea877636d350ce5211a9f2278.yaml | 4 +- ...inks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...eets-1e72c31c8795449e9c06e927fb97a2d9.yaml | 4 +- ...eams-765a9fd486d65b41296bb2e40f26d4d3.yaml | 4 +- ...show-d0db0236c8bb93bbd9849f985e9c57df.yaml | 4 +- ...mbed-797a8ec8d14a7095c1401c88381f0455.yaml | 4 +- ...utes-f0a4fb1ab5ad45a43505bfb864975940.yaml | 4 +- ...-pro-c2b59c8389d71cf87b7fb1296201832f.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ders-346a08b5e01ce0a0fe29178ae41386f7.yaml | 4 +- ...iwyg-6d24ca924659d60813d0c9beab91c29b.yaml | 4 +- ...pler-a0f4536ea7bd1323c1b7b95c9e4b018e.yaml | 4 +- ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tbox-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tore-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lery-ea2db66e943b1038a7ee25bf53b0dcc6.yaml | 4 +- ...ores-2d57f425ae40c364bab73a19021c28f3.yaml | 4 +- ...ield-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...aker-bac514b6f0b1f8c0997d58523192fc7a.yaml | 4 +- ...aker-f99ce34ee4393dd151b2436ea69250e6.yaml | 4 +- ...ibes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...orms-d46aeb2acb3fb066be1f4ef24cb7b7ca.yaml | 4 +- ...lder-860302baac60a4494cef29bab34e785b.yaml | 4 +- ...form-d7ca1dd38546745c43c763574d903819.yaml | 4 +- ...able-6c309d4fe4a7c00ec9f13abe6fdd70cc.yaml | 4 +- ...able-aed9f1a9cf9e76b014fa4ceef2236366.yaml | 4 +- ...able-b198b20134bc1a80b2134b7e32b1d9f4.yaml | 4 +- ...ting-b49deb95fc00559c0721d2c968358861.yaml | 4 +- ...edge-ecf9407059e3582708411befde00831c.yaml | 4 +- ...ator-0b29757be7c9544b9f5309f3b1be1e0d.yaml | 4 +- ...ator-950d0fecfa65a978eebec0d58fd1e9bc.yaml | 4 +- ...ator-a6cb8bb474a298f0d13061a17830eac9.yaml | 4 +- ...pier-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ress-05da59639245e73e5006b3b27fd29b5e.yaml | 4 +- ...ress-1ea57d4028638a993e3a1865c1c429fb.yaml | 4 +- ...ress-28cc3b436a054be9278bf9f654cf7298.yaml | 4 +- ...ress-4392c790af392965f4ef8691acb00317.yaml | 4 +- ...make-47ea4a03f1b0e77aad4910db22ee3336.yaml | 4 +- ...port-7c89a34e4a8d83c3780278094a4e89a3.yaml | 4 +- ...itor-442cb89e3902ba64d65dffe5c1dfe1c2.yaml | 4 +- ...itor-61e60e72ae19f21a2374d506ca4c56c0.yaml | 4 +- ...itor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...sers-9934720aa2c12ee56875eafe6d4b5c05.yaml | 4 +- ...d-pm-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dmin-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dash-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...gner-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...spam-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tcha-7c2f84ceedf786d66412b2ddd9745e29.yaml | 4 +- ...ebar-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...ebar-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...gage-b1b7cfcecf2de0389a1fca46f626041b.yaml | 4 +- ...n-on-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ayer-4ec113a2f6c7cc34cbdb0b48aa39a566.yaml | 4 +- ...ager-9f4658b745b189d37014521dd6a95fe4.yaml | 4 +- ...king-779d1e87dc368b31bfafa7f1aaae4f82.yaml | 4 +- ...r-wp-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rsal-f581daf73a2ae47926782b6731f30bca.yaml | 4 +- ...bank-12287cbd7ce878e9fd3267a0e01cf78a.yaml | 4 +- ...bank-26bba1e52907934fbc2f76bbe8677ffb.yaml | 4 +- ...bank-4ba873ea604974c0a71c72511e63ccc8.yaml | 4 +- ...bank-bb9ff775c7105fbb3a95361f39741664.yaml | 4 +- ...-box-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...ages-7029424562dcabc51ba988c294ceda39.yaml | 4 +- ...ages-e236a1e5d3fb64e88e0ebd90fb6e2c1d.yaml | 4 +- ...ugin-db5c08fdc8b62ebeda31a66adc0254db.yaml | 4 +- ...olio-e03fc6f95e1cd7a63c181eae0df5daef.yaml | 4 +- ...ideo-4499af25b68b47ad188a0b7fb55c9dba.yaml | 4 +- ...ideo-f4a5dffea18f1f7d8c2a38499c203636.yaml | 4 +- ...tton-c617abebc11fcaba875f8bc2aad4995e.yaml | 4 +- ...tion-808442071b530e99e27528108f7402f0.yaml | 4 +- ...ntry-5e536ce02840d623d389b9ee218020ac.yaml | 4 +- ...feed-00a6e702537059b82f7d21b3c6087796.yaml | 4 +- ...ents-fd5091b9ca6d56c1bb46823f06a6b82d.yaml | 4 +- ...ting-df4cd9fee3d0d59fcdf3318f36c11feb.yaml | 4 +- ...ting-ff4f16d3b72060599b9ed34018f0f5e7.yaml | 4 +- ...sent-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tree-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...shup-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tory-ba7c20e930a8487a26eac0cfe90c0f74.yaml | 4 +- ...lues-328e4fc27caed74ff806a419cfdcc0b7.yaml | 4 +- ...ions-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...fter-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...arch-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...elds-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...asap-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ries-95f3b505db0bb5acbcaf86e1dd39e4eb.yaml | 4 +- ...arch-76fd12ad8b7b78037046699e5ffa0377.yaml | 4 +- ...port-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ller-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...deat-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...iral-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ress-01178f6672a2045cbc07066e22c4b9ed.yaml | 4 +- ...ress-4c07ee1f8d9ca7766b852300f804ffcc.yaml | 4 +- ...s-mu-1622f7025c888065199677a7f8c3a0a4.yaml | 4 +- ...ator-18429af9c071c8309e034a7d4d00a8e6.yaml | 4 +- ...ator-202ca74fdc1ed676814ee60bc8ef09cc.yaml | 4 +- ...ator-c7a8789e2e14665dec08cabfa7ba8238.yaml | 4 +- ...ator-e0be71e8989abd7e932a8db49d3c409c.yaml | 4 +- ...eady-42f393afcc63e1048ce48bee1feb1c00.yaml | 4 +- ...pets-3b1e2a032a6f302e2ccd9d18f56d17aa.yaml | 4 +- ...ator-1f82fcaacb5a6d3e18b98a66c9d7e3ab.yaml | 4 +- ...tmls-0c5d9c3d25fdcac52f9189c83dcf8aeb.yaml | 4 +- ...tmls-dad4d79fe3688c4dbc2389dd7cd7a0c1.yaml | 4 +- ...edia-3d97f53ad1e035f606fd358779aba41f.yaml | 4 +- ...edia-f89c8645dfcff6d7c8daa63e313b40dd.yaml | 4 +- ...orms-77f0a0f1e7db36263a8aa9ab981e047e.yaml | 4 +- ...orms-af26d379855801f026d0f678221b9f09.yaml | 4 +- ...orms-f9a5aabd053da65d5b8f27e85e3ac8c7.yaml | 4 +- ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...hogg-6b4accb527f76b2e4224aaf45a24e723.yaml | 4 +- ...ents-36c5b3d7d876a774f8fd4aa153e32524.yaml | 4 +- ...olio-0e5cb6701f47f915bf3484f8aa48343f.yaml | 4 +- ...olio-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...olio-51cfef8c45760573f4f3cc1655e5ab39.yaml | 4 +- ...bers-89d1ae974c3297f3be00b2900b223ee4.yaml | 4 +- ...bers-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...nial-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...side-9d901cc0b99cacc346adcfb2e44aed31.yaml | 4 +- ...thor-9b2b2cc106e50e817ce608f745dbdaed.yaml | 4 +- ...ions-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...berg-08c53afd34ffbbd3059a2b6b66bcb1c4.yaml | 4 +- ...berg-dea122a140ad8ae54d1e3b79712b8d73.yaml | 4 +- ...ider-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...e-gb-b0dcd475ee39f280da0df0dd6993e407.yaml | 4 +- ...e-gb-def48545fc7b8f7aba56c88a829527ec.yaml | 4 +- ...dons-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...dons-c9ff001e2ccdd465207fe5710fbe6c52.yaml | 4 +- ...xcan-3db14e51e4cd401655d11f7aea7dbad4.yaml | 4 +- ...heck-fa8bb26d319a4e03fd0e1e3bc361d9db.yaml | 4 +- ...pful-fdcfcbc977d2772beb04b8279c53f48d.yaml | 4 +- ...-faq-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...y_wp-9d0b835dc24461b5e3c8d9cb0d3fe615.yaml | 4 +- ...y_wp-e1e09568d086f8fa80d5f87a6742ffc7.yaml | 4 +- ...oles-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ypot-4c06879b605c0ddf9d3252fe12dff25c.yaml | 4 +- ...tent-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ting-5485a109494b4df54da4337a9efe8523.yaml | 4 +- ...xtra-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ayer-2ea89aa92910e09e4a0699a93e6b8771.yaml | 4 +- ...ayer-c399c93eb04d9720bd4e74a57c352087.yaml | 4 +- ...oser-b0e3fd5d9174b5eba29a79c0cda84c9b.yaml | 4 +- ...menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ools-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...eimg-aa275ed39ac05dab3dd3b7cb9e8afc6d.yaml | 4 +- ...dget-2f83ea3f51d28fac6369a0c731ce68eb.yaml | 4 +- ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ense-772b71a2d81ce555d5c9a0a38892bb34.yaml | 4 +- ...r-wd-0bbe2e9ad1b1c0a623ea6abfedb5595e.yaml | 4 +- ...crop-20671ddf0d01a43586266ad4cb142fcf.yaml | 4 +- ...dget-d5648214fbd82ebd55682a43fc8f813e.yaml | 4 +- ...zoom-5721436cde7e78cb58601bb592cde002.yaml | 4 +- ...ment-824d93c3c9858047a50ed1387d69356d.yaml | 4 +- ...brew-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-pro-ab0d13d34dc4621d3f125a7e5e405bf1.yaml | 4 +- ...-pro-c78abe8c9dafca582dd0f5c66a5e2eb9.yaml | 4 +- ...-pro-d5e71f9286573633246d95fe18c6dc87.yaml | 4 +- ...-pro-e4eee191046305a40d967ee1ba037cbb.yaml | 4 +- ...-pro-f7a99c10e9aa1ac19e91036f274d28b1.yaml | 4 +- ...uard-ca5a202b7756a1fb685216ed26367b36.yaml | 4 +- ...lery-ec29185ed2f65e10921961a5788cf99a.yaml | 4 +- ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...feed-0dd37aac0a819da40009a99efded6eee.yaml | 4 +- ...dget-c4bb8ef855ed7d5677231037db6f41b0.yaml | 4 +- ...dget-d922f6e78e39c496155eaa17b9a13762.yaml | 4 +- ...dget-da62044dc6f8ab5a6043df4bc628475e.yaml | 4 +- ...rive-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rm-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ctor-4f39f823882301049a61a7a769c354a9.yaml | 4 +- ...osts-b1a9125711cb68f9ebd1c9d6ec3312c5.yaml | 4 +- ...-bar-43e66df1f9172a258f7b4833c10ba64c.yaml | 4 +- ...maps-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...body-162fd1b80a689c044d519624e2cd6bbb.yaml | 4 +- ...inks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ents-d27b7d21b5912a09ea3805333b4f7140.yaml | 4 +- ...ouch-5a4ceeb56cff119df02b4014ab6dd0d9.yaml | 4 +- ...rder-5fce0179ad5dd3fa3f22de628e08db06.yaml | 4 +- ...cker-c2d506865b475e467cd410bd4ff9f703.yaml | 4 +- ...cker-d1d5e763ed41a49986eaf738181a98d5.yaml | 4 +- ...lite-718a86b8fb614bfca1d835a5b1869915.yaml | 4 +- ...sync-8253ee833cb2687572180cd975dbf588.yaml | 4 +- ...tion-34076a9fa6889f09a1439513a52a8cc3.yaml | 4 +- ...mize-529055d3bc8d484bb022631bf8a543b2.yaml | 4 +- ...olio-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ions-9f87cf742669dcbf6cbaabec0f8d8908.yaml | 4 +- ...pack-0e86932241c6ad3f70627e02c54dbc31.yaml | 4 +- ...pack-9df4fd409a4edbb8572536db3f6715d1.yaml | 4 +- ...pack-d4b5db96e8a4cb8dde234da2c8c95905.yaml | 4 +- ...pack-fe6364297dbbdebcc849affd9cb5e248.yaml | 4 +- ...lkit-95537a5037076723ccef81d1fba789fa.yaml | 4 +- ...ager-988317a2aa68c393854967dc4677ab3f.yaml | 4 +- ...rdwp-dc882a54ee21adad00f3c37faa34411b.yaml | 4 +- ...reer-00ad079b8c94204c38afc1d934554333.yaml | 4 +- ...-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ents-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tics-6d795e6331799c55a6d3f3098ce86d6b.yaml | 4 +- ...-api-5e1efa6ead2e9d16598b6140024797d0.yaml | 4 +- ...-api-9d1887b8622dac2bd15f04e82a194689.yaml | 4 +- ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ator-da0185c8881b7837eb3ff9bef5017584.yaml | 4 +- ...port-46afaecae6249c4e331df87e2126a4cd.yaml | 4 +- ...ring-6adbed160e9381bd43ab920e4f4c10a6.yaml | 4 +- ...oser-6fd5ee2a697c02149752bc647f98085f.yaml | 4 +- ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...prox-f629f1cbd9fba0b088aac877e4dc575f.yaml | 4 +- ...ings-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...news-ab596007425584b1e79f9f5a75499083.yaml | 4 +- ...nter-154e2db41f3251206c18f35c16e169dc.yaml | 4 +- ...base-41532dfb555f5a1e79f8f55e8febf84a.yaml | 4 +- ...gine-23b35e5f653977b412c0dc708b752a30.yaml | 4 +- ...load-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ions-4283f13fe6bc4a6b024bd09e02f40c1e.yaml | 4 +- ...cher-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ages-cdbf7ebff8c4d1a9b90da71e4a3d5b8e.yaml | 4 +- ...asic-4888a583f0c17ec03ad6204f11cf19b4.yaml | 4 +- ...mbed-5b2a6f112dc7d70910b36648c4b4675a.yaml | 4 +- ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ider-4c62f9807e53925857a04839b7f811f3.yaml | 4 +- ...ider-782d2a5a9a3b36ec02deacd0cc03dd91.yaml | 4 +- ...ider-9212eb6af9b06f0daa962811d04b3aed.yaml | 4 +- ...load-7a66706d231bb588b40ed996e42c0254.yaml | 4 +- ...ider-20c21b977e576c86cae60978b4cded07.yaml | 4 +- ...ider-4bda697ca3ea7c8fca810d0d8ce167ae.yaml | 4 +- ...ghts-f78d7ba708259da0523cabc0cbdbd7c5.yaml | 4 +- ...eads-bfe41c446963ca7621a719dd7519ca70.yaml | 4 +- ...rker-2729f42afbb3a34107349dbe43cc49c6.yaml | 4 +- ...-pro-8ad67d1554931a18fcf5c6d8fecb94f0.yaml | 4 +- ...n-wp-6cdc10306b381cbc45add2c281d72434.yaml | 4 +- ...ager-e199f05b41749995376359e6d56e2316.yaml | 4 +- ...ress-99975e67153f43d6158ad376c50faa87.yaml | 4 +- ...ress-a3c23b348d99ad97eeba5901637fc834.yaml | 4 +- ...ages-10dd9a3434e3d079623a841e75c86c90.yaml | 4 +- ...ages-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...plus-09ecd7b1a7d7c81f548e33bf4bc7b580.yaml | 4 +- ...tion-f623978da0d0e7e73c44c7f970c44b06.yaml | 4 +- ...rary-263f0665c552df560e61f28530fa511b.yaml | 4 +- ...ayer-afdb73f09e63d9d93a801e87dd86e9bc.yaml | 4 +- ...plus-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ices-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ress-3fe9089ec5b0f3ad95a1bd0baa9d49ae.yaml | 4 +- ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ents-41a63082135d50f0e8bf2d19791a60a3.yaml | 4 +- ...gets-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tags-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ator-1593b88b276363eaaec5e0cb5dde84ae.yaml | 4 +- ...user-7c535e169c75c3005c5d2941f3e6968b.yaml | 4 +- ...izer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...down-1bbaae2a7a498b205fb902506cd09f7f.yaml | 4 +- ...ajax-08c2b329300ceeb5ec4ee1c1cf18abf3.yaml | 4 +- ...ress-62395a250bd2c0c27cc1d46d95105e15.yaml | 4 +- ...ider-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lite-46180ef43d3becfddd0144fed7922297.yaml | 4 +- ...ress-0d7d13b3763620f659067ef0ef4a2ecc.yaml | 4 +- ...odes-e9fde878e95431546f5a6d5b49c1a171.yaml | 4 +- ...nail-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...play-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...list-acb7010b85ecf2daba49fdd1b1643bd9.yaml | 4 +- ...r-wp-27461955b32dd7d4c16736c7fbdc5771.yaml | 4 +- ...r-wp-b15c16122e094141ccb76dd4bc1e2cd2.yaml | 4 +- ...e-sm-45f25702e8ca4952a8a482198d36d226.yaml | 4 +- ...ress-bc4f6148886fd30cd6ed07bbbfa6c2c3.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-bbbf9046b8721bc306a1868ce9ab75b5.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-c7fec950a07b33ca805efa5f4526bb87.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-da3f36dbc6e00ae538ec7700a4a5da0a.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...hild-5c361cd216288a792b3417e2eea8c64b.yaml | 4 +- ...hild-de951cb1c07b8f1a00e6e15f2067e75c.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-bbbf9046b8721bc306a1868ce9ab75b5.yaml | 4 +- ...sion-c7fec950a07b33ca805efa5f4526bb87.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-08e41a2e706bfd45d56edb520c5805b5.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...sion-853763a7a24f0714b558d69285e810e8.yaml | 4 +- ...sion-7cce7a2633974d7472d47a5e1fdbaed0.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lite-276d9e37b697911176c96dd2534c5db7.yaml | 4 +- ...rker-13b8a58f1828f2c64647f6e908737c8f.yaml | 4 +- ...rker-22c2313f6ddd97279a9a6e05569e552c.yaml | 4 +- ...rter-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...arer-6b3f6a43a6261f36339646ed344d5b53.yaml | 4 +- ...ator-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dons-963646e7d7bb88af1ad24a0f5a61ee55.yaml | 4 +- ...dons-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ider-b6500312e7eff76638bb1a536f1d8f8c.yaml | 4 +- ...ider-ec15f998366a90597f3ae6005cf6d8b3.yaml | 4 +- ...stem-296c49b1bc6f342e92d02be77b2dbe14.yaml | 4 +- ...atex-c72bfd99ca891cab28a20713d4d5fa8e.yaml | 4 +- ...tons-47fd93f8dbf38d292961db96282356d5.yaml | 4 +- ...load-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dget-f41b10488dd7d69ac4748b8c313105e4.yaml | 4 +- ...acao-d9141583a795a1e4a70084cd717fd9ac.yaml | 4 +- ...oads-dd0bbd05ca9ba09666d0154a80a50eb1.yaml | 4 +- ...port-3faf0e242f65e17c979c6f608e04b73e.yaml | 4 +- ...stic-6d746a5f0aa53afdd212e69305550ec1.yaml | 4 +- ...mage-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...uler-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...resh-19904e18d7847af1a770f2d024bfee5b.yaml | 4 +- ...-seo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...view-1e5ebadce2a1ab9a5fd9a23d7bb80d5b.yaml | 4 +- ...ment-9f9a85cc7dcde674a13dc865058427ba.yaml | 4 +- ...orum-bb8b3412160ee9a77c9d2e3d86221321.yaml | 4 +- ...orum-f35fe23400199bbe42a795d71f9a637a.yaml | 4 +- ...cart-56a0c79ebe574b006dcddb57a105ed57.yaml | 4 +- ...mode-39eb4a9ab67b19c7b3e7b850c04221af.yaml | 4 +- ...mode-a7b78f7a058348bb841c19e95bd21064.yaml | 4 +- ...tion-0e334f8b94041fdfb0dbd420bf6d8572.yaml | 4 +- ...tion-2c78335d8d426bf0b25d79bcc3a1ab65.yaml | 4 +- ...tion-7f9d8f2c0da9df1ec2dd98d448e2220f.yaml | 4 +- ...rity-de7221543e5e73690e1a713271a64c51.yaml | 4 +- ...book-9db01b7b537550571e5aaebf6e7d1ee5.yaml | 4 +- ...n-on-18ed21ba8d359bbdba46edad48e67bc5.yaml | 4 +- ...oftp-23e0e48f6d4b609b278b4fbd54ac10a1.yaml | 4 +- ...oftp-d10118590b8b4520a15b5f492941e4d0.yaml | 4 +- ...ider-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...ider-e13785deba801d5052c18262b9c1ec9f.yaml | 4 +- ...erce-2d6d4e818a96c6e23f130697cfe95544.yaml | 4 +- ...menu-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ator-9d62e328d915f4bc5d1fc97fbe0f1bbc.yaml | 4 +- ...look-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...orms-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ting-e54ab178e0430008f60d1b3ffa4fc240.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ages-b073725ff3ce84124c4fbaa39058dd12.yaml | 4 +- ...ayer-f2f737655d264b31c43ad2bd812bd2dc.yaml | 4 +- ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ment-5ac91f4d7709824d7d324fcc63da5897.yaml | 4 +- ...-box-7dc2950e20e339de0e3c41a3a14e05fa.yaml | 4 +- ...main-3a3edd25e4fa2cd1428645e4e1a051ab.yaml | 4 +- ...lock-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-3e61760bac7d3dbcc4ad9810884d474f.yaml | 4 +- ...erce-20415f311fdf676cb6dd436c829d557f.yaml | 4 +- ...ndar-72451557ba7e0e914a18e1ce213f28d7.yaml | 4 +- ...ndar-a6b03d82501be09605ec3648f082c81b.yaml | 4 +- ...rder-46d83256b62bdfe4aa6f310ac82e97af.yaml | 4 +- ...ment-f493de201064a7faaee262b5cd71afb2.yaml | 4 +- ...rder-6e16524bd1d2a580c4988808ba69289d.yaml | 4 +- ...rder-a5940bfb7c2779df0f2c0ab2e0cfe4dd.yaml | 4 +- ...y-wp-e034d0793fa530375c47c930a890a44e.yaml | 4 +- ...ceai-40ddfa284deb87a97d4ffba35198f3b4.yaml | 4 +- ...able-8dbe7a3817fde028be9e786330407154.yaml | 4 +- ...able-93938fbe21973f374f80c1d00bd023f7.yaml | 4 +- ...cred-ab40c276cb9902f9d5e1087da672b8cb.yaml | 4 +- ...cred-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-api-fdae69d4ebb419ff6e97487d1fa22ced.yaml | 4 +- ...ents-ef9b3c704d7fced594c5120e1a6fbd70.yaml | 4 +- ...ions-e721e32fa48eebd873371f94b4b26240.yaml | 4 +- ...odes-ac14ec5ad7742e553d78dac3325ff055.yaml | 4 +- ...item-48dc2938fe186fc758ec2763ee6f0d79.yaml | 4 +- ...grid-5d20fde6dfb97e9f5d07e3e446eb155e.yaml | 4 +- ...sher-04eafceaed46e98686bbc255ebb274ab.yaml | 4 +- ...rove-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...stic-5a374355ec4537f847bbfe7d5d9419bb.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...nect-ca36ed6adf848cc827e64a29f8ea5b4f.yaml | 4 +- ...lery-39cf49efc2cfacf8bc667751cb10cb94.yaml | 4 +- ...lery-d5553776b8e5331d8ec0787313ee2d60.yaml | 4 +- ...hoto-b45eecf36500371522a7a91600b79df4.yaml | 4 +- ...ting-c141b8b973ee71335be586680efd9177.yaml | 4 +- ...lery-fd1e125ffdeff47afb4a084c2351b847.yaml | 4 +- ...exus-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...able-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...orms-624315d392127da9cdbb25a9ce0695f6.yaml | 4 +- ...orms-7c7b836ffaa221f1b27ae77d75f66b3c.yaml | 4 +- ...orms-c27b108510956c02768a728e2ce3fea8.yaml | 4 +- ...wall-bfe7f25b364c1c551aace9e3b8962033.yaml | 4 +- ...-ses-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ions-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...pack-bd4439ed9a58ebca35ee43480cc063fc.yaml | 4 +- ...ader-f1f1da3dcd767a5d11f1b776e491f57d.yaml | 4 +- ...erce-268f07777e79e9582f2676bd74ffb8e4.yaml | 4 +- ...erce-94af6b10fc464ad700fcc3825517ff11.yaml | 4 +- ...ngot-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...chat-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ions-ffea4c38dbbf6eb29f1bb344ee6bae12.yaml | 4 +- ...xtra-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ogin-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rder-96bf5a76ba4653bdf89616d82d0bf5c1.yaml | 4 +- ...lity-079b2f2c54a8b1fed68b5c27dcb96254.yaml | 4 +- ...ours-02f013b54b4f3674afd49b3afca90a89.yaml | 4 +- ...ours-55a39ce22d26293084937266d25d08be.yaml | 4 +- ...nsea-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...anda-e524be4e74a799805187c5341f4ea89f.yaml | 4 +- ...irex-487b45c8da9cac09ef28c95c49514ba6.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-2c636c041261dbec5d7ba4cab181df88.yaml | 4 +- ...hart-7dc1fbd7e7abf281f194a7d7c03c76ee.yaml | 4 +- ...case-fa0b498c03b490f6a302c8923c66045e.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dule-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...wich-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ator-56d5619e454c2de075a4d59b6b36a2ce.yaml | 4 +- ...ayer-3368388a3eaf6ed2424923ab628b316b.yaml | 4 +- ...rict-4d8ef6bd985f2d34f506708108c9100b.yaml | 4 +- ...tion-4ed0ed5324b5c3f087d2833d0484d7f4.yaml | 4 +- ...-pro-410910e3bde9f58e737907bb1681caa1.yaml | 4 +- ...-pro-84d2d3378640513504438262d898e022.yaml | 4 +- ...-pro-c3048e5abe91e890bbce0cc632e75565.yaml | 4 +- ...rama-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rier-ce718587b1801a7c7537a48edc0e7766.yaml | 4 +- ...base-74dfc45ecae7de304e8f9080bdfdb51d.yaml | 4 +- ...ager-d0bbc9ae1fbf2d240bae5f6283bcefb6.yaml | 4 +- ...sion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...bric-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tium-2de2a309a48a2066b54fa1a1b79cdf95.yaml | 4 +- ...tium-4f11f74ab70050e21f6862beb40d9a96.yaml | 4 +- ...tium-62269eb67796cbb2339d6188b5db837c.yaml | 4 +- ...tium-6717ed512d0f6dcb712096abdaea80dd.yaml | 4 +- ...tium-92d0e7bc94b44754e236b3eab5ba21b3.yaml | 4 +- ...tium-d89f421b57194b2722cbd6095ba6fda5.yaml | 4 +- ...tium-e5b14dd6b8ce0a1e923582746cd9e67d.yaml | 4 +- ...rint-40ad9a6c734da3962dc8243739e3141d.yaml | 4 +- ...wser-c6589434b15992ea6614e8eb940f49fe.yaml | 4 +- ...-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-sms-f6e0611408f1fa46e8d9b7f9c0374cb8.yaml | 4 +- ...erce-f53b59e3d01b975c6802657d08b4d293.yaml | 4 +- ...lery-02d4095d603887ea90170c039ddd4ef1.yaml | 4 +- ...lery-03f9356825118ca4016abd782e8ac0fc.yaml | 4 +- ...lery-3c5bac80199ef30099a13588ec30b8cb.yaml | 4 +- ...lery-44b42ab3cc67f2808aca4c4c544fe3ed.yaml | 4 +- ...lery-52e7ff3acb78cedfa1cc6fc74cf893bd.yaml | 4 +- ...lery-78fe6306f76d32a87cb79d1ed7a18344.yaml | 4 +- ...lery-d2f0c79f766915ada458669bedb0c203.yaml | 4 +- ...lery-7aee34ffd65481adae802a1b67540af3.yaml | 4 +- ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...sive-b4a8b8c1c6aa3303fd49306d6d3da366.yaml | 4 +- ...lery-f15ed32464b8a833a76a0b7a1fe8248d.yaml | 4 +- ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-pro-a89413a448da960907f201f2e284d495.yaml | 4 +- ...post-230333f7152338c0e847a31fb3c9a2dd.yaml | 4 +- ...tics-067e897c25e69073ab36a1703c7f28be.yaml | 4 +- ...ayer-0dd50401fc253eb4ff30c00f51c39236.yaml | 4 +- ...tral-8d3ea868911a052c015f14b1fed79fc4.yaml | 4 +- ...rses-b95250d725c58e5f77c57b6de18a5532.yaml | 4 +- ...-box-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...pods-dd09b82c04b588417962747e8b977772.yaml | 4 +- ...addy-7743d4aab2210fca5895ae50928bc6f9.yaml | 4 +- ...lang-79eabca00926846a970481cb6b7e83aa.yaml | 4 +- ...lder-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-xyz-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lder-18e611cf48e8f4ad6e3b9384220c5457.yaml | 4 +- ...ages-e6cb47157cb35f90dcc06e51f4ec2619.yaml | 4 +- ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lery-70beb78ba7fd734dda35bda551cb0775.yaml | 4 +- ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ator-e3c761c4e430d07f3cc55d6f4fc67c86.yaml | 4 +- ...lery-1b225faa6149f90c544fb3acb706af2f.yaml | 4 +- ...grid-2709ba16ebba4320ded81fce12f3563d.yaml | 4 +- ...mate-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...gner-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ager-09c17ceea6b1acc60dc27557a0b8ba88.yaml | 4 +- ...usel-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...smtp-5cce32cc2992a89ca752b62e96a78a05.yaml | 4 +- ...pets-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ness-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...iews-741838efe1987dc0902314663618d34f.yaml | 4 +- ...rect-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...port-9efe0fb93db4e83b6512c73eb733e094.yaml | 4 +- ...atic-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rkit-0af70d46a8f7d1d575b47f6ceaa9d723.yaml | 4 +- ...ress-307c020a7d3d97fddb5823725bc2bdc1.yaml | 4 +- ...hois-5aab035ef042ccd7141d869c2750d5bc.yaml | 4 +- ...arch-6b177b37379772051433776316566ccd.yaml | 4 +- ...arch-a45e2a89638ef475d44955daca9531ef.yaml | 4 +- ...arch-b2c299a9a1dfd6a544071cd299a840b8.yaml | 4 +- ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ntor-6be8b4c15f4802607f2237b86373c965.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ager-50f488111dad00bdb113f7022a4a0420.yaml | 4 +- ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...arch-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...oles-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ands-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ency-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lter-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ches-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...cing-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...list-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ward-d0af10e9ac4884ae3c68f9f3c40fdad7.yaml | 4 +- ...ndar-c5888a6adf3b7c4a7f3becae44174450.yaml | 4 +- ...hoto-1c7062bfa495ccd866c7cbbbfe4462e3.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...stic-b8b87309673e04154a00de1091b89e07.yaml | 4 +- ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...over-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-c7e173848fb257299994b18731636ed4.yaml | 4 +- ...blog-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-dev-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ocks-52b32717fd3d0ae5a10aa7d3c77cb89f.yaml | 4 +- ...duct-a3db779bffaf01ac0439d97b043e7b9e.yaml | 4 +- ...-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lder-960773bb26ec71f2b5c7ab22a6dcda0e.yaml | 4 +- ...lder-dc37f981ae3cabe96f1627086e8e54ca.yaml | 4 +- ...-pro-960773bb26ec71f2b5c7ab22a6dcda0e.yaml | 4 +- ...oads-dcaafd0f02c38e487ed1a8a26307e284.yaml | 4 +- ...page-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dmin-3008a63f18e7f2e88b5013011c2e866b.yaml | 4 +- ...page-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lite-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...ress-5eb9664c4cfc97621e70ca6044316a22.yaml | 4 +- ...ress-de2d50a00641894476c3c991e151cbfe.yaml | 4 +- ...nd-a-8f0eb841fe57a3d4a24e95c0d9fd6f34.yaml | 4 +- ...ader-de57d40696cbfcd8ffe966c8ed179267.yaml | 4 +- ...te-x-92923e233ad137b6c565b0d9cb5490bf.yaml | 4 +- ...bely-fea58c2fffc9b2ea6b58c47efd69a713.yaml | 4 +- ...ense-910562f88b7ea3f43ef082aba4fd2945.yaml | 4 +- ...tore-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...form-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ents-b05b3a24d162881cbb5011a114d7958e.yaml | 4 +- ...ents-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...menu-be53691c287fd0615412e7fc76d56676.yaml | 4 +- ...next-0ab1239b54a9d197b2df31bb69f5b07b.yaml | 4 +- ...next-1f3365288c8ad41d2a38dadca302de5e.yaml | 4 +- ...next-d42a5f37bc2973237f5bd33bf937988e.yaml | 4 +- ...next-d5c9a981371783e864a000bed9ff14a0.yaml | 4 +- ...next-e1a43bd038bea91c9d042110dd2e93ec.yaml | 4 +- ...code-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ayer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...bear-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dget-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ager-715775220a5d0726abf3cb0c44398e2b.yaml | 4 +- ...ideo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...maze-8a160378fcef72b726e178d76f962841.yaml | 4 +- ...ntly-8309716d7ccc4397ca213e945a98f0a4.yaml | 4 +- ...urwp-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tion-00ed26bc99082a5e2bf7869b142812b5.yaml | 4 +- ...tion-08ab49e654c5fb6f0db2079823b53c43.yaml | 4 +- ...tion-1217e0d32488feda5672b5f2f6f6be10.yaml | 4 +- ...tion-28a102683d2de6c72760dd7d0e2159c9.yaml | 4 +- ...tion-3d292d211ef84b695362922dc8bdf57d.yaml | 4 +- ...tion-5f79866291aaa54e9869bd9b8bbe5231.yaml | 4 +- ...tion-60528de5f76e38fabee103931a1b735a.yaml | 4 +- ...tion-6321b133726d239355f81b9be99d916b.yaml | 4 +- ...tion-8392879a309371134897c994ca4719c8.yaml | 4 +- ...tion-97d82c7c3e0d924cc99e2436cf7939dd.yaml | 4 +- ...tion-a8b98bbbec0875de2bde4d3647cd15e1.yaml | 4 +- ...tion-aa77b46ba67be3115863377f556c5a4e.yaml | 4 +- ...tion-cccbe637c2ca5b40eb7fbe65c1b79317.yaml | 4 +- ...tion-d5ca64507af2d41a9a4ef9ba365317c0.yaml | 4 +- ...tion-d9b1627f6db7a7b3f667f9603a20aaf3.yaml | 4 +- ...tion-fc35edd680a0ec79497d3d82a4143e86.yaml | 4 +- ...tion-cb361e2e4a8f09fdba16ef55d82e4742.yaml | 4 +- ...work-fd34b68ddff550331d533d0325717761.yaml | 4 +- ...nssi-2c5ab69854e1511d339bef7563a27b08.yaml | 4 +- ...nssi-2df9887091a9e43477c93a8f95a59867.yaml | 4 +- ...mium-2c5ab69854e1511d339bef7563a27b08.yaml | 4 +- ...load-fc6507793e849585ffa987ba2f9e1c71.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ntre-2f8f397bcad4eb939787697b135e157a.yaml | 4 +- ...ntre-3a45dc282f560e731773a059f5e7ca5d.yaml | 4 +- ...ntre-5c0349ca079e747f13053866a0f9f7b4.yaml | 4 +- ...ntre-eb6a95dc8c6a4d6036eb6038576d5022.yaml | 4 +- ...mies-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dash-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...load-7d8fc6eda80cc32678a794e07adb8263.yaml | 4 +- ...-ons-c4bc19656917f2d34b4812810b207db1.yaml | 4 +- ...-ons-e6d62601d9fb0272cdf0ccd211481dcd.yaml | 4 +- ...dget-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tbox-7b55e5afda1f744808ef7891452f6863.yaml | 4 +- ...box2-87b6d9e5131d99ef758c739f3a95c342.yaml | 4 +- ...poll-7eb5e40a54b7b7c228b5d29ef47daaf0.yaml | 4 +- ...utes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ntor-86b13954ec743e9dcd370ce47777c030.yaml | 4 +- ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tent-69f3351aa6a5162d89a81a8e42b30fee.yaml | 4 +- ...cess-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tent-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ress-7045891b02879797f89361d3201b5ab1.yaml | 4 +- ...ress-a008c3a52fa94300e9ec331bd11a1546.yaml | 4 +- ...oups-df796716cdd12b786f639a85872402ce.yaml | 4 +- ...gine-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...iewx-d13b6e0194ead1aa761a79dc4de31982.yaml | 4 +- ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...assa-a1f3ce23c26813a2d0636e6681a66fe2.yaml | 4 +- ...mode-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...oper-25222fc492113823793e49be1ec42e70.yaml | 4 +- ...dons-0482c6a15acfe9611a210ed128b0e569.yaml | 4 +- ...dons-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ages-e82724cb73e8d739a7e74ba12a2c0b77.yaml | 4 +- ...rsvp-72cd99005222b05f8d3ba5703b3d3c18.yaml | 4 +- ...post-702f90b8bb07e6c13ea1a4bcd70721ac.yaml | 4 +- ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...zing-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...line-b2a2498dae5be84f29d9989669186b97.yaml | 4 +- ...base-5f21cea7a9aedb5442f3d8dbb7f2496a.yaml | 4 +- ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ideo-83c44f74fb6f267a714fb43018452c84.yaml | 4 +- ...ideo-98fa09468510e4f3d608da204df8d702.yaml | 4 +- ...ayer-73b7b4fd6adbc8f05bd6aa0607d34105.yaml | 4 +- ...-svg-de5739613e14a996b46539b30ca9beab.yaml | 4 +- ...stem-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...free-0f6c840a3fb64dbbf3be23d21800f577.yaml | 4 +- ...lite-0f6c840a3fb64dbbf3be23d21800f577.yaml | 4 +- ...ader-987ba48a8effbae5bcbbbe65d3a7dff9.yaml | 4 +- ...-bar-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ment-3f1c3ad85ad1a49bfdfa7d4e3b840987.yaml | 4 +- ...ence-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...hare-63d0d67aa5aba2dddaa9648ffc434152.yaml | 4 +- ...tion-3cb680b76cd76f74dd3e1108311fe7fe.yaml | 4 +- ...gins-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...inja-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...safe-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...hoto-655bb3b8d4438b69c94c0ae63c754913.yaml | 4 +- ...rm-7-9b9891b7d15de10b021b57247a686e05.yaml | 4 +- ...ails-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ress-2b3a10a2b0c01a20025a0d9db118f2df.yaml | 4 +- ...ress-446bb803ccb7ab54ba9c587af27ed178.yaml | 4 +- ...ding-e894a6552613ace9ff7694fe7f0247a5.yaml | 4 +- ...ster-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...math-10c02e3884689b63f9593289046d6bbb.yaml | 4 +- ...list-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ency-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...zard-c65adcc35ac4040261ad16030af10bc8.yaml | 4 +- ...ator-99d9f69262b565cb98ac9182ded6ba39.yaml | 4 +- ...wser-a799081d34c432defddee7667cec19dc.yaml | 4 +- ...rank-f8142d6147ba8985e902d3e3c7f8c24d.yaml | 4 +- ...info-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...itor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-bio-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ress-ed44e679b80b227382994fd698507bde.yaml | 4 +- ...mage-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...unts-dd581bb2f106d38c2b413e5d4d1b0414.yaml | 4 +- ...iles-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...sync-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...rier-43ca0b6b0ea70acc9611835de771b2f8.yaml | 4 +- ...erce-204abbaf4719b0c465697b2d07725668.yaml | 4 +- ...erce-c95fb7e9995eb1cfa4e559bcf8a93b02.yaml | 4 +- ...date-237f09cf608b33e2d885ba45327a8a92.yaml | 4 +- ...date-baf7113ec23d15f1819896037517b713.yaml | 4 +- ...mate-aad87c0bfd109df2ae9940475ba0f22b.yaml | 4 +- ...mate-e188a014b244e93ae49b1e82bb73babe.yaml | 4 +- ...-url-e61dc6652abcb067051b61e901442c72.yaml | 4 +- ...iser-edd7c00369ad56e0646da80d37cfae3b.yaml | 4 +- ...pand-f122002b6d51991b7a2676304d17940e.yaml | 4 +- ...ange-5dcc472de5e4f87aebcc632749f7aaa7.yaml | 4 +- ...ager-0f6c840a3fb64dbbf3be23d21800f577.yaml | 4 +- ...data-740c2a0d357fce3bff875d5d58b6f9d4.yaml | 4 +- ...itor-5814be735a5f5cee00bab9378ee0cbea.yaml | 4 +- ...ndar-6cfd85b37acb634912f405192489654f.yaml | 4 +- ...dget-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ests-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ideo-ec78e7994dbd34ffd9cacf3cd9b3ffa4.yaml | 4 +- ...ship-db5dfd04511983fc7ceb561728d3d97d.yaml | 4 +- ...sage-b85cfdf152cc4ae0e3deb547dc1b6d6a.yaml | 4 +- ...dder-47569f4c91357650e1a29f2c2f2817fe.yaml | 4 +- ...tton-ab84cffde93b8e75b3b5fbb96c93d333.yaml | 4 +- ...emap-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ider-c8de5b2d5272ca0aa0591b883e38753b.yaml | 4 +- ...ager-a60c5d49ef21710901095695504b7608.yaml | 4 +- ...tons-40fcf644d2fbb45e473e3839f27d17b7.yaml | 4 +- ...hips-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...r-wp-0564976f3c6b024a77575f33f874aa48.yaml | 4 +- ...cker-6007724142dc6c51f92be093926036d0.yaml | 4 +- ...lock-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...poll-cf17297c2e5d307d7deaa74f22821404.yaml | 4 +- ...ates-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rect-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...cewp-17722d2484373a19ea1df8b15b8f0eea.yaml | 4 +- ...deck-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...prox-5b04e98d5ed9360b3ebe4e58880d2319.yaml | 4 +- ...tory-b04b6aa85a76ebddc71c9e203d10773d.yaml | 4 +- ...tory-d5d65492c7b3878ca773e2f63b4a08a2.yaml | 4 +- ...mage-d1752e9520f041ace82927039ac74f84.yaml | 4 +- ...hare-9fb99305b4730cdc01315914158330a9.yaml | 4 +- ...lery-3930a563943aaf08712d2221306b606c.yaml | 4 +- ...lery-44893e4f1aa00774102d61f70312168f.yaml | 4 +- ...lery-4dd9a3ba0bea201c247a65cf330c4a19.yaml | 4 +- ...lery-f45ce441ba6fd10c3e2bec3c1e3949b8.yaml | 4 +- ...ages-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ideo-eacbf719bf265fc7ee4ac85dd80a065a.yaml | 4 +- ...tkit-43e0cd9b2e64838710c022fed726ad02.yaml | 4 +- ...gnal-c0dc18b21bfa2b86d77830cf4a915b55.yaml | 4 +- ...mail-9b2a41c17f324bc427373274ec0c74e7.yaml | 4 +- ...heme-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ible-64658b8ae4088e2d2245fcf0b29be320.yaml | 4 +- ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tags-941b5bba10cb296e00cbfe0b3138a5d9.yaml | 4 +- ...-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...er-g-78405f03bea86dc35a1c5e66198ba314.yaml | 4 +- ...tage-fad318487dd970b284385e44520c85d8.yaml | 4 +- ...cket-219e55994660c3c36e84474ca074be21.yaml | 4 +- ...tton-de24827a638a2efce744c6eade7a73f3.yaml | 4 +- ...grid-ee08b0491d28739787eab972fee61b21.yaml | 4 +- ...mark-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ager-c95ffe646d0a761b10647658a7c40d15.yaml | 4 +- ...ress-8f924182750ff29f56bd3ee7a3546db5.yaml | 4 +- ...ment-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ager-2363aa1bcf8789d416b82d1e475636e8.yaml | 4 +- ...ager-68171971cc36274d03be6fb322c19104.yaml | 4 +- ...ager-b4c26568b976acff74ff99cb773e576a.yaml | 4 +- ...rrow-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...kout-bfb97206bbfb6336668e50882960e16f.yaml | 4 +- ...ache-226c23fcac1339a85375c1a4fa7531e2.yaml | 4 +- ...ndar-1e97950fcbacf9ecbb58beed5fdc2b28.yaml | 4 +- ...book-69ea852e8d20e1b9095ff76a5199f22b.yaml | 4 +- ...book-8a173d0b76b8837ebc37d42174f4f25c.yaml | 4 +- ...eeds-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-a5194bfa9db34596e371b3fb9a988aa4.yaml | 4 +- ...ices-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rect-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-zen-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...iews-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-pro-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tats-c67af2c20174cb06fdec04d2bad87d02.yaml | 4 +- ...ntor-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...stax-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lder-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...-woo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...r-le-fc1b2b62341494b2d9cc5ef165563a2a.yaml | 4 +- ...erce-1b9679a4f42d9c30f3b2de1ebd1889b6.yaml | 4 +- ...hief-6329046104e43f1ec0f867ede19cab78.yaml | 4 +- ...rm-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...cast-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ents-925029dc31c55bdce33ed22d851b35e1.yaml | 4 +- ...ator-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...nded-67118eb3397203867c13f43462b990f9.yaml | 4 +- ...ibe2-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...ules-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...maps-100f897c38dafe938e9af02c79c8f1ff.yaml | 4 +- ...apps-da1b2a8c96719ab9e52f2e44ede96439.yaml | 4 +- ...izer-d2b942d377993c80a764418d9e08cf38.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ayer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...e-wp-100f897c38dafe938e9af02c79c8f1ff.yaml | 4 +- ...r-wp-100f897c38dafe938e9af02c79c8f1ff.yaml | 4 +- ...oard-4b0cb38b99185f75f96c68ddb4fd5800.yaml | 4 +- ...oard-b10ddb53a1d55359331e1cfb5b98fd64.yaml | 4 +- ...tics-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...aker-ad612424551c0ee261f169ba5954843e.yaml | 4 +- ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...pert-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-neo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...iers-85d0c53e63bad002a594a7c01a2ede3c.yaml | 4 +- ...hter-860aeeaea687dc364b79673a2290695e.yaml | 4 +- ...ator-fd97a9eb267d56f526d35e401fac2886.yaml | 4 +- ...plus-59af9a4b87c64d3fc5a5f77eb6d682d2.yaml | 4 +- ...some-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...osts-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...oups-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-pro-3c71f53ddfca3bc25fb132db1aac667a.yaml | 4 +- ...-pro-4c984e9d1c9a129101e93a0ae80c8a9c.yaml | 4 +- ...rder-c638d03db9f642ea8657e9efadb89fe3.yaml | 4 +- ...rder-f5ae27bdecf9c7ab3666827aa6121937.yaml | 4 +- ...izer-15b5b7552cd59d4fe58cc4180bb081ff.yaml | 4 +- ...izer-b27ee90d1fddd4df887e8806bf4e7ee4.yaml | 4 +- ...free-bc1021396d5f2f9f59d1b9e8308f6b42.yaml | 4 +- ...case-f54e3a0500b97b96852bb8d2c3a17f16.yaml | 4 +- ...tion-cc2369bd97072a25359057b15b301ff4.yaml | 4 +- ...exty-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...ndar-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lder-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 4 +- ...odes-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 4 +- ...ders-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 4 +- ...reas-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 4 +- ...itor-eb3be0c0cf31ccd39967171afebb18b6.yaml | 4 +- ...rter-96a6eb43348a230ce62c16f4c805f2b0.yaml | 4 +- ...form-3134d0e942033e6ac2b7d54901e657a7.yaml | 4 +- ...rpts-bab8c0d44e1c325d945380a6221bd569.yaml | 4 +- ...stem-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...chat-3713d3bbe5441b73f08676feaf2b85ec.yaml | 4 +- ...able-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...npro-7246f496264a94e15a1d8c35393cc7dd.yaml | 4 +- ...tate-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lery-d4668154e14e969595c9de23505f40d2.yaml | 4 +- ...tion-32a996c823f220857a5611dc8238f0fc.yaml | 4 +- ...onts-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...code-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...p-10-4b2149909b70a0a5dde344497a2540e6.yaml | 4 +- ...p-10-aebc987297daa60ebc9f62d4c873ab22.yaml | 4 +- ...p-10-d6080d1f6e6aba862d174924fa49080e.yaml | 4 +- ...eets-0d742014c6c6d4f612dc93a0d8ee844f.yaml | 4 +- ...ager-d699893673e058c723134b07631ea093.yaml | 4 +- ...nner-0335e77335774af60e62b59ea8bf3dff.yaml | 4 +- ...nner-38e522344d31819f399f7be27a471788.yaml | 4 +- ...nzly-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ight-23bff824abe3c334624b92f8ce9d99b5.yaml | 4 +- ...outs-6ab0ff32728ffec64a0e21f4658b6bb5.yaml | 4 +- ...-map-94fb995c7fcb31381238e0489629c885.yaml | 4 +- ...ress-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...etto-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...3ds2-54a8519739469e9488888f770d59f330.yaml | 4 +- ...3ds2-98fdced366cbe609ca2059360fd4aeb3.yaml | 4 +- ...erce-6a7609985d974c1a4f6bfca880ceff9a.yaml | 4 +- ...erce-83fc5c78890dc3902a4d33e267bdeee6.yaml | 4 +- ...gets-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...utor-c52e67edc9fcaef058b0a6422fbb16e8.yaml | 4 +- ...chat-1b6d6a3b10f19ccd74a4ee734a0f0ee6.yaml | 4 +- ...chat-f2bbc682244e8a496bf0cb76f67467d1.yaml | 4 +- ...heel-79a6c6928e7e7b780f5e2d2e60aa16c6.yaml | 4 +- ...aper-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ider-bb937d8b80c96bf28d192769190e5a64.yaml | 4 +- ...meta-dc78477c8100a1cf79517cd718961ced.yaml | 4 +- ...call-953b50610487338e685a5cf5fb66996e.yaml | 4 +- ...ypes-0a99c8d6ca146b58134b86cdf1bd1b53.yaml | 4 +- ...ting-929d1756f21a22cbefc18ee9e80a95fd.yaml | 4 +- ...lder-d5ab4dadd75fec9af134144e666ff1a3.yaml | 4 +- ...lite-33a470e219d30f02e24dacca366cf3a9.yaml | 4 +- ...berg-baf6f9647aa6e6045c6bf5dfb25901ae.yaml | 4 +- ...berg-fbe34f85c5c0e3a0ed7be431ce9a9754.yaml | 4 +- ...tion-06c61feebda6eda56577372883413c6b.yaml | 4 +- ...tion-2b8dbf4f0e346913342b93011c311311.yaml | 4 +- ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...llow-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lite-343d05bc9d208789b5e376940d559b37.yaml | 4 +- ...berg-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...feed-8056d85f33dbcf3eacb36ae8419af314.yaml | 4 +- ...stic-705a4f41d4e1aa767a8f267fa3454855.yaml | 4 +- ...mber-0e4c98f58a3149e9a232e9c95d40a56b.yaml | 4 +- ...mber-0f6437cf628a3bd90ee26c228a1c0006.yaml | 4 +- ...mber-242a068db50aca331a847418abd23c68.yaml | 4 +- ...mber-255674fc07ae81595ebffe932a85af22.yaml | 4 +- ...mber-7333037ca30b5f74ef217bf9466f85b1.yaml | 4 +- ...mber-7db7009418abd13063c2d118e09483f4.yaml | 4 +- ...mber-a52442145dbdbdaec9bfaa19c0573b9d.yaml | 4 +- ...mber-cb65508cd745e36647cf4ef3930d3944.yaml | 4 +- ...mber-e44d6ae66963d07b80fddcfb06cf2f83.yaml | 4 +- ...-kit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ogue-0aceb6e391e9a8017538f79a192451fd.yaml | 4 +- ...ogue-7cfd32fcdabda7adb9a40d5e10f1b10f.yaml | 4 +- ...ogue-7d8c18514116a3d9cb2fadc12704ae7f.yaml | 4 +- ...ogue-f9aadb3cdc138771a95f01e67d7ac253.yaml | 4 +- ...lder-2efc0981a055a3e602c4cd88e853b098.yaml | 4 +- ...cons-baba5d57c66f94a59676f999b229ed40.yaml | 4 +- ...ymce-f63b14eb213bbc6239ffa4f4e582cbbd.yaml | 4 +- ...ight-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dons-86920ea2244bf931a0a9455591658b64.yaml | 4 +- ...dons-97e102e48e3400c8c2827b76216fe5ac.yaml | 4 +- ...eter-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dons-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lkit-05449252a81a55fa1aedbb41d626d3a8.yaml | 4 +- ...page-c8d3a5bffd1b0c28a6e17cfdad5deb52.yaml | 4 +- ...ions-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ting-d853e52fe1d33267e0c81c91100de86c.yaml | 4 +- ...devs-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...pups-f4a8622061e5460b0d2e3667b1d15b03.yaml | 4 +- ...bute-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...plus-1eca727a0c6686a8bab81174d47e18f7.yaml | 4 +- ...plus-4bbd3789375ef8b0ef3fbe16cd0df54c.yaml | 4 +- ...plus-dfc59073972648e0153f8a7cda52c6bd.yaml | 4 +- ...zard-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tify-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...shop-030644f38346879c8062677144e765a1.yaml | 4 +- ...shop-1e7c916b690d74cb7822c04675caf429.yaml | 4 +- ...shop-27b0c9418a17896ce00c7f804b61f8d8.yaml | 4 +- ...shop-536d118f42dde4ae5564cdbfac7489ee.yaml | 4 +- ...shop-559ca835d1ba91752b5fda135b9252b7.yaml | 4 +- ...font-ce93f109973b52b249a7106eb15a123c.yaml | 4 +- ...-log-60c68d204f0a8a653bebafe6c6059142.yaml | 4 +- ...tory-9be06bea648875a81d4dd1ca47dd3d3b.yaml | 4 +- ...tory-d5d36dd3296371bddd49874e159fc4e0.yaml | 4 +- ...enus-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...meta-27ff799b988fb677dadaedc3ce5f35d5.yaml | 4 +- ...ager-2a280bf41720079c39a3d0371323f56e.yaml | 4 +- ...ager-baba7e4c328e9317fa2b2839a155f748.yaml | 4 +- ...otes-e04c0fd89ca49cf41266e90f8d4a7135.yaml | 4 +- ...iles-2fc467eab8e252aba51501d739ddcb42.yaml | 4 +- ...tion-d2e28c2323c53d6e9cc43d245f41b33e.yaml | 4 +- ...ager-a0b7b51da946e56980c587504bc9c3d1.yaml | 4 +- ...itor-19fa35bb35a821be90be40a4df1f6407.yaml | 4 +- ...oise-b99ce0637c979eb1d01fd84441afddba.yaml | 4 +- ...ltra-3e0e02d0ef91eed396842fb253ab425c.yaml | 4 +- ...ltra-741cff403a911873546d8451aea6b8dc.yaml | 4 +- ...ltra-d475119af8f003a2c6e0eb9a10044dee.yaml | 4 +- ...ress-a000811d6a7f224f2863a66f08bbbdef.yaml | 4 +- ...it14-64fc1c1aeafb0b67c8b714966bfc2dcb.yaml | 4 +- ...back-e460da3b1111d5e40e60d6fa9f63a75a.yaml | 4 +- ...tics-7f3d4ae07c7ffdb4fa4da20576013347.yaml | 4 +- ...tics-820c42b11e0167933dfc728bc7134cba.yaml | 4 +- ...tion-1b1edb5a0481b6f1c207bb5bde4a4999.yaml | 4 +- ...quiz-2dc0412984b0bc2f2e238ad04ba47e6a.yaml | 4 +- ...ator-98fa09468510e4f3d608da204df8d702.yaml | 4 +- ...ator-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-pdf-a674e9a5d2840820506909b7c50b3d92.yaml | 4 +- ...tion-eb64a1dd7efbf5edcd293e2db2a6feb2.yaml | 4 +- ...dseo-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ntor-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...ntor-3bd671f811e3dbd6eac29209e9039fd8.yaml | 4 +- ...info-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...maps-41e6c56837296bd4311fa3f480bdbffa.yaml | 4 +- ...tics-57b54adcb0ab1b8bfd870b37f7db6b68.yaml | 4 +- ...tics-c591eeb2c7d14c7927ba6447beaabc1b.yaml | 4 +- ...lder-101912c034e5833d5a8cc53836ca2a9d.yaml | 4 +- ...lder-666310311f6b757b5edf8f0953dbd9e0.yaml | 4 +- ...iews-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ator-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...sync-7396a7e456a789122fb4ba49d41fa089.yaml | 4 +- ...ider-ae05ec43cb054e1a5de163d4a7addf3a.yaml | 4 +- ...ache-8a10bd5b823c6c28d5929375c43a3ded.yaml | 4 +- ...ache-cf834d46bd9b982d7dc5819942daefcd.yaml | 4 +- ...ache-f9f79bf204290d6d3c8b8009bb85feff.yaml | 4 +- ...ache-fa0b9f9e638380f9e9ab2db59f133c49.yaml | 4 +- ...zoho-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...list-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...rvey-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...core-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...uard-54e8332ab2042b90448af1c552f2e323.yaml | 4 +- ...ssup-f20cc872feace3e3660ec95d470c9be3.yaml | 4 +- ...watu-38df56fa1dc5330e530e8cc53cb9a80a.yaml | 4 +- ...ider-826769e27edbc5a7e8c99a41d2b44f99.yaml | 4 +- ...case-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...tory-c91fc0c595c28d56281ceceb582f95ca.yaml | 4 +- ...ment-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...thor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...list-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...odes-8911dada79ef696f6a6182ef72e3da28.yaml | 4 +- ...rect-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...elle-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...c4bp-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...arch-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...feed-692a59847419e00f01e0e2c7d8867aaa.yaml | 4 +- ...maps-913aecbb55aeada0646124d3b1f7ac2e.yaml | 4 +- ...tals-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erce-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...chat-e6c1637e24e361150992210212c2ee7c.yaml | 4 +- ...ator-424714e0619eb7899a426abc7531d5d4.yaml | 4 +- ...meet-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ager-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...docs-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...mail-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...epos-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...auge-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rm-7-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-api-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...iews-648a32c4399962c7e8df779124e03350.yaml | 4 +- ...osts-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ages-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tags-d2fc1c819ff763ffa1233f51f7546ae8.yaml | 4 +- ...uote-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...otes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...hart-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ship-f3d781217508c2a98509cd1c1ad7df6d.yaml | 4 +- ...-aim-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...mers-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ucts-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ever-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...oods-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...kout-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ways-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...kout-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...nced-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...sage-4ea02dc94cad5b57a77c42e7c7c8d042.yaml | 4 +- ...sage-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...itor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ield-5e5aa6772ed81579447472ccdd176622.yaml | 4 +- ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tory-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...edit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ules-b3abc33ac5c0eee824c171ffc996d70e.yaml | 4 +- ...ules-d3067d7741f8700134e947d8ed10ad79.yaml | 4 +- ...book-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...cost-67ed94f8d8db54b41e53c8a3a1c3d065.yaml | 4 +- ...rate-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...iana-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...cial-121f872296f7b7ce0005b54c410bc320.yaml | 4 +- ...heel-3ef982ad02fa7fc67bd896ba5c9c238f.yaml | 4 +- ...antx-775b75e12971ef700fb478179dfd07a1.yaml | 4 +- ...step-3be6a8dd2db55478dab854bd989a4208.yaml | 4 +- ...late-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ment-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...mate-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...mate-ace737eb3d27f2ecec85cbe6fb6964e9.yaml | 4 +- ...ider-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...code-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rpay-d60970bed3416d1d0688f40201a3d447.yaml | 4 +- ...remo-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...ddon-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...mode-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...shta-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...kout-e718f73216a4ec4310297c0a9de0ac63.yaml | 4 +- ...cing-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...show-2961759aa56e979f7c4730d8320eec28.yaml | 4 +- ...erce-57d45ec0a5be7d9e2195cf95b8c7f148.yaml | 4 +- ...erce-754810521866facb83b95cb8c9ef612b.yaml | 4 +- ...erce-774e498835f1c205f8e5e4fbdea2e637.yaml | 4 +- ...erce-96783cf4f584cdb85a4c3bf872b8f294.yaml | 4 +- ...cart-e28866aa63369c2f108c411b915f57f5.yaml | 4 +- ...ster-ef09f842dc72675ee253130a4cf363a3.yaml | 4 +- ...ager-ebcec202e20e94c78709b42424b149aa.yaml | 4 +- ...form-24628850cd8464ffd20b56d41e476477.yaml | 4 +- ...erce-c2df943b1eb079c6b9fb4ba610f1737e.yaml | 4 +- ...uiry-f62206ccce82eddd9f38650d3ec27d0d.yaml | 4 +- ...ucts-2961759aa56e979f7c4730d8320eec28.yaml | 4 +- ...ucts-b935aac9392ea74d48c16c20e8b0b995.yaml | 4 +- ...king-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...king-552bb0df3849cc75dcf6d19f97ba3b05.yaml | 4 +- ...ents-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lite-32cfeb3b1e33f847bf448188352666fd.yaml | 4 +- ...ager-367546d5612217d94f1a8cf076937dba.yaml | 4 +- ...ager-95abb58d27d0cf8744e0e12e5ec2a346.yaml | 4 +- ...erce-d12b3c547439468c334a187596dd5c5f.yaml | 4 +- ...lery-2961759aa56e979f7c4730d8320eec28.yaml | 4 +- ...lery-b935aac9392ea74d48c16c20e8b0b995.yaml | 4 +- ...erce-e456b215f29a4067fb78fdf79a4f6d54.yaml | 4 +- ...e-es-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tant-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rter-0a7c54bda59de606bfaad194d1e6aebd.yaml | 4 +- ...ways-b3d7ce698d96885aab2b92e8488d08ec.yaml | 4 +- ...-tag-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...pack-7ee31b33feb435cadd87c62f79cebfe3.yaml | 4 +- ...pack-ab678c0df2a17e9783905e758a6050b6.yaml | 4 +- ...pack-bea7c217c1714d6e73035b13fbfa872c.yaml | 4 +- ...pack-f91c2602522656e11d82af368c387634.yaml | 4 +- ...post-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...plug-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lips-94f5b565df6f54587e7f38dd2d74f17d.yaml | 4 +- ...arch-f2d13e82f4916c94ee541da275776204.yaml | 4 +- ...ents-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...play-2961759aa56e979f7c4730d8320eec28.yaml | 4 +- ...view-2961759aa56e979f7c4730d8320eec28.yaml | 4 +- ...view-666b088d7e486f0731500dc6b44206fb.yaml | 4 +- ...ices-4f8b1165a8fd4674c47b694bb6769361.yaml | 4 +- ...duct-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lkit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ions-38d794189585526f4580cbcbd32cd51a.yaml | 4 +- ...duct-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ices-f863836bfdeb95471721235ad3d4953e.yaml | 4 +- ...izer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...sell-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...uare-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rary-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...ello-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ence-2fe978140d6bb192dbe8f6347a246620.yaml | 4 +- ...dget-a672faba2cf5fa34711e0d654497c3c5.yaml | 4 +- ...itor-573f32cd1b90d92ebe8ccd29c90cebc9.yaml | 4 +- ...ll-2-82484b577e47d68881c7ffa118db364c.yaml | 4 +- ...opup-38f6be428d034f5c009a03a3e9513d4f.yaml | 4 +- ...-seo-729af181e052b537a824f590788c4026.yaml | 4 +- ...-seo-828cafaa2f518b65826b98ac79418f2d.yaml | 4 +- ...-seo-edb5aff062fcd8aac278362a1ce01bce.yaml | 4 +- ...ring-62254c40802e5286c6fd0b29e99ea8df.yaml | 4 +- ...able-d94ecce4e6207ecfb48491b051e2c22d.yaml | 4 +- ...read-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...stro-06578949edf7886954089bf5ea02f690.yaml | 4 +- ...lity-ad7eb7a1c6f0dd20fda9c7137924de5c.yaml | 4 +- ...sure-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...port-5fbee904a26db0083f1a4d8da7695a16.yaml | 4 +- ...-pro-5fbee904a26db0083f1a4d8da7695a16.yaml | 4 +- ...tify-66b6d0074514ae9bf7d808b0d7b9a6e2.yaml | 4 +- ...pbox-7765fb8469b9b88a34d6b432871e62d3.yaml | 4 +- ...stem-041adfd3c39d4b3580e02b6803d8c84d.yaml | 4 +- ...test-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lish-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...atic-47dfd7659803e2a498c5473e1e3ec44c.yaml | 4 +- ...edic-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-faq-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...itup-bb87858762b8ce23abd3059540eaff9b.yaml | 4 +- ...lite-2a0c0ac8cd49182e6cdc6ee30b392712.yaml | 4 +- ...ents-fc8825d6c61c86ccb18ee45ace94f66b.yaml | 4 +- ...lery-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...gbot-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rber-ae6491998df759b28d14cdb429fd6751.yaml | 4 +- ...rbox-4c3b7c4b9ee3cb503e7f1c307a295ea7.yaml | 4 +- ...dule-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ider-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ctor-d40e32a5b0b2b53caa45979ec9bf9c5b.yaml | 4 +- ...eals-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rses-33d299e06297ee744f8b2ab0f31bf14e.yaml | 4 +- ...rses-97452a6bc86602fd42828322e14bf1a4.yaml | 4 +- ...cker-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ulus-df02c18fa8558df79345e6d025074ade.yaml | 4 +- ...mode-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...cess-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ckup-72a1bd2cf4b65d84a10506cf15cba770.yaml | 4 +- ...ckup-89f1af83c5f7816ee1b237c0d204c470.yaml | 4 +- ...ckup-f1bef4e2b058a613299e0bc52fb82835.yaml | 4 +- ...ging-54ecced4ec6b955678ac66c0d0f02ad3.yaml | 4 +- ...ypes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dmin-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...wers-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...emap-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rack-6d5c3a6b6510902181c0fc950daad824.yaml | 4 +- ...erce-47355e6b7ab75ca2f167e153c73e9cb8.yaml | 4 +- ...rter-b87c02ac90f7b6f2632497368ebe2ad8.yaml | 4 +- ...erce-f774eebe4f23829fc94b7eafdba5ce4e.yaml | 4 +- ...ents-3c60189d6f13a72d771cf945af5deabf.yaml | 4 +- ...lery-0a9f08b24926b461870620f84309d060.yaml | 4 +- ...lery-4b99edd00f6941b4dd18ce780651f43a.yaml | 4 +- ...lery-53e584ae34c9d1aad8bceb6896eca3e1.yaml | 4 +- ...lery-609b7c2d6b7906e24d1cf69e810126a4.yaml | 4 +- ...lery-f0840392ae02502b377a0491bc44f08d.yaml | 4 +- ...-pay-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...cted-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...late-2961759aa56e979f7c4730d8320eec28.yaml | 4 +- ...sers-2c7df8a6a41b0cfad78e17028e8be6b9.yaml | 4 +- ...aily-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ners-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ents-725f7191ecab88079bfff1263c7f0b6b.yaml | 4 +- ...inks-8503267448a714d1d5d099f1366cd0ea.yaml | 4 +- ...inks-acbe4c57371265432a7073cce828c9b8.yaml | 4 +- ...roup-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...2ban-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ache-8db2ce4fbc6df6bbc133a98c76aaa326.yaml | 4 +- ...ache-308394f6b31625a7b3cc64b85e9f4dc2.yaml | 4 +- ...ache-434e9952fd09ca91a230586603143cbf.yaml | 4 +- ...ache-5f9f7bf290ea80a41025c30b0ffd1db1.yaml | 4 +- ...ache-b07a02f9d4db7fe492ff4a4ebc6a38ba.yaml | 4 +- ...ache-f28e9e3f4825fae9f836906b103e0875.yaml | 4 +- ...ager-e29d6db8a3a02793b21f4d3bff2f8cc9.yaml | 4 +- ...load-c865a729c4dbcf73f4c0bf83297ccf74.yaml | 4 +- ...-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...file-b37c0d0d71a59763b804ee0d533397e0.yaml | 4 +- ...file-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ance-d47084b590cbc795c568485d3590251a.yaml | 4 +- ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ugin-73f135de232fc553a1861c313e9ab548.yaml | 4 +- ...ugin-a5532d15dce91adaa57b29acc9d33bb8.yaml | 4 +- ...maps-5938cf4c59a1d8ebf45c155344fba09e.yaml | 4 +- ...view-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tify-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lite-eb9d1a9f33f022abcf9d4898480aa085.yaml | 4 +- ...show-47a30f13a712f0b51de3660787ce6dab.yaml | 4 +- ...ager-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...izer-8b089becf530f93c37bff15846437ba4.yaml | 4 +- ...oice-e02e4d31cf49a5cf3437bdef98608b60.yaml | 4 +- ...ager-ad1a7b10885844b515902d55c9660f2d.yaml | 4 +- ...ager-f05562fc94116db3e2f5dd9c7a1bb0d7.yaml | 4 +- ...arch-06bec6e8b710a7efd7b4113567911744.yaml | 4 +- ...arch-0757689ccb9eb2501cdd998e2d1228fe.yaml | 4 +- ...arch-493970b9d6651de9fd021a267048266d.yaml | 4 +- ...arch-e1e8b509fbe86c6565ac6936dc65e181.yaml | 4 +- ...info-0d9b0b8cf0e1e0917d4472d07a7d609b.yaml | 4 +- ...link-f68af0f4ef5270237a2dac4a79c88b36.yaml | 4 +- ...info-524d5feb3bdf1faf2643f61f231563b9.yaml | 4 +- ...ream-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-css-378840583bbe122d719ad92f2c75681f.yaml | 4 +- ...-ssl-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...show-5088078af30c234ceab9ea2c99baf901.yaml | 4 +- ...show-99ce085e8b4d878765e949a7f07f6195.yaml | 4 +- ...mpts-03550082734f798d8bdd156b8cc8a2c2.yaml | 4 +- ...-bio-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ress-614cced2da1395e72b78e478d2060077.yaml | 4 +- ...port-1006dbdfc9efb098ea5160eab40a333c.yaml | 4 +- ...port-5b3f76eca7d765ff7782b4367d966247.yaml | 4 +- ...e-tv-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...cher-e5e442420905170833a6af8d927d5a01.yaml | 4 +- ...ging-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...ging-d4ae66d5784ee57fd8bb24dc427e9062.yaml | 4 +- ...ging-e516ec301b4cffad1129ddeea6a2940a.yaml | 4 +- ...smtp-1f2e61c0dd580a01c313ec65237451a6.yaml | 4 +- ...tion-acbdf3cc478f1988c5c3adc520bf6766.yaml | 4 +- ...tion-dc3b48b4dca1bdc6da00b0dd6c2512e9.yaml | 4 +- ...size-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...menu-c6355382690553750aa0f80495721ab6.yaml | 4 +- ...bers-927acdfb36c0f4e522e79fd5612163d3.yaml | 4 +- ...mory-e5755ab6ce28e69bf31d165e7430384a.yaml | 4 +- ...over-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lter-320c57cb813e49326995b9fd67784965.yaml | 4 +- ...teor-e8d8c624f6e6d23d2dff82c9385b3265.yaml | 4 +- ...ayer-4c9bbb5092eaa29d7b825a0537618beb.yaml | 4 +- ...ctor-f753e4eb4ef42bb2c3d71aa325c61612.yaml | 4 +- ...lisa-4a1f8595afbd88494aea9ace0d288d1b.yaml | 4 +- ...nput-5efd2ce0ed5c8f6b3ada49f2773bc973.yaml | 4 +- ...pier-600f23cea45d49c9fbecd578c78ad87f.yaml | 4 +- ...ocks-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-bar-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ages-1f2c3201ce6430a901ea9b9ce7fb0cee.yaml | 4 +- ...inks-e9f11c328847b06004cf712b0d79f902.yaml | 4 +- ...bell-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-oer-3eb3affb644d24e715bf8fc2c2551c12.yaml | 4 +- ...fers-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ours-acd8ba84e60cbc0f092ddfff82c451e8.yaml | 4 +- ...ypal-f591ec3fd6349f415ea113a1e0a8f96c.yaml | 4 +- ...ogin-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...plus-b6b6c7434231029039b20df85b5959db.yaml | 4 +- ...ects-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...iwik-011e9219619a7fcb5d0b0fb47e00200b.yaml | 4 +- ...card-25b6bae2090d69c4b65ae56919567a18.yaml | 4 +- ...lock-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lone-2d87c0364307edea9fea6b2a2be6834f.yaml | 4 +- ...-pdf-e97d01552bb2ae8d753dbf0013cb0c0b.yaml | 4 +- ...ndly-07ab0ae27a6f3fee8bb775502300d8a3.yaml | 4 +- ...ndly-82ee0ecca0569c5ee6149d011bc22c2e.yaml | 4 +- ...plus-d5107af4decc8fb0ccbe36135deb72d1.yaml | 4 +- ...ages-dc7758f91293ce9c92573a1104c733de.yaml | 4 +- ...adio-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-ads-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tbox-892de5c9148c6f8df52be6ed544382d2.yaml | 4 +- ...ider-44dea4f7c7575cbbd8f534048f1c0dce.yaml | 4 +- ...ider-568c91e024801d5d2e19e257aa73eeab.yaml | 4 +- ...ator-49339be9905399af5760c326a04d9feb.yaml | 4 +- ...rter-7725287d44cd6757cf277fdd17b26ca6.yaml | 4 +- ...ever-9183c93b61003074c2d21915934372a5.yaml | 4 +- ...osts-f11abc39d7b4372ca1d0f7ca1556eb9b.yaml | 4 +- ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lter-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-log-908a2c5a645886182a7c18816c5cda70.yaml | 4 +- ...-log-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...scan-c9a2376716cf70bca17532d4183c4633.yaml | 4 +- ...izer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ages-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...inal-a0116eeab00e009fd4fa3d22d8f45407.yaml | 4 +- ...ugin-3019f115da4ce05058864e5dcdcaacab.yaml | 4 +- ...ogle-0df69cb46add8b6c0a7b0f63ee7a53a7.yaml | 4 +- ...stat-04e23ac1b6365010d31ca471e4c11f32.yaml | 4 +- ...stat-b3e91448e22115e9d095b2a1e488e5df.yaml | 4 +- ...stat-f8bccfc95e7537d4400b0b6737b24e5f.yaml | 4 +- ...port-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...-sms-7216efc8a277e31e7bc37bcee5ad9a4b.yaml | 4 +- ...shit-2b972fb379a3ef9946c652caaa66df2d.yaml | 4 +- ...shit-3baba46cc5a286838f8fb9a60b0d6094.yaml | 4 +- ...oxes-e6b578c644b8dec6cfd9f0e734409896.yaml | 4 +- ...alia-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tics-1510080b156a41f0be0cec87e4c71c9d.yaml | 4 +- ...tics-268f3c8028825c46a53ec35cc9415801.yaml | 4 +- ...tics-6600d372243624aa436749b499ef6260.yaml | 4 +- ...tics-c6fa1f77c447ad70ead1d031770de1e9.yaml | 4 +- ...tics-e9a7d43315eb08a5c15f9831030945e8.yaml | 4 +- ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...hema-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ache-0063bb4beaa99595ff7d4e40026fb686.yaml | 4 +- ...ache-5536ba6a87acebd391c60f6bc2e48bf9.yaml | 4 +- ...stem-43205c5c452a1868decf3021c2397818.yaml | 4 +- ...stem-fac707dbaf41d85badb955071bceca40.yaml | 4 +- ...tool-fe7166fce08ea1c027bfc2808eb6d8de.yaml | 4 +- ...sium-f25290eae54007b679e22d13b90a23ce.yaml | 4 +- ...-pro-22fdef306e2010977a36342bab3a6db5.yaml | 4 +- ...lder-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...cket-96b4fb44cfb3ecbb2e1732d4d6ba46bb.yaml | 4 +- ...ffer-95f254edf062c496895c196beac952e1.yaml | 4 +- ...uite-ed03689d193897df0f01e218797bc0ef.yaml | 4 +- ...usel-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...usel-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dule-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...news-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...pbar-633e46af2038cc804c4d8333e35d9bb7.yaml | 4 +- ...gine-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...core-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rter-75438814e26aeaea61aafcd29b551852.yaml | 4 +- ...rter-9112916c5852d2f0b814be06e90dc90b.yaml | 4 +- ...tend-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...tend-52f719767f15ee080cb75a30bc027c64.yaml | 4 +- ...oups-bf634e73fd86b893cfe39f853485f27b.yaml | 4 +- ...ault-adc5003f671700d129ab7c75b33ee75d.yaml | 4 +- ...ider-1c782b4e649e4631f30e49b11990c278.yaml | 4 +- ...ider-edc2879e6dbbc4290d65d5576c4e456b.yaml | 4 +- ...tbox-92e1a581ed538c56c551dca01e319f17.yaml | 4 +- ...aded-4a0f27da648b505730f70f317974fdf7.yaml | 4 +- ...heet-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...heck-d62c21a080a1bd7668ca5e7c3c2401ec.yaml | 4 +- ...form-d691c077b0b5b8af36c29715d058c65d.yaml | 4 +- ...kbox-88e8ba621a8292f361dd4b3feafab680.yaml | 4 +- ...ller-597c6e67a31af6c6a7a2d601240421fb.yaml | 4 +- ...ager-fa459b52ecf85365dc55ab67da949392.yaml | 4 +- ...ries-bd3c8934fd0962d780c7ee3f1bf2f569.yaml | 4 +- ...ntor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...book-596940e1ffaab74a13bdb327bf203eca.yaml | 4 +- ...rect-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...scuz-a97759482458c44cbd86520addf0e715.yaml | 4 +- ...lite-0425ae56a9fab522c188634fc2eda86f.yaml | 4 +- ...lite-316c95f4f3b5891fdd91af058dfb9524.yaml | 4 +- ...lite-3d5a86cd8278e1869b165a5be40a3baa.yaml | 4 +- ...nels-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...tapi-4c6d6429665eac8877ce0e75f13992a4.yaml | 4 +- ...form-6647340253053f9bdb1fb3f23b4abe85.yaml | 4 +- ...pgsi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...pgsi-c60ee47fa89a26e43f0b2e6590ebf383.yaml | 4 +- ...onal-c60ee47fa89a26e43f0b2e6590ebf383.yaml | 4 +- ...late-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...uote-5e98c4735eb20663ca1067da327e8606.yaml | 4 +- ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...iler-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...wpml-b794db11782c303b2a81b056287603af.yaml | 4 +- ...tion-18e8b80c2622db130ba5596fe32dcfee.yaml | 4 +- ...ptin-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ille-94445150de831d7b0c3c55471e2a0bcf.yaml | 4 +- ...aner-7f379444fd295591b6061598a142cc5d.yaml | 4 +- ...ogin-33ba7ead1d6b53a7bacd0ee1d3cec66a.yaml | 4 +- ...ogin-e87c9f8090be1d89c33f679b357f6df8.yaml | 4 +- ...ress-40c66d343981decaf1c11e2239adae6e.yaml | 4 +- ...divi-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...inwp-3df45b218aba0e53ba0ae72e9699b2ef.yaml | 4 +- ...tore-11e9b1d880ea6b9e7b3f23d21ed1379c.yaml | 4 +- ...tore-5bf4618f3f911336450f68ac829f8ebb.yaml | 4 +- ...tore-b070ea085481a5d7bd82f5fd3f416fd0.yaml | 4 +- ...wpvr-18966e8228314b8165d39d48519f43cc.yaml | 4 +- ...form-cf0536ededa77239ac982d05d856b3db.yaml | 4 +- ...p-vc-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...utes-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ters-0dc627cd120008e5a66c81e20ce78b02.yaml | 4 +- ...ters-149048c8f49646b7cbdd6843761e070a.yaml | 4 +- ...cart-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ards-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ches-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tton-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ools-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ugin-f004ce2a754ccfc5988e2e69aed45af9.yaml | 4 +- ...ting-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...nder-92e334f7eff847d619a107f5b6ee2b7d.yaml | 4 +- ...tion-8e47416ac2dba104b5166ffbff80d7af.yaml | 4 +- ...pare-e5eb957a437ccd71daf2e9f56a4559b2.yaml | 4 +- ...uote-cd76dd48c85b587e87acb07c80de397a.yaml | 4 +- ...list-2ae81b909e77b01f5f9d53fd011b14fb.yaml | 4 +- ...poll-348e9954cde1ddefaa405cdbf442ab7b.yaml | 4 +- ...mbed-50a6dff0cb336807f517358763e4184a.yaml | 4 +- ...ayer-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tory-3ecd9d29be301ddeb0777372578c9ed3.yaml | 4 +- ...mage-581a16776001d26901f68412e72a12c5.yaml | 4 +- ...-crm-b829e9e3bc2e932b44b01c6e5d51daac.yaml | 4 +- ...-crm-e62802506f71c3511e6c8f20c3c5bc64.yaml | 4 +- ...spam-da9b182fa6fe344911bcf311918bd2c9.yaml | 4 +- ...rect-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...wall-4dd3cd282a5e0a6020901679d8114797.yaml | 4 +- ...star-a3ed9e76b0fc321cc4d7c1cb9261a2e1.yaml | 4 +- ...ance-9c1002d331f3bfe836a243fd7707a431.yaml | 4 +- ...asic-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...-mag-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...-new-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...root-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...aple-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...tore-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...heme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml | 4 +- ...kita-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 4 +- ...ster-972c6f275cedbc5b8ff06bc4a592ad76.yaml | 4 +- ...eska-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 4 +- ...ence-0e4a8af0dcec83139d2c5869dc07116c.yaml | 4 +- ...mela-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...plus-da3e281a5f70bba201afb2a0076933cd.yaml | 4 +- ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...dian-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 4 +- ...elle-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...ival-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...vada-4a05ae911598dc28de7b72c0be044356.yaml | 4 +- ...anix-153b374358a4469baf0dcf3e128485d7.yaml | 4 +- ...bani-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rate-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 4 +- ...ngle-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...laze-902eeda285eff78838cf6ebbc45afd69.yaml | 4 +- ...oger-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...heme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml | 4 +- ...rand-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tbox-de6a8f71d54a21ca8a8ec790aa7c8445.yaml | 4 +- ...risk-2ab21e22bdca9635ce4e964a4031d548.yaml | 4 +- ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...cope-30fe39ec377fc6748bfe3566282b5413.yaml | 4 +- ...rovy-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...heme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml | 4 +- ...erfy-0cc827bd1e5b71473ebe52fdbadbc377.yaml | 4 +- ...erfy-70111aaef33d8dec5c55f5b989914270.yaml | 4 +- ...erfy-d814bf89eef506e207923233b9147995.yaml | 4 +- ...erfy-f287f6d03ce957fcb674730856528833.yaml | 4 +- ...plus-ead8215e6f4d6c583e6aa46b74460457.yaml | 4 +- ...spot-a1557c2cdb71bc0d86215f36aee8a08b.yaml | 4 +- ...tion-fb64a0398d930ef57cb315100ba26973.yaml | 4 +- ...dore-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 4 +- ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...lite-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...rona-6fd6dbbc58f038d409e478e2b51e5038.yaml | 4 +- ...ress-99dafceb50253393d9ffc3281335a6c4.yaml | 4 +- ...rius-d78e7652648c0b8a881a39d5a0a824ec.yaml | 4 +- ...lace-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...urvo-d59f1cca77e5c81eb993686d3bfbe443.yaml | 4 +- ...deal-52cc2ef9a6c2df75495af02a2e660264.yaml | 4 +- ...tion-6bdfdbb30005886703826f665471e962.yaml | 4 +- ...isho-6c37ed5f01e697fababa0d98a125cf7e.yaml | 4 +- ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...sion-033d028c8d102a833af4770e22a7e5b6.yaml | 4 +- ...divi-aabb704338c74a997901edf2f42d1b76.yaml | 4 +- ...doko-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...late-042613decef34429d197e1051e8a6f20.yaml | 4 +- ...late-e1c40eb25b51b97676a5f939865df658.yaml | 4 +- ...ebiz-153b374358a4469baf0dcf3e128485d7.yaml | 4 +- ...obiz-153b374358a4469baf0dcf3e128485d7.yaml | 4 +- ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...-sec-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...asta-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tion-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...hten-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...nade-a255ef8b2471d464b72404fea528ca4b.yaml | 4 +- ...clid-a6caef4d4eacfb6278b4d425ef54c643.yaml | 4 +- ...nice-cca0a1d963a9d045f5815fda1ac1ee73.yaml | 4 +- ...noia-457ebe36f8d645741bdfd0b59a49af7e.yaml | 4 +- ...erse-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...icit-3af6c2ccbc49fd7ac785ee1caf9ff348.yaml | 4 +- ...pose-f1706f372daa69509bea2f9b5da810d7.yaml | 4 +- ...xtra-aabb704338c74a997901edf2f42d1b76.yaml | 4 +- ...lici-83462ab31c23510cbb4ed4293c5a8d88.yaml | 4 +- ...ndus-cfc50a0804539ff785925571caba914b.yaml | 4 +- ...aphy-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...tful-80477eee43f78931347fee8d51f74e47.yaml | 4 +- ...golo-1089e240eda4d80561f1b8e6010e3ce7.yaml | 4 +- ...sium-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tate-437a2bdda5608892f1a5bb69f6ded0f0.yaml | 4 +- ...tapo-59597a1103eb0e1b65ccc3450fe7b191.yaml | 4 +- ...erce-59597a1103eb0e1b65ccc3450fe7b191.yaml | 4 +- ...reer-24ed2c04cbd73f5247d8f86d829c0936.yaml | 4 +- ...tart-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 4 +- ...zept-0f4251fd59b25576860e082b19c2ffec.yaml | 4 +- ...more-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...gpro-a7a54e981c91a31a82ea2b30647ffe08.yaml | 4 +- ...ment-0cec5a6d0e834430dc98d58d37f70832.yaml | 4 +- ...idia-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...heme-01c4d40fcdab41e37ee61c249a61b9a0.yaml | 4 +- ...zuma-4261580e84ae15728409e95c26688958.yaml | 4 +- ...aper-6aa028e953687ecd485553c1a3a1d760.yaml | 4 +- ...base-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...okke-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tore-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...ovum-153b374358a4469baf0dcf3e128485d7.yaml | 4 +- ...heme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml | 4 +- ...ines-420826a18f17be957cec476d8ddba661.yaml | 4 +- ...some-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...ount-d272edd7bf2202319b532fbee6ccf813.yaml | 4 +- ...olio-8ef9471efc371c6e5352e86a4f1c97cf.yaml | 4 +- ...form-097b177de58f6e0ab66eb9ddb05e4182.yaml | 4 +- ...unte-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...rosa-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...urus-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...heme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml | 4 +- ...heme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml | 4 +- ...te-7-7c80a51dbc178dbba0958056b8c3f2e8.yaml | 4 +- ...tate-b65ead0bf4d8e59d495a3f91f757b324.yaml | 4 +- ...lity-3985d2776b3f2339d3a1cdb855d509b4.yaml | 4 +- ...heme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml | 4 +- ...gent-288eb500b515d4e74eb8cc4150e440e6.yaml | 4 +- ...olve-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...pple-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...heme-d488c88c43dea5d67f8bd9aa864ebfd0.yaml | 4 +- ...hifa-8f0fce172385265946ed4e8ec3bfed88.yaml | 4 +- ...kala-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...alem-25d9dfe9dcb2d90be01a548affeb688f.yaml | 4 +- ...ient-29b864084c574899fcc996f9b322577a.yaml | 4 +- ...rlet-828e17b05d92c010fb7f9a4a0922569b.yaml | 4 +- ...llme-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...elio-fbaa72caee7c30faff8212706be987c1.yaml | 4 +- ...less-6490c018ab51d9b822f80c44c2a4f77f.yaml | 4 +- ...tbox-0dec1530fa29f0f3dd02117fbaf12b9a.yaml | 4 +- ...uban-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...chid-f668ff84aa12e9412717100f16882a82.yaml | 4 +- ...ance-36a65684d72ca90db400bc9a48e4b1a7.yaml | 4 +- ...tart-9ef0d273482df03c9ba3dcd5e27ac8b5.yaml | 4 +- ...urce-03c4d8dd500314f942cf4bffdc3e3289.yaml | 4 +- ...arky-186cdb2704350d8646ad5a58aed89581.yaml | 4 +- ...list-48124923f45f6ff808c33e2b8fa204cd.yaml | 4 +- ...ulor-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...illa-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...ozen-0aa9e3593c86e4ffacf4528cd86f4af3.yaml | 4 +- ...list-887e51b7ac6ae9ebfb1f0b6b57330b90.yaml | 4 +- ...tory-e1d105a5373862135dae31af977cf05f.yaml | 4 +- ...gger-816c00d91c21f41afdfc82cbe3dd6a68.yaml | 4 +- ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...cher-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...nday-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...e100-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...ency-18e29f581b2b637530caba059b3180e6.yaml | 4 +- ...eler-10e06b5ef925da2edfec94c00c6ef59a.yaml | 4 +- ...eler-47edf7b573f3606ae6a648dd78bee5ee.yaml | 4 +- ...eler-4e8adfcb068bf53ba8223d2136f425a4.yaml | 4 +- ...even-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...akit-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...cale-5e5f5586f8a04fc7c1bb725c8fd2a8ff.yaml | 4 +- ...lvet-cebcf5c5e3b1d8025e7b39f8bd391a13.yaml | 4 +- ...llar-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...like-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...vmag-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...news-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...ibar-8720a886474e9b973346fa40eca70f76.yaml | 4 +- ...fice-b256df5c032ca82a00290c7b34a523e2.yaml | 4 +- ...tify-5a02b0682e7d4b10352df50fd089e856.yaml | 4 +- ...oose-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...erra-b9563d9e100a8de4aef6c2ddb59436a7.yaml | 4 +- ...tore-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...llax-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...baby-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...tics-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...lite-b05621ef791a4dad965a137ebf6fa48c.yaml | 4 +- ...oner-4fb619246fc5d2000cab608496d82ce7.yaml | 4 +- ...oner-d7ec4a32cfcc6080d759cea90bff42d1.yaml | 4 +- ...ress-08c53afd34ffbbd3059a2b6b66bcb1c4.yaml | 4 +- ...ress-3d37583bb3d8fb0c908af6e42a91b161.yaml | 4 +- ...ress-591e0bc07a94ed14670e3a9711a55f6c.yaml | 4 +- ...ress-5bece4b7e128b93c7ba7c67e9587fa70.yaml | 4 +- ...ress-86b363b18abd64f68bd3504e771d1304.yaml | 4 +- ...ress-86d97cfb2c6c1dcbecff85883c6518a3.yaml | 4 +- ...ress-8ab2154abe7c34e01ae356ee17e67c3a.yaml | 4 +- ...ress-91b67be1988bc2723c174da3440c9a3b.yaml | 4 +- ...ress-9e82b6889ee804643ded805eecd26873.yaml | 4 +- ...ress-b72b325374b1f5f1e06c0d338207c783.yaml | 4 +- ...ress-c9365112ff2c7a32ee6ceb41759e0ba7.yaml | 4 +- ...ress-ed4cb69f49b56e0f42af418819975107.yaml | 4 +- ...ress-fffa14ca79a3dd45e05f299cc50d704f.yaml | 4 +- 9859 files changed, 20646 insertions(+), 20650 deletions(-) diff --git a/nuclei-templates/2003/CVE-2003-1598-8b8bc9dc7287ba3ce3345c56bcac0bb7.yaml b/nuclei-templates/2003/CVE-2003-1598-8b8bc9dc7287ba3ce3345c56bcac0bb7.yaml index ffc5232d85..a6eb6a6eea 100644 --- a/nuclei-templates/2003/CVE-2003-1598-8b8bc9dc7287ba3ce3345c56bcac0bb7.yaml +++ b/nuclei-templates/2003/CVE-2003-1598-8b8bc9dc7287ba3ce3345c56bcac0bb7.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 0.72 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in log.header.php in WordPress 0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the posts variable. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2003-1598 metadata: shodan-query: 'vuln:CVE-2003-1598' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2004/CVE-2004-1559-62059d6f1640212c35e5b3f8330daee1.yaml b/nuclei-templates/2004/CVE-2004-1559-62059d6f1640212c35e5b3f8330daee1.yaml index 4137d84096..227ac1b48d 100644 --- a/nuclei-templates/2004/CVE-2004-1559-62059d6f1640212c35e5b3f8330daee1.yaml +++ b/nuclei-templates/2004/CVE-2004-1559-62059d6f1640212c35e5b3f8330daee1.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 1.2.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in Wordpress 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) redirect_to, text, popupurl, or popuptitle parameters to wp-login.php, (2) redirect_url parameter to admin-header.php, (3) popuptitle, popupurl, content, or post_title parameters to bookmarklet.php, (4) cat_ID parameter to categories.php, (5) s parameter to edit.php, or (6) s or mode parameter to edit-comments.php. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2004-1559 metadata: shodan-query: 'vuln:CVE-2004-1559' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2005/CVE-2005-1102-dced04c5992536d443cadc0d8795aeb0.yaml b/nuclei-templates/2005/CVE-2005-1102-dced04c5992536d443cadc0d8795aeb0.yaml index ee248027a5..f69b11ac4b 100644 --- a/nuclei-templates/2005/CVE-2005-1102-dced04c5992536d443cadc0d8795aeb0.yaml +++ b/nuclei-templates/2005/CVE-2005-1102-dced04c5992536d443cadc0d8795aeb0.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 1.5 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in template-functions-post.php in WordPress 1.5 and earlier allow remote attackers to execute arbitrary commands via the (1) content or (2) title of the post. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2005-1102 metadata: shodan-query: 'vuln:CVE-2005-1102' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2005/CVE-2005-1687-a9813318cd00104cf812206e64197a1c.yaml b/nuclei-templates/2005/CVE-2005-1687-a9813318cd00104cf812206e64197a1c.yaml index 0714016bb0..9d8a5c7f88 100644 --- a/nuclei-templates/2005/CVE-2005-1687-a9813318cd00104cf812206e64197a1c.yaml +++ b/nuclei-templates/2005/CVE-2005-1687-a9813318cd00104cf812206e64197a1c.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 1.5.1 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in wp-trackback.php in Wordpress 1.5 and earlier allows remote attackers to execute arbitrary SQL commands via the tb_id parameter. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2005-1687 metadata: shodan-query: 'vuln:CVE-2005-1687' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2005/CVE-2005-1810-24c78f38bf30593eb710d6e05f774c4e.yaml b/nuclei-templates/2005/CVE-2005-1810-24c78f38bf30593eb710d6e05f774c4e.yaml index 88827f361e..5c313f792e 100644 --- a/nuclei-templates/2005/CVE-2005-1810-24c78f38bf30593eb710d6e05f774c4e.yaml +++ b/nuclei-templates/2005/CVE-2005-1810-24c78f38bf30593eb710d6e05f774c4e.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 1.5.1.2 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in template-functions-category.php in WordPress 1.5.1 allows remote attackers to execute arbitrary SQL commands via the $cat_ID variable, as demonstrated using the cat parameter to index.php. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2005-1810 metadata: shodan-query: 'vuln:CVE-2005-1810' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2005/CVE-2005-2108-83ae7383a40a2b386de5c8ed058c9c78.yaml b/nuclei-templates/2005/CVE-2005-2108-83ae7383a40a2b386de5c8ed058c9c78.yaml index 7949580345..531b091a4d 100644 --- a/nuclei-templates/2005/CVE-2005-2108-83ae7383a40a2b386de5c8ed058c9c78.yaml +++ b/nuclei-templates/2005/CVE-2005-2108-83ae7383a40a2b386de5c8ed058c9c78.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 1.5.1.3 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in XMLRPC server in WordPress 1.5.1.2 and earlier allows remote attackers to execute arbitrary SQL commands via input that is not filtered in the HTTP_RAW_POST_DATA variable, which stores the data in an XML file. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2005-2108 metadata: shodan-query: 'vuln:CVE-2005-2108' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2005/CVE-2005-2612-8889c549d7832d5315ef07e7a0f1de5e.yaml b/nuclei-templates/2005/CVE-2005-2612-8889c549d7832d5315ef07e7a0f1de5e.yaml index 05c154dbe3..1bbe7769e7 100644 --- a/nuclei-templates/2005/CVE-2005-2612-8889c549d7832d5315ef07e7a0f1de5e.yaml +++ b/nuclei-templates/2005/CVE-2005-2612-8889c549d7832d5315ef07e7a0f1de5e.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 1.5.2 - Remote Code Execution author: topscoder - severity: high + severity: critical description: > Direct code injection vulnerability in WordPress 1.5.1.3 and earlier allows remote attackers to execute arbitrary PHP code via the cache_lastpostdate[server] cookie. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2005-2612 metadata: shodan-query: 'vuln:CVE-2005-2612' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2006/CVE-2006-1012-5ffbaa4e2b1d5d3387454a24d1df8151.yaml b/nuclei-templates/2006/CVE-2006-1012-5ffbaa4e2b1d5d3387454a24d1df8151.yaml index 84c7b1ca80..ba9dab247f 100644 --- a/nuclei-templates/2006/CVE-2006-1012-5ffbaa4e2b1d5d3387454a24d1df8151.yaml +++ b/nuclei-templates/2006/CVE-2006-1012-5ffbaa4e2b1d5d3387454a24d1df8151.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 1.5.2 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in WordPress 1.5.2, and possibly other versions before 2.0, allows remote attackers to execute arbitrary SQL commands via the User-Agent field in an HTTP header for a comment. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2006-1012 metadata: shodan-query: 'vuln:CVE-2006-1012' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2006/CVE-2006-1796-f505e5adff7df495d5e3883941625090.yaml b/nuclei-templates/2006/CVE-2006-1796-f505e5adff7df495d5e3883941625090.yaml index bbd0b4c032..180d777387 100644 --- a/nuclei-templates/2006/CVE-2006-1796-f505e5adff7df495d5e3883941625090.yaml +++ b/nuclei-templates/2006/CVE-2006-1796-f505e5adff7df495d5e3883941625090.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 2.0.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the paging links functionality in template-functions-links.php in Wordpress 1.5.2, and possibly other versions before 2.0.1, allows remote attackers to inject arbitrary web script or HTML to Internet Explorer users via the request URI ($_SERVER['REQUEST_URI']). reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2006-1796 metadata: shodan-query: 'vuln:CVE-2006-1796' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2006/CVE-2006-2667-2250da6b6f83d2978f8b20e578c03ce4.yaml b/nuclei-templates/2006/CVE-2006-2667-2250da6b6f83d2978f8b20e578c03ce4.yaml index fa999ae823..cf8074cfaa 100644 --- a/nuclei-templates/2006/CVE-2006-2667-2250da6b6f83d2978f8b20e578c03ce4.yaml +++ b/nuclei-templates/2006/CVE-2006-2667-2250da6b6f83d2978f8b20e578c03ce4.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 2.0.3 - Remote Code Execution author: topscoder - severity: high + severity: critical description: > Direct static code injection vulnerability in WordPress 2.0.2 and earlier allows remote attackers to execute arbitrary commands by inserting a carriage return and PHP code when updating a profile, which is appended after a special comment sequence into files in (1) wp-content/cache/userlogins/ (2) wp-content/cache/users/ which are later included by cache.php, as demonstrated using the displayname argument. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2006-2667 metadata: shodan-query: 'vuln:CVE-2006-2667' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2006/CVE-2006-4208-1354435c4f5fd2cf36a77bfe4d9efd70.yaml b/nuclei-templates/2006/CVE-2006-4208-1354435c4f5fd2cf36a77bfe4d9efd70.yaml index bcdf7e4038..1c6e51663e 100644 --- a/nuclei-templates/2006/CVE-2006-4208-1354435c4f5fd2cf36a77bfe4d9efd70.yaml +++ b/nuclei-templates/2006/CVE-2006-4208-1354435c4f5fd2cf36a77bfe4d9efd70.yaml @@ -4,7 +4,7 @@ info: name: > Skippy WP-DB Backup (Legacy Plugin) <= 1.7 - Authenticated (Admin+) Directory Traversal author: topscoder - severity: medium + severity: low description: > Directory traversal vulnerability in wp-db-backup.php in the Skippy WP-DB-Backup legacy plugin for WordPress 1.7 and earlier allows remote authenticated users with administrative privileges to read arbitrary files via a .. (dot dot) in the backup parameter to edit.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-db-backup.php/" google-query: inurl:"/wp-content/plugins/wp-db-backup.php/" shodan-query: 'vuln:CVE-2006-4208' - tags: cve,wordpress,wp-plugin,wp-db-backup.php,medium + tags: cve,wordpress,wp-plugin,wp-db-backup.php,low http: - method: GET diff --git a/nuclei-templates/2006/CVE-2006-6808-c74b3da5c9977a8515a2ae6aea10e45b.yaml b/nuclei-templates/2006/CVE-2006-6808-c74b3da5c9977a8515a2ae6aea10e45b.yaml index e142c2c7ce..72dca3ab8b 100644 --- a/nuclei-templates/2006/CVE-2006-6808-c74b3da5c9977a8515a2ae6aea10e45b.yaml +++ b/nuclei-templates/2006/CVE-2006-6808-c74b3da5c9977a8515a2ae6aea10e45b.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.0.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-admin/templates.php in WordPress 2.0.5 allows remote attackers to inject arbitrary web script or HTML via the file parameter. NOTE: some sources have reported this as a vulnerability in the get_file_description function in wp-admin/admin-functions.php. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2006-6808 metadata: shodan-query: 'vuln:CVE-2006-6808' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-0106-5248a5bd925434add7e3be51c0e47bf5.yaml b/nuclei-templates/2007/CVE-2007-0106-5248a5bd925434add7e3be51c0e47bf5.yaml index fa4468b7af..b9cbb1be56 100644 --- a/nuclei-templates/2007/CVE-2007-0106-5248a5bd925434add7e3be51c0e47bf5.yaml +++ b/nuclei-templates/2007/CVE-2007-0106-5248a5bd925434add7e3be51c0e47bf5.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.0.5 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Cross-site scripting (XSS) vulnerability in the CSRF protection scheme in WordPress before 2.0.6 allows remote attackers to inject arbitrary web script or HTML via a CSRF attack with an invalid token and quote characters or HTML tags in URL variable names, which are not properly handled when WordPress generates a new link to verify the request. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-0106 metadata: shodan-query: 'vuln:CVE-2007-0106' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,medium http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-0233-78c0fa7115ae86c26deccf0e5ec633a7.yaml b/nuclei-templates/2007/CVE-2007-0233-78c0fa7115ae86c26deccf0e5ec633a7.yaml index dabe0f6b85..0a9c1fbc97 100644 --- a/nuclei-templates/2007/CVE-2007-0233-78c0fa7115ae86c26deccf0e5ec633a7.yaml +++ b/nuclei-templates/2007/CVE-2007-0233-78c0fa7115ae86c26deccf0e5ec633a7.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 2.0.7 - SQL Injection author: topscoder - severity: high + severity: critical description: > wp-trackback.php in WordPress 2.0.6 and earlier does not properly unset variables when the input data includes a numeric parameter with a value matching an alphanumeric parameter's hash value, which allows remote attackers to execute arbitrary SQL commands via the tb_id parameter. NOTE: it could be argued that this vulnerability is due to a bug in the unset PHP command (CVE-2006-3017) and the proper fix should be in PHP; if so, then this should not be treated as a vulnerability in WordPress. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-0233 metadata: shodan-query: 'vuln:CVE-2007-0233' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-1230-e46b887a41d8ee6fabb81ee3e309e2b3.yaml b/nuclei-templates/2007/CVE-2007-1230-e46b887a41d8ee6fabb81ee3e309e2b3.yaml index 7f75aa73ef..3a1977a711 100644 --- a/nuclei-templates/2007/CVE-2007-1230-e46b887a41d8ee6fabb81ee3e309e2b3.yaml +++ b/nuclei-templates/2007/CVE-2007-1230-e46b887a41d8ee6fabb81ee3e309e2b3.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in wp-includes/functions.php in WordPress before 2.1.2-alpha allow remote attackers to inject arbitrary web script or HTML via (1) the Referer HTTP header or (2) the URI, a different vulnerability than CVE-2007-1049. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-1230 metadata: shodan-query: 'vuln:CVE-2007-1230' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-1244-a556f0ec8cc782b1df540c9037fded25.yaml b/nuclei-templates/2007/CVE-2007-1244-a556f0ec8cc782b1df540c9037fded25.yaml index 6821251b79..fafa0425b1 100644 --- a/nuclei-templates/2007/CVE-2007-1244-a556f0ec8cc782b1df540c9037fded25.yaml +++ b/nuclei-templates/2007/CVE-2007-1244-a556f0ec8cc782b1df540c9037fded25.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site request forgery (CSRF) vulnerability in the AdminPanel in WordPress 2.1.1 and earlier allows remote attackers to perform privileged actions as administrators, as demonstrated using the delete action in wp-admin/post.php. NOTE: this issue can be leveraged to perform cross-site scripting (XSS) attacks and steal cookies via the post parameter. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-1244 metadata: shodan-query: 'vuln:CVE-2007-1244' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-1622-f773a7113074464a75bbe2d49bec8c41.yaml b/nuclei-templates/2007/CVE-2007-1622-f773a7113074464a75bbe2d49bec8c41.yaml index e198cf0cb2..22aa22bd55 100644 --- a/nuclei-templates/2007/CVE-2007-1622-f773a7113074464a75bbe2d49bec8c41.yaml +++ b/nuclei-templates/2007/CVE-2007-1622-f773a7113074464a75bbe2d49bec8c41.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.1.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-admin/vars.php in WordPress before 2.0.10 RC2, and before 2.1.3 RC2 in the 2.1 series, allows remote authenticated users with theme privileges to inject arbitrary web script or HTML via the PATH_INFO in the administration interface, related to loose regular expression processing of PHP_SELF. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-1622 metadata: shodan-query: 'vuln:CVE-2007-1622' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-1893-5382cac551da0c76754442b2aa2316fe.yaml b/nuclei-templates/2007/CVE-2007-1893-5382cac551da0c76754442b2aa2316fe.yaml index 856ddd0acc..07fd38f883 100644 --- a/nuclei-templates/2007/CVE-2007-1893-5382cac551da0c76754442b2aa2316fe.yaml +++ b/nuclei-templates/2007/CVE-2007-1893-5382cac551da0c76754442b2aa2316fe.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 2.1.3 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users with the contributor role to bypass intended access restrictions and invoke the publish_posts functionality, which can be used to "publish a previously saved post." reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-1893 metadata: shodan-query: 'vuln:CVE-2007-1893' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-1894-6f396d18ad1fbb1948ad9473860ec9d1.yaml b/nuclei-templates/2007/CVE-2007-1894-6f396d18ad1fbb1948ad9473860ec9d1.yaml index 82ac5fd245..be3a49403f 100644 --- a/nuclei-templates/2007/CVE-2007-1894-6f396d18ad1fbb1948ad9473860ec9d1.yaml +++ b/nuclei-templates/2007/CVE-2007-1894-6f396d18ad1fbb1948ad9473860ec9d1.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.1.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-includes/general-template.php in WordPress before 20070309 allows remote attackers to inject arbitrary web script or HTML via the year parameter in the wp_title function. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-1894 metadata: shodan-query: 'vuln:CVE-2007-1894' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-1897-be037ab5b01a52fa0b9478e50ded7b01.yaml b/nuclei-templates/2007/CVE-2007-1897-be037ab5b01a52fa0b9478e50ded7b01.yaml index cc75cbde1c..5443170ff1 100644 --- a/nuclei-templates/2007/CVE-2007-1897-be037ab5b01a52fa0b9478e50ded7b01.yaml +++ b/nuclei-templates/2007/CVE-2007-1897-be037ab5b01a52fa0b9478e50ded7b01.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 2.1.3 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in xmlrpc (xmlrpc.php) in WordPress 2.1.2, and probably earlier, allows remote authenticated users to execute arbitrary SQL commands via a string parameter value in an XML RPC mt.setPostCategories method call, related to the post_id variable. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-1897 metadata: shodan-query: 'vuln:CVE-2007-1897' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-2627-141c7f9cf7e30f994110491cc5e7c119.yaml b/nuclei-templates/2007/CVE-2007-2627-141c7f9cf7e30f994110491cc5e7c119.yaml index a926be47d8..2bf9feeda9 100644 --- a/nuclei-templates/2007/CVE-2007-2627-141c7f9cf7e30f994110491cc5e7c119.yaml +++ b/nuclei-templates/2007/CVE-2007-2627-141c7f9cf7e30f994110491cc5e7c119.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in sidebar.php in WordPress, when custom 404 pages that call get_sidebar are used, allows remote attackers to inject arbitrary web script or HTML via the query string (PHP_SELF), a different vulnerability than CVE-2007-1622. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-2627 metadata: shodan-query: 'vuln:CVE-2007-2627' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-2714-0b8de7e6634f1364f8cfc6fe68a06736.yaml b/nuclei-templates/2007/CVE-2007-2714-0b8de7e6634f1364f8cfc6fe68a06736.yaml index d632c253b9..6846d63df9 100644 --- a/nuclei-templates/2007/CVE-2007-2714-0b8de7e6634f1364f8cfc6fe68a06736.yaml +++ b/nuclei-templates/2007/CVE-2007-2714-0b8de7e6634f1364f8cfc6fe68a06736.yaml @@ -4,7 +4,7 @@ info: name: > Akismet Spam Protection < 2.0.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Akismet Spam Protection plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the _wp_http_referer’ parameter in versions before 2.0.2 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/akismet/" google-query: inurl:"/wp-content/plugins/akismet/" shodan-query: 'vuln:CVE-2007-2714' - tags: cve,wordpress,wp-plugin,akismet,medium + tags: cve,wordpress,wp-plugin,akismet,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-2828-e6b40723167a263b6dd92aa26e882342.yaml b/nuclei-templates/2007/CVE-2007-2828-e6b40723167a263b6dd92aa26e882342.yaml index ee167faa62..7ef1f9a09f 100644 --- a/nuclei-templates/2007/CVE-2007-2828-e6b40723167a263b6dd92aa26e882342.yaml +++ b/nuclei-templates/2007/CVE-2007-2828-e6b40723167a263b6dd92aa26e882342.yaml @@ -4,7 +4,7 @@ info: name: > AdSense-Deluxe <= 0.8 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in adsense-deluxe.php in the AdSense-Deluxe 0.x plugin for WordPress allows remote attackers to perform unspecified actions as arbitrary users via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/adsense-deluxe/" google-query: inurl:"/wp-content/plugins/adsense-deluxe/" shodan-query: 'vuln:CVE-2007-2828' - tags: cve,wordpress,wp-plugin,adsense-deluxe,high + tags: cve,wordpress,wp-plugin,adsense-deluxe,medium http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-3140-380df031c42ca1baae8054ba3ed4d998.yaml b/nuclei-templates/2007/CVE-2007-3140-380df031c42ca1baae8054ba3ed4d998.yaml index 82fdd56ddd..d7581b04d0 100644 --- a/nuclei-templates/2007/CVE-2007-3140-380df031c42ca1baae8054ba3ed4d998.yaml +++ b/nuclei-templates/2007/CVE-2007-3140-380df031c42ca1baae8054ba3ed4d998.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.2 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in xmlrpc.php in WordPress 2.2 allows remote authenticated users to execute arbitrary SQL commands via a parameter value in an XML RPC wp.suggestCategories methodCall, a different vector than CVE-2007-1897. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-3140 metadata: shodan-query: 'vuln:CVE-2007-3140' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-3239-2a9919a2db8ebb02104bc342de5cafa4.yaml b/nuclei-templates/2007/CVE-2007-3239-2a9919a2db8ebb02104bc342de5cafa4.yaml index a0708f5fb1..0f148176c7 100644 --- a/nuclei-templates/2007/CVE-2007-3239-2a9919a2db8ebb02104bc342de5cafa4.yaml +++ b/nuclei-templates/2007/CVE-2007-3239-2a9919a2db8ebb02104bc342de5cafa4.yaml @@ -4,7 +4,7 @@ info: name: > AndyBlue Theme < 1.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in searchform.php in the AndyBlue theme before 1.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the PHP_SELF portion of a URI to index.php. NOTE: this can be leveraged for PHP code execution in an administrative session. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/andyblue/" google-query: inurl:"/wp-content/themes/andyblue/" shodan-query: 'vuln:CVE-2007-3239' - tags: cve,wordpress,wp-theme,andyblue,medium + tags: cve,wordpress,wp-theme,andyblue,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-3240-8fb46ccbfe8eb892f418af64a9d461a7.yaml b/nuclei-templates/2007/CVE-2007-3240-8fb46ccbfe8eb892f418af64a9d461a7.yaml index ba397ebdf5..e4ebde30c2 100644 --- a/nuclei-templates/2007/CVE-2007-3240-8fb46ccbfe8eb892f418af64a9d461a7.yaml +++ b/nuclei-templates/2007/CVE-2007-3240-8fb46ccbfe8eb892f418af64a9d461a7.yaml @@ -4,7 +4,7 @@ info: name: > Vistered Little (Unspecified Version) - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Vistered Little theme for WordPress is vulnerable to Reflected Cross-Site Scripting via the the URI (REQUEST_URI) that accesses index.php in all known versions due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/Vistered-Little/" google-query: inurl:"/wp-content/themes/Vistered-Little/" shodan-query: 'vuln:CVE-2007-3240' - tags: cve,wordpress,wp-theme,Vistered-Little,medium + tags: cve,wordpress,wp-theme,Vistered-Little,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-3241-c96b02624922c50381a023e57cd89cf7.yaml b/nuclei-templates/2007/CVE-2007-3241-c96b02624922c50381a023e57cd89cf7.yaml index c9c59b3af9..bf5f09472c 100644 --- a/nuclei-templates/2007/CVE-2007-3241-c96b02624922c50381a023e57cd89cf7.yaml +++ b/nuclei-templates/2007/CVE-2007-3241-c96b02624922c50381a023e57cd89cf7.yaml @@ -4,7 +4,7 @@ info: name: > Cordobo Green Park (All Versions) - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in blogroll.php in the cordobo-green-park theme for WordPress allows remote attackers to inject arbitrary web script or HTML via the PHP_SELF portion of a URI. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/cordobo-green-park/" google-query: inurl:"/wp-content/themes/cordobo-green-park/" shodan-query: 'vuln:CVE-2007-3241' - tags: cve,wordpress,wp-theme,cordobo-green-park,medium + tags: cve,wordpress,wp-theme,cordobo-green-park,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-3543-23b280de753c54a779bef1b8400aad8b.yaml b/nuclei-templates/2007/CVE-2007-3543-23b280de753c54a779bef1b8400aad8b.yaml index d24b86a13d..d552b7927e 100644 --- a/nuclei-templates/2007/CVE-2007-3543-23b280de753c54a779bef1b8400aad8b.yaml +++ b/nuclei-templates/2007/CVE-2007-3543-23b280de753c54a779bef1b8400aad8b.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.2 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > Unrestricted file upload vulnerability in WordPress before 2.2.1 and WordPress MU before 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code by making a post that specifies a .php filename in the _wp_attached_file metadata field; and then sending this file's content, along with its post_ID value, to (1) wp-app.php or (2) app.php. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-3543 metadata: shodan-query: 'vuln:CVE-2007-3543' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-3544-b9356af48d41602f5f193ab6f4ff8815.yaml b/nuclei-templates/2007/CVE-2007-3544-b9356af48d41602f5f193ab6f4ff8815.yaml index 32496a2cfe..5f15084afb 100644 --- a/nuclei-templates/2007/CVE-2007-3544-b9356af48d41602f5f193ab6f4ff8815.yaml +++ b/nuclei-templates/2007/CVE-2007-3544-b9356af48d41602f5f193ab6f4ff8815.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.2.1 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > Unrestricted file upload vulnerability in (1) wp-app.php and (2) app.php in WordPress 2.2.1 and WordPress MU 1.2.3 allows remote authenticated users to upload and execute arbitrary PHP code via unspecified vectors, possibly related to the wp_postmeta table and the use of custom fields in normal (non-attachment) posts. NOTE: this issue reportedly exists because of an incomplete fix for CVE-2007-3543. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-3544 metadata: shodan-query: 'vuln:CVE-2007-3544' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET @@ -32,9 +32,9 @@ http: matchers: - type: dsl dsl: - - compare_versions(version_by_generator, '<= 1.2.3') - - compare_versions(version_by_js, '<= 1.2.3') - - compare_versions(version_by_css, '<= 1.2.3') + - compare_versions(version_by_generator, '<= 2.2.1') + - compare_versions(version_by_js, '<= 2.2.1') + - compare_versions(version_by_css, '<= 2.2.1') - type: status status: diff --git a/nuclei-templates/2007/CVE-2007-4014-54409f2bc5984d61c42ec97047d41adc.yaml b/nuclei-templates/2007/CVE-2007-4014-54409f2bc5984d61c42ec97047d41adc.yaml index 2d3e3c5ef3..013328f344 100644 --- a/nuclei-templates/2007/CVE-2007-4014-54409f2bc5984d61c42ec97047d41adc.yaml +++ b/nuclei-templates/2007/CVE-2007-4014-54409f2bc5984d61c42ec97047d41adc.yaml @@ -14,17 +14,17 @@ info: cvss-score: 6.1 cve-id: CVE-2007-4014 metadata: - fofa-query: "wp-content/themes/blixed/" - google-query: inurl:"/wp-content/themes/blixed/" + fofa-query: "wp-content/themes/blix/" + google-query: inurl:"/wp-content/themes/blix/" shodan-query: 'vuln:CVE-2007-4014' - tags: cve,wordpress,wp-theme,blixed,medium + tags: cve,wordpress,wp-theme,blix,medium http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/themes/blixed/style.css" + - "{{BaseURL}}/wp-content/themes/blix/style.css" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "blixed" + - "blix" part: body - type: dsl dsl: - - compare_versions(version, '<= 1.0') \ No newline at end of file + - compare_versions(version, '<= 0.9.1') \ No newline at end of file diff --git a/nuclei-templates/2007/CVE-2007-4139-bc3069fe10b3f1d27d4fca396970c629.yaml b/nuclei-templates/2007/CVE-2007-4139-bc3069fe10b3f1d27d4fca396970c629.yaml index 901e76f545..d6c3eefd02 100644 --- a/nuclei-templates/2007/CVE-2007-4139-bc3069fe10b3f1d27d4fca396970c629.yaml +++ b/nuclei-templates/2007/CVE-2007-4139-bc3069fe10b3f1d27d4fca396970c629.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.2.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Temporary Uploads editing functionality (wp-admin/includes/upload.php) in WordPress 2.2.1, allows remote attackers to inject arbitrary web script or HTML via the style parameter to wp-admin/upload.php. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-4139 metadata: shodan-query: 'vuln:CVE-2007-4139' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-4153-172cb25c60ec97a4292f9de3be08e5ed.yaml b/nuclei-templates/2007/CVE-2007-4153-172cb25c60ec97a4292f9de3be08e5ed.yaml index 2811bd5c0a..450c77f213 100644 --- a/nuclei-templates/2007/CVE-2007-4153-172cb25c60ec97a4292f9de3be08e5ed.yaml +++ b/nuclei-templates/2007/CVE-2007-4153-172cb25c60ec97a4292f9de3be08e5ed.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.2.1 - Authenticated (Admin+) Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Multiple cross-site scripting (XSS) vulnerabilities in WordPress 2.2.1 allow remote authenticated administrators to inject arbitrary web script or HTML via (1) the Options Database Table in the Admin Panel, accessed through options.php; or (2) the opml_url parameter to link-import.php. NOTE: this might not cross privilege boundaries in some configurations, since the Administrator role has the unfiltered_html capability. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-4153 metadata: shodan-query: 'vuln:CVE-2007-4153' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-4154-fb2282647c2ae8c5fc2f5ce43c10e3b4.yaml b/nuclei-templates/2007/CVE-2007-4154-fb2282647c2ae8c5fc2f5ce43c10e3b4.yaml index 1148430e63..8d58b69581 100644 --- a/nuclei-templates/2007/CVE-2007-4154-fb2282647c2ae8c5fc2f5ce43c10e3b4.yaml +++ b/nuclei-templates/2007/CVE-2007-4154-fb2282647c2ae8c5fc2f5ce43c10e3b4.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.2.1 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in options.php in WordPress 2.2.1 allows remote authenticated administrators to execute arbitrary SQL commands via the page_options parameter to (1) options-general.php, (2) options-writing.php, (3) options-reading.php, (4) options-discussion.php, (5) options-privacy.php, (6) options-permalink.php, (7) options-misc.php, and possibly other unspecified components. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-4154 metadata: shodan-query: 'vuln:CVE-2007-4154' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-4165-f021202130cf5324996d350595ae862c.yaml b/nuclei-templates/2007/CVE-2007-4165-f021202130cf5324996d350595ae862c.yaml index 4d0218c46b..47826cf42c 100644 --- a/nuclei-templates/2007/CVE-2007-4165-f021202130cf5324996d350595ae862c.yaml +++ b/nuclei-templates/2007/CVE-2007-4165-f021202130cf5324996d350595ae862c.yaml @@ -4,7 +4,7 @@ info: name: > Blue Memories <= 1.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in index.php in the Blue Memories theme 1.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter, possibly a related issue to CVE-2007-2757 and CVE-2007-4014. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/blue-memories/" google-query: inurl:"/wp-content/themes/blue-memories/" shodan-query: 'vuln:CVE-2007-4165' - tags: cve,wordpress,wp-theme,blue-memories,medium + tags: cve,wordpress,wp-theme,blue-memories,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-4166-babd8720f51cdfc03ee525219e51d67f.yaml b/nuclei-templates/2007/CVE-2007-4166-babd8720f51cdfc03ee525219e51d67f.yaml index ffb063fae9..d1587f564b 100644 --- a/nuclei-templates/2007/CVE-2007-4166-babd8720f51cdfc03ee525219e51d67f.yaml +++ b/nuclei-templates/2007/CVE-2007-4166-babd8720f51cdfc03ee525219e51d67f.yaml @@ -4,7 +4,7 @@ info: name: > Unnamed < 1.2.17.1 and Unnamed SE < 1.0.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in index.php in the Unnamed theme before 1.2.17.1, and Special Edition (SE) 1.02, before 20070804 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter, possibly a related issue to CVE-2007-2757, CVE-2007-4014, and CVE-2007-4165. NOTE: some of these details are obtained from third party information. reference: @@ -14,17 +14,17 @@ info: cvss-score: 6.1 cve-id: CVE-2007-4166 metadata: - fofa-query: "wp-content/themes/unnamed/" - google-query: inurl:"/wp-content/themes/unnamed/" + fofa-query: "wp-content/themes/unnamed-se/" + google-query: inurl:"/wp-content/themes/unnamed-se/" shodan-query: 'vuln:CVE-2007-4166' - tags: cve,wordpress,wp-theme,unnamed,medium + tags: cve,wordpress,wp-theme,unnamed-se,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/themes/unnamed/style.css" + - "{{BaseURL}}/wp-content/themes/unnamed-se/style.css" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "unnamed" + - "unnamed-se" part: body - type: dsl dsl: - - compare_versions(version, '<= 1.2.17') \ No newline at end of file + - compare_versions(version, '<= 1.0.2') \ No newline at end of file diff --git a/nuclei-templates/2007/CVE-2007-4480-b962a43c022ee33e3f132497b433375e.yaml b/nuclei-templates/2007/CVE-2007-4480-b962a43c022ee33e3f132497b433375e.yaml index 79a8129023..82567c6032 100644 --- a/nuclei-templates/2007/CVE-2007-4480-b962a43c022ee33e3f132497b433375e.yaml +++ b/nuclei-templates/2007/CVE-2007-4480-b962a43c022ee33e3f132497b433375e.yaml @@ -4,7 +4,7 @@ info: name: > Sirius <= 1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in index.php in the Sirius 1.0 theme for WordPress allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO (PHP_SELF). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/sirius/" google-query: inurl:"/wp-content/themes/sirius/" shodan-query: 'vuln:CVE-2007-4480' - tags: cve,wordpress,wp-theme,sirius,medium + tags: cve,wordpress,wp-theme,sirius,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-4481-c0b95532030c59fee6c1d3ae2a188201.yaml b/nuclei-templates/2007/CVE-2007-4481-c0b95532030c59fee6c1d3ae2a188201.yaml index 01ac98896c..caa6ab6342 100644 --- a/nuclei-templates/2007/CVE-2007-4481-c0b95532030c59fee6c1d3ae2a188201.yaml +++ b/nuclei-templates/2007/CVE-2007-4481-c0b95532030c59fee6c1d3ae2a188201.yaml @@ -4,7 +4,7 @@ info: name: > Blix 0.9.1 and Blix 0.9.1 Rus - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in index.php in the (1) Blix 0.9.1 and (2) Blix 0.9.1 Rus themes for WordPress allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO (PHP_SELF). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/blix/" google-query: inurl:"/wp-content/themes/blix/" shodan-query: 'vuln:CVE-2007-4481' - tags: cve,wordpress,wp-theme,blix,medium + tags: cve,wordpress,wp-theme,blix,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-4483-7cba36ac5159d909041a39ae02e640fa.yaml b/nuclei-templates/2007/CVE-2007-4483-7cba36ac5159d909041a39ae02e640fa.yaml index 6390591a5f..0f0e819878 100644 --- a/nuclei-templates/2007/CVE-2007-4483-7cba36ac5159d909041a39ae02e640fa.yaml +++ b/nuclei-templates/2007/CVE-2007-4483-7cba36ac5159d909041a39ae02e640fa.yaml @@ -4,7 +4,7 @@ info: name: > Classic <= 1.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in index.php in the WordPress Classic 1.5 theme in WordPress before 2.1.3 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO (PHP_SELF). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/classic/" google-query: inurl:"/wp-content/themes/classic/" shodan-query: 'vuln:CVE-2007-4483' - tags: cve,wordpress,wp-theme,classic,medium + tags: cve,wordpress,wp-theme,classic,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-4544-a4e5a5186ca39bcba5d872b9fb372cda.yaml b/nuclei-templates/2007/CVE-2007-4544-a4e5a5186ca39bcba5d872b9fb372cda.yaml index 64f86eba0b..1123b076e7 100644 --- a/nuclei-templates/2007/CVE-2007-4544-a4e5a5186ca39bcba5d872b9fb372cda.yaml +++ b/nuclei-templates/2007/CVE-2007-4544-a4e5a5186ca39bcba5d872b9fb372cda.yaml @@ -4,7 +4,7 @@ info: name: > WordPress MU <= 1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-newblog.php in WordPress multi-user (MU) 1.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the weblog_id parameter (Username field). reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-4544 metadata: shodan-query: 'vuln:CVE-2007-4544' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-4893-abd2276f34ac392ae9b6a69f93290abd.yaml b/nuclei-templates/2007/CVE-2007-4893-abd2276f34ac392ae9b6a69f93290abd.yaml index 5838ac5962..a0c3a9d961 100644 --- a/nuclei-templates/2007/CVE-2007-4893-abd2276f34ac392ae9b6a69f93290abd.yaml +++ b/nuclei-templates/2007/CVE-2007-4893-abd2276f34ac392ae9b6a69f93290abd.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.2.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > wp-admin/admin-functions.php in Wordpress before 2.2.3 and Wordpress multi-user (MU) before 1.2.5a does not properly verify the unfiltered_html privilege, which allows remote attackers to conduct cross-site scripting (XSS) attacks via modified data to (1) post.php or (2) page.php with a no_filter field. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-4893 metadata: shodan-query: 'vuln:CVE-2007-4893' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET @@ -32,9 +32,9 @@ http: matchers: - type: dsl dsl: - - compare_versions(version_by_generator, '< 1.2.5a') - - compare_versions(version_by_js, '< 1.2.5a') - - compare_versions(version_by_css, '< 1.2.5a') + - compare_versions(version_by_generator, '<= 2.2.2') + - compare_versions(version_by_js, '<= 2.2.2') + - compare_versions(version_by_css, '<= 2.2.2') - type: status status: diff --git a/nuclei-templates/2007/CVE-2007-4894-7a8b8fa3bcccffed98e8c5f115c5183e.yaml b/nuclei-templates/2007/CVE-2007-4894-7a8b8fa3bcccffed98e8c5f115c5183e.yaml index a7f968f93f..6e645e3c8a 100644 --- a/nuclei-templates/2007/CVE-2007-4894-7a8b8fa3bcccffed98e8c5f115c5183e.yaml +++ b/nuclei-templates/2007/CVE-2007-4894-7a8b8fa3bcccffed98e8c5f115c5183e.yaml @@ -32,9 +32,9 @@ http: matchers: - type: dsl dsl: - - compare_versions(version_by_generator, '< 1.2.5') - - compare_versions(version_by_js, '< 1.2.5') - - compare_versions(version_by_css, '< 1.2.5') + - compare_versions(version_by_generator, '< 2.2.3') + - compare_versions(version_by_js, '< 2.2.3') + - compare_versions(version_by_css, '< 2.2.3') - type: status status: diff --git a/nuclei-templates/2007/CVE-2007-5105-bea5bcb6ac9b66b08b05c172c3f9bc32.yaml b/nuclei-templates/2007/CVE-2007-5105-bea5bcb6ac9b66b08b05c172c3f9bc32.yaml index 02bd103431..06c393da77 100644 --- a/nuclei-templates/2007/CVE-2007-5105-bea5bcb6ac9b66b08b05c172c3f9bc32.yaml +++ b/nuclei-templates/2007/CVE-2007-5105-bea5bcb6ac9b66b08b05c172c3f9bc32.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 2.0.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-register.php in WordPress 2.0 and 2.0.1 allows remote attackers to inject arbitrary web script or HTML via the user_email parameter. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-5105 metadata: shodan-query: 'vuln:CVE-2007-5105' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-5106-6d56121149ca7bd6af4818d9b53bdc87.yaml b/nuclei-templates/2007/CVE-2007-5106-6d56121149ca7bd6af4818d9b53bdc87.yaml index e083a23b72..59c63e2b67 100644 --- a/nuclei-templates/2007/CVE-2007-5106-6d56121149ca7bd6af4818d9b53bdc87.yaml +++ b/nuclei-templates/2007/CVE-2007-5106-6d56121149ca7bd6af4818d9b53bdc87.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 2.0.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-register.php in WordPress 2.0 allows remote attackers to inject arbitrary web script or HTML via the user_login parameter. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-5106 metadata: shodan-query: 'vuln:CVE-2007-5106' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-5229-95305525d7820973fed879d8dfc49664.yaml b/nuclei-templates/2007/CVE-2007-5229-95305525d7820973fed879d8dfc49664.yaml index d161d701a0..abf02ce399 100644 --- a/nuclei-templates/2007/CVE-2007-5229-95305525d7820973fed879d8dfc49664.yaml +++ b/nuclei-templates/2007/CVE-2007-5229-95305525d7820973fed879d8dfc49664.yaml @@ -4,7 +4,7 @@ info: name: > FeedBurner FeedSmith <= 2.2 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the FeedBurner FeedSmith 2.2 plugin for WordPress allows remote attackers to change settings and hijack blog feeds via a request to wp-admin/options-general.php that submits parameter values to FeedBurner_FeedSmith_Plugin.php, as demonstrated by the (1) feedburner_url and (2) feedburner_comments_url parameters. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/feedburner-feedsmith/" google-query: inurl:"/wp-content/plugins/feedburner-feedsmith/" shodan-query: 'vuln:CVE-2007-5229' - tags: cve,wordpress,wp-plugin,feedburner-feedsmith,high + tags: cve,wordpress,wp-plugin,feedburner-feedsmith,medium http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-5710-ed09f8fa2b1f0c2f3b1b1ea2ddd6cf57.yaml b/nuclei-templates/2007/CVE-2007-5710-ed09f8fa2b1f0c2f3b1b1ea2ddd6cf57.yaml index 40969adff1..e39c990e25 100644 --- a/nuclei-templates/2007/CVE-2007-5710-ed09f8fa2b1f0c2f3b1b1ea2ddd6cf57.yaml +++ b/nuclei-templates/2007/CVE-2007-5710-ed09f8fa2b1f0c2f3b1b1ea2ddd6cf57.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-admin/edit-post-rows.php in WordPress 2.3 allows remote attackers to inject arbitrary web script or HTML via the posts_columns array parameter. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-5710 metadata: shodan-query: 'vuln:CVE-2007-5710' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-6013-19e5f7c5a5cf8056d79bfab611f4ed1f.yaml b/nuclei-templates/2007/CVE-2007-6013-19e5f7c5a5cf8056d79bfab611f4ed1f.yaml index 908ab1dbc8..cc0e7fde71 100644 --- a/nuclei-templates/2007/CVE-2007-6013-19e5f7c5a5cf8056d79bfab611f4ed1f.yaml +++ b/nuclei-templates/2007/CVE-2007-6013-19e5f7c5a5cf8056d79bfab611f4ed1f.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core 1.5 - 2.3.1 - Authorization Bypass author: topscoder - severity: critical + severity: high description: > Wordpress 1.5 through 2.3.1 uses cookie values based on the MD5 hash of a password MD5 hash, which allows attackers to bypass authentication by obtaining the MD5 hash from the user database, then generating the authentication cookie from that hash. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2007-6013 metadata: shodan-query: 'vuln:CVE-2007-6013' - tags: cve,wordpress,wp-core,critical + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2007/CVE-2007-6677-a3e785056d2140e268a5211287db4a52.yaml b/nuclei-templates/2007/CVE-2007-6677-a3e785056d2140e268a5211287db4a52.yaml index bbbed10fea..75246f27ff 100644 --- a/nuclei-templates/2007/CVE-2007-6677-a3e785056d2140e268a5211287db4a52.yaml +++ b/nuclei-templates/2007/CVE-2007-6677-a3e785056d2140e268a5211287db4a52.yaml @@ -4,7 +4,7 @@ info: name: > Peter’s Random Anti-Spam Image <= 1.0.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in Peter's Random Anti-Spam Image 1.0.6 and earlier plugin for WordPress allows remote attackers to inject arbitrary web script or HTML via the comment field in the comment form. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/peters-random-anti-spam-image/" google-query: inurl:"/wp-content/plugins/peters-random-anti-spam-image/" shodan-query: 'vuln:CVE-2007-6677' - tags: cve,wordpress,wp-plugin,peters-random-anti-spam-image,medium + tags: cve,wordpress,wp-plugin,peters-random-anti-spam-image,high http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-0197-03e041af34914994b5b4b3e20ec8ee2e.yaml b/nuclei-templates/2008/CVE-2008-0197-03e041af34914994b5b4b3e20ec8ee2e.yaml index 4117c54494..6b9c5bbbd1 100644 --- a/nuclei-templates/2008/CVE-2008-0197-03e041af34914994b5b4b3e20ec8ee2e.yaml +++ b/nuclei-templates/2008/CVE-2008-0197-03e041af34914994b5b4b3e20ec8ee2e.yaml @@ -4,7 +4,7 @@ info: name: > WP-ContactForm <= 1.5 - Authenticated (Admin+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The WP-ContactForm plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the (1) wpcf_email, (2) wpcf_subject, (3) wpcf_question, (4) wpcf_answer, (5) wpcf_success_msg, (6) wpcf_error_msg, and (7) wpcf_msg parameters or the SRC attribute of an IFRAME element in versions up to, and including, 1.5 alpha due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative capabilities to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-contactform/" google-query: inurl:"/wp-content/plugins/wp-contactform/" shodan-query: 'vuln:CVE-2008-0197' - tags: cve,wordpress,wp-plugin,wp-contactform,medium + tags: cve,wordpress,wp-plugin,wp-contactform,low http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-0198-fbe96c78719e34780f9334cd4775f2cc.yaml b/nuclei-templates/2008/CVE-2008-0198-fbe96c78719e34780f9334cd4775f2cc.yaml index ed0ed17a5a..a36fbf7416 100644 --- a/nuclei-templates/2008/CVE-2008-0198-fbe96c78719e34780f9334cd4775f2cc.yaml +++ b/nuclei-templates/2008/CVE-2008-0198-fbe96c78719e34780f9334cd4775f2cc.yaml @@ -4,7 +4,7 @@ info: name: > WP-ContactForm <= 1.5.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in wp-contact-form/options-contactform.php in the WP-ContactForm 1.5 alpha and earlier plugin for WordPress allow remote attackers to perform actions as administrators via the (1) wpcf_question, (2) wpcf_success_msg, or (3) wpcf_error_msg parameter to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-contactform/" google-query: inurl:"/wp-content/plugins/wp-contactform/" shodan-query: 'vuln:CVE-2008-0198' - tags: cve,wordpress,wp-plugin,wp-contactform,high + tags: cve,wordpress,wp-plugin,wp-contactform,medium http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-0205-3f5c9085cc5ea3fa80320bca3cc4e85b.yaml b/nuclei-templates/2008/CVE-2008-0205-3f5c9085cc5ea3fa80320bca3cc4e85b.yaml index e323a2ac09..6550a4d56f 100644 --- a/nuclei-templates/2008/CVE-2008-0205-3f5c9085cc5ea3fa80320bca3cc4e85b.yaml +++ b/nuclei-templates/2008/CVE-2008-0205-3f5c9085cc5ea3fa80320bca3cc4e85b.yaml @@ -4,7 +4,7 @@ info: name: > Math Comment Spam Protection <= 2.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in math-comment-spam-protection.php in the Math Comment Spam Protection 2.1 and earlier plugin for WordPress allow remote attackers to perform actions as administrators via the (1) mcsp_opt_msg_no_answer or (2) mcsp_opt_msg_wrong_answer parameter to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/math-comment-spam-protection/" google-query: inurl:"/wp-content/plugins/math-comment-spam-protection/" shodan-query: 'vuln:CVE-2008-0205' - tags: cve,wordpress,wp-plugin,math-comment-spam-protection,high + tags: cve,wordpress,wp-plugin,math-comment-spam-protection,medium http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-0616-81cd7c7b4d1173a363d79c9374f22f96.yaml b/nuclei-templates/2008/CVE-2008-0616-81cd7c7b4d1173a363d79c9374f22f96.yaml index 4002884533..b22f34469d 100644 --- a/nuclei-templates/2008/CVE-2008-0616-81cd7c7b4d1173a363d79c9374f22f96.yaml +++ b/nuclei-templates/2008/CVE-2008-0616-81cd7c7b4d1173a363d79c9374f22f96.yaml @@ -4,7 +4,7 @@ info: name: > DMSGuestbook <= 1.7.0 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in the administration panel in the DMSGuestbook 1.7.0 plugin for WordPress allows remote authenticated administrators to execute arbitrary SQL commands via unspecified vectors. NOTE: it is not clear whether this issue crosses privilege boundaries. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/dmsguestbook/" google-query: inurl:"/wp-content/plugins/dmsguestbook/" shodan-query: 'vuln:CVE-2008-0616' - tags: cve,wordpress,wp-plugin,dmsguestbook,high + tags: cve,wordpress,wp-plugin,dmsguestbook,critical http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-0617-0720f12ed328d9f8394eeb8c7b25a318.yaml b/nuclei-templates/2008/CVE-2008-0617-0720f12ed328d9f8394eeb8c7b25a318.yaml index 4253c4084d..e65d56904a 100644 --- a/nuclei-templates/2008/CVE-2008-0617-0720f12ed328d9f8394eeb8c7b25a318.yaml +++ b/nuclei-templates/2008/CVE-2008-0617-0720f12ed328d9f8394eeb8c7b25a318.yaml @@ -4,7 +4,7 @@ info: name: > DMSGuestbook < 1.9.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the DMSGuestbook 1.7.0 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) file parameter to wp-admin/admin.php, or the (2) messagefield parameter in the guestbook page, and the (3) title parameter in the messagearea. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/dmsguestbook/" google-query: inurl:"/wp-content/plugins/dmsguestbook/" shodan-query: 'vuln:CVE-2008-0617' - tags: cve,wordpress,wp-plugin,dmsguestbook,medium + tags: cve,wordpress,wp-plugin,dmsguestbook,high http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-0618-464fda924b91446d67088565fa366b6b.yaml b/nuclei-templates/2008/CVE-2008-0618-464fda924b91446d67088565fa366b6b.yaml index b1291b78cb..24981ba2d6 100644 --- a/nuclei-templates/2008/CVE-2008-0618-464fda924b91446d67088565fa366b6b.yaml +++ b/nuclei-templates/2008/CVE-2008-0618-464fda924b91446d67088565fa366b6b.yaml @@ -4,7 +4,7 @@ info: name: > DMSGuestbook < 1.9.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the DMSGuestbook 1.8.0 and 1.7.0 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) gbname, (2) gbemail, (3) gburl, and (4) gbmsg parameters to unspecified programs. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/dmsguestbook/" google-query: inurl:"/wp-content/plugins/dmsguestbook/" shodan-query: 'vuln:CVE-2008-0618' - tags: cve,wordpress,wp-plugin,dmsguestbook,medium + tags: cve,wordpress,wp-plugin,dmsguestbook,high http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-0691-a8ccc8e656f57b6f03393d18f5ac6d44.yaml b/nuclei-templates/2008/CVE-2008-0691-a8ccc8e656f57b6f03393d18f5ac6d44.yaml index ca63e8e98b..14d0ad45a3 100644 --- a/nuclei-templates/2008/CVE-2008-0691-a8ccc8e656f57b6f03393d18f5ac6d44.yaml +++ b/nuclei-templates/2008/CVE-2008-0691-a8ccc8e656f57b6f03393d18f5ac6d44.yaml @@ -4,7 +4,7 @@ info: name: > WP-Footnotes <= 2.2 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in admin_panel.php in the Simon Elvery WP-Footnotes 2.2 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) wp_footnotes_current_settings[priority], (2) wp_footnotes_current_settings[style_rules], (3) wp_footnotes_current_settings[pre_footnotes], and (4) wp_footnotes_current_settings[post_footnotes] parameters. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-footnotes/" google-query: inurl:"/wp-content/plugins/wp-footnotes/" shodan-query: 'vuln:CVE-2008-0691' - tags: cve,wordpress,wp-plugin,wp-footnotes,medium + tags: cve,wordpress,wp-plugin,wp-footnotes,high http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-0837-6786949bf947df30c87362646165e5b3.yaml b/nuclei-templates/2008/CVE-2008-0837-6786949bf947df30c87362646165e5b3.yaml index 6b6df11713..c6bf97171e 100644 --- a/nuclei-templates/2008/CVE-2008-0837-6786949bf947df30c87362646165e5b3.yaml +++ b/nuclei-templates/2008/CVE-2008-0837-6786949bf947df30c87362646165e5b3.yaml @@ -4,7 +4,7 @@ info: name: > Search Unleashed <= 0.2.10 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the log feature in the John Godley Search Unleashed 0.2.10 plugin for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter, which is not properly handled when the administrator views the log file. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/search-unleashed/" google-query: inurl:"/wp-content/plugins/search-unleashed/" shodan-query: 'vuln:CVE-2008-0837' - tags: cve,wordpress,wp-plugin,search-unleashed,medium + tags: cve,wordpress,wp-plugin,search-unleashed,high http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-1061-4db82812dea0cad0cb375ee4495ca7c3.yaml b/nuclei-templates/2008/CVE-2008-1061-4db82812dea0cad0cb375ee4495ca7c3.yaml index 036a281e68..968261e96c 100644 --- a/nuclei-templates/2008/CVE-2008-1061-4db82812dea0cad0cb375ee4495ca7c3.yaml +++ b/nuclei-templates/2008/CVE-2008-1061-4db82812dea0cad0cb375ee4495ca7c3.yaml @@ -4,7 +4,7 @@ info: name: > Sniplets < 1.2.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Sniplets 1.1.2 and 1.2.2 plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) text parameter to (a) warning.php, (b) notice.php, and (c) inset.php in view/sniplets/, and possibly (d) modules/execute.php; the (2) url parameter to (e) view/admin/submenu.php; and the (3) page parameter to (f) view/admin/pager.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sniplets/" google-query: inurl:"/wp-content/plugins/sniplets/" shodan-query: 'vuln:CVE-2008-1061' - tags: cve,wordpress,wp-plugin,sniplets,medium + tags: cve,wordpress,wp-plugin,sniplets,high http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-1304-46747c4e682ceeb0ba7de6d44fbb5912.yaml b/nuclei-templates/2008/CVE-2008-1304-46747c4e682ceeb0ba7de6d44fbb5912.yaml index 2795468950..ca2e4960d7 100644 --- a/nuclei-templates/2008/CVE-2008-1304-46747c4e682ceeb0ba7de6d44fbb5912.yaml +++ b/nuclei-templates/2008/CVE-2008-1304-46747c4e682ceeb0ba7de6d44fbb5912.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.3.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in WordPress 2.3.2 allow remote attackers to inject arbitrary web script or HTML via the (1) inviteemail parameter in an invite action to wp-admin/users.php and the (2) to parameter in a sent action to wp-admin/invites.php. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2008-1304 metadata: shodan-query: 'vuln:CVE-2008-1304' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-1930-7ec18e3e7ba86c077b691dda2c9af2f0.yaml b/nuclei-templates/2008/CVE-2008-1930-7ec18e3e7ba86c077b691dda2c9af2f0.yaml index 85ea9a4810..0d5d9832d5 100644 --- a/nuclei-templates/2008/CVE-2008-1930-7ec18e3e7ba86c077b691dda2c9af2f0.yaml +++ b/nuclei-templates/2008/CVE-2008-1930-7ec18e3e7ba86c077b691dda2c9af2f0.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 2.5.1 - Authentication Bypass author: topscoder - severity: high + severity: critical description: > The cookie authentication method in WordPress 2.5 relies on a hash of a concatenated string containing USERNAME and EXPIRY_TIME, which allows remote attackers to forge cookies by registering a username that results in the same concatenated string, as demonstrated by registering usernames beginning with "admin" to obtain administrator privileges, aka a "cryptographic splicing" issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2007-6013. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2008-1930 metadata: shodan-query: 'vuln:CVE-2008-1930' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-2068-9a47bc7022503d111499b3cff929ca66.yaml b/nuclei-templates/2008/CVE-2008-2068-9a47bc7022503d111499b3cff929ca66.yaml index 1f543f9dd6..2919440413 100644 --- a/nuclei-templates/2008/CVE-2008-2068-9a47bc7022503d111499b3cff929ca66.yaml +++ b/nuclei-templates/2008/CVE-2008-2068-9a47bc7022503d111499b3cff929ca66.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in WordPress 2.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2008-2068 metadata: shodan-query: 'vuln:CVE-2008-2068' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-2392-f091fee54b5af87e393409f73df7398b.yaml b/nuclei-templates/2008/CVE-2008-2392-f091fee54b5af87e393409f73df7398b.yaml index eb6429265a..a52018b806 100644 --- a/nuclei-templates/2008/CVE-2008-2392-f091fee54b5af87e393409f73df7398b.yaml +++ b/nuclei-templates/2008/CVE-2008-2392-f091fee54b5af87e393409f73df7398b.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.5.1 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > Unrestricted file upload vulnerability in WordPress 2.5.1 and earlier might allow remote authenticated administrators to upload and execute arbitrary PHP files via the Upload section in the Write Tabs area of the dashboard. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2008-2392 metadata: shodan-query: 'vuln:CVE-2008-2392' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-4671-2556d7722d4548d9067588a035ce357f.yaml b/nuclei-templates/2008/CVE-2008-4671-2556d7722d4548d9067588a035ce357f.yaml index 634f217a23..99dae667cf 100644 --- a/nuclei-templates/2008/CVE-2008-4671-2556d7722d4548d9067588a035ce357f.yaml +++ b/nuclei-templates/2008/CVE-2008-4671-2556d7722d4548d9067588a035ce357f.yaml @@ -4,7 +4,7 @@ info: name: > WordPress MU < 2.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-admin/wp-blogs.php in Wordpress MU (WPMU) before 2.6 allows remote attackers to inject arbitrary web script or HTML via the (1) s and (2) ip_address parameters. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2008-4671 metadata: shodan-query: 'vuln:CVE-2008-4671' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-4733-574c183518fa14bb1a854e4b68f72a19.yaml b/nuclei-templates/2008/CVE-2008-4733-574c183518fa14bb1a854e4b68f72a19.yaml index 30fe9e2aaf..5b762238b0 100644 --- a/nuclei-templates/2008/CVE-2008-4733-574c183518fa14bb1a854e4b68f72a19.yaml +++ b/nuclei-templates/2008/CVE-2008-4733-574c183518fa14bb1a854e4b68f72a19.yaml @@ -4,7 +4,7 @@ info: name: > WP Comment Remix <= 1.4.3 - SQL Injection author: topscoder - severity: high + severity: critical description: > Cross-site scripting (XSS) vulnerability in wpcommentremix.php in WP Comment Remix plugin before 1.4.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the (1) replytotext, (2) quotetext, (3) originallypostedby, (4) sep, (5) maxtags, (6) tagsep, (7) tagheadersep, (8) taglabel, and (9) tagheaderlabel parameters. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-comment-remix/" google-query: inurl:"/wp-content/plugins/wp-comment-remix/" shodan-query: 'vuln:CVE-2008-4733' - tags: cve,wordpress,wp-plugin,wp-comment-remix,high + tags: cve,wordpress,wp-plugin,wp-comment-remix,critical http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-4734-5defb55cded48a565a064567cc9f2fde.yaml b/nuclei-templates/2008/CVE-2008-4734-5defb55cded48a565a064567cc9f2fde.yaml index 7b96ec341a..95477be220 100644 --- a/nuclei-templates/2008/CVE-2008-4734-5defb55cded48a565a064567cc9f2fde.yaml +++ b/nuclei-templates/2008/CVE-2008-4734-5defb55cded48a565a064567cc9f2fde.yaml @@ -4,7 +4,7 @@ info: name: > WP Comment Remix < 1.4.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the wpcr_do_options_page function in WP Comment Remix plugin before 1.4.4 for WordPress allows remote attackers to perform unauthorized actions as administrators via a request that sets the wpcr_hidden_form_input parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-comment-remix/" google-query: inurl:"/wp-content/plugins/wp-comment-remix/" shodan-query: 'vuln:CVE-2008-4734' - tags: cve,wordpress,wp-plugin,wp-comment-remix,high + tags: cve,wordpress,wp-plugin,wp-comment-remix,medium http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-5695-066a3076f693bdf1acf756f1b6327c5f.yaml b/nuclei-templates/2008/CVE-2008-5695-066a3076f693bdf1acf756f1b6327c5f.yaml index cdb88a6578..798d98ec9e 100644 --- a/nuclei-templates/2008/CVE-2008-5695-066a3076f693bdf1acf756f1b6327c5f.yaml +++ b/nuclei-templates/2008/CVE-2008-5695-066a3076f693bdf1acf756f1b6327c5f.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 2.3.3 & WordPress MU < 1.3.2 - Remote Code Execution author: topscoder - severity: high + severity: critical description: > wp-admin/options.php in WordPress MU before 1.3.2, and WordPress 2.3.2 and earlier, does not properly validate requests to update an option, which allows remote authenticated users with manage_options and upload_files capabilities to execute arbitrary code by uploading a PHP script and adding this script's pathname to active_plugins. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2008-5695 metadata: shodan-query: 'vuln:CVE-2008-5695' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET @@ -32,9 +32,9 @@ http: matchers: - type: dsl dsl: - - compare_versions(version_by_generator, '<= 1.3.1') - - compare_versions(version_by_js, '<= 1.3.1') - - compare_versions(version_by_css, '<= 1.3.1') + - compare_versions(version_by_generator, '<= 2.3.2') + - compare_versions(version_by_js, '<= 2.3.2') + - compare_versions(version_by_css, '<= 2.3.2') - type: status status: diff --git a/nuclei-templates/2008/CVE-2008-7175-58ddfbc8f08958c578758b38baef9c64.yaml b/nuclei-templates/2008/CVE-2008-7175-58ddfbc8f08958c578758b38baef9c64.yaml index 73f75c0020..17b8824bbd 100644 --- a/nuclei-templates/2008/CVE-2008-7175-58ddfbc8f08958c578758b38baef9c64.yaml +++ b/nuclei-templates/2008/CVE-2008-7175-58ddfbc8f08958c578758b38baef9c64.yaml @@ -4,7 +4,7 @@ info: name: > NextGEN Gallery Plugin <= 0.96 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-admin/admin.php in NextGEN Gallery 0.96 and earlier plugin for Wordpress allows remote attackers to inject arbitrary web script or HTML via the picture description field in a page edit action. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/UNKNOWN-CVE-2013-0291-DELETEME/" google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2013-0291-DELETEME/" shodan-query: 'vuln:CVE-2008-7175' - tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2013-0291-DELETEME,medium + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2013-0291-DELETEME,high http: - method: GET diff --git a/nuclei-templates/2008/CVE-2008-7321-57636a2970a5968684b69eba7f56b3ea.yaml b/nuclei-templates/2008/CVE-2008-7321-57636a2970a5968684b69eba7f56b3ea.yaml index 8663852f47..e4666ab51d 100644 --- a/nuclei-templates/2008/CVE-2008-7321-57636a2970a5968684b69eba7f56b3ea.yaml +++ b/nuclei-templates/2008/CVE-2008-7321-57636a2970a5968684b69eba7f56b3ea.yaml @@ -4,7 +4,7 @@ info: name: > TubePress < 1.6.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The TubePress plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to 1.6.5 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/tubepress/" google-query: inurl:"/wp-content/plugins/tubepress/" shodan-query: 'vuln:CVE-2008-7321' - tags: cve,wordpress,wp-plugin,tubepress,medium + tags: cve,wordpress,wp-plugin,tubepress,high http: - method: GET diff --git a/nuclei-templates/2009/CVE-2009-1030-6639b89672c29c6f168a2b79f92361c6.yaml b/nuclei-templates/2009/CVE-2009-1030-6639b89672c29c6f168a2b79f92361c6.yaml index 8410e0a7db..dfbee3eaa5 100644 --- a/nuclei-templates/2009/CVE-2009-1030-6639b89672c29c6f168a2b79f92361c6.yaml +++ b/nuclei-templates/2009/CVE-2009-1030-6639b89672c29c6f168a2b79f92361c6.yaml @@ -4,7 +4,7 @@ info: name: > WordPress MU < 2.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the choose_primary_blog function in wp-includes/wpmu-functions.php in WordPress MU (WPMU) before 2.7 allows remote attackers to inject arbitrary web script or HTML via the HTTP Host header. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2009-1030 metadata: shodan-query: 'vuln:CVE-2009-1030' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2009/CVE-2009-3890-89ecd9115fcfef013346488bc602d8a5.yaml b/nuclei-templates/2009/CVE-2009-3890-89ecd9115fcfef013346488bc602d8a5.yaml index 9f8e6b0d35..8d96352423 100644 --- a/nuclei-templates/2009/CVE-2009-3890-89ecd9115fcfef013346488bc602d8a5.yaml +++ b/nuclei-templates/2009/CVE-2009-3890-89ecd9115fcfef013346488bc602d8a5.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.8.5 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > Unrestricted file upload vulnerability in the wp_check_filetype function in wp-includes/functions.php in WordPress before 2.8.6, when a certain configuration of the mod_mime module in the Apache HTTP Server is enabled, allows remote authenticated users to execute arbitrary code by posting an attachment with a multiple-extension filename, and then accessing this attachment via a direct request to a wp-content/uploads/ pathname, as demonstrated by a .php.jpg filename. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2009-3890 metadata: shodan-query: 'vuln:CVE-2009-3890' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2009/CVE-2009-3891-e8698e8d301690dded028c942c072a23.yaml b/nuclei-templates/2009/CVE-2009-3891-e8698e8d301690dded028c942c072a23.yaml index f4287662ea..5a76de69a0 100644 --- a/nuclei-templates/2009/CVE-2009-3891-e8698e8d301690dded028c942c072a23.yaml +++ b/nuclei-templates/2009/CVE-2009-3891-e8698e8d301690dded028c942c072a23.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 2.8.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-admin/press-this.php in WordPress before 2.8.6 allows remote authenticated users to inject arbitrary web script or HTML via the s parameter (aka the selection variable). reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2009-3891 metadata: shodan-query: 'vuln:CVE-2009-3891' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2009/CVE-2009-4140-4e90b64e5c0880980f44418deca3c91b.yaml b/nuclei-templates/2009/CVE-2009-4140-4e90b64e5c0880980f44418deca3c91b.yaml index a979bb940e..816d301dff 100644 --- a/nuclei-templates/2009/CVE-2009-4140-4e90b64e5c0880980f44418deca3c91b.yaml +++ b/nuclei-templates/2009/CVE-2009-4140-4e90b64e5c0880980f44418deca3c91b.yaml @@ -4,7 +4,7 @@ info: name: > Various Affected Software (Various Versions) - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > Unrestricted file upload vulnerability in ofc_upload_image.php in Open Flash Chart v2 Beta 1 through v2 Lug Wyrm Charmer, as used in Piwik 0.2.35 through 0.4.3, Woopra Analytics Plugin before 1.4.3.2, and possibly other products, when register_globals is enabled, allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension through the name parameter with the code in the HTTP_RAW_POST_DATA parameter, then accessing it via a direct request to the file in tmp-upload-images/. reference: @@ -14,17 +14,17 @@ info: cvss-score: 8.8 cve-id: CVE-2009-4140 metadata: - fofa-query: "wp-content/plugins/piwik-pro/" - google-query: inurl:"/wp-content/plugins/piwik-pro/" + fofa-query: "wp-content/plugins/woopra/" + google-query: inurl:"/wp-content/plugins/woopra/" shodan-query: 'vuln:CVE-2009-4140' - tags: cve,wordpress,wp-plugin,piwik-pro,high + tags: cve,wordpress,wp-plugin,woopra,critical http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/piwik-pro/readme.txt" + - "{{BaseURL}}/wp-content/plugins/woopra/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "piwik-pro" + - "woopra" part: body - type: dsl dsl: - - compare_versions(version, '>= 0.2.35', '<= 0.4.3') \ No newline at end of file + - compare_versions(version, '<= 1.4.3.1') \ No newline at end of file diff --git a/nuclei-templates/2009/CVE-2009-4168-ac62ca2ddae58ee9be23fe2a4d7fe3df.yaml b/nuclei-templates/2009/CVE-2009-4168-ac62ca2ddae58ee9be23fe2a4d7fe3df.yaml index 4322181746..55727ad021 100644 --- a/nuclei-templates/2009/CVE-2009-4168-ac62ca2ddae58ee9be23fe2a4d7fe3df.yaml +++ b/nuclei-templates/2009/CVE-2009-4168-ac62ca2ddae58ee9be23fe2a4d7fe3df.yaml @@ -4,7 +4,7 @@ info: name: > WP-Cumulus <= 1.22 - Cross-Site Scripting via tagcloud author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in Roy Tanck tagcloud.swf, as used in the WP-Cumulus plugin before 1.23 for WordPress and the Joomulus module 2.0 and earlier for Joomla!, allows remote attackers to inject arbitrary web script or HTML via the tagcloud parameter in a tags action. Cross-site scripting (XSS) vulnerability in tagcloud.swf in the WP-Cumulus Plug-in before 1.23 for WordPress allows remote attackers to inject arbitrary web script or HTML via the tagcloud parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-cumulus/" google-query: inurl:"/wp-content/plugins/wp-cumulus/" shodan-query: 'vuln:CVE-2009-4168' - tags: cve,wordpress,wp-plugin,wp-cumulus,medium + tags: cve,wordpress,wp-plugin,wp-cumulus,high http: - method: GET diff --git a/nuclei-templates/2009/CVE-2009-4748-64ec2a96ce824196b74660ea295fa52d.yaml b/nuclei-templates/2009/CVE-2009-4748-64ec2a96ce824196b74660ea295fa52d.yaml index a7d6896da7..6ce5c056b7 100644 --- a/nuclei-templates/2009/CVE-2009-4748-64ec2a96ce824196b74660ea295fa52d.yaml +++ b/nuclei-templates/2009/CVE-2009-4748-64ec2a96ce824196b74660ea295fa52d.yaml @@ -4,7 +4,7 @@ info: name: > my-category-order <= 2.8.7 - SQL Injection author: topscoder - severity: medium + severity: critical description: > SQL injection vulnerability in mycategoryorder.php in the My Category Order plugin 2.8.7 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the parentID parameter in an act_OrderCategories action to wp-admin/post-new.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/my-category-order/" google-query: inurl:"/wp-content/plugins/my-category-order/" shodan-query: 'vuln:CVE-2009-4748' - tags: cve,wordpress,wp-plugin,my-category-order,medium + tags: cve,wordpress,wp-plugin,my-category-order,critical http: - method: GET diff --git a/nuclei-templates/2009/CVE-2009-5158-0d1a8a5f1814698e05f7c343a752da34.yaml b/nuclei-templates/2009/CVE-2009-5158-0d1a8a5f1814698e05f7c343a752da34.yaml index d26ec9a77f..e2f3de9ce3 100644 --- a/nuclei-templates/2009/CVE-2009-5158-0d1a8a5f1814698e05f7c343a752da34.yaml +++ b/nuclei-templates/2009/CVE-2009-5158-0d1a8a5f1814698e05f7c343a752da34.yaml @@ -4,7 +4,7 @@ info: name: > Google Analyticator <= 5.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The google-analyticator plugin before 5.2.1 for WordPress has insufficient HTML sanitization for Google Analytics API text. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/google-analyticator/" google-query: inurl:"/wp-content/plugins/google-analyticator/" shodan-query: 'vuln:CVE-2009-5158' - tags: cve,wordpress,wp-plugin,google-analyticator,medium + tags: cve,wordpress,wp-plugin,google-analyticator,high http: - method: GET diff --git a/nuclei-templates/2010/CVE-2010-0682-38ee495a4defefe501f09623f3dfcb68.yaml b/nuclei-templates/2010/CVE-2010-0682-38ee495a4defefe501f09623f3dfcb68.yaml index fa2dec207c..c50c511b78 100644 --- a/nuclei-templates/2010/CVE-2010-0682-38ee495a4defefe501f09623f3dfcb68.yaml +++ b/nuclei-templates/2010/CVE-2010-0682-38ee495a4defefe501f09623f3dfcb68.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 2.9.2 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > WordPress 2.9 before 2.9.2 allows remote authenticated users to read trash posts from other authors via a direct request with a modified p parameter. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2010-0682 metadata: shodan-query: 'vuln:CVE-2010-0682' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2010/CVE-2010-1186-0852d9b8897d185217e138aaac4e2439.yaml b/nuclei-templates/2010/CVE-2010-1186-0852d9b8897d185217e138aaac4e2439.yaml index f46f5d1471..be90418d4a 100644 --- a/nuclei-templates/2010/CVE-2010-1186-0852d9b8897d185217e138aaac4e2439.yaml +++ b/nuclei-templates/2010/CVE-2010-1186-0852d9b8897d185217e138aaac4e2439.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Gallery Plugin – NextGEN Gallery <= 1.5.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in xml/media-rss.php in the NextGEN Gallery plugin before 1.5.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the mode parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nextgen-gallery/" google-query: inurl:"/wp-content/plugins/nextgen-gallery/" shodan-query: 'vuln:CVE-2010-1186' - tags: cve,wordpress,wp-plugin,nextgen-gallery,medium + tags: cve,wordpress,wp-plugin,nextgen-gallery,high http: - method: GET diff --git a/nuclei-templates/2010/CVE-2010-3977-435be2da19b4391be47c1eff3c320bfa.yaml b/nuclei-templates/2010/CVE-2010-3977-435be2da19b4391be47c1eff3c320bfa.yaml index 846d9d9b88..97515305b8 100644 --- a/nuclei-templates/2010/CVE-2010-3977-435be2da19b4391be47c1eff3c320bfa.yaml +++ b/nuclei-templates/2010/CVE-2010-3977-435be2da19b4391be47c1eff3c320bfa.yaml @@ -4,7 +4,7 @@ info: name: > CformsII <=11.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in wp-content/plugins/cforms/lib_ajax.php in cformsII(cforms 2) WordPress plugin 11.5 allow remote attackers to inject arbitrary web script or HTML via the (1) rs and (2) rsargs[] parameters. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cforms2/" google-query: inurl:"/wp-content/plugins/cforms2/" shodan-query: 'vuln:CVE-2010-3977' - tags: cve,wordpress,wp-plugin,cforms2,medium + tags: cve,wordpress,wp-plugin,cforms2,high http: - method: GET diff --git a/nuclei-templates/2010/CVE-2010-4257-2bb5d275fcf9ba493afcfa9fdcfc130b.yaml b/nuclei-templates/2010/CVE-2010-4257-2bb5d275fcf9ba493afcfa9fdcfc130b.yaml index 43916761bd..904f46610f 100644 --- a/nuclei-templates/2010/CVE-2010-4257-2bb5d275fcf9ba493afcfa9fdcfc130b.yaml +++ b/nuclei-templates/2010/CVE-2010-4257-2bb5d275fcf9ba493afcfa9fdcfc130b.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 3.0.1 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in the do_trackbacks function in wp-includes/comment.php in WordPress before 3.0.2 allows remote authenticated users to execute arbitrary SQL commands via the Send Trackbacks field. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2010-4257 metadata: shodan-query: 'vuln:CVE-2010-4257' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2010/CVE-2010-4518-e4bfbf2cbba7e1243929a6da3f0f2ec5.yaml b/nuclei-templates/2010/CVE-2010-4518-e4bfbf2cbba7e1243929a6da3f0f2ec5.yaml index 11ba62ff52..2cefa234bf 100644 --- a/nuclei-templates/2010/CVE-2010-4518-e4bfbf2cbba7e1243929a6da3f0f2ec5.yaml +++ b/nuclei-templates/2010/CVE-2010-4518-e4bfbf2cbba7e1243929a6da3f0f2ec5.yaml @@ -4,7 +4,7 @@ info: name: > WP Safe Search <= 0.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-safe-search/wp-safe-search-jx.php in the Safe Search plugin 0.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the v1 parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-safe-search/" google-query: inurl:"/wp-content/plugins/wp-safe-search/" shodan-query: 'vuln:CVE-2010-4518' - tags: cve,wordpress,wp-plugin,wp-safe-search,medium + tags: cve,wordpress,wp-plugin,wp-safe-search,high http: - method: GET diff --git a/nuclei-templates/2010/CVE-2010-4536-3074a73795d456075561a5d7473c924b.yaml b/nuclei-templates/2010/CVE-2010-4536-3074a73795d456075561a5d7473c924b.yaml index ddeca63f2e..309d80504c 100644 --- a/nuclei-templates/2010/CVE-2010-4536-3074a73795d456075561a5d7473c924b.yaml +++ b/nuclei-templates/2010/CVE-2010-4536-3074a73795d456075561a5d7473c924b.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 3.0.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in KSES, as used in WordPress before 3.0.4, allow remote attackers to inject arbitrary web script or HTML via vectors related to (1) the & (ampersand) character, (2) the case of an attribute name, (3) a padded entity, and (4) an entity that is not in normalized form. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2010-4536 metadata: shodan-query: 'vuln:CVE-2010-4536' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2010/CVE-2010-4630-19c5c13179457ac1c8bd83d2fa6c9156.yaml b/nuclei-templates/2010/CVE-2010-4630-19c5c13179457ac1c8bd83d2fa6c9156.yaml index 2e834a4083..5ab66edc88 100644 --- a/nuclei-templates/2010/CVE-2010-4630-19c5c13179457ac1c8bd83d2fa6c9156.yaml +++ b/nuclei-templates/2010/CVE-2010-4630-19c5c13179457ac1c8bd83d2fa6c9156.yaml @@ -4,7 +4,7 @@ info: name: > WP Survey And Quiz Tool < 1.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in pages/admin/surveys/create.php in the WP Survey And Quiz Tool plugin 1.2.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the action parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-survey-and-quiz-tool/" google-query: inurl:"/wp-content/plugins/wp-survey-and-quiz-tool/" shodan-query: 'vuln:CVE-2010-4630' - tags: cve,wordpress,wp-plugin,wp-survey-and-quiz-tool,medium + tags: cve,wordpress,wp-plugin,wp-survey-and-quiz-tool,high http: - method: GET diff --git a/nuclei-templates/2010/CVE-2010-4747-336c529affe134c8a71f1e7879ec0dcb.yaml b/nuclei-templates/2010/CVE-2010-4747-336c529affe134c8a71f1e7879ec0dcb.yaml index 3933b99364..bb264a6d42 100644 --- a/nuclei-templates/2010/CVE-2010-4747-336c529affe134c8a71f1e7879ec0dcb.yaml +++ b/nuclei-templates/2010/CVE-2010-4747-336c529affe134c8a71f1e7879ec0dcb.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Processing Embed <= 0.5.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wordpress-processing-embed/data/popup.php in the Processing Embed plugin 0.5.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the pluginurl parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wordpress-processing-embed/" google-query: inurl:"/wp-content/plugins/wordpress-processing-embed/" shodan-query: 'vuln:CVE-2010-4747' - tags: cve,wordpress,wp-plugin,wordpress-processing-embed,medium + tags: cve,wordpress,wp-plugin,wordpress-processing-embed,high http: - method: GET diff --git a/nuclei-templates/2010/CVE-2010-4779-c426bf1b8239d541e948689bf4281f26.yaml b/nuclei-templates/2010/CVE-2010-4779-c426bf1b8239d541e948689bf4281f26.yaml index 1b12c2ba8f..39d9c7965f 100644 --- a/nuclei-templates/2010/CVE-2010-4779-c426bf1b8239d541e948689bf4281f26.yaml +++ b/nuclei-templates/2010/CVE-2010-4779-c426bf1b8239d541e948689bf4281f26.yaml @@ -4,7 +4,7 @@ info: name: > WPtouch < 1.9.20 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in lib/includes/auth.inc.php in the WPtouch plugin 1.9.19.4 and 1.9.20 for WordPress allows remote attackers to inject arbitrary web script or HTML via the wptouch_settings parameter to include/adsense-new.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wptouch/" google-query: inurl:"/wp-content/plugins/wptouch/" shodan-query: 'vuln:CVE-2010-4779' - tags: cve,wordpress,wp-plugin,wptouch,medium + tags: cve,wordpress,wp-plugin,wptouch,high http: - method: GET diff --git a/nuclei-templates/2010/CVE-2010-4825-455782a485d876c2acfcbf2a3f64d156.yaml b/nuclei-templates/2010/CVE-2010-4825-455782a485d876c2acfcbf2a3f64d156.yaml index 875bd4f392..0d8c4327a9 100644 --- a/nuclei-templates/2010/CVE-2010-4825-455782a485d876c2acfcbf2a3f64d156.yaml +++ b/nuclei-templates/2010/CVE-2010-4825-455782a485d876c2acfcbf2a3f64d156.yaml @@ -4,7 +4,7 @@ info: name: > Peadig's Twitter Feed: Embedded Timeline WordPress Plugin <= 2.2 - Reflected Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Cross-site scripting (XSS) vulnerability in magpie_debug.php in the Twitter Feed plugin (wp-twitter-feed) 2.2 and below for WordPress allows remote attackers to inject arbitrary web script or HTML via the url parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-twitter-feed/" google-query: inurl:"/wp-content/plugins/wp-twitter-feed/" shodan-query: 'vuln:CVE-2010-4825' - tags: cve,wordpress,wp-plugin,wp-twitter-feed,high + tags: cve,wordpress,wp-plugin,wp-twitter-feed,medium http: - method: GET diff --git a/nuclei-templates/2010/CVE-2010-5294-eac8868d56d1c09282753a6f5e51eca0.yaml b/nuclei-templates/2010/CVE-2010-5294-eac8868d56d1c09282753a6f5e51eca0.yaml index d0c4829d27..1a6dab2ac8 100644 --- a/nuclei-templates/2010/CVE-2010-5294-eac8868d56d1c09282753a6f5e51eca0.yaml +++ b/nuclei-templates/2010/CVE-2010-5294-eac8868d56d1c09282753a6f5e51eca0.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 3.0.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the request_filesystem_credentials function in wp-admin/includes/file.php in WordPress before 3.0.2 allow remote servers to inject arbitrary web script or HTML by providing a crafted error message for a (1) FTP or (2) SSH connection attempt. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2010-5294 metadata: shodan-query: 'vuln:CVE-2010-5294' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2010/CVE-2010-5295-2034cdfa4d915e35ef9771b3de5a3733.yaml b/nuclei-templates/2010/CVE-2010-5295-2034cdfa4d915e35ef9771b3de5a3733.yaml index b5278ab7d3..7c049856ea 100644 --- a/nuclei-templates/2010/CVE-2010-5295-2034cdfa4d915e35ef9771b3de5a3733.yaml +++ b/nuclei-templates/2010/CVE-2010-5295-2034cdfa4d915e35ef9771b3de5a3733.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 3.0.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-admin/plugins.php in WordPress before 3.0.2 might allow remote attackers to inject arbitrary web script or HTML via a plugin's author field, which is not properly handled during a Delete Plugin action. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2010-5295 metadata: shodan-query: 'vuln:CVE-2010-5295' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2010/CVE-2010-5296-b64a64e861339d55f5a2f0ac25277a51.yaml b/nuclei-templates/2010/CVE-2010-5296-b64a64e861339d55f5a2f0ac25277a51.yaml index 77bdf4a4d8..3ada72e383 100644 --- a/nuclei-templates/2010/CVE-2010-5296-b64a64e861339d55f5a2f0ac25277a51.yaml +++ b/nuclei-templates/2010/CVE-2010-5296-b64a64e861339d55f5a2f0ac25277a51.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 3.0.2 - Missing Authorization author: topscoder - severity: medium + severity: high description: > wp-includes/capabilities.php in WordPress before 3.0.2, when a Multisite configuration is used, does not require the Super Admin role for the delete_users capability, which allows remote authenticated administrators to bypass intended access restrictions via a delete action. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2010-5296 metadata: shodan-query: 'vuln:CVE-2010-5296' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2010/CVE-2010-5297-821019e522c0249cbe8769a0804c81b7.yaml b/nuclei-templates/2010/CVE-2010-5297-821019e522c0249cbe8769a0804c81b7.yaml index b554bf80c9..d32500fcdd 100644 --- a/nuclei-templates/2010/CVE-2010-5297-821019e522c0249cbe8769a0804c81b7.yaml +++ b/nuclei-templates/2010/CVE-2010-5297-821019e522c0249cbe8769a0804c81b7.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 3.0.1 - Missing Authorization author: topscoder - severity: medium + severity: high description: > WordPress before 3.0.1, when a Multisite installation is used, permanently retains the "site administrators can add users" option once changed, which might allow remote authenticated administrators to bypass intended access restrictions in opportunistic circumstances via an add action after a temporary change. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2010-5297 metadata: shodan-query: 'vuln:CVE-2010-5297' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-0641-5ea2cc8533d8fd4f1c4801b0b4960d9d.yaml b/nuclei-templates/2011/CVE-2011-0641-5ea2cc8533d8fd4f1c4801b0b4960d9d.yaml index f9678168b9..ece5e6dfc7 100644 --- a/nuclei-templates/2011/CVE-2011-0641-5ea2cc8533d8fd4f1c4801b0b4960d9d.yaml +++ b/nuclei-templates/2011/CVE-2011-0641-5ea2cc8533d8fd4f1c4801b0b4960d9d.yaml @@ -4,7 +4,7 @@ info: name: > StatPressCN <= 1.9.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in wp-admin/admin.php in the StatPressCN plugin 1.9.0 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) what1, (2) what2, (3) what3, (4) what4, and (5) what5 parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/statpresscn/" google-query: inurl:"/wp-content/plugins/statpresscn/" shodan-query: 'vuln:CVE-2011-0641' - tags: cve,wordpress,wp-plugin,statpresscn,medium + tags: cve,wordpress,wp-plugin,statpresscn,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-0700-5128144b38c4f8aac30be645fe67caaf.yaml b/nuclei-templates/2011/CVE-2011-0700-5128144b38c4f8aac30be645fe67caaf.yaml index 841f35e50b..62968dee49 100644 --- a/nuclei-templates/2011/CVE-2011-0700-5128144b38c4f8aac30be645fe67caaf.yaml +++ b/nuclei-templates/2011/CVE-2011-0700-5128144b38c4f8aac30be645fe67caaf.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 3.0.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in WordPress before 3.0.5 allow remote authenticated users to inject arbitrary web script or HTML via vectors related to (1) the Quick/Bulk Edit title (aka post title or post_title), (2) post_status, (3) comment_status, (4) ping_status, and (5) escaping of tags within the tags meta box. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2011-0700 metadata: shodan-query: 'vuln:CVE-2011-0700' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-0740-0bfa9343d868449c3d973f2c81052fe9.yaml b/nuclei-templates/2011/CVE-2011-0740-0bfa9343d868449c3d973f2c81052fe9.yaml index f75e9815e9..05bb3ec656 100644 --- a/nuclei-templates/2011/CVE-2011-0740-0bfa9343d868449c3d973f2c81052fe9.yaml +++ b/nuclei-templates/2011/CVE-2011-0740-0bfa9343d868449c3d973f2c81052fe9.yaml @@ -4,7 +4,7 @@ info: name: > RSS Feed Reader <= 0.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in magpie/scripts/magpie_slashbox.php in RSS Feed Reader 0.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the rss_url parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/rss-feed-reader/" google-query: inurl:"/wp-content/plugins/rss-feed-reader/" shodan-query: 'vuln:CVE-2011-0740' - tags: cve,wordpress,wp-plugin,rss-feed-reader,medium + tags: cve,wordpress,wp-plugin,rss-feed-reader,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-0759-e3d831bb072ff08836a63c6a4ebecea3.yaml b/nuclei-templates/2011/CVE-2011-0759-e3d831bb072ff08836a63c6a4ebecea3.yaml index a652379e28..b208af25d8 100644 --- a/nuclei-templates/2011/CVE-2011-0759-e3d831bb072ff08836a63c6a4ebecea3.yaml +++ b/nuclei-templates/2011/CVE-2011-0759-e3d831bb072ff08836a63c6a4ebecea3.yaml @@ -4,7 +4,7 @@ info: name: > WP-reCAPTCHA <= 2.9.8.2 - Multiple Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the configuration page in the Recaptcha (aka WP-reCAPTCHA) plugin 2.9.8.2 for WordPress allow remote attackers to hijack the authentication of administrators for requests that disable the CAPTCHA requirement or insert cross-site scripting (XSS) sequences via the (1) recaptcha_opt_pubkey, (2) recaptcha_opt_privkey, (3) re_tabindex, (4) error_blank, (5) error_incorrect, (6) mailhide_pub, (7) mailhide_priv, (8) mh_replace_link, or (9) mh_replace_title parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-recaptcha/" google-query: inurl:"/wp-content/plugins/wp-recaptcha/" shodan-query: 'vuln:CVE-2011-0759' - tags: cve,wordpress,wp-plugin,wp-recaptcha,high + tags: cve,wordpress,wp-plugin,wp-recaptcha,medium http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-0760-7db34627f1b70dfb15b3a62077ab868f.yaml b/nuclei-templates/2011/CVE-2011-0760-7db34627f1b70dfb15b3a62077ab868f.yaml index 1e476da313..6d7f70b485 100644 --- a/nuclei-templates/2011/CVE-2011-0760-7db34627f1b70dfb15b3a62077ab868f.yaml +++ b/nuclei-templates/2011/CVE-2011-0760-7db34627f1b70dfb15b3a62077ab868f.yaml @@ -4,7 +4,7 @@ info: name: > WP Related Posts <= 1.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the configuration screen in wp-relatedposts.php in the WP Related Posts plugin 1.0 for WordPress allow remote attackers to hijack the authentication of administrators for requests that insert cross-site scripting (XSS) sequences via the (1) wp_relatedposts_title, (2) wp_relatedposts_num, or (3) wp_relatedposts_type parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-related-posts/" google-query: inurl:"/wp-content/plugins/wp-related-posts/" shodan-query: 'vuln:CVE-2011-0760' - tags: cve,wordpress,wp-plugin,wp-related-posts,high + tags: cve,wordpress,wp-plugin,wp-related-posts,medium http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-3129-148a48158ed2a590392455c4205415e9.yaml b/nuclei-templates/2011/CVE-2011-3129-148a48158ed2a590392455c4205415e9.yaml index b7410f5f74..cddd09a02c 100644 --- a/nuclei-templates/2011/CVE-2011-3129-148a48158ed2a590392455c4205415e9.yaml +++ b/nuclei-templates/2011/CVE-2011-3129-148a48158ed2a590392455c4205415e9.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 3.1.2 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > The file upload functionality in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2, when running "on hosts with dangerous security settings," has unknown impact and attack vectors, possibly related to dangerous filenames. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2011-3129 metadata: shodan-query: 'vuln:CVE-2011-3129' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-3130-3718fa429a69f29dc2387ac6b6099785.yaml b/nuclei-templates/2011/CVE-2011-3130-3718fa429a69f29dc2387ac6b6099785.yaml index a81399dd25..94d2f61150 100644 --- a/nuclei-templates/2011/CVE-2011-3130-3718fa429a69f29dc2387ac6b6099785.yaml +++ b/nuclei-templates/2011/CVE-2011-3130-3718fa429a69f29dc2387ac6b6099785.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 3.1.2 - SQL Injection author: topscoder - severity: high + severity: critical description: > wp-includes/taxonomy.php in WordPress 3.1 before 3.1.3 and 3.2 before Beta 2 has unknown impact and attack vectors related to "Taxonomy query hardening," possibly involving SQL injection. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2011-3130 metadata: shodan-query: 'vuln:CVE-2011-3130' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-3841-f6896d23342ecbcbdbcbfcb5cd72746c.yaml b/nuclei-templates/2011/CVE-2011-3841-f6896d23342ecbcbdbcbfcb5cd72746c.yaml index 7809c8ecae..62dd0dce40 100644 --- a/nuclei-templates/2011/CVE-2011-3841-f6896d23342ecbcbdbcbfcb5cd72746c.yaml +++ b/nuclei-templates/2011/CVE-2011-3841-f6896d23342ecbcbdbcbfcb5cd72746c.yaml @@ -4,7 +4,7 @@ info: name: > WP Symposium <= 11.11.26 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in uploadify/get_profile_avatar.php in the WP Symposium plugin before 11.12.08 for WordPress allows remote attackers to inject arbitrary web script or HTML via the uid parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-symposium/" google-query: inurl:"/wp-content/plugins/wp-symposium/" shodan-query: 'vuln:CVE-2011-3841' - tags: cve,wordpress,wp-plugin,wp-symposium,medium + tags: cve,wordpress,wp-plugin,wp-symposium,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-3850-e8b1937b8d22149355604761f9e2e597.yaml b/nuclei-templates/2011/CVE-2011-3850-e8b1937b8d22149355604761f9e2e597.yaml index 399f8840a0..78765b3517 100644 --- a/nuclei-templates/2011/CVE-2011-3850-e8b1937b8d22149355604761f9e2e597.yaml +++ b/nuclei-templates/2011/CVE-2011-3850-e8b1937b8d22149355604761f9e2e597.yaml @@ -4,7 +4,7 @@ info: name: > Atahualpa < 3.6.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Atahualpa theme before 3.6.8 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/atahualpa/" google-query: inurl:"/wp-content/themes/atahualpa/" shodan-query: 'vuln:CVE-2011-3850' - tags: cve,wordpress,wp-theme,atahualpa,medium + tags: cve,wordpress,wp-theme,atahualpa,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-3851-6d0c9deb010be5b44d8bbfb44b8f1a81.yaml b/nuclei-templates/2011/CVE-2011-3851-6d0c9deb010be5b44d8bbfb44b8f1a81.yaml index f66dbc652d..8ac45cccc9 100644 --- a/nuclei-templates/2011/CVE-2011-3851-6d0c9deb010be5b44d8bbfb44b8f1a81.yaml +++ b/nuclei-templates/2011/CVE-2011-3851-6d0c9deb010be5b44d8bbfb44b8f1a81.yaml @@ -4,7 +4,7 @@ info: name: > News <= 0.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the News theme before 0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the cpage parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/news/" google-query: inurl:"/wp-content/themes/news/" shodan-query: 'vuln:CVE-2011-3851' - tags: cve,wordpress,wp-theme,news,medium + tags: cve,wordpress,wp-theme,news,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-3852-170bc795059fb0d98227f8d8677e21e8.yaml b/nuclei-templates/2011/CVE-2011-3852-170bc795059fb0d98227f8d8677e21e8.yaml index 339205c3e4..0287e709e6 100644 --- a/nuclei-templates/2011/CVE-2011-3852-170bc795059fb0d98227f8d8677e21e8.yaml +++ b/nuclei-templates/2011/CVE-2011-3852-170bc795059fb0d98227f8d8677e21e8.yaml @@ -4,7 +4,7 @@ info: name: > Evolve < 1.2.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the EvoLve theme before 1.2.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/evolve/" google-query: inurl:"/wp-content/themes/evolve/" shodan-query: 'vuln:CVE-2011-3852' - tags: cve,wordpress,wp-theme,evolve,medium + tags: cve,wordpress,wp-theme,evolve,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-3854-2c9dd1c9df5c34a137e9f118a0781a3d.yaml b/nuclei-templates/2011/CVE-2011-3854-2c9dd1c9df5c34a137e9f118a0781a3d.yaml index cfbfd9988c..a07fecb325 100644 --- a/nuclei-templates/2011/CVE-2011-3854-2c9dd1c9df5c34a137e9f118a0781a3d.yaml +++ b/nuclei-templates/2011/CVE-2011-3854-2c9dd1c9df5c34a137e9f118a0781a3d.yaml @@ -4,7 +4,7 @@ info: name: > ZenLite <= 4.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the ZenLite theme before 4.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/zenlite/" google-query: inurl:"/wp-content/themes/zenlite/" shodan-query: 'vuln:CVE-2011-3854' - tags: cve,wordpress,wp-theme,zenlite,medium + tags: cve,wordpress,wp-theme,zenlite,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-3855-e63ed950312b124c0d59757ed157173d.yaml b/nuclei-templates/2011/CVE-2011-3855-e63ed950312b124c0d59757ed157173d.yaml index 2c5c1e28e9..928740ba2f 100644 --- a/nuclei-templates/2011/CVE-2011-3855-e63ed950312b124c0d59757ed157173d.yaml +++ b/nuclei-templates/2011/CVE-2011-3855-e63ed950312b124c0d59757ed157173d.yaml @@ -4,7 +4,7 @@ info: name: > F8 Lite <= 4.2.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the F8 Lite theme before 4.2.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/f8-lite/" google-query: inurl:"/wp-content/themes/f8-lite/" shodan-query: 'vuln:CVE-2011-3855' - tags: cve,wordpress,wp-theme,f8-lite,medium + tags: cve,wordpress,wp-theme,f8-lite,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-3856-0aff17e28ef121a8c519ec81ffed16b1.yaml b/nuclei-templates/2011/CVE-2011-3856-0aff17e28ef121a8c519ec81ffed16b1.yaml index eb0b6be1b4..526dd45a6a 100644 --- a/nuclei-templates/2011/CVE-2011-3856-0aff17e28ef121a8c519ec81ffed16b1.yaml +++ b/nuclei-templates/2011/CVE-2011-3856-0aff17e28ef121a8c519ec81ffed16b1.yaml @@ -4,7 +4,7 @@ info: name: > Elegant Grunge <= 1.0.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Elegant Grunge theme before 1.0.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/elegant-grunge/" google-query: inurl:"/wp-content/themes/elegant-grunge/" shodan-query: 'vuln:CVE-2011-3856' - tags: cve,wordpress,wp-theme,elegant-grunge,medium + tags: cve,wordpress,wp-theme,elegant-grunge,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-3857-1eca6946030b47a7e15dbf74278035b1.yaml b/nuclei-templates/2011/CVE-2011-3857-1eca6946030b47a7e15dbf74278035b1.yaml index 6ba4d9cb8d..4fbaf7d715 100644 --- a/nuclei-templates/2011/CVE-2011-3857-1eca6946030b47a7e15dbf74278035b1.yaml +++ b/nuclei-templates/2011/CVE-2011-3857-1eca6946030b47a7e15dbf74278035b1.yaml @@ -4,7 +4,7 @@ info: name: > Antisnews <= 1.09 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Antisnews theme before 1.10 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/antisnews/" google-query: inurl:"/wp-content/themes/antisnews/" shodan-query: 'vuln:CVE-2011-3857' - tags: cve,wordpress,wp-theme,antisnews,medium + tags: cve,wordpress,wp-theme,antisnews,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-3858-caeb5a0b48102c1758efb7acc2ae32c5.yaml b/nuclei-templates/2011/CVE-2011-3858-caeb5a0b48102c1758efb7acc2ae32c5.yaml index 0b7cbcdc91..56d6b03b71 100644 --- a/nuclei-templates/2011/CVE-2011-3858-caeb5a0b48102c1758efb7acc2ae32c5.yaml +++ b/nuclei-templates/2011/CVE-2011-3858-caeb5a0b48102c1758efb7acc2ae32c5.yaml @@ -4,7 +4,7 @@ info: name: > Pixiv Custom < 2.1.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Pixiv Custom theme before 2.1.6 for WordPress allows remote attackers to inject arbitrary web script or HTML via the cpage parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/pixiv-custom/" google-query: inurl:"/wp-content/themes/pixiv-custom/" shodan-query: 'vuln:CVE-2011-3858' - tags: cve,wordpress,wp-theme,pixiv-custom,medium + tags: cve,wordpress,wp-theme,pixiv-custom,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-3859-1def92176b2075addd1971f8bb11410a.yaml b/nuclei-templates/2011/CVE-2011-3859-1def92176b2075addd1971f8bb11410a.yaml index bc1c197b9e..f94b4120a2 100644 --- a/nuclei-templates/2011/CVE-2011-3859-1def92176b2075addd1971f8bb11410a.yaml +++ b/nuclei-templates/2011/CVE-2011-3859-1def92176b2075addd1971f8bb11410a.yaml @@ -4,7 +4,7 @@ info: name: > Trending < 0.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Trending theme before 0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the cpage parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/trending/" google-query: inurl:"/wp-content/themes/trending/" shodan-query: 'vuln:CVE-2011-3859' - tags: cve,wordpress,wp-theme,trending,medium + tags: cve,wordpress,wp-theme,trending,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-3860-ab5cb4980d96d0502a1385c5c51d0ea4.yaml b/nuclei-templates/2011/CVE-2011-3860-ab5cb4980d96d0502a1385c5c51d0ea4.yaml index d58912fabf..6fdcee112f 100644 --- a/nuclei-templates/2011/CVE-2011-3860-ab5cb4980d96d0502a1385c5c51d0ea4.yaml +++ b/nuclei-templates/2011/CVE-2011-3860-ab5cb4980d96d0502a1385c5c51d0ea4.yaml @@ -4,7 +4,7 @@ info: name: > Cover WP <= 1.6.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Cover WP theme before 1.6.6 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/cover-wp/" google-query: inurl:"/wp-content/themes/cover-wp/" shodan-query: 'vuln:CVE-2011-3860' - tags: cve,wordpress,wp-theme,cover-wp,medium + tags: cve,wordpress,wp-theme,cover-wp,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-3861-8cf1ee9f0e6e79fc8ffcfb9414ff6340.yaml b/nuclei-templates/2011/CVE-2011-3861-8cf1ee9f0e6e79fc8ffcfb9414ff6340.yaml index 15c248fa3a..6dec1b4ae6 100644 --- a/nuclei-templates/2011/CVE-2011-3861-8cf1ee9f0e6e79fc8ffcfb9414ff6340.yaml +++ b/nuclei-templates/2011/CVE-2011-3861-8cf1ee9f0e6e79fc8ffcfb9414ff6340.yaml @@ -4,7 +4,7 @@ info: name: > Web Minimalist 200901 <= 1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Web Minimalist 200901 theme for WordPress is vulnerable to Reflected Cross-Site Scripting via the PATH_INFO to index.php in versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/web-minimalist-200901/" google-query: inurl:"/wp-content/themes/web-minimalist-200901/" shodan-query: 'vuln:CVE-2011-3861' - tags: cve,wordpress,wp-theme,web-minimalist-200901,medium + tags: cve,wordpress,wp-theme,web-minimalist-200901,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-3862-59015ab41c28db2b3674f30b01c20313.yaml b/nuclei-templates/2011/CVE-2011-3862-59015ab41c28db2b3674f30b01c20313.yaml index ba198a7fd9..428d859cd0 100644 --- a/nuclei-templates/2011/CVE-2011-3862-59015ab41c28db2b3674f30b01c20313.yaml +++ b/nuclei-templates/2011/CVE-2011-3862-59015ab41c28db2b3674f30b01c20313.yaml @@ -4,7 +4,7 @@ info: name: > Morning Coffee < 3.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Morning Coffee theme for WordPress is vulnerable to Reflected Cross-Site Scripting via the PATH_INFO to index.php in versions up to 3.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/morning-coffee/" google-query: inurl:"/wp-content/themes/morning-coffee/" shodan-query: 'vuln:CVE-2011-3862' - tags: cve,wordpress,wp-theme,morning-coffee,medium + tags: cve,wordpress,wp-theme,morning-coffee,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-3864-86bc0489b6564a6b791112624ecc4c24.yaml b/nuclei-templates/2011/CVE-2011-3864-86bc0489b6564a6b791112624ecc4c24.yaml index f0457cf4eb..55737f3b85 100644 --- a/nuclei-templates/2011/CVE-2011-3864-86bc0489b6564a6b791112624ecc4c24.yaml +++ b/nuclei-templates/2011/CVE-2011-3864-86bc0489b6564a6b791112624ecc4c24.yaml @@ -4,7 +4,7 @@ info: name: > The Erudite <= 2.7.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the The Erudite theme before 2.8 for WordPress allows remote attackers to inject arbitrary web script or HTML via the cpage parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/the-erudite/" google-query: inurl:"/wp-content/themes/the-erudite/" shodan-query: 'vuln:CVE-2011-3864' - tags: cve,wordpress,wp-theme,the-erudite,medium + tags: cve,wordpress,wp-theme,the-erudite,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-3865-530c76ddc7a277b970fa701ca1edf42b.yaml b/nuclei-templates/2011/CVE-2011-3865-530c76ddc7a277b970fa701ca1edf42b.yaml index 42620fb1c1..52e060e1ec 100644 --- a/nuclei-templates/2011/CVE-2011-3865-530c76ddc7a277b970fa701ca1edf42b.yaml +++ b/nuclei-templates/2011/CVE-2011-3865-530c76ddc7a277b970fa701ca1edf42b.yaml @@ -4,7 +4,7 @@ info: name: > Black-Letterhead <= 1.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Black-LetterHead theme before 1.6 for WordPress allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to index.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/black-letterhead/" google-query: inurl:"/wp-content/themes/black-letterhead/" shodan-query: 'vuln:CVE-2011-3865' - tags: cve,wordpress,wp-theme,black-letterhead,medium + tags: cve,wordpress,wp-theme,black-letterhead,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-4106-a4aa366f217005e74322ff2bf7a0e182.yaml b/nuclei-templates/2011/CVE-2011-4106-a4aa366f217005e74322ff2bf7a0e182.yaml index 8944ba564f..1beae8691e 100644 --- a/nuclei-templates/2011/CVE-2011-4106-a4aa366f217005e74322ff2bf7a0e182.yaml +++ b/nuclei-templates/2011/CVE-2011-4106-a4aa366f217005e74322ff2bf7a0e182.yaml @@ -14,17 +14,17 @@ info: cvss-score: 9.8 cve-id: CVE-2011-4106 metadata: - fofa-query: "wp-content/plugins/category-list-portfolio-page/" - google-query: inurl:"/wp-content/plugins/category-list-portfolio-page/" + fofa-query: "wp-content/plugins/simple-post-thumbnails/" + google-query: inurl:"/wp-content/plugins/simple-post-thumbnails/" shodan-query: 'vuln:CVE-2011-4106' - tags: cve,wordpress,wp-plugin,category-list-portfolio-page,critical + tags: cve,wordpress,wp-plugin,simple-post-thumbnails,critical http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/category-list-portfolio-page/readme.txt" + - "{{BaseURL}}/wp-content/plugins/simple-post-thumbnails/readme.txt" extractors: - type: regex @@ -50,7 +50,7 @@ http: - type: word words: - - "category-list-portfolio-page" + - "simple-post-thumbnails" part: body - type: dsl diff --git a/nuclei-templates/2011/CVE-2011-4562-c050cce5edc786cc76c2f3dcee80f148.yaml b/nuclei-templates/2011/CVE-2011-4562-c050cce5edc786cc76c2f3dcee80f148.yaml index 69c43a3a27..109b3843b0 100644 --- a/nuclei-templates/2011/CVE-2011-4562-c050cce5edc786cc76c2f3dcee80f148.yaml +++ b/nuclei-templates/2011/CVE-2011-4562-c050cce5edc786cc76c2f3dcee80f148.yaml @@ -4,7 +4,7 @@ info: name: > Redirection <= 2.2.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in (1) view/admin/log_item.php and (2) view/admin/log_item_details.php in the Redirection plugin 2.2.9 for WordPress allow remote attackers to inject arbitrary web script or HTML via the Referer HTTP header in a request to a post that does not exist. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/redirection/" google-query: inurl:"/wp-content/plugins/redirection/" shodan-query: 'vuln:CVE-2011-4562' - tags: cve,wordpress,wp-plugin,redirection,medium + tags: cve,wordpress,wp-plugin,redirection,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-4568-8e904d0aa5c673b4683d6e95c3e351f3.yaml b/nuclei-templates/2011/CVE-2011-4568-8e904d0aa5c673b4683d6e95c3e351f3.yaml index 7449aef015..c3ba07697e 100644 --- a/nuclei-templates/2011/CVE-2011-4568-8e904d0aa5c673b4683d6e95c3e351f3.yaml +++ b/nuclei-templates/2011/CVE-2011-4568-8e904d0aa5c673b4683d6e95c3e351f3.yaml @@ -4,7 +4,7 @@ info: name: > FV Flowplayer Video Player <= 1.2.11 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in view/frontend-head.php in the Flowplayer plugin before 1.2.12 for WordPress allows remote attackers to inject arbitrary web script or HTML via the URI. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" shodan-query: 'vuln:CVE-2011-4568' - tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,medium + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-4618-0bc66019a5442f087e2da571324acbb0.yaml b/nuclei-templates/2011/CVE-2011-4618-0bc66019a5442f087e2da571324acbb0.yaml index 7877be67ef..e82fdf62b6 100644 --- a/nuclei-templates/2011/CVE-2011-4618-0bc66019a5442f087e2da571324acbb0.yaml +++ b/nuclei-templates/2011/CVE-2011-4618-0bc66019a5442f087e2da571324acbb0.yaml @@ -4,7 +4,7 @@ info: name: > Advanced Text Widget <= 2.0.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in advancedtext.php in Advanced Text Widget plugin before 2.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/advanced-text-widget/" google-query: inurl:"/wp-content/plugins/advanced-text-widget/" shodan-query: 'vuln:CVE-2011-4618' - tags: cve,wordpress,wp-plugin,advanced-text-widget,medium + tags: cve,wordpress,wp-plugin,advanced-text-widget,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-4624-0b070c6bccd03db5dad9fdc1c059c617.yaml b/nuclei-templates/2011/CVE-2011-4624-0b070c6bccd03db5dad9fdc1c059c617.yaml index b965ec2ad3..6a2e4d1f3d 100644 --- a/nuclei-templates/2011/CVE-2011-4624-0b070c6bccd03db5dad9fdc1c059c617.yaml +++ b/nuclei-templates/2011/CVE-2011-4624-0b070c6bccd03db5dad9fdc1c059c617.yaml @@ -4,7 +4,7 @@ info: name: > Album and Image Gallery with Lightbox – Flagallery Photo Portfolio < 1.57 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/flash-album-gallery/" google-query: inurl:"/wp-content/plugins/flash-album-gallery/" shodan-query: 'vuln:CVE-2011-4624' - tags: cve,wordpress,wp-plugin,flash-album-gallery,medium + tags: cve,wordpress,wp-plugin,flash-album-gallery,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-4646-ac814100e213d264685a18f0bee470c2.yaml b/nuclei-templates/2011/CVE-2011-4646-ac814100e213d264685a18f0bee470c2.yaml index 65af440c6b..2052e1fcc4 100644 --- a/nuclei-templates/2011/CVE-2011-4646-ac814100e213d264685a18f0bee470c2.yaml +++ b/nuclei-templates/2011/CVE-2011-4646-ac814100e213d264685a18f0bee470c2.yaml @@ -4,7 +4,7 @@ info: name: > WP-PostRatings <= 1.61 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in wp-postratings.php in the WP-PostRatings plugin 1.50, 1.61, and probably other versions before 1.62 for WordPress allows remote authenticated users with the Author role to execute arbitrary SQL commands via the id attribute of the ratings shortcode when creating a post. NOTE: some of these details are obtained from third party information. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-postratings/" google-query: inurl:"/wp-content/plugins/wp-postratings/" shodan-query: 'vuln:CVE-2011-4646' - tags: cve,wordpress,wp-plugin,wp-postratings,high + tags: cve,wordpress,wp-plugin,wp-postratings,critical http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-4803-92f2fb442048282c27cd8fc5629a2db5.yaml b/nuclei-templates/2011/CVE-2011-4803-92f2fb442048282c27cd8fc5629a2db5.yaml index 7d63ff3b7f..789d3bb938 100644 --- a/nuclei-templates/2011/CVE-2011-4803-92f2fb442048282c27cd8fc5629a2db5.yaml +++ b/nuclei-templates/2011/CVE-2011-4803-92f2fb442048282c27cd8fc5629a2db5.yaml @@ -4,7 +4,7 @@ info: name: > WPtouch <= 1.9.8 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in wptouch/ajax.php in the WPTouch plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wptouch/" google-query: inurl:"/wp-content/plugins/wptouch/" shodan-query: 'vuln:CVE-2011-4803' - tags: cve,wordpress,wp-plugin,wptouch,high + tags: cve,wordpress,wp-plugin,wptouch,critical http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-4926-98258e7e3672ebda27bdfc41933c5290.yaml b/nuclei-templates/2011/CVE-2011-4926-98258e7e3672ebda27bdfc41933c5290.yaml index f48053e941..336ca0d95b 100644 --- a/nuclei-templates/2011/CVE-2011-4926-98258e7e3672ebda27bdfc41933c5290.yaml +++ b/nuclei-templates/2011/CVE-2011-4926-98258e7e3672ebda27bdfc41933c5290.yaml @@ -4,7 +4,7 @@ info: name: > Adminimize <= 1.7.21 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in adminimize/adminimize_page.php in the Adminimize plugin before 1.7.22 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/adminimize/" google-query: inurl:"/wp-content/plugins/adminimize/" shodan-query: 'vuln:CVE-2011-4926' - tags: cve,wordpress,wp-plugin,adminimize,medium + tags: cve,wordpress,wp-plugin,adminimize,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-4955-596c399ca77f6898f5eb2e3e553223f2.yaml b/nuclei-templates/2011/CVE-2011-4955-596c399ca77f6898f5eb2e3e553223f2.yaml index a2da93381e..57b5c83c00 100644 --- a/nuclei-templates/2011/CVE-2011-4955-596c399ca77f6898f5eb2e3e553223f2.yaml +++ b/nuclei-templates/2011/CVE-2011-4955-596c399ca77f6898f5eb2e3e553223f2.yaml @@ -4,7 +4,7 @@ info: name: > bSuite <= 5 alpha 2 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in ui_stats.php in the bSuite plugin before 5 alpha 3 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) s or (2) p parameters to index.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bsuite/" google-query: inurl:"/wp-content/plugins/bsuite/" shodan-query: 'vuln:CVE-2011-4955' - tags: cve,wordpress,wp-plugin,bsuite,medium + tags: cve,wordpress,wp-plugin,bsuite,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-4956-c6bafdf6d7b65e0b18711ab77d0f0098.yaml b/nuclei-templates/2011/CVE-2011-4956-c6bafdf6d7b65e0b18711ab77d0f0098.yaml index df4dda5268..d4df1d1a04 100644 --- a/nuclei-templates/2011/CVE-2011-4956-c6bafdf6d7b65e0b18711ab77d0f0098.yaml +++ b/nuclei-templates/2011/CVE-2011-4956-c6bafdf6d7b65e0b18711ab77d0f0098.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 3.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in WordPress before 3.1.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2011-4956 metadata: shodan-query: 'vuln:CVE-2011-4956' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5051-ea4a5a60afde85ede6fced3685c1e946.yaml b/nuclei-templates/2011/CVE-2011-5051-ea4a5a60afde85ede6fced3685c1e946.yaml index 5fd675199e..b760d91476 100644 --- a/nuclei-templates/2011/CVE-2011-5051-ea4a5a60afde85ede6fced3685c1e946.yaml +++ b/nuclei-templates/2011/CVE-2011-5051-ea4a5a60afde85ede6fced3685c1e946.yaml @@ -4,7 +4,7 @@ info: name: > WP Symposium < 11.12.24 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > Multiple unrestricted file upload vulnerabilities in the WP Symposium plugin before 11.12.24 for WordPress allow remote attackers to execute arbitrary code by uploading a file with an executable extension using (1) uploadify/upload_admin_avatar.php or (2) uploadify/upload_profile_avatar.php, then accessing it via a direct request to the file in an unspecified directory inside the webroot. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-symposium/" google-query: inurl:"/wp-content/plugins/wp-symposium/" shodan-query: 'vuln:CVE-2011-5051' - tags: cve,wordpress,wp-plugin,wp-symposium,high + tags: cve,wordpress,wp-plugin,wp-symposium,critical http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5104-5f327ec92a2ed47a19cfa74c78839e26.yaml b/nuclei-templates/2011/CVE-2011-5104-5f327ec92a2ed47a19cfa74c78839e26.yaml index 1e86513cbf..8123f4c60e 100644 --- a/nuclei-templates/2011/CVE-2011-5104-5f327ec92a2ed47a19cfa74c78839e26.yaml +++ b/nuclei-templates/2011/CVE-2011-5104-5f327ec92a2ed47a19cfa74c78839e26.yaml @@ -4,7 +4,7 @@ info: name: > WP eCommerce < 3.8.7.2 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wpsc-admin/display-sales-logs.php in WP e-Commerce plugin 3.8.7.1 and possibly earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the custom_text parameter. NOTE: some of these details are obtained from third party information. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-e-commerce/" google-query: inurl:"/wp-content/plugins/wp-e-commerce/" shodan-query: 'vuln:CVE-2011-5104' - tags: cve,wordpress,wp-plugin,wp-e-commerce,medium + tags: cve,wordpress,wp-plugin,wp-e-commerce,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5106-9fb1e67eb818f983f8dbfc23b2a0c064.yaml b/nuclei-templates/2011/CVE-2011-5106-9fb1e67eb818f983f8dbfc23b2a0c064.yaml index cb1bf07e90..a74a6c5a04 100644 --- a/nuclei-templates/2011/CVE-2011-5106-9fb1e67eb818f983f8dbfc23b2a0c064.yaml +++ b/nuclei-templates/2011/CVE-2011-5106-9fb1e67eb818f983f8dbfc23b2a0c064.yaml @@ -4,7 +4,7 @@ info: name: > Flexible Custom Post Type < 0.1.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in edit-post.php in the Flexible Custom Post Type plugin before 0.1.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/flexible-custom-post-type/" google-query: inurl:"/wp-content/plugins/flexible-custom-post-type/" shodan-query: 'vuln:CVE-2011-5106' - tags: cve,wordpress,wp-plugin,flexible-custom-post-type,medium + tags: cve,wordpress,wp-plugin,flexible-custom-post-type,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5107-47f5d0213d6a55b30c759752f9fa351e.yaml b/nuclei-templates/2011/CVE-2011-5107-47f5d0213d6a55b30c759752f9fa351e.yaml index 7338f200d7..8df8c83922 100644 --- a/nuclei-templates/2011/CVE-2011-5107-47f5d0213d6a55b30c759752f9fa351e.yaml +++ b/nuclei-templates/2011/CVE-2011-5107-47f5d0213d6a55b30c759752f9fa351e.yaml @@ -4,7 +4,7 @@ info: name: > Alert Before Your Post <= 0.1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in post_alert.php in Alert Before Your Post plugin, possibly 0.1.1 and earlier, for WordPress allows remote attackers to inject arbitrary web script or HTML via the name parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/alert-before-your-post/" google-query: inurl:"/wp-content/plugins/alert-before-your-post/" shodan-query: 'vuln:CVE-2011-5107' - tags: cve,wordpress,wp-plugin,alert-before-your-post,medium + tags: cve,wordpress,wp-plugin,alert-before-your-post,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5128-a9a5808c69ac6668bf195f6fcb5a5a1a.yaml b/nuclei-templates/2011/CVE-2011-5128-a9a5808c69ac6668bf195f6fcb5a5a1a.yaml index 82a17a3853..d90eadc159 100644 --- a/nuclei-templates/2011/CVE-2011-5128-a9a5808c69ac6668bf195f6fcb5a5a1a.yaml +++ b/nuclei-templates/2011/CVE-2011-5128-a9a5808c69ac6668bf195f6fcb5a5a1a.yaml @@ -4,7 +4,7 @@ info: name: > Adminimize < 1.7.22 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Adminimize plugin before 1.7.22 for WordPress allow remote attackers to inject arbitrary web script or HTML via the page parameter to (1) inc-options/deinstall_options.php, (2) inc-options/theme_options.php, or (3) inc-options/im_export_options.php, or the (4) post or (5) post_ID parameters to adminimize.php, different vectors than CVE-2011-4926. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/adminimize/" google-query: inurl:"/wp-content/plugins/adminimize/" shodan-query: 'vuln:CVE-2011-5128' - tags: cve,wordpress,wp-plugin,adminimize,medium + tags: cve,wordpress,wp-plugin,adminimize,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5181-41d06e1c542cc99b348ba7db58f2c892.yaml b/nuclei-templates/2011/CVE-2011-5181-41d06e1c542cc99b348ba7db58f2c892.yaml index 0019e5e206..ee63ed94a4 100644 --- a/nuclei-templates/2011/CVE-2011-5181-41d06e1c542cc99b348ba7db58f2c892.yaml +++ b/nuclei-templates/2011/CVE-2011-5181-41d06e1c542cc99b348ba7db58f2c892.yaml @@ -4,7 +4,7 @@ info: name: > Live Chat from ClickDesk – Live Chat – Help Desk Plugin for Websites <= 2.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in clickdesk.php in ClickDesk Live Support - Live Chat plugin 2.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the cdwidgetid parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/clickdesk-live-support-chat-plugin/" google-query: inurl:"/wp-content/plugins/clickdesk-live-support-chat-plugin/" shodan-query: 'vuln:CVE-2011-5181' - tags: cve,wordpress,wp-plugin,clickdesk-live-support-chat-plugin,medium + tags: cve,wordpress,wp-plugin,clickdesk-live-support-chat-plugin,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5191-052601a64f3c278014382ca43022a402.yaml b/nuclei-templates/2011/CVE-2011-5191-052601a64f3c278014382ca43022a402.yaml index 3eca3f964b..a342c2e469 100644 --- a/nuclei-templates/2011/CVE-2011-5191-052601a64f3c278014382ca43022a402.yaml +++ b/nuclei-templates/2011/CVE-2011-5191-052601a64f3c278014382ca43022a402.yaml @@ -4,7 +4,7 @@ info: name: > Pretty Link Lite < 1.5.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in pretty-bar.php in Pretty Link Lite plugin before 1.5.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the slug parameter, a different vulnerability than CVE-2011-5192. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pretty-link-lite/" google-query: inurl:"/wp-content/plugins/pretty-link-lite/" shodan-query: 'vuln:CVE-2011-5191' - tags: cve,wordpress,wp-plugin,pretty-link-lite,medium + tags: cve,wordpress,wp-plugin,pretty-link-lite,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5192-a5b27966569a74533de04e9d976c99c9.yaml b/nuclei-templates/2011/CVE-2011-5192-a5b27966569a74533de04e9d976c99c9.yaml index b6c4e17bee..5ee1a0fe9b 100644 --- a/nuclei-templates/2011/CVE-2011-5192-a5b27966569a74533de04e9d976c99c9.yaml +++ b/nuclei-templates/2011/CVE-2011-5192-a5b27966569a74533de04e9d976c99c9.yaml @@ -4,7 +4,7 @@ info: name: > Pretty Link Lite < 1.5.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in pretty-bar.php in Pretty Link Lite plugin before 1.5.6 for WordPress allows remote attackers to inject arbitrary web script or HTML via the slug parameter, a different vulnerability than CVE-2011-5191. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pretty-link-lite/" google-query: inurl:"/wp-content/plugins/pretty-link-lite/" shodan-query: 'vuln:CVE-2011-5192' - tags: cve,wordpress,wp-plugin,pretty-link-lite,medium + tags: cve,wordpress,wp-plugin,pretty-link-lite,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5193-e7674c99987b6c4c7435d1f976b8d7fb.yaml b/nuclei-templates/2011/CVE-2011-5193-e7674c99987b6c4c7435d1f976b8d7fb.yaml index 91a54484a4..d96a8f6c12 100644 --- a/nuclei-templates/2011/CVE-2011-5193-e7674c99987b6c4c7435d1f976b8d7fb.yaml +++ b/nuclei-templates/2011/CVE-2011-5193-e7674c99987b6c4c7435d1f976b8d7fb.yaml @@ -4,7 +4,7 @@ info: name: > WHOIS <= 1.4.2.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in vendors/samswhois/samswhois.inc.php in the Whois Search plugin 1.4.2.3 for WordPress, when the WHOIS widget is enabled, allows remote attackers to inject arbitrary web script or HTML via the domain parameter to index.php, a different vulnerability than CVE-2011-5194. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wordpress-whois-search/" google-query: inurl:"/wp-content/plugins/wordpress-whois-search/" shodan-query: 'vuln:CVE-2011-5193' - tags: cve,wordpress,wp-plugin,wordpress-whois-search,medium + tags: cve,wordpress,wp-plugin,wordpress-whois-search,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5207-c4a1c6ea67bd01790c36ea2fb1f58bd3.yaml b/nuclei-templates/2011/CVE-2011-5207-c4a1c6ea67bd01790c36ea2fb1f58bd3.yaml index 17cfe4bdfc..dea02f7266 100644 --- a/nuclei-templates/2011/CVE-2011-5207-c4a1c6ea67bd01790c36ea2fb1f58bd3.yaml +++ b/nuclei-templates/2011/CVE-2011-5207-c4a1c6ea67bd01790c36ea2fb1f58bd3.yaml @@ -4,7 +4,7 @@ info: name: > TheCartPress eCommerce Shopping Cart <= 1.1.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in admin/OptionsPostsList.php in the TheCartPress plugin for WordPress before 1.1.6 before 2011-12-31 allows remote attackers to inject arbitrary web script or HTML via the tcp_name_post_XXXXX parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/thecartpress/" google-query: inurl:"/wp-content/plugins/thecartpress/" shodan-query: 'vuln:CVE-2011-5207' - tags: cve,wordpress,wp-plugin,thecartpress,medium + tags: cve,wordpress,wp-plugin,thecartpress,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5225-aeea609833832e1baa1f0bd27367ec6d.yaml b/nuclei-templates/2011/CVE-2011-5225-aeea609833832e1baa1f0bd27367ec6d.yaml index 90598dc53a..3d9f969003 100644 --- a/nuclei-templates/2011/CVE-2011-5225-aeea609833832e1baa1f0bd27367ec6d.yaml +++ b/nuclei-templates/2011/CVE-2011-5225-aeea609833832e1baa1f0bd27367ec6d.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Sentinel <= 1.0.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wordpress_sentinel.php in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via unknown vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wordpress-sentinel/" google-query: inurl:"/wp-content/plugins/wordpress-sentinel/" shodan-query: 'vuln:CVE-2011-5225' - tags: cve,wordpress,wp-plugin,wordpress-sentinel,medium + tags: cve,wordpress,wp-plugin,wordpress-sentinel,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5226-3d4fded5713d977453c4246e8903bc20.yaml b/nuclei-templates/2011/CVE-2011-5226-3d4fded5713d977453c4246e8903bc20.yaml index 576b24c851..8a5eb17304 100644 --- a/nuclei-templates/2011/CVE-2011-5226-3d4fded5713d977453c4246e8903bc20.yaml +++ b/nuclei-templates/2011/CVE-2011-5226-3d4fded5713d977453c4246e8903bc20.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Sentinel <= 1.0.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in wordpress_sentinel.php in the Sentinel plugin 1.0.0 for WordPress allows remote attackers to hijack the authentication of an administrator for requests that trigger snapshots. @@ -19,7 +19,7 @@ info: fofa-query: "wp-content/plugins/wordpress-sentinel/" google-query: inurl:"/wp-content/plugins/wordpress-sentinel/" shodan-query: 'vuln:CVE-2011-5226' - tags: cve,wordpress,wp-plugin,wordpress-sentinel,high + tags: cve,wordpress,wp-plugin,wordpress-sentinel,medium http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5254-2e3f61534eb2162d57847e92682b9bbd.yaml b/nuclei-templates/2011/CVE-2011-5254-2e3f61534eb2162d57847e92682b9bbd.yaml index 932cb22cb5..a3183f02f6 100644 --- a/nuclei-templates/2011/CVE-2011-5254-2e3f61534eb2162d57847e92682b9bbd.yaml +++ b/nuclei-templates/2011/CVE-2011-5254-2e3f61534eb2162d57847e92682b9bbd.yaml @@ -4,7 +4,7 @@ info: name: > Connections Business Directory < 0.7.1.6 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > The Connections plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 0.7.1.5 due to insufficient authorization checks. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/connections/" google-query: inurl:"/wp-content/plugins/connections/" shodan-query: 'vuln:CVE-2011-5254' - tags: cve,wordpress,wp-plugin,connections,medium + tags: cve,wordpress,wp-plugin,connections,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5257-376edc97e45ef94c79a753de3d636245.yaml b/nuclei-templates/2011/CVE-2011-5257-376edc97e45ef94c79a753de3d636245.yaml index b0b0cbeb62..4fa9e0ec63 100644 --- a/nuclei-templates/2011/CVE-2011-5257-376edc97e45ef94c79a753de3d636245.yaml +++ b/nuclei-templates/2011/CVE-2011-5257-376edc97e45ef94c79a753de3d636245.yaml @@ -4,7 +4,7 @@ info: name: > Classipress <= 3.1.4 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Classipress theme before 3.1.5 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) twitter_id parameter related to the Twitter widget and (2) facebook_id parameter related to the Facebook widget. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/classipress/" google-query: inurl:"/wp-content/themes/classipress/" shodan-query: 'vuln:CVE-2011-5257' - tags: cve,wordpress,wp-theme,classipress,medium + tags: cve,wordpress,wp-theme,classipress,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5265-9bc357ece2cde706b261987c1bf85bfa.yaml b/nuclei-templates/2011/CVE-2011-5265-9bc357ece2cde706b261987c1bf85bfa.yaml index 533761c0dc..560092e1d9 100644 --- a/nuclei-templates/2011/CVE-2011-5265-9bc357ece2cde706b261987c1bf85bfa.yaml +++ b/nuclei-templates/2011/CVE-2011-5265-9bc357ece2cde706b261987c1bf85bfa.yaml @@ -4,7 +4,7 @@ info: name: > Featurific For WordPress <= 1.6.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in cached_image.php in the Featurific For WordPress plugin 1.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the snum parameter. NOTE: this has been disputed by a third party. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/featurific-for-wordpress/" google-query: inurl:"/wp-content/plugins/featurific-for-wordpress/" shodan-query: 'vuln:CVE-2011-5265' - tags: cve,wordpress,wp-plugin,featurific-for-wordpress,medium + tags: cve,wordpress,wp-plugin,featurific-for-wordpress,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5286-fb94da76ff281a4e13dbc1c86ed0929d.yaml b/nuclei-templates/2011/CVE-2011-5286-fb94da76ff281a4e13dbc1c86ed0929d.yaml index 30ae0f08bb..c5b0f1a93a 100644 --- a/nuclei-templates/2011/CVE-2011-5286-fb94da76ff281a4e13dbc1c86ed0929d.yaml +++ b/nuclei-templates/2011/CVE-2011-5286-fb94da76ff281a4e13dbc1c86ed0929d.yaml @@ -4,7 +4,7 @@ info: name: > Social Slider < 7.4.2 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in social-slider-2/ajax.php in the Social Slider plugin before 7.4.2 for WordPress allows remote attackers to execute arbitrary SQL commands via the rA array parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/social-slider/" google-query: inurl:"/wp-content/plugins/social-slider/" shodan-query: 'vuln:CVE-2011-5286' - tags: cve,wordpress,wp-plugin,social-slider,high + tags: cve,wordpress,wp-plugin,social-slider,critical http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5304-18fe02250ff137adf75ad3081c09ea5f.yaml b/nuclei-templates/2011/CVE-2011-5304-18fe02250ff137adf75ad3081c09ea5f.yaml index c5abb6541e..34eb30ee22 100644 --- a/nuclei-templates/2011/CVE-2011-5304-18fe02250ff137adf75ad3081c09ea5f.yaml +++ b/nuclei-templates/2011/CVE-2011-5304-18fe02250ff137adf75ad3081c09ea5f.yaml @@ -4,7 +4,7 @@ info: name: > SodaHead Polls < 2.0.4 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Sodahead Polls plugin before 2.0.4 for WordPress allow remote attackers to inject arbitrary web script or HTML via (1) the poll_id parameter to customizer.php or (2) the customize parameter to poll.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sodahead-polls/" google-query: inurl:"/wp-content/plugins/sodahead-polls/" shodan-query: 'vuln:CVE-2011-5304' - tags: cve,wordpress,wp-plugin,sodahead-polls,medium + tags: cve,wordpress,wp-plugin,sodahead-polls,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5307-33a2e7fa2283855eea0bc65fb87d66e5.yaml b/nuclei-templates/2011/CVE-2011-5307-33a2e7fa2283855eea0bc65fb87d66e5.yaml index 8b08ead6d1..7eb79ab82b 100644 --- a/nuclei-templates/2011/CVE-2011-5307-33a2e7fa2283855eea0bc65fb87d66e5.yaml +++ b/nuclei-templates/2011/CVE-2011-5307-33a2e7fa2283855eea0bc65fb87d66e5.yaml @@ -4,7 +4,7 @@ info: name: > Photosmash Plugin < 1.0.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in index.php in the PhotoSmash plugin before 1.0.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the action parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/photosmash-galleries/" google-query: inurl:"/wp-content/plugins/photosmash-galleries/" shodan-query: 'vuln:CVE-2011-5307' - tags: cve,wordpress,wp-plugin,photosmash-galleries,medium + tags: cve,wordpress,wp-plugin,photosmash-galleries,high http: - method: GET diff --git a/nuclei-templates/2011/CVE-2011-5328-96bfdb264056a59de7cf266b01d0316c.yaml b/nuclei-templates/2011/CVE-2011-5328-96bfdb264056a59de7cf266b01d0316c.yaml index a347911e11..a464f0146a 100644 --- a/nuclei-templates/2011/CVE-2011-5328-96bfdb264056a59de7cf266b01d0316c.yaml +++ b/nuclei-templates/2011/CVE-2011-5328-96bfdb264056a59de7cf266b01d0316c.yaml @@ -4,7 +4,7 @@ info: name: > User Access Manager < 1.2 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The user-access-manager plugin before 1.2 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/user-access-manager/" google-query: inurl:"/wp-content/plugins/user-access-manager/" shodan-query: 'vuln:CVE-2011-5328' - tags: cve,wordpress,wp-plugin,user-access-manager,high + tags: cve,wordpress,wp-plugin,user-access-manager,medium http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-0287-77b2d106f56be975fb3bb74f975f0127.yaml b/nuclei-templates/2012/CVE-2012-0287-77b2d106f56be975fb3bb74f975f0127.yaml index 835d8b3bb7..ab957601ce 100644 --- a/nuclei-templates/2012/CVE-2012-0287-77b2d106f56be975fb3bb74f975f0127.yaml +++ b/nuclei-templates/2012/CVE-2012-0287-77b2d106f56be975fb3bb74f975f0127.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 3.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-comments-post.php in WordPress 3.3.x before 3.3.1, when Internet Explorer is used, allows remote attackers to inject arbitrary web script or HTML via the query string in a POST operation that is not properly handled by the "Duplicate comment detected" feature. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2012-0287 metadata: shodan-query: 'vuln:CVE-2012-0287' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-0895-1424f14be2dcb113b8417a6cefda326b.yaml b/nuclei-templates/2012/CVE-2012-0895-1424f14be2dcb113b8417a6cefda326b.yaml index 804eb30ff5..c5b4c6f01f 100644 --- a/nuclei-templates/2012/CVE-2012-0895-1424f14be2dcb113b8417a6cefda326b.yaml +++ b/nuclei-templates/2012/CVE-2012-0895-1424f14be2dcb113b8417a6cefda326b.yaml @@ -4,7 +4,7 @@ info: name: > Count per Day <= 3.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Count per Day plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘map’ parameter in versions up to, and including, 3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/count-per-day/" google-query: inurl:"/wp-content/plugins/count-per-day/" shodan-query: 'vuln:CVE-2012-0895' - tags: cve,wordpress,wp-plugin,count-per-day,medium + tags: cve,wordpress,wp-plugin,count-per-day,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-0901-4ad999fa82a381d094bc99654eb86aca.yaml b/nuclei-templates/2012/CVE-2012-0901-4ad999fa82a381d094bc99654eb86aca.yaml index e2b648ca1e..434e7cdc1c 100644 --- a/nuclei-templates/2012/CVE-2012-0901-4ad999fa82a381d094bc99654eb86aca.yaml +++ b/nuclei-templates/2012/CVE-2012-0901-4ad999fa82a381d094bc99654eb86aca.yaml @@ -4,7 +4,7 @@ info: name: > YouSayToo auto-publishing plugin <= 1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in yousaytoo.php in YouSayToo auto-publishing plugin 1.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the submit parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/yousaytoo-auto-publishing-plugin/" google-query: inurl:"/wp-content/plugins/yousaytoo-auto-publishing-plugin/" shodan-query: 'vuln:CVE-2012-0901' - tags: cve,wordpress,wp-plugin,yousaytoo-auto-publishing-plugin,medium + tags: cve,wordpress,wp-plugin,yousaytoo-auto-publishing-plugin,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-10009-af8b6c1405ca4fecbb6348cbb779bff6.yaml b/nuclei-templates/2012/CVE-2012-10009-af8b6c1405ca4fecbb6348cbb779bff6.yaml index 7c5311e031..4d1ade20af 100644 --- a/nuclei-templates/2012/CVE-2012-10009-af8b6c1405ca4fecbb6348cbb779bff6.yaml +++ b/nuclei-templates/2012/CVE-2012-10009-af8b6c1405ca4fecbb6348cbb779bff6.yaml @@ -4,7 +4,7 @@ info: name: > 404like <= 1.0 - SQL Injection author: topscoder - severity: high + severity: critical description: > The 404Like plugin for WordPress is vulnerable to SQL Injection via the searchWord parameter in all versions up to, and including, 1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/404like/" google-query: inurl:"/wp-content/plugins/404like/" shodan-query: 'vuln:CVE-2012-10009' - tags: cve,wordpress,wp-plugin,404like,high + tags: cve,wordpress,wp-plugin,404like,critical http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-1068-d9b7779382ec9bca0dc96d41eb9855af.yaml b/nuclei-templates/2012/CVE-2012-1068-d9b7779382ec9bca0dc96d41eb9855af.yaml index b05d764584..2ad9cc0088 100644 --- a/nuclei-templates/2012/CVE-2012-1068-d9b7779382ec9bca0dc96d41eb9855af.yaml +++ b/nuclei-templates/2012/CVE-2012-1068-d9b7779382ec9bca0dc96d41eb9855af.yaml @@ -4,7 +4,7 @@ info: name: > WP-RecentComments <= 2.0.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the rc_ajax function in core.php in the WP-RecentComments plugin before 2.0.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter, related to AJAX paging. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-recentcomments/" google-query: inurl:"/wp-content/plugins/wp-recentcomments/" shodan-query: 'vuln:CVE-2012-1068' - tags: cve,wordpress,wp-plugin,wp-recentcomments,medium + tags: cve,wordpress,wp-plugin,wp-recentcomments,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-1785-062f64c8e6a3f6d8894bd4ff8b102cb3.yaml b/nuclei-templates/2012/CVE-2012-1785-062f64c8e6a3f6d8894bd4ff8b102cb3.yaml index 9fc381c45e..3fb3a8f7c2 100644 --- a/nuclei-templates/2012/CVE-2012-1785-062f64c8e6a3f6d8894bd4ff8b102cb3.yaml +++ b/nuclei-templates/2012/CVE-2012-1785-062f64c8e6a3f6d8894bd4ff8b102cb3.yaml @@ -4,7 +4,7 @@ info: name: > Videopack (formerly Video Embed & Thumbnail Generator) < 2.0 - Remote Code Execution author: topscoder - severity: high + severity: critical description: > The Videopack (formerly Video Embed & Thumbnail Generator) plugin for WordPress is vulnerable to remote code execution in versions up to 2.0 due to insufficient input validation on data supplied to the runCom() function that executes code. This makes it possible for attackers to run arbitrary code on the system. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/video-embed-thumbnail-generator/" google-query: inurl:"/wp-content/plugins/video-embed-thumbnail-generator/" shodan-query: 'vuln:CVE-2012-1785' - tags: cve,wordpress,wp-plugin,video-embed-thumbnail-generator,high + tags: cve,wordpress,wp-plugin,video-embed-thumbnail-generator,critical http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-1834-ad3b6e67373c173a68de7fe25df960c3.yaml b/nuclei-templates/2012/CVE-2012-1834-ad3b6e67373c173a68de7fe25df960c3.yaml index 7374910bb0..c28b34ef97 100644 --- a/nuclei-templates/2012/CVE-2012-1834-ad3b6e67373c173a68de7fe25df960c3.yaml +++ b/nuclei-templates/2012/CVE-2012-1834-ad3b6e67373c173a68de7fe25df960c3.yaml @@ -4,7 +4,7 @@ info: name: > CMS Tree Page View < 0.8.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the cms_tpv_admin_head function in functions.php in the CMS Tree Page View plugin before 0.8.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the cms_tpv_view parameter to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cms-tree-page-view/" google-query: inurl:"/wp-content/plugins/cms-tree-page-view/" shodan-query: 'vuln:CVE-2012-1834' - tags: cve,wordpress,wp-plugin,cms-tree-page-view,medium + tags: cve,wordpress,wp-plugin,cms-tree-page-view,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-2371-00db16fbca7a4f9a03bd9187fe606bf2.yaml b/nuclei-templates/2012/CVE-2012-2371-00db16fbca7a4f9a03bd9187fe606bf2.yaml index eac47863d5..8f879aeb29 100644 --- a/nuclei-templates/2012/CVE-2012-2371-00db16fbca7a4f9a03bd9187fe606bf2.yaml +++ b/nuclei-templates/2012/CVE-2012-2371-00db16fbca7a4f9a03bd9187fe606bf2.yaml @@ -4,7 +4,7 @@ info: name: > WP-FaceThumb < 0.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in index.php in the WP-FaceThumb plugin 0.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the pagination_wp_facethumb parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-facethumb/" google-query: inurl:"/wp-content/plugins/wp-facethumb/" shodan-query: 'vuln:CVE-2012-2371' - tags: cve,wordpress,wp-plugin,wp-facethumb,medium + tags: cve,wordpress,wp-plugin,wp-facethumb,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-2402-0422552738ed57c09ee0769345670612.yaml b/nuclei-templates/2012/CVE-2012-2402-0422552738ed57c09ee0769345670612.yaml index e46d438134..84447f4bd4 100644 --- a/nuclei-templates/2012/CVE-2012-2402-0422552738ed57c09ee0769345670612.yaml +++ b/nuclei-templates/2012/CVE-2012-2402-0422552738ed57c09ee0769345670612.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 3.3.2 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > wp-admin/plugins.php in WordPress before 3.3.2 allows remote authenticated site administrators to bypass intended access restrictions and deactivate network-wide plugins via unspecified vectors. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2012-2402 metadata: shodan-query: 'vuln:CVE-2012-2402' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-2403-44d43af8a00799ed8cf48db72cbbf122.yaml b/nuclei-templates/2012/CVE-2012-2403-44d43af8a00799ed8cf48db72cbbf122.yaml index 4602f0842c..10e52328b6 100644 --- a/nuclei-templates/2012/CVE-2012-2403-44d43af8a00799ed8cf48db72cbbf122.yaml +++ b/nuclei-templates/2012/CVE-2012-2403-44d43af8a00799ed8cf48db72cbbf122.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 3.3.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > wp-includes/formatting.php in WordPress before 3.3.2 attempts to enable clickable links inside attributes, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2012-2403 metadata: shodan-query: 'vuln:CVE-2012-2403' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-2404-43262c5eaf25f49cf932dd17aa5ab966.yaml b/nuclei-templates/2012/CVE-2012-2404-43262c5eaf25f49cf932dd17aa5ab966.yaml index be089b3337..4d75d00cf5 100644 --- a/nuclei-templates/2012/CVE-2012-2404-43262c5eaf25f49cf932dd17aa5ab966.yaml +++ b/nuclei-templates/2012/CVE-2012-2404-43262c5eaf25f49cf932dd17aa5ab966.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 3.3.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > wp-comments-post.php in WordPress before 3.3.2 supports offsite redirects, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2012-2404 metadata: shodan-query: 'vuln:CVE-2012-2404' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-2572-260d59850520222ae9e82cf8d0c5f77a.yaml b/nuclei-templates/2012/CVE-2012-2572-260d59850520222ae9e82cf8d0c5f77a.yaml index 464c1826d9..a6b4ebe614 100644 --- a/nuclei-templates/2012/CVE-2012-2572-260d59850520222ae9e82cf8d0c5f77a.yaml +++ b/nuclei-templates/2012/CVE-2012-2572-260d59850520222ae9e82cf8d0c5f77a.yaml @@ -4,7 +4,7 @@ info: name: > ThreeWP Email Reflector < 1.16 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the ThreeWP Email Reflector plugin before 1.16 for WordPress allows remote attackers to inject arbitrary web script or HTML via the Subject of an email. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/threewp-email-reflector/" google-query: inurl:"/wp-content/plugins/threewp-email-reflector/" shodan-query: 'vuln:CVE-2012-2572' - tags: cve,wordpress,wp-plugin,threewp-email-reflector,medium + tags: cve,wordpress,wp-plugin,threewp-email-reflector,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-2579-bdefbe0337f0d8136e413e9977ce9dce.yaml b/nuclei-templates/2012/CVE-2012-2579-bdefbe0337f0d8136e413e9977ce9dce.yaml index 23036c240d..f328837148 100644 --- a/nuclei-templates/2012/CVE-2012-2579-bdefbe0337f0d8136e413e9977ce9dce.yaml +++ b/nuclei-templates/2012/CVE-2012-2579-bdefbe0337f0d8136e413e9977ce9dce.yaml @@ -4,7 +4,7 @@ info: name: > WP SimpleMail <= 1.0.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the WP SimpleMail plugin 1.0.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) To, (2) From, (3) Date, or (4) Subject field of an email. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-simplemail/" google-query: inurl:"/wp-content/plugins/wp-simplemail/" shodan-query: 'vuln:CVE-2012-2579' - tags: cve,wordpress,wp-plugin,wp-simplemail,medium + tags: cve,wordpress,wp-plugin,wp-simplemail,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-2633-4b2830a65cedd0c5dc26608a77f72c10.yaml b/nuclei-templates/2012/CVE-2012-2633-4b2830a65cedd0c5dc26608a77f72c10.yaml index 4fe650bb83..34b3b04f42 100644 --- a/nuclei-templates/2012/CVE-2012-2633-4b2830a65cedd0c5dc26608a77f72c10.yaml +++ b/nuclei-templates/2012/CVE-2012-2633-4b2830a65cedd0c5dc26608a77f72c10.yaml @@ -4,7 +4,7 @@ info: name: > WassUp Real Time Analytics < 1.8.3.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wassup.php in the WassUp plugin before 1.8.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the User-Agent HTTP header. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wassup/" google-query: inurl:"/wp-content/plugins/wassup/" shodan-query: 'vuln:CVE-2012-2633' - tags: cve,wordpress,wp-plugin,wassup,medium + tags: cve,wordpress,wp-plugin,wassup,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-2759-7bcea995c31208e7b3ae2001fc2e0fd5.yaml b/nuclei-templates/2012/CVE-2012-2759-7bcea995c31208e7b3ae2001fc2e0fd5.yaml index af593b2b66..7d0293f1df 100644 --- a/nuclei-templates/2012/CVE-2012-2759-7bcea995c31208e7b3ae2001fc2e0fd5.yaml +++ b/nuclei-templates/2012/CVE-2012-2759-7bcea995c31208e7b3ae2001fc2e0fd5.yaml @@ -4,7 +4,7 @@ info: name: > Login With Ajax <= 3.0.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in login-with-ajax.php in the Login With Ajax (aka login-with-ajax) plugin before 3.0.4.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the callback parameter in a lostpassword action to wp-login.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/login-with-ajax/" google-query: inurl:"/wp-content/plugins/login-with-ajax/" shodan-query: 'vuln:CVE-2012-2759' - tags: cve,wordpress,wp-plugin,login-with-ajax,medium + tags: cve,wordpress,wp-plugin,login-with-ajax,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-2912-d0e94011e5fe6201731b0911afc2291e.yaml b/nuclei-templates/2012/CVE-2012-2912-d0e94011e5fe6201731b0911afc2291e.yaml index 858470e8ea..4150bad533 100644 --- a/nuclei-templates/2012/CVE-2012-2912-d0e94011e5fe6201731b0911afc2291e.yaml +++ b/nuclei-templates/2012/CVE-2012-2912-d0e94011e5fe6201731b0911afc2291e.yaml @@ -4,7 +4,7 @@ info: name: > LeagueManager <= 3.7 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the LeagueManager plugin 3.7 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) group parameter in the show-league page or (2) season parameter in the team page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/leaguemanager/" google-query: inurl:"/wp-content/plugins/leaguemanager/" shodan-query: 'vuln:CVE-2012-2912' - tags: cve,wordpress,wp-plugin,leaguemanager,medium + tags: cve,wordpress,wp-plugin,leaguemanager,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-2913-d4c7d6015d840d0227eb1573d5a3b347.yaml b/nuclei-templates/2012/CVE-2012-2913-d4c7d6015d840d0227eb1573d5a3b347.yaml index 3ea61d4476..f62b287b5a 100644 --- a/nuclei-templates/2012/CVE-2012-2913-d4c7d6015d840d0227eb1573d5a3b347.yaml +++ b/nuclei-templates/2012/CVE-2012-2913-d4c7d6015d840d0227eb1573d5a3b347.yaml @@ -4,7 +4,7 @@ info: name: > Leaflet Maps Marker (Google Maps, OpenStreetMap, Bing Maps) < 2.3.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Leaflet plugin before 2.3.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via the id parameter to (1) leaflet_layer.php or (2) leaflet_marker.php, as reachable through wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/leaflet-maps-marker/" google-query: inurl:"/wp-content/plugins/leaflet-maps-marker/" shodan-query: 'vuln:CVE-2012-2913' - tags: cve,wordpress,wp-plugin,leaflet-maps-marker,medium + tags: cve,wordpress,wp-plugin,leaflet-maps-marker,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-2916-8a88cbe198527237519cb3478f4555ce.yaml b/nuclei-templates/2012/CVE-2012-2916-8a88cbe198527237519cb3478f4555ce.yaml index 91e4915feb..b1a3ea0dc3 100644 --- a/nuclei-templates/2012/CVE-2012-2916-8a88cbe198527237519cb3478f4555ce.yaml +++ b/nuclei-templates/2012/CVE-2012-2916-8a88cbe198527237519cb3478f4555ce.yaml @@ -4,7 +4,7 @@ info: name: > Sabre < 1.2.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in sabre_class_admin.php in the SABRE plugin before 2.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the active_option parameter to wp-admin/tools.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sabre/" google-query: inurl:"/wp-content/plugins/sabre/" shodan-query: 'vuln:CVE-2012-2916' - tags: cve,wordpress,wp-plugin,sabre,medium + tags: cve,wordpress,wp-plugin,sabre,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-2920-8e79000a55d2a7778e1f3a653b09e17f.yaml b/nuclei-templates/2012/CVE-2012-2920-8e79000a55d2a7778e1f3a653b09e17f.yaml index 74f0aff1ca..0c2f64f2ce 100644 --- a/nuclei-templates/2012/CVE-2012-2920-8e79000a55d2a7778e1f3a653b09e17f.yaml +++ b/nuclei-templates/2012/CVE-2012-2920-8e79000a55d2a7778e1f3a653b09e17f.yaml @@ -4,7 +4,7 @@ info: name: > User Photo <= 0.9.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the userphoto_options_page function in user-photo.php in the User Photo plugin before 0.9.5.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to wp-admin/options-general.php. NOTE: some of these details are obtained from third party information. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/user-photo/" google-query: inurl:"/wp-content/plugins/user-photo/" shodan-query: 'vuln:CVE-2012-2920' - tags: cve,wordpress,wp-plugin,user-photo,medium + tags: cve,wordpress,wp-plugin,user-photo,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-3383-41bfd816790097549bf9b2c052568033.yaml b/nuclei-templates/2012/CVE-2012-3383-41bfd816790097549bf9b2c052568033.yaml index b51feed27d..a87fe01c70 100644 --- a/nuclei-templates/2012/CVE-2012-3383-41bfd816790097549bf9b2c052568033.yaml +++ b/nuclei-templates/2012/CVE-2012-3383-41bfd816790097549bf9b2c052568033.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 3.4.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The map_meta_cap function in wp-includes/capabilities.php in WordPress 3.4.x before 3.4.2, when the multisite feature is enabled, does not properly assign the unfiltered_html capability, which allows remote authenticated users to bypass intended access restrictions and conduct cross-site scripting (XSS) attacks by leveraging the Administrator or Editor role and composing crafted text. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2012-3383 metadata: shodan-query: 'vuln:CVE-2012-3383' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-3384-91015e7f81886f4b730bb4d9cace5ff4.yaml b/nuclei-templates/2012/CVE-2012-3384-91015e7f81886f4b730bb4d9cace5ff4.yaml index 64e326de16..e670772800 100644 --- a/nuclei-templates/2012/CVE-2012-3384-91015e7f81886f4b730bb4d9cace5ff4.yaml +++ b/nuclei-templates/2012/CVE-2012-3384-91015e7f81886f4b730bb4d9cace5ff4.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 3.4.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the customizer in WordPress before 3.4.1 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2012-3384 metadata: shodan-query: 'vuln:CVE-2012-3384' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,medium http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-3414-568514847d2ecbfcd9be56c047f3a92a.yaml b/nuclei-templates/2012/CVE-2012-3414-568514847d2ecbfcd9be56c047f3a92a.yaml index 086ea6a520..9a29315d80 100644 --- a/nuclei-templates/2012/CVE-2012-3414-568514847d2ecbfcd9be56c047f3a92a.yaml +++ b/nuclei-templates/2012/CVE-2012-3414-568514847d2ecbfcd9be56c047f3a92a.yaml @@ -4,7 +4,7 @@ info: name: > SWFUpload <= 2.2.0.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in swfupload.swf in SWFUpload 2.2.0.1 and earlier, as used in WordPress before 3.3.2, TinyMCE Image Manager 1.1, and other products, allows remote attackers to inject arbitrary web script or HTML via the movieName parameter, related to the "ExternalInterface.call" function. reference: @@ -14,17 +14,17 @@ info: cvss-score: 6.1 cve-id: CVE-2012-3414 metadata: - fofa-query: "wp-content/plugins/wp-ecommerce-cvs-importer/" - google-query: inurl:"/wp-content/plugins/wp-ecommerce-cvs-importer/" + fofa-query: "wp-content/plugins/pica-photo-gallery/" + google-query: inurl:"/wp-content/plugins/pica-photo-gallery/" shodan-query: 'vuln:CVE-2012-3414' - tags: cve,wordpress,wp-plugin,wp-ecommerce-cvs-importer,medium + tags: cve,wordpress,wp-plugin,pica-photo-gallery,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/wp-ecommerce-cvs-importer/readme.txt" + - "{{BaseURL}}/wp-content/plugins/pica-photo-gallery/readme.txt" extractors: - type: regex @@ -50,7 +50,7 @@ http: - type: word words: - - "wp-ecommerce-cvs-importer" + - "pica-photo-gallery" part: body - type: dsl diff --git a/nuclei-templates/2012/CVE-2012-3414-7849f4bf55847e7dee539697b18e4bc9.yaml b/nuclei-templates/2012/CVE-2012-3414-7849f4bf55847e7dee539697b18e4bc9.yaml index d135a9917e..aef370e355 100644 --- a/nuclei-templates/2012/CVE-2012-3414-7849f4bf55847e7dee539697b18e4bc9.yaml +++ b/nuclei-templates/2012/CVE-2012-3414-7849f4bf55847e7dee539697b18e4bc9.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 3.3.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in swfupload.swf in SWFUpload 2.2.0.1 and earlier, as used in WordPress before 3.3.2, TinyMCE Image Manager 1.1, and other products, allows remote attackers to inject arbitrary web script or HTML via the movieName parameter, related to the "ExternalInterface.call" function. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2012-3414 metadata: shodan-query: 'vuln:CVE-2012-3414' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-3414-b7c464860f475ded8d2ed3cd59a1ad52.yaml b/nuclei-templates/2012/CVE-2012-3414-b7c464860f475ded8d2ed3cd59a1ad52.yaml index 8744fc0e42..8ae6bd2142 100644 --- a/nuclei-templates/2012/CVE-2012-3414-b7c464860f475ded8d2ed3cd59a1ad52.yaml +++ b/nuclei-templates/2012/CVE-2012-3414-b7c464860f475ded8d2ed3cd59a1ad52.yaml @@ -4,7 +4,7 @@ info: name: > NextGen Gallery <= 1.9.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The NextGen Gallery plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via swfupload.swf in versions up to, and including, 1.9.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nextgen-gallery/" google-query: inurl:"/wp-content/plugins/nextgen-gallery/" shodan-query: 'vuln:CVE-2012-3414' - tags: cve,wordpress,wp-plugin,nextgen-gallery,medium + tags: cve,wordpress,wp-plugin,nextgen-gallery,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-3434-ba663052cd3e15a64b57c5574e6284ee.yaml b/nuclei-templates/2012/CVE-2012-3434-ba663052cd3e15a64b57c5574e6284ee.yaml index 9d306fbab0..6ecbfc15e5 100644 --- a/nuclei-templates/2012/CVE-2012-3434-ba663052cd3e15a64b57c5574e6284ee.yaml +++ b/nuclei-templates/2012/CVE-2012-3434-ba663052cd3e15a64b57c5574e6284ee.yaml @@ -4,7 +4,7 @@ info: name: > Count Per Day <= 3.1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in userperspan.php in the Count Per Day module before 3.2 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) page, (2) datemin, or (3) datemax parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/count-per-day/" google-query: inurl:"/wp-content/plugins/count-per-day/" shodan-query: 'vuln:CVE-2012-3434' - tags: cve,wordpress,wp-plugin,count-per-day,medium + tags: cve,wordpress,wp-plugin,count-per-day,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-4226-ab4d33853504febd7c01f9cee8c9c3d2.yaml b/nuclei-templates/2012/CVE-2012-4226-ab4d33853504febd7c01f9cee8c9c3d2.yaml index 1ef7df9bcb..557c305f99 100644 --- a/nuclei-templates/2012/CVE-2012-4226-ab4d33853504febd7c01f9cee8c9c3d2.yaml +++ b/nuclei-templates/2012/CVE-2012-4226-ab4d33853504febd7c01f9cee8c9c3d2.yaml @@ -4,7 +4,7 @@ info: name: > Quick Post Widget <= 1.9.1 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in Quick Post Widget plugin 1.9.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) Title, (2) Content, or (3) New category field to wordpress/ or (4) query string to wordpress/. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/quick-post-widget/" google-query: inurl:"/wp-content/plugins/quick-post-widget/" shodan-query: 'vuln:CVE-2012-4226' - tags: cve,wordpress,wp-plugin,quick-post-widget,medium + tags: cve,wordpress,wp-plugin,quick-post-widget,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-4242-bf34e0d076673dbb1080a2742b54fd0c.yaml b/nuclei-templates/2012/CVE-2012-4242-bf34e0d076673dbb1080a2742b54fd0c.yaml index 42ed39541c..8b963f67b6 100644 --- a/nuclei-templates/2012/CVE-2012-4242-bf34e0d076673dbb1080a2742b54fd0c.yaml +++ b/nuclei-templates/2012/CVE-2012-4242-bf34e0d076673dbb1080a2742b54fd0c.yaml @@ -4,7 +4,7 @@ info: name: > MF Gig Calendar <= 0.9.4.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the MF Gig Calendar plugin < 0.9.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the query string to the calendar page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mf-gig-calendar/" google-query: inurl:"/wp-content/plugins/mf-gig-calendar/" shodan-query: 'vuln:CVE-2012-4242' - tags: cve,wordpress,wp-plugin,mf-gig-calendar,medium + tags: cve,wordpress,wp-plugin,mf-gig-calendar,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-4264-d3827d64e2bdf966f3d9c111c132ea14.yaml b/nuclei-templates/2012/CVE-2012-4264-d3827d64e2bdf966f3d9c111c132ea14.yaml index 7566cd9521..a43cdd8d45 100644 --- a/nuclei-templates/2012/CVE-2012-4264-d3827d64e2bdf966f3d9c111c132ea14.yaml +++ b/nuclei-templates/2012/CVE-2012-4264-d3827d64e2bdf966f3d9c111c132ea14.yaml @@ -4,7 +4,7 @@ info: name: > Better WP Security <= 3.2.4 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Better WP Security (better_wp_security) plugin before 3.2.5 for WordPress allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to "server variables," a different vulnerability than CVE-2012-4263. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/better-wp-security/" google-query: inurl:"/wp-content/plugins/better-wp-security/" shodan-query: 'vuln:CVE-2012-4264' - tags: cve,wordpress,wp-plugin,better-wp-security,medium + tags: cve,wordpress,wp-plugin,better-wp-security,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-4271-0638cf0d113b279b6ab4547692f6759f.yaml b/nuclei-templates/2012/CVE-2012-4271-0638cf0d113b279b6ab4547692f6759f.yaml index 7fff00a79f..74ebdcb1a7 100644 --- a/nuclei-templates/2012/CVE-2012-4271-0638cf0d113b279b6ab4547692f6759f.yaml +++ b/nuclei-templates/2012/CVE-2012-4271-0638cf0d113b279b6ab4547692f6759f.yaml @@ -4,7 +4,7 @@ info: name: > Bad Behavior < 2.0.47 & 2.2.0 - 2.2.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in bad-behavior-wordpress-admin.php in the Bad Behavior plugin before 2.0.47 and 2.2.x before 2.2.5 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) PATH_INFO, (2) httpbl_key, (3) httpbl_maxage, (4) httpbl_threat, (5) reverse_proxy_addresses, or (6) reverse_proxy_header parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bad-behavior/" google-query: inurl:"/wp-content/plugins/bad-behavior/" shodan-query: 'vuln:CVE-2012-4271' - tags: cve,wordpress,wp-plugin,bad-behavior,medium + tags: cve,wordpress,wp-plugin,bad-behavior,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-4272-a6ea9efcd2b00d833f3dd3cae90d9348.yaml b/nuclei-templates/2012/CVE-2012-4272-a6ea9efcd2b00d833f3dd3cae90d9348.yaml index 9472482eac..b2fa758456 100644 --- a/nuclei-templates/2012/CVE-2012-4272-a6ea9efcd2b00d833f3dd3cae90d9348.yaml +++ b/nuclei-templates/2012/CVE-2012-4272-a6ea9efcd2b00d833f3dd3cae90d9348.yaml @@ -4,7 +4,7 @@ info: name: > 2 Click Social Media Buttons <= 0.33 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the 2 Click Social Media Buttons plugin before 0.34 for WordPress allow remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the "processing of the buttons of Xing and Pinterest". reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/2-click-socialmedia-buttons/" google-query: inurl:"/wp-content/plugins/2-click-socialmedia-buttons/" shodan-query: 'vuln:CVE-2012-4272' - tags: cve,wordpress,wp-plugin,2-click-socialmedia-buttons,medium + tags: cve,wordpress,wp-plugin,2-click-socialmedia-buttons,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-4273-50d503ecab241e54444834a8beaebf25.yaml b/nuclei-templates/2012/CVE-2012-4273-50d503ecab241e54444834a8beaebf25.yaml index 93411f8c82..d4100e67f2 100644 --- a/nuclei-templates/2012/CVE-2012-4273-50d503ecab241e54444834a8beaebf25.yaml +++ b/nuclei-templates/2012/CVE-2012-4273-50d503ecab241e54444834a8beaebf25.yaml @@ -4,7 +4,7 @@ info: name: > 2 Click Social Media Buttons < 0.34 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in libs/xing.php in the 2 Click Social Media Buttons plugin before 0.34 for WordPress allows remote attackers to inject arbitrary web script or HTML via the xing-url parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/2-click-socialmedia-buttons/" google-query: inurl:"/wp-content/plugins/2-click-socialmedia-buttons/" shodan-query: 'vuln:CVE-2012-4273' - tags: cve,wordpress,wp-plugin,2-click-socialmedia-buttons,medium + tags: cve,wordpress,wp-plugin,2-click-socialmedia-buttons,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-4283-ec063e4ec21933641631e905d4f64602.yaml b/nuclei-templates/2012/CVE-2012-4283-ec063e4ec21933641631e905d4f64602.yaml index 1b8a080b9f..679e761969 100644 --- a/nuclei-templates/2012/CVE-2012-4283-ec063e4ec21933641631e905d4f64602.yaml +++ b/nuclei-templates/2012/CVE-2012-4283-ec063e4ec21933641631e905d4f64602.yaml @@ -4,7 +4,7 @@ info: name: > Login With Ajax < 3.0.4.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Login With Ajax plugin before 3.0.4.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the callback parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/login-with-ajax/" google-query: inurl:"/wp-content/plugins/login-with-ajax/" shodan-query: 'vuln:CVE-2012-4283' - tags: cve,wordpress,wp-plugin,login-with-ajax,medium + tags: cve,wordpress,wp-plugin,login-with-ajax,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-4421-4e1daaf317e651c619a375744a295c28.yaml b/nuclei-templates/2012/CVE-2012-4421-4e1daaf317e651c619a375744a295c28.yaml index 62303c93c4..12cd4d27a0 100644 --- a/nuclei-templates/2012/CVE-2012-4421-4e1daaf317e651c619a375744a295c28.yaml +++ b/nuclei-templates/2012/CVE-2012-4421-4e1daaf317e651c619a375744a295c28.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 3.4.2 - Missing Authorization Checks on create_post author: topscoder - severity: medium + severity: high description: > The create_post function in wp-includes/class-wp-atom-server.php in WordPress before 3.4.2 does not perform a capability check, which allows remote authenticated users to bypass intended access restrictions and publish new posts by leveraging the Contributor role and using the Atom Publishing Protocol (aka AtomPub) feature. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2012-4421 metadata: shodan-query: 'vuln:CVE-2012-4421' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-4422-9717160fae4fbf7e432e0ecf4fa6857d.yaml b/nuclei-templates/2012/CVE-2012-4422-9717160fae4fbf7e432e0ecf4fa6857d.yaml index 209139cf70..994b39e951 100644 --- a/nuclei-templates/2012/CVE-2012-4422-9717160fae4fbf7e432e0ecf4fa6857d.yaml +++ b/nuclei-templates/2012/CVE-2012-4422-9717160fae4fbf7e432e0ecf4fa6857d.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 3.4.2 - Missing Authorization Checks author: topscoder - severity: low + severity: high description: > wp-admin/plugins.php in WordPress before 3.4.2, when the multisite feature is enabled, does not check for network-administrator privileges before performing a network-wide activation of an installed plugin, which might allow remote authenticated users to make unintended plugin changes by leveraging the Administrator role. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2012-4422 metadata: shodan-query: 'vuln:CVE-2012-4422' - tags: cve,wordpress,wp-core,low + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-4874-c888a527d839638dab34ddfabb9982e5.yaml b/nuclei-templates/2012/CVE-2012-4874-c888a527d839638dab34ddfabb9982e5.yaml index 41cf1c7890..9bdb4a156f 100644 --- a/nuclei-templates/2012/CVE-2012-4874-c888a527d839638dab34ddfabb9982e5.yaml +++ b/nuclei-templates/2012/CVE-2012-4874-c888a527d839638dab34ddfabb9982e5.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Classifieds Plugin – Ad Directory & Listings by AWP Classifieds < 2.0 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > The WordPress Classifieds Plugin – Ad Directory & Listings by AWP Classifieds plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the admin_handleimagesupload function in versions up to, and including, 1.8.9.4. This makes it possible for authenticated attackers, with administrator-level permissions and above, to upload arbitrary files on the affected sites server which may make remote code execution possible. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/another-wordpress-classifieds-plugin/" google-query: inurl:"/wp-content/plugins/another-wordpress-classifieds-plugin/" shodan-query: 'vuln:CVE-2012-4874' - tags: cve,wordpress,wp-plugin,another-wordpress-classifieds-plugin,high + tags: cve,wordpress,wp-plugin,another-wordpress-classifieds-plugin,critical http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-4921-668be2a6a44dad3bba943de0f544a515.yaml b/nuclei-templates/2012/CVE-2012-4921-668be2a6a44dad3bba943de0f544a515.yaml index 7f2663f2fd..5eb99447fc 100644 --- a/nuclei-templates/2012/CVE-2012-4921-668be2a6a44dad3bba943de0f544a515.yaml +++ b/nuclei-templates/2012/CVE-2012-4921-668be2a6a44dad3bba943de0f544a515.yaml @@ -4,7 +4,7 @@ info: name: > DVS Custom Notification <= 1.0.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the DVS Custom Notification plugin 1.0.1 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change application settings or (2) conduct cross-site scripting (XSS) attacks. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/dvs-custom-notification/" google-query: inurl:"/wp-content/plugins/dvs-custom-notification/" shodan-query: 'vuln:CVE-2012-4921' - tags: cve,wordpress,wp-plugin,dvs-custom-notification,high + tags: cve,wordpress,wp-plugin,dvs-custom-notification,medium http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-5177-ed4c279d09c7012524c7ccab923e2ae4.yaml b/nuclei-templates/2012/CVE-2012-5177-ed4c279d09c7012524c7ccab923e2ae4.yaml index 27cfc0c6ed..fab1747892 100644 --- a/nuclei-templates/2012/CVE-2012-5177-ed4c279d09c7012524c7ccab923e2ae4.yaml +++ b/nuclei-templates/2012/CVE-2012-5177-ed4c279d09c7012524c7ccab923e2ae4.yaml @@ -4,7 +4,7 @@ info: name: > Welcart e-Commerce < 1.2.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Welcart plugin before 1.2.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/usc-e-shop/" google-query: inurl:"/wp-content/plugins/usc-e-shop/" shodan-query: 'vuln:CVE-2012-5177' - tags: cve,wordpress,wp-plugin,usc-e-shop,medium + tags: cve,wordpress,wp-plugin,usc-e-shop,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-5178-87df231a3fe89988f05561dc4a2eda17.yaml b/nuclei-templates/2012/CVE-2012-5178-87df231a3fe89988f05561dc4a2eda17.yaml index e5d214d664..a76123bc29 100644 --- a/nuclei-templates/2012/CVE-2012-5178-87df231a3fe89988f05561dc4a2eda17.yaml +++ b/nuclei-templates/2012/CVE-2012-5178-87df231a3fe89988f05561dc4a2eda17.yaml @@ -4,7 +4,7 @@ info: name: > Welcart e-Commerce < 1.2.2 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the Welcart plugin before 1.2.2 for WordPress allows remote attackers to hijack the authentication of arbitrary users for requests that complete a purchase. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/usc-e-shop/" google-query: inurl:"/wp-content/plugins/usc-e-shop/" shodan-query: 'vuln:CVE-2012-5178' - tags: cve,wordpress,wp-plugin,usc-e-shop,high + tags: cve,wordpress,wp-plugin,usc-e-shop,medium http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-5325-552fdceb70e178ef12665118f36af7cf.yaml b/nuclei-templates/2012/CVE-2012-5325-552fdceb70e178ef12665118f36af7cf.yaml index 19bba6b682..53171e78dc 100644 --- a/nuclei-templates/2012/CVE-2012-5325-552fdceb70e178ef12665118f36af7cf.yaml +++ b/nuclei-templates/2012/CVE-2012-5325-552fdceb70e178ef12665118f36af7cf.yaml @@ -4,7 +4,7 @@ info: name: > Shortcode Redirect <= 1.0.01 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the scr_do_redirect function in scr.php in the Shortcode Redirect plugin 1.0.01 and earlier for WordPress allow remote authenticated users with certain permissions to inject arbitrary web script or HTML via the (1) url or (2) sec attributes in a redirect tag. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/shortcode-redirect/" google-query: inurl:"/wp-content/plugins/shortcode-redirect/" shodan-query: 'vuln:CVE-2012-5325' - tags: cve,wordpress,wp-plugin,shortcode-redirect,medium + tags: cve,wordpress,wp-plugin,shortcode-redirect,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-5327-fb045d9c371baeb404b4c5f1d77f622c.yaml b/nuclei-templates/2012/CVE-2012-5327-fb045d9c371baeb404b4c5f1d77f622c.yaml index be372505fa..d02f4dfecb 100644 --- a/nuclei-templates/2012/CVE-2012-5327-fb045d9c371baeb404b4c5f1d77f622c.yaml +++ b/nuclei-templates/2012/CVE-2012-5327-fb045d9c371baeb404b4c5f1d77f622c.yaml @@ -4,7 +4,7 @@ info: name: > Mingle Forum <= 1.0.32.1 - SQL Injection author: topscoder - severity: high + severity: critical description: > Multiple SQL injection vulnerabilities in fs-admin/fs-admin.php in the Mingle Forum plugin 1.0.32.1 and other versions before 1.0.33 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) delete_usrgrp[] parameter in a delete_usergroups action, (2) usergroup parameter in an add_user_togroup action, or (3) add_forum_group_id parameter in an add_forum_submit action. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mingle-forum/" google-query: inurl:"/wp-content/plugins/mingle-forum/" shodan-query: 'vuln:CVE-2012-5327' - tags: cve,wordpress,wp-plugin,mingle-forum,high + tags: cve,wordpress,wp-plugin,mingle-forum,critical http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-5328-ca1107b3905cae6801d38dcd71b363a8.yaml b/nuclei-templates/2012/CVE-2012-5328-ca1107b3905cae6801d38dcd71b363a8.yaml index a6716385ac..3b7e064a91 100644 --- a/nuclei-templates/2012/CVE-2012-5328-ca1107b3905cae6801d38dcd71b363a8.yaml +++ b/nuclei-templates/2012/CVE-2012-5328-ca1107b3905cae6801d38dcd71b363a8.yaml @@ -4,7 +4,7 @@ info: name: > Mingle Forum <= 1.0.32.1 - SQL Injection author: topscoder - severity: high + severity: critical description: > Multiple SQL injection vulnerabilities in the Mingle Forum plugin 1.0.32.1 and other versions before 1.0.33 for WordPress might allow remote authenticated users to execute arbitrary SQL commands via the (1) memberid or (2) groupid parameters in a removemember action or (3) id parameter to fs-admin/fs-admin.php, or (4) edit_forum_id parameter in an edit_save_forum action to fs-admin/wpf-edit-forum-group.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mingle-forum/" google-query: inurl:"/wp-content/plugins/mingle-forum/" shodan-query: 'vuln:CVE-2012-5328' - tags: cve,wordpress,wp-plugin,mingle-forum,high + tags: cve,wordpress,wp-plugin,mingle-forum,critical http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-5346-9088cbacca16ddb298ad417146be5fc5.yaml b/nuclei-templates/2012/CVE-2012-5346-9088cbacca16ddb298ad417146be5fc5.yaml index 68e85f496f..55792b97a8 100644 --- a/nuclei-templates/2012/CVE-2012-5346-9088cbacca16ddb298ad417146be5fc5.yaml +++ b/nuclei-templates/2012/CVE-2012-5346-9088cbacca16ddb298ad417146be5fc5.yaml @@ -4,7 +4,7 @@ info: name: > WP Live.php <= 1.2.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-live.php in the WP Live.php module 1.2.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter. NOTE: some of these details are obtained from third party information. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-livephp/" google-query: inurl:"/wp-content/plugins/wp-livephp/" shodan-query: 'vuln:CVE-2012-5346' - tags: cve,wordpress,wp-plugin,wp-livephp,medium + tags: cve,wordpress,wp-plugin,wp-livephp,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-5349-46bf8ffa7005c6ec6cf07777085484d4.yaml b/nuclei-templates/2012/CVE-2012-5349-46bf8ffa7005c6ec6cf07777085484d4.yaml index af916ca8eb..a19b6f9cbd 100644 --- a/nuclei-templates/2012/CVE-2012-5349-46bf8ffa7005c6ec6cf07777085484d4.yaml +++ b/nuclei-templates/2012/CVE-2012-5349-46bf8ffa7005c6ec6cf07777085484d4.yaml @@ -4,7 +4,7 @@ info: name: > Pay With Tweet <= 1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in pay.php in the Pay With Tweet plugin before 1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) link, (2) title, or (3) dl parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pay-with-tweet/" google-query: inurl:"/wp-content/plugins/pay-with-tweet/" shodan-query: 'vuln:CVE-2012-5349' - tags: cve,wordpress,wp-plugin,pay-with-tweet,medium + tags: cve,wordpress,wp-plugin,pay-with-tweet,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-5350-5b86c54747aa1057e36177e85fea660b.yaml b/nuclei-templates/2012/CVE-2012-5350-5b86c54747aa1057e36177e85fea660b.yaml index 8aa456d1e0..ffb47fcc57 100644 --- a/nuclei-templates/2012/CVE-2012-5350-5b86c54747aa1057e36177e85fea660b.yaml +++ b/nuclei-templates/2012/CVE-2012-5350-5b86c54747aa1057e36177e85fea660b.yaml @@ -4,7 +4,7 @@ info: name: > Pay With Tweet <= 1.1 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > SQL injection vulnerability in the Pay With Tweet plugin before 1.2 for WordPress allows remote authenticated users with certain permissions to execute arbitrary SQL commands via the id parameter in a paywithtweet shortcode. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pay-with-tweet/" google-query: inurl:"/wp-content/plugins/pay-with-tweet/" shodan-query: 'vuln:CVE-2012-5350' - tags: cve,wordpress,wp-plugin,pay-with-tweet,high + tags: cve,wordpress,wp-plugin,pay-with-tweet,low http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-5387-7987b5631645ef011c12aa6fb80cc221.yaml b/nuclei-templates/2012/CVE-2012-5387-7987b5631645ef011c12aa6fb80cc221.yaml index b252f81576..7a95c9aad1 100644 --- a/nuclei-templates/2012/CVE-2012-5387-7987b5631645ef011c12aa6fb80cc221.yaml +++ b/nuclei-templates/2012/CVE-2012-5387-7987b5631645ef011c12aa6fb80cc221.yaml @@ -4,7 +4,7 @@ info: name: > White Label CMS < 1.5.1 - Reflected Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in wlcms-plugin.php in the White Label CMS plugin before 1.5.1 for WordPress allows remote attackers to hijack the authentication of administrators for requests that modify the developer name via the wlcms_o_developer_name parameter in a save action to wp-admin/admin.php, as demonstrated by a developer name containing XSS sequences. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/white-label-cms/" google-query: inurl:"/wp-content/plugins/white-label-cms/" shodan-query: 'vuln:CVE-2012-5387' - tags: cve,wordpress,wp-plugin,white-label-cms,high + tags: cve,wordpress,wp-plugin,white-label-cms,medium http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-5469-f5f19df0291f0636aeea89c408a38887.yaml b/nuclei-templates/2012/CVE-2012-5469-f5f19df0291f0636aeea89c408a38887.yaml index d33deeccce..be2adb1f2a 100644 --- a/nuclei-templates/2012/CVE-2012-5469-f5f19df0291f0636aeea89c408a38887.yaml +++ b/nuclei-templates/2012/CVE-2012-5469-f5f19df0291f0636aeea89c408a38887.yaml @@ -4,7 +4,7 @@ info: name: > Portable phpMyAdmin <= 1.3.0 - Authentication Bypass author: topscoder - severity: high + severity: critical description: > The Portable phpMyAdmin plugin before 1.3.0 for WordPress allows remote attackers to bypass authentication and obtain phpMyAdmin console access via a direct request to wp-content/plugins/portable-phpmyadmin/wp-pma-mod. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/portable-phpmyadmin/" google-query: inurl:"/wp-content/plugins/portable-phpmyadmin/" shodan-query: 'vuln:CVE-2012-5469' - tags: cve,wordpress,wp-plugin,portable-phpmyadmin,high + tags: cve,wordpress,wp-plugin,portable-phpmyadmin,critical http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-5856-187ba8ada5a41b0d7770ae8aebf496fa.yaml b/nuclei-templates/2012/CVE-2012-5856-187ba8ada5a41b0d7770ae8aebf496fa.yaml index 6a6cd9eb83..c53a007b50 100644 --- a/nuclei-templates/2012/CVE-2012-5856-187ba8ada5a41b0d7770ae8aebf496fa.yaml +++ b/nuclei-templates/2012/CVE-2012-5856-187ba8ada5a41b0d7770ae8aebf496fa.yaml @@ -4,7 +4,7 @@ info: name: > Uk Cookie <= 1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Uk Cookie (aka uk-cookie) plugin for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/uk-cookie/" google-query: inurl:"/wp-content/plugins/uk-cookie/" shodan-query: 'vuln:CVE-2012-5856' - tags: cve,wordpress,wp-plugin,uk-cookie,medium + tags: cve,wordpress,wp-plugin,uk-cookie,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-5913-ef0c35cfc8264d312ebd8c7577e88c19.yaml b/nuclei-templates/2012/CVE-2012-5913-ef0c35cfc8264d312ebd8c7577e88c19.yaml index b247d15c33..9d966984fd 100644 --- a/nuclei-templates/2012/CVE-2012-5913-ef0c35cfc8264d312ebd8c7577e88c19.yaml +++ b/nuclei-templates/2012/CVE-2012-5913-ef0c35cfc8264d312ebd8c7577e88c19.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Integrator <= 1.32 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-integrator.php in the WordPress Integrator module 1.32 for WordPress allows remote attackers to inject arbitrary web script or HTML via the redirect_to parameter to wp-login.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-integrator/" google-query: inurl:"/wp-content/plugins/wp-integrator/" shodan-query: 'vuln:CVE-2012-5913' - tags: cve,wordpress,wp-plugin,wp-integrator,medium + tags: cve,wordpress,wp-plugin,wp-integrator,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6312-2c3b5f42630b423898a1e16a09268499.yaml b/nuclei-templates/2012/CVE-2012-6312-2c3b5f42630b423898a1e16a09268499.yaml index bcbac5d75f..ae6262339c 100644 --- a/nuclei-templates/2012/CVE-2012-6312-2c3b5f42630b423898a1e16a09268499.yaml +++ b/nuclei-templates/2012/CVE-2012-6312-2c3b5f42630b423898a1e16a09268499.yaml @@ -4,7 +4,7 @@ info: name: > Video Lead Form < 0.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Video Lead Form plugin for WordPress allows remote attackers to inject arbitrary web script or HTML via the errMsg parameter in a video-lead-form action to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/video-lead-form/" google-query: inurl:"/wp-content/plugins/video-lead-form/" shodan-query: 'vuln:CVE-2012-6312' - tags: cve,wordpress,wp-plugin,video-lead-form,medium + tags: cve,wordpress,wp-plugin,video-lead-form,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6506-f4ee9df210a60a8c7b3151780ca279b1.yaml b/nuclei-templates/2012/CVE-2012-6506-f4ee9df210a60a8c7b3151780ca279b1.yaml index e1e6f88330..a609ef748e 100644 --- a/nuclei-templates/2012/CVE-2012-6506-f4ee9df210a60a8c7b3151780ca279b1.yaml +++ b/nuclei-templates/2012/CVE-2012-6506-f4ee9df210a60a8c7b3151780ca279b1.yaml @@ -4,7 +4,7 @@ info: name: > Zingiri Web Shop Plugin <= 2.4.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Zingiri Web Shop plugin 2.4.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) page parameter in zing.inc.php or (2) notes parameter in fws/pages-front/onecheckout.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/zingiri-web-shop/" google-query: inurl:"/wp-content/plugins/zingiri-web-shop/" shodan-query: 'vuln:CVE-2012-6506' - tags: cve,wordpress,wp-plugin,zingiri-web-shop,medium + tags: cve,wordpress,wp-plugin,zingiri-web-shop,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6511-a88755371a7efc7dfaacf49c4e565b46.yaml b/nuclei-templates/2012/CVE-2012-6511-a88755371a7efc7dfaacf49c4e565b46.yaml index 4ac9541ed4..c87a6f1e3f 100644 --- a/nuclei-templates/2012/CVE-2012-6511-a88755371a7efc7dfaacf49c4e565b46.yaml +++ b/nuclei-templates/2012/CVE-2012-6511-a88755371a7efc7dfaacf49c4e565b46.yaml @@ -4,7 +4,7 @@ info: name: > Organizer <= 1.2.1 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in organizer/page/users.php in the Organizer plugin 1.2.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) delete_id parameter or (2) extension parameter in an "Update Setting" action to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/organizer/" google-query: inurl:"/wp-content/plugins/organizer/" shodan-query: 'vuln:CVE-2012-6511' - tags: cve,wordpress,wp-plugin,organizer,medium + tags: cve,wordpress,wp-plugin,organizer,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6527-5f2c8752d84edabaa8bbd1589413f608.yaml b/nuclei-templates/2012/CVE-2012-6527-5f2c8752d84edabaa8bbd1589413f608.yaml index 9d3dfc5b8e..ef39204492 100644 --- a/nuclei-templates/2012/CVE-2012-6527-5f2c8752d84edabaa8bbd1589413f608.yaml +++ b/nuclei-templates/2012/CVE-2012-6527-5f2c8752d84edabaa8bbd1589413f608.yaml @@ -4,7 +4,7 @@ info: name: > My Calendar < 1.10.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the My Calendar plugin before 1.10.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/my-calendar/" google-query: inurl:"/wp-content/plugins/my-calendar/" shodan-query: 'vuln:CVE-2012-6527' - tags: cve,wordpress,wp-plugin,my-calendar,medium + tags: cve,wordpress,wp-plugin,my-calendar,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6622-8cba549bfba1e71b314fc0d37ea95e7a.yaml b/nuclei-templates/2012/CVE-2012-6622-8cba549bfba1e71b314fc0d37ea95e7a.yaml index 785bbb593c..89303ef010 100644 --- a/nuclei-templates/2012/CVE-2012-6622-8cba549bfba1e71b314fc0d37ea95e7a.yaml +++ b/nuclei-templates/2012/CVE-2012-6622-8cba549bfba1e71b314fc0d37ea95e7a.yaml @@ -4,7 +4,7 @@ info: name: > WP Forum Server <= 1.7.3 - Authenticated (Admin+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The WP Forum Server plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the (1) groupid parameter in an editgroup action or (2) usergroup_id parameter in an edit_usergroup action in versions up to, and including, 1.7.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative capabilities to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This can also be exploited via CSRF by unauthenticated users due to missing nonce validation. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/forum-server/" google-query: inurl:"/wp-content/plugins/forum-server/" shodan-query: 'vuln:CVE-2012-6622' - tags: cve,wordpress,wp-plugin,forum-server,medium + tags: cve,wordpress,wp-plugin,forum-server,low http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6624-a72a870d8ea76185ed68595992193f58.yaml b/nuclei-templates/2012/CVE-2012-6624-a72a870d8ea76185ed68595992193f58.yaml index 5ca0891a6c..8a8a83c464 100644 --- a/nuclei-templates/2012/CVE-2012-6624-a72a870d8ea76185ed68595992193f58.yaml +++ b/nuclei-templates/2012/CVE-2012-6624-a72a870d8ea76185ed68595992193f58.yaml @@ -4,7 +4,7 @@ info: name: > Soundcloud Is Gold <= 2.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the SoundCloud Is Gold plugin 2.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the width parameter in a soundcloud_is_gold_player_preview action to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/soundcloud-is-gold/" google-query: inurl:"/wp-content/plugins/soundcloud-is-gold/" shodan-query: 'vuln:CVE-2012-6624' - tags: cve,wordpress,wp-plugin,soundcloud-is-gold,medium + tags: cve,wordpress,wp-plugin,soundcloud-is-gold,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6625-0856197f54ebc4b1a325747e3d0ab80c.yaml b/nuclei-templates/2012/CVE-2012-6625-0856197f54ebc4b1a325747e3d0ab80c.yaml index bf278ab91d..b4e94e7363 100644 --- a/nuclei-templates/2012/CVE-2012-6625-0856197f54ebc4b1a325747e3d0ab80c.yaml +++ b/nuclei-templates/2012/CVE-2012-6625-0856197f54ebc4b1a325747e3d0ab80c.yaml @@ -4,7 +4,7 @@ info: name: > WP Forum Server < 1.7.4 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in fs-admin/fs-admin.php in the ForumPress WP Forum Server plugin before 1.7.4 for WordPress allows remote attackers to execute arbitrary SQL commands via the groupid parameter in an editgroup action. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/forum-server/" google-query: inurl:"/wp-content/plugins/forum-server/" shodan-query: 'vuln:CVE-2012-6625' - tags: cve,wordpress,wp-plugin,forum-server,high + tags: cve,wordpress,wp-plugin,forum-server,critical http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6627-4fecc14512bd412ef7b458d7c2feb79a.yaml b/nuclei-templates/2012/CVE-2012-6627-4fecc14512bd412ef7b458d7c2feb79a.yaml index cb655a3eb1..824657193c 100644 --- a/nuclei-templates/2012/CVE-2012-6627-4fecc14512bd412ef7b458d7c2feb79a.yaml +++ b/nuclei-templates/2012/CVE-2012-6627-4fecc14512bd412ef7b458d7c2feb79a.yaml @@ -4,7 +4,7 @@ info: name: > Newsletter Manager < 1.0.2 - Cross-Site Scripting via test_mail.php author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in admin/test_mail.php in the Newsletter Manager plugin before 1.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/newsletter-manager/" google-query: inurl:"/wp-content/plugins/newsletter-manager/" shodan-query: 'vuln:CVE-2012-6627' - tags: cve,wordpress,wp-plugin,newsletter-manager,medium + tags: cve,wordpress,wp-plugin,newsletter-manager,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6628-437f867caa3099fbc234387a5d6249e0.yaml b/nuclei-templates/2012/CVE-2012-6628-437f867caa3099fbc234387a5d6249e0.yaml index 3cebd8b10d..ecc6d32546 100644 --- a/nuclei-templates/2012/CVE-2012-6628-437f867caa3099fbc234387a5d6249e0.yaml +++ b/nuclei-templates/2012/CVE-2012-6628-437f867caa3099fbc234387a5d6249e0.yaml @@ -4,7 +4,7 @@ info: name: > Newsletter Manager < 1.0.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Newsletter Manager plugin before 1.0.2 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) xyz_em_campName to admin/create_campaign.php or (2) admin/edit_campaign.php, (3) xyz_em_email parameter to admin/edit_email.php, (4) xyz_em_exportbatchSize parameter to import_export.php, or (5) pagination limit in the Newsletter Manager options. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/newsletter-manager/" google-query: inurl:"/wp-content/plugins/newsletter-manager/" shodan-query: 'vuln:CVE-2012-6628' - tags: cve,wordpress,wp-plugin,newsletter-manager,medium + tags: cve,wordpress,wp-plugin,newsletter-manager,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6629-ce05b3ae1fa8a55fc1f1267b8e05c4cc.yaml b/nuclei-templates/2012/CVE-2012-6629-ce05b3ae1fa8a55fc1f1267b8e05c4cc.yaml index 5c73a7d5f5..30cecb1762 100644 --- a/nuclei-templates/2012/CVE-2012-6629-ce05b3ae1fa8a55fc1f1267b8e05c4cc.yaml +++ b/nuclei-templates/2012/CVE-2012-6629-ce05b3ae1fa8a55fc1f1267b8e05c4cc.yaml @@ -4,7 +4,7 @@ info: name: > Newsletter Manager < 1.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the Newsletter Manager plugin before 1.4 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change an email address or (2) conduct script insertion attacks. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/newsletter-manager/" google-query: inurl:"/wp-content/plugins/newsletter-manager/" shodan-query: 'vuln:CVE-2012-6629' - tags: cve,wordpress,wp-plugin,newsletter-manager,high + tags: cve,wordpress,wp-plugin,newsletter-manager,medium http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6630-01dd63a5f8faf96a00782f6bc3eb47be.yaml b/nuclei-templates/2012/CVE-2012-6630-01dd63a5f8faf96a00782f6bc3eb47be.yaml index df269c46a3..1775e1d1ea 100644 --- a/nuclei-templates/2012/CVE-2012-6630-01dd63a5f8faf96a00782f6bc3eb47be.yaml +++ b/nuclei-templates/2012/CVE-2012-6630-01dd63a5f8faf96a00782f6bc3eb47be.yaml @@ -4,7 +4,7 @@ info: name: > Media Library Categories <= 1.1.1 - Unauthenticated Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Media Library Categories plugin 1.1.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) bulk parameter to media-library-categories/add.php or (2) q parameter to media-library-categories/view.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/media-library-categories/" google-query: inurl:"/wp-content/plugins/media-library-categories/" shodan-query: 'vuln:CVE-2012-6630' - tags: cve,wordpress,wp-plugin,media-library-categories,medium + tags: cve,wordpress,wp-plugin,media-library-categories,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6633-53c3a2476763f7f2558688f9f26210ce.yaml b/nuclei-templates/2012/CVE-2012-6633-53c3a2476763f7f2558688f9f26210ce.yaml index 98233eca06..2a16aee844 100644 --- a/nuclei-templates/2012/CVE-2012-6633-53c3a2476763f7f2558688f9f26210ce.yaml +++ b/nuclei-templates/2012/CVE-2012-6633-53c3a2476763f7f2558688f9f26210ce.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 3.3.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-includes/default-filters.php in WordPress before 3.3.3 allows remote attackers to inject arbitrary web script or HTML via an editable slug field. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2012-6633 metadata: shodan-query: 'vuln:CVE-2012-6633' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6653-bc135ea3b74553b0fd14eafbe49bca73.yaml b/nuclei-templates/2012/CVE-2012-6653-bc135ea3b74553b0fd14eafbe49bca73.yaml index 1353235d45..caf16d9191 100644 --- a/nuclei-templates/2012/CVE-2012-6653-bc135ea3b74553b0fd14eafbe49bca73.yaml +++ b/nuclei-templates/2012/CVE-2012-6653-bc135ea3b74553b0fd14eafbe49bca73.yaml @@ -4,7 +4,7 @@ info: name: > All Video Gallery <= 1.1 - SQL Injection author: topscoder - severity: high + severity: critical description: > The All Video Gallery plugin for WordPress is vulnerable to blind SQL Injection via the ‘ vid’ and 'pid' parameters in versions up to, and including, 1.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/all-video-gallery/" google-query: inurl:"/wp-content/plugins/all-video-gallery/" shodan-query: 'vuln:CVE-2012-6653' - tags: cve,wordpress,wp-plugin,all-video-gallery,high + tags: cve,wordpress,wp-plugin,all-video-gallery,critical http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6713-72d88d4156b62bb9e1abe8555a4604f1.yaml b/nuclei-templates/2012/CVE-2012-6713-72d88d4156b62bb9e1abe8555a4604f1.yaml index 9125001d14..b4500ddcb8 100644 --- a/nuclei-templates/2012/CVE-2012-6713-72d88d4156b62bb9e1abe8555a4604f1.yaml +++ b/nuclei-templates/2012/CVE-2012-6713-72d88d4156b62bb9e1abe8555a4604f1.yaml @@ -4,7 +4,7 @@ info: name: > Job Manager <= 0.7.18 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Job Manager plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 0.7.18 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/job-manager/" google-query: inurl:"/wp-content/plugins/job-manager/" shodan-query: 'vuln:CVE-2012-6713' - tags: cve,wordpress,wp-plugin,job-manager,medium + tags: cve,wordpress,wp-plugin,job-manager,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6714-ecd06ad3b241a40ab31e78d6ecc1667e.yaml b/nuclei-templates/2012/CVE-2012-6714-ecd06ad3b241a40ab31e78d6ecc1667e.yaml index 8bf5823720..e384c9860f 100644 --- a/nuclei-templates/2012/CVE-2012-6714-ecd06ad3b241a40ab31e78d6ecc1667e.yaml +++ b/nuclei-templates/2012/CVE-2012-6714-ecd06ad3b241a40ab31e78d6ecc1667e.yaml @@ -4,7 +4,7 @@ info: name: > Count per Day Plugin < 3.2.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The count-per-day plugin before 3.2.3 for WordPress has XSS via search words. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/count-per-day/" google-query: inurl:"/wp-content/plugins/count-per-day/" shodan-query: 'vuln:CVE-2012-6714' - tags: cve,wordpress,wp-plugin,count-per-day,medium + tags: cve,wordpress,wp-plugin,count-per-day,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6715-a6e4580408df1cc0fd425db3d3f61102.yaml b/nuclei-templates/2012/CVE-2012-6715-a6e4580408df1cc0fd425db3d3f61102.yaml index 2e92acc419..26758d97a3 100644 --- a/nuclei-templates/2012/CVE-2012-6715-a6e4580408df1cc0fd425db3d3f61102.yaml +++ b/nuclei-templates/2012/CVE-2012-6715-a6e4580408df1cc0fd425db3d3f61102.yaml @@ -4,7 +4,7 @@ info: name: > FormBuilder <= 0.90 - Unauthenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The formbuilder plugin before 0.91 for WordPress has XSS via a Referer header. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/formbuilder/" google-query: inurl:"/wp-content/plugins/formbuilder/" shodan-query: 'vuln:CVE-2012-6715' - tags: cve,wordpress,wp-plugin,formbuilder,medium + tags: cve,wordpress,wp-plugin,formbuilder,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6716-944355331d4d9eab9649c96fbc1339dc.yaml b/nuclei-templates/2012/CVE-2012-6716-944355331d4d9eab9649c96fbc1339dc.yaml index f2d1bc76e0..03af92889f 100644 --- a/nuclei-templates/2012/CVE-2012-6716-944355331d4d9eab9649c96fbc1339dc.yaml +++ b/nuclei-templates/2012/CVE-2012-6716-944355331d4d9eab9649c96fbc1339dc.yaml @@ -4,7 +4,7 @@ info: name: > Events Manager < 5.1.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Events Manager plugin before 5.1.7 for WordPress has XSS via JSON call links. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/events-manager/" google-query: inurl:"/wp-content/plugins/events-manager/" shodan-query: 'vuln:CVE-2012-6716' - tags: cve,wordpress,wp-plugin,events-manager,medium + tags: cve,wordpress,wp-plugin,events-manager,high http: - method: GET diff --git a/nuclei-templates/2012/CVE-2012-6718-2f64e4cf69164182b2f4695a0a03f04b.yaml b/nuclei-templates/2012/CVE-2012-6718-2f64e4cf69164182b2f4695a0a03f04b.yaml index e6d9188bb5..98af07b215 100644 --- a/nuclei-templates/2012/CVE-2012-6718-2f64e4cf69164182b2f4695a0a03f04b.yaml +++ b/nuclei-templates/2012/CVE-2012-6718-2f64e4cf69164182b2f4695a0a03f04b.yaml @@ -4,7 +4,7 @@ info: name: > Sharebar <= 1.2.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Sharebar plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sharebar/" google-query: inurl:"/wp-content/plugins/sharebar/" shodan-query: 'vuln:CVE-2012-6718' - tags: cve,wordpress,wp-plugin,sharebar,medium + tags: cve,wordpress,wp-plugin,sharebar,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-0236-ff8227d1909738ca97650b31fc8d45f5.yaml b/nuclei-templates/2013/CVE-2013-0236-ff8227d1909738ca97650b31fc8d45f5.yaml index 49aeb0dbaf..c2b0919100 100644 --- a/nuclei-templates/2013/CVE-2013-0236-ff8227d1909738ca97650b31fc8d45f5.yaml +++ b/nuclei-templates/2013/CVE-2013-0236-ff8227d1909738ca97650b31fc8d45f5.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 3.5.1 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in WordPress before 3.5.1 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) gallery shortcodes or (2) the content of a post. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2013-0236 metadata: shodan-query: 'vuln:CVE-2013-0236' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-0237-62c0f4af115d106e4e2cbcfcbfb71c13.yaml b/nuclei-templates/2013/CVE-2013-0237-62c0f4af115d106e4e2cbcfcbfb71c13.yaml index 08c7ec32a3..741e7728a7 100644 --- a/nuclei-templates/2013/CVE-2013-0237-62c0f4af115d106e4e2cbcfcbfb71c13.yaml +++ b/nuclei-templates/2013/CVE-2013-0237-62c0f4af115d106e4e2cbcfcbfb71c13.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 3.5.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in Plupload.as in Moxiecode plupload before 1.5.5, as used in WordPress before 3.5.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the id parameter. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2013-0237 metadata: shodan-query: 'vuln:CVE-2013-0237' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-0286-da11574313c0b78ab88b69a807dbc63e.yaml b/nuclei-templates/2013/CVE-2013-0286-da11574313c0b78ab88b69a807dbc63e.yaml index c820f64bd6..2231ad709f 100644 --- a/nuclei-templates/2013/CVE-2013-0286-da11574313c0b78ab88b69a807dbc63e.yaml +++ b/nuclei-templates/2013/CVE-2013-0286-da11574313c0b78ab88b69a807dbc63e.yaml @@ -4,7 +4,7 @@ info: name: > Pinboard <= 1.1.10 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Pinboard 1.1.10 theme for Wordpress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/pinboard/" google-query: inurl:"/wp-content/themes/pinboard/" shodan-query: 'vuln:CVE-2013-0286' - tags: cve,wordpress,wp-theme,pinboard,medium + tags: cve,wordpress,wp-theme,pinboard,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-0731-74a3eb8891dcef7e1892db3c005e178d.yaml b/nuclei-templates/2013/CVE-2013-0731-74a3eb8891dcef7e1892db3c005e178d.yaml index f5a4b22fbc..f4f0f7bd79 100644 --- a/nuclei-templates/2013/CVE-2013-0731-74a3eb8891dcef7e1892db3c005e178d.yaml +++ b/nuclei-templates/2013/CVE-2013-0731-74a3eb8891dcef7e1892db3c005e178d.yaml @@ -4,7 +4,7 @@ info: name: > MailUp newsletter sign-up form < 1.3.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > ajax.functions.php in the MailUp plugin before 1.3.3 for WordPress does not properly restrict access to unspecified Ajax functions, which allows remote attackers to modify plugin settings and conduct cross-site scripting (XSS) attacks by setting the wordpress_logged_in cookie. NOTE: this is due to an incomplete fix for a similar issue that was fixed in 1.3.2. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-mailup/" google-query: inurl:"/wp-content/plugins/wp-mailup/" shodan-query: 'vuln:CVE-2013-0731' - tags: cve,wordpress,wp-plugin,wp-mailup,medium + tags: cve,wordpress,wp-plugin,wp-mailup,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-0736-4a9495cead71bfc76b3becea53804acd.yaml b/nuclei-templates/2013/CVE-2013-0736-4a9495cead71bfc76b3becea53804acd.yaml index d22764f519..7e09035a19 100644 --- a/nuclei-templates/2013/CVE-2013-0736-4a9495cead71bfc76b3becea53804acd.yaml +++ b/nuclei-templates/2013/CVE-2013-0736-4a9495cead71bfc76b3becea53804acd.yaml @@ -4,7 +4,7 @@ info: name: > Mingle Forum <= 1.0.34 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the Mingle Forum plugin 1.0.34 and possibly earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) modify user privileges or (2) conduct cross-site scripting (XSS) attacks via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mingle-forum/" google-query: inurl:"/wp-content/plugins/mingle-forum/" shodan-query: 'vuln:CVE-2013-0736' - tags: cve,wordpress,wp-plugin,mingle-forum,high + tags: cve,wordpress,wp-plugin,mingle-forum,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-10023-c978227ed54be6d80dbe1ecf4f522c4f.yaml b/nuclei-templates/2013/CVE-2013-10023-c978227ed54be6d80dbe1ecf4f522c4f.yaml index c433c2f3c8..c2a2661b0f 100644 --- a/nuclei-templates/2013/CVE-2013-10023-c978227ed54be6d80dbe1ecf4f522c4f.yaml +++ b/nuclei-templates/2013/CVE-2013-10023-c978227ed54be6d80dbe1ecf4f522c4f.yaml @@ -4,7 +4,7 @@ info: name: > Editorial Calendar <= 2.6 - Authenticated (Admin+) SQL Injection author: topscoder - severity: high + severity: low description: > The Editorial Calendar plugin for WordPress is vulnerable to SQL Injection via post start and end dates in all versions up to, and including, 2.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with admin-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/editorial-calendar/" google-query: inurl:"/wp-content/plugins/editorial-calendar/" shodan-query: 'vuln:CVE-2013-10023' - tags: cve,wordpress,wp-plugin,editorial-calendar,high + tags: cve,wordpress,wp-plugin,editorial-calendar,low http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-10026-347522eaa82eb43bdeab94627e4d0f98.yaml b/nuclei-templates/2013/CVE-2013-10026-347522eaa82eb43bdeab94627e4d0f98.yaml index ea0cdace2e..517f0fa8b2 100644 --- a/nuclei-templates/2013/CVE-2013-10026-347522eaa82eb43bdeab94627e4d0f98.yaml +++ b/nuclei-templates/2013/CVE-2013-10026-347522eaa82eb43bdeab94627e4d0f98.yaml @@ -4,7 +4,7 @@ info: name: > Mail Subscribe List <= 2.0.9 - Unauthenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Mail Subscribe List plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'sml_name' and 'sml_email' parameters in versions up to, and including, 2.0.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mail-subscribe-list/" google-query: inurl:"/wp-content/plugins/mail-subscribe-list/" shodan-query: 'vuln:CVE-2013-10026' - tags: cve,wordpress,wp-plugin,mail-subscribe-list,medium + tags: cve,wordpress,wp-plugin,mail-subscribe-list,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-1407-eb8f98aa61e3c3db7506a6098f7ccbda.yaml b/nuclei-templates/2013/CVE-2013-1407-eb8f98aa61e3c3db7506a6098f7ccbda.yaml index 60175aa264..484d5d82b2 100644 --- a/nuclei-templates/2013/CVE-2013-1407-eb8f98aa61e3c3db7506a6098f7ccbda.yaml +++ b/nuclei-templates/2013/CVE-2013-1407-eb8f98aa61e3c3db7506a6098f7ccbda.yaml @@ -4,7 +4,7 @@ info: name: > Events Manager < 5.3.5 & Events Manager Pro < 2.2.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Events Manager plugin before 5.3.5 and Events Manager Pro plugin before 2.2.9 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) scope parameter to index.php; (2) user_name, (3) dbem_phone, (4) user_email, or (5) booking_comment parameter to an event with registration enabled; or the (6) _wpnonce parameter to wp-admin/edit.php. reference: @@ -14,17 +14,17 @@ info: cvss-score: 6.1 cve-id: CVE-2013-1407 metadata: - fofa-query: "wp-content/plugins/events-manager-pro/" - google-query: inurl:"/wp-content/plugins/events-manager-pro/" + fofa-query: "wp-content/plugins/events-manager/" + google-query: inurl:"/wp-content/plugins/events-manager/" shodan-query: 'vuln:CVE-2013-1407' - tags: cve,wordpress,wp-plugin,events-manager-pro,medium + tags: cve,wordpress,wp-plugin,events-manager,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/events-manager-pro/readme.txt" + - "{{BaseURL}}/wp-content/plugins/events-manager/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "events-manager-pro" + - "events-manager" part: body - type: dsl dsl: - - compare_versions(version, '< 2.2.9') \ No newline at end of file + - compare_versions(version, '< 5.3.5') \ No newline at end of file diff --git a/nuclei-templates/2013/CVE-2013-1408-7b51f983a57c524a14f0aa93885b9cf0.yaml b/nuclei-templates/2013/CVE-2013-1408-7b51f983a57c524a14f0aa93885b9cf0.yaml index bbe98c1ac0..24cf7af9d2 100644 --- a/nuclei-templates/2013/CVE-2013-1408-7b51f983a57c524a14f0aa93885b9cf0.yaml +++ b/nuclei-templates/2013/CVE-2013-1408-7b51f983a57c524a14f0aa93885b9cf0.yaml @@ -4,7 +4,7 @@ info: name: > MailPoet Newsletters <= 2.2 - Multiple SQL Injections author: topscoder - severity: high + severity: critical description: > Multiple SQL injection vulnerabilities in the Wysija Newsletters plugin before 2.2.1 for WordPress allow remote authenticated administrators to execute arbitrary SQL commands via the (1) search or (2) orderby parameter to wp-admin/admin.php. NOTE: this can be leveraged using CSRF to allow remote unauthenticated attackers to execute arbitrary SQL commands. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wysija-newsletters/" google-query: inurl:"/wp-content/plugins/wysija-newsletters/" shodan-query: 'vuln:CVE-2013-1408' - tags: cve,wordpress,wp-plugin,wysija-newsletters,high + tags: cve,wordpress,wp-plugin,wysija-newsletters,critical http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-1463-4fd8626c11bff94fd8a393ce1bb61f0e.yaml b/nuclei-templates/2013/CVE-2013-1463-4fd8626c11bff94fd8a393ce1bb61f0e.yaml index d6cf15a168..078f5092f6 100644 --- a/nuclei-templates/2013/CVE-2013-1463-4fd8626c11bff94fd8a393ce1bb61f0e.yaml +++ b/nuclei-templates/2013/CVE-2013-1463-4fd8626c11bff94fd8a393ce1bb61f0e.yaml @@ -4,7 +4,7 @@ info: name: > WP-Table Reloaded <= 1.9.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in js/tabletools/zeroclipboard.swf in the WP-Table Reloaded module before 1.9.4 for Wordpress allows remote attackers to inject arbitrary web script or HTML via the id parameter. NOTE: this might be the same vulnerability as CVE-2013-1808. If so, it is likely that CVE-2013-1463 will be REJECTed. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-table-reloaded/" google-query: inurl:"/wp-content/plugins/wp-table-reloaded/" shodan-query: 'vuln:CVE-2013-1463' - tags: cve,wordpress,wp-plugin,wp-table-reloaded,medium + tags: cve,wordpress,wp-plugin,wp-table-reloaded,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-1464-c346700edac77f8ba964672619183f58.yaml b/nuclei-templates/2013/CVE-2013-1464-c346700edac77f8ba964672619183f58.yaml index 4c5bb79a6d..40e39919b7 100644 --- a/nuclei-templates/2013/CVE-2013-1464-c346700edac77f8ba964672619183f58.yaml +++ b/nuclei-templates/2013/CVE-2013-1464-c346700edac77f8ba964672619183f58.yaml @@ -4,7 +4,7 @@ info: name: > Audio Player <= 2.0.4.5 - Cross-Site Scripting via playerID Parameter author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in assets/player.swf in the Audio Player plugin before 2.0.4.6 for Wordpress allows remote attackers to inject arbitrary web script or HTML via the playerID parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/audio-player/" google-query: inurl:"/wp-content/plugins/audio-player/" shodan-query: 'vuln:CVE-2013-1464' - tags: cve,wordpress,wp-plugin,audio-player,medium + tags: cve,wordpress,wp-plugin,audio-player,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-1758-3b4a8aeeafcd7cd5d89d3f79fbd2340b.yaml b/nuclei-templates/2013/CVE-2013-1758-3b4a8aeeafcd7cd5d89d3f79fbd2340b.yaml index e79ba69ffc..b533458ffc 100644 --- a/nuclei-templates/2013/CVE-2013-1758-3b4a8aeeafcd7cd5d89d3f79fbd2340b.yaml +++ b/nuclei-templates/2013/CVE-2013-1758-3b4a8aeeafcd7cd5d89d3f79fbd2340b.yaml @@ -4,7 +4,7 @@ info: name: > Marekkis Watermark-Plugin <= 0.9.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Marekkis Watermark plugin 0.9.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the pfad parameter to wp-admin/options-general.php. NOTE: some of these details are obtained from third party information. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/marekkis-watermark/" google-query: inurl:"/wp-content/plugins/marekkis-watermark/" shodan-query: 'vuln:CVE-2013-1758' - tags: cve,wordpress,wp-plugin,marekkis-watermark,medium + tags: cve,wordpress,wp-plugin,marekkis-watermark,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-1759-8d120ab408475ea52678a65c5972ac37.yaml b/nuclei-templates/2013/CVE-2013-1759-8d120ab408475ea52678a65c5972ac37.yaml index 495ac98265..5f0a44e01d 100644 --- a/nuclei-templates/2013/CVE-2013-1759-8d120ab408475ea52678a65c5972ac37.yaml +++ b/nuclei-templates/2013/CVE-2013-1759-8d120ab408475ea52678a65c5972ac37.yaml @@ -4,7 +4,7 @@ info: name: > Responsive Logo Slideshow < 1.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Responsive Logo Slideshow plugin for WordPress allows remote attackers to inject arbitrary web script or HTML via the "URL and Image" field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/responsive-logo-slideshow/" google-query: inurl:"/wp-content/plugins/responsive-logo-slideshow/" shodan-query: 'vuln:CVE-2013-1759' - tags: cve,wordpress,wp-plugin,responsive-logo-slideshow,medium + tags: cve,wordpress,wp-plugin,responsive-logo-slideshow,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-1765-f4124706d0e19c3b0ecdc824e2dde79c.yaml b/nuclei-templates/2013/CVE-2013-1765-f4124706d0e19c3b0ecdc824e2dde79c.yaml index e9ee531661..39fac8845f 100644 --- a/nuclei-templates/2013/CVE-2013-1765-f4124706d0e19c3b0ecdc824e2dde79c.yaml +++ b/nuclei-templates/2013/CVE-2013-1765-f4124706d0e19c3b0ecdc824e2dde79c.yaml @@ -4,7 +4,7 @@ info: name: > Smart Flv <= 1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in jwplayer.swf in the smart-flv plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) link or (2) playerready parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/smart-flv/" google-query: inurl:"/wp-content/plugins/smart-flv/" shodan-query: 'vuln:CVE-2013-1765' - tags: cve,wordpress,wp-plugin,smart-flv,medium + tags: cve,wordpress,wp-plugin,smart-flv,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-1808-7727a5f68ed648a5191d57e52492a289.yaml b/nuclei-templates/2013/CVE-2013-1808-7727a5f68ed648a5191d57e52492a289.yaml index e661b9d9dc..7c7a391154 100644 --- a/nuclei-templates/2013/CVE-2013-1808-7727a5f68ed648a5191d57e52492a289.yaml +++ b/nuclei-templates/2013/CVE-2013-1808-7727a5f68ed648a5191d57e52492a289.yaml @@ -4,7 +4,7 @@ info: name: > Zendesk Chat < 1.2.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in ZeroClipboard.swf and ZeroClipboard10.swf in ZeroClipboard before 1.0.8, as used in em-shorty, RepRapCalculator, Fulcrum, Django, aCMS, and other products, allows remote attackers to inject arbitrary web script or HTML via the id parameter. NOTE: this is might be the same vulnerability as CVE-2013-1463. If so, it is likely that CVE-2013-1463 will be REJECTed. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/zopim-live-chat/" google-query: inurl:"/wp-content/plugins/zopim-live-chat/" shodan-query: 'vuln:CVE-2013-1808' - tags: cve,wordpress,wp-plugin,zopim-live-chat,medium + tags: cve,wordpress,wp-plugin,zopim-live-chat,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-1852-ccd9eb7d8d7c7fdd585ed7aff289426f.yaml b/nuclei-templates/2013/CVE-2013-1852-ccd9eb7d8d7c7fdd585ed7aff289426f.yaml index 475c24d9a4..56479517c9 100644 --- a/nuclei-templates/2013/CVE-2013-1852-ccd9eb7d8d7c7fdd585ed7aff289426f.yaml +++ b/nuclei-templates/2013/CVE-2013-1852-ccd9eb7d8d7c7fdd585ed7aff289426f.yaml @@ -4,7 +4,7 @@ info: name: > LeagueManager < 3.8.1 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in leaguemanager.php in the LeagueManager plugin before 3.8.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the league_id parameter in the leaguemanager-export page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/leaguemanager/" google-query: inurl:"/wp-content/plugins/leaguemanager/" shodan-query: 'vuln:CVE-2013-1852' - tags: cve,wordpress,wp-plugin,leaguemanager,high + tags: cve,wordpress,wp-plugin,leaguemanager,critical http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-1916-70ddedc5487f163b43d7ace431e3f2c6.yaml b/nuclei-templates/2013/CVE-2013-1916-70ddedc5487f163b43d7ace431e3f2c6.yaml index 4feb16ef84..61eed9bf81 100644 --- a/nuclei-templates/2013/CVE-2013-1916-70ddedc5487f163b43d7ace431e3f2c6.yaml +++ b/nuclei-templates/2013/CVE-2013-1916-70ddedc5487f163b43d7ace431e3f2c6.yaml @@ -4,7 +4,7 @@ info: name: > User Photo <= 0.9.4 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > In WordPress Plugin User Photo 0.9.4, when a photo is uploaded, it is only partially validated and it is possible to upload a backdoor on the server hosting WordPress. This backdoor can be called (executed) even if the photo has not been yet approved. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/user-photo/" google-query: inurl:"/wp-content/plugins/user-photo/" shodan-query: 'vuln:CVE-2013-1916' - tags: cve,wordpress,wp-plugin,user-photo,high + tags: cve,wordpress,wp-plugin,user-photo,critical http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2008-d80662422b2866b3d65a5445924467ed.yaml b/nuclei-templates/2013/CVE-2013-2008-d80662422b2866b3d65a5445924467ed.yaml index 3c83560fa9..e9b2187c6f 100644 --- a/nuclei-templates/2013/CVE-2013-2008-d80662422b2866b3d65a5445924467ed.yaml +++ b/nuclei-templates/2013/CVE-2013-2008-d80662422b2866b3d65a5445924467ed.yaml @@ -4,7 +4,7 @@ info: name: > WP Super Cache Plugin <= 1.3 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The WordPress Super Cache Plugin 1.3 has XSS via several vulnerable parameters. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-super-cache/" google-query: inurl:"/wp-content/plugins/wp-super-cache/" shodan-query: 'vuln:CVE-2013-2008' - tags: cve,wordpress,wp-plugin,wp-super-cache,medium + tags: cve,wordpress,wp-plugin,wp-super-cache,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2009-afeb8327fb03504a0b5ac79fd5a442f7.yaml b/nuclei-templates/2013/CVE-2013-2009-afeb8327fb03504a0b5ac79fd5a442f7.yaml index b1c7ef3b98..c9a922c7f2 100644 --- a/nuclei-templates/2013/CVE-2013-2009-afeb8327fb03504a0b5ac79fd5a442f7.yaml +++ b/nuclei-templates/2013/CVE-2013-2009-afeb8327fb03504a0b5ac79fd5a442f7.yaml @@ -4,7 +4,7 @@ info: name: > WP Super Cache <= 1.2 - Remote Code Execution author: topscoder - severity: high + severity: critical description: > The WP Super Cache plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 1.2. This allows unauthenticated attackers to execute code on the server. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-super-cache/" google-query: inurl:"/wp-content/plugins/wp-super-cache/" shodan-query: 'vuln:CVE-2013-2009' - tags: cve,wordpress,wp-plugin,wp-super-cache,high + tags: cve,wordpress,wp-plugin,wp-super-cache,critical http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2107-ff845ece92fe1b8afa1885550aee0170.yaml b/nuclei-templates/2013/CVE-2013-2107-ff845ece92fe1b8afa1885550aee0170.yaml index c72662444c..fee7140a7b 100644 --- a/nuclei-templates/2013/CVE-2013-2107-ff845ece92fe1b8afa1885550aee0170.yaml +++ b/nuclei-templates/2013/CVE-2013-2107-ff845ece92fe1b8afa1885550aee0170.yaml @@ -4,7 +4,7 @@ info: name: > Mail On Update < 5.3.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the Mail On Update plugin before 5.2.0 for WordPress allows remote attackers to hijack the authentication of administrators for requests that change the "List of alternative recipients" via the mailonupdate_mailto parameter in the mail-on-update page to wp-admin/options-general.php. NOTE: a third party claims that 5.2.1 and 5.2.2 are also vulnerable, but the issue might require a separate CVE identifier since this might reflect an incomplete fix. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mail-on-update/" google-query: inurl:"/wp-content/plugins/mail-on-update/" shodan-query: 'vuln:CVE-2013-2107' - tags: cve,wordpress,wp-plugin,mail-on-update,high + tags: cve,wordpress,wp-plugin,mail-on-update,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2109-75c70b1bb438dfcca6e33d6263e0e86e.yaml b/nuclei-templates/2013/CVE-2013-2109-75c70b1bb438dfcca6e33d6263e0e86e.yaml index b404c51351..1b541fb655 100644 --- a/nuclei-templates/2013/CVE-2013-2109-75c70b1bb438dfcca6e33d6263e0e86e.yaml +++ b/nuclei-templates/2013/CVE-2013-2109-75c70b1bb438dfcca6e33d6263e0e86e.yaml @@ -4,7 +4,7 @@ info: name: > WP Cleanfix Plugin < 5.0.0 - Remote Code Execution author: topscoder - severity: high + severity: critical description: > WordPress plugin wp-cleanfix has Remote Code Execution reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-cleanfix/" google-query: inurl:"/wp-content/plugins/wp-cleanfix/" shodan-query: 'vuln:CVE-2013-2109' - tags: cve,wordpress,wp-plugin,wp-cleanfix,high + tags: cve,wordpress,wp-plugin,wp-cleanfix,critical http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2200-6ea13de5e88a490bbeb3409f32172b66.yaml b/nuclei-templates/2013/CVE-2013-2200-6ea13de5e88a490bbeb3409f32172b66.yaml index 78f2c06168..fe50e11e81 100644 --- a/nuclei-templates/2013/CVE-2013-2200-6ea13de5e88a490bbeb3409f32172b66.yaml +++ b/nuclei-templates/2013/CVE-2013-2200-6ea13de5e88a490bbeb3409f32172b66.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 3.5.2 - Missing Authorization Checks author: topscoder - severity: medium + severity: high description: > WordPress before 3.5.2 does not properly check the capabilities of roles, which allows remote authenticated users to bypass intended restrictions on publishing and authorship reassignment via unspecified vectors. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2013-2200 metadata: shodan-query: 'vuln:CVE-2013-2200' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2201-7fdbdd031d5c39eb7f813226abb85c96.yaml b/nuclei-templates/2013/CVE-2013-2201-7fdbdd031d5c39eb7f813226abb85c96.yaml index f57052ef26..faee5b2481 100644 --- a/nuclei-templates/2013/CVE-2013-2201-7fdbdd031d5c39eb7f813226abb85c96.yaml +++ b/nuclei-templates/2013/CVE-2013-2201-7fdbdd031d5c39eb7f813226abb85c96.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 3.5.2 - Cross-Site Scripting via Multiple Vectors author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in WordPress before 3.5.2 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) uploads of media files, (2) editing of media files, (3) installation of plugins, (4) updates to plugins, (5) installation of themes, or (6) updates to themes. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2013-2201 metadata: shodan-query: 'vuln:CVE-2013-2201' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2205-9b2541766ae2ed11a30c45f083c00914.yaml b/nuclei-templates/2013/CVE-2013-2205-9b2541766ae2ed11a30c45f083c00914.yaml index a8a528878f..3539683169 100644 --- a/nuclei-templates/2013/CVE-2013-2205-9b2541766ae2ed11a30c45f083c00914.yaml +++ b/nuclei-templates/2013/CVE-2013-2205-9b2541766ae2ed11a30c45f083c00914.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 3.5.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The default configuration of SWFUpload in WordPress before 3.5.2 has an unrestrictive security.allowDomain setting, which allows remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted web site. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2013-2205 metadata: shodan-query: 'vuln:CVE-2013-2205' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2287-38106c08054956ec9ec0eb985cd6a30a.yaml b/nuclei-templates/2013/CVE-2013-2287-38106c08054956ec9ec0eb985cd6a30a.yaml index ecfb9c5b1e..fef896edd6 100644 --- a/nuclei-templates/2013/CVE-2013-2287-38106c08054956ec9ec0eb985cd6a30a.yaml +++ b/nuclei-templates/2013/CVE-2013-2287-38106c08054956ec9ec0eb985cd6a30a.yaml @@ -4,7 +4,7 @@ info: name: > Uploader <= 1.0.4 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in views/notify.php in the Uploader plugin 1.0.4 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) notify or (2) blog parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/uploader/" google-query: inurl:"/wp-content/plugins/uploader/" shodan-query: 'vuln:CVE-2013-2287' - tags: cve,wordpress,wp-plugin,uploader,medium + tags: cve,wordpress,wp-plugin,uploader,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2501-47c8ae751ee325a323299c1e28df1079.yaml b/nuclei-templates/2013/CVE-2013-2501-47c8ae751ee325a323299c1e28df1079.yaml index 76e4756869..24a3881600 100644 --- a/nuclei-templates/2013/CVE-2013-2501-47c8ae751ee325a323299c1e28df1079.yaml +++ b/nuclei-templates/2013/CVE-2013-2501-47c8ae751ee325a323299c1e28df1079.yaml @@ -4,7 +4,7 @@ info: name: > Terillion Reviews < 1.2 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Terillion Reviews plugin before 1.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the ProfileId field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/terillion-reviews/" google-query: inurl:"/wp-content/plugins/terillion-reviews/" shodan-query: 'vuln:CVE-2013-2501' - tags: cve,wordpress,wp-plugin,terillion-reviews,medium + tags: cve,wordpress,wp-plugin,terillion-reviews,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2640-5be3d6220be540ab529a6f616f5316f8.yaml b/nuclei-templates/2013/CVE-2013-2640-5be3d6220be540ab529a6f616f5316f8.yaml index dedaed944a..55071256c5 100644 --- a/nuclei-templates/2013/CVE-2013-2640-5be3d6220be540ab529a6f616f5316f8.yaml +++ b/nuclei-templates/2013/CVE-2013-2640-5be3d6220be540ab529a6f616f5316f8.yaml @@ -4,7 +4,7 @@ info: name: > MailUp newsletter sign-up form < 1.3.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > ajax.functions.php in the MailUp plugin before 1.3.2 for WordPress does not properly restrict access to unspecified Ajax functions, which allows remote attackers to modify plugin settings and conduct cross-site scripting (XSS) attacks via unspecified vectors related to "formData=save" requests, a different version than CVE-2013-0731. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-mailup/" google-query: inurl:"/wp-content/plugins/wp-mailup/" shodan-query: 'vuln:CVE-2013-2640' - tags: cve,wordpress,wp-plugin,wp-mailup,medium + tags: cve,wordpress,wp-plugin,wp-mailup,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2693-b73d87f96280b93d84cc00f272e356ef.yaml b/nuclei-templates/2013/CVE-2013-2693-b73d87f96280b93d84cc00f272e356ef.yaml index eeb9c2602e..8599fab834 100644 --- a/nuclei-templates/2013/CVE-2013-2693-b73d87f96280b93d84cc00f272e356ef.yaml +++ b/nuclei-templates/2013/CVE-2013-2693-b73d87f96280b93d84cc00f272e356ef.yaml @@ -4,7 +4,7 @@ info: name: > WP-Print <= 2.51 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the Options in the WP-Print plugin before 2.52 for WordPress allows remote attackers to hijack the authentication of administrators for requests that manipulate plugin settings via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-print/" google-query: inurl:"/wp-content/plugins/wp-print/" shodan-query: 'vuln:CVE-2013-2693' - tags: cve,wordpress,wp-plugin,wp-print,high + tags: cve,wordpress,wp-plugin,wp-print,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2696-7851eebfd119dbcb64d57949b00c8e79.yaml b/nuclei-templates/2013/CVE-2013-2696-7851eebfd119dbcb64d57949b00c8e79.yaml index f8ef37fa6f..a74241393a 100644 --- a/nuclei-templates/2013/CVE-2013-2696-7851eebfd119dbcb64d57949b00c8e79.yaml +++ b/nuclei-templates/2013/CVE-2013-2696-7851eebfd119dbcb64d57949b00c8e79.yaml @@ -4,7 +4,7 @@ info: name: > WP Webmaster < 8.2.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the All in One Webmaster plugin before 8.2.4 for WordPress allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/all-in-one-webmaster/" google-query: inurl:"/wp-content/plugins/all-in-one-webmaster/" shodan-query: 'vuln:CVE-2013-2696' - tags: cve,wordpress,wp-plugin,all-in-one-webmaster,high + tags: cve,wordpress,wp-plugin,all-in-one-webmaster,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2697-f8b195ad87a5a50c5754f7800933e00c.yaml b/nuclei-templates/2013/CVE-2013-2697-f8b195ad87a5a50c5754f7800933e00c.yaml index 15ffe5d1ba..92cfb03317 100644 --- a/nuclei-templates/2013/CVE-2013-2697-f8b195ad87a5a50c5754f7800933e00c.yaml +++ b/nuclei-templates/2013/CVE-2013-2697-f8b195ad87a5a50c5754f7800933e00c.yaml @@ -4,7 +4,7 @@ info: name: > WP-DownloadManager Plugin < 1.61 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site request forgery (CSRF) vulnerability in the WP-DownloadManager plugin before 1.61 for WordPress allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-download-manager/" google-query: inurl:"/wp-content/plugins/wp-download-manager/" shodan-query: 'vuln:CVE-2013-2697' - tags: cve,wordpress,wp-plugin,wp-download-manager,medium + tags: cve,wordpress,wp-plugin,wp-download-manager,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2699-0e39d853b3d4654c80796b1245bb017e.yaml b/nuclei-templates/2013/CVE-2013-2699-0e39d853b3d4654c80796b1245bb017e.yaml index 087397de48..c2115d7069 100644 --- a/nuclei-templates/2013/CVE-2013-2699-0e39d853b3d4654c80796b1245bb017e.yaml +++ b/nuclei-templates/2013/CVE-2013-2699-0e39d853b3d4654c80796b1245bb017e.yaml @@ -4,7 +4,7 @@ info: name: > underConstruction < 1.09 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the underConstruction plugin before 1.09 for WordPress allows remote attackers to hijack the authentication of administrators for requests that deactivate a plugin via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/underconstruction/" google-query: inurl:"/wp-content/plugins/underconstruction/" shodan-query: 'vuln:CVE-2013-2699' - tags: cve,wordpress,wp-plugin,underconstruction,high + tags: cve,wordpress,wp-plugin,underconstruction,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2700-4fb52fd64080462536a5af2ab82cbace.yaml b/nuclei-templates/2013/CVE-2013-2700-4fb52fd64080462536a5af2ab82cbace.yaml index 47e5883de4..2a627fbdfd 100644 --- a/nuclei-templates/2013/CVE-2013-2700-4fb52fd64080462536a5af2ab82cbace.yaml +++ b/nuclei-templates/2013/CVE-2013-2700-4fb52fd64080462536a5af2ab82cbace.yaml @@ -4,7 +4,7 @@ info: name: > WP125 <= 1.4.9 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the Add/Edit page (adminmenus.php) in the WP125 plugin before 1.5.0 for WordPress allows remote attackers to hijack the authentication of administrators for requests that add or edit an ad via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp125/" google-query: inurl:"/wp-content/plugins/wp125/" shodan-query: 'vuln:CVE-2013-2700' - tags: cve,wordpress,wp-plugin,wp125,high + tags: cve,wordpress,wp-plugin,wp125,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2701-fab081bdfce9f805f8a61feef8468916.yaml b/nuclei-templates/2013/CVE-2013-2701-fab081bdfce9f805f8a61feef8468916.yaml index 8686ad7a7d..6fc8eab4d1 100644 --- a/nuclei-templates/2013/CVE-2013-2701-fab081bdfce9f805f8a61feef8468916.yaml +++ b/nuclei-templates/2013/CVE-2013-2701-fab081bdfce9f805f8a61feef8468916.yaml @@ -4,7 +4,7 @@ info: name: > Social Sharing Toolkit <= 2.1.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the Social Sharing Toolkit plugin 2.1.1 for WordPress allows remote attackers to hijack the authentication of administrators for requests that manipulate plugin settings via unknown vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/social-sharing-toolkit/" google-query: inurl:"/wp-content/plugins/social-sharing-toolkit/" shodan-query: 'vuln:CVE-2013-2701' - tags: cve,wordpress,wp-plugin,social-sharing-toolkit,high + tags: cve,wordpress,wp-plugin,social-sharing-toolkit,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2703-72f73bf14c806744336e445356e6090f.yaml b/nuclei-templates/2013/CVE-2013-2703-72f73bf14c806744336e445356e6090f.yaml index f3393e6813..27d935fa3d 100644 --- a/nuclei-templates/2013/CVE-2013-2703-72f73bf14c806744336e445356e6090f.yaml +++ b/nuclei-templates/2013/CVE-2013-2703-72f73bf14c806744336e445356e6090f.yaml @@ -4,7 +4,7 @@ info: name: > Facebook Members < 5.0.5 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the Facebook Members plugin before 5.0.5 for WordPress allows remote attackers to hijack the authentication of administrators for requests that modify this plugin's settings. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/facebook-members/" google-query: inurl:"/wp-content/plugins/facebook-members/" shodan-query: 'vuln:CVE-2013-2703' - tags: cve,wordpress,wp-plugin,facebook-members,high + tags: cve,wordpress,wp-plugin,facebook-members,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2706-a61b4c2ab615ad0f80b5138981abe8ce.yaml b/nuclei-templates/2013/CVE-2013-2706-a61b4c2ab615ad0f80b5138981abe8ce.yaml index 2e975ac08c..f25f1f0c3d 100644 --- a/nuclei-templates/2013/CVE-2013-2706-a61b4c2ab615ad0f80b5138981abe8ce.yaml +++ b/nuclei-templates/2013/CVE-2013-2706-a61b4c2ab615ad0f80b5138981abe8ce.yaml @@ -4,7 +4,7 @@ info: name: > Stream Video Player <= 1.4.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the Stream Video Player plugin 1.4.1 for WordPress allows remote attackers to hijack the authentication of administrators for requests that change plugin settings via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/stream-video-player/" google-query: inurl:"/wp-content/plugins/stream-video-player/" shodan-query: 'vuln:CVE-2013-2706' - tags: cve,wordpress,wp-plugin,stream-video-player,high + tags: cve,wordpress,wp-plugin,stream-video-player,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2709-9b7bc1f0f7f491c09d5edf25ce5f3958.yaml b/nuclei-templates/2013/CVE-2013-2709-9b7bc1f0f7f491c09d5edf25ce5f3958.yaml index b8ca0b8659..4a76a7fc87 100644 --- a/nuclei-templates/2013/CVE-2013-2709-9b7bc1f0f7f491c09d5edf25ce5f3958.yaml +++ b/nuclei-templates/2013/CVE-2013-2709-9b7bc1f0f7f491c09d5edf25ce5f3958.yaml @@ -4,7 +4,7 @@ info: name: > FourSquare Checkins < 1.3 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the FourSquare Checkins plugin before 1.3 for WordPress allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/foursquare-checkins/" google-query: inurl:"/wp-content/plugins/foursquare-checkins/" shodan-query: 'vuln:CVE-2013-2709' - tags: cve,wordpress,wp-plugin,foursquare-checkins,high + tags: cve,wordpress,wp-plugin,foursquare-checkins,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2710-507e2521f54c5e6ca19bac49a7a788fa.yaml b/nuclei-templates/2013/CVE-2013-2710-507e2521f54c5e6ca19bac49a7a788fa.yaml index 3855aa550a..ac2471ce23 100644 --- a/nuclei-templates/2013/CVE-2013-2710-507e2521f54c5e6ca19bac49a7a788fa.yaml +++ b/nuclei-templates/2013/CVE-2013-2710-507e2521f54c5e6ca19bac49a7a788fa.yaml @@ -4,7 +4,7 @@ info: name: > Contextual Related Posts <= 1.8.6 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the Contextual Related Posts plugin before 1.8.7 for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contextual-related-posts/" google-query: inurl:"/wp-content/plugins/contextual-related-posts/" shodan-query: 'vuln:CVE-2013-2710' - tags: cve,wordpress,wp-plugin,contextual-related-posts,high + tags: cve,wordpress,wp-plugin,contextual-related-posts,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-2714-396371aecede5680b30f6adf18b9bebd.yaml b/nuclei-templates/2013/CVE-2013-2714-396371aecede5680b30f6adf18b9bebd.yaml index b22b335372..1c98118aa0 100644 --- a/nuclei-templates/2013/CVE-2013-2714-396371aecede5680b30f6adf18b9bebd.yaml +++ b/nuclei-templates/2013/CVE-2013-2714-396371aecede5680b30f6adf18b9bebd.yaml @@ -4,7 +4,7 @@ info: name: > podPress <= 8.8.10.17 - Cross-Site Scripting via playerID author: topscoder - severity: medium + severity: high description: > Cross-site Scripting (XSS) in WordPress podPress Plugin 8.8.10.17 (and possibly more) could allow remote attackers to inject arbitrary web script or html via the 'playerID' parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/podpress/" google-query: inurl:"/wp-content/plugins/podpress/" shodan-query: 'vuln:CVE-2013-2714' - tags: cve,wordpress,wp-plugin,podpress,medium + tags: cve,wordpress,wp-plugin,podpress,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-3251-bc3ead94b2639f49d2a3b634baef9593.yaml b/nuclei-templates/2013/CVE-2013-3251-bc3ead94b2639f49d2a3b634baef9593.yaml index 00b1af6e2f..29991fe2e8 100644 --- a/nuclei-templates/2013/CVE-2013-3251-bc3ead94b2639f49d2a3b634baef9593.yaml +++ b/nuclei-templates/2013/CVE-2013-3251-bc3ead94b2639f49d2a3b634baef9593.yaml @@ -4,7 +4,7 @@ info: name: > qTranslate <= 2.5.39 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the qTranslate plugin 2.5.34 and earlier for WordPress allows remote attackers to hijack the authentication of administrators for requests that change plugin settings via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/qtranslate/" google-query: inurl:"/wp-content/plugins/qtranslate/" shodan-query: 'vuln:CVE-2013-3251' - tags: cve,wordpress,wp-plugin,qtranslate,high + tags: cve,wordpress,wp-plugin,qtranslate,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-3252-888312a64923f43849174a79d906913e.yaml b/nuclei-templates/2013/CVE-2013-3252-888312a64923f43849174a79d906913e.yaml index b567619a34..404200952d 100644 --- a/nuclei-templates/2013/CVE-2013-3252-888312a64923f43849174a79d906913e.yaml +++ b/nuclei-templates/2013/CVE-2013-3252-888312a64923f43849174a79d906913e.yaml @@ -4,7 +4,7 @@ info: name: > WP-PostViews < 1.63 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the options admin page in the WP-PostViews plugin before 1.63 for WordPress allows remote attackers to hijack the authentication of administrators for requests that change plugin settings via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-postviews/" google-query: inurl:"/wp-content/plugins/wp-postviews/" shodan-query: 'vuln:CVE-2013-3252' - tags: cve,wordpress,wp-plugin,wp-postviews,high + tags: cve,wordpress,wp-plugin,wp-postviews,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-3253-1ce0c9b4a51f3fdac3a650bd3678e546.yaml b/nuclei-templates/2013/CVE-2013-3253-1ce0c9b4a51f3fdac3a650bd3678e546.yaml index e3989abefd..c5b27a8e7d 100644 --- a/nuclei-templates/2013/CVE-2013-3253-1ce0c9b4a51f3fdac3a650bd3678e546.yaml +++ b/nuclei-templates/2013/CVE-2013-3253-1ce0c9b4a51f3fdac3a650bd3678e546.yaml @@ -4,7 +4,7 @@ info: name: > Xhanch – My Twitter <= 2.7.6 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in admin/setting.php in the Xhanch - My Twitter plugin before 2.7.7 for WordPress allows remote attackers to hijack the authentication of administrators for requests that change unspecified settings. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/xhanch-my-twitter/" google-query: inurl:"/wp-content/plugins/xhanch-my-twitter/" shodan-query: 'vuln:CVE-2013-3253' - tags: cve,wordpress,wp-plugin,xhanch-my-twitter,high + tags: cve,wordpress,wp-plugin,xhanch-my-twitter,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-3254-b3f583df01b20215cf8c32eded7781af.yaml b/nuclei-templates/2013/CVE-2013-3254-b3f583df01b20215cf8c32eded7781af.yaml index 08ccff5ebd..9a096ea7cc 100644 --- a/nuclei-templates/2013/CVE-2013-3254-b3f583df01b20215cf8c32eded7781af.yaml +++ b/nuclei-templates/2013/CVE-2013-3254-b3f583df01b20215cf8c32eded7781af.yaml @@ -4,7 +4,7 @@ info: name: > WP Photo Album Plus < 5.0.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-admin/admin.php in the WP Photo Album Plus plugin before 5.0.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the commentid parameter in a wppa_manage_comments edit action. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-photo-album-plus/" google-query: inurl:"/wp-content/plugins/wp-photo-album-plus/" shodan-query: 'vuln:CVE-2013-3254' - tags: cve,wordpress,wp-plugin,wp-photo-album-plus,medium + tags: cve,wordpress,wp-plugin,wp-photo-album-plus,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-3256-5031bc59caa3037821df61e5a345c90f.yaml b/nuclei-templates/2013/CVE-2013-3256-5031bc59caa3037821df61e5a345c90f.yaml index db0eaa2ee9..44d848d4b0 100644 --- a/nuclei-templates/2013/CVE-2013-3256-5031bc59caa3037821df61e5a345c90f.yaml +++ b/nuclei-templates/2013/CVE-2013-3256-5031bc59caa3037821df61e5a345c90f.yaml @@ -4,7 +4,7 @@ info: name: > SexyBookmarks <= 6.1.4.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the Shareaholic SexyBookmarks plugin 6.1.4.0 for WordPress allows remote attackers to hijack the authentication of users for requests that "manipulate plugin settings." reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sexybookmarks/" google-query: inurl:"/wp-content/plugins/sexybookmarks/" shodan-query: 'vuln:CVE-2013-3256' - tags: cve,wordpress,wp-plugin,sexybookmarks,high + tags: cve,wordpress,wp-plugin,sexybookmarks,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-3261-4a78286f0fa257bf74920260dae5103f.yaml b/nuclei-templates/2013/CVE-2013-3261-4a78286f0fa257bf74920260dae5103f.yaml index 608fd019fb..7db2cc741d 100644 --- a/nuclei-templates/2013/CVE-2013-3261-4a78286f0fa257bf74920260dae5103f.yaml +++ b/nuclei-templates/2013/CVE-2013-3261-4a78286f0fa257bf74920260dae5103f.yaml @@ -4,7 +4,7 @@ info: name: > Album and Image Gallery with Lightbox – Flagallery Photo Portfolio < 2.72 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-admin/admin.php in the GRAND FlAGallery plugin before 2.72 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter in a flag-manage-gallery action. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/flash-album-gallery/" google-query: inurl:"/wp-content/plugins/flash-album-gallery/" shodan-query: 'vuln:CVE-2013-3261' - tags: cve,wordpress,wp-plugin,flash-album-gallery,medium + tags: cve,wordpress,wp-plugin,flash-album-gallery,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-3262-a760bafd1cd95a91af8a27215ef05ba2.yaml b/nuclei-templates/2013/CVE-2013-3262-a760bafd1cd95a91af8a27215ef05ba2.yaml index b222a48cfc..bbaf2e0929 100644 --- a/nuclei-templates/2013/CVE-2013-3262-a760bafd1cd95a91af8a27215ef05ba2.yaml +++ b/nuclei-templates/2013/CVE-2013-3262-a760bafd1cd95a91af8a27215ef05ba2.yaml @@ -4,7 +4,7 @@ info: name: > Download Monitor < 3.3.6.2 - Cross-Site Scripting via p Parameter author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in admin/admin.php in the Download Monitor plugin before 3.3.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the p parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/download-monitor/" google-query: inurl:"/wp-content/plugins/download-monitor/" shodan-query: 'vuln:CVE-2013-3262' - tags: cve,wordpress,wp-plugin,download-monitor,medium + tags: cve,wordpress,wp-plugin,download-monitor,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-3263-d7975313aa0a75118cad6d46dc36f4d3.yaml b/nuclei-templates/2013/CVE-2013-3263-d7975313aa0a75118cad6d46dc36f4d3.yaml index ade064735c..d5543e8ad3 100644 --- a/nuclei-templates/2013/CVE-2013-3263-d7975313aa0a75118cad6d46dc36f4d3.yaml +++ b/nuclei-templates/2013/CVE-2013-3263-d7975313aa0a75118cad6d46dc36f4d3.yaml @@ -4,7 +4,7 @@ info: name: > WP Ultimate Email Marketer <= 1.2.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the WP Ultimate Email Marketer plugin 1.2.0 and possibly earlier for Wordpress allow remote attackers to inject arbitrary web script or HTML via the (1) siteurl parameter to campaign/campaignone.php; the (2) action, (3) campaignname, (4) campaignformat, or (5) emailtemplate parameter to campaign/campaigntwo.php; the (6) listid parameter to list/edit.php; the (7) campaignid or (8) siteurl parameter to campaign/editcampaign.php; the (9) campaignid parameter to campaign/selectlistb4send.php; the (10) campaignid, (11) campaignname, (12) campaignsubject, or (13) selectedcampaigns parameter to campaign/sendCampaign.php; or the (14) campaignid, (15) campaignname, (16) campaignformat, or (17) action parameter to campaign/updatecampaign.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-ultimate-email-marketer/" google-query: inurl:"/wp-content/plugins/wp-ultimate-email-marketer/" shodan-query: 'vuln:CVE-2013-3263' - tags: cve,wordpress,wp-plugin,wp-ultimate-email-marketer,medium + tags: cve,wordpress,wp-plugin,wp-ultimate-email-marketer,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-3477-58ad613c40728469546ff0c459432f85.yaml b/nuclei-templates/2013/CVE-2013-3477-58ad613c40728469546ff0c459432f85.yaml index 9c98a26ced..653732e7cb 100644 --- a/nuclei-templates/2013/CVE-2013-3477-58ad613c40728469546ff0c459432f85.yaml +++ b/nuclei-templates/2013/CVE-2013-3477-58ad613c40728469546ff0c459432f85.yaml @@ -4,7 +4,7 @@ info: name: > Related Posts by Zemanta <= 1.3.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the Related Posts by Zemanta plugin before 1.3.2 for WordPress allows remote attackers to hijack the authentication of unspecified users for requests that change settings via unknown vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/related-posts-by-zemanta/" google-query: inurl:"/wp-content/plugins/related-posts-by-zemanta/" shodan-query: 'vuln:CVE-2013-3477' - tags: cve,wordpress,wp-plugin,related-posts-by-zemanta,high + tags: cve,wordpress,wp-plugin,related-posts-by-zemanta,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-3479-32ca157e45a11cba9d0a4e52d697d9d8.yaml b/nuclei-templates/2013/CVE-2013-3479-32ca157e45a11cba9d0a4e52d697d9d8.yaml index 36b6b75afa..5eaaa01e00 100644 --- a/nuclei-templates/2013/CVE-2013-3479-32ca157e45a11cba9d0a4e52d697d9d8.yaml +++ b/nuclei-templates/2013/CVE-2013-3479-32ca157e45a11cba9d0a4e52d697d9d8.yaml @@ -4,7 +4,7 @@ info: name: > ShareThis <= 7.0.5 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the ShareThis plugin before 7.0.6 for WordPress allows remote attackers to hijack the authentication of administrators for requests that modify this plugin's settings. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/share-this/" google-query: inurl:"/wp-content/plugins/share-this/" shodan-query: 'vuln:CVE-2013-3479' - tags: cve,wordpress,wp-plugin,share-this,high + tags: cve,wordpress,wp-plugin,share-this,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-3487-123845e838da3a6daa580f3b2ed445cb.yaml b/nuclei-templates/2013/CVE-2013-3487-123845e838da3a6daa580f3b2ed445cb.yaml index 5ad070d172..6edaead515 100644 --- a/nuclei-templates/2013/CVE-2013-3487-123845e838da3a6daa580f3b2ed445cb.yaml +++ b/nuclei-templates/2013/CVE-2013-3487-123845e838da3a6daa580f3b2ed445cb.yaml @@ -4,7 +4,7 @@ info: name: > BulletProof Security <= .48.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the security log in the BulletProof Security plugin before .49 for WordPress allow remote attackers to inject arbitrary web script or HTML via unspecified HTML header fields to (1) 400.php, (2) 403.php, or (3) 403.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bulletproof-security/" google-query: inurl:"/wp-content/plugins/bulletproof-security/" shodan-query: 'vuln:CVE-2013-3487' - tags: cve,wordpress,wp-plugin,bulletproof-security,medium + tags: cve,wordpress,wp-plugin,bulletproof-security,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-3491-61fcaed16881b56993f1d78f9758c2b3.yaml b/nuclei-templates/2013/CVE-2013-3491-61fcaed16881b56993f1d78f9758c2b3.yaml index 9a67da1976..6131716b97 100644 --- a/nuclei-templates/2013/CVE-2013-3491-61fcaed16881b56993f1d78f9758c2b3.yaml +++ b/nuclei-templates/2013/CVE-2013-3491-61fcaed16881b56993f1d78f9758c2b3.yaml @@ -4,7 +4,7 @@ info: name: > Sharebar <= 1.4.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the Sharebar plugin 1.4.2 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) add or (2) modify buttons, or (3) insert cross-site scripting (XSS) sequences. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sharebar/" google-query: inurl:"/wp-content/plugins/sharebar/" shodan-query: 'vuln:CVE-2013-3491' - tags: cve,wordpress,wp-plugin,sharebar,medium + tags: cve,wordpress,wp-plugin,sharebar,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-3526-f3bf3aa52e1e30ba08101ace5617af2a.yaml b/nuclei-templates/2013/CVE-2013-3526-f3bf3aa52e1e30ba08101ace5617af2a.yaml index 3f8b9b821b..7ad0fdcd04 100644 --- a/nuclei-templates/2013/CVE-2013-3526-f3bf3aa52e1e30ba08101ace5617af2a.yaml +++ b/nuclei-templates/2013/CVE-2013-3526-f3bf3aa52e1e30ba08101ace5617af2a.yaml @@ -4,7 +4,7 @@ info: name: > Traffic Analyzer < 3.4.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in js/ta_loaded.js.php in the Traffic Analyzer plugin, possibly 3.4.1 and earlier, for WordPress allows remote attackers to inject arbitrary web script or HTML via the aoid parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/trafficanalyzer/" google-query: inurl:"/wp-content/plugins/trafficanalyzer/" shodan-query: 'vuln:CVE-2013-3526' - tags: cve,wordpress,wp-plugin,trafficanalyzer,medium + tags: cve,wordpress,wp-plugin,trafficanalyzer,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-3720-42f14cb098faa7900818b46106b42afa.yaml b/nuclei-templates/2013/CVE-2013-3720-42f14cb098faa7900818b46106b42afa.yaml index 6310e5e93d..f3ca631f53 100644 --- a/nuclei-templates/2013/CVE-2013-3720-42f14cb098faa7900818b46106b42afa.yaml +++ b/nuclei-templates/2013/CVE-2013-3720-42f14cb098faa7900818b46106b42afa.yaml @@ -4,7 +4,7 @@ info: name: > Feedweb < 1.9 - Authenticated (Admin+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Feedweb plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'wp_post_id' parameter in versions up to 1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/feedweb/" google-query: inurl:"/wp-content/plugins/feedweb/" shodan-query: 'vuln:CVE-2013-3720' - tags: cve,wordpress,wp-plugin,feedweb,medium + tags: cve,wordpress,wp-plugin,feedweb,low http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-4240-8de4556487daff9f80ef882a72ac48a1.yaml b/nuclei-templates/2013/CVE-2013-4240-8de4556487daff9f80ef882a72ac48a1.yaml index 62a2aaece9..69754925fe 100644 --- a/nuclei-templates/2013/CVE-2013-4240-8de4556487daff9f80ef882a72ac48a1.yaml +++ b/nuclei-templates/2013/CVE-2013-4240-8de4556487daff9f80ef882a72ac48a1.yaml @@ -4,7 +4,7 @@ info: name: > HMS Testimonials <= 2.0.10 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the HMS Testimonials plugin before 2.0.11 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) add new testimonials via the hms-testimonials-addnew page, (2) add new groups via the hms-testimonials-addnewgroup page, (3) change default settings via the hms-testimonials-settings page, (4) change advanced settings via the hms-testimonials-settings-advanced page, (5) change custom fields settings via the hms-testimonials-settings-fields page, or (6) change template settings via the hms-testimonials-templates-new page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/hms-testimonials/" google-query: inurl:"/wp-content/plugins/hms-testimonials/" shodan-query: 'vuln:CVE-2013-4240' - tags: cve,wordpress,wp-plugin,hms-testimonials,high + tags: cve,wordpress,wp-plugin,hms-testimonials,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-4241-0edbba73cef4d5273525e9fdeb2bcb4c.yaml b/nuclei-templates/2013/CVE-2013-4241-0edbba73cef4d5273525e9fdeb2bcb4c.yaml index 957dee4648..87bfddd411 100644 --- a/nuclei-templates/2013/CVE-2013-4241-0edbba73cef4d5273525e9fdeb2bcb4c.yaml +++ b/nuclei-templates/2013/CVE-2013-4241-0edbba73cef4d5273525e9fdeb2bcb4c.yaml @@ -4,7 +4,7 @@ info: name: > HMS Testimonials < 2.0.11 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the HMS Testimonials plugin before 2.0.11 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) name, (2) image, (3) url, or (4) testimonial parameter to the Testimonial form (hms-testimonials-addnew page); (5) date_format parameter to the Settings - Default form (hms-testimonials-settings page); (6) name parameter in a Save action to the Settings - Custom Fields form (hms-testimonials-settings-fields page); or (7) name parameter in a Save action to the Settings - Template form (hms-testimonials-templates-new page). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/hms-testimonials/" google-query: inurl:"/wp-content/plugins/hms-testimonials/" shodan-query: 'vuln:CVE-2013-4241' - tags: cve,wordpress,wp-plugin,hms-testimonials,medium + tags: cve,wordpress,wp-plugin,hms-testimonials,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-4625-0244633df1d46b9b703b5c746fbc6e51.yaml b/nuclei-templates/2013/CVE-2013-4625-0244633df1d46b9b703b5c746fbc6e51.yaml index c75016a193..7d779584ba 100644 --- a/nuclei-templates/2013/CVE-2013-4625-0244633df1d46b9b703b5c746fbc6e51.yaml +++ b/nuclei-templates/2013/CVE-2013-4625-0244633df1d46b9b703b5c746fbc6e51.yaml @@ -4,7 +4,7 @@ info: name: > Duplicator – WordPress Migration Plugin <= 0.4.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in files/installer.cleanup.php in the Duplicator plugin before 0.4.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the package parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/duplicator/" google-query: inurl:"/wp-content/plugins/duplicator/" shodan-query: 'vuln:CVE-2013-4625' - tags: cve,wordpress,wp-plugin,duplicator,medium + tags: cve,wordpress,wp-plugin,duplicator,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-4626-356feecea26ff4c40d9fa77a244963ee.yaml b/nuclei-templates/2013/CVE-2013-4626-356feecea26ff4c40d9fa77a244963ee.yaml index 37e500d5ec..58b105d15a 100644 --- a/nuclei-templates/2013/CVE-2013-4626-356feecea26ff4c40d9fa77a244963ee.yaml +++ b/nuclei-templates/2013/CVE-2013-4626-356feecea26ff4c40d9fa77a244963ee.yaml @@ -4,7 +4,7 @@ info: name: > BackWPup < 3.0.13 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the BackWPup plugin before 3.0.13 for WordPress allows remote attackers to inject arbitrary web script or HTML via the tab parameter to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/backwpup/" google-query: inurl:"/wp-content/plugins/backwpup/" shodan-query: 'vuln:CVE-2013-4626' - tags: cve,wordpress,wp-plugin,backwpup,medium + tags: cve,wordpress,wp-plugin,backwpup,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-4693-75fb06485693f13299e4aa42a8ec1d70.yaml b/nuclei-templates/2013/CVE-2013-4693-75fb06485693f13299e4aa42a8ec1d70.yaml index 90a9869d0e..45316adf03 100644 --- a/nuclei-templates/2013/CVE-2013-4693-75fb06485693f13299e4aa42a8ec1d70.yaml +++ b/nuclei-templates/2013/CVE-2013-4693-75fb06485693f13299e4aa42a8ec1d70.yaml @@ -4,7 +4,7 @@ info: name: > Xorbin Digital Flash Clock < 1.0 - DOM Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > WordPress Xorbin Digital Flash Clock 1.0 has XSS via 'widgetUrl' parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/xorbin-digital-flash-clock/" google-query: inurl:"/wp-content/plugins/xorbin-digital-flash-clock/" shodan-query: 'vuln:CVE-2013-4693' - tags: cve,wordpress,wp-plugin,xorbin-digital-flash-clock,medium + tags: cve,wordpress,wp-plugin,xorbin-digital-flash-clock,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-4944-a103c2e3cc97ab522767ac0230b22480.yaml b/nuclei-templates/2013/CVE-2013-4944-a103c2e3cc97ab522767ac0230b22480.yaml index ba0db5bc2f..0d498dcd44 100644 --- a/nuclei-templates/2013/CVE-2013-4944-a103c2e3cc97ab522767ac0230b22480.yaml +++ b/nuclei-templates/2013/CVE-2013-4944-a103c2e3cc97ab522767ac0230b22480.yaml @@ -4,7 +4,7 @@ info: name: > BuddyPress Extended Friendship Request < 1.0.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the BuddyPress Extended Friendship Request plugin before 1.0.2 for WordPress, when the "Friend Connections" component is enabled, allows remote attackers to inject arbitrary web script or HTML via the friendship_request_message parameter to wp-admin/admin-ajax.php. NOTE: some of these details are obtained from third party information. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/buddypress-extended-friendship-request/" google-query: inurl:"/wp-content/plugins/buddypress-extended-friendship-request/" shodan-query: 'vuln:CVE-2013-4944' - tags: cve,wordpress,wp-plugin,buddypress-extended-friendship-request,medium + tags: cve,wordpress,wp-plugin,buddypress-extended-friendship-request,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-4954-085dcf91f1430534b15ba25ebc810709.yaml b/nuclei-templates/2013/CVE-2013-4954-085dcf91f1430534b15ba25ebc810709.yaml index cf0cb7dbac..a67142373c 100644 --- a/nuclei-templates/2013/CVE-2013-4954-085dcf91f1430534b15ba25ebc810709.yaml +++ b/nuclei-templates/2013/CVE-2013-4954-085dcf91f1430534b15ba25ebc810709.yaml @@ -4,7 +4,7 @@ info: name: > Pie Register <= 1.30 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in wp-login.php in the Genetech Solutions Pie-Register plugin before 1.31 for WordPress, when "Allow New Registrations to set their own Password" is enabled, allow remote attackers to inject arbitrary web script or HTML via the (1) pass1 or (2) pass2 parameter in a register action. NOTE: some of these details are obtained from third party information. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pie-register/" google-query: inurl:"/wp-content/plugins/pie-register/" shodan-query: 'vuln:CVE-2013-4954' - tags: cve,wordpress,wp-plugin,pie-register,medium + tags: cve,wordpress,wp-plugin,pie-register,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-5672-bc1fc73bd669dca4197ffa756353cd75.yaml b/nuclei-templates/2013/CVE-2013-5672-bc1fc73bd669dca4197ffa756353cd75.yaml index 79485560b2..6a32f10d86 100644 --- a/nuclei-templates/2013/CVE-2013-5672-bc1fc73bd669dca4197ffa756353cd75.yaml +++ b/nuclei-templates/2013/CVE-2013-5672-bc1fc73bd669dca4197ffa756353cd75.yaml @@ -4,7 +4,7 @@ info: name: > Testimonial < 2.3 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the IndiaNIC Testimonial plugin 2.2 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) add a testimonial via an iNIC_testimonial_save action; (2) add a listing template via an iNIC_testimonial_save_listing_template action; (3) add a widget template via an iNIC_testimonial_save_widget action; insert cross-site scripting (XSS) sequences via the (4) project_name, (5) project_url, (6) client_name, (7) client_city, (8) client_state, (9) description, (10) tags, (11) video_url, or (12) is_featured, (13) title, (14) widget_title, (15) no_of_testimonials, (16) filter_by_country, (17) filter_by_tags, or (18) widget_template parameter to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/indianic-testimonial/" google-query: inurl:"/wp-content/plugins/indianic-testimonial/" shodan-query: 'vuln:CVE-2013-5672' - tags: cve,wordpress,wp-plugin,indianic-testimonial,high + tags: cve,wordpress,wp-plugin,indianic-testimonial,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-5711-eaff27608bcf6deda804f06712a1b098.yaml b/nuclei-templates/2013/CVE-2013-5711-eaff27608bcf6deda804f06712a1b098.yaml index 672cf327d3..c1d5c4f25e 100644 --- a/nuclei-templates/2013/CVE-2013-5711-eaff27608bcf6deda804f06712a1b098.yaml +++ b/nuclei-templates/2013/CVE-2013-5711-eaff27608bcf6deda804f06712a1b098.yaml @@ -4,7 +4,7 @@ info: name: > Design Approval System <= 3.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in admin/walkthrough/walkthrough.php in the Design Approval System plugin before 3.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the step parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/design-approval-system/" google-query: inurl:"/wp-content/plugins/design-approval-system/" shodan-query: 'vuln:CVE-2013-5711' - tags: cve,wordpress,wp-plugin,design-approval-system,medium + tags: cve,wordpress,wp-plugin,design-approval-system,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-5916-3dc139e568d48b3719f09d74e5c6ac5a.yaml b/nuclei-templates/2013/CVE-2013-5916-3dc139e568d48b3719f09d74e5c6ac5a.yaml index db24a79758..dbed9cb117 100644 --- a/nuclei-templates/2013/CVE-2013-5916-3dc139e568d48b3719f09d74e5c6ac5a.yaml +++ b/nuclei-templates/2013/CVE-2013-5916-3dc139e568d48b3719f09d74e5c6ac5a.yaml @@ -4,7 +4,7 @@ info: name: > Bradesco Gateway <= 2.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in falha.php in the Bradesco Gateway plugin 2.0 for Wordpress, as used in the WP e-Commerce plugin, allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bradesco-gateway/" google-query: inurl:"/wp-content/plugins/bradesco-gateway/" shodan-query: 'vuln:CVE-2013-5916' - tags: cve,wordpress,wp-plugin,bradesco-gateway,medium + tags: cve,wordpress,wp-plugin,bradesco-gateway,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-5978-67c99f9c8f327331a1d82c5ff5d685e7.yaml b/nuclei-templates/2013/CVE-2013-5978-67c99f9c8f327331a1d82c5ff5d685e7.yaml index 25b5d95cf7..d7494000a2 100644 --- a/nuclei-templates/2013/CVE-2013-5978-67c99f9c8f327331a1d82c5ff5d685e7.yaml +++ b/nuclei-templates/2013/CVE-2013-5978-67c99f9c8f327331a1d82c5ff5d685e7.yaml @@ -4,7 +4,7 @@ info: name: > Cart66 Lite :: WordPress Ecommerce < 1.5.1.15 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in products.php in the Cart66 Lite plugin before 1.5.1.15 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) Product name or (2) Price description fields via a request to wp-admin/admin.php. NOTE: This issue may only cross privilege boundaries if used in combination with CVE-2013-5977. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cart66-lite/" google-query: inurl:"/wp-content/plugins/cart66-lite/" shodan-query: 'vuln:CVE-2013-5978' - tags: cve,wordpress,wp-plugin,cart66-lite,medium + tags: cve,wordpress,wp-plugin,cart66-lite,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-5988-996209252b43de8bc510aae02fc9d00b.yaml b/nuclei-templates/2013/CVE-2013-5988-996209252b43de8bc510aae02fc9d00b.yaml index 5714e03268..cd54d7c493 100644 --- a/nuclei-templates/2013/CVE-2013-5988-996209252b43de8bc510aae02fc9d00b.yaml +++ b/nuclei-templates/2013/CVE-2013-5988-996209252b43de8bc510aae02fc9d00b.yaml @@ -4,7 +4,7 @@ info: name: > All in One SEO <= 2.0.3 - Cross-Site Scripting via Search Parameter author: topscoder - severity: medium + severity: high description: > A Cross-site Scripting (XSS) vulnerability exists in the All in One SEO Pack plugin before 2.0.3.1 for WordPress via the Search parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/all-in-one-seo-pack/" google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" shodan-query: 'vuln:CVE-2013-5988' - tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,medium + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-6280-dcf043d6af78599175beab95bc8309bb.yaml b/nuclei-templates/2013/CVE-2013-6280-dcf043d6af78599175beab95bc8309bb.yaml index 842bec096f..86dbf3cd4c 100644 --- a/nuclei-templates/2013/CVE-2013-6280-dcf043d6af78599175beab95bc8309bb.yaml +++ b/nuclei-templates/2013/CVE-2013-6280-dcf043d6af78599175beab95bc8309bb.yaml @@ -4,7 +4,7 @@ info: name: > Social Sharing Toolkit < 2.1.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in Social Sharing Toolkit plugin before 2.1.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/social-sharing-toolkit/" google-query: inurl:"/wp-content/plugins/social-sharing-toolkit/" shodan-query: 'vuln:CVE-2013-6280' - tags: cve,wordpress,wp-plugin,social-sharing-toolkit,medium + tags: cve,wordpress,wp-plugin,social-sharing-toolkit,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-6281-c9ddd0481037c81ec76638f9cdd36097.yaml b/nuclei-templates/2013/CVE-2013-6281-c9ddd0481037c81ec76638f9cdd36097.yaml index 402b0b40b8..7d9b8aee76 100644 --- a/nuclei-templates/2013/CVE-2013-6281-c9ddd0481037c81ec76638f9cdd36097.yaml +++ b/nuclei-templates/2013/CVE-2013-6281-c9ddd0481037c81ec76638f9cdd36097.yaml @@ -4,7 +4,7 @@ info: name: > dhtmlxSpreadsheet <= 2.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The dhtmlxSpreadsheet plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 2.0 via the 'page' parameter due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/dhtmlxspreadsheet/" google-query: inurl:"/wp-content/plugins/dhtmlxspreadsheet/" shodan-query: 'vuln:CVE-2013-6281' - tags: cve,wordpress,wp-plugin,dhtmlxspreadsheet,medium + tags: cve,wordpress,wp-plugin,dhtmlxspreadsheet,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-6342-b04c389a2c7db09e215c22221497896f.yaml b/nuclei-templates/2013/CVE-2013-6342-b04c389a2c7db09e215c22221497896f.yaml index 729f682565..5db602c97f 100644 --- a/nuclei-templates/2013/CVE-2013-6342-b04c389a2c7db09e215c22221497896f.yaml +++ b/nuclei-templates/2013/CVE-2013-6342-b04c389a2c7db09e215c22221497896f.yaml @@ -4,7 +4,7 @@ info: name: > Tweet Blender <= 4.0.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Tweet Blender plugin before 4.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the tb_tab_index parameter to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/tweet-blender/" google-query: inurl:"/wp-content/plugins/tweet-blender/" shodan-query: 'vuln:CVE-2013-6342' - tags: cve,wordpress,wp-plugin,tweet-blender,medium + tags: cve,wordpress,wp-plugin,tweet-blender,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-6797-683c8ae1178fe6f9d3ed4e7dea6abbfa.yaml b/nuclei-templates/2013/CVE-2013-6797-683c8ae1178fe6f9d3ed4e7dea6abbfa.yaml index 55acbb308f..26b404662c 100644 --- a/nuclei-templates/2013/CVE-2013-6797-683c8ae1178fe6f9d3ed4e7dea6abbfa.yaml +++ b/nuclei-templates/2013/CVE-2013-6797-683c8ae1178fe6f9d3ed4e7dea6abbfa.yaml @@ -4,7 +4,7 @@ info: name: > Blue Wrench Video Widget < 2.0.0 - Cross-Site Request Forgery and to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in bluewrench-video-widget.php in the Blue Wrench Video Widget plugin before 2.0.0 for WordPress allows remote attackers to hijack the authentication of administrators for requests that embed arbitrary URLs via the bw_url parameter in the bw-videos page to wp-admin/admin.php, allowing the injection of arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/blue-wrench-videos-widget/" google-query: inurl:"/wp-content/plugins/blue-wrench-videos-widget/" shodan-query: 'vuln:CVE-2013-6797' - tags: cve,wordpress,wp-plugin,blue-wrench-videos-widget,high + tags: cve,wordpress,wp-plugin,blue-wrench-videos-widget,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-6837-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml b/nuclei-templates/2013/CVE-2013-6837-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml index fea3717870..3eefc1a235 100644 --- a/nuclei-templates/2013/CVE-2013-6837-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml +++ b/nuclei-templates/2013/CVE-2013-6837-af71bdcfe6e10b4aec22bfd701d5b3f4.yaml @@ -4,7 +4,7 @@ info: name: > PrettyPhoto Library (Multiple Plugins and Themes) <= 3.1.4 - DOM Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the setTimeout function in js/jquery.prettyPhoto.js in prettyPhoto 3.1.4 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted PATH_INTO to the default URI. reference: @@ -14,17 +14,17 @@ info: cvss-score: 6.1 cve-id: CVE-2013-6837 metadata: - fofa-query: "wp-content/plugins/random-image-gallery-with-pretty-photo-zoom/" - google-query: inurl:"/wp-content/plugins/random-image-gallery-with-pretty-photo-zoom/" + fofa-query: "wp-content/plugins/mklasens-photobox/" + google-query: inurl:"/wp-content/plugins/mklasens-photobox/" shodan-query: 'vuln:CVE-2013-6837' - tags: cve,wordpress,wp-plugin,random-image-gallery-with-pretty-photo-zoom,medium + tags: cve,wordpress,wp-plugin,mklasens-photobox,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/random-image-gallery-with-pretty-photo-zoom/readme.txt" + - "{{BaseURL}}/wp-content/plugins/mklasens-photobox/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "random-image-gallery-with-pretty-photo-zoom" + - "mklasens-photobox" part: body - type: dsl dsl: - - compare_versions(version, '< 7.5') \ No newline at end of file + - compare_versions(version, '<= *') \ No newline at end of file diff --git a/nuclei-templates/2013/CVE-2013-6991-2f795470b566b4d4e27fdf7c4b01f4e4.yaml b/nuclei-templates/2013/CVE-2013-6991-2f795470b566b4d4e27fdf7c4b01f4e4.yaml index 2c3da6811a..122deeff9e 100644 --- a/nuclei-templates/2013/CVE-2013-6991-2f795470b566b4d4e27fdf7c4b01f4e4.yaml +++ b/nuclei-templates/2013/CVE-2013-6991-2f795470b566b4d4e27fdf7c4b01f4e4.yaml @@ -4,7 +4,7 @@ info: name: > WP-Cron Dashboard < 1.1.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the WP-Cron Dashboard plugin 1.1.5 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the procname parameter to wp-admin/tools.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-cron-dashboard/" google-query: inurl:"/wp-content/plugins/wp-cron-dashboard/" shodan-query: 'vuln:CVE-2013-6991' - tags: cve,wordpress,wp-plugin,wp-cron-dashboard,medium + tags: cve,wordpress,wp-plugin,wp-cron-dashboard,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-6992-3ee736065c571005f3aa44af407146c3.yaml b/nuclei-templates/2013/CVE-2013-6992-3ee736065c571005f3aa44af407146c3.yaml index cff61b16ab..0fa3754669 100644 --- a/nuclei-templates/2013/CVE-2013-6992-3ee736065c571005f3aa44af407146c3.yaml +++ b/nuclei-templates/2013/CVE-2013-6992-3ee736065c571005f3aa44af407146c3.yaml @@ -4,7 +4,7 @@ info: name: > AskApache Firefox Adsense <= 3.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in askapache-firefox-adsense.php in the AskApache Firefox Adsense plugin 3.0 and earlier for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the aafireadcode parameter to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/askapache-firefox-adsense/" google-query: inurl:"/wp-content/plugins/askapache-firefox-adsense/" shodan-query: 'vuln:CVE-2013-6992' - tags: cve,wordpress,wp-plugin,askapache-firefox-adsense,high + tags: cve,wordpress,wp-plugin,askapache-firefox-adsense,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-6993-8ed4f4b4804b54524ede760d18b29fad.yaml b/nuclei-templates/2013/CVE-2013-6993-8ed4f4b4804b54524ede760d18b29fad.yaml index fa2f8ad8b0..aee9f067cd 100644 --- a/nuclei-templates/2013/CVE-2013-6993-8ed4f4b4804b54524ede760d18b29fad.yaml +++ b/nuclei-templates/2013/CVE-2013-6993-8ed4f4b4804b54524ede760d18b29fad.yaml @@ -4,7 +4,7 @@ info: name: > Ad-minister <= 0.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Ad-minister plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 0.6 via the key parameter in a delete action to wp-admin/tools.php due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ad-minister/" google-query: inurl:"/wp-content/plugins/ad-minister/" shodan-query: 'vuln:CVE-2013-6993' - tags: cve,wordpress,wp-plugin,ad-minister,medium + tags: cve,wordpress,wp-plugin,ad-minister,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-7129-e7c3ee180660fac9fead4fadabb98bef.yaml b/nuclei-templates/2013/CVE-2013-7129-e7c3ee180660fac9fead4fadabb98bef.yaml index 1d2141360d..b9132a6a93 100644 --- a/nuclei-templates/2013/CVE-2013-7129-e7c3ee180660fac9fead4fadabb98bef.yaml +++ b/nuclei-templates/2013/CVE-2013-7129-e7c3ee180660fac9fead4fadabb98bef.yaml @@ -4,7 +4,7 @@ info: name: > Bloog <= 1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in ThemeBeans Blooog theme 1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the jQuery parameter to assets/js/jplayer.swf. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/Blooog-v1.1/" google-query: inurl:"/wp-content/themes/Blooog-v1.1/" shodan-query: 'vuln:CVE-2013-7129' - tags: cve,wordpress,wp-theme,Blooog-v1.1,medium + tags: cve,wordpress,wp-theme,Blooog-v1.1,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-7233-23b973e4e6f56dde6b9f085e9af4fc06.yaml b/nuclei-templates/2013/CVE-2013-7233-23b973e4e6f56dde6b9f085e9af4fc06.yaml index 23d94418ba..28a64d0679 100644 --- a/nuclei-templates/2013/CVE-2013-7233-23b973e4e6f56dde6b9f085e9af4fc06.yaml +++ b/nuclei-templates/2013/CVE-2013-7233-23b973e4e6f56dde6b9f085e9af4fc06.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 2.1 - Cross-Site Request Forgery to Denial of Service author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the retrospam component in wp-admin/options-discussion.php in WordPress 2.0.11 and earlier allows remote attackers to hijack the authentication of administrators for requests that move comments to the moderation list. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2013-7233 metadata: shodan-query: 'vuln:CVE-2013-7233' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-7276-acf04354988365754f4760bff4f381fb.yaml b/nuclei-templates/2013/CVE-2013-7276-acf04354988365754f4760bff4f381fb.yaml index 8f5068f05c..bd12a3be36 100644 --- a/nuclei-templates/2013/CVE-2013-7276-acf04354988365754f4760bff4f381fb.yaml +++ b/nuclei-templates/2013/CVE-2013-7276-acf04354988365754f4760bff4f381fb.yaml @@ -4,7 +4,7 @@ info: name: > Recommend to a friend <= 2.2.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in inc/raf_form.php in the Recommend to a friend plugin 2.2.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the current_url parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/recommend-a-friend/" google-query: inurl:"/wp-content/plugins/recommend-a-friend/" shodan-query: 'vuln:CVE-2013-7276' - tags: cve,wordpress,wp-plugin,recommend-a-friend,medium + tags: cve,wordpress,wp-plugin,recommend-a-friend,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-7279-b308d8dd463cbe3361a5a4c348d193ac.yaml b/nuclei-templates/2013/CVE-2013-7279-b308d8dd463cbe3361a5a4c348d193ac.yaml index ff09b04cde..679ea216f2 100644 --- a/nuclei-templates/2013/CVE-2013-7279-b308d8dd463cbe3361a5a4c348d193ac.yaml +++ b/nuclei-templates/2013/CVE-2013-7279-b308d8dd463cbe3361a5a4c348d193ac.yaml @@ -4,7 +4,7 @@ info: name: > S3 Video <= 0.982 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in views/video-management/preview_video.php in the S3 Video plugin before 0.983 for WordPress allows remote attackers to inject arbitrary web script or HTML via the base parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/s3-video/" google-query: inurl:"/wp-content/plugins/s3-video/" shodan-query: 'vuln:CVE-2013-7279' - tags: cve,wordpress,wp-plugin,s3-video,medium + tags: cve,wordpress,wp-plugin,s3-video,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-7472-178ad27fec6356c0ff4786fef5ed9b55.yaml b/nuclei-templates/2013/CVE-2013-7472-178ad27fec6356c0ff4786fef5ed9b55.yaml index 0b0542a9f5..83889e34ee 100644 --- a/nuclei-templates/2013/CVE-2013-7472-178ad27fec6356c0ff4786fef5ed9b55.yaml +++ b/nuclei-templates/2013/CVE-2013-7472-178ad27fec6356c0ff4786fef5ed9b55.yaml @@ -4,7 +4,7 @@ info: name: > Count per Day < 3.2.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The "Count per Day" plugin before 3.2.6 for WordPress allows XSS via the wp-admin/?page=cpd_metaboxes daytoshow parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/count-per-day/" google-query: inurl:"/wp-content/plugins/count-per-day/" shodan-query: 'vuln:CVE-2013-7472' - tags: cve,wordpress,wp-plugin,count-per-day,medium + tags: cve,wordpress,wp-plugin,count-per-day,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-7475-db0677cd0c6ea98a43e8b2ad4b143537.yaml b/nuclei-templates/2013/CVE-2013-7475-db0677cd0c6ea98a43e8b2ad4b143537.yaml index 921f35cfd6..3a60d2c379 100644 --- a/nuclei-templates/2013/CVE-2013-7475-db0677cd0c6ea98a43e8b2ad4b143537.yaml +++ b/nuclei-templates/2013/CVE-2013-7475-db0677cd0c6ea98a43e8b2ad4b143537.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form by BestWebSoft <= 3.51 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Contact Form by BestWebSoft plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 3.51 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. CVE-2013-10022 may be a duplicate of this issue. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-plugin/" google-query: inurl:"/wp-content/plugins/contact-form-plugin/" shodan-query: 'vuln:CVE-2013-7475' - tags: cve,wordpress,wp-plugin,contact-form-plugin,medium + tags: cve,wordpress,wp-plugin,contact-form-plugin,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-7476-272ee2a329a8d2a28bce41429783dc10.yaml b/nuclei-templates/2013/CVE-2013-7476-272ee2a329a8d2a28bce41429783dc10.yaml index 8bbfdd1f96..a5ceeb12b6 100644 --- a/nuclei-templates/2013/CVE-2013-7476-272ee2a329a8d2a28bce41429783dc10.yaml +++ b/nuclei-templates/2013/CVE-2013-7476-272ee2a329a8d2a28bce41429783dc10.yaml @@ -4,7 +4,7 @@ info: name: > Simple Fields < 1.2 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The simple-fields plugin before 1.2 for WordPress has CSRF in the admin interface. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/simple-fields/" google-query: inurl:"/wp-content/plugins/simple-fields/" shodan-query: 'vuln:CVE-2013-7476' - tags: cve,wordpress,wp-plugin,simple-fields,high + tags: cve,wordpress,wp-plugin,simple-fields,medium http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-7477-eb6226c8060abd8c26fc61f24da2a61e.yaml b/nuclei-templates/2013/CVE-2013-7477-eb6226c8060abd8c26fc61f24da2a61e.yaml index c56e60ca01..1c5e38ecb6 100644 --- a/nuclei-templates/2013/CVE-2013-7477-eb6226c8060abd8c26fc61f24da2a61e.yaml +++ b/nuclei-templates/2013/CVE-2013-7477-eb6226c8060abd8c26fc61f24da2a61e.yaml @@ -4,7 +4,7 @@ info: name: > Events Manager <= 5.5.1 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Events Manager plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 5.5.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/events-manager/" google-query: inurl:"/wp-content/plugins/events-manager/" shodan-query: 'vuln:CVE-2013-7477' - tags: cve,wordpress,wp-plugin,events-manager,medium + tags: cve,wordpress,wp-plugin,events-manager,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-7478-b1f45416f5a631250c26ec095bcb39a3.yaml b/nuclei-templates/2013/CVE-2013-7478-b1f45416f5a631250c26ec095bcb39a3.yaml index e47353567e..7b42c926f9 100644 --- a/nuclei-templates/2013/CVE-2013-7478-b1f45416f5a631250c26ec095bcb39a3.yaml +++ b/nuclei-templates/2013/CVE-2013-7478-b1f45416f5a631250c26ec095bcb39a3.yaml @@ -4,7 +4,7 @@ info: name: > Events Manager < 5.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The events-manager plugin before 5.5 for WordPress has XSS via EM_Ticket::get_post. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/events-manager/" google-query: inurl:"/wp-content/plugins/events-manager/" shodan-query: 'vuln:CVE-2013-7478' - tags: cve,wordpress,wp-plugin,events-manager,medium + tags: cve,wordpress,wp-plugin,events-manager,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-7479-ad055d1685348a8fa4aef50dfdf0211f.yaml b/nuclei-templates/2013/CVE-2013-7479-ad055d1685348a8fa4aef50dfdf0211f.yaml index 1027cce2af..a6d6287c3e 100644 --- a/nuclei-templates/2013/CVE-2013-7479-ad055d1685348a8fa4aef50dfdf0211f.yaml +++ b/nuclei-templates/2013/CVE-2013-7479-ad055d1685348a8fa4aef50dfdf0211f.yaml @@ -4,7 +4,7 @@ info: name: > Events Manager < 5.3.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The events-manager plugin before 5.3.9 for WordPress has XSS in the search form field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/events-manager/" google-query: inurl:"/wp-content/plugins/events-manager/" shodan-query: 'vuln:CVE-2013-7479' - tags: cve,wordpress,wp-plugin,events-manager,medium + tags: cve,wordpress,wp-plugin,events-manager,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-7480-e976dbcc632c2ee3b143a7604910e2c0.yaml b/nuclei-templates/2013/CVE-2013-7480-e976dbcc632c2ee3b143a7604910e2c0.yaml index 7164c1cb75..1ecc360998 100644 --- a/nuclei-templates/2013/CVE-2013-7480-e976dbcc632c2ee3b143a7604910e2c0.yaml +++ b/nuclei-templates/2013/CVE-2013-7480-e976dbcc632c2ee3b143a7604910e2c0.yaml @@ -4,7 +4,7 @@ info: name: > Events Manager <= 5.3.6 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The events-manager plugin before 5.3.6.1 for WordPress has XSS via the booking form and admin areas. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/events-manager/" google-query: inurl:"/wp-content/plugins/events-manager/" shodan-query: 'vuln:CVE-2013-7480' - tags: cve,wordpress,wp-plugin,events-manager,medium + tags: cve,wordpress,wp-plugin,events-manager,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-7481-0c860e72b162cc9055e799dc4f8c2b43.yaml b/nuclei-templates/2013/CVE-2013-7481-0c860e72b162cc9055e799dc4f8c2b43.yaml index 449fe9ae47..5ae7e32bb9 100644 --- a/nuclei-templates/2013/CVE-2013-7481-0c860e72b162cc9055e799dc4f8c2b43.yaml +++ b/nuclei-templates/2013/CVE-2013-7481-0c860e72b162cc9055e799dc4f8c2b43.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form By BestWebSoft<= 3.34 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Contact Form By BestWebSoft plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 3.34 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-plugin/" google-query: inurl:"/wp-content/plugins/contact-form-plugin/" shodan-query: 'vuln:CVE-2013-7481' - tags: cve,wordpress,wp-plugin,contact-form-plugin,medium + tags: cve,wordpress,wp-plugin,contact-form-plugin,high http: - method: GET diff --git a/nuclei-templates/2013/CVE-2013-7482-e4da0c9bf6d9952b4ed3e7efbc293bab.yaml b/nuclei-templates/2013/CVE-2013-7482-e4da0c9bf6d9952b4ed3e7efbc293bab.yaml index bffebd02ff..fbcb54a327 100644 --- a/nuclei-templates/2013/CVE-2013-7482-e4da0c9bf6d9952b4ed3e7efbc293bab.yaml +++ b/nuclei-templates/2013/CVE-2013-7482-e4da0c9bf6d9952b4ed3e7efbc293bab.yaml @@ -4,7 +4,7 @@ info: name: > ReFlex Gallery < 1.4.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The reflex-gallery plugin before 1.4.3 for WordPress has XSS via Edit Content URL field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/reflex-gallery/" google-query: inurl:"/wp-content/plugins/reflex-gallery/" shodan-query: 'vuln:CVE-2013-7482' - tags: cve,wordpress,wp-plugin,reflex-gallery,medium + tags: cve,wordpress,wp-plugin,reflex-gallery,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-100001-f364089fe838821aa5875cc23a9bf280.yaml b/nuclei-templates/2014/CVE-2014-100001-f364089fe838821aa5875cc23a9bf280.yaml index f744a4ea5d..569709c3fe 100644 --- a/nuclei-templates/2014/CVE-2014-100001-f364089fe838821aa5875cc23a9bf280.yaml +++ b/nuclei-templates/2014/CVE-2014-100001-f364089fe838821aa5875cc23a9bf280.yaml @@ -4,7 +4,7 @@ info: name: > SEO Plugin LiveOptim <= 1.1.3 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the SEO Plugin LiveOptim plugin before 1.1.4-free for WordPress allows remote attackers to hijack the authentication of administrators for requests that change plugin settings via unspecified vectors. NOTE: some of these details are obtained from third party information. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/liveoptim/" google-query: inurl:"/wp-content/plugins/liveoptim/" shodan-query: 'vuln:CVE-2014-100001' - tags: cve,wordpress,wp-plugin,liveoptim,high + tags: cve,wordpress,wp-plugin,liveoptim,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-100007-f98ba84845d04638f96a14d587800f12.yaml b/nuclei-templates/2014/CVE-2014-100007-f98ba84845d04638f96a14d587800f12.yaml index 614fbc398c..b07268b322 100644 --- a/nuclei-templates/2014/CVE-2014-100007-f98ba84845d04638f96a14d587800f12.yaml +++ b/nuclei-templates/2014/CVE-2014-100007-f98ba84845d04638f96a14d587800f12.yaml @@ -4,7 +4,7 @@ info: name: > HK Exif Tags <= 1.11 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the HK Exif Tags plugin before 1.12 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via an EXIF tag. NOTE: some of these details are obtained from third party information. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/hk-exif-tags/" google-query: inurl:"/wp-content/plugins/hk-exif-tags/" shodan-query: 'vuln:CVE-2014-100007' - tags: cve,wordpress,wp-plugin,hk-exif-tags,medium + tags: cve,wordpress,wp-plugin,hk-exif-tags,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-100008-3be3c98bb23ebc942163786ddfe2ad5d.yaml b/nuclei-templates/2014/CVE-2014-100008-3be3c98bb23ebc942163786ddfe2ad5d.yaml index 345929ecfa..9180f36e57 100644 --- a/nuclei-templates/2014/CVE-2014-100008-3be3c98bb23ebc942163786ddfe2ad5d.yaml +++ b/nuclei-templates/2014/CVE-2014-100008-3be3c98bb23ebc942163786ddfe2ad5d.yaml @@ -4,7 +4,7 @@ info: name: > JS Multi Hotel <= 2.2.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in includes/delete_img.php in the Joomlaskin JS Multi Hotel (aka JS MultiHotel and Js-Multi-Hotel) plugin 2.2.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the path parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/js-multihotel/" google-query: inurl:"/wp-content/plugins/js-multihotel/" shodan-query: 'vuln:CVE-2014-100008' - tags: cve,wordpress,wp-plugin,js-multihotel,medium + tags: cve,wordpress,wp-plugin,js-multihotel,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-100016-95e54f65e6d0b56382227247b6627a71.yaml b/nuclei-templates/2014/CVE-2014-100016-95e54f65e6d0b56382227247b6627a71.yaml index 8809b4537f..b01613d8af 100644 --- a/nuclei-templates/2014/CVE-2014-100016-95e54f65e6d0b56382227247b6627a71.yaml +++ b/nuclei-templates/2014/CVE-2014-100016-95e54f65e6d0b56382227247b6627a71.yaml @@ -4,7 +4,7 @@ info: name: > Photocrati <= 4.8.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in photocrati-gallery/ecomm-sizes.php in the Photocrati theme for WordPress allows remote attackers to inject arbitrary web script or HTML via the prod_id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/photocrati-theme/" google-query: inurl:"/wp-content/themes/photocrati-theme/" shodan-query: 'vuln:CVE-2014-100016' - tags: cve,wordpress,wp-theme,photocrati-theme,medium + tags: cve,wordpress,wp-theme,photocrati-theme,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-100018-a24ad83ed56eb98da964ec89f37324d1.yaml b/nuclei-templates/2014/CVE-2014-100018-a24ad83ed56eb98da964ec89f37324d1.yaml index d74531177d..97ce693778 100644 --- a/nuclei-templates/2014/CVE-2014-100018-a24ad83ed56eb98da964ec89f37324d1.yaml +++ b/nuclei-templates/2014/CVE-2014-100018-a24ad83ed56eb98da964ec89f37324d1.yaml @@ -4,7 +4,7 @@ info: name: > Unconfirmed < 1.2.5 - Reflected Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Cross-site scripting (XSS) vulnerability in the Unconfirmed plugin before 1.2.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter in the unconfirmed page to wp-admin/network/users.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/unconfirmed/" google-query: inurl:"/wp-content/plugins/unconfirmed/" shodan-query: 'vuln:CVE-2014-100018' - tags: cve,wordpress,wp-plugin,unconfirmed,high + tags: cve,wordpress,wp-plugin,unconfirmed,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-100023-802392d669a0739410b0400626ccc124.yaml b/nuclei-templates/2014/CVE-2014-100023-802392d669a0739410b0400626ccc124.yaml index 5721a41b9b..2a716963ad 100644 --- a/nuclei-templates/2014/CVE-2014-100023-802392d669a0739410b0400626ccc124.yaml +++ b/nuclei-templates/2014/CVE-2014-100023-802392d669a0739410b0400626ccc124.yaml @@ -4,7 +4,7 @@ info: name: > mTouch Quiz < 3.0.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in question.php in the mTouch Quiz before 3.0.7 for WordPress allow remote attackers to inject arbitrary web script or HTML via the quiz parameter to wp-admin/edit.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mtouch-quiz/" google-query: inurl:"/wp-content/plugins/mtouch-quiz/" shodan-query: 'vuln:CVE-2014-100023' - tags: cve,wordpress,wp-plugin,mtouch-quiz,medium + tags: cve,wordpress,wp-plugin,mtouch-quiz,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-100027-f260533813247786590cffbf5861c8f5.yaml b/nuclei-templates/2014/CVE-2014-100027-f260533813247786590cffbf5861c8f5.yaml index 2c7c2276ec..489784ec5b 100644 --- a/nuclei-templates/2014/CVE-2014-100027-f260533813247786590cffbf5861c8f5.yaml +++ b/nuclei-templates/2014/CVE-2014-100027-f260533813247786590cffbf5861c8f5.yaml @@ -4,7 +4,7 @@ info: name: > Slimstat Analytics <= 3.5.5 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Slimstat Analytics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a URL in versions up to, and including, 3.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-slimstat/" google-query: inurl:"/wp-content/plugins/wp-slimstat/" shodan-query: 'vuln:CVE-2014-100027' - tags: cve,wordpress,wp-plugin,wp-slimstat,medium + tags: cve,wordpress,wp-plugin,wp-slimstat,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-10012-fa96cc0ae3ebc5f92e1c1a93f29e6a5e.yaml b/nuclei-templates/2014/CVE-2014-10012-fa96cc0ae3ebc5f92e1c1a93f29e6a5e.yaml index 7a25a6023d..fb941843b7 100644 --- a/nuclei-templates/2014/CVE-2014-10012-fa96cc0ae3ebc5f92e1c1a93f29e6a5e.yaml +++ b/nuclei-templates/2014/CVE-2014-10012-fa96cc0ae3ebc5f92e1c1a93f29e6a5e.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Classifieds Plugin – Ad Directory & Listings by AWP Classifieds < 3.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Another WordPress Classifieds Plugin plugin for WordPress allows remote attackers to inject arbitrary web script or HTML via the query string to the default URI. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/another-wordpress-classifieds-plugin/" google-query: inurl:"/wp-content/plugins/another-wordpress-classifieds-plugin/" shodan-query: 'vuln:CVE-2014-10012' - tags: cve,wordpress,wp-plugin,another-wordpress-classifieds-plugin,medium + tags: cve,wordpress,wp-plugin,another-wordpress-classifieds-plugin,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-10013-f8694c41fb21641e443ef7de9264487a.yaml b/nuclei-templates/2014/CVE-2014-10013-f8694c41fb21641e443ef7de9264487a.yaml index 122d56a255..33d88ad762 100644 --- a/nuclei-templates/2014/CVE-2014-10013-f8694c41fb21641e443ef7de9264487a.yaml +++ b/nuclei-templates/2014/CVE-2014-10013-f8694c41fb21641e443ef7de9264487a.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Classifieds Plugin – Ad Directory & Listings by AWP Classifieds < 3.0 - SQL Injection author: topscoder - severity: medium + severity: critical description: > SQL injection vulnerability in the Another WordPress Classifieds Plugin plugin for WordPress allows remote attackers to execute arbitrary SQL commands via the keywordphrase parameter in a dosearch action. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/another-wordpress-classifieds-plugin/" google-query: inurl:"/wp-content/plugins/another-wordpress-classifieds-plugin/" shodan-query: 'vuln:CVE-2014-10013' - tags: cve,wordpress,wp-plugin,another-wordpress-classifieds-plugin,medium + tags: cve,wordpress,wp-plugin,another-wordpress-classifieds-plugin,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-10016-b635a88aed40383d80b165aae1551858.yaml b/nuclei-templates/2014/CVE-2014-10016-b635a88aed40383d80b165aae1551858.yaml index c8b812d30d..5f590e9bc4 100644 --- a/nuclei-templates/2014/CVE-2014-10016-b635a88aed40383d80b165aae1551858.yaml +++ b/nuclei-templates/2014/CVE-2014-10016-b635a88aed40383d80b165aae1551858.yaml @@ -4,7 +4,7 @@ info: name: > Welcart e-Commerce <= 1.3.12 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Welcart e-Commerce plugin 1.3.12 for WordPress allow remote attackers to inject arbitrary web script or HTML via (1) unspecified vectors related to purchase_limit or the (2) name, (3) intl, (4) nocod, or (5) time parameter in an add_delivery_method action to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/usc-e-shop/" google-query: inurl:"/wp-content/plugins/usc-e-shop/" shodan-query: 'vuln:CVE-2014-10016' - tags: cve,wordpress,wp-plugin,usc-e-shop,medium + tags: cve,wordpress,wp-plugin,usc-e-shop,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-10377-fe5830586f1fe4c6f5f3c3dcee633ecb.yaml b/nuclei-templates/2014/CVE-2014-10377-fe5830586f1fe4c6f5f3c3dcee633ecb.yaml index f819b5f266..b44a79507a 100644 --- a/nuclei-templates/2014/CVE-2014-10377-fe5830586f1fe4c6f5f3c3dcee633ecb.yaml +++ b/nuclei-templates/2014/CVE-2014-10377-fe5830586f1fe4c6f5f3c3dcee633ecb.yaml @@ -4,7 +4,7 @@ info: name: > cformsII <= 13.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The cforms II(2) plugin before 13.2 for WordPress has XSS in lib_ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cforms2/" google-query: inurl:"/wp-content/plugins/cforms2/" shodan-query: 'vuln:CVE-2014-10377' - tags: cve,wordpress,wp-plugin,cforms2,medium + tags: cve,wordpress,wp-plugin,cforms2,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-10378-4fd25d208fa1eb71c396970325cd56c1.yaml b/nuclei-templates/2014/CVE-2014-10378-4fd25d208fa1eb71c396970325cd56c1.yaml index 4c42473b6b..bd62c9e6c5 100644 --- a/nuclei-templates/2014/CVE-2014-10378-4fd25d208fa1eb71c396970325cd56c1.yaml +++ b/nuclei-templates/2014/CVE-2014-10378-4fd25d208fa1eb71c396970325cd56c1.yaml @@ -4,7 +4,7 @@ info: name: > Yoast Duplicate Post <= 2.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Yoast Duplicate Post plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 2.6 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/duplicate-post/" google-query: inurl:"/wp-content/plugins/duplicate-post/" shodan-query: 'vuln:CVE-2014-10378' - tags: cve,wordpress,wp-plugin,duplicate-post,medium + tags: cve,wordpress,wp-plugin,duplicate-post,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-10380-251b86614cf3be75bb7b89fbf426f8a3.yaml b/nuclei-templates/2014/CVE-2014-10380-251b86614cf3be75bb7b89fbf426f8a3.yaml index d9a56316e7..25d193166c 100644 --- a/nuclei-templates/2014/CVE-2014-10380-251b86614cf3be75bb7b89fbf426f8a3.yaml +++ b/nuclei-templates/2014/CVE-2014-10380-251b86614cf3be75bb7b89fbf426f8a3.yaml @@ -4,7 +4,7 @@ info: name: > Profile Builder – User Profile & User Registration Forms < 1.1.66 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The profile-builder plugin before 1.1.66 for WordPress has multiple XSS issues in forms. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/profile-builder/" google-query: inurl:"/wp-content/plugins/profile-builder/" shodan-query: 'vuln:CVE-2014-10380' - tags: cve,wordpress,wp-plugin,profile-builder,medium + tags: cve,wordpress,wp-plugin,profile-builder,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-10381-3f3bfd2ca93dfdb22d963aa7b5cb0c46.yaml b/nuclei-templates/2014/CVE-2014-10381-3f3bfd2ca93dfdb22d963aa7b5cb0c46.yaml index 7891b808a7..e1571ff0b0 100644 --- a/nuclei-templates/2014/CVE-2014-10381-3f3bfd2ca93dfdb22d963aa7b5cb0c46.yaml +++ b/nuclei-templates/2014/CVE-2014-10381-3f3bfd2ca93dfdb22d963aa7b5cb0c46.yaml @@ -4,7 +4,7 @@ info: name: > User Domain Whitelist <= 1.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The User Domain Whitelist plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the displayAdminPage() function. This makes it possible for unauthenticated attackers to modify the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/user-domain-whitelist/" google-query: inurl:"/wp-content/plugins/user-domain-whitelist/" shodan-query: 'vuln:CVE-2014-10381' - tags: cve,wordpress,wp-plugin,user-domain-whitelist,high + tags: cve,wordpress,wp-plugin,user-domain-whitelist,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-10382-785672d467101767144e711ae7fe2d35.yaml b/nuclei-templates/2014/CVE-2014-10382-785672d467101767144e711ae7fe2d35.yaml index a61d4e25b6..f07a45bf05 100644 --- a/nuclei-templates/2014/CVE-2014-10382-785672d467101767144e711ae7fe2d35.yaml +++ b/nuclei-templates/2014/CVE-2014-10382-785672d467101767144e711ae7fe2d35.yaml @@ -4,7 +4,7 @@ info: name: > Featured Comments < 1.2.5 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The feature-comments plugin before 1.2.5 for WordPress has CSRF for featuring or burying a comment. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/feature-comments/" google-query: inurl:"/wp-content/plugins/feature-comments/" shodan-query: 'vuln:CVE-2014-10382' - tags: cve,wordpress,wp-plugin,feature-comments,high + tags: cve,wordpress,wp-plugin,feature-comments,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-10385-6a2ef437dbd84b379d13828c6767a7f7.yaml b/nuclei-templates/2014/CVE-2014-10385-6a2ef437dbd84b379d13828c6767a7f7.yaml index 44575cb00b..d33ab084b7 100644 --- a/nuclei-templates/2014/CVE-2014-10385-6a2ef437dbd84b379d13828c6767a7f7.yaml +++ b/nuclei-templates/2014/CVE-2014-10385-6a2ef437dbd84b379d13828c6767a7f7.yaml @@ -4,7 +4,7 @@ info: name: > Memphis Documents Library <= 2.6.16 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The memphis-documents-library plugin before 3.0 for WordPress has XSS via $_REQUEST. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/memphis-documents-library/" google-query: inurl:"/wp-content/plugins/memphis-documents-library/" shodan-query: 'vuln:CVE-2014-10385' - tags: cve,wordpress,wp-plugin,memphis-documents-library,medium + tags: cve,wordpress,wp-plugin,memphis-documents-library,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-10392-ad9f5965c16c8246b424703d21435589.yaml b/nuclei-templates/2014/CVE-2014-10392-ad9f5965c16c8246b424703d21435589.yaml index 40546ee614..2a041c7fb8 100644 --- a/nuclei-templates/2014/CVE-2014-10392-ad9f5965c16c8246b424703d21435589.yaml +++ b/nuclei-templates/2014/CVE-2014-10392-ad9f5965c16c8246b424703d21435589.yaml @@ -4,7 +4,7 @@ info: name: > Cforms <= 10.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Cforms plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 10.1 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cforms/" google-query: inurl:"/wp-content/plugins/cforms/" shodan-query: 'vuln:CVE-2014-10392' - tags: cve,wordpress,wp-plugin,cforms,medium + tags: cve,wordpress,wp-plugin,cforms,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-10393-8e029958bdc3ff72cf62f3277afe0ddc.yaml b/nuclei-templates/2014/CVE-2014-10393-8e029958bdc3ff72cf62f3277afe0ddc.yaml index 5ca1843523..ad7d8b4d15 100644 --- a/nuclei-templates/2014/CVE-2014-10393-8e029958bdc3ff72cf62f3277afe0ddc.yaml +++ b/nuclei-templates/2014/CVE-2014-10393-8e029958bdc3ff72cf62f3277afe0ddc.yaml @@ -4,7 +4,7 @@ info: name: > cformsII <= 10.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The cforms2 plugin before 10.5 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cforms/" google-query: inurl:"/wp-content/plugins/cforms/" shodan-query: 'vuln:CVE-2014-10393' - tags: cve,wordpress,wp-plugin,cforms,medium + tags: cve,wordpress,wp-plugin,cforms,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-10395-87b936573487d2a82b44f72e3ce646b8.yaml b/nuclei-templates/2014/CVE-2014-10395-87b936573487d2a82b44f72e3ce646b8.yaml index f060b794b4..5de96685d4 100644 --- a/nuclei-templates/2014/CVE-2014-10395-87b936573487d2a82b44f72e3ce646b8.yaml +++ b/nuclei-templates/2014/CVE-2014-10395-87b936573487d2a82b44f72e3ce646b8.yaml @@ -4,7 +4,7 @@ info: name: > Polls CP < 1.0.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Polls CP plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cp-polls/" google-query: inurl:"/wp-content/plugins/cp-polls/" shodan-query: 'vuln:CVE-2014-10395' - tags: cve,wordpress,wp-plugin,cp-polls,medium + tags: cve,wordpress,wp-plugin,cp-polls,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-1232-93eb8e1633c7ed38fbc4ff339a075742.yaml b/nuclei-templates/2014/CVE-2014-1232-93eb8e1633c7ed38fbc4ff339a075742.yaml index 6a57634748..7f5e7444f9 100644 --- a/nuclei-templates/2014/CVE-2014-1232-93eb8e1633c7ed38fbc4ff339a075742.yaml +++ b/nuclei-templates/2014/CVE-2014-1232-93eb8e1633c7ed38fbc4ff339a075742.yaml @@ -4,7 +4,7 @@ info: name: > Foliopress WYSIWYG < 2.6.8.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Foliopress WYSIWYG plugin before 2.6.8.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/foliopress-wysiwyg/" google-query: inurl:"/wp-content/plugins/foliopress-wysiwyg/" shodan-query: 'vuln:CVE-2014-1232' - tags: cve,wordpress,wp-plugin,foliopress-wysiwyg,medium + tags: cve,wordpress,wp-plugin,foliopress-wysiwyg,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-125091-49a01bc79b6fdfb5a76a16441b827dc7.yaml b/nuclei-templates/2014/CVE-2014-125091-49a01bc79b6fdfb5a76a16441b827dc7.yaml index e704ad3db8..b0ebe92766 100644 --- a/nuclei-templates/2014/CVE-2014-125091-49a01bc79b6fdfb5a76a16441b827dc7.yaml +++ b/nuclei-templates/2014/CVE-2014-125091-49a01bc79b6fdfb5a76a16441b827dc7.yaml @@ -4,7 +4,7 @@ info: name: > Polls CP <= 1.0.1 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > The Polls CP plugin for WordPress is vulnerable to SQL Injection via the 'lu' parameter in all versions up to, and including, 1.0.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cp-polls/" google-query: inurl:"/wp-content/plugins/cp-polls/" shodan-query: 'vuln:CVE-2014-125091' - tags: cve,wordpress,wp-plugin,cp-polls,high + tags: cve,wordpress,wp-plugin,cp-polls,low http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-125096-d80de73f9f6546e4a52cda1c1451f11a.yaml b/nuclei-templates/2014/CVE-2014-125096-d80de73f9f6546e4a52cda1c1451f11a.yaml index ea5b2ba388..f12a3e2d80 100644 --- a/nuclei-templates/2014/CVE-2014-125096-d80de73f9f6546e4a52cda1c1451f11a.yaml +++ b/nuclei-templates/2014/CVE-2014-125096-d80de73f9f6546e4a52cda1c1451f11a.yaml @@ -4,7 +4,7 @@ info: name: > Gallery Manager <= 1.5.12 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Gallery Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘delete’ parameter in versions up to, and including, 1.5.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/fancy-gallery/" google-query: inurl:"/wp-content/plugins/fancy-gallery/" shodan-query: 'vuln:CVE-2014-125096' - tags: cve,wordpress,wp-plugin,fancy-gallery,medium + tags: cve,wordpress,wp-plugin,fancy-gallery,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-125099-91fc45f92059ad3dccdaddc100f38fa5.yaml b/nuclei-templates/2014/CVE-2014-125099-91fc45f92059ad3dccdaddc100f38fa5.yaml index bf31a7acf8..7ac861969a 100644 --- a/nuclei-templates/2014/CVE-2014-125099-91fc45f92059ad3dccdaddc100f38fa5.yaml +++ b/nuclei-templates/2014/CVE-2014-125099-91fc45f92059ad3dccdaddc100f38fa5.yaml @@ -4,7 +4,7 @@ info: name: > I Recommend This <= 3.7.2 - Authenticated (Subscriber+) SQL Injection via Shortcode author: topscoder - severity: high + severity: low description: > The I Recommend This plugin for WordPress is vulnerable to SQL Injection via the 'post_type' attribute called via the plugin's shortcode in versions up to, and including, 3.7.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with subscriber-level permissions and above to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/i-recommend-this/" google-query: inurl:"/wp-content/plugins/i-recommend-this/" shodan-query: 'vuln:CVE-2014-125099' - tags: cve,wordpress,wp-plugin,i-recommend-this,high + tags: cve,wordpress,wp-plugin,i-recommend-this,low http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-125100-08107665cefdd5cc4f288c7614f8ef39.yaml b/nuclei-templates/2014/CVE-2014-125100-08107665cefdd5cc4f288c7614f8ef39.yaml index 7eb25599c5..4d2a36825b 100644 --- a/nuclei-templates/2014/CVE-2014-125100-08107665cefdd5cc4f288c7614f8ef39.yaml +++ b/nuclei-templates/2014/CVE-2014-125100-08107665cefdd5cc4f288c7614f8ef39.yaml @@ -4,7 +4,7 @@ info: name: > Job Board by BestWebSoft <= 1.0.0 - Unauthenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Mail Subscribe List plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'bwsmn_form_email' parameter in versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/job-board/" google-query: inurl:"/wp-content/plugins/job-board/" shodan-query: 'vuln:CVE-2014-125100' - tags: cve,wordpress,wp-plugin,job-board,medium + tags: cve,wordpress,wp-plugin,job-board,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-125101-8195d0fd4f0b5ac7235f16224b2dcb18.yaml b/nuclei-templates/2014/CVE-2014-125101-8195d0fd4f0b5ac7235f16224b2dcb18.yaml index a0e1bdeee6..3f3c5395d9 100644 --- a/nuclei-templates/2014/CVE-2014-125101-8195d0fd4f0b5ac7235f16224b2dcb18.yaml +++ b/nuclei-templates/2014/CVE-2014-125101-8195d0fd4f0b5ac7235f16224b2dcb18.yaml @@ -4,7 +4,7 @@ info: name: > Portfolio Gallery – Photo Gallery <= 1.1.8 - Authenticated (Admin+) SQL Injection author: topscoder - severity: high + severity: low description: > The Portfolio Gallery – Photo Gallery for WordPress is vulnerable to SQL Injection via the 'search_events_by_title' parameter in versions up to, and including, 1.1.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrative privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/portfolio-gallery/" google-query: inurl:"/wp-content/plugins/portfolio-gallery/" shodan-query: 'vuln:CVE-2014-125101' - tags: cve,wordpress,wp-plugin,portfolio-gallery,high + tags: cve,wordpress,wp-plugin,portfolio-gallery,low http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-125103-d8d27a0f27f9a3ef698ef167496cc3cc.yaml b/nuclei-templates/2014/CVE-2014-125103-d8d27a0f27f9a3ef698ef167496cc3cc.yaml index 7fe15e193a..9ff2e0c046 100644 --- a/nuclei-templates/2014/CVE-2014-125103-d8d27a0f27f9a3ef698ef167496cc3cc.yaml +++ b/nuclei-templates/2014/CVE-2014-125103-d8d27a0f27f9a3ef698ef167496cc3cc.yaml @@ -4,7 +4,7 @@ info: name: > BestWebSoft's Twitter <= 1.3.2 - Authenticated (Admin+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The BestWebSoft's Twitter plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/twitter-plugin/" google-query: inurl:"/wp-content/plugins/twitter-plugin/" shodan-query: 'vuln:CVE-2014-125103' - tags: cve,wordpress,wp-plugin,twitter-plugin,medium + tags: cve,wordpress,wp-plugin,twitter-plugin,low http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-125105-4673047ca29ad4630d7b8bb30f727df8.yaml b/nuclei-templates/2014/CVE-2014-125105-4673047ca29ad4630d7b8bb30f727df8.yaml index 8874aa3fb3..7b0268bfcd 100644 --- a/nuclei-templates/2014/CVE-2014-125105-4673047ca29ad4630d7b8bb30f727df8.yaml +++ b/nuclei-templates/2014/CVE-2014-125105-4673047ca29ad4630d7b8bb30f727df8.yaml @@ -4,7 +4,7 @@ info: name: > Broken Link Checker < 1.10.2 - Authenticated (Admin+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Broken Link Checker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘exclusion_list’ parameter in versions up to, and including, 1.10.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/broken-link-checker/" google-query: inurl:"/wp-content/plugins/broken-link-checker/" shodan-query: 'vuln:CVE-2014-125105' - tags: cve,wordpress,wp-plugin,broken-link-checker,medium + tags: cve,wordpress,wp-plugin,broken-link-checker,low http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-1888-c3337fb47eeb04c822819fd17c433268.yaml b/nuclei-templates/2014/CVE-2014-1888-c3337fb47eeb04c822819fd17c433268.yaml index 9f015239c2..cb1956ac07 100644 --- a/nuclei-templates/2014/CVE-2014-1888-c3337fb47eeb04c822819fd17c433268.yaml +++ b/nuclei-templates/2014/CVE-2014-1888-c3337fb47eeb04c822819fd17c433268.yaml @@ -4,7 +4,7 @@ info: name: > BuddyPress <= 1.9.1 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the BuddyPress plugin before 1.9.2 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the name field to groups/create/step/group-details. NOTE: this can be exploited without authentication by leveraging CVE-2014-1889. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/buddypress/" google-query: inurl:"/wp-content/plugins/buddypress/" shodan-query: 'vuln:CVE-2014-1888' - tags: cve,wordpress,wp-plugin,buddypress,medium + tags: cve,wordpress,wp-plugin,buddypress,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-1889-88c5b961644bad4c49d63ba50954d1ef.yaml b/nuclei-templates/2014/CVE-2014-1889-88c5b961644bad4c49d63ba50954d1ef.yaml index 5ec58a85bc..95a1b0fdea 100644 --- a/nuclei-templates/2014/CVE-2014-1889-88c5b961644bad4c49d63ba50954d1ef.yaml +++ b/nuclei-templates/2014/CVE-2014-1889-88c5b961644bad4c49d63ba50954d1ef.yaml @@ -4,7 +4,7 @@ info: name: > BuddyPress <= 1.9.1 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > The Group creation process in the Buddypress plugin before 1.9.2 for WordPress allows remote authenticated users to gain control of arbitrary groups by leveraging a missing permissions check. An attacker could exploit this vulnerability to modify the name, description, avatar and settings of groups. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/buddypress/" google-query: inurl:"/wp-content/plugins/buddypress/" shodan-query: 'vuln:CVE-2014-1889' - tags: cve,wordpress,wp-plugin,buddypress,medium + tags: cve,wordpress,wp-plugin,buddypress,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-2040-6234c54583fe97f4b335659ad6e8c2c3.yaml b/nuclei-templates/2014/CVE-2014-2040-6234c54583fe97f4b335659ad6e8c2c3.yaml index 5d9d0a3616..0e278b9b29 100644 --- a/nuclei-templates/2014/CVE-2014-2040-6234c54583fe97f4b335659ad6e8c2c3.yaml +++ b/nuclei-templates/2014/CVE-2014-2040-6234c54583fe97f4b335659ad6e8c2c3.yaml @@ -4,7 +4,7 @@ info: name: > Media File Renamer < 1.9.4 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the (1) callback_multicheck, (2) callback_radio, and (3) callback_wysiwygin functions in mfrh_class.settings-api.php in the Media File Renamer plugin 1.7.0 for WordPress allow remote authenticated users with permissions to add media or edit media to inject arbitrary web script or HTML via unspecified parameters, as demonstrated by the title of an uploaded file. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/media-file-renamer/" google-query: inurl:"/wp-content/plugins/media-file-renamer/" shodan-query: 'vuln:CVE-2014-2040' - tags: cve,wordpress,wp-plugin,media-file-renamer,medium + tags: cve,wordpress,wp-plugin,media-file-renamer,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-2274-15bbee0302a2c0acdbacef494a071dae.yaml b/nuclei-templates/2014/CVE-2014-2274-15bbee0302a2c0acdbacef494a071dae.yaml index b83d20cb5e..1a635b36af 100644 --- a/nuclei-templates/2014/CVE-2014-2274-15bbee0302a2c0acdbacef494a071dae.yaml +++ b/nuclei-templates/2014/CVE-2014-2274-15bbee0302a2c0acdbacef494a071dae.yaml @@ -4,7 +4,7 @@ info: name: > Subscribe To Comments Reloaded <= 140129 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the Subscribe To Comments Reloaded plugin before 140219 for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via a request to the subscribe-to-comments-reloaded/options/index.php page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/subscribe-to-comments-reloaded/" google-query: inurl:"/wp-content/plugins/subscribe-to-comments-reloaded/" shodan-query: 'vuln:CVE-2014-2274' - tags: cve,wordpress,wp-plugin,subscribe-to-comments-reloaded,high + tags: cve,wordpress,wp-plugin,subscribe-to-comments-reloaded,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-2297-a2cc7daca48d70191ab86ec84c12d114.yaml b/nuclei-templates/2014/CVE-2014-2297-a2cc7daca48d70191ab86ec84c12d114.yaml index 954c959949..2a3adedfdb 100644 --- a/nuclei-templates/2014/CVE-2014-2297-a2cc7daca48d70191ab86ec84c12d114.yaml +++ b/nuclei-templates/2014/CVE-2014-2297-a2cc7daca48d70191ab86ec84c12d114.yaml @@ -4,7 +4,7 @@ info: name: > Broadcast Live Video – Live Streaming : HTML5, WebRTC, HLS, RTSP, RTMP <= 4.29.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the VideoWhisper Live Streaming Integration plugin 4.29.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) n parameter to ls/htmlchat.php or (2) bgcolor parameter to ls/index.php. NOTE: vector 1 may overlap CVE-2014-1906.4. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/videowhisper-live-streaming-integration/" google-query: inurl:"/wp-content/plugins/videowhisper-live-streaming-integration/" shodan-query: 'vuln:CVE-2014-2297' - tags: cve,wordpress,wp-plugin,videowhisper-live-streaming-integration,medium + tags: cve,wordpress,wp-plugin,videowhisper-live-streaming-integration,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-2315-60056c59f58d08c739eaa4877baa7622.yaml b/nuclei-templates/2014/CVE-2014-2315-60056c59f58d08c739eaa4877baa7622.yaml index 57b589702a..2db25ab49c 100644 --- a/nuclei-templates/2014/CVE-2014-2315-60056c59f58d08c739eaa4877baa7622.yaml +++ b/nuclei-templates/2014/CVE-2014-2315-60056c59f58d08c739eaa4877baa7622.yaml @@ -4,7 +4,7 @@ info: name: > Thank You Counter Button <= 1.9.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Thank You Counter Button plugin 1.9.3 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) thanks_caption, (2) thanks_caption_style, or (3) thanks_style parameter to wp-admin/options.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/thanks-you-counter-button/" google-query: inurl:"/wp-content/plugins/thanks-you-counter-button/" shodan-query: 'vuln:CVE-2014-2315' - tags: cve,wordpress,wp-plugin,thanks-you-counter-button,medium + tags: cve,wordpress,wp-plugin,thanks-you-counter-button,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-2333-1d3a5e954dbca93e3fee328975ccc98e.yaml b/nuclei-templates/2014/CVE-2014-2333-1d3a5e954dbca93e3fee328975ccc98e.yaml index 4ed4c52309..027d3d3390 100644 --- a/nuclei-templates/2014/CVE-2014-2333-1d3a5e954dbca93e3fee328975ccc98e.yaml +++ b/nuclei-templates/2014/CVE-2014-2333-1d3a5e954dbca93e3fee328975ccc98e.yaml @@ -4,7 +4,7 @@ info: name: > Lazyest Gallery < 1.1.21 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Lazyest Gallery plugin before 1.1.21 for WordPress allows remote attackers to inject arbitrary web script or HTML via an EXIF tag. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/lazyest-gallery/" google-query: inurl:"/wp-content/plugins/lazyest-gallery/" shodan-query: 'vuln:CVE-2014-2333' - tags: cve,wordpress,wp-plugin,lazyest-gallery,medium + tags: cve,wordpress,wp-plugin,lazyest-gallery,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-2550-20729b5326c844ceb8ab014ad17df6e2.yaml b/nuclei-templates/2014/CVE-2014-2550-20729b5326c844ceb8ab014ad17df6e2.yaml index 24f05acc8f..69870b2b15 100644 --- a/nuclei-templates/2014/CVE-2014-2550-20729b5326c844ceb8ab014ad17df6e2.yaml +++ b/nuclei-templates/2014/CVE-2014-2550-20729b5326c844ceb8ab014ad17df6e2.yaml @@ -4,7 +4,7 @@ info: name: > Disable Comments – Remove Comments & Stop Spam [Multi-Site Support] < 1.0.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the Disable Comments plugin before 1.0.4 for WordPress allows remote attackers to hijack the authentication of administrators for requests that enable comments via a request to the disable_comments_settings page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/disable-comments/" google-query: inurl:"/wp-content/plugins/disable-comments/" shodan-query: 'vuln:CVE-2014-2550' - tags: cve,wordpress,wp-plugin,disable-comments,high + tags: cve,wordpress,wp-plugin,disable-comments,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-2558-9030229f25561b555ab5bd8cf6a1c26d.yaml b/nuclei-templates/2014/CVE-2014-2558-9030229f25561b555ab5bd8cf6a1c26d.yaml index c6be77c7cc..135945c31e 100644 --- a/nuclei-templates/2014/CVE-2014-2558-9030229f25561b555ab5bd8cf6a1c26d.yaml +++ b/nuclei-templates/2014/CVE-2014-2558-9030229f25561b555ab5bd8cf6a1c26d.yaml @@ -4,7 +4,7 @@ info: name: > File Gallery < 1.7.9.2 - Remote Code Execution author: topscoder - severity: high + severity: critical description: > The File Gallery plugin before 1.7.9.2 for WordPress does not properly escape strings, which allows remote administrators to execute arbitrary PHP code via a \' (backslash quote) in the setting fields to /wp-admin/options-media.php, related to the create_function function. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/file-gallery/" google-query: inurl:"/wp-content/plugins/file-gallery/" shodan-query: 'vuln:CVE-2014-2558' - tags: cve,wordpress,wp-plugin,file-gallery,high + tags: cve,wordpress,wp-plugin,file-gallery,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-2579-d6467913a640b127b20e07c49e842d3b.yaml b/nuclei-templates/2014/CVE-2014-2579-d6467913a640b127b20e07c49e842d3b.yaml index 337e2f1ac0..29816fb20e 100644 --- a/nuclei-templates/2014/CVE-2014-2579-d6467913a640b127b20e07c49e842d3b.yaml +++ b/nuclei-templates/2014/CVE-2014-2579-d6467913a640b127b20e07c49e842d3b.yaml @@ -4,7 +4,7 @@ info: name: > Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 3.1.0 - Multiple Cross-Site Request Forgery author: topscoder - severity: critical + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in XCloner Standalone 3.1.0 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) change the administrator password via the config task to index2.php or (2) when the enable_db_backup and sql_mem options are enabled, access the database backup functionality via the dbbackup_comp parameter in the generate action to index2.php. NOTE: vector 2 might be a duplicate of CVE-2014-2340, which is for the XCloner Wordpress plugin. NOTE: remote attackers can leverage CVE-2014-2996 with vector 2 to execute arbitrary commands. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" shodan-query: 'vuln:CVE-2014-2579' - tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,critical + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-2598-2b5c6ad57482cc18f3496406a2a98d3b.yaml b/nuclei-templates/2014/CVE-2014-2598-2b5c6ad57482cc18f3496406a2a98d3b.yaml index faf95c8560..85bb716a24 100644 --- a/nuclei-templates/2014/CVE-2014-2598-2b5c6ad57482cc18f3496406a2a98d3b.yaml +++ b/nuclei-templates/2014/CVE-2014-2598-2b5c6ad57482cc18f3496406a2a98d3b.yaml @@ -4,7 +4,7 @@ info: name: > Quick Page/Post Redirect Plugin < 5.0.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the Quick Page/Post Redirect plugin before 5.0.5 for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the quickppr_redirects[request][] parameter in the redirect-updates page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/quick-pagepost-redirect-plugin/" google-query: inurl:"/wp-content/plugins/quick-pagepost-redirect-plugin/" shodan-query: 'vuln:CVE-2014-2598' - tags: cve,wordpress,wp-plugin,quick-pagepost-redirect-plugin,high + tags: cve,wordpress,wp-plugin,quick-pagepost-redirect-plugin,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-2838-5ce9260c9b6d59d0d80e5fb0cb039b07.yaml b/nuclei-templates/2014/CVE-2014-2838-5ce9260c9b6d59d0d80e5fb0cb039b07.yaml index 2a0fbc11d5..4f79b6cda3 100644 --- a/nuclei-templates/2014/CVE-2014-2838-5ce9260c9b6d59d0d80e5fb0cb039b07.yaml +++ b/nuclei-templates/2014/CVE-2014-2838-5ce9260c9b6d59d0d80e5fb0cb039b07.yaml @@ -4,7 +4,7 @@ info: name: > GD Star Rating <= 1.9.22 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the GD Star Rating plugin 1.9.22 for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct (1) SQL injection attacks via the s parameter in the gd-star-rating-stats page to wp-admin/admin.php or (2) cross-site scripting (XSS) attacks via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gd-star-rating/" google-query: inurl:"/wp-content/plugins/gd-star-rating/" shodan-query: 'vuln:CVE-2014-2838' - tags: cve,wordpress,wp-plugin,gd-star-rating,high + tags: cve,wordpress,wp-plugin,gd-star-rating,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-2839-0b148460306247418981fb91f92502a9.yaml b/nuclei-templates/2014/CVE-2014-2839-0b148460306247418981fb91f92502a9.yaml index 27e4b77998..d231ab74c8 100644 --- a/nuclei-templates/2014/CVE-2014-2839-0b148460306247418981fb91f92502a9.yaml +++ b/nuclei-templates/2014/CVE-2014-2839-0b148460306247418981fb91f92502a9.yaml @@ -4,7 +4,7 @@ info: name: > GD Star Rating <= 1.9.22 - Blind SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in the GD Star Rating plugin 1.9.22 for WordPress allows remote administrators to execute arbitrary SQL commands via the s parameter in the gd-star-rating-stats page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gd-star-rating/" google-query: inurl:"/wp-content/plugins/gd-star-rating/" shodan-query: 'vuln:CVE-2014-2839' - tags: cve,wordpress,wp-plugin,gd-star-rating,high + tags: cve,wordpress,wp-plugin,gd-star-rating,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-2995-1280f1445230b7ae1ede9b8d16dcfe7d.yaml b/nuclei-templates/2014/CVE-2014-2995-1280f1445230b7ae1ede9b8d16dcfe7d.yaml index 2e443311ba..76642c45e8 100644 --- a/nuclei-templates/2014/CVE-2014-2995-1280f1445230b7ae1ede9b8d16dcfe7d.yaml +++ b/nuclei-templates/2014/CVE-2014-2995-1280f1445230b7ae1ede9b8d16dcfe7d.yaml @@ -4,7 +4,7 @@ info: name: > Twitget <= 3.3.2 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in twitget.php in the Twitget plugin before 3.3.3 for WordPress allow remote authenticated administrators to inject arbitrary web script or HTML via unspecified vectors, as demonstrated by the twitget_consumer_key parameter to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/twitget/" google-query: inurl:"/wp-content/plugins/twitget/" shodan-query: 'vuln:CVE-2014-2995' - tags: cve,wordpress,wp-plugin,twitget,medium + tags: cve,wordpress,wp-plugin,twitget,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-3123-9324556ad1df2ab2ecb9b1f7e086b9b6.yaml b/nuclei-templates/2014/CVE-2014-3123-9324556ad1df2ab2ecb9b1f7e086b9b6.yaml index 4afd803454..57eecf6073 100644 --- a/nuclei-templates/2014/CVE-2014-3123-9324556ad1df2ab2ecb9b1f7e086b9b6.yaml +++ b/nuclei-templates/2014/CVE-2014-3123-9324556ad1df2ab2ecb9b1f7e086b9b6.yaml @@ -4,7 +4,7 @@ info: name: > NextCellent Gallery < 1.9.18 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in admin/manage-images.php in the NextCellent Gallery plugin before 1.19.18 for WordPress allows remote authenticated users with the NextGEN Upload images, NextGEN Manage gallery, or NextGEN Manage others gallery permission to inject arbitrary web script or HTML via the "Alt & Title Text" field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nextcellent-gallery-nextgen-legacy/" google-query: inurl:"/wp-content/plugins/nextcellent-gallery-nextgen-legacy/" shodan-query: 'vuln:CVE-2014-3123' - tags: cve,wordpress,wp-plugin,nextcellent-gallery-nextgen-legacy,medium + tags: cve,wordpress,wp-plugin,nextcellent-gallery-nextgen-legacy,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-3210-7983ddc66df9d17c37dd89bbc4e4f416.yaml b/nuclei-templates/2014/CVE-2014-3210-7983ddc66df9d17c37dd89bbc4e4f416.yaml index e26dda6dcd..f940ae4fe2 100644 --- a/nuclei-templates/2014/CVE-2014-3210-7983ddc66df9d17c37dd89bbc4e4f416.yaml +++ b/nuclei-templates/2014/CVE-2014-3210-7983ddc66df9d17c37dd89bbc4e4f416.yaml @@ -4,7 +4,7 @@ info: name: > Pinpoint Booking System – #1 WordPress Booking Plugin < 1.3 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in dopbs-backend-forms.php in the Booking System (Booking Calendar) plugin before 1.3 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the booking_form_id parameter to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/booking-system/" google-query: inurl:"/wp-content/plugins/booking-system/" shodan-query: 'vuln:CVE-2014-3210' - tags: cve,wordpress,wp-plugin,booking-system,high + tags: cve,wordpress,wp-plugin,booking-system,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-3841-6d98c218699b93985ac97a3eec99201e.yaml b/nuclei-templates/2014/CVE-2014-3841-6d98c218699b93985ac97a3eec99201e.yaml index dac3d11379..fe29fde935 100644 --- a/nuclei-templates/2014/CVE-2014-3841-6d98c218699b93985ac97a3eec99201e.yaml +++ b/nuclei-templates/2014/CVE-2014-3841-6d98c218699b93985ac97a3eec99201e.yaml @@ -4,7 +4,7 @@ info: name: > Contact Bank – Contact Form Builder for WordPress <= 2.0.19 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Contact Bank plugin before 2.0.20 for WordPress allows remote attackers to inject arbitrary web script or HTML via the Label field, related to form layout configuration. NOTE: some of these details are obtained from third party information. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-bank/" google-query: inurl:"/wp-content/plugins/contact-bank/" shodan-query: 'vuln:CVE-2014-3841' - tags: cve,wordpress,wp-plugin,contact-bank,medium + tags: cve,wordpress,wp-plugin,contact-bank,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-3842-897a0fa8ed3a14f37db420497ce08cb5.yaml b/nuclei-templates/2014/CVE-2014-3842-897a0fa8ed3a14f37db420497ce08cb5.yaml index cae50b2d43..0166c187ae 100644 --- a/nuclei-templates/2014/CVE-2014-3842-897a0fa8ed3a14f37db420497ce08cb5.yaml +++ b/nuclei-templates/2014/CVE-2014-3842-897a0fa8ed3a14f37db420497ce08cb5.yaml @@ -4,7 +4,7 @@ info: name: > iMember360is 3.8.012 - 3.9.001 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the iMember360 plugin 3.8.012 through 3.9.001 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) decrypt or (2) encrypt parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/imember360/" google-query: inurl:"/wp-content/plugins/imember360/" shodan-query: 'vuln:CVE-2014-3842' - tags: cve,wordpress,wp-plugin,imember360,medium + tags: cve,wordpress,wp-plugin,imember360,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-3844-ffaf15e9710e51e22815d7c14866275b.yaml b/nuclei-templates/2014/CVE-2014-3844-ffaf15e9710e51e22815d7c14866275b.yaml index fe306dbb52..1eaf43b7b2 100644 --- a/nuclei-templates/2014/CVE-2014-3844-ffaf15e9710e51e22815d7c14866275b.yaml +++ b/nuclei-templates/2014/CVE-2014-3844-ffaf15e9710e51e22815d7c14866275b.yaml @@ -4,7 +4,7 @@ info: name: > TinyMCE Color Picker <= 1.1 - Missing Authorization author: topscoder - severity: medium + severity: high description: > The TinyMCE Color Picker plugin before 1.2 for WordPress does not properly check permissions, which allows remote attackers to modify plugin settings via unspecified vectors. NOTE: some of these details are obtained from third party information. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/tinymce-colorpicker/" google-query: inurl:"/wp-content/plugins/tinymce-colorpicker/" shodan-query: 'vuln:CVE-2014-3844' - tags: cve,wordpress,wp-plugin,tinymce-colorpicker,medium + tags: cve,wordpress,wp-plugin,tinymce-colorpicker,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-3850-3a91d6c48afcaf4ec202f8da0ad11a12.yaml b/nuclei-templates/2014/CVE-2014-3850-3a91d6c48afcaf4ec202f8da0ad11a12.yaml index 422b777c7f..7806689664 100644 --- a/nuclei-templates/2014/CVE-2014-3850-3a91d6c48afcaf4ec202f8da0ad11a12.yaml +++ b/nuclei-templates/2014/CVE-2014-3850-3a91d6c48afcaf4ec202f8da0ad11a12.yaml @@ -4,7 +4,7 @@ info: name: > Member Approval <= 131109 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site request forgery (CSRF) vulnerability in the Member Approval plugin 131109 for WordPress allows remote attackers to hijack the authentication of administrators for requests that change plugin settings to their default and disable registration approval via a request to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/member-approval/" google-query: inurl:"/wp-content/plugins/member-approval/" shodan-query: 'vuln:CVE-2014-3850' - tags: cve,wordpress,wp-plugin,member-approval,medium + tags: cve,wordpress,wp-plugin,member-approval,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-3870-94f4e4e5606b83b8d91c368a5ee77e4b.yaml b/nuclei-templates/2014/CVE-2014-3870-94f4e4e5606b83b8d91c368a5ee77e4b.yaml index 5f72d5be13..3bae6553f0 100644 --- a/nuclei-templates/2014/CVE-2014-3870-94f4e4e5606b83b8d91c368a5ee77e4b.yaml +++ b/nuclei-templates/2014/CVE-2014-3870-94f4e4e5606b83b8d91c368a5ee77e4b.yaml @@ -4,7 +4,7 @@ info: name: > bib2html <= 0.9.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the bib2html plugin 0.9.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the styleShortName parameter in an adminStyleAdd action to OSBiB/create/index.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bib2html/" google-query: inurl:"/wp-content/plugins/bib2html/" shodan-query: 'vuln:CVE-2014-3870' - tags: cve,wordpress,wp-plugin,bib2html,medium + tags: cve,wordpress,wp-plugin,bib2html,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-3882-a2f350e1414d89ef0f2cdb91d69b4d0f.yaml b/nuclei-templates/2014/CVE-2014-3882-a2f350e1414d89ef0f2cdb91d69b4d0f.yaml index 9e487014f1..dd63061c47 100644 --- a/nuclei-templates/2014/CVE-2014-3882-a2f350e1414d89ef0f2cdb91d69b4d0f.yaml +++ b/nuclei-templates/2014/CVE-2014-3882-a2f350e1414d89ef0f2cdb91d69b4d0f.yaml @@ -4,7 +4,7 @@ info: name: > Login rebuilder < 1.2.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Login rebuilder plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to 1.2.0. This is due to missing nonce validation on the properties() function. This makes it possible for unauthenticated attackers to modify the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/login-rebuilder/" google-query: inurl:"/wp-content/plugins/login-rebuilder/" shodan-query: 'vuln:CVE-2014-3882' - tags: cve,wordpress,wp-plugin,login-rebuilder,high + tags: cve,wordpress,wp-plugin,login-rebuilder,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-3903-02d6de68e2eb0c0f7215999509c086c8.yaml b/nuclei-templates/2014/CVE-2014-3903-02d6de68e2eb0c0f7215999509c086c8.yaml index 5fbca37e0f..473cd47716 100644 --- a/nuclei-templates/2014/CVE-2014-3903-02d6de68e2eb0c0f7215999509c086c8.yaml +++ b/nuclei-templates/2014/CVE-2014-3903-02d6de68e2eb0c0f7215999509c086c8.yaml @@ -4,7 +4,7 @@ info: name: > Cakifo 1.0 - 1.6.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Cakifo theme 1.x before 1.6.2 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via crafted Exif data. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/cakifo/" google-query: inurl:"/wp-content/themes/cakifo/" shodan-query: 'vuln:CVE-2014-3903' - tags: cve,wordpress,wp-theme,cakifo,medium + tags: cve,wordpress,wp-theme,cakifo,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4017-f35417e8a6d1f5736025e50e8ca1a9dc.yaml b/nuclei-templates/2014/CVE-2014-4017-f35417e8a6d1f5736025e50e8ca1a9dc.yaml index 810a5d79fe..fcd3b1a3c9 100644 --- a/nuclei-templates/2014/CVE-2014-4017-f35417e8a6d1f5736025e50e8ca1a9dc.yaml +++ b/nuclei-templates/2014/CVE-2014-4017-f35417e8a6d1f5736025e50e8ca1a9dc.yaml @@ -4,7 +4,7 @@ info: name: > Conversion Ninja (Unspecified Version) - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Conversion Ninja plugin for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter to lp/index.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/conversionninja/" google-query: inurl:"/wp-content/plugins/conversionninja/" shodan-query: 'vuln:CVE-2014-4017' - tags: cve,wordpress,wp-plugin,conversionninja,medium + tags: cve,wordpress,wp-plugin,conversionninja,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4163-80de44f32a39260a4242f01334cdbfd5.yaml b/nuclei-templates/2014/CVE-2014-4163-80de44f32a39260a4242f01334cdbfd5.yaml index b7157ae446..cd5c1227e4 100644 --- a/nuclei-templates/2014/CVE-2014-4163-80de44f32a39260a4242f01334cdbfd5.yaml +++ b/nuclei-templates/2014/CVE-2014-4163-80de44f32a39260a4242f01334cdbfd5.yaml @@ -4,7 +4,7 @@ info: name: > Featured Comments < 1.2.5 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the Featured Comments plugin 1.2.5 for WordPress allow remote attackers to hijack the authentication of administrators for requests that change the (1) buried or (2) featured status of a comment via a request to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/feature-comments/" google-query: inurl:"/wp-content/plugins/feature-comments/" shodan-query: 'vuln:CVE-2014-4163' - tags: cve,wordpress,wp-plugin,feature-comments,high + tags: cve,wordpress,wp-plugin,feature-comments,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4514-e94f4c2cbdc244ce8cd5d182c9382536.yaml b/nuclei-templates/2014/CVE-2014-4514-e94f4c2cbdc244ce8cd5d182c9382536.yaml index dc5c0a50b1..07c7768134 100644 --- a/nuclei-templates/2014/CVE-2014-4514-e94f4c2cbdc244ce8cd5d182c9382536.yaml +++ b/nuclei-templates/2014/CVE-2014-4514-e94f4c2cbdc244ce8cd5d182c9382536.yaml @@ -4,7 +4,7 @@ info: name: > WordPress支付宝Alipay|财付通Tenpay|贝宝PayPal集成插件 < 3.7.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in includes/api_tenpay/inc.tenpay_notify.php in the Alipay plugin 3.6.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via vectors related to the getDebugInfo function. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/alipay/" google-query: inurl:"/wp-content/plugins/alipay/" shodan-query: 'vuln:CVE-2014-4514' - tags: cve,wordpress,wp-plugin,alipay,medium + tags: cve,wordpress,wp-plugin,alipay,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4516-4f0f10f376030e01ed907ee127ea7f81.yaml b/nuclei-templates/2014/CVE-2014-4516-4f0f10f376030e01ed907ee127ea7f81.yaml index a4b6cd59a5..83f8bbe854 100644 --- a/nuclei-templates/2014/CVE-2014-4516-4f0f10f376030e01ed907ee127ea7f81.yaml +++ b/nuclei-templates/2014/CVE-2014-4516-4f0f10f376030e01ed907ee127ea7f81.yaml @@ -4,7 +4,7 @@ info: name: > BIC Media Widget <= 1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in bicm-carousel-preview.php in the BIC Media Widget plugin 1.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the param parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bic-media/" google-query: inurl:"/wp-content/plugins/bic-media/" shodan-query: 'vuln:CVE-2014-4516' - tags: cve,wordpress,wp-plugin,bic-media,medium + tags: cve,wordpress,wp-plugin,bic-media,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4517-20bdedbec4b7794610e6cc496e884cca.yaml b/nuclei-templates/2014/CVE-2014-4517-20bdedbec4b7794610e6cc496e884cca.yaml index 4cfc7806d1..752dd017c4 100644 --- a/nuclei-templates/2014/CVE-2014-4517-20bdedbec4b7794610e6cc496e884cca.yaml +++ b/nuclei-templates/2014/CVE-2014-4517-20bdedbec4b7794610e6cc496e884cca.yaml @@ -4,7 +4,7 @@ info: name: > CBI Referral Manager <= 1.2.1 Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in getNetworkSites.php in the CBI Referral Manager plugin 1.2.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the searchString parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cbi-referral-manager/" google-query: inurl:"/wp-content/plugins/cbi-referral-manager/" shodan-query: 'vuln:CVE-2014-4517' - tags: cve,wordpress,wp-plugin,cbi-referral-manager,medium + tags: cve,wordpress,wp-plugin,cbi-referral-manager,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4518-96de724cebfb88ce342c3f1cd99b7f35.yaml b/nuclei-templates/2014/CVE-2014-4518-96de724cebfb88ce342c3f1cd99b7f35.yaml index e5e7c52e8f..6241b4809c 100644 --- a/nuclei-templates/2014/CVE-2014-4518-96de724cebfb88ce342c3f1cd99b7f35.yaml +++ b/nuclei-templates/2014/CVE-2014-4518-96de724cebfb88ce342c3f1cd99b7f35.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form by ContactMe.com <= 2.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in xd_resize.php in the Contact Form by ContactMe.com plugin 2.3 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the width parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contactme/" google-query: inurl:"/wp-content/plugins/contactme/" shodan-query: 'vuln:CVE-2014-4518' - tags: cve,wordpress,wp-plugin,contactme,medium + tags: cve,wordpress,wp-plugin,contactme,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4520-e4bec7dd7a04a9998930ce7422960fa5.yaml b/nuclei-templates/2014/CVE-2014-4520-e4bec7dd7a04a9998930ce7422960fa5.yaml index 269bb7cbdf..4fea4e94cd 100644 --- a/nuclei-templates/2014/CVE-2014-4520-e4bec7dd7a04a9998930ce7422960fa5.yaml +++ b/nuclei-templates/2014/CVE-2014-4520-e4bec7dd7a04a9998930ce7422960fa5.yaml @@ -4,7 +4,7 @@ info: name: > DMCA WaterMarker < 1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in phprack.php in the DMCA WaterMarker plugin before 1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the plugin_dir parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/dmca-watermarker/" google-query: inurl:"/wp-content/plugins/dmca-watermarker/" shodan-query: 'vuln:CVE-2014-4520' - tags: cve,wordpress,wp-plugin,dmca-watermarker,medium + tags: cve,wordpress,wp-plugin,dmca-watermarker,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4521-d1ad636a904712d275c068316d9921ca.yaml b/nuclei-templates/2014/CVE-2014-4521-d1ad636a904712d275c068316d9921ca.yaml index 25660163ce..91b481b2cb 100644 --- a/nuclei-templates/2014/CVE-2014-4521-d1ad636a904712d275c068316d9921ca.yaml +++ b/nuclei-templates/2014/CVE-2014-4521-d1ad636a904712d275c068316d9921ca.yaml @@ -4,7 +4,7 @@ info: name: > dsIDXpress < 2.1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in client-assist.php in the dsIDXpress IDX plugin before 2.1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the action parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/dsidxpress/" google-query: inurl:"/wp-content/plugins/dsidxpress/" shodan-query: 'vuln:CVE-2014-4521' - tags: cve,wordpress,wp-plugin,dsidxpress,medium + tags: cve,wordpress,wp-plugin,dsidxpress,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4523-2dcf73eb82f83432e780c74c23beb2a4.yaml b/nuclei-templates/2014/CVE-2014-4523-2dcf73eb82f83432e780c74c23beb2a4.yaml index 1edc986162..6fc20db6af 100644 --- a/nuclei-templates/2014/CVE-2014-4523-2dcf73eb82f83432e780c74c23beb2a4.yaml +++ b/nuclei-templates/2014/CVE-2014-4523-2dcf73eb82f83432e780c74c23beb2a4.yaml @@ -4,7 +4,7 @@ info: name: > Easy Career Opening <= 0.4 - Unauthenticated Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Easy Career Openings plugin 0.4 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the 'page' parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-career-openings/" google-query: inurl:"/wp-content/plugins/easy-career-openings/" shodan-query: 'vuln:CVE-2014-4523' - tags: cve,wordpress,wp-plugin,easy-career-openings,medium + tags: cve,wordpress,wp-plugin,easy-career-openings,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4524-75e8a53ab865623ebf98c15a4f6ef027.yaml b/nuclei-templates/2014/CVE-2014-4524-75e8a53ab865623ebf98c15a4f6ef027.yaml index fa89807df1..3f708a38cd 100644 --- a/nuclei-templates/2014/CVE-2014-4524-75e8a53ab865623ebf98c15a4f6ef027.yaml +++ b/nuclei-templates/2014/CVE-2014-4524-75e8a53ab865623ebf98c15a4f6ef027.yaml @@ -4,7 +4,7 @@ info: name: > WP Easy Post Types < 1.4.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The WP Easy Post Types plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'ref' parameter found in the classes/custom-image/media.php file in versions up to 1.4.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-post-types/" google-query: inurl:"/wp-content/plugins/easy-post-types/" shodan-query: 'vuln:CVE-2014-4524' - tags: cve,wordpress,wp-plugin,easy-post-types,medium + tags: cve,wordpress,wp-plugin,easy-post-types,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4525-492078688f68b5c1a6aec5a98ed76f29.yaml b/nuclei-templates/2014/CVE-2014-4525-492078688f68b5c1a6aec5a98ed76f29.yaml index 567a6c04a2..354a175172 100644 --- a/nuclei-templates/2014/CVE-2014-4525-492078688f68b5c1a6aec5a98ed76f29.yaml +++ b/nuclei-templates/2014/CVE-2014-4525-492078688f68b5c1a6aec5a98ed76f29.yaml @@ -4,7 +4,7 @@ info: name: > WP eBay Product Feeds < 1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in magpie/scripts/magpie_slashbox.php in the Ebay Feeds for WordPress plugin 1.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the rss_url parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ebay-feeds-for-wordpress/" google-query: inurl:"/wp-content/plugins/ebay-feeds-for-wordpress/" shodan-query: 'vuln:CVE-2014-4525' - tags: cve,wordpress,wp-plugin,ebay-feeds-for-wordpress,medium + tags: cve,wordpress,wp-plugin,ebay-feeds-for-wordpress,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4526-e5f4c0414a585004ed1f35745c5931f6.yaml b/nuclei-templates/2014/CVE-2014-4526-e5f4c0414a585004ed1f35745c5931f6.yaml index 2f312a4760..90f12bacc3 100644 --- a/nuclei-templates/2014/CVE-2014-4526-e5f4c0414a585004ed1f35745c5931f6.yaml +++ b/nuclei-templates/2014/CVE-2014-4526-e5f4c0414a585004ed1f35745c5931f6.yaml @@ -4,7 +4,7 @@ info: name: > efence <= 1.3.2 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in callback.php in the efence plugin 1.3.2 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) message, (2) zoneid, (3) pubKey, or (4) privKey parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/efence/" google-query: inurl:"/wp-content/plugins/efence/" shodan-query: 'vuln:CVE-2014-4526' - tags: cve,wordpress,wp-plugin,efence,medium + tags: cve,wordpress,wp-plugin,efence,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4527-e9f65fad0edf93964d95edc6a82cf394.yaml b/nuclei-templates/2014/CVE-2014-4527-e9f65fad0edf93964d95edc6a82cf394.yaml index 5de299e09d..54e47c2b71 100644 --- a/nuclei-templates/2014/CVE-2014-4527-e9f65fad0edf93964d95edc6a82cf394.yaml +++ b/nuclei-templates/2014/CVE-2014-4527-e9f65fad0edf93964d95edc6a82cf394.yaml @@ -4,7 +4,7 @@ info: name: > EnvialoSimple: Email Marketing y Newsletters < 1.98 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in paginas/vista-previa-form.php in the EnvialoSimple: Email Marketing and Newsletters (envialosimple-email-marketing-y-newsletters-gratis) plugin before 1.98 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) FormID or (2) AdministratorID parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/envialosimple-email-marketing-y-newsletters-gratis/" google-query: inurl:"/wp-content/plugins/envialosimple-email-marketing-y-newsletters-gratis/" shodan-query: 'vuln:CVE-2014-4527' - tags: cve,wordpress,wp-plugin,envialosimple-email-marketing-y-newsletters-gratis,medium + tags: cve,wordpress,wp-plugin,envialosimple-email-marketing-y-newsletters-gratis,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4528-26cfa8bd44fa751562e056cb1d39d345.yaml b/nuclei-templates/2014/CVE-2014-4528-26cfa8bd44fa751562e056cb1d39d345.yaml index cc9fdfe1bd..fd8dc2be54 100644 --- a/nuclei-templates/2014/CVE-2014-4528-26cfa8bd44fa751562e056cb1d39d345.yaml +++ b/nuclei-templates/2014/CVE-2014-4528-26cfa8bd44fa751562e056cb1d39d345.yaml @@ -4,7 +4,7 @@ info: name: > Bugs Go Viral : Facebook Promotion Generator <= 1.3.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in admin/swarm-settings.php in the Bugs Go Viral : Facebook Promotion Generator (fbpromotions) plugin 1.3.4 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) promo_type, (2) fb_edit_action, or (3) promo_id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/fbpromotions/" google-query: inurl:"/wp-content/plugins/fbpromotions/" shodan-query: 'vuln:CVE-2014-4528' - tags: cve,wordpress,wp-plugin,fbpromotions,medium + tags: cve,wordpress,wp-plugin,fbpromotions,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4529-b3551195333886afba6c43fd173acb65.yaml b/nuclei-templates/2014/CVE-2014-4529-b3551195333886afba6c43fd173acb65.yaml index 4e114f47d7..86af7aefed 100644 --- a/nuclei-templates/2014/CVE-2014-4529-b3551195333886afba6c43fd173acb65.yaml +++ b/nuclei-templates/2014/CVE-2014-4529-b3551195333886afba6c43fd173acb65.yaml @@ -4,7 +4,7 @@ info: name: > Flash Photo Gallery <= 0.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in fpg_preview.php in the Flash Photo Gallery plugin 0.7 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the path parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/flash-photo-gallery/" google-query: inurl:"/wp-content/plugins/flash-photo-gallery/" shodan-query: 'vuln:CVE-2014-4529' - tags: cve,wordpress,wp-plugin,flash-photo-gallery,medium + tags: cve,wordpress,wp-plugin,flash-photo-gallery,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4530-59446fd68b7784d882498e25f909137d.yaml b/nuclei-templates/2014/CVE-2014-4530-59446fd68b7784d882498e25f909137d.yaml index 1936ce8e85..74aa01c98e 100644 --- a/nuclei-templates/2014/CVE-2014-4530-59446fd68b7784d882498e25f909137d.yaml +++ b/nuclei-templates/2014/CVE-2014-4530-59446fd68b7784d882498e25f909137d.yaml @@ -4,7 +4,7 @@ info: name: > Flog <= 0.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The flog plugin 0.1 for WordPress has XSS via the url parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/flog/" google-query: inurl:"/wp-content/plugins/flog/" shodan-query: 'vuln:CVE-2014-4530' - tags: cve,wordpress,wp-plugin,flog,medium + tags: cve,wordpress,wp-plugin,flog,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4532-a274fd2664073f0162156778e8dac986.yaml b/nuclei-templates/2014/CVE-2014-4532-a274fd2664073f0162156778e8dac986.yaml index 9a7024f17d..ad612a4ab4 100644 --- a/nuclei-templates/2014/CVE-2014-4532-a274fd2664073f0162156778e8dac986.yaml +++ b/nuclei-templates/2014/CVE-2014-4532-a274fd2664073f0162156778e8dac986.yaml @@ -4,7 +4,7 @@ info: name: > GarageSale < 1.2.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in templates/printAdminUsersList_Footer.tpl.php in the GarageSale plugin before 1.2.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/garagesale/" google-query: inurl:"/wp-content/plugins/garagesale/" shodan-query: 'vuln:CVE-2014-4532' - tags: cve,wordpress,wp-plugin,garagesale,medium + tags: cve,wordpress,wp-plugin,garagesale,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4535-65f707df02fc4e71880af94936e28fe7.yaml b/nuclei-templates/2014/CVE-2014-4535-65f707df02fc4e71880af94936e28fe7.yaml index 6e18378a3e..c6b843eba3 100644 --- a/nuclei-templates/2014/CVE-2014-4535-65f707df02fc4e71880af94936e28fe7.yaml +++ b/nuclei-templates/2014/CVE-2014-4535-65f707df02fc4e71880af94936e28fe7.yaml @@ -4,7 +4,7 @@ info: name: > Import Legacy Media <= 0.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Import Legacy Media plugin 0.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/import-legacy-media/" google-query: inurl:"/wp-content/plugins/import-legacy-media/" shodan-query: 'vuln:CVE-2014-4535' - tags: cve,wordpress,wp-plugin,import-legacy-media,medium + tags: cve,wordpress,wp-plugin,import-legacy-media,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4536-8a7ecb10c894553e29bd44217c769b5a.yaml b/nuclei-templates/2014/CVE-2014-4536-8a7ecb10c894553e29bd44217c769b5a.yaml index 1476fbe8a4..6e4665f7a5 100644 --- a/nuclei-templates/2014/CVE-2014-4536-8a7ecb10c894553e29bd44217c769b5a.yaml +++ b/nuclei-templates/2014/CVE-2014-4536-8a7ecb10c894553e29bd44217c769b5a.yaml @@ -4,7 +4,7 @@ info: name: > Infusionsoft Gravity Forms Add-on < 1.5.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in tests/notAuto_test_ContactService_pauseCampaign.php in the Infusionsoft Gravity Forms plugin before 1.5.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) go, (2) contactId, or (3) campaignId parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/infusionsoft/" google-query: inurl:"/wp-content/plugins/infusionsoft/" shodan-query: 'vuln:CVE-2014-4536' - tags: cve,wordpress,wp-plugin,infusionsoft,medium + tags: cve,wordpress,wp-plugin,infusionsoft,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4541-719947b7a1ac06fd82b24dd2b2c29f27.yaml b/nuclei-templates/2014/CVE-2014-4541-719947b7a1ac06fd82b24dd2b2c29f27.yaml index 30fa1ed260..74f28bcae9 100644 --- a/nuclei-templates/2014/CVE-2014-4541-719947b7a1ac06fd82b24dd2b2c29f27.yaml +++ b/nuclei-templates/2014/CVE-2014-4541-719947b7a1ac06fd82b24dd2b2c29f27.yaml @@ -4,7 +4,7 @@ info: name: > OMFG Mobile Pro <= 1.1.26 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in shortcode-generator/preview-shortcode-external.php in the OMFG Mobile Pro plugin 1.1.26 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the shortcode parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/omfg-mobile/" google-query: inurl:"/wp-content/plugins/omfg-mobile/" shodan-query: 'vuln:CVE-2014-4541' - tags: cve,wordpress,wp-plugin,omfg-mobile,medium + tags: cve,wordpress,wp-plugin,omfg-mobile,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4543-d6f933dccde3d9cca555af3f7b970f39.yaml b/nuclei-templates/2014/CVE-2014-4543-d6f933dccde3d9cca555af3f7b970f39.yaml index f6f36d53f2..520277d610 100644 --- a/nuclei-templates/2014/CVE-2014-4543-d6f933dccde3d9cca555af3f7b970f39.yaml +++ b/nuclei-templates/2014/CVE-2014-4543-d6f933dccde3d9cca555af3f7b970f39.yaml @@ -4,7 +4,7 @@ info: name: > Pay Per Media Player <= 1.24 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in payper/payper.php in the Pay Per Media Player plugin 1.24 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) fcolor, (2) links, (3) stitle, (4) height, (5) width, (6) host, (7) bcolor, (8) msg, (9) id, or (10) size parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pay-per-media-player/" google-query: inurl:"/wp-content/plugins/pay-per-media-player/" shodan-query: 'vuln:CVE-2014-4543' - tags: cve,wordpress,wp-plugin,pay-per-media-player,medium + tags: cve,wordpress,wp-plugin,pay-per-media-player,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4544-c4998932aa42fcf89b684f69330f53ac.yaml b/nuclei-templates/2014/CVE-2014-4544-c4998932aa42fcf89b684f69330f53ac.yaml index fe639eb4db..ffba7ba7bf 100644 --- a/nuclei-templates/2014/CVE-2014-4544-c4998932aa42fcf89b684f69330f53ac.yaml +++ b/nuclei-templates/2014/CVE-2014-4544-c4998932aa42fcf89b684f69330f53ac.yaml @@ -4,7 +4,7 @@ info: name: > Podcast Channels <= 0.20 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Podcast Channels plugin 0.20 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the Filename parameter to getid3/demos/demo.write.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/podcast-channels/" google-query: inurl:"/wp-content/plugins/podcast-channels/" shodan-query: 'vuln:CVE-2014-4544' - tags: cve,wordpress,wp-plugin,podcast-channels,medium + tags: cve,wordpress,wp-plugin,podcast-channels,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4545-7ddce7ee421f18bacb72f14e66ea1bcb.yaml b/nuclei-templates/2014/CVE-2014-4545-7ddce7ee421f18bacb72f14e66ea1bcb.yaml index e9b51604e7..63a2eed88d 100644 --- a/nuclei-templates/2014/CVE-2014-4545-7ddce7ee421f18bacb72f14e66ea1bcb.yaml +++ b/nuclei-templates/2014/CVE-2014-4545-7ddce7ee421f18bacb72f14e66ea1bcb.yaml @@ -4,7 +4,7 @@ info: name: > Pro Quoter Plugin <= 1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in pq_dialog.php in the Pro Quoter plugin 1.0 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) leftorright or (2) author parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/proquoter/" google-query: inurl:"/wp-content/plugins/proquoter/" shodan-query: 'vuln:CVE-2014-4545' - tags: cve,wordpress,wp-plugin,proquoter,medium + tags: cve,wordpress,wp-plugin,proquoter,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4546-1bdd11fadd06cfdab7d4d06e095a85bd.yaml b/nuclei-templates/2014/CVE-2014-4546-1bdd11fadd06cfdab7d4d06e095a85bd.yaml index dfa2077c47..a11e440841 100644 --- a/nuclei-templates/2014/CVE-2014-4546-1bdd11fadd06cfdab7d4d06e095a85bd.yaml +++ b/nuclei-templates/2014/CVE-2014-4546-1bdd11fadd06cfdab7d4d06e095a85bd.yaml @@ -4,7 +4,7 @@ info: name: > Rezgo Online Booking < 1.4.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in book_ajax.php in the Rezgo plugin 1.4.2 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the response parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/rezgo/" google-query: inurl:"/wp-content/plugins/rezgo/" shodan-query: 'vuln:CVE-2014-4546' - tags: cve,wordpress,wp-plugin,rezgo,medium + tags: cve,wordpress,wp-plugin,rezgo,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4547-fe69a0c777f01161eb85876f2a58c68c.yaml b/nuclei-templates/2014/CVE-2014-4547-fe69a0c777f01161eb85876f2a58c68c.yaml index df1ae11a79..d8dd513393 100644 --- a/nuclei-templates/2014/CVE-2014-4547-fe69a0c777f01161eb85876f2a58c68c.yaml +++ b/nuclei-templates/2014/CVE-2014-4547-fe69a0c777f01161eb85876f2a58c68c.yaml @@ -4,7 +4,7 @@ info: name: > Rezgo Online Booking < 1.8.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in templates/default/index_ajax.php in the Rezgo Online Booking plugin before 1.8.2 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) tags or (2) search_for parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/rezgo/" google-query: inurl:"/wp-content/plugins/rezgo/" shodan-query: 'vuln:CVE-2014-4547' - tags: cve,wordpress,wp-plugin,rezgo,medium + tags: cve,wordpress,wp-plugin,rezgo,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4550-382f2dc0e3689fe8f1bed64d23fca41f.yaml b/nuclei-templates/2014/CVE-2014-4550-382f2dc0e3689fe8f1bed64d23fca41f.yaml index 24833d91f5..b6f48f90f6 100644 --- a/nuclei-templates/2014/CVE-2014-4550-382f2dc0e3689fe8f1bed64d23fca41f.yaml +++ b/nuclei-templates/2014/CVE-2014-4550-382f2dc0e3689fe8f1bed64d23fca41f.yaml @@ -4,7 +4,7 @@ info: name: > Shortcode Ninja <= 1.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in preview-shortcode-external.php in the Shortcode Ninja plugin 1.4 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the shortcode parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/shortcode-ninja/" google-query: inurl:"/wp-content/plugins/shortcode-ninja/" shodan-query: 'vuln:CVE-2014-4550' - tags: cve,wordpress,wp-plugin,shortcode-ninja,medium + tags: cve,wordpress,wp-plugin,shortcode-ninja,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4551-4382e753da7c1d916f58a427140d32b1.yaml b/nuclei-templates/2014/CVE-2014-4551-4382e753da7c1d916f58a427140d32b1.yaml index 272afe46e2..25c3b1aea4 100644 --- a/nuclei-templates/2014/CVE-2014-4551-4382e753da7c1d916f58a427140d32b1.yaml +++ b/nuclei-templates/2014/CVE-2014-4551-4382e753da7c1d916f58a427140d32b1.yaml @@ -4,7 +4,7 @@ info: name: > Social Connect <= 0.10.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in diagnostics/test.php in the Social Connect plugin 0.10.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the testing parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/social-connect/" google-query: inurl:"/wp-content/plugins/social-connect/" shodan-query: 'vuln:CVE-2014-4551' - tags: cve,wordpress,wp-plugin,social-connect,medium + tags: cve,wordpress,wp-plugin,social-connect,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4552-a5f4f463543df4d2c732d202ef98faae.yaml b/nuclei-templates/2014/CVE-2014-4552-a5f4f463543df4d2c732d202ef98faae.yaml index 58ec826c88..8fa9008013 100644 --- a/nuclei-templates/2014/CVE-2014-4552-a5f4f463543df4d2c732d202ef98faae.yaml +++ b/nuclei-templates/2014/CVE-2014-4552-a5f4f463543df4d2c732d202ef98faae.yaml @@ -4,7 +4,7 @@ info: name: > Spotlight <= 4.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in library/includes/payment/paypalexpress/DoDirectPayment.php in the Spotlight (spotlightyour) plugin 4.7 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the paymentType parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/spotlightyour/" google-query: inurl:"/wp-content/plugins/spotlightyour/" shodan-query: 'vuln:CVE-2014-4552' - tags: cve,wordpress,wp-plugin,spotlightyour,medium + tags: cve,wordpress,wp-plugin,spotlightyour,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4553-a406e3b1989f167ebfda1e3281f7073d.yaml b/nuclei-templates/2014/CVE-2014-4553-a406e3b1989f167ebfda1e3281f7073d.yaml index 2379a8ae99..f6285d2396 100644 --- a/nuclei-templates/2014/CVE-2014-4553-a406e3b1989f167ebfda1e3281f7073d.yaml +++ b/nuclei-templates/2014/CVE-2014-4553-a406e3b1989f167ebfda1e3281f7073d.yaml @@ -4,7 +4,7 @@ info: name: > WP-RSS-Spreadshirt-3DCube-Gallery <= 1.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site Scripting (XSS) in the spreadshirt-rss-3d-cube-flash-gallery plugin through version 1.3 for WordPress allows remote attackers to execute arbitrary web script or HTML via url parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/spreadshirt-rss-3d-cube-flash-gallery/" google-query: inurl:"/wp-content/plugins/spreadshirt-rss-3d-cube-flash-gallery/" shodan-query: 'vuln:CVE-2014-4553' - tags: cve,wordpress,wp-plugin,spreadshirt-rss-3d-cube-flash-gallery,medium + tags: cve,wordpress,wp-plugin,spreadshirt-rss-3d-cube-flash-gallery,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4554-a491a4eb2f6511d2fd18eb2730601144.yaml b/nuclei-templates/2014/CVE-2014-4554-a491a4eb2f6511d2fd18eb2730601144.yaml index a06653dcf1..0cdaa5a889 100644 --- a/nuclei-templates/2014/CVE-2014-4554-a491a4eb2f6511d2fd18eb2730601144.yaml +++ b/nuclei-templates/2014/CVE-2014-4554-a491a4eb2f6511d2fd18eb2730601144.yaml @@ -4,7 +4,7 @@ info: name: > SS Downloads <= 1.4.4.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in templates/download.php in the SS Downloads plugin before 1.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the title parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ss-downloads/" google-query: inurl:"/wp-content/plugins/ss-downloads/" shodan-query: 'vuln:CVE-2014-4554' - tags: cve,wordpress,wp-plugin,ss-downloads,medium + tags: cve,wordpress,wp-plugin,ss-downloads,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4555-d99f0f471a2dd63c73902853b59daf4d.yaml b/nuclei-templates/2014/CVE-2014-4555-d99f0f471a2dd63c73902853b59daf4d.yaml index e1829c5bb6..2c0c849021 100644 --- a/nuclei-templates/2014/CVE-2014-4555-d99f0f471a2dd63c73902853b59daf4d.yaml +++ b/nuclei-templates/2014/CVE-2014-4555-d99f0f471a2dd63c73902853b59daf4d.yaml @@ -4,7 +4,7 @@ info: name: > Style It <= 1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in fonts/font-form.php in the Style It plugin 1.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the mode parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/style-it/" google-query: inurl:"/wp-content/plugins/style-it/" shodan-query: 'vuln:CVE-2014-4555' - tags: cve,wordpress,wp-plugin,style-it,medium + tags: cve,wordpress,wp-plugin,style-it,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4556-6d412503c15b02be74462a4b525012a6.yaml b/nuclei-templates/2014/CVE-2014-4556-6d412503c15b02be74462a4b525012a6.yaml index a3cdcd9b4a..4f150de148 100644 --- a/nuclei-templates/2014/CVE-2014-4556-6d412503c15b02be74462a4b525012a6.yaml +++ b/nuclei-templates/2014/CVE-2014-4556-6d412503c15b02be74462a4b525012a6.yaml @@ -4,7 +4,7 @@ info: name: > eShop Swipe plugin <= 3.7.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in test-plugin.php in the Swipe Checkout for eShop plugin 3.7.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the api_url parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/swipe-hq-checkout-for-eshop/" google-query: inurl:"/wp-content/plugins/swipe-hq-checkout-for-eshop/" shodan-query: 'vuln:CVE-2014-4556' - tags: cve,wordpress,wp-plugin,swipe-hq-checkout-for-eshop,medium + tags: cve,wordpress,wp-plugin,swipe-hq-checkout-for-eshop,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4557-9dadadc2ea66cec373bf71c20060be7b.yaml b/nuclei-templates/2014/CVE-2014-4557-9dadadc2ea66cec373bf71c20060be7b.yaml index c8aa3955be..1058582403 100644 --- a/nuclei-templates/2014/CVE-2014-4557-9dadadc2ea66cec373bf71c20060be7b.yaml +++ b/nuclei-templates/2014/CVE-2014-4557-9dadadc2ea66cec373bf71c20060be7b.yaml @@ -4,7 +4,7 @@ info: name: > Jigoshop Swipe plugin <= 3.1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in test-plugin.php in the Swipe Checkout for Jigoshop (swipe-hq-checkout-for-jigoshop) plugin 3.1.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the api_url parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/swipe-hq-checkout-for-jigoshop/" google-query: inurl:"/wp-content/plugins/swipe-hq-checkout-for-jigoshop/" shodan-query: 'vuln:CVE-2014-4557' - tags: cve,wordpress,wp-plugin,swipe-hq-checkout-for-jigoshop,medium + tags: cve,wordpress,wp-plugin,swipe-hq-checkout-for-jigoshop,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4559-fab645de2f6e6231ff6074be3c265848.yaml b/nuclei-templates/2014/CVE-2014-4559-fab645de2f6e6231ff6074be3c265848.yaml index 3d4fc0408e..96f7468c2d 100644 --- a/nuclei-templates/2014/CVE-2014-4559-fab645de2f6e6231ff6074be3c265848.yaml +++ b/nuclei-templates/2014/CVE-2014-4559-fab645de2f6e6231ff6074be3c265848.yaml @@ -4,7 +4,7 @@ info: name: > WP e-Commerce Swipe plugin <= 3.1.0 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in test-plugin.php in the Swipe Checkout for WP e-Commerce plugin 3.1.0 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) api_key, (2) payment_page_url, (3) merchant_id, (4) api_url, or (5) currency parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/swipehq-payment-gateway-wp-e-commerce/" google-query: inurl:"/wp-content/plugins/swipehq-payment-gateway-wp-e-commerce/" shodan-query: 'vuln:CVE-2014-4559' - tags: cve,wordpress,wp-plugin,swipehq-payment-gateway-wp-e-commerce,medium + tags: cve,wordpress,wp-plugin,swipehq-payment-gateway-wp-e-commerce,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4563-2e334a9b30a8a16758bc7c2d1620372e.yaml b/nuclei-templates/2014/CVE-2014-4563-2e334a9b30a8a16758bc7c2d1620372e.yaml index a8c73ef2e3..778a47faa5 100644 --- a/nuclei-templates/2014/CVE-2014-4563-2e334a9b30a8a16758bc7c2d1620372e.yaml +++ b/nuclei-templates/2014/CVE-2014-4563-2e334a9b30a8a16758bc7c2d1620372e.yaml @@ -4,7 +4,7 @@ info: name: > Cloak & Encrypt < 3.8.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in go.php in the URL Cloak & Encrypt (url-cloak-encrypt) plugin < 3.8.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the url parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/url-cloak-encrypt/" google-query: inurl:"/wp-content/plugins/url-cloak-encrypt/" shodan-query: 'vuln:CVE-2014-4563' - tags: cve,wordpress,wp-plugin,url-cloak-encrypt,medium + tags: cve,wordpress,wp-plugin,url-cloak-encrypt,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4564-22471b3f81db400388be79d0e5d0cf32.yaml b/nuclei-templates/2014/CVE-2014-4564-22471b3f81db400388be79d0e5d0cf32.yaml index 249629889b..8d74f4d6af 100644 --- a/nuclei-templates/2014/CVE-2014-4564-22471b3f81db400388be79d0e5d0cf32.yaml +++ b/nuclei-templates/2014/CVE-2014-4564-22471b3f81db400388be79d0e5d0cf32.yaml @@ -4,7 +4,7 @@ info: name: > Validated <= 1.0.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in check.php in the Validated plugin 1.0.2 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the slug parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/validated/" google-query: inurl:"/wp-content/plugins/validated/" shodan-query: 'vuln:CVE-2014-4564' - tags: cve,wordpress,wp-plugin,validated,medium + tags: cve,wordpress,wp-plugin,validated,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4566-011e0a807fc0a0f2b6240634cb1a2fc2.yaml b/nuclei-templates/2014/CVE-2014-4566-011e0a807fc0a0f2b6240634cb1a2fc2.yaml index a0cef18284..6dceafc3b7 100644 --- a/nuclei-templates/2014/CVE-2014-4566-011e0a807fc0a0f2b6240634cb1a2fc2.yaml +++ b/nuclei-templates/2014/CVE-2014-4566-011e0a807fc0a0f2b6240634cb1a2fc2.yaml @@ -4,7 +4,7 @@ info: name: > verwei.se – WordPress – Twitter <= 1.0 2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in res/fake_twitter/frame.php in the "verwei.se - WordPress - Twitter" (verweise-wordpress-twitter) plugin 1.0.2 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the base parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/verweise-wordpress-twitter/" google-query: inurl:"/wp-content/plugins/verweise-wordpress-twitter/" shodan-query: 'vuln:CVE-2014-4566' - tags: cve,wordpress,wp-plugin,verweise-wordpress-twitter,medium + tags: cve,wordpress,wp-plugin,verweise-wordpress-twitter,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4567-78372eee8a5b2f566eb2e73090f227ad.yaml b/nuclei-templates/2014/CVE-2014-4567-78372eee8a5b2f566eb2e73090f227ad.yaml index 71ee61a414..cbc28dcc07 100644 --- a/nuclei-templates/2014/CVE-2014-4567-78372eee8a5b2f566eb2e73090f227ad.yaml +++ b/nuclei-templates/2014/CVE-2014-4567-78372eee8a5b2f566eb2e73090f227ad.yaml @@ -4,7 +4,7 @@ info: name: > HTML5 Webcam Microphone Recorder Forms < 1.55 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in comments/videowhisper2/r_logout.php in the Video Comments Webcam Recorder plugin 1.55, as downloaded before 20140116 for WordPress allows remote attackers to inject arbitrary web script or HTML via the message parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/video-comments-webcam-recorder/" google-query: inurl:"/wp-content/plugins/video-comments-webcam-recorder/" shodan-query: 'vuln:CVE-2014-4567' - tags: cve,wordpress,wp-plugin,video-comments-webcam-recorder,medium + tags: cve,wordpress,wp-plugin,video-comments-webcam-recorder,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4569-e248f5c6da990a6a809a8d58910d242b.yaml b/nuclei-templates/2014/CVE-2014-4569-e248f5c6da990a6a809a8d58910d242b.yaml index ed8f5c734c..374b03edf9 100644 --- a/nuclei-templates/2014/CVE-2014-4569-e248f5c6da990a6a809a8d58910d242b.yaml +++ b/nuclei-templates/2014/CVE-2014-4569-e248f5c6da990a6a809a8d58910d242b.yaml @@ -4,7 +4,7 @@ info: name: > Broadcast Live Video – Live Streaming < 4.27.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in ls/vv_login.php in the VideoWhisper Live Streaming Integration plugin 4.27.2 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the room_name parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/videowhisper-live-streaming-integration/" google-query: inurl:"/wp-content/plugins/videowhisper-live-streaming-integration/" shodan-query: 'vuln:CVE-2014-4569' - tags: cve,wordpress,wp-plugin,videowhisper-live-streaming-integration,medium + tags: cve,wordpress,wp-plugin,videowhisper-live-streaming-integration,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4571-495d298d6c0fc5fe1a9847d638c40959.yaml b/nuclei-templates/2014/CVE-2014-4571-495d298d6c0fc5fe1a9847d638c40959.yaml index 297d197543..a6973a83e3 100644 --- a/nuclei-templates/2014/CVE-2014-4571-495d298d6c0fc5fe1a9847d638c40959.yaml +++ b/nuclei-templates/2014/CVE-2014-4571-495d298d6c0fc5fe1a9847d638c40959.yaml @@ -4,7 +4,7 @@ info: name: > VN Calendar <= 1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in vncal.js.php in the VN-Calendar plugin 1.0 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) fs or (2) w parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/vn-calendar/" google-query: inurl:"/wp-content/plugins/vn-calendar/" shodan-query: 'vuln:CVE-2014-4571' - tags: cve,wordpress,wp-plugin,vn-calendar,medium + tags: cve,wordpress,wp-plugin,vn-calendar,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4574-a81e63270dce3acdb86d52d988c823c1.yaml b/nuclei-templates/2014/CVE-2014-4574-a81e63270dce3acdb86d52d988c823c1.yaml index b5dd70b724..95c3dc8843 100644 --- a/nuclei-templates/2014/CVE-2014-4574-a81e63270dce3acdb86d52d988c823c1.yaml +++ b/nuclei-templates/2014/CVE-2014-4574-a81e63270dce3acdb86d52d988c823c1.yaml @@ -4,7 +4,7 @@ info: name: > WebEngage Feedback, Survey and Notification < 2.0.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in resize.php in the WebEngage plugin before 2.0.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the height parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/webengage/" google-query: inurl:"/wp-content/plugins/webengage/" shodan-query: 'vuln:CVE-2014-4574' - tags: cve,wordpress,wp-plugin,webengage,medium + tags: cve,wordpress,wp-plugin,webengage,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4575-11d411cbc5ec47f84a5a874c5f4a706d.yaml b/nuclei-templates/2014/CVE-2014-4575-11d411cbc5ec47f84a5a874c5f4a706d.yaml index a215d109dc..1c10131876 100644 --- a/nuclei-templates/2014/CVE-2014-4575-11d411cbc5ec47f84a5a874c5f4a706d.yaml +++ b/nuclei-templates/2014/CVE-2014-4575-11d411cbc5ec47f84a5a874c5f4a706d.yaml @@ -4,7 +4,7 @@ info: name: > WikiPop <= 2.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in js/window.php in the Wikipop plugin 2.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the s parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wikipop/" google-query: inurl:"/wp-content/plugins/wikipop/" shodan-query: 'vuln:CVE-2014-4575' - tags: cve,wordpress,wp-plugin,wikipop,medium + tags: cve,wordpress,wp-plugin,wikipop,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4576-e0d816c541690f9c52144ee19295acfb.yaml b/nuclei-templates/2014/CVE-2014-4576-e0d816c541690f9c52144ee19295acfb.yaml index dfdd1573b4..e46a6169b2 100644 --- a/nuclei-templates/2014/CVE-2014-4576-e0d816c541690f9c52144ee19295acfb.yaml +++ b/nuclei-templates/2014/CVE-2014-4576-e0d816c541690f9c52144ee19295acfb.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Social Login <= 2.1.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in services/diagnostics.php in the WordPress Social Login plugin 2.1.5 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the xhrurl parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wordpress-social-login/" google-query: inurl:"/wp-content/plugins/wordpress-social-login/" shodan-query: 'vuln:CVE-2014-4576' - tags: cve,wordpress,wp-plugin,wordpress-social-login,medium + tags: cve,wordpress,wp-plugin,wordpress-social-login,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4577-5595c7f205cd9ae7c0c1e3237881d78f.yaml b/nuclei-templates/2014/CVE-2014-4577-5595c7f205cd9ae7c0c1e3237881d78f.yaml index f2d7840fc3..85a7e962c1 100644 --- a/nuclei-templates/2014/CVE-2014-4577-5595c7f205cd9ae7c0c1e3237881d78f.yaml +++ b/nuclei-templates/2014/CVE-2014-4577-5595c7f205cd9ae7c0c1e3237881d78f.yaml @@ -4,7 +4,7 @@ info: name: > WP AmASIN – The Amazon Affiliate Shop <= 0.9.6 - Local File Inclusion author: topscoder - severity: high + severity: critical description: > Absolute path traversal vulnerability in reviews.php in the WP AmASIN - The Amazon Affiliate Shop plugin 0.9.6 and earlier for WordPress allows remote attackers to read arbitrary files via a full pathname in the url parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-amasin-the-amazon-affiliate-shop/" google-query: inurl:"/wp-content/plugins/wp-amasin-the-amazon-affiliate-shop/" shodan-query: 'vuln:CVE-2014-4577' - tags: cve,wordpress,wp-plugin,wp-amasin-the-amazon-affiliate-shop,high + tags: cve,wordpress,wp-plugin,wp-amasin-the-amazon-affiliate-shop,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4579-2d20c9ee33e7e10b4c0f0dcd5f256173.yaml b/nuclei-templates/2014/CVE-2014-4579-2d20c9ee33e7e10b4c0f0dcd5f256173.yaml index c939d7fbf2..e58403c03c 100644 --- a/nuclei-templates/2014/CVE-2014-4579-2d20c9ee33e7e10b4c0f0dcd5f256173.yaml +++ b/nuclei-templates/2014/CVE-2014-4579-2d20c9ee33e7e10b4c0f0dcd5f256173.yaml @@ -4,7 +4,7 @@ info: name: > Appointments Scheduler <= 1.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in js/test.php in the Appointments Scheduler plugin 1.5 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the lang parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-appointments-schedules/" google-query: inurl:"/wp-content/plugins/wp-appointments-schedules/" shodan-query: 'vuln:CVE-2014-4579' - tags: cve,wordpress,wp-plugin,wp-appointments-schedules,medium + tags: cve,wordpress,wp-plugin,wp-appointments-schedules,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4580-549e52f202fcfb1294c6d1e3496da00f.yaml b/nuclei-templates/2014/CVE-2014-4580-549e52f202fcfb1294c6d1e3496da00f.yaml index ded2d4c490..aeec2ba9cf 100644 --- a/nuclei-templates/2014/CVE-2014-4580-549e52f202fcfb1294c6d1e3496da00f.yaml +++ b/nuclei-templates/2014/CVE-2014-4580-549e52f202fcfb1294c6d1e3496da00f.yaml @@ -4,7 +4,7 @@ info: name: > WP BlipBot <= 3.0.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The WP BlipBot for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'BlipBotID' parameter in versions up to, and including, 3.0.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-blipbot/" google-query: inurl:"/wp-content/plugins/wp-blipbot/" shodan-query: 'vuln:CVE-2014-4580' - tags: cve,wordpress,wp-plugin,wp-blipbot,medium + tags: cve,wordpress,wp-plugin,wp-blipbot,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4583-faf2b2d46d16f4cbc167cb1d3ca32849.yaml b/nuclei-templates/2014/CVE-2014-4583-faf2b2d46d16f4cbc167cb1d3ca32849.yaml index 9ea1816c10..4cb3694f87 100644 --- a/nuclei-templates/2014/CVE-2014-4583-faf2b2d46d16f4cbc167cb1d3ca32849.yaml +++ b/nuclei-templates/2014/CVE-2014-4583-faf2b2d46d16f4cbc167cb1d3ca32849.yaml @@ -4,7 +4,7 @@ info: name: > WP-Contact <= 1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in forms/messages.php in the WP-Contact (wp-contact-sidebar-widget) plugin 1.0 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) edit, (2) order_direction, (3) limit_start, (4) id, or (5) order parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-contact-sidebar-widget/" google-query: inurl:"/wp-content/plugins/wp-contact-sidebar-widget/" shodan-query: 'vuln:CVE-2014-4583' - tags: cve,wordpress,wp-plugin,wp-contact-sidebar-widget,medium + tags: cve,wordpress,wp-plugin,wp-contact-sidebar-widget,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4584-e5c5d5728e5c08ed8fa4fe79d2c3e420.yaml b/nuclei-templates/2014/CVE-2014-4584-e5c5d5728e5c08ed8fa4fe79d2c3e420.yaml index dd8b338cc5..089e4aa499 100644 --- a/nuclei-templates/2014/CVE-2014-4584-e5c5d5728e5c08ed8fa4fe79d2c3e420.yaml +++ b/nuclei-templates/2014/CVE-2014-4584-e5c5d5728e5c08ed8fa4fe79d2c3e420.yaml @@ -4,7 +4,7 @@ info: name: > WP Easybooking <= 1.0.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in admin/editFacility.php in the wp-easybooking plugin 1.0.3 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the fID parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-easybooking/" google-query: inurl:"/wp-content/plugins/wp-easybooking/" shodan-query: 'vuln:CVE-2014-4584' - tags: cve,wordpress,wp-plugin,wp-easybooking,medium + tags: cve,wordpress,wp-plugin,wp-easybooking,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4585-f4af8d356c8b91106f18b8295f1a09bd.yaml b/nuclei-templates/2014/CVE-2014-4585-f4af8d356c8b91106f18b8295f1a09bd.yaml index 20f278c6a7..82099c6e3f 100644 --- a/nuclei-templates/2014/CVE-2014-4585-f4af8d356c8b91106f18b8295f1a09bd.yaml +++ b/nuclei-templates/2014/CVE-2014-4585-f4af8d356c8b91106f18b8295f1a09bd.yaml @@ -4,7 +4,7 @@ info: name: > WP Facethumb <= 1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the WP-FaceThumb plugin possibly 1.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the ajax_url parameter to index.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-facethumb/" google-query: inurl:"/wp-content/plugins/wp-facethumb/" shodan-query: 'vuln:CVE-2014-4585' - tags: cve,wordpress,wp-plugin,wp-facethumb,medium + tags: cve,wordpress,wp-plugin,wp-facethumb,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4586-40f4199a368e88456e06377e7668ed2b.yaml b/nuclei-templates/2014/CVE-2014-4586-40f4199a368e88456e06377e7668ed2b.yaml index 20c1d3c3ab..032dc85dc1 100644 --- a/nuclei-templates/2014/CVE-2014-4586-40f4199a368e88456e06377e7668ed2b.yaml +++ b/nuclei-templates/2014/CVE-2014-4586-40f4199a368e88456e06377e7668ed2b.yaml @@ -4,7 +4,7 @@ info: name: > wp-football <= 1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the wp-football plugin 1.1 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the league parameter to (1) football_classification.php, (2) football_criteria.php, (3) templates/template_default_preview.php, or (4) templates/template_worldCup_preview.php; the (5) f parameter to football-functions.php; the id parameter in an "action" action to (6) football_groups_list.php, (7) football_matches_list.php, (8) football_matches_phase.php, or (9) football_phases_list.php; or the (10) id_league parameter in a delete action to football_matches_load.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-football/" google-query: inurl:"/wp-content/plugins/wp-football/" shodan-query: 'vuln:CVE-2014-4586' - tags: cve,wordpress,wp-plugin,wp-football,medium + tags: cve,wordpress,wp-plugin,wp-football,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4587-25e2788cf757f6544d551ea3a1e2ff53.yaml b/nuclei-templates/2014/CVE-2014-4587-25e2788cf757f6544d551ea3a1e2ff53.yaml index 7f9b078933..cc5e508603 100644 --- a/nuclei-templates/2014/CVE-2014-4587-25e2788cf757f6544d551ea3a1e2ff53.yaml +++ b/nuclei-templates/2014/CVE-2014-4587-25e2788cf757f6544d551ea3a1e2ff53.yaml @@ -4,7 +4,7 @@ info: name: > WP Guestmap <= 1.8 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the WP GuestMap plugin 1.8 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) zl, (2) mt, or (3) dc parameter to guest-locator.php; the (4) zl, (5) mt, (6) activate, or (7) dc parameter to online-tracker.php; the (8) zl, (9) mt, or (10) dc parameter to stats-map.php; or the (11) zl, (12) mt, (13) activate, or (14) dc parameter to weather-map.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-guestmap/" google-query: inurl:"/wp-content/plugins/wp-guestmap/" shodan-query: 'vuln:CVE-2014-4587' - tags: cve,wordpress,wp-plugin,wp-guestmap,medium + tags: cve,wordpress,wp-plugin,wp-guestmap,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4589-cf07672d5cc5a9d43b461f631786b4cf.yaml b/nuclei-templates/2014/CVE-2014-4589-cf07672d5cc5a9d43b461f631786b4cf.yaml index 2d5bf92a69..220da848ff 100644 --- a/nuclei-templates/2014/CVE-2014-4589-cf07672d5cc5a9d43b461f631786b4cf.yaml +++ b/nuclei-templates/2014/CVE-2014-4589-cf07672d5cc5a9d43b461f631786b4cf.yaml @@ -4,7 +4,7 @@ info: name: > WP Silverlight Media Player <= 0.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in uploader.php in the WP Silverlight Media Player (wp-media-player) plugin 0.8 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the post_id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-media-player/" google-query: inurl:"/wp-content/plugins/wp-media-player/" shodan-query: 'vuln:CVE-2014-4589' - tags: cve,wordpress,wp-plugin,wp-media-player,medium + tags: cve,wordpress,wp-plugin,wp-media-player,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4593-11e0416c47cc399cafbb7b5feca59d4c.yaml b/nuclei-templates/2014/CVE-2014-4593-11e0416c47cc399cafbb7b5feca59d4c.yaml index 2df1fb3e2e..34e60038b8 100644 --- a/nuclei-templates/2014/CVE-2014-4593-11e0416c47cc399cafbb7b5feca59d4c.yaml +++ b/nuclei-templates/2014/CVE-2014-4593-11e0416c47cc399cafbb7b5feca59d4c.yaml @@ -4,7 +4,7 @@ info: name: > WP Plugin Manager (wppm) <= 1.6.4.b - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-plugins-net/index.php in the WP Plugin Manager (wppm) plugin 1.6.4.b and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filter parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wppm/" google-query: inurl:"/wp-content/plugins/wppm/" shodan-query: 'vuln:CVE-2014-4593' - tags: cve,wordpress,wp-plugin,wppm,medium + tags: cve,wordpress,wp-plugin,wppm,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4595-db7767ed937dfde97dcfb07b299497ed.yaml b/nuclei-templates/2014/CVE-2014-4595-db7767ed937dfde97dcfb07b299497ed.yaml index 4dd1a5cb8a..de46ab0773 100644 --- a/nuclei-templates/2014/CVE-2014-4595-db7767ed937dfde97dcfb07b299497ed.yaml +++ b/nuclei-templates/2014/CVE-2014-4595-db7767ed937dfde97dcfb07b299497ed.yaml @@ -4,7 +4,7 @@ info: name: > WP Restful <= 0.1 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the WP RESTful plugin 0.1 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) oauth_callback parameter to html_api_authorize.php or the (2) oauth_token_temp or (3) oauth_callback_temp parameter to html_api_login.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-restful/" google-query: inurl:"/wp-content/plugins/wp-restful/" shodan-query: 'vuln:CVE-2014-4595' - tags: cve,wordpress,wp-plugin,wp-restful,medium + tags: cve,wordpress,wp-plugin,wp-restful,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4596-894d5909f0af3672921ffb2138091248.yaml b/nuclei-templates/2014/CVE-2014-4596-894d5909f0af3672921ffb2138091248.yaml index dce20ceb68..4dea2fbbc0 100644 --- a/nuclei-templates/2014/CVE-2014-4596-894d5909f0af3672921ffb2138091248.yaml +++ b/nuclei-templates/2014/CVE-2014-4596-894d5909f0af3672921ffb2138091248.yaml @@ -4,7 +4,7 @@ info: name: > WP Snap App <= 1.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in js/button-snapapp.php in the SnapApp plugin 1.5 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) msg or (2) act parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpsnapapp/" google-query: inurl:"/wp-content/plugins/wpsnapapp/" shodan-query: 'vuln:CVE-2014-4596' - tags: cve,wordpress,wp-plugin,wpsnapapp,medium + tags: cve,wordpress,wp-plugin,wpsnapapp,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4599-d9ebf3668fe7cefc2f8b63111d50df87.yaml b/nuclei-templates/2014/CVE-2014-4599-d9ebf3668fe7cefc2f8b63111d50df87.yaml index 92308b506d..cf6bdbe903 100644 --- a/nuclei-templates/2014/CVE-2014-4599-d9ebf3668fe7cefc2f8b63111d50df87.yaml +++ b/nuclei-templates/2014/CVE-2014-4599-d9ebf3668fe7cefc2f8b63111d50df87.yaml @@ -4,7 +4,7 @@ info: name: > WP-Business Directory <= 1.0.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in forms/search.php in the WP-Business Directory (wp-ttisbdir) plugin 1.0.2 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) edit, (2) search_term, (3) page_id, (4) page, or (5) page_links parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-ttisbdir/" google-query: inurl:"/wp-content/plugins/wp-ttisbdir/" shodan-query: 'vuln:CVE-2014-4599' - tags: cve,wordpress,wp-plugin,wp-ttisbdir,medium + tags: cve,wordpress,wp-plugin,wp-ttisbdir,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4600-fc176b004d2c6f19188839a3973c1a4d.yaml b/nuclei-templates/2014/CVE-2014-4600-fc176b004d2c6f19188839a3973c1a4d.yaml index 73f8bc65f0..fad7d6349f 100644 --- a/nuclei-templates/2014/CVE-2014-4600-fc176b004d2c6f19188839a3973c1a4d.yaml +++ b/nuclei-templates/2014/CVE-2014-4600-fc176b004d2c6f19188839a3973c1a4d.yaml @@ -4,7 +4,7 @@ info: name: > WP Ultimate Email Marketer <= 1.1.0 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The WP Ultimate Email Marketer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'listname' & 'contact' parameters in versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-ultimate-email-marketer/" google-query: inurl:"/wp-content/plugins/wp-ultimate-email-marketer/" shodan-query: 'vuln:CVE-2014-4600' - tags: cve,wordpress,wp-plugin,wp-ultimate-email-marketer,medium + tags: cve,wordpress,wp-plugin,wp-ultimate-email-marketer,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4601-530246c3333edec963a6035638964677.yaml b/nuclei-templates/2014/CVE-2014-4601-530246c3333edec963a6035638964677.yaml index ca16471bed..1dc7aa103b 100644 --- a/nuclei-templates/2014/CVE-2014-4601-530246c3333edec963a6035638964677.yaml +++ b/nuclei-templates/2014/CVE-2014-4601-530246c3333edec963a6035638964677.yaml @@ -4,7 +4,7 @@ info: name: > Wu-Rating <= 1.0 12319 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wu-ratepost.php in the Wu-Rating plugin 1.0 12319 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the v parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wu-rating/" google-query: inurl:"/wp-content/plugins/wu-rating/" shodan-query: 'vuln:CVE-2014-4601' - tags: cve,wordpress,wp-plugin,wu-rating,medium + tags: cve,wordpress,wp-plugin,wu-rating,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4602-780fa31d43c1e72887f541f835fe2c28.yaml b/nuclei-templates/2014/CVE-2014-4602-780fa31d43c1e72887f541f835fe2c28.yaml index 634c72ac40..7cb0a3b0be 100644 --- a/nuclei-templates/2014/CVE-2014-4602-780fa31d43c1e72887f541f835fe2c28.yaml +++ b/nuclei-templates/2014/CVE-2014-4602-780fa31d43c1e72887f541f835fe2c28.yaml @@ -4,7 +4,7 @@ info: name: > XEN Carousel <= 0.12.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in xencarousel-admin.js.php in the XEN Carousel plugin 0.12.2 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) path or (2) ajaxpath parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/xen-carousel/" google-query: inurl:"/wp-content/plugins/xen-carousel/" shodan-query: 'vuln:CVE-2014-4602' - tags: cve,wordpress,wp-plugin,xen-carousel,medium + tags: cve,wordpress,wp-plugin,xen-carousel,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4604-882b62316645c3c4ca02d06b90f3ba4c.yaml b/nuclei-templates/2014/CVE-2014-4604-882b62316645c3c4ca02d06b90f3ba4c.yaml index b5082bc223..b35445b9a3 100644 --- a/nuclei-templates/2014/CVE-2014-4604-882b62316645c3c4ca02d06b90f3ba4c.yaml +++ b/nuclei-templates/2014/CVE-2014-4604-882b62316645c3c4ca02d06b90f3ba4c.yaml @@ -4,7 +4,7 @@ info: name: > Your Text Manager <= 0.3.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in settings/pwsettings.php in the Your Text Manager plugin 0.3.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the ytmpw parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/your-text-manager/" google-query: inurl:"/wp-content/plugins/your-text-manager/" shodan-query: 'vuln:CVE-2014-4604' - tags: cve,wordpress,wp-plugin,your-text-manager,medium + tags: cve,wordpress,wp-plugin,your-text-manager,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4605-e5d3824dce2c042eb639b46cc57ff2d2.yaml b/nuclei-templates/2014/CVE-2014-4605-e5d3824dce2c042eb639b46cc57ff2d2.yaml index c3efe3c1f7..b46dacfe1d 100644 --- a/nuclei-templates/2014/CVE-2014-4605-e5d3824dce2c042eb639b46cc57ff2d2.yaml +++ b/nuclei-templates/2014/CVE-2014-4605-e5d3824dce2c042eb639b46cc57ff2d2.yaml @@ -4,7 +4,7 @@ info: name: > ZdStatistics <= 2.0.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in cal/test.php in the ZdStatistics (zdstats) plugin 2.0.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the lang parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/zdstats/" google-query: inurl:"/wp-content/plugins/zdstats/" shodan-query: 'vuln:CVE-2014-4605' - tags: cve,wordpress,wp-plugin,zdstats,medium + tags: cve,wordpress,wp-plugin,zdstats,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4606-09e64e82ae55462158eeb5e726a22311.yaml b/nuclei-templates/2014/CVE-2014-4606-09e64e82ae55462158eeb5e726a22311.yaml index 500ab2d32a..077802442b 100644 --- a/nuclei-templates/2014/CVE-2014-4606-09e64e82ae55462158eeb5e726a22311.yaml +++ b/nuclei-templates/2014/CVE-2014-4606-09e64e82ae55462158eeb5e726a22311.yaml @@ -4,7 +4,7 @@ info: name: > Zeenshare <= 1.0.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in redirect_to_zeenshare.php in the ZeenShare plugin 1.0.1 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the zs_sid parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/zeenshare/" google-query: inurl:"/wp-content/plugins/zeenshare/" shodan-query: 'vuln:CVE-2014-4606' - tags: cve,wordpress,wp-plugin,zeenshare,medium + tags: cve,wordpress,wp-plugin,zeenshare,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4663-b970262dad30a7d484efebc698a4fbb7.yaml b/nuclei-templates/2014/CVE-2014-4663-b970262dad30a7d484efebc698a4fbb7.yaml index a14a6d5c23..b409e9c46a 100644 --- a/nuclei-templates/2014/CVE-2014-4663-b970262dad30a7d484efebc698a4fbb7.yaml +++ b/nuclei-templates/2014/CVE-2014-4663-b970262dad30a7d484efebc698a4fbb7.yaml @@ -14,17 +14,17 @@ info: cvss-score: 9.8 cve-id: CVE-2014-4663 metadata: - fofa-query: "wp-content/plugins/wordthumb/" - google-query: inurl:"/wp-content/plugins/wordthumb/" + fofa-query: "wp-content/plugins/timthumb/" + google-query: inurl:"/wp-content/plugins/timthumb/" shodan-query: 'vuln:CVE-2014-4663' - tags: cve,wordpress,wp-plugin,wordthumb,critical + tags: cve,wordpress,wp-plugin,timthumb,critical http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/wordthumb/readme.txt" + - "{{BaseURL}}/wp-content/plugins/timthumb/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "wordthumb" + - "timthumb" part: body - type: dsl dsl: - - compare_versions(version, '<= 1.07') \ No newline at end of file + - compare_versions(version, '<= 2.8.13') \ No newline at end of file diff --git a/nuclei-templates/2014/CVE-2014-4717-934f2b643137558d27d763ac97da6357.yaml b/nuclei-templates/2014/CVE-2014-4717-934f2b643137558d27d763ac97da6357.yaml index 45be76a07f..7c34be16c4 100644 --- a/nuclei-templates/2014/CVE-2014-4717-934f2b643137558d27d763ac97da6357.yaml +++ b/nuclei-templates/2014/CVE-2014-4717-934f2b643137558d27d763ac97da6357.yaml @@ -4,7 +4,7 @@ info: name: > Simple Share Buttons Adder <= 4.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Simple Share Buttons Adder plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.4. This is due to missing nonce validation on simple-share-buttons-adder page. This makes it possible for unauthenticated attackers to inject malicious web scripts via the 'ssba_share_text' parameter through a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/simple-share-buttons-adder/" google-query: inurl:"/wp-content/plugins/simple-share-buttons-adder/" shodan-query: 'vuln:CVE-2014-4717' - tags: cve,wordpress,wp-plugin,simple-share-buttons-adder,high + tags: cve,wordpress,wp-plugin,simple-share-buttons-adder,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4845-acb1c7356c04fc668153a6e512559aa7.yaml b/nuclei-templates/2014/CVE-2014-4845-acb1c7356c04fc668153a6e512559aa7.yaml index 6aa5bcd455..0231a687d7 100644 --- a/nuclei-templates/2014/CVE-2014-4845-acb1c7356c04fc668153a6e512559aa7.yaml +++ b/nuclei-templates/2014/CVE-2014-4845-acb1c7356c04fc668153a6e512559aa7.yaml @@ -4,7 +4,7 @@ info: name: > BannerMan <= 0.2.4 - Authenticated (Admin+) Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Cross-site scripting (XSS) vulnerability in the BannerMan plugin 0.2.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the bannerman_background parameter to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bannerman/" google-query: inurl:"/wp-content/plugins/bannerman/" shodan-query: 'vuln:CVE-2014-4845' - tags: cve,wordpress,wp-plugin,bannerman,medium + tags: cve,wordpress,wp-plugin,bannerman,low http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4846-2c78a721f8f6bce6bce705e149277edc.yaml b/nuclei-templates/2014/CVE-2014-4846-2c78a721f8f6bce6bce705e149277edc.yaml index beb1daccff..cad9a7816f 100644 --- a/nuclei-templates/2014/CVE-2014-4846-2c78a721f8f6bce6bce705e149277edc.yaml +++ b/nuclei-templates/2014/CVE-2014-4846-2c78a721f8f6bce6bce705e149277edc.yaml @@ -4,7 +4,7 @@ info: name: > Slider, Gallery, and Carousel by MetaSlider – Responsive WordPress Plugin <= 2.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Meta Slider (ml-slider) plugin 2.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ml-slider/" google-query: inurl:"/wp-content/plugins/ml-slider/" shodan-query: 'vuln:CVE-2014-4846' - tags: cve,wordpress,wp-plugin,ml-slider,medium + tags: cve,wordpress,wp-plugin,ml-slider,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4848-6ccf09aa4f6f92564c1ba185250a9b6d.yaml b/nuclei-templates/2014/CVE-2014-4848-6ccf09aa4f6f92564c1ba185250a9b6d.yaml index bb72ba54c8..d610357cd2 100644 --- a/nuclei-templates/2014/CVE-2014-4848-6ccf09aa4f6f92564c1ba185250a9b6d.yaml +++ b/nuclei-templates/2014/CVE-2014-4848-6ccf09aa4f6f92564c1ba185250a9b6d.yaml @@ -4,7 +4,7 @@ info: name: > Blogstand Banner <= 1.0 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > The Blogstand Banner plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0. This is due to missing nonce validation on the bs-banner page. This makes it possible for unauthenticated attackers to inject malicious web scripts via the 'bs_blog_id' parameter through a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/blogstand-smart-banner/" google-query: inurl:"/wp-content/plugins/blogstand-smart-banner/" shodan-query: 'vuln:CVE-2014-4848' - tags: cve,wordpress,wp-plugin,blogstand-smart-banner,high + tags: cve,wordpress,wp-plugin,blogstand-smart-banner,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4854-aadc81f29bdd98e82b479da656b5f939.yaml b/nuclei-templates/2014/CVE-2014-4854-aadc81f29bdd98e82b479da656b5f939.yaml index a1c70bdca2..8780b1f60e 100644 --- a/nuclei-templates/2014/CVE-2014-4854-aadc81f29bdd98e82b479da656b5f939.yaml +++ b/nuclei-templates/2014/CVE-2014-4854-aadc81f29bdd98e82b479da656b5f939.yaml @@ -4,7 +4,7 @@ info: name: > WP Construction Mode <= 1.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the WP Construction Mode plugin 1.8 for WordPress allows remote attackers to inject arbitrary web script or HTML via the wuc_logo parameter in a save action to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-construction-mode/" google-query: inurl:"/wp-content/plugins/wp-construction-mode/" shodan-query: 'vuln:CVE-2014-4854' - tags: cve,wordpress,wp-plugin,wp-construction-mode,medium + tags: cve,wordpress,wp-plugin,wp-construction-mode,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4856-bc16d03e307b2f3d476c4281bda98567.yaml b/nuclei-templates/2014/CVE-2014-4856-bc16d03e307b2f3d476c4281bda98567.yaml index b5e5a89964..6f5cd1dbd5 100644 --- a/nuclei-templates/2014/CVE-2014-4856-bc16d03e307b2f3d476c4281bda98567.yaml +++ b/nuclei-templates/2014/CVE-2014-4856-bc16d03e307b2f3d476c4281bda98567.yaml @@ -4,7 +4,7 @@ info: name: > Crowdsignal Dashboard <= 2.0.24 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Polldaddy Polls & Ratings plugin before 2.0.25 for WordPress allows remote attackers to inject arbitrary web script or HTML via vectors related to a ratings shortcode and a unique ID. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/polldaddy/" google-query: inurl:"/wp-content/plugins/polldaddy/" shodan-query: 'vuln:CVE-2014-4856' - tags: cve,wordpress,wp-plugin,polldaddy,medium + tags: cve,wordpress,wp-plugin,polldaddy,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4939-84f324614693ea073f92a44e128e4cc4.yaml b/nuclei-templates/2014/CVE-2014-4939-84f324614693ea073f92a44e128e4cc4.yaml index 703650b528..1541aab079 100644 --- a/nuclei-templates/2014/CVE-2014-4939-84f324614693ea073f92a44e128e4cc4.yaml +++ b/nuclei-templates/2014/CVE-2014-4939-84f324614693ea073f92a44e128e4cc4.yaml @@ -4,7 +4,7 @@ info: name: > ENL Newsletter <= 1.0.1 - Authenticated (Admin+) SQL Injection author: topscoder - severity: high + severity: low description: > SQL injection vulnerability in the ENL Newsletter (enl-newsletter) plugin 1.0.1 for WordPress allows remote authenticated administrators to execute arbitrary SQL commands via the id parameter in the enl-add-new page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/enl-newsletter/" google-query: inurl:"/wp-content/plugins/enl-newsletter/" shodan-query: 'vuln:CVE-2014-4939' - tags: cve,wordpress,wp-plugin,enl-newsletter,high + tags: cve,wordpress,wp-plugin,enl-newsletter,low http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-4944-3a7bd82599c0011e05818b715925a7ed.yaml b/nuclei-templates/2014/CVE-2014-4944-3a7bd82599c0011e05818b715925a7ed.yaml index e0591dd503..48f647464c 100644 --- a/nuclei-templates/2014/CVE-2014-4944-3a7bd82599c0011e05818b715925a7ed.yaml +++ b/nuclei-templates/2014/CVE-2014-4944-3a7bd82599c0011e05818b715925a7ed.yaml @@ -4,7 +4,7 @@ info: name: > BSK PDF Manager <= 1.4 - Authenticated SQL Injection author: topscoder - severity: critical + severity: low description: > Multiple SQL injection vulnerabilities in inc/bsk-pdf-dashboard.php in the BSK PDF Manager plugin 1.3.2 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) categoryid or (2) pdfid parameter to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bsk-pdf-manager/" google-query: inurl:"/wp-content/plugins/bsk-pdf-manager/" shodan-query: 'vuln:CVE-2014-4944' - tags: cve,wordpress,wp-plugin,bsk-pdf-manager,critical + tags: cve,wordpress,wp-plugin,bsk-pdf-manager,low http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-5034-48e518f6131232316ecd7bce4c25cf68.yaml b/nuclei-templates/2014/CVE-2014-5034-48e518f6131232316ecd7bce4c25cf68.yaml index 888a284ecc..f49d28e8ed 100644 --- a/nuclei-templates/2014/CVE-2014-5034-48e518f6131232316ecd7bce4c25cf68.yaml +++ b/nuclei-templates/2014/CVE-2014-5034-48e518f6131232316ecd7bce4c25cf68.yaml @@ -4,7 +4,7 @@ info: name: > Brute Force Login Protection <= 1.5.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the Brute Force Login Protection module up to and including 1.5.1 for WordPress allows remote attackers to hijack the authentication of unspecified users for requests that have unknown impact via a crafted request to the brute-force-login-protection page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/brute-force-login-protection/" google-query: inurl:"/wp-content/plugins/brute-force-login-protection/" shodan-query: 'vuln:CVE-2014-5034' - tags: cve,wordpress,wp-plugin,brute-force-login-protection,high + tags: cve,wordpress,wp-plugin,brute-force-login-protection,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-5072-eacb463d459e2bbbfb442e19685437c7.yaml b/nuclei-templates/2014/CVE-2014-5072-eacb463d459e2bbbfb442e19685437c7.yaml index ddeaf23f6c..d9fd238a4b 100644 --- a/nuclei-templates/2014/CVE-2014-5072-eacb463d459e2bbbfb442e19685437c7.yaml +++ b/nuclei-templates/2014/CVE-2014-5072-eacb463d459e2bbbfb442e19685437c7.yaml @@ -4,7 +4,7 @@ info: name: > WP Activity Log <= 1.2.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in WP Security Audit Log plugin before 1.2.5 for WordPress allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-security-audit-log/" google-query: inurl:"/wp-content/plugins/wp-security-audit-log/" shodan-query: 'vuln:CVE-2014-5072' - tags: cve,wordpress,wp-plugin,wp-security-audit-log,high + tags: cve,wordpress,wp-plugin,wp-security-audit-log,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-5155-ef20cf055251e93d9b846f8776b699ac.yaml b/nuclei-templates/2014/CVE-2014-5155-ef20cf055251e93d9b846f8776b699ac.yaml index 6d3f2ffd51..5b5e5dfc59 100644 --- a/nuclei-templates/2014/CVE-2014-5155-ef20cf055251e93d9b846f8776b699ac.yaml +++ b/nuclei-templates/2014/CVE-2014-5155-ef20cf055251e93d9b846f8776b699ac.yaml @@ -4,7 +4,7 @@ info: name: > Theme My Login <= 6.3.9 - Local File Inclusion author: topscoder - severity: high + severity: critical description: > The Theme My Login plugin for WordPress is vulnerable to Local File Inclusion in versions before 6.3.10 via the login_template attribute found in the theme-my-login shortcode. This allows authenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/theme-my-login/" google-query: inurl:"/wp-content/plugins/theme-my-login/" shodan-query: 'vuln:CVE-2014-5155' - tags: cve,wordpress,wp-plugin,theme-my-login,high + tags: cve,wordpress,wp-plugin,theme-my-login,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-5180-e15109a3e2bca91cb9757f33e8ccceb0.yaml b/nuclei-templates/2014/CVE-2014-5180-e15109a3e2bca91cb9757f33e8ccceb0.yaml index 504847ad8f..1706f36832 100644 --- a/nuclei-templates/2014/CVE-2014-5180-e15109a3e2bca91cb9757f33e8ccceb0.yaml +++ b/nuclei-templates/2014/CVE-2014-5180-e15109a3e2bca91cb9757f33e8ccceb0.yaml @@ -4,7 +4,7 @@ info: name: > HDW Player Plugin (Video Player & Video Gallery) <= 2.4.2 - Authenticated (Admin+) SQL Injection author: topscoder - severity: critical + severity: low description: > SQL injection vulnerability in the videos page in the HDW Player Plugin (hdw-player-video-player-video-gallery) 2.4.2 for WordPress allows remote authenticated administrators to execute arbitrary SQL commands via the id parameter in the edit action to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/hdw-player-video-player-video-gallery/" google-query: inurl:"/wp-content/plugins/hdw-player-video-player-video-gallery/" shodan-query: 'vuln:CVE-2014-5180' - tags: cve,wordpress,wp-plugin,hdw-player-video-player-video-gallery,critical + tags: cve,wordpress,wp-plugin,hdw-player-video-player-video-gallery,low http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-5182-a37629b8951d8dca9eaa0034808a75be.yaml b/nuclei-templates/2014/CVE-2014-5182-a37629b8951d8dca9eaa0034808a75be.yaml index 09b4dc80cb..edccd1d99a 100644 --- a/nuclei-templates/2014/CVE-2014-5182-a37629b8951d8dca9eaa0034808a75be.yaml +++ b/nuclei-templates/2014/CVE-2014-5182-a37629b8951d8dca9eaa0034808a75be.yaml @@ -4,7 +4,7 @@ info: name: > YAWPP (Yet Another WordPress Petition Plugin) <= 1.2.1 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > Multiple SQL injection vulnerabilities in the yawpp plugin 1.2.1 for WordPress allow remote authenticated users with Contributor privileges to execute arbitrary SQL commands via vectors related to (1) admin_functions.php or (2) admin_update.php, as demonstrated by the id parameter in the update action to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/yawpp/" google-query: inurl:"/wp-content/plugins/yawpp/" shodan-query: 'vuln:CVE-2014-5182' - tags: cve,wordpress,wp-plugin,yawpp,high + tags: cve,wordpress,wp-plugin,yawpp,low http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-5183-ff68da2306359b7fb7d2ec7bcba42c9a.yaml b/nuclei-templates/2014/CVE-2014-5183-ff68da2306359b7fb7d2ec7bcba42c9a.yaml index db8d2cbefc..f8a99e46b6 100644 --- a/nuclei-templates/2014/CVE-2014-5183-ff68da2306359b7fb7d2ec7bcba42c9a.yaml +++ b/nuclei-templates/2014/CVE-2014-5183-ff68da2306359b7fb7d2ec7bcba42c9a.yaml @@ -4,7 +4,7 @@ info: name: > Simple Retail Menus <= 4.0.1 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in includes/mode-edit.php in the Simple Retail Menus (simple-retail-menus) plugin before 4.1 for WordPress allows remote authenticated editors to execute arbitrary SQL commands via the targetmenu parameter in an edit action to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/simple-retail-menus/" google-query: inurl:"/wp-content/plugins/simple-retail-menus/" shodan-query: 'vuln:CVE-2014-5183' - tags: cve,wordpress,wp-plugin,simple-retail-menus,high + tags: cve,wordpress,wp-plugin,simple-retail-menus,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-5184-c6f782f9040ea9a039305ec1ed2ddafa.yaml b/nuclei-templates/2014/CVE-2014-5184-c6f782f9040ea9a039305ec1ed2ddafa.yaml index 4dea09c129..ea88af11da 100644 --- a/nuclei-templates/2014/CVE-2014-5184-c6f782f9040ea9a039305ec1ed2ddafa.yaml +++ b/nuclei-templates/2014/CVE-2014-5184-c6f782f9040ea9a039305ec1ed2ddafa.yaml @@ -4,7 +4,7 @@ info: name: > stripShow Plugin <= 2.5.2 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in the stripshow-storylines page in the stripShow plugin 2.5.2 for WordPress allows remote authenticated administrators to execute arbitrary SQL commands via the story parameter in an edit action to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/stripshow/" google-query: inurl:"/wp-content/plugins/stripshow/" shodan-query: 'vuln:CVE-2014-5184' - tags: cve,wordpress,wp-plugin,stripshow,high + tags: cve,wordpress,wp-plugin,stripshow,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-5185-1f86e582a713c3bd4333747ed30a9d68.yaml b/nuclei-templates/2014/CVE-2014-5185-1f86e582a713c3bd4333747ed30a9d68.yaml index 297fbabd20..2261fef7ed 100644 --- a/nuclei-templates/2014/CVE-2014-5185-1f86e582a713c3bd4333747ed30a9d68.yaml +++ b/nuclei-templates/2014/CVE-2014-5185-1f86e582a713c3bd4333747ed30a9d68.yaml @@ -4,7 +4,7 @@ info: name: > Quartz <= 1.01.1 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in the Quartz plugin 1.01.1 for WordPress allows remote authenticated users with Contributor privileges to execute arbitrary SQL commands via the quote parameter in an edit action in the quartz/quote_form.php page to wp-admin/edit.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/quartz/" google-query: inurl:"/wp-content/plugins/quartz/" shodan-query: 'vuln:CVE-2014-5185' - tags: cve,wordpress,wp-plugin,quartz,high + tags: cve,wordpress,wp-plugin,quartz,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-5186-e6b6d80807708af0a37d88bb4f8862c7.yaml b/nuclei-templates/2014/CVE-2014-5186-e6b6d80807708af0a37d88bb4f8862c7.yaml index e1986b6642..4e9abc119c 100644 --- a/nuclei-templates/2014/CVE-2014-5186-e6b6d80807708af0a37d88bb4f8862c7.yaml +++ b/nuclei-templates/2014/CVE-2014-5186-e6b6d80807708af0a37d88bb4f8862c7.yaml @@ -4,7 +4,7 @@ info: name: > All Video Gallery Plugin for WordPress <= 1.2 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > SQL injection vulnerability in the All Video Gallery (all-video-gallery) plugin 1.2 for WordPress allows remote authenticated administrators to execute arbitrary SQL commands via the id parameter in an edit action in the allvideogallery_videos page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/all-video-gallery/" google-query: inurl:"/wp-content/plugins/all-video-gallery/" shodan-query: 'vuln:CVE-2014-5186' - tags: cve,wordpress,wp-plugin,all-video-gallery,high + tags: cve,wordpress,wp-plugin,all-video-gallery,low http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-5190-f1dda6bcbed7eecbc2cee8a7403b412e.yaml b/nuclei-templates/2014/CVE-2014-5190-f1dda6bcbed7eecbc2cee8a7403b412e.yaml index a7c093657c..2aebf4a46f 100644 --- a/nuclei-templates/2014/CVE-2014-5190-f1dda6bcbed7eecbc2cee8a7403b412e.yaml +++ b/nuclei-templates/2014/CVE-2014-5190-f1dda6bcbed7eecbc2cee8a7403b412e.yaml @@ -4,7 +4,7 @@ info: name: > SI CAPTCHA Anti-Spam < 2.7.6 - Reflected Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Cross-site scripting (XSS) vulnerability in captcha-secureimage/test/index.php in the SI CAPTCHA Anti-Spam plugin 2.7.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/si-captcha-for-wordpress/" google-query: inurl:"/wp-content/plugins/si-captcha-for-wordpress/" shodan-query: 'vuln:CVE-2014-5190' - tags: cve,wordpress,wp-plugin,si-captcha-for-wordpress,high + tags: cve,wordpress,wp-plugin,si-captcha-for-wordpress,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-5204-f22677490a8449ed9a279a27d7c29df2.yaml b/nuclei-templates/2014/CVE-2014-5204-f22677490a8449ed9a279a27d7c29df2.yaml index b9b3be9d8a..0161b6cd12 100644 --- a/nuclei-templates/2014/CVE-2014-5204-f22677490a8449ed9a279a27d7c29df2.yaml +++ b/nuclei-templates/2014/CVE-2014-5204-f22677490a8449ed9a279a27d7c29df2.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 3.9.2 - Cross-Site Request Forgery Protection Bypass author: topscoder - severity: high + severity: medium description: > wp-includes/pluggable.php in WordPress before 3.9.2 rejects invalid CSRF nonces with a different timing depending on which characters in the nonce are incorrect, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force attack. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2014-5204 metadata: shodan-query: 'vuln:CVE-2014-5204' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-5324-6eae0900047437ffd3af67b0a999c0ce.yaml b/nuclei-templates/2014/CVE-2014-5324-6eae0900047437ffd3af67b0a999c0ce.yaml index 731ba6e21e..c427556278 100644 --- a/nuclei-templates/2014/CVE-2014-5324-6eae0900047437ffd3af67b0a999c0ce.yaml +++ b/nuclei-templates/2014/CVE-2014-5324-6eae0900047437ffd3af67b0a999c0ce.yaml @@ -4,7 +4,7 @@ info: name: > Frontend File Manager Plugin < 3.6 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > The Frontend File Manager plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the _template_uploader.php file in versions up to, and including, 3.5. This makes it possible for authenticated attackers, with author-level permissions and above, to upload arbitrary files on the affected sites server which may make remote code execution possible. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nmedia-user-file-uploader/" google-query: inurl:"/wp-content/plugins/nmedia-user-file-uploader/" shodan-query: 'vuln:CVE-2014-5324' - tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,high + tags: cve,wordpress,wp-plugin,nmedia-user-file-uploader,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-5344-0c3f9f93e6c155cbea9171c4ea6c8a72.yaml b/nuclei-templates/2014/CVE-2014-5344-0c3f9f93e6c155cbea9171c4ea6c8a72.yaml index b6232ac5eb..add2bd6653 100644 --- a/nuclei-templates/2014/CVE-2014-5344-0c3f9f93e6c155cbea9171c4ea6c8a72.yaml +++ b/nuclei-templates/2014/CVE-2014-5344-0c3f9f93e6c155cbea9171c4ea6c8a72.yaml @@ -4,7 +4,7 @@ info: name: > MobiLoud – WordPress Mobile Apps – Convert your WordPress Website to Native Mobile Apps < 2.3.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Mobiloud (mobiloud-mobile-app-plugin) plugin before 2.3.8 for WordPress allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mobiloud-mobile-app-plugin/" google-query: inurl:"/wp-content/plugins/mobiloud-mobile-app-plugin/" shodan-query: 'vuln:CVE-2014-5344' - tags: cve,wordpress,wp-plugin,mobiloud-mobile-app-plugin,medium + tags: cve,wordpress,wp-plugin,mobiloud-mobile-app-plugin,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-5389-bdf28a131c7bd7c8afd4060cccc1802a.yaml b/nuclei-templates/2014/CVE-2014-5389-bdf28a131c7bd7c8afd4060cccc1802a.yaml index 05a471cbbf..2d230afb59 100644 --- a/nuclei-templates/2014/CVE-2014-5389-bdf28a131c7bd7c8afd4060cccc1802a.yaml +++ b/nuclei-templates/2014/CVE-2014-5389-bdf28a131c7bd7c8afd4060cccc1802a.yaml @@ -4,7 +4,7 @@ info: name: > Content Audit <= 1.6.0 - Authenticated (Admin+) SQL Injection author: topscoder - severity: high + severity: low description: > SQL injection vulnerability in content-audit-schedule.php in the Content Audit plugin before 1.6.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the "Audited content types" option in the content-audit page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/content-audit/" google-query: inurl:"/wp-content/plugins/content-audit/" shodan-query: 'vuln:CVE-2014-5389' - tags: cve,wordpress,wp-plugin,content-audit,high + tags: cve,wordpress,wp-plugin,content-audit,low http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-5460-5e35179f25bd306b0effea20785c4fdf.yaml b/nuclei-templates/2014/CVE-2014-5460-5e35179f25bd306b0effea20785c4fdf.yaml index 03355c20a1..8027867d2b 100644 --- a/nuclei-templates/2014/CVE-2014-5460-5e35179f25bd306b0effea20785c4fdf.yaml +++ b/nuclei-templates/2014/CVE-2014-5460-5e35179f25bd306b0effea20785c4fdf.yaml @@ -4,7 +4,7 @@ info: name: > Slideshow Gallery < 1.4.7 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > Unrestricted file upload vulnerability in the Tribulant Slideshow Gallery plugin before 1.4.7 for WordPress allows remote authenticated users to execute arbitrary code by uploading a PHP file, then accessing it via a direct request to the file in wp-content/uploads/slideshow-gallery/. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/slideshow-gallery/" google-query: inurl:"/wp-content/plugins/slideshow-gallery/" shodan-query: 'vuln:CVE-2014-5460' - tags: cve,wordpress,wp-plugin,slideshow-gallery,high + tags: cve,wordpress,wp-plugin,slideshow-gallery,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-6242-5ac539645eb63c949c47fcaeea5bb661.yaml b/nuclei-templates/2014/CVE-2014-6242-5ac539645eb63c949c47fcaeea5bb661.yaml index 725368afbb..d7678d06fc 100644 --- a/nuclei-templates/2014/CVE-2014-6242-5ac539645eb63c949c47fcaeea5bb661.yaml +++ b/nuclei-templates/2014/CVE-2014-6242-5ac539645eb63c949c47fcaeea5bb661.yaml @@ -4,7 +4,7 @@ info: name: > All In One WP Security & Firewall <= 3.8.2 - Authenticated Access or Cross-Site Request Forgery leading to SQL Injection via orderby, order Parameters author: topscoder - severity: high + severity: low description: > Multiple SQL injection vulnerabilities in the All In One WP Security & Firewall plugin before 3.8.3 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) orderby or (2) order parameter in the aiowpsec page to wp-admin/admin.php. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" shodan-query: 'vuln:CVE-2014-6242' - tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,high + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,low http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-6315-85912756aaaf6a5c4da322cb7b750dd5.yaml b/nuclei-templates/2014/CVE-2014-6315-85912756aaaf6a5c4da322cb7b750dd5.yaml index 99942368dc..a46b783768 100644 --- a/nuclei-templates/2014/CVE-2014-6315-85912756aaaf6a5c4da322cb7b750dd5.yaml +++ b/nuclei-templates/2014/CVE-2014-6315-85912756aaaf6a5c4da322cb7b750dd5.yaml @@ -4,7 +4,7 @@ info: name: > Photo Gallery by 10Web <= 1.1.30 - Reflected Cross-Site Scripting author: topscoder - severity: low + severity: medium description: > Multiple cross-site scripting (XSS) vulnerabilities in the Web-Dorado Photo Gallery plugin 1.1.30 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) callback, (2) dir, or (3) extensions parameter in an addImages action to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/photo-gallery/" google-query: inurl:"/wp-content/plugins/photo-gallery/" shodan-query: 'vuln:CVE-2014-6315' - tags: cve,wordpress,wp-plugin,photo-gallery,low + tags: cve,wordpress,wp-plugin,photo-gallery,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-6604-8402c61711992f819817934b35ca7a98.yaml b/nuclei-templates/2014/CVE-2014-6604-8402c61711992f819817934b35ca7a98.yaml index 1921f38711..52c39a095a 100644 --- a/nuclei-templates/2014/CVE-2014-6604-8402c61711992f819817934b35ca7a98.yaml +++ b/nuclei-templates/2014/CVE-2014-6604-8402c61711992f819817934b35ca7a98.yaml @@ -4,7 +4,7 @@ info: name: > Subscribe2 – Form, Email Subscribers & Newsletters <= 10.15 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Subscribe2 – Form, Email Subscribers & Newsletters plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the REMOTE_ADDR value in versions up to, and including, 10.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with subscriber, or higher privileges access to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/subscribe2/" google-query: inurl:"/wp-content/plugins/subscribe2/" shodan-query: 'vuln:CVE-2014-6604' - tags: cve,wordpress,wp-plugin,subscribe2,medium + tags: cve,wordpress,wp-plugin,subscribe2,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-7139-b47f4196237e18a984049178586c33fe.yaml b/nuclei-templates/2014/CVE-2014-7139-b47f4196237e18a984049178586c33fe.yaml index 08096228d5..0c2a417129 100644 --- a/nuclei-templates/2014/CVE-2014-7139-b47f4196237e18a984049178586c33fe.yaml +++ b/nuclei-templates/2014/CVE-2014-7139-b47f4196237e18a984049178586c33fe.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form DB <= 2.8.19 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Contact Form DB (aka CFDB and contact-form-7-to-database-extension) plugin before 2.8.20 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) form or (2) enc parameter in the CF7DBPluginShortCodeBuilder page to wp-admin/admin.php. A partial patch was released in version 2.8.16 but the problem was not fully resolved until 2.8.20. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-7-to-database-extension/" google-query: inurl:"/wp-content/plugins/contact-form-7-to-database-extension/" shodan-query: 'vuln:CVE-2014-7139' - tags: cve,wordpress,wp-plugin,contact-form-7-to-database-extension,medium + tags: cve,wordpress,wp-plugin,contact-form-7-to-database-extension,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-7151-0943806ea17e69fbad3f9008b6d8edaf.yaml b/nuclei-templates/2014/CVE-2014-7151-0943806ea17e69fbad3f9008b6d8edaf.yaml index 53e5db55b3..9d546a1892 100644 --- a/nuclei-templates/2014/CVE-2014-7151-0943806ea17e69fbad3f9008b6d8edaf.yaml +++ b/nuclei-templates/2014/CVE-2014-7151-0943806ea17e69fbad3f9008b6d8edaf.yaml @@ -4,7 +4,7 @@ info: name: > NEX-Forms Lite – WordPress Contact Form builder < 3.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the x-forms-express plugin 2.1.0 for WordPress allow remote attackers to inject arbitrary web script or HTML via the form_fields parameter in a (1) do_edit or (2) do_insert action to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/x-forms-express/" google-query: inurl:"/wp-content/plugins/x-forms-express/" shodan-query: 'vuln:CVE-2014-7151' - tags: cve,wordpress,wp-plugin,x-forms-express,medium + tags: cve,wordpress,wp-plugin,x-forms-express,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-7153-1b866013a286b8267be128b4354cf380.yaml b/nuclei-templates/2014/CVE-2014-7153-1b866013a286b8267be128b4354cf380.yaml index a0a8fd1d12..3c0f35534d 100644 --- a/nuclei-templates/2014/CVE-2014-7153-1b866013a286b8267be128b4354cf380.yaml +++ b/nuclei-templates/2014/CVE-2014-7153-1b866013a286b8267be128b4354cf380.yaml @@ -4,7 +4,7 @@ info: name: > Image Gallery - Responsive Photo Gallery <= 1.0.7 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in the editgallery function in admin/gallery_func.php in the Huge-IT Image Gallery plugin <= 1.0.7 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the removeslide parameter to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gallery-images/" google-query: inurl:"/wp-content/plugins/gallery-images/" shodan-query: 'vuln:CVE-2014-7153' - tags: cve,wordpress,wp-plugin,gallery-images,high + tags: cve,wordpress,wp-plugin,gallery-images,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-7240-ec82173ebd40f930fa2890b83a9358a8.yaml b/nuclei-templates/2014/CVE-2014-7240-ec82173ebd40f930fa2890b83a9358a8.yaml index 41e7ebf0b7..096a1d776e 100644 --- a/nuclei-templates/2014/CVE-2014-7240-ec82173ebd40f930fa2890b83a9358a8.yaml +++ b/nuclei-templates/2014/CVE-2014-7240-ec82173ebd40f930fa2890b83a9358a8.yaml @@ -4,7 +4,7 @@ info: name: > Easy Contact Form Solution <= 1.6 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Easy Contact Form Solution plugin before 1.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the value parameter in a master_response action to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-contact-form-solution/" google-query: inurl:"/wp-content/plugins/easy-contact-form-solution/" shodan-query: 'vuln:CVE-2014-7240' - tags: cve,wordpress,wp-plugin,easy-contact-form-solution,medium + tags: cve,wordpress,wp-plugin,easy-contact-form-solution,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-7956-a7d43e65e4e3ff48ff1d77822c4c9c14.yaml b/nuclei-templates/2014/CVE-2014-7956-a7d43e65e4e3ff48ff1d77822c4c9c14.yaml index 882063fe49..3b611f9a2e 100644 --- a/nuclei-templates/2014/CVE-2014-7956-a7d43e65e4e3ff48ff1d77822c4c9c14.yaml +++ b/nuclei-templates/2014/CVE-2014-7956-a7d43e65e4e3ff48ff1d77822c4c9c14.yaml @@ -4,7 +4,7 @@ info: name: > Pods <= 2.4.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Pods plugin before 2.5 for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter in an edit action in the pods page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pods/" google-query: inurl:"/wp-content/plugins/pods/" shodan-query: 'vuln:CVE-2014-7956' - tags: cve,wordpress,wp-plugin,pods,medium + tags: cve,wordpress,wp-plugin,pods,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-7957-fc1ea9d8e61023700e49f1688ac8b5c8.yaml b/nuclei-templates/2014/CVE-2014-7957-fc1ea9d8e61023700e49f1688ac8b5c8.yaml index 1ba3bda702..d1b5974192 100644 --- a/nuclei-templates/2014/CVE-2014-7957-fc1ea9d8e61023700e49f1688ac8b5c8.yaml +++ b/nuclei-templates/2014/CVE-2014-7957-fc1ea9d8e61023700e49f1688ac8b5c8.yaml @@ -4,7 +4,7 @@ info: name: > Pods <= 2.4.3 - Multiple Cross-Site Request Forgery author: topscoder - severity: critical + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the Pods plugin before 2.5 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) conduct cross-site scripting (XSS) attacks via the toggled parameter in a toggle action in the pods-components page to wp-admin/admin.php, (2) delete a pod in a delete action in the pods page to wp-admin/admin.php, (3) reset pod settings and data via the pods_reset parameter in the pod-settings page to wp-admin/admin.php, (4) deactivate and reset pod data via the pods_reset_deactivate parameter in the pod-settings page to wp-admin/admin.php, (5) delete the admin role via the id parameter in a delete action in the pods-component-roles-and-capabilities page to wp-admin/admin.php, or (6) enable "roles and capabilities" in a toggle action in the pods-components page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pods/" google-query: inurl:"/wp-content/plugins/pods/" shodan-query: 'vuln:CVE-2014-7957' - tags: cve,wordpress,wp-plugin,pods,critical + tags: cve,wordpress,wp-plugin,pods,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-7958-2269359ddd46edefa6d111262722719c.yaml b/nuclei-templates/2014/CVE-2014-7958-2269359ddd46edefa6d111262722719c.yaml index 250ff738a1..ad40e4d5de 100644 --- a/nuclei-templates/2014/CVE-2014-7958-2269359ddd46edefa6d111262722719c.yaml +++ b/nuclei-templates/2014/CVE-2014-7958-2269359ddd46edefa6d111262722719c.yaml @@ -4,7 +4,7 @@ info: name: > BulletProof Security < .51.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > CVE-2014-7958: Cross-site scripting (XSS) vulnerability in admin/htaccess/bpsunlock.php in the BulletProof Security plugin before .51.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the dbhost parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bulletproof-security/" google-query: inurl:"/wp-content/plugins/bulletproof-security/" shodan-query: 'vuln:CVE-2014-7958' - tags: cve,wordpress,wp-plugin,bulletproof-security,medium + tags: cve,wordpress,wp-plugin,bulletproof-security,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-7959-80f01f8956a520ccda68d02885c8eaae.yaml b/nuclei-templates/2014/CVE-2014-7959-80f01f8956a520ccda68d02885c8eaae.yaml index 61c0f2dac8..5c69b98b07 100644 --- a/nuclei-templates/2014/CVE-2014-7959-80f01f8956a520ccda68d02885c8eaae.yaml +++ b/nuclei-templates/2014/CVE-2014-7959-80f01f8956a520ccda68d02885c8eaae.yaml @@ -4,7 +4,7 @@ info: name: > BulletProof Security < .51.1 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in admin/htaccess/bpsunlock.php in the BulletProof Security plugin before .51.1 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the tableprefix parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bulletproof-security/" google-query: inurl:"/wp-content/plugins/bulletproof-security/" shodan-query: 'vuln:CVE-2014-7959' - tags: cve,wordpress,wp-plugin,bulletproof-security,high + tags: cve,wordpress,wp-plugin,bulletproof-security,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-8087-a2564828601d8890d4d70eda1fefb7d7.yaml b/nuclei-templates/2014/CVE-2014-8087-a2564828601d8890d4d70eda1fefb7d7.yaml index 562a4902ab..ccf3a544fe 100644 --- a/nuclei-templates/2014/CVE-2014-8087-a2564828601d8890d4d70eda1fefb7d7.yaml +++ b/nuclei-templates/2014/CVE-2014-8087-a2564828601d8890d4d70eda1fefb7d7.yaml @@ -4,7 +4,7 @@ info: name: > post highlights 2.0 - 2.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the post highlights plugin versions 2.0 through 2.6 for WordPress allows remote attackers to inject arbitrary web script or HTML via the txt parameter in a headline action to ajax/ph_save.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/post-highlights/" google-query: inurl:"/wp-content/plugins/post-highlights/" shodan-query: 'vuln:CVE-2014-8087' - tags: cve,wordpress,wp-plugin,post-highlights,medium + tags: cve,wordpress,wp-plugin,post-highlights,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-8364-ee3866229b628cfe3699728232f7f492.yaml b/nuclei-templates/2014/CVE-2014-8364-ee3866229b628cfe3699728232f7f492.yaml index 1dc0af8a2c..9e8d3fb9cd 100644 --- a/nuclei-templates/2014/CVE-2014-8364-ee3866229b628cfe3699728232f7f492.yaml +++ b/nuclei-templates/2014/CVE-2014-8364-ee3866229b628cfe3699728232f7f492.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Spreadsheet (wpSS) <= 0.62 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in ss_handler.php in the WordPress Spreadsheet (wpSS) plugin 0.62 for WordPress allows remote attackers to inject arbitrary web script or HTML via the ss_id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpSS/" google-query: inurl:"/wp-content/plugins/wpSS/" shodan-query: 'vuln:CVE-2014-8364' - tags: cve,wordpress,wp-plugin,wpSS,medium + tags: cve,wordpress,wp-plugin,wpSS,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-8375-5951232c0f20a63b311a79c589b973af.yaml b/nuclei-templates/2014/CVE-2014-8375-5951232c0f20a63b311a79c589b973af.yaml index 5f1b8bc23a..ad102a345c 100644 --- a/nuclei-templates/2014/CVE-2014-8375-5951232c0f20a63b311a79c589b973af.yaml +++ b/nuclei-templates/2014/CVE-2014-8375-5951232c0f20a63b311a79c589b973af.yaml @@ -4,7 +4,7 @@ info: name: > GB Gallery Slideshow <= 1.5 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in GBgallery.php in the GB Gallery Slideshow plugin 1.5 for WordPress allows remote administrators to execute arbitrary SQL commands via the selected_group parameter in a gb_ajax_get_group action to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gb-gallery-slideshow/" google-query: inurl:"/wp-content/plugins/gb-gallery-slideshow/" shodan-query: 'vuln:CVE-2014-8375' - tags: cve,wordpress,wp-plugin,gb-gallery-slideshow,high + tags: cve,wordpress,wp-plugin,gb-gallery-slideshow,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-8584-ece1da78596879174efa10393f34846c.yaml b/nuclei-templates/2014/CVE-2014-8584-ece1da78596879174efa10393f34846c.yaml index 6f7f2eda5a..389ab37a5f 100644 --- a/nuclei-templates/2014/CVE-2014-8584-ece1da78596879174efa10393f34846c.yaml +++ b/nuclei-templates/2014/CVE-2014-8584-ece1da78596879174efa10393f34846c.yaml @@ -4,7 +4,7 @@ info: name: > SpiderVPlayer <= 1.5.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Web Dorado Spider Video Player (aka WordPress Video Player) plugin before 1.5.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/player/" google-query: inurl:"/wp-content/plugins/player/" shodan-query: 'vuln:CVE-2014-8584' - tags: cve,wordpress,wp-plugin,player,medium + tags: cve,wordpress,wp-plugin,player,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-8603-1c3b4e53e5b3379877d01d32e9f8b494.yaml b/nuclei-templates/2014/CVE-2014-8603-1c3b4e53e5b3379877d01d32e9f8b494.yaml index 0e99045d42..b57921c905 100644 --- a/nuclei-templates/2014/CVE-2014-8603-1c3b4e53e5b3379877d01d32e9f8b494.yaml +++ b/nuclei-templates/2014/CVE-2014-8603-1c3b4e53e5b3379877d01d32e9f8b494.yaml @@ -4,7 +4,7 @@ info: name: > Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 3.1.1 - Remote Code Execution author: topscoder - severity: high + severity: critical description: > cloner.functions.php in the XCloner plugin 3.1.1 for WordPress and 3.5.1 for Joomla! allows remote administrators to execute arbitrary code via shell metacharacters in the (1) file name when creating a backup or vectors related to the (2) $_CONFIG[tarpath], (3) $exclude, (4) $_CONFIG['tarcompress'], (5) $_CONFIG['filename'], (6) $_CONFIG['exfile_tar'], (7) $_CONFIG[sqldump], (8) $_CONFIG['mysql_host'], (9) $_CONFIG['mysql_pass'], (10) $_CONFIG['mysql_user'], (11) $database_name, or (12) $sqlfile variable. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" shodan-query: 'vuln:CVE-2014-8603' - tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,high + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-8724-656dd25ede0c1a0fb3db612c85cade65.yaml b/nuclei-templates/2014/CVE-2014-8724-656dd25ede0c1a0fb3db612c85cade65.yaml index 6b3e0e53d3..f616d07685 100644 --- a/nuclei-templates/2014/CVE-2014-8724-656dd25ede0c1a0fb3db612c85cade65.yaml +++ b/nuclei-templates/2014/CVE-2014-8724-656dd25ede0c1a0fb3db612c85cade65.yaml @@ -4,7 +4,7 @@ info: name: > W3 Total Cache <= 0.9.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the W3 Total Cache plugin before 0.9.4.1 for WordPress, when debug mode is enabled, allows remote attackers to inject arbitrary web script or HTML via the "Cache key" in the HTML-Comments, as demonstrated by the PATH_INFO to the default URI. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/w3-total-cache/" google-query: inurl:"/wp-content/plugins/w3-total-cache/" shodan-query: 'vuln:CVE-2014-8724' - tags: cve,wordpress,wp-plugin,w3-total-cache,medium + tags: cve,wordpress,wp-plugin,w3-total-cache,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-8809-320ea2b9c0bedd9f6c8b24cfa2e671a3.yaml b/nuclei-templates/2014/CVE-2014-8809-320ea2b9c0bedd9f6c8b24cfa2e671a3.yaml index 8156d4c903..7f57834e61 100644 --- a/nuclei-templates/2014/CVE-2014-8809-320ea2b9c0bedd9f6c8b24cfa2e671a3.yaml +++ b/nuclei-templates/2014/CVE-2014-8809-320ea2b9c0bedd9f6c8b24cfa2e671a3.yaml @@ -4,7 +4,7 @@ info: name: > WP Symposium <= 14.10 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the WP Symposium plugin before 14.11 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) text parameter in an addComment action to ajax/profile_functions.php, (2) compose_text parameter in a sendMail action to ajax/mail_functions.php, (3) comment parameter in an add_comment action to ajax/lounge_functions.php, or (4) name parameter in a create_album action to ajax/gallery_functions.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-symposium/" google-query: inurl:"/wp-content/plugins/wp-symposium/" shodan-query: 'vuln:CVE-2014-8809' - tags: cve,wordpress,wp-plugin,wp-symposium,medium + tags: cve,wordpress,wp-plugin,wp-symposium,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-8810-491436cd325d5b03202c1b421dcad671.yaml b/nuclei-templates/2014/CVE-2014-8810-491436cd325d5b03202c1b421dcad671.yaml index a86551ce70..b1ac209ae3 100644 --- a/nuclei-templates/2014/CVE-2014-8810-491436cd325d5b03202c1b421dcad671.yaml +++ b/nuclei-templates/2014/CVE-2014-8810-491436cd325d5b03202c1b421dcad671.yaml @@ -4,7 +4,7 @@ info: name: > WP Symposium < 14.11 - Authenticated SQL Injection author: topscoder - severity: critical + severity: low description: > SQL injection vulnerability in ajax/mail_functions.php in the WP Symposium plugin before 14.11 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the tray parameter in a getMailMessage action. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-symposium/" google-query: inurl:"/wp-content/plugins/wp-symposium/" shodan-query: 'vuln:CVE-2014-8810' - tags: cve,wordpress,wp-plugin,wp-symposium,critical + tags: cve,wordpress,wp-plugin,wp-symposium,low http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-8948-c40ba36e2109a35c573b2639a4d72291.yaml b/nuclei-templates/2014/CVE-2014-8948-c40ba36e2109a35c573b2639a4d72291.yaml index ba80fe0212..82f21b57dd 100644 --- a/nuclei-templates/2014/CVE-2014-8948-c40ba36e2109a35c573b2639a4d72291.yaml +++ b/nuclei-templates/2014/CVE-2014-8948-c40ba36e2109a35c573b2639a4d72291.yaml @@ -4,7 +4,7 @@ info: name: > iMember360 3.8.0.12 - 3.9.001 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the iMember360 plugin 3.8.012 through 3.9.001 for WordPress allows remote attackers to hijack the authentication of administrators for requests that with an unspecified impact via the i4w_trace parameter. NOTE: this can be leveraged with CVE-2014-8948 to execute arbitrary commands. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/imember360/" google-query: inurl:"/wp-content/plugins/imember360/" shodan-query: 'vuln:CVE-2014-8948' - tags: cve,wordpress,wp-plugin,imember360,high + tags: cve,wordpress,wp-plugin,imember360,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-8949-0cbcc4f1288df0ee24dd7a2993f69c51.yaml b/nuclei-templates/2014/CVE-2014-8949-0cbcc4f1288df0ee24dd7a2993f69c51.yaml index 85b58ad238..711bd81dc9 100644 --- a/nuclei-templates/2014/CVE-2014-8949-0cbcc4f1288df0ee24dd7a2993f69c51.yaml +++ b/nuclei-templates/2014/CVE-2014-8949-0cbcc4f1288df0ee24dd7a2993f69c51.yaml @@ -4,7 +4,7 @@ info: name: > iMember360 3.8.012 - 3.9.001 - Remote Code Execution author: topscoder - severity: high + severity: critical description: > The iMember360 plugin 3.8.012 through 3.9.001 for WordPress allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the i4w_trace parameter. NOTE: this can be leveraged with CVE-2014-8948 to allow remote attackers to execute code. NOTE: it is not clear whether this issue itself crosses privileges. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/imember360/" google-query: inurl:"/wp-content/plugins/imember360/" shodan-query: 'vuln:CVE-2014-8949' - tags: cve,wordpress,wp-plugin,imember360,high + tags: cve,wordpress,wp-plugin,imember360,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-8955-f5690c4ae22224ef33491e3a8f293f4d.yaml b/nuclei-templates/2014/CVE-2014-8955-f5690c4ae22224ef33491e3a8f293f4d.yaml index ab09324afa..abae0ed344 100644 --- a/nuclei-templates/2014/CVE-2014-8955-f5690c4ae22224ef33491e3a8f293f4d.yaml +++ b/nuclei-templates/2014/CVE-2014-8955-f5690c4ae22224ef33491e3a8f293f4d.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form Clean and Simple < 4.4.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Contact Form Clean and Simple (clean-and-simple-contact-form-by-meg-nicholas) plugin 4.4.0 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the cscf[name] parameter to contact-us/. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/clean-and-simple-contact-form-by-meg-nicholas/" google-query: inurl:"/wp-content/plugins/clean-and-simple-contact-form-by-meg-nicholas/" shodan-query: 'vuln:CVE-2014-8955' - tags: cve,wordpress,wp-plugin,clean-and-simple-contact-form-by-meg-nicholas,medium + tags: cve,wordpress,wp-plugin,clean-and-simple-contact-form-by-meg-nicholas,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9031-c4855e013484cc5dd3a682addca483bd.yaml b/nuclei-templates/2014/CVE-2014-9031-c4855e013484cc5dd3a682addca483bd.yaml index 04cbd9cbe7..baba438586 100644 --- a/nuclei-templates/2014/CVE-2014-9031-c4855e013484cc5dd3a682addca483bd.yaml +++ b/nuclei-templates/2014/CVE-2014-9031-c4855e013484cc5dd3a682addca483bd.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.0.1 - Cross-Site Scripting via Shortcode Brackets author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the wptexturize function in WordPress before 3.7.5, 3.8.x before 3.8.5, and 3.9.x before 3.9.3 allows remote attackers to inject arbitrary web script or HTML via crafted use of shortcode brackets in a text field, as demonstrated by a comment or a post. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2014-9031 metadata: shodan-query: 'vuln:CVE-2014-9031' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9033-263b6b337d75675e2802e70806ebeca8.yaml b/nuclei-templates/2014/CVE-2014-9033-263b6b337d75675e2802e70806ebeca8.yaml index 1a85323169..5e13f62d3b 100644 --- a/nuclei-templates/2014/CVE-2014-9033-263b6b337d75675e2802e70806ebeca8.yaml +++ b/nuclei-templates/2014/CVE-2014-9033-263b6b337d75675e2802e70806ebeca8.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.0.1 - Cross-Site Request Forgery to Authentication Takeover author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in wp-login.php in WordPress 3.7.4, 3.8.4, 3.9.2, and 4.0 allows remote attackers to hijack the authentication of arbitrary users for requests that reset passwords. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2014-9033 metadata: shodan-query: 'vuln:CVE-2014-9033' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9035-440665cc216f121193f817a3884e395e.yaml b/nuclei-templates/2014/CVE-2014-9035-440665cc216f121193f817a3884e395e.yaml index 7dcb252ce2..d3f71c4fb2 100644 --- a/nuclei-templates/2014/CVE-2014-9035-440665cc216f121193f817a3884e395e.yaml +++ b/nuclei-templates/2014/CVE-2014-9035-440665cc216f121193f817a3884e395e.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.0.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in Press This in WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2014-9035 metadata: shodan-query: 'vuln:CVE-2014-9035' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9036-8a33514ce48c43037c771803b9a985c1.yaml b/nuclei-templates/2014/CVE-2014-9036-8a33514ce48c43037c771803b9a985c1.yaml index d623aee298..11b09231c4 100644 --- a/nuclei-templates/2014/CVE-2014-9036-8a33514ce48c43037c771803b9a985c1.yaml +++ b/nuclei-templates/2014/CVE-2014-9036-8a33514ce48c43037c771803b9a985c1.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.0.1 - Cross-Site Scripting via CSS author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 allows remote attackers to inject arbitrary web script or HTML via a crafted Cascading Style Sheets (CSS) token sequence in a post. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2014-9036 metadata: shodan-query: 'vuln:CVE-2014-9036' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9039-f4126d8b538ac1453cb97c3958cf463e.yaml b/nuclei-templates/2014/CVE-2014-9039-f4126d8b538ac1453cb97c3958cf463e.yaml index 60e3e26bed..44b89252c8 100644 --- a/nuclei-templates/2014/CVE-2014-9039-f4126d8b538ac1453cb97c3958cf463e.yaml +++ b/nuclei-templates/2014/CVE-2014-9039-f4126d8b538ac1453cb97c3958cf463e.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.0.1 Cross-Site Request Forgery to Password Reset author: topscoder - severity: high + severity: medium description: > wp-login.php in WordPress before 3.7.5, 3.8.x before 3.8.5, 3.9.x before 3.9.3, and 4.x before 4.0.1 might allow remote attackers to reset passwords by leveraging access to an e-mail account that received a password-reset message. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2014-9039 metadata: shodan-query: 'vuln:CVE-2014-9039' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9094-415af7715839a7a4186f1ea1fe3682a1.yaml b/nuclei-templates/2014/CVE-2014-9094-415af7715839a7a4186f1ea1fe3682a1.yaml index 430eb93156..4ed76d71d1 100644 --- a/nuclei-templates/2014/CVE-2014-9094-415af7715839a7a4186f1ea1fe3682a1.yaml +++ b/nuclei-templates/2014/CVE-2014-9094-415af7715839a7a4186f1ea1fe3682a1.yaml @@ -4,7 +4,7 @@ info: name: > DZS Video Gallery < 7.95 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in deploy/designer/preview.php in the Digital Zoom Studio (DZS) Video Gallery plugin for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) swfloc or (2) designrand parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/dzs-videogallery/" google-query: inurl:"/wp-content/plugins/dzs-videogallery/" shodan-query: 'vuln:CVE-2014-9094' - tags: cve,wordpress,wp-plugin,dzs-videogallery,medium + tags: cve,wordpress,wp-plugin,dzs-videogallery,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9098-5a110fd311341876d97192705d1ff40f.yaml b/nuclei-templates/2014/CVE-2014-9098-5a110fd311341876d97192705d1ff40f.yaml index 343c79ce8c..634814e709 100644 --- a/nuclei-templates/2014/CVE-2014-9098-5a110fd311341876d97192705d1ff40f.yaml +++ b/nuclei-templates/2014/CVE-2014-9098-5a110fd311341876d97192705d1ff40f.yaml @@ -4,7 +4,7 @@ info: name: > WORDPRESS VIDEO GALLERY <= 2.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Apptha WordPress Video Gallery (contus-video-gallery) plugin 2.5, possibly before 2014-07-23, for WordPress allow remote authenticated users to inject arbitrary web script or HTML via the videoadssearchQuery parameter to (1) videoads/videoads.php, (2) video/video.php, or (3) playlist/playlist.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contus-video-gallery/" google-query: inurl:"/wp-content/plugins/contus-video-gallery/" shodan-query: 'vuln:CVE-2014-9098' - tags: cve,wordpress,wp-plugin,contus-video-gallery,medium + tags: cve,wordpress,wp-plugin,contus-video-gallery,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9099-13ab8a3f776049bebae928b8bd527987.yaml b/nuclei-templates/2014/CVE-2014-9099-13ab8a3f776049bebae928b8bd527987.yaml index 032597bc1a..7248725e4e 100644 --- a/nuclei-templates/2014/CVE-2014-9099-13ab8a3f776049bebae928b8bd527987.yaml +++ b/nuclei-templates/2014/CVE-2014-9099-13ab8a3f776049bebae928b8bd527987.yaml @@ -4,7 +4,7 @@ info: name: > WhyDoWork AdSense <= 1.2 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the WhyDoWork AdSense plugin 1.2 for WordPress allows remote attackers to hijack the authentication of administrators for requests that have unspecified impact via a request to the whydowork_adsense page in wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/whydowork-adsense/" google-query: inurl:"/wp-content/plugins/whydowork-adsense/" shodan-query: 'vuln:CVE-2014-9099' - tags: cve,wordpress,wp-plugin,whydowork-adsense,high + tags: cve,wordpress,wp-plugin,whydowork-adsense,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9174-d4b13be2a36ff961aada7107a748559a.yaml b/nuclei-templates/2014/CVE-2014-9174-d4b13be2a36ff961aada7107a748559a.yaml index 5ed9003231..610d33fa88 100644 --- a/nuclei-templates/2014/CVE-2014-9174-d4b13be2a36ff961aada7107a748559a.yaml +++ b/nuclei-templates/2014/CVE-2014-9174-d4b13be2a36ff961aada7107a748559a.yaml @@ -4,7 +4,7 @@ info: name: > MonsterInsights – Google Analytics Dashboard for WordPress (Website Stats Made Easy) <= 5.1.2 - Cross-Site Scripting author: topscoder - severity: low + severity: high description: > Cross-site scripting (XSS) vulnerability in the Google Analytics by Yoast (google-analytics-for-wordpress) plugin before 5.1.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the "Manually enter your UA code" (manual_ua_code_field) field in the General Settings. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/google-analytics-for-wordpress/" google-query: inurl:"/wp-content/plugins/google-analytics-for-wordpress/" shodan-query: 'vuln:CVE-2014-9174' - tags: cve,wordpress,wp-plugin,google-analytics-for-wordpress,low + tags: cve,wordpress,wp-plugin,google-analytics-for-wordpress,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9176-be25df600efc2e679e203dcc1fd3ddd8.yaml b/nuclei-templates/2014/CVE-2014-9176-be25df600efc2e679e203dcc1fd3ddd8.yaml index d33dc47214..033397e6a8 100644 --- a/nuclei-templates/2014/CVE-2014-9176-be25df600efc2e679e203dcc1fd3ddd8.yaml +++ b/nuclei-templates/2014/CVE-2014-9176-be25df600efc2e679e203dcc1fd3ddd8.yaml @@ -4,7 +4,7 @@ info: name: > InstaSqueeze Sexy Squeeze Pages (All Known Versions) - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The InstaSqueeze Sexy Squeeze Pages plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'id' parameter to lp/index.php in all known versions due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/instasqueeze/" google-query: inurl:"/wp-content/plugins/instasqueeze/" shodan-query: 'vuln:CVE-2014-9176' - tags: cve,wordpress,wp-plugin,instasqueeze,medium + tags: cve,wordpress,wp-plugin,instasqueeze,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9179-2008dfadd96c77e37701fc89701d0b2f.yaml b/nuclei-templates/2014/CVE-2014-9179-2008dfadd96c77e37701fc89701d0b2f.yaml index bc71a65ed1..ddfd05644c 100644 --- a/nuclei-templates/2014/CVE-2014-9179-2008dfadd96c77e37701fc89701d0b2f.yaml +++ b/nuclei-templates/2014/CVE-2014-9179-2008dfadd96c77e37701fc89701d0b2f.yaml @@ -4,7 +4,7 @@ info: name: > SupportEzzy Ticket System Plugin <= 1.2.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the SupportEzzy Ticket System plugin 1.2.5 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the "URL (optional)" field in a new ticket. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/supportezzy/" google-query: inurl:"/wp-content/plugins/supportezzy/" shodan-query: 'vuln:CVE-2014-9179' - tags: cve,wordpress,wp-plugin,supportezzy,medium + tags: cve,wordpress,wp-plugin,supportezzy,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9260-07b6f9539cc79b55c833c05dca993fdb.yaml b/nuclei-templates/2014/CVE-2014-9260-07b6f9539cc79b55c833c05dca993fdb.yaml index 54a47a4b5c..765719be59 100644 --- a/nuclei-templates/2014/CVE-2014-9260-07b6f9539cc79b55c833c05dca993fdb.yaml +++ b/nuclei-templates/2014/CVE-2014-9260-07b6f9539cc79b55c833c05dca993fdb.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Download Manager <= 2.7.2 - Authenticated Arbitrary Options Update author: topscoder - severity: high + severity: low description: > The basic_settings function in the download manager plugin for WordPress before 2.7.3 allows remote authenticated users to update every WordPress option. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/download-manager/" google-query: inurl:"/wp-content/plugins/download-manager/" shodan-query: 'vuln:CVE-2014-9260' - tags: cve,wordpress,wp-plugin,download-manager,high + tags: cve,wordpress,wp-plugin,download-manager,low http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9305-73c7b664803cc72f6ed74c19b2560471.yaml b/nuclei-templates/2014/CVE-2014-9305-73c7b664803cc72f6ed74c19b2560471.yaml index 274bea14af..3ad74d1c04 100644 --- a/nuclei-templates/2014/CVE-2014-9305-73c7b664803cc72f6ed74c19b2560471.yaml +++ b/nuclei-templates/2014/CVE-2014-9305-73c7b664803cc72f6ed74c19b2560471.yaml @@ -4,7 +4,7 @@ info: name: > Cart66 Lite :: WordPress Ecommerce < 1.5.2 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in the shortcodeProductsTable function in models/Cart66Ajax.php in the Cart66 Lite plugin before 1.5.2 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the id parameter in a shortcode_products_table action to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cart66-lite/" google-query: inurl:"/wp-content/plugins/cart66-lite/" shodan-query: 'vuln:CVE-2014-9305' - tags: cve,wordpress,wp-plugin,cart66-lite,high + tags: cve,wordpress,wp-plugin,cart66-lite,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9308-039f1cb39ecb5839b4ea52ff55c41eac.yaml b/nuclei-templates/2014/CVE-2014-9308-039f1cb39ecb5839b4ea52ff55c41eac.yaml index 5b0e29e1d3..f0a5c8e577 100644 --- a/nuclei-templates/2014/CVE-2014-9308-039f1cb39ecb5839b4ea52ff55c41eac.yaml +++ b/nuclei-templates/2014/CVE-2014-9308-039f1cb39ecb5839b4ea52ff55c41eac.yaml @@ -4,7 +4,7 @@ info: name: > Shopping Cart & eCommerce Store < 3.0.16 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > Unrestricted file upload vulnerability in inc/amfphp/administration/banneruploaderscript.php in the WP EasyCart (aka WordPress Shopping Cart) plugin before 3.0.16 allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in products/banners/. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-easycart/" google-query: inurl:"/wp-content/plugins/wp-easycart/" shodan-query: 'vuln:CVE-2014-9308' - tags: cve,wordpress,wp-plugin,wp-easycart,high + tags: cve,wordpress,wp-plugin,wp-easycart,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9309-961c6f8ac9568871bace8745083a3696.yaml b/nuclei-templates/2014/CVE-2014-9309-961c6f8ac9568871bace8745083a3696.yaml index 40b24e4501..0485901251 100644 --- a/nuclei-templates/2014/CVE-2014-9309-961c6f8ac9568871bace8745083a3696.yaml +++ b/nuclei-templates/2014/CVE-2014-9309-961c6f8ac9568871bace8745083a3696.yaml @@ -4,7 +4,7 @@ info: name: > Formidable Form Builder <= 1.07.11 - SQL Injection author: topscoder - severity: high + severity: critical description: > The Formidable Form Builder plugin for WordPress is vulnerable to blind SQL Injection via the ‘orderby’ parameter in versions up to, and including, 1.07.11 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/formidable/" google-query: inurl:"/wp-content/plugins/formidable/" shodan-query: 'vuln:CVE-2014-9309' - tags: cve,wordpress,wp-plugin,formidable,high + tags: cve,wordpress,wp-plugin,formidable,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9311-d30830ee183428306dfe29b862928edf.yaml b/nuclei-templates/2014/CVE-2014-9311-d30830ee183428306dfe29b862928edf.yaml index 5b3933bb46..840b4c9441 100644 --- a/nuclei-templates/2014/CVE-2014-9311-d30830ee183428306dfe29b862928edf.yaml +++ b/nuclei-templates/2014/CVE-2014-9311-d30830ee183428306dfe29b862928edf.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Social Sharing, Related Posts & Analytics – Shareaholic < 7.6.1.0 - Authenticated (Subscriber+) Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Cross-site scripting (XSS) vulnerability in admin.php in the Shareaholic plugin before 7.6.1.0 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the location[id] parameter in a shareaholic_add_location action to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/shareaholic/" google-query: inurl:"/wp-content/plugins/shareaholic/" shodan-query: 'vuln:CVE-2014-9311' - tags: cve,wordpress,wp-plugin,shareaholic,medium + tags: cve,wordpress,wp-plugin,shareaholic,low http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9336-d22a628e60dd0e0e47e495ea9eb75413.yaml b/nuclei-templates/2014/CVE-2014-9336-d22a628e60dd0e0e47e495ea9eb75413.yaml index 37f4a74aec..fb81af2753 100644 --- a/nuclei-templates/2014/CVE-2014-9336-d22a628e60dd0e0e47e495ea9eb75413.yaml +++ b/nuclei-templates/2014/CVE-2014-9336-d22a628e60dd0e0e47e495ea9eb75413.yaml @@ -4,7 +4,7 @@ info: name: > iTwitter <= 0.04 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the iTwitter plugin 0.04 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) itex_t_twitter_username or (2) itex_t_twitter_userpass parameter in the iTwitter.php page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/itwitter/" google-query: inurl:"/wp-content/plugins/itwitter/" shodan-query: 'vuln:CVE-2014-9336' - tags: cve,wordpress,wp-plugin,itwitter,medium + tags: cve,wordpress,wp-plugin,itwitter,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9337-a8ffd5b000a53e3a5bfd7f4581d6cb26.yaml b/nuclei-templates/2014/CVE-2014-9337-a8ffd5b000a53e3a5bfd7f4581d6cb26.yaml index f4535330a4..3125502ed8 100644 --- a/nuclei-templates/2014/CVE-2014-9337-a8ffd5b000a53e3a5bfd7f4581d6cb26.yaml +++ b/nuclei-templates/2014/CVE-2014-9337-a8ffd5b000a53e3a5bfd7f4581d6cb26.yaml @@ -4,7 +4,7 @@ info: name: > Mikiurl Wordpress Eklentisi <= 2.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the Mikiurl Wordpress Eklentisi plugin 2.0 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) twitter_kullanici or (2) twitter_sifre parameter in a kaydet action in the mikiurl.php page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mikiurl-wordpress-eklentisi/" google-query: inurl:"/wp-content/plugins/mikiurl-wordpress-eklentisi/" shodan-query: 'vuln:CVE-2014-9337' - tags: cve,wordpress,wp-plugin,mikiurl-wordpress-eklentisi,medium + tags: cve,wordpress,wp-plugin,mikiurl-wordpress-eklentisi,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9338-8b7ce3f62fb6e151f58953706865b9ed.yaml b/nuclei-templates/2014/CVE-2014-9338-8b7ce3f62fb6e151f58953706865b9ed.yaml index e04a734736..c0ead9658c 100644 --- a/nuclei-templates/2014/CVE-2014-9338-8b7ce3f62fb6e151f58953706865b9ed.yaml +++ b/nuclei-templates/2014/CVE-2014-9338-8b7ce3f62fb6e151f58953706865b9ed.yaml @@ -4,7 +4,7 @@ info: name: > O2tweet <= 0.0.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the O2Tweet plugin 0.0.4 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) o2t_username or (2) o2t_tags parameter to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/o2tweet/" google-query: inurl:"/wp-content/plugins/o2tweet/" shodan-query: 'vuln:CVE-2014-9338' - tags: cve,wordpress,wp-plugin,o2tweet,high + tags: cve,wordpress,wp-plugin,o2tweet,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9339-124b0c02e423c613251c0019e72c2c54.yaml b/nuclei-templates/2014/CVE-2014-9339-124b0c02e423c613251c0019e72c2c54.yaml index 60c4407bbf..0ca368be2b 100644 --- a/nuclei-templates/2014/CVE-2014-9339-124b0c02e423c613251c0019e72c2c54.yaml +++ b/nuclei-templates/2014/CVE-2014-9339-124b0c02e423c613251c0019e72c2c54.yaml @@ -4,7 +4,7 @@ info: name: > Spnbabble <= 1.4.1 - Multiple Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the SPNbabble plugin 1.4.1 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) username or (2) password parameter in the spnbabble.php page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/spnbabble/" google-query: inurl:"/wp-content/plugins/spnbabble/" shodan-query: 'vuln:CVE-2014-9339' - tags: cve,wordpress,wp-plugin,spnbabble,high + tags: cve,wordpress,wp-plugin,spnbabble,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9340-aa2e0c1ddafa9b3b45d0cc288ae14d9b.yaml b/nuclei-templates/2014/CVE-2014-9340-aa2e0c1ddafa9b3b45d0cc288ae14d9b.yaml index 6281fd9be8..bb9a84a919 100644 --- a/nuclei-templates/2014/CVE-2014-9340-aa2e0c1ddafa9b3b45d0cc288ae14d9b.yaml +++ b/nuclei-templates/2014/CVE-2014-9340-aa2e0c1ddafa9b3b45d0cc288ae14d9b.yaml @@ -4,7 +4,7 @@ info: name: > wpCommentTwit Plugin <= 0.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the wpCommentTwit plugin 0.5 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) username or (2) password parameter in the wpCommentTwit.php page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpcommenttwit/" google-query: inurl:"/wp-content/plugins/wpcommenttwit/" shodan-query: 'vuln:CVE-2014-9340' - tags: cve,wordpress,wp-plugin,wpcommenttwit,medium + tags: cve,wordpress,wp-plugin,wpcommenttwit,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9368-29127228d14d384699d6b5442d961328.yaml b/nuclei-templates/2014/CVE-2014-9368-29127228d14d384699d6b5442d961328.yaml index 7c676dc44b..4e837985de 100644 --- a/nuclei-templates/2014/CVE-2014-9368-29127228d14d384699d6b5442d961328.yaml +++ b/nuclei-templates/2014/CVE-2014-9368-29127228d14d384699d6b5442d961328.yaml @@ -4,7 +4,7 @@ info: name: > twitterDash <= 2.1 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > The twitterDash plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.1. This is due to missing nonce validation on the twitterDash.php page. This makes it possible for unauthenticated attackers to inject malicious web scripts via the 'username_twitterDash' parameter through a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/twitterdash/" google-query: inurl:"/wp-content/plugins/twitterdash/" shodan-query: 'vuln:CVE-2014-9368' - tags: cve,wordpress,wp-plugin,twitterdash,high + tags: cve,wordpress,wp-plugin,twitterdash,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9391-216bc7429720f3a1737645ac0bc074a0.yaml b/nuclei-templates/2014/CVE-2014-9391-216bc7429720f3a1737645ac0bc074a0.yaml index 78f1e54900..0d3e8b0225 100644 --- a/nuclei-templates/2014/CVE-2014-9391-216bc7429720f3a1737645ac0bc074a0.yaml +++ b/nuclei-templates/2014/CVE-2014-9391-216bc7429720f3a1737645ac0bc074a0.yaml @@ -4,7 +4,7 @@ info: name: > gSlideShow <= 0.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The gSlideShow plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 0.1. This is due to missing nonce validation in the gslideshow.php file. This makes it possible for unauthenticated attackers to inject arbitrary web scripts via the 'transistion_time', 'rss', and 'display_time' parameters through a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gslideshow/" google-query: inurl:"/wp-content/plugins/gslideshow/" shodan-query: 'vuln:CVE-2014-9391' - tags: cve,wordpress,wp-plugin,gslideshow,high + tags: cve,wordpress,wp-plugin,gslideshow,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9393-b53860895277e266b1fcb14159c31da6.yaml b/nuclei-templates/2014/CVE-2014-9393-b53860895277e266b1fcb14159c31da6.yaml index 01dbdae56b..75f88ce99a 100644 --- a/nuclei-templates/2014/CVE-2014-9393-b53860895277e266b1fcb14159c31da6.yaml +++ b/nuclei-templates/2014/CVE-2014-9393-b53860895277e266b1fcb14159c31da6.yaml @@ -4,7 +4,7 @@ info: name: > Post to Twitter <= 0.7 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the Post to Twitter plugin 0.7 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) idptt_twitter_username or (2) idptt_tweet_prefix parameter to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/post-to-twitter/" google-query: inurl:"/wp-content/plugins/post-to-twitter/" shodan-query: 'vuln:CVE-2014-9393' - tags: cve,wordpress,wp-plugin,post-to-twitter,high + tags: cve,wordpress,wp-plugin,post-to-twitter,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9394-fab925188af5751f6804af30f809b504.yaml b/nuclei-templates/2014/CVE-2014-9394-fab925188af5751f6804af30f809b504.yaml index 0e5a1976b8..f43d2cb69c 100644 --- a/nuclei-templates/2014/CVE-2014-9394-fab925188af5751f6804af30f809b504.yaml +++ b/nuclei-templates/2014/CVE-2014-9394-fab925188af5751f6804af30f809b504.yaml @@ -4,7 +4,7 @@ info: name: > PWGRandom <= 1.11 - Cross-Site Request Forgery to Stored Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the PWGRandom plugin 1.11 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) pwgrandom_title or (2) pwgrandom_category parameter in the pwgrandom page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pwgrandom/" google-query: inurl:"/wp-content/plugins/pwgrandom/" shodan-query: 'vuln:CVE-2014-9394' - tags: cve,wordpress,wp-plugin,pwgrandom,high + tags: cve,wordpress,wp-plugin,pwgrandom,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9395-9f4b30648930a231b8f2e1e9c1a6b6c8.yaml b/nuclei-templates/2014/CVE-2014-9395-9f4b30648930a231b8f2e1e9c1a6b6c8.yaml index f31e1d6b63..dd73aa250b 100644 --- a/nuclei-templates/2014/CVE-2014-9395-9f4b30648930a231b8f2e1e9c1a6b6c8.yaml +++ b/nuclei-templates/2014/CVE-2014-9395-9f4b30648930a231b8f2e1e9c1a6b6c8.yaml @@ -4,7 +4,7 @@ info: name: > Simplelife Plugin <= 1.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the Simplelife plugin 1.2 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) simplehoverback, (2) simplehovertext, (3) flickrback, or (4) simple_flimit parameter in the simplelife.php page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/simplelife/" google-query: inurl:"/wp-content/plugins/simplelife/" shodan-query: 'vuln:CVE-2014-9395' - tags: cve,wordpress,wp-plugin,simplelife,medium + tags: cve,wordpress,wp-plugin,simplelife,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9397-f1ba708b36938f8403e7e3c932465c6c.yaml b/nuclei-templates/2014/CVE-2014-9397-f1ba708b36938f8403e7e3c932465c6c.yaml index 5687a44274..e357b78b53 100644 --- a/nuclei-templates/2014/CVE-2014-9397-f1ba708b36938f8403e7e3c932465c6c.yaml +++ b/nuclei-templates/2014/CVE-2014-9397-f1ba708b36938f8403e7e3c932465c6c.yaml @@ -4,7 +4,7 @@ info: name: > Twimp WP <= 0.1 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the twimp-wp plugin for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the message_format parameter in the twimp-wp.php page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/twimp-wp/" google-query: inurl:"/wp-content/plugins/twimp-wp/" shodan-query: 'vuln:CVE-2014-9397' - tags: cve,wordpress,wp-plugin,twimp-wp,high + tags: cve,wordpress,wp-plugin,twimp-wp,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9399-181c4a45776e23b2e4688d3d65b94f78.yaml b/nuclei-templates/2014/CVE-2014-9399-181c4a45776e23b2e4688d3d65b94f78.yaml index 0d9480423e..ff819d1a3c 100644 --- a/nuclei-templates/2014/CVE-2014-9399-181c4a45776e23b2e4688d3d65b94f78.yaml +++ b/nuclei-templates/2014/CVE-2014-9399-181c4a45776e23b2e4688d3d65b94f78.yaml @@ -4,7 +4,7 @@ info: name: > TweetScribe <= 1.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the TweetScribe plugin 1.1 and earlier for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the tweetscribe_username parameter in a save action in the tweetscribe.php page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/tweetscribe/" google-query: inurl:"/wp-content/plugins/tweetscribe/" shodan-query: 'vuln:CVE-2014-9399' - tags: cve,wordpress,wp-plugin,tweetscribe,high + tags: cve,wordpress,wp-plugin,tweetscribe,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9400-b96d233c9f831b3a15126c8efb4195dc.yaml b/nuclei-templates/2014/CVE-2014-9400-b96d233c9f831b3a15126c8efb4195dc.yaml index 02b352568a..fbb5e5aa6d 100644 --- a/nuclei-templates/2014/CVE-2014-9400-b96d233c9f831b3a15126c8efb4195dc.yaml +++ b/nuclei-templates/2014/CVE-2014-9400-b96d233c9f831b3a15126c8efb4195dc.yaml @@ -4,7 +4,7 @@ info: name: > WP Unique Article Header Image <= 1.0 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the Wp Unique Article Header Image plugin 1.0 and earlier for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) gt_default_header or (2) gt_homepage_header parameter in the wp-unique-header.php page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-unique-article-header-image/" google-query: inurl:"/wp-content/plugins/wp-unique-article-header-image/" shodan-query: 'vuln:CVE-2014-9400' - tags: cve,wordpress,wp-plugin,wp-unique-article-header-image,high + tags: cve,wordpress,wp-plugin,wp-unique-article-header-image,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9401-fe81b0cd67440d8b6f9d1a6ebbe2565c.yaml b/nuclei-templates/2014/CVE-2014-9401-fe81b0cd67440d8b6f9d1a6ebbe2565c.yaml index f38c4249e4..08bfe9de82 100644 --- a/nuclei-templates/2014/CVE-2014-9401-fe81b0cd67440d8b6f9d1a6ebbe2565c.yaml +++ b/nuclei-templates/2014/CVE-2014-9401-fe81b0cd67440d8b6f9d1a6ebbe2565c.yaml @@ -4,7 +4,7 @@ info: name: > WP Limit Posts Automatically <= 0.7 - Cross-Site Request Forgery leading to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the WP Limit Posts Automatically plugin 0.7 and earlier for WordPress allows remote attackers to in the wp-limit-posts-automatically.php page to wp-admin/options-general.php. The WP Limit Posts Automatically plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 0.7. This makes it possible for unauthenticated attackers to hijack the authentication of administrators for requests that conduct cross-site scripting attacks via the lpa_post_letters parameter. This is performed via forged request granted they can trick a site administrator into performing an action such as clicking on a link. @@ -18,7 +18,7 @@ info: fofa-query: "wp-content/plugins/wp-limit-posts-automatically/" google-query: inurl:"/wp-content/plugins/wp-limit-posts-automatically/" shodan-query: 'vuln:CVE-2014-9401' - tags: cve,wordpress,wp-plugin,wp-limit-posts-automatically,high + tags: cve,wordpress,wp-plugin,wp-limit-posts-automatically,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9413-288abda2cfd9da64eaad068ba5d6f96e.yaml b/nuclei-templates/2014/CVE-2014-9413-288abda2cfd9da64eaad068ba5d6f96e.yaml index 24ef12d13f..2e81a0999f 100644 --- a/nuclei-templates/2014/CVE-2014-9413-288abda2cfd9da64eaad068ba5d6f96e.yaml +++ b/nuclei-templates/2014/CVE-2014-9413-288abda2cfd9da64eaad068ba5d6f96e.yaml @@ -4,7 +4,7 @@ info: name: > IP Ban <= 1.2.3 - Cross-Site Request Forgery to Stored Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the IP Ban (simple-ip-ban) plugin 1.2.3 for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) ip_list, (2) user_agent_list, or (3) redirect_url parameter in the simple-ip-ban page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/simple-ip-ban/" google-query: inurl:"/wp-content/plugins/simple-ip-ban/" shodan-query: 'vuln:CVE-2014-9413' - tags: cve,wordpress,wp-plugin,simple-ip-ban,high + tags: cve,wordpress,wp-plugin,simple-ip-ban,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9437-40737c0a7a095d43140be7cd03a62330.yaml b/nuclei-templates/2014/CVE-2014-9437-40737c0a7a095d43140be7cd03a62330.yaml index 2316283499..bfe03d384b 100644 --- a/nuclei-templates/2014/CVE-2014-9437-40737c0a7a095d43140be7cd03a62330.yaml +++ b/nuclei-templates/2014/CVE-2014-9437-40737c0a7a095d43140be7cd03a62330.yaml @@ -4,7 +4,7 @@ info: name: > Sliding Social Icons <= 1.61 - Cross-Site Request Forgery and Stored Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the Sliding Social Icons plugin 1.61 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change plugin settings via unspecified vectors or (2) conduct cross-site scripting (XSS) attacks via the sc_social_slider_margin parameter in a wpbs_save_settings action in the wpbs_panel page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sliding-social-icons/" google-query: inurl:"/wp-content/plugins/sliding-social-icons/" shodan-query: 'vuln:CVE-2014-9437' - tags: cve,wordpress,wp-plugin,sliding-social-icons,high + tags: cve,wordpress,wp-plugin,sliding-social-icons,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9441-ce24f7f3b0bffd6ade8af3419aeed5c0.yaml b/nuclei-templates/2014/CVE-2014-9441-ce24f7f3b0bffd6ade8af3419aeed5c0.yaml index 1bae391e0e..0d344ed1d7 100644 --- a/nuclei-templates/2014/CVE-2014-9441-ce24f7f3b0bffd6ade8af3419aeed5c0.yaml +++ b/nuclei-templates/2014/CVE-2014-9441-ce24f7f3b0bffd6ade8af3419aeed5c0.yaml @@ -4,7 +4,7 @@ info: name: > Lightbox Photo Gallery <= 1.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the Lightbox Photo Gallery plugin 1.0 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change plugin settings via unspecified vectors or conduct cross-site scripting (XSS) attacks via the (2) ll__opt[image2_url] or (3) ll__opt[image3_url] parameter in a ll_save_settings action to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/lightbox-photo-gallery/" google-query: inurl:"/wp-content/plugins/lightbox-photo-gallery/" shodan-query: 'vuln:CVE-2014-9441' - tags: cve,wordpress,wp-plugin,lightbox-photo-gallery,high + tags: cve,wordpress,wp-plugin,lightbox-photo-gallery,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9442-412eb3ff2c6b3450ae105bf1638dee64.yaml b/nuclei-templates/2014/CVE-2014-9442-412eb3ff2c6b3450ae105bf1638dee64.yaml index 627bce047a..6ee1fb2d01 100644 --- a/nuclei-templates/2014/CVE-2014-9442-412eb3ff2c6b3450ae105bf1638dee64.yaml +++ b/nuclei-templates/2014/CVE-2014-9442-412eb3ff2c6b3450ae105bf1638dee64.yaml @@ -4,7 +4,7 @@ info: name: > Cart66 Lite :: WordPress Ecommerce <= 1.5.3 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in models/Cart66Ajax.php in the Cart66 Lite plugin before 1.5.4 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the q parameter in a promotionProductSearch action to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cart66-lite/" google-query: inurl:"/wp-content/plugins/cart66-lite/" shodan-query: 'vuln:CVE-2014-9442' - tags: cve,wordpress,wp-plugin,cart66-lite,high + tags: cve,wordpress,wp-plugin,cart66-lite,critical http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9443-984a23521e50b74e0baafc6841353e19.yaml b/nuclei-templates/2014/CVE-2014-9443-984a23521e50b74e0baafc6841353e19.yaml index 908e595914..0127ba1271 100644 --- a/nuclei-templates/2014/CVE-2014-9443-984a23521e50b74e0baafc6841353e19.yaml +++ b/nuclei-templates/2014/CVE-2014-9443-984a23521e50b74e0baafc6841353e19.yaml @@ -4,7 +4,7 @@ info: name: > Relevanssi – A Better Search < 3.3.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Relevanssi plugin before 3.3.8 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/relevanssi/" google-query: inurl:"/wp-content/plugins/relevanssi/" shodan-query: 'vuln:CVE-2014-9443' - tags: cve,wordpress,wp-plugin,relevanssi,medium + tags: cve,wordpress,wp-plugin,relevanssi,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9444-5804085185dabeb708155bde523d6d27.yaml b/nuclei-templates/2014/CVE-2014-9444-5804085185dabeb708155bde523d6d27.yaml index 70943bde3e..74b0936c8b 100644 --- a/nuclei-templates/2014/CVE-2014-9444-5804085185dabeb708155bde523d6d27.yaml +++ b/nuclei-templates/2014/CVE-2014-9444-5804085185dabeb708155bde523d6d27.yaml @@ -4,7 +4,7 @@ info: name: > Frontend Uploader < 0.9.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Frontend Uploader plugin before 0.9.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the errors[fu-disallowed-mime-type][0][name] parameter to the default URI. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/frontend-uploader/" google-query: inurl:"/wp-content/plugins/frontend-uploader/" shodan-query: 'vuln:CVE-2014-9444' - tags: cve,wordpress,wp-plugin,frontend-uploader,medium + tags: cve,wordpress,wp-plugin,frontend-uploader,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9454-e689aa17f6bf2fdc2c6603a9014c4c60.yaml b/nuclei-templates/2014/CVE-2014-9454-e689aa17f6bf2fdc2c6603a9014c4c60.yaml index 8e1fe82de5..43da7fe83e 100644 --- a/nuclei-templates/2014/CVE-2014-9454-e689aa17f6bf2fdc2c6603a9014c4c60.yaml +++ b/nuclei-templates/2014/CVE-2014-9454-e689aa17f6bf2fdc2c6603a9014c4c60.yaml @@ -4,7 +4,7 @@ info: name: > Simple Sticky Footer <= 1.3.2 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the Simple Sticky Footer plugin before 1.3.3 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change plugin settings via unspecified vectors or conduct cross-site scripting (XSS) attacks via the (2) simple_sf_width or (3) simple_sf_style parameter in the simple-simple-sticky-footer page to wp-admin/themes.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/simple-sticky-footer/" google-query: inurl:"/wp-content/plugins/simple-sticky-footer/" shodan-query: 'vuln:CVE-2014-9454' - tags: cve,wordpress,wp-plugin,simple-sticky-footer,high + tags: cve,wordpress,wp-plugin,simple-sticky-footer,medium http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9523-15ed4766d27c484c5517c27d81b8d51f.yaml b/nuclei-templates/2014/CVE-2014-9523-15ed4766d27c484c5517c27d81b8d51f.yaml index 5f22cbd1a3..9166a7d814 100644 --- a/nuclei-templates/2014/CVE-2014-9523-15ed4766d27c484c5517c27d81b8d51f.yaml +++ b/nuclei-templates/2014/CVE-2014-9523-15ed4766d27c484c5517c27d81b8d51f.yaml @@ -4,7 +4,7 @@ info: name: > Our Team Showcase < 1.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the Our Team Showcase (our-team-enhanced) plugin before 1.3 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change plugin settings via unspecified vectors or (2) conduct cross-site scripting (XSS) attacks via the sc_our_team_member_count parameter in the sc_team_settings page to wp-admin/edit.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/our-team-enhanced/" google-query: inurl:"/wp-content/plugins/our-team-enhanced/" shodan-query: 'vuln:CVE-2014-9523' - tags: cve,wordpress,wp-plugin,our-team-enhanced,medium + tags: cve,wordpress,wp-plugin,our-team-enhanced,high http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9570-2c08e7ca2855464050481f48ae1d114f.yaml b/nuclei-templates/2014/CVE-2014-9570-2c08e7ca2855464050481f48ae1d114f.yaml index da1e30cac9..5e91dd671f 100644 --- a/nuclei-templates/2014/CVE-2014-9570-2c08e7ca2855464050481f48ae1d114f.yaml +++ b/nuclei-templates/2014/CVE-2014-9570-2c08e7ca2855464050481f48ae1d114f.yaml @@ -4,7 +4,7 @@ info: name: > Simple Security <= 1.1.5 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Simple Security plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'datefilter' parameter found on the access_log page to wp-admin/users.php and the 'simple_security_ip_blacklist[]' parameter found in the add_blacklist_ip action on the ip_blacklist page to wp-admin/users.php in versions up to, and including, 1.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/simple-security/" google-query: inurl:"/wp-content/plugins/simple-security/" shodan-query: 'vuln:CVE-2014-9570' - tags: cve,wordpress,wp-plugin,simple-security,medium + tags: cve,wordpress,wp-plugin,simple-security,low http: - method: GET diff --git a/nuclei-templates/2014/CVE-2014-9735-21b56747ef932af6a293d705a4f1c993.yaml b/nuclei-templates/2014/CVE-2014-9735-21b56747ef932af6a293d705a4f1c993.yaml index b7134c5199..11fb5eef53 100644 --- a/nuclei-templates/2014/CVE-2014-9735-21b56747ef932af6a293d705a4f1c993.yaml +++ b/nuclei-templates/2014/CVE-2014-9735-21b56747ef932af6a293d705a4f1c993.yaml @@ -4,7 +4,7 @@ info: name: > Slider Revolution < 3.0.96 & Showbiz Pro < 1.7.1 - Missing Authorization to Arbitrary File Upload author: topscoder - severity: critical + severity: high description: > The ThemePunch Slider Revolution (revslider) plugin before 3.0.96 for WordPress and Showbiz Pro plugin 1.7.1 and earlier for Wordpress does not properly restrict access to administrator AJAX functionality, which allows remote attackers to (1) upload and execute arbitrary files via an update_plugin action; (2) delete arbitrary sliders via a delete_slider action; and (3) create, (4) update, (5) import, or (6) export arbitrary sliders via unspecified vectors. Several WordPress themes utilize revslider which makes them vulnerable as well. reference: @@ -14,17 +14,17 @@ info: cvss-score: 9.8 cve-id: CVE-2014-9735 metadata: - fofa-query: "wp-content/plugins/revslider/" - google-query: inurl:"/wp-content/plugins/revslider/" + fofa-query: "wp-content/plugins/showbizpro/" + google-query: inurl:"/wp-content/plugins/showbizpro/" shodan-query: 'vuln:CVE-2014-9735' - tags: cve,wordpress,wp-plugin,revslider,critical + tags: cve,wordpress,wp-plugin,showbizpro,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/revslider/readme.txt" + - "{{BaseURL}}/wp-content/plugins/showbizpro/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "revslider" + - "showbizpro" part: body - type: dsl dsl: - - compare_versions(version, '< 3.0.96') \ No newline at end of file + - compare_versions(version, '< 1.7.1') \ No newline at end of file diff --git a/nuclei-templates/2015/CVE-2015-0895-44ac07d5baafaaec1fde2cca5e220010.yaml b/nuclei-templates/2015/CVE-2015-0895-44ac07d5baafaaec1fde2cca5e220010.yaml index 878dbb1d72..5cae730d98 100644 --- a/nuclei-templates/2015/CVE-2015-0895-44ac07d5baafaaec1fde2cca5e220010.yaml +++ b/nuclei-templates/2015/CVE-2015-0895-44ac07d5baafaaec1fde2cca5e220010.yaml @@ -4,7 +4,7 @@ info: name: > All In One WP Security & Firewall <= 3.8.9 - Cross-Site Request Forgery author: topscoder - severity: low + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the All In One WP Security & Firewall plugin before 3.9.0 for WordPress allows remote attackers to hijack the authentication of administrators for requests that delete logs of 404 (aka Not Found) HTTP status codes. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" shodan-query: 'vuln:CVE-2015-0895' - tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,low + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-0920-434911a5447ed5d05a669b67b9efd816.yaml b/nuclei-templates/2015/CVE-2015-0920-434911a5447ed5d05a669b67b9efd816.yaml index 652707d30f..4acfad3931 100644 --- a/nuclei-templates/2015/CVE-2015-0920-434911a5447ed5d05a669b67b9efd816.yaml +++ b/nuclei-templates/2015/CVE-2015-0920-434911a5447ed5d05a669b67b9efd816.yaml @@ -4,7 +4,7 @@ info: name: > Banner Effect Header <= 1.2.7 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the Banner Effect Header plugin 1.2.6 for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the banner_effect_email parameter in the BannerEffectOptions page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/banner-effect-header/" google-query: inurl:"/wp-content/plugins/banner-effect-header/" shodan-query: 'vuln:CVE-2015-0920' - tags: cve,wordpress,wp-plugin,banner-effect-header,high + tags: cve,wordpress,wp-plugin,banner-effect-header,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-1000004-16949f85deca6c76da36cc5d46cabd06.yaml b/nuclei-templates/2015/CVE-2015-1000004-16949f85deca6c76da36cc5d46cabd06.yaml index 6cc3c0e27e..fa2b4cc47e 100644 --- a/nuclei-templates/2015/CVE-2015-1000004-16949f85deca6c76da36cc5d46cabd06.yaml +++ b/nuclei-templates/2015/CVE-2015-1000004-16949f85deca6c76da36cc5d46cabd06.yaml @@ -4,7 +4,7 @@ info: name: > filedownload plugin <= 1.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The filedownload plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 1.4 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/filedownload/" google-query: inurl:"/wp-content/plugins/filedownload/" shodan-query: 'vuln:CVE-2015-1000004' - tags: cve,wordpress,wp-plugin,filedownload,medium + tags: cve,wordpress,wp-plugin,filedownload,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-10090-6ef6064badb5d7b87c27535925053eda.yaml b/nuclei-templates/2015/CVE-2015-10090-6ef6064badb5d7b87c27535925053eda.yaml index 6c0d7c5bca..402d0c8ff0 100644 --- a/nuclei-templates/2015/CVE-2015-10090-6ef6064badb5d7b87c27535925053eda.yaml +++ b/nuclei-templates/2015/CVE-2015-10090-6ef6064badb5d7b87c27535925053eda.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Landing Pages <= 1.8.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The WordPress Landing Pages plugin for WordPress is vulnerable to Cross-Site Scripting in all versions up to, and including, 1.8.7 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/landing-pages/" google-query: inurl:"/wp-content/plugins/landing-pages/" shodan-query: 'vuln:CVE-2015-10090' - tags: cve,wordpress,wp-plugin,landing-pages,medium + tags: cve,wordpress,wp-plugin,landing-pages,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-10095-cecf0eea6a928571e9c6c0b109812dde.yaml b/nuclei-templates/2015/CVE-2015-10095-cecf0eea6a928571e9c6c0b109812dde.yaml index 5eeaec94e1..381b23cf48 100644 --- a/nuclei-templates/2015/CVE-2015-10095-cecf0eea6a928571e9c6c0b109812dde.yaml +++ b/nuclei-templates/2015/CVE-2015-10095-cecf0eea6a928571e9c6c0b109812dde.yaml @@ -4,7 +4,7 @@ info: name: > woo-popup <= 1.2.2 - Reflecte Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The woo-popup plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in all versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/woo-popup/" google-query: inurl:"/wp-content/plugins/woo-popup/" shodan-query: 'vuln:CVE-2015-10095' - tags: cve,wordpress,wp-plugin,woo-popup,medium + tags: cve,wordpress,wp-plugin,woo-popup,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-10100-57f7b5f0694f05830341c7de29cc9c44.yaml b/nuclei-templates/2015/CVE-2015-10100-57f7b5f0694f05830341c7de29cc9c44.yaml index 23bcf72c99..4801febebe 100644 --- a/nuclei-templates/2015/CVE-2015-10100-57f7b5f0694f05830341c7de29cc9c44.yaml +++ b/nuclei-templates/2015/CVE-2015-10100-57f7b5f0694f05830341c7de29cc9c44.yaml @@ -4,7 +4,7 @@ info: name: > Dynamic Widgets <= 1.5.10 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > The Dynamic Widgets Plugin plugin for WordPress is vulnerable to SQL Injection via several parameters in all versions up to, and including, 1.5.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/UNKNOWN-CVE-2015-10100-1/" google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2015-10100-1/" shodan-query: 'vuln:CVE-2015-10100' - tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2015-10100-1,high + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2015-10100-1,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-10105-6f9e9fe1fa78bdc8c8c67cbc00f8001f.yaml b/nuclei-templates/2015/CVE-2015-10105-6f9e9fe1fa78bdc8c8c67cbc00f8001f.yaml index 815b20fd9a..28094d72df 100644 --- a/nuclei-templates/2015/CVE-2015-10105-6f9e9fe1fa78bdc8c8c67cbc00f8001f.yaml +++ b/nuclei-templates/2015/CVE-2015-10105-6f9e9fe1fa78bdc8c8c67cbc00f8001f.yaml @@ -4,7 +4,7 @@ info: name: > IP Blacklist Cloud <= 3.42 - Authenticated (Admin+) Path Traversal author: topscoder - severity: medium + severity: low description: > The IP Blacklist Cloud plugin for WordPress is vulnerable to Path Traversal in versions up to, and including, 3.42 via the 'filename' parameter. This allows authenticated attackers, with administrative privileges, to read arbitrary files on the server that may contain sensitive information. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ip-blacklist-cloud/" google-query: inurl:"/wp-content/plugins/ip-blacklist-cloud/" shodan-query: 'vuln:CVE-2015-10105' - tags: cve,wordpress,wp-plugin,ip-blacklist-cloud,medium + tags: cve,wordpress,wp-plugin,ip-blacklist-cloud,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-10111-89a35a79088c1cac6da4471e1521db2a.yaml b/nuclei-templates/2015/CVE-2015-10111-89a35a79088c1cac6da4471e1521db2a.yaml index a4064b12f6..31a6382d1c 100644 --- a/nuclei-templates/2015/CVE-2015-10111-89a35a79088c1cac6da4471e1521db2a.yaml +++ b/nuclei-templates/2015/CVE-2015-10111-89a35a79088c1cac6da4471e1521db2a.yaml @@ -4,7 +4,7 @@ info: name: > Watu Quiz <= 2.6.7 - Authenticated (Admin+) SQL Injection author: topscoder - severity: high + severity: low description: > The Watu Quiz plugin for WordPress is vulnerable to SQL Injection via the 'quiz' parameter in versions up to, and including, 2.6.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with administrative privileges to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/watu/" google-query: inurl:"/wp-content/plugins/watu/" shodan-query: 'vuln:CVE-2015-10111' - tags: cve,wordpress,wp-plugin,watu,high + tags: cve,wordpress,wp-plugin,watu,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-10116-2a790c8bfc2f91a748cff8286de5f526.yaml b/nuclei-templates/2015/CVE-2015-10116-2a790c8bfc2f91a748cff8286de5f526.yaml index 99f160ac75..c84386e543 100644 --- a/nuclei-templates/2015/CVE-2015-10116-2a790c8bfc2f91a748cff8286de5f526.yaml +++ b/nuclei-templates/2015/CVE-2015-10116-2a790c8bfc2f91a748cff8286de5f526.yaml @@ -4,7 +4,7 @@ info: name: > Favicon by RealFaviconGenerator <= 1.2.12 - Reflected Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > The Favicon by RealFaviconGenerator plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘json_result_url’ parameter in versions before 1.2.13 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/favicon-by-realfavicongenerator/" google-query: inurl:"/wp-content/plugins/favicon-by-realfavicongenerator/" shodan-query: 'vuln:CVE-2015-10116' - tags: cve,wordpress,wp-plugin,favicon-by-realfavicongenerator,high + tags: cve,wordpress,wp-plugin,favicon-by-realfavicongenerator,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-10124-53a42a688a74a64b49721153f05dafd3.yaml b/nuclei-templates/2015/CVE-2015-10124-53a42a688a74a64b49721153f05dafd3.yaml index 19dd67452a..8f9ed078f4 100644 --- a/nuclei-templates/2015/CVE-2015-10124-53a42a688a74a64b49721153f05dafd3.yaml +++ b/nuclei-templates/2015/CVE-2015-10124-53a42a688a74a64b49721153f05dafd3.yaml @@ -4,7 +4,7 @@ info: name: > Most Popular Posts Widget <= 0.8 - Authenticated (Admin+) SQL Injection author: topscoder - severity: high + severity: low description: > The Most Popular Posts Widget plugin for WordPress is vulnerable to SQL Injection via the 'PostID' variable in versions up to, and including, 0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/most-popular-posts-widget-lite/" google-query: inurl:"/wp-content/plugins/most-popular-posts-widget-lite/" shodan-query: 'vuln:CVE-2015-10124' - tags: cve,wordpress,wp-plugin,most-popular-posts-widget-lite,high + tags: cve,wordpress,wp-plugin,most-popular-posts-widget-lite,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-10128-94b0b54aeb124f4c7a107e54a5615849.yaml b/nuclei-templates/2015/CVE-2015-10128-94b0b54aeb124f4c7a107e54a5615849.yaml index dcdd0b3d4b..8d2384e5fe 100644 --- a/nuclei-templates/2015/CVE-2015-10128-94b0b54aeb124f4c7a107e54a5615849.yaml +++ b/nuclei-templates/2015/CVE-2015-10128-94b0b54aeb124f4c7a107e54a5615849.yaml @@ -4,7 +4,7 @@ info: name: > Royal PrettyPhoto <= 1.2 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Royal PrettyPhoto plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the comment text parameter in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/rt-prettyphoto/" google-query: inurl:"/wp-content/plugins/rt-prettyphoto/" shodan-query: 'vuln:CVE-2015-10128' - tags: cve,wordpress,wp-plugin,rt-prettyphoto,medium + tags: cve,wordpress,wp-plugin,rt-prettyphoto,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-1204-323a2528ecc021abe5c2c6bd363f0d32.yaml b/nuclei-templates/2015/CVE-2015-1204-323a2528ecc021abe5c2c6bd363f0d32.yaml index 01dcd75dfc..238e72b529 100644 --- a/nuclei-templates/2015/CVE-2015-1204-323a2528ecc021abe5c2c6bd363f0d32.yaml +++ b/nuclei-templates/2015/CVE-2015-1204-323a2528ecc021abe5c2c6bd363f0d32.yaml @@ -4,7 +4,7 @@ info: name: > Slimstat Analytics <= 3.9.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Save Filters functionality in the WP Slimstat plugin before 3.9.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the fs[resource] parameter in the wp-slim-view-2 page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-slimstat/" google-query: inurl:"/wp-content/plugins/wp-slimstat/" shodan-query: 'vuln:CVE-2015-1204' - tags: cve,wordpress,wp-plugin,wp-slimstat,medium + tags: cve,wordpress,wp-plugin,wp-slimstat,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-1366-5b2fbefb63fd7f965b09642c4ccecf5d.yaml b/nuclei-templates/2015/CVE-2015-1366-5b2fbefb63fd7f965b09642c4ccecf5d.yaml index e4f662be22..af2667b17b 100644 --- a/nuclei-templates/2015/CVE-2015-1366-5b2fbefb63fd7f965b09642c4ccecf5d.yaml +++ b/nuclei-templates/2015/CVE-2015-1366-5b2fbefb63fd7f965b09642c4ccecf5d.yaml @@ -4,7 +4,7 @@ info: name: > Pixabay Images <= 2.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in pixabay-images.php in the Pixabay Images plugin before 2.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via the image_user parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pixabay-images/" google-query: inurl:"/wp-content/plugins/pixabay-images/" shodan-query: 'vuln:CVE-2015-1366' - tags: cve,wordpress,wp-plugin,pixabay-images,medium + tags: cve,wordpress,wp-plugin,pixabay-images,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-1376-99e3e9aef74467dcee4f17ac700177de.yaml b/nuclei-templates/2015/CVE-2015-1376-99e3e9aef74467dcee4f17ac700177de.yaml index 25e1c372c8..105cc12174 100644 --- a/nuclei-templates/2015/CVE-2015-1376-99e3e9aef74467dcee4f17ac700177de.yaml +++ b/nuclei-templates/2015/CVE-2015-1376-99e3e9aef74467dcee4f17ac700177de.yaml @@ -4,7 +4,7 @@ info: name: > Pixabay Images <= 2.3 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > pixabay-images.php in the Pixabay Images plugin before 2.4 for WordPress does not validate hostnames, which allows remote authenticated users to write to arbitrary files via an upload URL with a host other than pixabay.com. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pixabay-images/" google-query: inurl:"/wp-content/plugins/pixabay-images/" shodan-query: 'vuln:CVE-2015-1376' - tags: cve,wordpress,wp-plugin,pixabay-images,high + tags: cve,wordpress,wp-plugin,pixabay-images,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-1383-887adced0648142cd9b714a8cbded6f3.yaml b/nuclei-templates/2015/CVE-2015-1383-887adced0648142cd9b714a8cbded6f3.yaml index 6238bb7cd1..95a08c12e1 100644 --- a/nuclei-templates/2015/CVE-2015-1383-887adced0648142cd9b714a8cbded6f3.yaml +++ b/nuclei-templates/2015/CVE-2015-1383-887adced0648142cd9b714a8cbded6f3.yaml @@ -4,7 +4,7 @@ info: name: > Geo Mashup < 1.8.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the geo search widget in the Geo Mashup plugin before 1.8.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the search key. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/geo-mashup/" google-query: inurl:"/wp-content/plugins/geo-mashup/" shodan-query: 'vuln:CVE-2015-1383' - tags: cve,wordpress,wp-plugin,geo-mashup,medium + tags: cve,wordpress,wp-plugin,geo-mashup,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-1384-f7325cb69c59d2a2951bb8ec98779e8d.yaml b/nuclei-templates/2015/CVE-2015-1384-f7325cb69c59d2a2951bb8ec98779e8d.yaml index 8e77db8653..1a6c4b66f0 100644 --- a/nuclei-templates/2015/CVE-2015-1384-f7325cb69c59d2a2951bb8ec98779e8d.yaml +++ b/nuclei-templates/2015/CVE-2015-1384-f7325cb69c59d2a2951bb8ec98779e8d.yaml @@ -4,7 +4,7 @@ info: name: > Banner Effect Header < 1.2.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Banner Effect Header plugin before 1.2.8 for WordPress allows remote attackers to inject arbitrary web script or HTML via the banner_effect_divid parameter in the BannerEffectOptions page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/banner-effect-header/" google-query: inurl:"/wp-content/plugins/banner-effect-header/" shodan-query: 'vuln:CVE-2015-1384' - tags: cve,wordpress,wp-plugin,banner-effect-header,medium + tags: cve,wordpress,wp-plugin,banner-effect-header,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-1385-86221a41117bb12070fda480ca17a28c.yaml b/nuclei-templates/2015/CVE-2015-1385-86221a41117bb12070fda480ca17a28c.yaml index 475471f5d7..3a133e2a41 100644 --- a/nuclei-templates/2015/CVE-2015-1385-86221a41117bb12070fda480ca17a28c.yaml +++ b/nuclei-templates/2015/CVE-2015-1385-86221a41117bb12070fda480ca17a28c.yaml @@ -4,7 +4,7 @@ info: name: > PowerPress <= 6.0.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Blubrry PowerPress Podcasting plugin before 6.0.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the cat parameter in a powerpress-editcategoryfeed action in the powerpressadmin_categoryfeeds.php page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/powerpress/" google-query: inurl:"/wp-content/plugins/powerpress/" shodan-query: 'vuln:CVE-2015-1385' - tags: cve,wordpress,wp-plugin,powerpress,medium + tags: cve,wordpress,wp-plugin,powerpress,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-1393-1e81e15f7eef3b25cd39002edd8c241e.yaml b/nuclei-templates/2015/CVE-2015-1393-1e81e15f7eef3b25cd39002edd8c241e.yaml index d9f63c9ae3..4b7bd0034c 100644 --- a/nuclei-templates/2015/CVE-2015-1393-1e81e15f7eef3b25cd39002edd8c241e.yaml +++ b/nuclei-templates/2015/CVE-2015-1393-1e81e15f7eef3b25cd39002edd8c241e.yaml @@ -4,7 +4,7 @@ info: name: > Photo Gallery by 10Web <= 1.2.10 - Authenticated SQL Injection via asc_or_desc Parameter author: topscoder - severity: high + severity: low description: > SQL injection vulnerability in the Photo Gallery plugin before 1.2.11 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the asc_or_desc parameter in a create gallery request in the galleries_bwg page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/photo-gallery/" google-query: inurl:"/wp-content/plugins/photo-gallery/" shodan-query: 'vuln:CVE-2015-1393' - tags: cve,wordpress,wp-plugin,photo-gallery,high + tags: cve,wordpress,wp-plugin,photo-gallery,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-1394-e1df20c1816f9cf921b493870b0123b0.yaml b/nuclei-templates/2015/CVE-2015-1394-e1df20c1816f9cf921b493870b0123b0.yaml index 3b9f5f2f49..b1236114e8 100644 --- a/nuclei-templates/2015/CVE-2015-1394-e1df20c1816f9cf921b493870b0123b0.yaml +++ b/nuclei-templates/2015/CVE-2015-1394-e1df20c1816f9cf921b493870b0123b0.yaml @@ -4,7 +4,7 @@ info: name: > Photo Gallery by 10Web <= 1.2.10 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Multiple cross-site scripting (XSS) vulnerabilities in the Photo Gallery plugin before 1.2.11 for WordPress allow remote authenticated users to inject arbitrary web script or HTML via the (1) sort_by, (2) sort_order, (3) items_view, (4) dir, (5) clipboard_task, (6) clipboard_files, (7) clipboard_src, or (8) clipboard_dest parameters in an addImages action to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/photo-gallery/" google-query: inurl:"/wp-content/plugins/photo-gallery/" shodan-query: 'vuln:CVE-2015-1394' - tags: cve,wordpress,wp-plugin,photo-gallery,medium + tags: cve,wordpress,wp-plugin,photo-gallery,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-1436-7a859a74f0e39d83ee989a269a737923.yaml b/nuclei-templates/2015/CVE-2015-1436-7a859a74f0e39d83ee989a269a737923.yaml index 48543e843d..9b3e1bbbd7 100644 --- a/nuclei-templates/2015/CVE-2015-1436-7a859a74f0e39d83ee989a269a737923.yaml +++ b/nuclei-templates/2015/CVE-2015-1436-7a859a74f0e39d83ee989a269a737923.yaml @@ -4,7 +4,7 @@ info: name: > Easing Slider <= 2.2.0.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easing Slider plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 2.2.0.6 via the edit parameter due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easing-slider/" google-query: inurl:"/wp-content/plugins/easing-slider/" shodan-query: 'vuln:CVE-2015-1436' - tags: cve,wordpress,wp-plugin,easing-slider,medium + tags: cve,wordpress,wp-plugin,easing-slider,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-1494-b8e3a07576df90727675ec278a1f9eb2.yaml b/nuclei-templates/2015/CVE-2015-1494-b8e3a07576df90727675ec278a1f9eb2.yaml index 609506d35e..688b1a0ab0 100644 --- a/nuclei-templates/2015/CVE-2015-1494-b8e3a07576df90727675ec278a1f9eb2.yaml +++ b/nuclei-templates/2015/CVE-2015-1494-b8e3a07576df90727675ec278a1f9eb2.yaml @@ -4,7 +4,7 @@ info: name: > FancyBox for WordPress <= 3.0.2 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The FancyBox for WordPress plugin before 3.0.3 for WordPress does not properly restrict access, which allows remote attackers to conduct cross-site scripting (XSS) attacks via an mfbfw[*] parameter in an update action to wp-admin/admin-post.php, as demonstrated by the mfbfw[padding] parameter and exploited in the wild in February 2015. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/fancybox-for-wordpress/" google-query: inurl:"/wp-content/plugins/fancybox-for-wordpress/" shodan-query: 'vuln:CVE-2015-1494' - tags: cve,wordpress,wp-plugin,fancybox-for-wordpress,medium + tags: cve,wordpress,wp-plugin,fancybox-for-wordpress,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-1580-8319ea5020d449067d1800ef0c846413.yaml b/nuclei-templates/2015/CVE-2015-1580-8319ea5020d449067d1800ef0c846413.yaml index 57538fedf1..012f16943f 100644 --- a/nuclei-templates/2015/CVE-2015-1580-8319ea5020d449067d1800ef0c846413.yaml +++ b/nuclei-templates/2015/CVE-2015-1580-8319ea5020d449067d1800ef0c846413.yaml @@ -4,7 +4,7 @@ info: name: > Redirection Page <= 1.2 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the Redirection Page plugin 1.2 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change plugin settings or conduct cross-site scripting (XSS) attacks via the (2) source or (3) redir parameter in an add action in the redirection-page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/redirection-page/" google-query: inurl:"/wp-content/plugins/redirection-page/" shodan-query: 'vuln:CVE-2015-1580' - tags: cve,wordpress,wp-plugin,redirection-page,high + tags: cve,wordpress,wp-plugin,redirection-page,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-1784-b4ed5bad800bb63784fe65e3822d9b92.yaml b/nuclei-templates/2015/CVE-2015-1784-b4ed5bad800bb63784fe65e3822d9b92.yaml index 5fa96ec79a..492aeecf3a 100644 --- a/nuclei-templates/2015/CVE-2015-1784-b4ed5bad800bb63784fe65e3822d9b92.yaml +++ b/nuclei-templates/2015/CVE-2015-1784-b4ed5bad800bb63784fe65e3822d9b92.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Gallery Plugin – NextGEN Gallery < 2.0.77.3 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > In nextgen-galery wordpress plugin before 2.0.77.3 there are two vulnerabilities which can allow an attacker to gain full access over the web application. The vulnerabilities lie in how the application validates user uploaded files and lack of security measures preventing unwanted HTTP requests. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nextgen-gallery/" google-query: inurl:"/wp-content/plugins/nextgen-gallery/" shodan-query: 'vuln:CVE-2015-1784' - tags: cve,wordpress,wp-plugin,nextgen-gallery,high + tags: cve,wordpress,wp-plugin,nextgen-gallery,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-1785-5eb51111eaa90d94b47d1fce5457ff77.yaml b/nuclei-templates/2015/CVE-2015-1785-5eb51111eaa90d94b47d1fce5457ff77.yaml index 355d6f1afd..9c0eb4addf 100644 --- a/nuclei-templates/2015/CVE-2015-1785-5eb51111eaa90d94b47d1fce5457ff77.yaml +++ b/nuclei-templates/2015/CVE-2015-1785-5eb51111eaa90d94b47d1fce5457ff77.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Gallery Plugin – NextGEN Gallery < 2.0.77.3 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > In nextgen-galery wordpress plugin before 2.0.77.3 there are two vulnerabilities which can allow an attacker to gain full access over the web application. The vulnerabilities lie in how the application validates user uploaded files and lack of security measures preventing unwanted HTTP requests. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nextgen-gallery/" google-query: inurl:"/wp-content/plugins/nextgen-gallery/" shodan-query: 'vuln:CVE-2015-1785' - tags: cve,wordpress,wp-plugin,nextgen-gallery,high + tags: cve,wordpress,wp-plugin,nextgen-gallery,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-1879-0058c9636ab9a993ffe8aa9657a05d60.yaml b/nuclei-templates/2015/CVE-2015-1879-0058c9636ab9a993ffe8aa9657a05d60.yaml index 33f088f6e1..f0100f3b67 100644 --- a/nuclei-templates/2015/CVE-2015-1879-0058c9636ab9a993ffe8aa9657a05d60.yaml +++ b/nuclei-templates/2015/CVE-2015-1879-0058c9636ab9a993ffe8aa9657a05d60.yaml @@ -4,7 +4,7 @@ info: name: > Google Doc Embedder <= 2.5.18 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Google Doc Embedder plugin before 2.5.19 for WordPress allows remote attackers to inject arbitrary web script or HTML via the profile parameter in an edit action in the gde-settings page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/google-document-embedder/" google-query: inurl:"/wp-content/plugins/google-document-embedder/" shodan-query: 'vuln:CVE-2015-1879' - tags: cve,wordpress,wp-plugin,google-document-embedder,medium + tags: cve,wordpress,wp-plugin,google-document-embedder,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-20019-321e86531ce3a7401f2a887940f1ca1d.yaml b/nuclei-templates/2015/CVE-2015-20019-321e86531ce3a7401f2a887940f1ca1d.yaml index 7c286fb35d..041e0aed9e 100644 --- a/nuclei-templates/2015/CVE-2015-20019-321e86531ce3a7401f2a887940f1ca1d.yaml +++ b/nuclei-templates/2015/CVE-2015-20019-321e86531ce3a7401f2a887940f1ca1d.yaml @@ -4,7 +4,7 @@ info: name: > Content text slider on post < 6.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Content text slider on post WordPress plugin before 6.9 does not sanitise and escape the Title and Message/Content settings, which could lead to Cross-Site Scripting issues. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/content-text-slider-on-post/" google-query: inurl:"/wp-content/plugins/content-text-slider-on-post/" shodan-query: 'vuln:CVE-2015-20019' - tags: cve,wordpress,wp-plugin,content-text-slider-on-post,medium + tags: cve,wordpress,wp-plugin,content-text-slider-on-post,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-20105-b1bcff9d2efb787a948b3f8018f345ae.yaml b/nuclei-templates/2015/CVE-2015-20105-b1bcff9d2efb787a948b3f8018f345ae.yaml index 61ea0f6401..6328520d13 100644 --- a/nuclei-templates/2015/CVE-2015-20105-b1bcff9d2efb787a948b3f8018f345ae.yaml +++ b/nuclei-templates/2015/CVE-2015-20105-b1bcff9d2efb787a948b3f8018f345ae.yaml @@ -4,7 +4,7 @@ info: name: > ClickBank Affiliate Ads < 1.31 - Cross-Site Request Forgery to Stored Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > The ClickBank Affiliate Ads WordPress plugin before 1.31 does not have CSRF check when saving its settings, allowing attacker to make logged in admin change them via a CSRF attack. Furthermore, due to the lack of escaping when they are outputting, it could also lead to Stored Cross-Site Scripting issues. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/clickbank-ads-clickbank-widget/" google-query: inurl:"/wp-content/plugins/clickbank-ads-clickbank-widget/" shodan-query: 'vuln:CVE-2015-20105' - tags: cve,wordpress,wp-plugin,clickbank-ads-clickbank-widget,high + tags: cve,wordpress,wp-plugin,clickbank-ads-clickbank-widget,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-20106-55592f88afc85caec6c62b369547bd3e.yaml b/nuclei-templates/2015/CVE-2015-20106-55592f88afc85caec6c62b369547bd3e.yaml index 3f6b9fa492..59ec700545 100644 --- a/nuclei-templates/2015/CVE-2015-20106-55592f88afc85caec6c62b369547bd3e.yaml +++ b/nuclei-templates/2015/CVE-2015-20106-55592f88afc85caec6c62b369547bd3e.yaml @@ -4,7 +4,7 @@ info: name: > ClickBank Affiliate Ads <= 1.20 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The ClickBank Affiliate Ads WordPress plugin through 1.20 does not escape its settings, allowing high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/clickbank-ads-clickbank-widget/" google-query: inurl:"/wp-content/plugins/clickbank-ads-clickbank-widget/" shodan-query: 'vuln:CVE-2015-20106' - tags: cve,wordpress,wp-plugin,clickbank-ads-clickbank-widget,medium + tags: cve,wordpress,wp-plugin,clickbank-ads-clickbank-widget,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-2040-b08c80c889936db0e80107b8d6e7f7c2.yaml b/nuclei-templates/2015/CVE-2015-2040-b08c80c889936db0e80107b8d6e7f7c2.yaml index 7098bee6fe..8d25f4c481 100644 --- a/nuclei-templates/2015/CVE-2015-2040-b08c80c889936db0e80107b8d6e7f7c2.yaml +++ b/nuclei-templates/2015/CVE-2015-2040-b08c80c889936db0e80107b8d6e7f7c2.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form DB <= 2.8.26 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Cross-site scripting (XSS) vulnerability in the Contact Form DB (aka CFDB and contact-form-7-to-database-extension) plugin 2.8.26 for WordPress allows remote attackers to inject arbitrary web script or HTML via the submit_time parameter in the CF7DBPluginSubmissions page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-7-to-database-extension/" google-query: inurl:"/wp-content/plugins/contact-form-7-to-database-extension/" shodan-query: 'vuln:CVE-2015-2040' - tags: cve,wordpress,wp-plugin,contact-form-7-to-database-extension,medium + tags: cve,wordpress,wp-plugin,contact-form-7-to-database-extension,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-2062-f1a34dd1cf3f3d82d7aaeb96b1997e29.yaml b/nuclei-templates/2015/CVE-2015-2062-f1a34dd1cf3f3d82d7aaeb96b1997e29.yaml index e32c3fba5e..4c85279daf 100644 --- a/nuclei-templates/2015/CVE-2015-2062-f1a34dd1cf3f3d82d7aaeb96b1997e29.yaml +++ b/nuclei-templates/2015/CVE-2015-2062-f1a34dd1cf3f3d82d7aaeb96b1997e29.yaml @@ -4,7 +4,7 @@ info: name: > Responsive Slider – Image Slider – Slideshow for WordPress < 2.7.0 - Authenticated (Admin+) SQL Injection author: topscoder - severity: high + severity: low description: > The Responsive Slider – Image Slider – Slideshow for WordPress plugin for WordPress is vulnerable to multiple SQL Injection attacks via the ‘removeslide’ parameter in versions before 2.7.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for administrator-level attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/slider-image/" google-query: inurl:"/wp-content/plugins/slider-image/" shodan-query: 'vuln:CVE-2015-2062' - tags: cve,wordpress,wp-plugin,slider-image,high + tags: cve,wordpress,wp-plugin,slider-image,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-2069-74b60f27afca1a7a8208f5a85162c261.yaml b/nuclei-templates/2015/CVE-2015-2069-74b60f27afca1a7a8208f5a85162c261.yaml index 9438f2bd30..884a61e9f1 100644 --- a/nuclei-templates/2015/CVE-2015-2069-74b60f27afca1a7a8208f5a85162c261.yaml +++ b/nuclei-templates/2015/CVE-2015-2069-74b60f27afca1a7a8208f5a85162c261.yaml @@ -4,7 +4,7 @@ info: name: > WooCommerce <= 2.2.10 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the WooCommerce plugin before 2.2.11 for WordPress allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING in the wc-reports page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/woocommerce/" google-query: inurl:"/wp-content/plugins/woocommerce/" shodan-query: 'vuln:CVE-2015-2069' - tags: cve,wordpress,wp-plugin,woocommerce,medium + tags: cve,wordpress,wp-plugin,woocommerce,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-2084-f8dda67401c83c106e4913ae42963922.yaml b/nuclei-templates/2015/CVE-2015-2084-f8dda67401c83c106e4913ae42963922.yaml index a983bd3036..46cd241899 100644 --- a/nuclei-templates/2015/CVE-2015-2084-f8dda67401c83c106e4913ae42963922.yaml +++ b/nuclei-templates/2015/CVE-2015-2084-f8dda67401c83c106e4913ae42963922.yaml @@ -4,7 +4,7 @@ info: name: > Easy Social Icons <= 1.2.2 - Cross-Site Request Forgery to Stored Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the Easy Social Icons plugin before 1.2.3 for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the image_file parameter in an edit action in the cnss_social_icon_add page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-social-icons/" google-query: inurl:"/wp-content/plugins/easy-social-icons/" shodan-query: 'vuln:CVE-2015-2084' - tags: cve,wordpress,wp-plugin,easy-social-icons,high + tags: cve,wordpress,wp-plugin,easy-social-icons,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-2089-66a96d7ee2557e873f3475f1e86dd229.yaml b/nuclei-templates/2015/CVE-2015-2089-66a96d7ee2557e873f3475f1e86dd229.yaml index 95ad6b00ad..7ee4550f1c 100644 --- a/nuclei-templates/2015/CVE-2015-2089-66a96d7ee2557e873f3475f1e86dd229.yaml +++ b/nuclei-templates/2015/CVE-2015-2089-66a96d7ee2557e873f3475f1e86dd229.yaml @@ -4,7 +4,7 @@ info: name: > CrossSlide jQuery Plugin <= 2.0.5 - Multiple Cross-Site Request Forgery to Stored Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the CrossSlide jQuery (crossslide-jquery-plugin-for-wordpress) plugin 2.0.5 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) change plugin settings or conduct cross-site scripting (XSS) attacks via the (2) csj_width, (3) csj_height, (4) csj_sleep, (5) csj_fade, or (6) upload_image parameter in the thisismyurl_csj.php page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/crossslide-jquery-plugin-for-wordpress/" google-query: inurl:"/wp-content/plugins/crossslide-jquery-plugin-for-wordpress/" shodan-query: 'vuln:CVE-2015-2089' - tags: cve,wordpress,wp-plugin,crossslide-jquery-plugin-for-wordpress,high + tags: cve,wordpress,wp-plugin,crossslide-jquery-plugin-for-wordpress,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-2194-50500b0da9551f89249fc057d52b16ad.yaml b/nuclei-templates/2015/CVE-2015-2194-50500b0da9551f89249fc057d52b16ad.yaml index 0feab9b220..f023d24ddc 100644 --- a/nuclei-templates/2015/CVE-2015-2194-50500b0da9551f89249fc057d52b16ad.yaml +++ b/nuclei-templates/2015/CVE-2015-2194-50500b0da9551f89249fc057d52b16ad.yaml @@ -4,7 +4,7 @@ info: name: > Fusion <= 3.1 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > Unrestricted file upload vulnerability in the fusion_options function in functions.php in the Fusion theme 3.1 for Wordpress allows remote authenticated users to execute arbitrary code by uploading a file with an executable extension in a fusion_save action, then accessing it via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/fusion-delisted/" google-query: inurl:"/wp-content/themes/fusion-delisted/" shodan-query: 'vuln:CVE-2015-2194' - tags: cve,wordpress,wp-theme,fusion-delisted,high + tags: cve,wordpress,wp-theme,fusion-delisted,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-2195-ee67de5781e7fd9c2318027f775c66d6.yaml b/nuclei-templates/2015/CVE-2015-2195-ee67de5781e7fd9c2318027f775c66d6.yaml index bf6e25594b..c4aea4aa58 100644 --- a/nuclei-templates/2015/CVE-2015-2195-ee67de5781e7fd9c2318027f775c66d6.yaml +++ b/nuclei-templates/2015/CVE-2015-2195-ee67de5781e7fd9c2318027f775c66d6.yaml @@ -4,7 +4,7 @@ info: name: > WP Media Cleaner <= 2.2.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the WP Media Cleaner plugin 2.2.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) view, (2) paged, or (3) s parameter in the wp-media-cleaner page to wp-admin/upload.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-media-cleaner/" google-query: inurl:"/wp-content/plugins/wp-media-cleaner/" shodan-query: 'vuln:CVE-2015-2195' - tags: cve,wordpress,wp-plugin,wp-media-cleaner,medium + tags: cve,wordpress,wp-plugin,wp-media-cleaner,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-2199-66fd05b591a1b1e766cf1d8976a2f593.yaml b/nuclei-templates/2015/CVE-2015-2199-66fd05b591a1b1e766cf1d8976a2f593.yaml index 1936ee5798..eb01df5e29 100644 --- a/nuclei-templates/2015/CVE-2015-2199-66fd05b591a1b1e766cf1d8976a2f593.yaml +++ b/nuclei-templates/2015/CVE-2015-2199-66fd05b591a1b1e766cf1d8976a2f593.yaml @@ -4,7 +4,7 @@ info: name: > WonderPlugin Audio Player <= 2.0 - Blind SQL Injection author: topscoder - severity: high + severity: critical description: > Multiple SQL injection vulnerabilities in the WonderPlugin Audio Player plugin before 2.1 for WordPress allow (1) remote authenticated users to execute arbitrary SQL commands via the item[id] parameter in a wonderplugin_audio_save_item action to wp-admin/admin-ajax.php or remote administrators to execute arbitrary SQL commands via the itemid parameter in the (2) wonderplugin_audio_show_item, (3) wonderplugin_audio_show_items, or (4) wonderplugin_audio_edit_item page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wonderplugin-audio/" google-query: inurl:"/wp-content/plugins/wonderplugin-audio/" shodan-query: 'vuln:CVE-2015-2199' - tags: cve,wordpress,wp-plugin,wonderplugin-audio,high + tags: cve,wordpress,wp-plugin,wonderplugin-audio,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-2213-4042aa3076d5d5e05f92a43c0f9299ab.yaml b/nuclei-templates/2015/CVE-2015-2213-4042aa3076d5d5e05f92a43c0f9299ab.yaml index b21227732c..8aa8034075 100644 --- a/nuclei-templates/2015/CVE-2015-2213-4042aa3076d5d5e05f92a43c0f9299ab.yaml +++ b/nuclei-templates/2015/CVE-2015-2213-4042aa3076d5d5e05f92a43c0f9299ab.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.2.4 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in the wp_untrash_post_comments function in wp-includes/post.php in WordPress before 4.2.4 allows remote attackers to execute arbitrary SQL commands via a comment that is mishandled after retrieval from the trash. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2015-2213 metadata: shodan-query: 'vuln:CVE-2015-2213' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-2292-4a0b4f088a324947da6aaf5af5ea450e.yaml b/nuclei-templates/2015/CVE-2015-2292-4a0b4f088a324947da6aaf5af5ea450e.yaml index 5b88ab03a6..aff1643250 100644 --- a/nuclei-templates/2015/CVE-2015-2292-4a0b4f088a324947da6aaf5af5ea450e.yaml +++ b/nuclei-templates/2015/CVE-2015-2292-4a0b4f088a324947da6aaf5af5ea450e.yaml @@ -4,7 +4,7 @@ info: name: > Yoast SEO <= 1.7.3.3 - Blind SQL Injection author: topscoder - severity: high + severity: critical description: > Multiple SQL injection vulnerabilities in admin/class-bulk-editor-list-table.php in the WordPress SEO by Yoast plugin before 1.5.7, 1.6.x before 1.6.4, and 1.7.x before 1.7.4 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) order_by or (2) order parameter in the wpseo_bulk-editor page to wp-admin/admin.php. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wordpress-seo/" google-query: inurl:"/wp-content/plugins/wordpress-seo/" shodan-query: 'vuln:CVE-2015-2292' - tags: cve,wordpress,wp-plugin,wordpress-seo,high + tags: cve,wordpress,wp-plugin,wordpress-seo,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-2293-0cab757218d53679bf548112d251d15c.yaml b/nuclei-templates/2015/CVE-2015-2293-0cab757218d53679bf548112d251d15c.yaml index 7cb476c257..026099972d 100644 --- a/nuclei-templates/2015/CVE-2015-2293-0cab757218d53679bf548112d251d15c.yaml +++ b/nuclei-templates/2015/CVE-2015-2293-0cab757218d53679bf548112d251d15c.yaml @@ -4,7 +4,7 @@ info: name: > Yoast SEO <= 1.7.3.3 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in admin/class-bulk-editor-list-table.php in the WordPress SEO by Yoast plugin before 1.5.7, 1.6.x before 1.6.4, and 1.7.x before 1.7.4 for WordPress allow remote attackers to hijack the authentication of certain users for requests that conduct SQL injection attacks via the (1) order_by or (2) order parameter in the wpseo_bulk-editor page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wordpress-seo/" google-query: inurl:"/wp-content/plugins/wordpress-seo/" shodan-query: 'vuln:CVE-2015-2293' - tags: cve,wordpress,wp-plugin,wordpress-seo,high + tags: cve,wordpress,wp-plugin,wordpress-seo,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-2315-cb38c4c6a570ec5691624654c5d4d34c.yaml b/nuclei-templates/2015/CVE-2015-2315-cb38c4c6a570ec5691624654c5d4d34c.yaml index 36837acd25..a04e63d643 100644 --- a/nuclei-templates/2015/CVE-2015-2315-cb38c4c6a570ec5691624654c5d4d34c.yaml +++ b/nuclei-templates/2015/CVE-2015-2315-cb38c4c6a570ec5691624654c5d4d34c.yaml @@ -4,7 +4,7 @@ info: name: > WPML < 3.1.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the WPML plugin before 3.1.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the target parameter in a reminder_popup action to the default URI. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpml/" google-query: inurl:"/wp-content/plugins/wpml/" shodan-query: 'vuln:CVE-2015-2315' - tags: cve,wordpress,wp-plugin,wpml,medium + tags: cve,wordpress,wp-plugin,wpml,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-2321-21f007f5ea27a69827ebd1e3bdac836f.yaml b/nuclei-templates/2015/CVE-2015-2321-21f007f5ea27a69827ebd1e3bdac836f.yaml index 7ffacc80a9..bb42e3d97e 100644 --- a/nuclei-templates/2015/CVE-2015-2321-21f007f5ea27a69827ebd1e3bdac836f.yaml +++ b/nuclei-templates/2015/CVE-2015-2321-21f007f5ea27a69827ebd1e3bdac836f.yaml @@ -4,7 +4,7 @@ info: name: > Job Manager - < 0.7.23 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Job Manager plugin 0.7.22 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the email field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/job-manager/" google-query: inurl:"/wp-content/plugins/job-manager/" shodan-query: 'vuln:CVE-2015-2321' - tags: cve,wordpress,wp-plugin,job-manager,medium + tags: cve,wordpress,wp-plugin,job-manager,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-2324-8449cdb7230a3e1bb12d25a2395ff5c1.yaml b/nuclei-templates/2015/CVE-2015-2324-8449cdb7230a3e1bb12d25a2395ff5c1.yaml index bb396e53c8..db5288f6dc 100644 --- a/nuclei-templates/2015/CVE-2015-2324-8449cdb7230a3e1bb12d25a2395ff5c1.yaml +++ b/nuclei-templates/2015/CVE-2015-2324-8449cdb7230a3e1bb12d25a2395ff5c1.yaml @@ -4,7 +4,7 @@ info: name: > Photo Gallery by 10Web <= 1.2.12 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Cross-site scripting (XSS) vulnerability in the filemanager in the Photo Gallery plugin before 1.2.13 for WordPress allows remote authenticated users with edit permission to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/photo-gallery/" google-query: inurl:"/wp-content/plugins/photo-gallery/" shodan-query: 'vuln:CVE-2015-2324' - tags: cve,wordpress,wp-plugin,photo-gallery,medium + tags: cve,wordpress,wp-plugin,photo-gallery,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-2755-5b4876c37f7fd35309718a01d65b18f0.yaml b/nuclei-templates/2015/CVE-2015-2755-5b4876c37f7fd35309718a01d65b18f0.yaml index 3cdc7f38fa..a460c3c33e 100644 --- a/nuclei-templates/2015/CVE-2015-2755-5b4876c37f7fd35309718a01d65b18f0.yaml +++ b/nuclei-templates/2015/CVE-2015-2755-5b4876c37f7fd35309718a01d65b18f0.yaml @@ -4,7 +4,7 @@ info: name: > AB Google Map Travel (AB-MAP) < 4.0 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the AB Google Map Travel (AB-MAP) plugin before 4.0 for WordPress allow remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the (1) lat (Latitude), (2) long (Longitude), (3) map_width, (4) map_height, or (5) zoom (Map Zoom) parameter in the ab_map_options page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ab-google-map-travel/" google-query: inurl:"/wp-content/plugins/ab-google-map-travel/" shodan-query: 'vuln:CVE-2015-2755' - tags: cve,wordpress,wp-plugin,ab-google-map-travel,high + tags: cve,wordpress,wp-plugin,ab-google-map-travel,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-2792-bf27f6ce9ebbfb831479a794b9f49858.yaml b/nuclei-templates/2015/CVE-2015-2792-bf27f6ce9ebbfb831479a794b9f49858.yaml index 574364d063..b29232f4ce 100644 --- a/nuclei-templates/2015/CVE-2015-2792-bf27f6ce9ebbfb831479a794b9f49858.yaml +++ b/nuclei-templates/2015/CVE-2015-2792-bf27f6ce9ebbfb831479a794b9f49858.yaml @@ -4,7 +4,7 @@ info: name: > WPML < 3.1.8 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > The WPML plugin before 3.1.9 for WordPress does not properly handle multiple actions in a request, which allows remote attackers to bypass nonce checks and perform arbitrary actions via a request containing an action POST parameter, an action GET parameter, and a valid nonce for the action GET parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sitepress-multilingual-cms/" google-query: inurl:"/wp-content/plugins/sitepress-multilingual-cms/" shodan-query: 'vuln:CVE-2015-2792' - tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,medium + tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-3173-262dd6c0036b365e35ff5544b3d1cf02.yaml b/nuclei-templates/2015/CVE-2015-3173-262dd6c0036b365e35ff5544b3d1cf02.yaml index c4ceba8abb..0c08d78ba9 100644 --- a/nuclei-templates/2015/CVE-2015-3173-262dd6c0036b365e35ff5544b3d1cf02.yaml +++ b/nuclei-templates/2015/CVE-2015-3173-262dd6c0036b365e35ff5544b3d1cf02.yaml @@ -4,7 +4,7 @@ info: name: > Custom Content Type Manager <= 0.9.8.5 - Authenticated (Admin+) Remote Code Execution author: topscoder - severity: high + severity: low description: > The Custom Content Type Manager plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 0.9.8.5 via the "Visibility Control" settings which passes values through eval. This makes it possible for authenticated attackers to execute code on the server. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/custom-content-type-manager/" google-query: inurl:"/wp-content/plugins/custom-content-type-manager/" shodan-query: 'vuln:CVE-2015-3173' - tags: cve,wordpress,wp-plugin,custom-content-type-manager,high + tags: cve,wordpress,wp-plugin,custom-content-type-manager,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-3299-6a69a2fa108e4cf956a3388af5834004.yaml b/nuclei-templates/2015/CVE-2015-3299-6a69a2fa108e4cf956a3388af5834004.yaml index a01851ac9d..3069e68e2d 100644 --- a/nuclei-templates/2015/CVE-2015-3299-6a69a2fa108e4cf956a3388af5834004.yaml +++ b/nuclei-templates/2015/CVE-2015-3299-6a69a2fa108e4cf956a3388af5834004.yaml @@ -4,7 +4,7 @@ info: name: > Floating Social Bar <= 1.1.6 - Unauthenticated Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Floating Social Bar plugin before 1.1.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via vectors related to original service order. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/floating-social-bar/" google-query: inurl:"/wp-content/plugins/floating-social-bar/" shodan-query: 'vuln:CVE-2015-3299' - tags: cve,wordpress,wp-plugin,floating-social-bar,medium + tags: cve,wordpress,wp-plugin,floating-social-bar,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-3300-380b3f09b95ab564acee2d8952a33e71.yaml b/nuclei-templates/2015/CVE-2015-3300-380b3f09b95ab564acee2d8952a33e71.yaml index 088ef2943d..6e35f00d30 100644 --- a/nuclei-templates/2015/CVE-2015-3300-380b3f09b95ab564acee2d8952a33e71.yaml +++ b/nuclei-templates/2015/CVE-2015-3300-380b3f09b95ab564acee2d8952a33e71.yaml @@ -4,7 +4,7 @@ info: name: > TheCartPress eCommerce Shopping Cart <= 1.5.3.6 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the TheCartPress eCommerce Shopping Cart (aka The Professional WordPress eCommerce Plugin) plugin for WordPress before 1.3.9.3 allow remote attackers to inject arbitrary web script or HTML via the (1) billing_firstname, (2) billing_lastname, (3) billing_company, (4) billing_tax_id_number, (5) billing_city, (6) billing_street, (7) billing_street_2, (8) billing_postcode, (9) billing_telephone_1, (10) billing_telephone_2, (11) billing_fax, (12) shipping_firstname, (13) shipping_lastname, (14) shipping_company, (15) shipping_tax_id_number, (16) shipping_city, (17) shipping_street, (18) shipping_street_2, (19) shipping_postcode, (20) shipping_telephone_1, (21) shipping_telephone_2, or (22) shipping_fax parameter to shopping-cart/checkout/; the (23) search_by parameter in the admin/AddressesList.php page to wp-admin/admin.php; the (24) address_id, (25) address_name, (26) firstname, (27) lastname, (28) street, (29) city, (30) postcode, or (31) email parameter in the admin/AddressEdit.php page to wp-admin/admin.php; the (32) post_id or (33) rel_type parameter in the admin/AssignedCategoriesList.php page to wp-admin/admin.php; or the (34) post_type parameter in the admin/CustomFieldsList.php page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/thecartpress/" google-query: inurl:"/wp-content/plugins/thecartpress/" shodan-query: 'vuln:CVE-2015-3300' - tags: cve,wordpress,wp-plugin,thecartpress,medium + tags: cve,wordpress,wp-plugin,thecartpress,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-3325-4ae9af0b470e9693506c7f0dea29cf9b.yaml b/nuclei-templates/2015/CVE-2015-3325-4ae9af0b470e9693506c7f0dea29cf9b.yaml index 42fa974cb0..630115a82e 100644 --- a/nuclei-templates/2015/CVE-2015-3325-4ae9af0b470e9693506c7f0dea29cf9b.yaml +++ b/nuclei-templates/2015/CVE-2015-3325-4ae9af0b470e9693506c7f0dea29cf9b.yaml @@ -4,7 +4,7 @@ info: name: > WP Symposium < 15.4 - SQL Injection author: topscoder - severity: medium + severity: critical description: > SQL injection vulnerability in forum.php in the WP Symposium plugin before 15.4 for WordPress allows remote attackers to execute arbitrary SQL commands via the show parameter in the QUERY_STRING to the default URI. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-symposium/" google-query: inurl:"/wp-content/plugins/wp-symposium/" shodan-query: 'vuln:CVE-2015-3325' - tags: cve,wordpress,wp-plugin,wp-symposium,medium + tags: cve,wordpress,wp-plugin,wp-symposium,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-3421-b63e841ec4f7ba03a92d7fcbed9249bc.yaml b/nuclei-templates/2015/CVE-2015-3421-b63e841ec4f7ba03a92d7fcbed9249bc.yaml index eaa58e0ec0..6c2af42364 100644 --- a/nuclei-templates/2015/CVE-2015-3421-b63e841ec4f7ba03a92d7fcbed9249bc.yaml +++ b/nuclei-templates/2015/CVE-2015-3421-b63e841ec4f7ba03a92d7fcbed9249bc.yaml @@ -4,7 +4,7 @@ info: name: > eShop <= 6.3.11 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The eshop_checkout function in checkout.php in the Wordpress Eshop plugin 6.3.11 and earlier does not validate variables in the "eshopcart" HTTP cookie, which allows remote attackers to perform cross-site scripting (XSS) attacks, or a path disclosure attack via crafted variables named after target PHP variables. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/eshop/" google-query: inurl:"/wp-content/plugins/eshop/" shodan-query: 'vuln:CVE-2015-3421' - tags: cve,wordpress,wp-plugin,eshop,medium + tags: cve,wordpress,wp-plugin,eshop,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-3429-a1f41447ffcf38fa9b963d8ece31aad9.yaml b/nuclei-templates/2015/CVE-2015-3429-a1f41447ffcf38fa9b963d8ece31aad9.yaml index 912c844102..761d4b0155 100644 --- a/nuclei-templates/2015/CVE-2015-3429-a1f41447ffcf38fa9b963d8ece31aad9.yaml +++ b/nuclei-templates/2015/CVE-2015-3429-a1f41447ffcf38fa9b963d8ece31aad9.yaml @@ -4,7 +4,7 @@ info: name: > Twenty Fifteen Theme <= 1.1 & WordPress Core < 4.2.2 - Cross-Site Scripting via example.html author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in example.html in Genericons before 3.3.1, as used in WordPress before 4.2.2, allows remote attackers to inject arbitrary web script or HTML via a fragment identifier. reference: @@ -14,47 +14,45 @@ info: cvss-score: 6.4 cve-id: CVE-2015-3429 metadata: + fofa-query: "wp-content/themes/twentyfifteen/" + google-query: inurl:"/wp-content/themes/twentyfifteen/" shodan-query: 'vuln:CVE-2015-3429' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-theme,twentyfifteen,high http: - method: GET - path: - - "{{BaseURL}}" - - "{{BaseURL}}/wp-admin/install.php" - - "{{BaseURL}}/feed/" - - "{{BaseURL}}/?feed=rss2" # alternative if /feed/ is blocked - redirects: true - max-redirects: 2 - stop-at-first-match: true - matchers-condition: and - matchers: - - type: dsl - dsl: - - compare_versions(version_by_generator, '>= 4.2', '<= 4.2.1') - - compare_versions(version_by_js, '>= 4.2', '<= 4.2.1') - - compare_versions(version_by_css, '>= 4.2', '<= 4.2.1') - - - type: status - status: - - 200 + max-redirects: 3 + path: + - "{{BaseURL}}/wp-content/themes/twentyfifteen/style.css" extractors: - type: regex - name: version_by_generator + name: version + part: body group: 1 + internal: true regex: - - '(?m)https:\/\/wordpress.org\/\?v=([0-9.]+)' + - "(?mi)Version: ([0-9.]+)" - type: regex - name: version_by_js + name: version + part: body group: 1 regex: - - 'wp-emoji-release\.min\.js\?ver=((\d+\.?)+)\b' + - "(?mi)Version: ([0-9.]+)" - - type: regex - name: version_by_css - group: 1 - regex: - - 'install\.min\.css\?ver=((\d+\.?)+)\b' + matchers-condition: and + matchers: + - type: status + status: + - 200 + + - type: word + words: + - "twentyfifteen" + part: body + + - type: dsl + dsl: + - compare_versions(version, '<= 1.1') \ No newline at end of file diff --git a/nuclei-templates/2015/CVE-2015-3439-1ea3d08c9b81a694b2e0d96737c7ca52.yaml b/nuclei-templates/2015/CVE-2015-3439-1ea3d08c9b81a694b2e0d96737c7ca52.yaml index a2e7c82523..8a32934655 100644 --- a/nuclei-templates/2015/CVE-2015-3439-1ea3d08c9b81a694b2e0d96737c7ca52.yaml +++ b/nuclei-templates/2015/CVE-2015-3439-1ea3d08c9b81a694b2e0d96737c7ca52.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.1.2 - Cross-Site Scripting via Ephox in Plupload author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Ephox (formerly Moxiecode) plupload.flash.swf shim 2.1.2 in Plupload, as used in WordPress 3.9.x, 4.0.x, and 4.1.x before 4.1.2 and other products, allows remote attackers to execute same-origin JavaScript functions via the target parameter, as demonstrated by executing a certain click function, related to _init.as and _fireEvent.as. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2015-3439 metadata: shodan-query: 'vuln:CVE-2015-3439' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-3986-e7c178a2471ea08f4ec99b9eb663cf05.yaml b/nuclei-templates/2015/CVE-2015-3986-e7c178a2471ea08f4ec99b9eb663cf05.yaml index 08f4707bd5..6b1c53d5cf 100644 --- a/nuclei-templates/2015/CVE-2015-3986-e7c178a2471ea08f4ec99b9eb663cf05.yaml +++ b/nuclei-templates/2015/CVE-2015-3986-e7c178a2471ea08f4ec99b9eb663cf05.yaml @@ -4,7 +4,7 @@ info: name: > TheCartPress eCommerce Shopping Cart <= 1.5.3.6 Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the TheCartPress eCommerce Shopping Cart (aka The Professional WordPress eCommerce Plugin) plugin for WordPress before 1.3.9.3 allows remote attackers to hijack the authentication of administrators for requests that conduct directory traversal attacks via the tcp_box_path parameter in the checkout_editor_settings page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/thecartpress/" google-query: inurl:"/wp-content/plugins/thecartpress/" shodan-query: 'vuln:CVE-2015-3986' - tags: cve,wordpress,wp-plugin,thecartpress,high + tags: cve,wordpress,wp-plugin,thecartpress,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-4010-2fb0bdf5e86e962a718dd05b2ce83f93.yaml b/nuclei-templates/2015/CVE-2015-4010-2fb0bdf5e86e962a718dd05b2ce83f93.yaml index 1dd8efd231..89c0e60106 100644 --- a/nuclei-templates/2015/CVE-2015-4010-2fb0bdf5e86e962a718dd05b2ce83f93.yaml +++ b/nuclei-templates/2015/CVE-2015-4010-2fb0bdf5e86e962a718dd05b2ce83f93.yaml @@ -4,7 +4,7 @@ info: name: > Encrypted Contact Form < 1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site request forgery (CSRF) vulnerability in the Encrypted Contact Form plugin before 1.1 for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the iframe_url parameter in an Update Page action in the conformconf page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/encrypted-contact-form/" google-query: inurl:"/wp-content/plugins/encrypted-contact-form/" shodan-query: 'vuln:CVE-2015-4010' - tags: cve,wordpress,wp-plugin,encrypted-contact-form,medium + tags: cve,wordpress,wp-plugin,encrypted-contact-form,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-4039-398e2e434c59ceafeecf5e603168a0d7.yaml b/nuclei-templates/2015/CVE-2015-4039-398e2e434c59ceafeecf5e603168a0d7.yaml index 6a6ad99aff..c92a83221d 100644 --- a/nuclei-templates/2015/CVE-2015-4039-398e2e434c59ceafeecf5e603168a0d7.yaml +++ b/nuclei-templates/2015/CVE-2015-4039-398e2e434c59ceafeecf5e603168a0d7.yaml @@ -4,7 +4,7 @@ info: name: > WP Membership <= 1.2.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the WP Membership plugin 1.2.3 for WordPress allow remote authenticated users to inject arbitrary web script or HTML via unspecified (1) profile fields or (2) new post content. NOTE: CVE-2015-4038 can be used to bypass the administrator confirmation step for vector 2. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-membership/" google-query: inurl:"/wp-content/plugins/wp-membership/" shodan-query: 'vuln:CVE-2015-4039' - tags: cve,wordpress,wp-plugin,wp-membership,medium + tags: cve,wordpress,wp-plugin,wp-membership,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-4062-c5e29f3bae507d53468f7991a1fb1a3e.yaml b/nuclei-templates/2015/CVE-2015-4062-c5e29f3bae507d53468f7991a1fb1a3e.yaml index c00c15aa81..e0677137e6 100644 --- a/nuclei-templates/2015/CVE-2015-4062-c5e29f3bae507d53468f7991a1fb1a3e.yaml +++ b/nuclei-templates/2015/CVE-2015-4062-c5e29f3bae507d53468f7991a1fb1a3e.yaml @@ -4,7 +4,7 @@ info: name: > NewStatPress <= 0.9.8 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > SQL injection vulnerability in includes/nsp_search.php in the NewStatPress plugin before 0.9.9 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the where1 parameter in the nsp_search page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/newstatpress/" google-query: inurl:"/wp-content/plugins/newstatpress/" shodan-query: 'vuln:CVE-2015-4062' - tags: cve,wordpress,wp-plugin,newstatpress,high + tags: cve,wordpress,wp-plugin,newstatpress,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-4063-5661d46a0d0f62ecdca1f908938fc469.yaml b/nuclei-templates/2015/CVE-2015-4063-5661d46a0d0f62ecdca1f908938fc469.yaml index c0b3d30070..b8f2613730 100644 --- a/nuclei-templates/2015/CVE-2015-4063-5661d46a0d0f62ecdca1f908938fc469.yaml +++ b/nuclei-templates/2015/CVE-2015-4063-5661d46a0d0f62ecdca1f908938fc469.yaml @@ -4,7 +4,7 @@ info: name: > NewStatPress <= 0.9.8 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Cross-site scripting (XSS) vulnerability in includes/nsp_search.php in the NewStatPress plugin before 0.9.9 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the where1 parameter in the nsp_search page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/newstatpress/" google-query: inurl:"/wp-content/plugins/newstatpress/" shodan-query: 'vuln:CVE-2015-4063' - tags: cve,wordpress,wp-plugin,newstatpress,medium + tags: cve,wordpress,wp-plugin,newstatpress,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-4064-32b6d6a7715e88760b71f326a4a0a744.yaml b/nuclei-templates/2015/CVE-2015-4064-32b6d6a7715e88760b71f326a4a0a744.yaml index ba71364ffd..a5ff346f45 100644 --- a/nuclei-templates/2015/CVE-2015-4064-32b6d6a7715e88760b71f326a4a0a744.yaml +++ b/nuclei-templates/2015/CVE-2015-4064-32b6d6a7715e88760b71f326a4a0a744.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Landing Pages <= 1.8.4 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > SQL injection vulnerability in modules/module.ab-testing.php in the Landing Pages plugin before 1.8.5 for WordPress allows remote authenticated users to execute arbitrary SQL commands via the post parameter in an edit delete-variation action to wp-admin/post.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/landing-pages/" google-query: inurl:"/wp-content/plugins/landing-pages/" shodan-query: 'vuln:CVE-2015-4064' - tags: cve,wordpress,wp-plugin,landing-pages,high + tags: cve,wordpress,wp-plugin,landing-pages,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-4065-1bd3cf2ded386b4330f990e160e575a1.yaml b/nuclei-templates/2015/CVE-2015-4065-1bd3cf2ded386b4330f990e160e575a1.yaml index fe3750d00c..7ffdabbf46 100644 --- a/nuclei-templates/2015/CVE-2015-4065-1bd3cf2ded386b4330f990e160e575a1.yaml +++ b/nuclei-templates/2015/CVE-2015-4065-1bd3cf2ded386b4330f990e160e575a1.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Landing Pages <= 1.8.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in shared/shortcodes/inbound-shortcodes.php in the Landing Pages plugin before 1.8.5 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the post parameter to wp-admin/post-new.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/landing-pages/" google-query: inurl:"/wp-content/plugins/landing-pages/" shodan-query: 'vuln:CVE-2015-4065' - tags: cve,wordpress,wp-plugin,landing-pages,medium + tags: cve,wordpress,wp-plugin,landing-pages,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-4066-13393dad61452f7f4e21c0de558fed80.yaml b/nuclei-templates/2015/CVE-2015-4066-13393dad61452f7f4e21c0de558fed80.yaml index f9e14bc0b3..2b52b788f8 100644 --- a/nuclei-templates/2015/CVE-2015-4066-13393dad61452f7f4e21c0de558fed80.yaml +++ b/nuclei-templates/2015/CVE-2015-4066-13393dad61452f7f4e21c0de558fed80.yaml @@ -4,7 +4,7 @@ info: name: > GigPress <= 2.3.8 - SQL Injection author: topscoder - severity: high + severity: critical description: > Multiple SQL injection vulnerabilities in admin/handlers.php in the GigPress plugin before 2.3.9 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) show_artist_id or (2) show_venue_id parameter in an add action in the gigpress.php page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gigpress/" google-query: inurl:"/wp-content/plugins/gigpress/" shodan-query: 'vuln:CVE-2015-4066' - tags: cve,wordpress,wp-plugin,gigpress,high + tags: cve,wordpress,wp-plugin,gigpress,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-4089-7bdbbcae3cce706a901ef3f3a6b92425.yaml b/nuclei-templates/2015/CVE-2015-4089-7bdbbcae3cce706a901ef3f3a6b92425.yaml index 470b64d536..3433f219d7 100644 --- a/nuclei-templates/2015/CVE-2015-4089-7bdbbcae3cce706a901ef3f3a6b92425.yaml +++ b/nuclei-templates/2015/CVE-2015-4089-7bdbbcae3cce706a901ef3f3a6b92425.yaml @@ -4,7 +4,7 @@ info: name: > WP Fastest Cache < 0.8.3.5 - Multiple Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the optionsPageRequest function in admin.php in WP Fastest Cache plugin before 0.8.3.5 for WordPress allow remote attackers to hijack the authentication of unspecified victims for requests that call the (1) saveOption, (2) deleteCache, (3) deleteCssAndJsCache, or (4) addCacheTimeout method via the wpFastestCachePage parameter in the WpFastestCacheOptions/ page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-fastest-cache/" google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" shodan-query: 'vuln:CVE-2015-4089' - tags: cve,wordpress,wp-plugin,wp-fastest-cache,high + tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-4127-ce1d4ccc883e8bf5f82fe00f2d94fe35.yaml b/nuclei-templates/2015/CVE-2015-4127-ce1d4ccc883e8bf5f82fe00f2d94fe35.yaml index 49aaf85f51..e807056404 100644 --- a/nuclei-templates/2015/CVE-2015-4127-ce1d4ccc883e8bf5f82fe00f2d94fe35.yaml +++ b/nuclei-templates/2015/CVE-2015-4127-ce1d4ccc883e8bf5f82fe00f2d94fe35.yaml @@ -4,7 +4,7 @@ info: name: > Church Admin < 0.810 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the church_admin plugin before 0.810 for WordPress allows remote attackers to inject arbitrary web script or HTML via the address parameter, as demonstrated by a request to index.php/2015/05/21/church_admin-registration-form/. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/church-admin/" google-query: inurl:"/wp-content/plugins/church-admin/" shodan-query: 'vuln:CVE-2015-4127' - tags: cve,wordpress,wp-plugin,church-admin,medium + tags: cve,wordpress,wp-plugin,church-admin,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-4139-ae9135d7bf1c7296c12f3a734a25c4bf.yaml b/nuclei-templates/2015/CVE-2015-4139-ae9135d7bf1c7296c12f3a734a25c4bf.yaml index 57289c1dfe..4576befef7 100644 --- a/nuclei-templates/2015/CVE-2015-4139-ae9135d7bf1c7296c12f3a734a25c4bf.yaml +++ b/nuclei-templates/2015/CVE-2015-4139-ae9135d7bf1c7296c12f3a734a25c4bf.yaml @@ -4,7 +4,7 @@ info: name: > WP Smiley <= 1.4.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in smilies4wp.php in the WP Smiley plugin 1.4.1 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the s4w-more parameter to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-smiley/" google-query: inurl:"/wp-content/plugins/wp-smiley/" shodan-query: 'vuln:CVE-2015-4139' - tags: cve,wordpress,wp-plugin,wp-smiley,medium + tags: cve,wordpress,wp-plugin,wp-smiley,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-4179-ddc63b74125a60840010b54470ac437e.yaml b/nuclei-templates/2015/CVE-2015-4179-ddc63b74125a60840010b54470ac437e.yaml index 877296a732..04097e4685 100644 --- a/nuclei-templates/2015/CVE-2015-4179-ddc63b74125a60840010b54470ac437e.yaml +++ b/nuclei-templates/2015/CVE-2015-4179-ddc63b74125a60840010b54470ac437e.yaml @@ -4,7 +4,7 @@ info: name: > Codestyling Localization <= 1.99.30 - Cross-Site Request Forgery to Remote Code Execution author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the Codestyling Localization plugin 1.99.30 and earlier for Wordpress allow RCE. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/codestyling-localization/" google-query: inurl:"/wp-content/plugins/codestyling-localization/" shodan-query: 'vuln:CVE-2015-4179' - tags: cve,wordpress,wp-plugin,codestyling-localization,high + tags: cve,wordpress,wp-plugin,codestyling-localization,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-4337-259f1c198d6aae45fe01969db446735f.yaml b/nuclei-templates/2015/CVE-2015-4337-259f1c198d6aae45fe01969db446735f.yaml index e7fad06290..ed1f7bac03 100644 --- a/nuclei-templates/2015/CVE-2015-4337-259f1c198d6aae45fe01969db446735f.yaml +++ b/nuclei-templates/2015/CVE-2015-4337-259f1c198d6aae45fe01969db446735f.yaml @@ -4,7 +4,7 @@ info: name: > Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 3.1.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the XCloner plugin 3.1.2 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the excl_manual parameter in the xcloner_show page to wpadmin/plugins.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" shodan-query: 'vuln:CVE-2015-4337' - tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,medium + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-4465-ffbdefeb8e9807045768193f5cbcf332.yaml b/nuclei-templates/2015/CVE-2015-4465-ffbdefeb8e9807045768193f5cbcf332.yaml index 0d1e8bde9f..38b6dcc175 100644 --- a/nuclei-templates/2015/CVE-2015-4465-ffbdefeb8e9807045768193f5cbcf332.yaml +++ b/nuclei-templates/2015/CVE-2015-4465-ffbdefeb8e9807045768193f5cbcf332.yaml @@ -4,7 +4,7 @@ info: name: > zM Ajax Login & Register <= 1.0.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the zM Ajax Login & Register plugin before 1.1.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/zm-ajax-login-register/" google-query: inurl:"/wp-content/plugins/zm-ajax-login-register/" shodan-query: 'vuln:CVE-2015-4465' - tags: cve,wordpress,wp-plugin,zm-ajax-login-register,medium + tags: cve,wordpress,wp-plugin,zm-ajax-login-register,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-4697-c101bbb0e470de09f2d621ebb65fb72c.yaml b/nuclei-templates/2015/CVE-2015-4697-c101bbb0e470de09f2d621ebb65fb72c.yaml index 77c2b0b675..1e505854f7 100644 --- a/nuclei-templates/2015/CVE-2015-4697-c101bbb0e470de09f2d621ebb65fb72c.yaml +++ b/nuclei-templates/2015/CVE-2015-4697-c101bbb0e470de09f2d621ebb65fb72c.yaml @@ -4,7 +4,7 @@ info: name: > Google Analyticator <= 6.4.9.3 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in Google Analyticator Wordpress Plugin before 6.4.9.3 rev @1183563. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/google-analyticator/" google-query: inurl:"/wp-content/plugins/google-analyticator/" shodan-query: 'vuln:CVE-2015-4697' - tags: cve,wordpress,wp-plugin,google-analyticator,high + tags: cve,wordpress,wp-plugin,google-analyticator,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-5057-3120d6067a3e5e251eec4212f4e5aeb5.yaml b/nuclei-templates/2015/CVE-2015-5057-3120d6067a3e5e251eec4212f4e5aeb5.yaml index 9d2e850560..b8a3dfe4a8 100644 --- a/nuclei-templates/2015/CVE-2015-5057-3120d6067a3e5e251eec4212f4e5aeb5.yaml +++ b/nuclei-templates/2015/CVE-2015-5057-3120d6067a3e5e251eec4212f4e5aeb5.yaml @@ -4,7 +4,7 @@ info: name: > Broken Link Checker <= 1.10.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability exists in the Wordpress admin panel when the Broken Link Checker plugin before 1.10.9 is installed. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/broken-link-checker/" google-query: inurl:"/wp-content/plugins/broken-link-checker/" shodan-query: 'vuln:CVE-2015-5057' - tags: cve,wordpress,wp-plugin,broken-link-checker,medium + tags: cve,wordpress,wp-plugin,broken-link-checker,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-5308-cb7fe4a1f5c046460e4d69413b578527.yaml b/nuclei-templates/2015/CVE-2015-5308-cb7fe4a1f5c046460e4d69413b578527.yaml index b60af91d32..3a4bb50b4a 100644 --- a/nuclei-templates/2015/CVE-2015-5308-cb7fe4a1f5c046460e4d69413b578527.yaml +++ b/nuclei-templates/2015/CVE-2015-5308-cb7fe4a1f5c046460e4d69413b578527.yaml @@ -4,7 +4,7 @@ info: name: > wp-championship < 5.9 - SQL Injection author: topscoder - severity: high + severity: critical description: > Multiple SQL injection vulnerabilities in cs_admin_users.php in the wp-championship plugin 5.8 for WordPress allow remote attackers to execute arbitrary SQL commands via the (1) user, (2) isadmin, (3) mail service, (4) mailresceipt, (5) stellv, (6) champtipp, (7) tippgroup, or (8) userid parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-championship/" google-query: inurl:"/wp-content/plugins/wp-championship/" shodan-query: 'vuln:CVE-2015-5308' - tags: cve,wordpress,wp-plugin,wp-championship,high + tags: cve,wordpress,wp-plugin,wp-championship,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-5483-ec43ca1bf1629851ca9458501102a544.yaml b/nuclei-templates/2015/CVE-2015-5483-ec43ca1bf1629851ca9458501102a544.yaml index b6b6d752dd..1580a1ff21 100644 --- a/nuclei-templates/2015/CVE-2015-5483-ec43ca1bf1629851ca9458501102a544.yaml +++ b/nuclei-templates/2015/CVE-2015-5483-ec43ca1bf1629851ca9458501102a544.yaml @@ -4,7 +4,7 @@ info: name: > Private Only <= 3.5.1 - Multiple Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Multiple cross-site request forgery (CSRF) vulnerabilities in the Private Only plugin 3.5.1 for WordPress allow remote attackers to hijack the authentication of administrators for requests that (1) add users, (2) delete posts, or (3) modify PHP files via unspecified vectors, or (4) conduct cross-site scripting (XSS) attacks via the po_logo parameter in the privateonly.php page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/private-only/" google-query: inurl:"/wp-content/plugins/private-only/" shodan-query: 'vuln:CVE-2015-5483' - tags: cve,wordpress,wp-plugin,private-only,high + tags: cve,wordpress,wp-plugin,private-only,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-5484-9098123c91e037cb8b4722ce5e0246b6.yaml b/nuclei-templates/2015/CVE-2015-5484-9098123c91e037cb8b4722ce5e0246b6.yaml index b0dcf7efa7..80ecd6d678 100644 --- a/nuclei-templates/2015/CVE-2015-5484-9098123c91e037cb8b4722ce5e0246b6.yaml +++ b/nuclei-templates/2015/CVE-2015-5484-9098123c91e037cb8b4722ce5e0246b6.yaml @@ -4,7 +4,7 @@ info: name: > Plotly < 1.0.3 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Plotly plugin before 1.0.3 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via a post. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-plotly/" google-query: inurl:"/wp-content/plugins/wp-plotly/" shodan-query: 'vuln:CVE-2015-5484' - tags: cve,wordpress,wp-plugin,wp-plotly,medium + tags: cve,wordpress,wp-plugin,wp-plotly,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-5485-86cd270f4cc1442525b2973b263a3c27.yaml b/nuclei-templates/2015/CVE-2015-5485-86cd270f4cc1442525b2973b263a3c27.yaml index 93d2ef3a21..24fe5e80b0 100644 --- a/nuclei-templates/2015/CVE-2015-5485-86cd270f4cc1442525b2973b263a3c27.yaml +++ b/nuclei-templates/2015/CVE-2015-5485-86cd270f4cc1442525b2973b263a3c27.yaml @@ -4,7 +4,7 @@ info: name: > The Events Calendar: Eventbrite Tickets < 3.10.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Reflected Cross-site scripting (XSS) vulnerability in the Event Import page (import-eventbrite-events.php) in the Modern Tribe Eventbrite Tickets plugin before 3.10.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the "error" parameter to wp-admin/edit.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/the-events-calendar-eventbrite-tickets/" google-query: inurl:"/wp-content/plugins/the-events-calendar-eventbrite-tickets/" shodan-query: 'vuln:CVE-2015-5485' - tags: cve,wordpress,wp-plugin,the-events-calendar-eventbrite-tickets,medium + tags: cve,wordpress,wp-plugin,the-events-calendar-eventbrite-tickets,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-5528-6f67eba72e7035f4406a73d70218218a.yaml b/nuclei-templates/2015/CVE-2015-5528-6f67eba72e7035f4406a73d70218218a.yaml index a045b07fde..9b65d4e547 100644 --- a/nuclei-templates/2015/CVE-2015-5528-6f67eba72e7035f4406a73d70218218a.yaml +++ b/nuclei-templates/2015/CVE-2015-5528-6f67eba72e7035f4406a73d70218218a.yaml @@ -4,7 +4,7 @@ info: name: > Floating Social Bar < 1.1.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the save_order function in class-floating-social-bar.php in the Floating Social Bar plugin before 1.1.6 for WordPress allows remote attackers to inject arbitrary web script or HTML via the items[] parameter in an fsb_save_order action to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/floating-social-bar/" google-query: inurl:"/wp-content/plugins/floating-social-bar/" shodan-query: 'vuln:CVE-2015-5528' - tags: cve,wordpress,wp-plugin,floating-social-bar,medium + tags: cve,wordpress,wp-plugin,floating-social-bar,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-5532-63f8abf1368e7fe90270064d672ae623.yaml b/nuclei-templates/2015/CVE-2015-5532-63f8abf1368e7fe90270064d672ae623.yaml index f895f37415..2ef67f2206 100644 --- a/nuclei-templates/2015/CVE-2015-5532-63f8abf1368e7fe90270064d672ae623.yaml +++ b/nuclei-templates/2015/CVE-2015-5532-63f8abf1368e7fe90270064d672ae623.yaml @@ -4,7 +4,7 @@ info: name: > Paid Memberships Pro < 1.8.4.3 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Paid Memberships Pro (PMPro) plugin before 1.8.4.3 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) s parameter to membershiplevels.php, (2) memberslist.php, or (3) orders.php in adminpages/ or the (4) edit parameter to adminpages/membershiplevels.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/paid-memberships-pro/" google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" shodan-query: 'vuln:CVE-2015-5532' - tags: cve,wordpress,wp-plugin,paid-memberships-pro,medium + tags: cve,wordpress,wp-plugin,paid-memberships-pro,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-5533-39efec1d687062290aa82ba498987905.yaml b/nuclei-templates/2015/CVE-2015-5533-39efec1d687062290aa82ba498987905.yaml index 9392900cd0..09f7ce3d4f 100644 --- a/nuclei-templates/2015/CVE-2015-5533-39efec1d687062290aa82ba498987905.yaml +++ b/nuclei-templates/2015/CVE-2015-5533-39efec1d687062290aa82ba498987905.yaml @@ -4,7 +4,7 @@ info: name: > Count per Day <= 3.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > SQL injection vulnerability in counter-options.php in the Count Per Day plugin before 3.4.1 for WordPress allows remote authenticated administrators to execute arbitrary SQL commands via the cpd_keep_month parameter to wp-admin/options-general.php. NOTE: this can be leveraged using CSRF to allow remote attackers to execute arbitrary SQL commands. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/count-per-day/" google-query: inurl:"/wp-content/plugins/count-per-day/" shodan-query: 'vuln:CVE-2015-5533' - tags: cve,wordpress,wp-plugin,count-per-day,high + tags: cve,wordpress,wp-plugin,count-per-day,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-5535-1a21904a7af165ae2d206e73642b0122.yaml b/nuclei-templates/2015/CVE-2015-5535-1a21904a7af165ae2d206e73642b0122.yaml index 47cd723998..000b989b62 100644 --- a/nuclei-templates/2015/CVE-2015-5535-1a21904a7af165ae2d206e73642b0122.yaml +++ b/nuclei-templates/2015/CVE-2015-5535-1a21904a7af165ae2d206e73642b0122.yaml @@ -4,7 +4,7 @@ info: name: > qTranslate <= 2.5.39 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the qTranslate plugin 2.5.39 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the edit parameter in the qtranslate page to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/qtranslate/" google-query: inurl:"/wp-content/plugins/qtranslate/" shodan-query: 'vuln:CVE-2015-5535' - tags: cve,wordpress,wp-plugin,qtranslate,medium + tags: cve,wordpress,wp-plugin,qtranslate,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-5622-6aea7b52579f172c9bf983e50b0b1bb7.yaml b/nuclei-templates/2015/CVE-2015-5622-6aea7b52579f172c9bf983e50b0b1bb7.yaml index 95986be58e..aa0a6a1718 100644 --- a/nuclei-templates/2015/CVE-2015-5622-6aea7b52579f172c9bf983e50b0b1bb7.yaml +++ b/nuclei-templates/2015/CVE-2015-5622-6aea7b52579f172c9bf983e50b0b1bb7.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode author: topscoder - severity: medium + severity: low description: > Cross-site scripting (XSS) vulnerability in WordPress before 4.2.3 allows remote authenticated users to inject arbitrary web script or HTML by leveraging the Author or Contributor role to place a crafted shortcode inside an HTML element, related to wp-includes/kses.php and wp-includes/shortcodes.php. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2015-5622 metadata: shodan-query: 'vuln:CVE-2015-5622' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-5623-313251dbeb7159d2f2f5a878dc3f4bb6.yaml b/nuclei-templates/2015/CVE-2015-5623-313251dbeb7159d2f2f5a878dc3f4bb6.yaml index 1dfbe95486..d5134aac32 100644 --- a/nuclei-templates/2015/CVE-2015-5623-313251dbeb7159d2f2f5a878dc3f4bb6.yaml +++ b/nuclei-templates/2015/CVE-2015-5623-313251dbeb7159d2f2f5a878dc3f4bb6.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.2.3 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > WordPress before 4.2.3 does not properly verify the edit_posts capability, which allows remote authenticated users to bypass intended access restrictions and create drafts by leveraging the Subscriber role, as demonstrated by a post-quickdraft-save action to wp-admin/post.php. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2015-5623 metadata: shodan-query: 'vuln:CVE-2015-5623' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-5714-f7283f346fe85f39acdb5e20af5f97a4.yaml b/nuclei-templates/2015/CVE-2015-5714-f7283f346fe85f39acdb5e20af5f97a4.yaml index cc858ac706..adb8cd3806 100644 --- a/nuclei-templates/2015/CVE-2015-5714-f7283f346fe85f39acdb5e20af5f97a4.yaml +++ b/nuclei-templates/2015/CVE-2015-5714-f7283f346fe85f39acdb5e20af5f97a4.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.3.1 - Cross-Site Scripting via Shortcodes author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in WordPress before 4.3.1 allows remote attackers to inject arbitrary web script or HTML by leveraging the mishandling of unclosed HTML elements during processing of shortcode tags. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2015-5714 metadata: shodan-query: 'vuln:CVE-2015-5714' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-5715-edc700db5b7f85733c96d120d88dd36f.yaml b/nuclei-templates/2015/CVE-2015-5715-edc700db5b7f85733c96d120d88dd36f.yaml index b175267b22..f1c91a5250 100644 --- a/nuclei-templates/2015/CVE-2015-5715-edc700db5b7f85733c96d120d88dd36f.yaml +++ b/nuclei-templates/2015/CVE-2015-5715-edc700db5b7f85733c96d120d88dd36f.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.3.1 - Authorization Bypass to Information Disclosure author: topscoder - severity: medium + severity: high description: > The mw_editPost function in wp-includes/class-wp-xmlrpc-server.php in the XMLRPC subsystem in WordPress before 4.3.1 allows remote authenticated users to bypass intended access restrictions, and arrange for a private post to be published and sticky, via unspecified vectors. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2015-5715 metadata: shodan-query: 'vuln:CVE-2015-5715' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-5731-026d101570c060723759d89bd6e308cf.yaml b/nuclei-templates/2015/CVE-2015-5731-026d101570c060723759d89bd6e308cf.yaml index 23c87123ae..9ca0567667 100644 --- a/nuclei-templates/2015/CVE-2015-5731-026d101570c060723759d89bd6e308cf.yaml +++ b/nuclei-templates/2015/CVE-2015-5731-026d101570c060723759d89bd6e308cf.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.2.4 - Cross-Site Request Forgery to Post Lockage author: topscoder - severity: critical + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in wp-admin/post.php in WordPress before 4.2.4 allows remote attackers to hijack the authentication of administrators for requests that lock a post, and consequently cause a denial of service (editing blockage), via a get-post-lock action. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2015-5731 metadata: shodan-query: 'vuln:CVE-2015-5731' - tags: cve,wordpress,wp-core,critical + tags: cve,wordpress,wp-core,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-5732-eaaace6cb938cd367aee5bb46ada2d9a.yaml b/nuclei-templates/2015/CVE-2015-5732-eaaace6cb938cd367aee5bb46ada2d9a.yaml index 5cc5b9b0a2..611492c627 100644 --- a/nuclei-templates/2015/CVE-2015-5732-eaaace6cb938cd367aee5bb46ada2d9a.yaml +++ b/nuclei-templates/2015/CVE-2015-5732-eaaace6cb938cd367aee5bb46ada2d9a.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.2.4 - Cross-Site Scripting via Widget Title author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the form function in the WP_Nav_Menu_Widget class in wp-includes/default-widgets.php in WordPress before 4.2.4 allows remote attackers to inject arbitrary web script or HTML via a widget title. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2015-5732 metadata: shodan-query: 'vuln:CVE-2015-5732' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-5733-4e2310a226a845a4294681273e42b4e0.yaml b/nuclei-templates/2015/CVE-2015-5733-4e2310a226a845a4294681273e42b4e0.yaml index cf353fb0c4..c31bd244e3 100644 --- a/nuclei-templates/2015/CVE-2015-5733-4e2310a226a845a4294681273e42b4e0.yaml +++ b/nuclei-templates/2015/CVE-2015-5733-4e2310a226a845a4294681273e42b4e0.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.2.4 - Stored Cross-Site Scripting via accessibility-helper Title author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the refreshAdvancedAccessibilityOfItem function in wp-admin/js/nav-menu.js in WordPress before 4.2.4 allows remote attackers to inject arbitrary web script or HTML via an accessibility-helper title. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2015-5733 metadata: shodan-query: 'vuln:CVE-2015-5733' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-5734-5dbdb3a08effff0e267b66b5070f04cc.yaml b/nuclei-templates/2015/CVE-2015-5734-5dbdb3a08effff0e267b66b5070f04cc.yaml index 0c50cf0843..18803af519 100644 --- a/nuclei-templates/2015/CVE-2015-5734-5dbdb3a08effff0e267b66b5070f04cc.yaml +++ b/nuclei-templates/2015/CVE-2015-5734-5dbdb3a08effff0e267b66b5070f04cc.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.2.4 - Cross-Site Scripting in Theme Preview author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the legacy theme preview implementation in wp-includes/theme.php in WordPress before 4.2.4 allows remote attackers to inject arbitrary web script or HTML via a crafted string. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2015-5734 metadata: shodan-query: 'vuln:CVE-2015-5734' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-6238-43b0481b51b9c335093961e5a3ab3d80.yaml b/nuclei-templates/2015/CVE-2015-6238-43b0481b51b9c335093961e5a3ab3d80.yaml index b250ed1fa3..8872d235c3 100644 --- a/nuclei-templates/2015/CVE-2015-6238-43b0481b51b9c335093961e5a3ab3d80.yaml +++ b/nuclei-templates/2015/CVE-2015-6238-43b0481b51b9c335093961e5a3ab3d80.yaml @@ -4,7 +4,7 @@ info: name: > Google Analyticator <= 6.4.9.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Google Analyticator plugin before 6.4.9.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) ga_adsense, (2) ga_admin_disable_DimentionIndex, (3) ga_downloads_prefix, (4) ga_downloads, or (5) ga_outbound_prefix parameter in the google-analyticator page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/google-analyticator/" google-query: inurl:"/wp-content/plugins/google-analyticator/" shodan-query: 'vuln:CVE-2015-6238' - tags: cve,wordpress,wp-plugin,google-analyticator,medium + tags: cve,wordpress,wp-plugin,google-analyticator,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-6535-b86d996fd3fb32f4d4a2741c181e0be2.yaml b/nuclei-templates/2015/CVE-2015-6535-b86d996fd3fb32f4d4a2741c181e0be2.yaml index 9fc0eebe89..8c993b2361 100644 --- a/nuclei-templates/2015/CVE-2015-6535-b86d996fd3fb32f4d4a2741c181e0be2.yaml +++ b/nuclei-templates/2015/CVE-2015-6535-b86d996fd3fb32f4d4a2741c181e0be2.yaml @@ -4,7 +4,7 @@ info: name: > YouTube Embed <= 3.3.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in includes/options-profiles.php in the YouTube Embed plugin before 3.3.3 for WordPress allows remote administrators to inject arbitrary web script or HTML via the Profile name field (youtube_embed_name parameter). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/youtube-embed/" google-query: inurl:"/wp-content/plugins/youtube-embed/" shodan-query: 'vuln:CVE-2015-6535' - tags: cve,wordpress,wp-plugin,youtube-embed,medium + tags: cve,wordpress,wp-plugin,youtube-embed,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-6738-4e5782f54b030eb5a442bdadb5799911.yaml b/nuclei-templates/2015/CVE-2015-6738-4e5782f54b030eb5a442bdadb5799911.yaml index 1159bc9d62..b85577e002 100644 --- a/nuclei-templates/2015/CVE-2015-6738-4e5782f54b030eb5a442bdadb5799911.yaml +++ b/nuclei-templates/2015/CVE-2015-6738-4e5782f54b030eb5a442bdadb5799911.yaml @@ -4,7 +4,7 @@ info: name: > iFrame <= 4.0 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The iFrame plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘onload’ attribute found in the iFrame shortcode in versions up to, and including, 4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/iframe/" google-query: inurl:"/wp-content/plugins/iframe/" shodan-query: 'vuln:CVE-2015-6738' - tags: cve,wordpress,wp-plugin,iframe,medium + tags: cve,wordpress,wp-plugin,iframe,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-6805-6ffded2a3fa64429e9ee95b7a8bf44d5.yaml b/nuclei-templates/2015/CVE-2015-6805-6ffded2a3fa64429e9ee95b7a8bf44d5.yaml index 335bf13d18..6470a885e7 100644 --- a/nuclei-templates/2015/CVE-2015-6805-6ffded2a3fa64429e9ee95b7a8bf44d5.yaml +++ b/nuclei-templates/2015/CVE-2015-6805-6ffded2a3fa64429e9ee95b7a8bf44d5.yaml @@ -4,7 +4,7 @@ info: name: > MDC Private Message <= 1.0.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the MDC Private Message plugin 1.0.1 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the message field in a private message. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mdc-private-message/" google-query: inurl:"/wp-content/plugins/mdc-private-message/" shodan-query: 'vuln:CVE-2015-6805' - tags: cve,wordpress,wp-plugin,mdc-private-message,medium + tags: cve,wordpress,wp-plugin,mdc-private-message,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-6920-1a4e07a5bd173dbacaf88e7f59c17b91.yaml b/nuclei-templates/2015/CVE-2015-6920-1a4e07a5bd173dbacaf88e7f59c17b91.yaml index beba00c3a1..5e18e6b048 100644 --- a/nuclei-templates/2015/CVE-2015-6920-1a4e07a5bd173dbacaf88e7f59c17b91.yaml +++ b/nuclei-templates/2015/CVE-2015-6920-1a4e07a5bd173dbacaf88e7f59c17b91.yaml @@ -4,7 +4,7 @@ info: name: > sourceAFRICA <= 0.1.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in js/window.php in the sourceAFRICA plugin 0.1.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the wpbase parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sourceafrica/" google-query: inurl:"/wp-content/plugins/sourceafrica/" shodan-query: 'vuln:CVE-2015-6920' - tags: cve,wordpress,wp-plugin,sourceafrica,medium + tags: cve,wordpress,wp-plugin,sourceafrica,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-7357-3f3928c6559acc265ac4dc8abe8f4e68.yaml b/nuclei-templates/2015/CVE-2015-7357-3f3928c6559acc265ac4dc8abe8f4e68.yaml index 6bcfcc6146..5a23acd0d9 100644 --- a/nuclei-templates/2015/CVE-2015-7357-3f3928c6559acc265ac4dc8abe8f4e68.yaml +++ b/nuclei-templates/2015/CVE-2015-7357-3f3928c6559acc265ac4dc8abe8f4e68.yaml @@ -4,7 +4,7 @@ info: name: > uDesign Theme 2.3.0 - 2.7.9 - Unauthenticated DOM Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the uDesign (aka U-Design) theme 2.3.0 before 2.7.10 for WordPress allows remote attackers to inject arbitrary web script or HTML via a fragment identifier, as demonstrated by #. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/u-design/" google-query: inurl:"/wp-content/themes/u-design/" shodan-query: 'vuln:CVE-2015-7357' - tags: cve,wordpress,wp-theme,u-design,medium + tags: cve,wordpress,wp-theme,u-design,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-7386-e35ccf6a5d1ddada5f10422331d300df.yaml b/nuclei-templates/2015/CVE-2015-7386-e35ccf6a5d1ddada5f10422331d300df.yaml index 03e40ab6d1..f81777084c 100644 --- a/nuclei-templates/2015/CVE-2015-7386-e35ccf6a5d1ddada5f10422331d300df.yaml +++ b/nuclei-templates/2015/CVE-2015-7386-e35ccf6a5d1ddada5f10422331d300df.yaml @@ -4,7 +4,7 @@ info: name: > Gallery – Photo Albums Plugin < 1.3.47 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in includes/metaboxes.php in the Gallery - Photo Albums - Portfolio plugin 1.3.47 for WordPress allow remote authenticated users to inject arbitrary web script or HTML via the (1) Media Title or (2) Media Subtitle fields. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-media-gallery/" google-query: inurl:"/wp-content/plugins/easy-media-gallery/" shodan-query: 'vuln:CVE-2015-7386' - tags: cve,wordpress,wp-plugin,easy-media-gallery,medium + tags: cve,wordpress,wp-plugin,easy-media-gallery,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-7527-1a5984e73d9bda9668de2c9f32433df9.yaml b/nuclei-templates/2015/CVE-2015-7527-1a5984e73d9bda9668de2c9f32433df9.yaml index 50bdbb9d14..cd421ed446 100644 --- a/nuclei-templates/2015/CVE-2015-7527-1a5984e73d9bda9668de2c9f32433df9.yaml +++ b/nuclei-templates/2015/CVE-2015-7527-1a5984e73d9bda9668de2c9f32433df9.yaml @@ -4,7 +4,7 @@ info: name: > Cool Video Gallery <= 1.9 - Authenticated Command Injection author: topscoder - severity: high + severity: low description: > lib/core.php in the Cool Video Gallery plugin 1.9 for WordPress allows remote attackers to execute arbitrary code via shell metacharacters in the "Width of preview image" and possibly other input fields in the "Video Gallery Settings" page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cool-video-gallery/" google-query: inurl:"/wp-content/plugins/cool-video-gallery/" shodan-query: 'vuln:CVE-2015-7527' - tags: cve,wordpress,wp-plugin,cool-video-gallery,high + tags: cve,wordpress,wp-plugin,cool-video-gallery,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-7682-c271e79e457792d8093dce56ebc058d7.yaml b/nuclei-templates/2015/CVE-2015-7682-c271e79e457792d8093dce56ebc058d7.yaml index 7b10cbb5d1..74cebd2088 100644 --- a/nuclei-templates/2015/CVE-2015-7682-c271e79e457792d8093dce56ebc058d7.yaml +++ b/nuclei-templates/2015/CVE-2015-7682-c271e79e457792d8093dce56ebc058d7.yaml @@ -4,7 +4,7 @@ info: name: > Pie Register – User Registration Forms < 2.0.19 - Authenticated SQL Injection author: topscoder - severity: medium + severity: low description: > Multiple SQL injection vulnerabilities in pie-register/pie-register.php in the Pie Register plugin before 2.0.19 for WordPress allow remote administrators to execute arbitrary SQL commands via the (1) select_invitaion_code_bulk_option or (2) invi_del_id parameter in the pie-invitation-codes page to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pie-register/" google-query: inurl:"/wp-content/plugins/pie-register/" shodan-query: 'vuln:CVE-2015-7682' - tags: cve,wordpress,wp-plugin,pie-register,medium + tags: cve,wordpress,wp-plugin,pie-register,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-7791-72bbf06194176f982771d77cb4853bda.yaml b/nuclei-templates/2015/CVE-2015-7791-72bbf06194176f982771d77cb4853bda.yaml index 47cf7a3034..670aad6913 100644 --- a/nuclei-templates/2015/CVE-2015-7791-72bbf06194176f982771d77cb4853bda.yaml +++ b/nuclei-templates/2015/CVE-2015-7791-72bbf06194176f982771d77cb4853bda.yaml @@ -4,7 +4,7 @@ info: name: > Welcart e-Commerce < 1.5.3 - SQL Injection author: topscoder - severity: high + severity: critical description: > Multiple SQL injection vulnerabilities in admin.php in the Collne Welcart plugin before 1.5.3 for WordPress allow remote authenticated users to execute arbitrary SQL commands via the (1) search[column] or (2) switch parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/usc-e-shop/" google-query: inurl:"/wp-content/plugins/usc-e-shop/" shodan-query: 'vuln:CVE-2015-7791' - tags: cve,wordpress,wp-plugin,usc-e-shop,high + tags: cve,wordpress,wp-plugin,usc-e-shop,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-7806-19a0491cf914c310a86ae542abd14b9a.yaml b/nuclei-templates/2015/CVE-2015-7806-19a0491cf914c310a86ae542abd14b9a.yaml index 7e132adbbe..2795465c2f 100644 --- a/nuclei-templates/2015/CVE-2015-7806-19a0491cf914c310a86ae542abd14b9a.yaml +++ b/nuclei-templates/2015/CVE-2015-7806-19a0491cf914c310a86ae542abd14b9a.yaml @@ -4,7 +4,7 @@ info: name: > Form Manager <= 1.7.2 - Authenticated Remote Command Execution author: topscoder - severity: critical + severity: low description: > Eval injection vulnerability in the fm_saveHelperGatherItems function in ajax.php in the Form Manager plugin before 1.7.3 for WordPress allows remote attackers to execute arbitrary code via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wordpress-form-manager/" google-query: inurl:"/wp-content/plugins/wordpress-form-manager/" shodan-query: 'vuln:CVE-2015-7806' - tags: cve,wordpress,wp-plugin,wordpress-form-manager,critical + tags: cve,wordpress,wp-plugin,wordpress-form-manager,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-7989-c8253916783474b27e7325c9525aa970.yaml b/nuclei-templates/2015/CVE-2015-7989-c8253916783474b27e7325c9525aa970.yaml index 40f3ebed65..d7ab2f0d86 100644 --- a/nuclei-templates/2015/CVE-2015-7989-c8253916783474b27e7325c9525aa970.yaml +++ b/nuclei-templates/2015/CVE-2015-7989-c8253916783474b27e7325c9525aa970.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.3.1 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Cross-site scripting (XSS) vulnerability in the user list table in WordPress before 4.3.1 allows remote authenticated users to inject arbitrary web script or HTML via a crafted e-mail address, a different vulnerability than CVE-2015-5714. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2015-7989 metadata: shodan-query: 'vuln:CVE-2015-7989' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-8350-7ebd0ae08ee9eace1c6d1e72c60c16e5.yaml b/nuclei-templates/2015/CVE-2015-8350-7ebd0ae08ee9eace1c6d1e72c60c16e5.yaml index 774a9fccaa..67045f2fbb 100644 --- a/nuclei-templates/2015/CVE-2015-8350-7ebd0ae08ee9eace1c6d1e72c60c16e5.yaml +++ b/nuclei-templates/2015/CVE-2015-8350-7ebd0ae08ee9eace1c6d1e72c60c16e5.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Calls to Action < 2.5.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Calls to Action plugin before 2.5.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) open-tab parameter in a wp_cta_global_settings action to wp-admin/edit.php or (2) wp-cta-variation-id parameter to ab-testing-call-to-action-example/. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cta/" google-query: inurl:"/wp-content/plugins/cta/" shodan-query: 'vuln:CVE-2015-8350' - tags: cve,wordpress,wp-plugin,cta,medium + tags: cve,wordpress,wp-plugin,cta,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9229-41d56c1ae043586e69a9cbdf8e53ac0a.yaml b/nuclei-templates/2015/CVE-2015-9229-41d56c1ae043586e69a9cbdf8e53ac0a.yaml index 2b758afd3e..8fef2c3fd2 100644 --- a/nuclei-templates/2015/CVE-2015-9229-41d56c1ae043586e69a9cbdf8e53ac0a.yaml +++ b/nuclei-templates/2015/CVE-2015-9229-41d56c1ae043586e69a9cbdf8e53ac0a.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Gallery Plugin – NextGEN Gallery <= 2.1.15 - Authenticated (Admin+) Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > In the nggallery-manage-gallery page in the Photocrati NextGEN Gallery plugin 2.1.15 for WordPress, XSS is possible for remote authenticated administrators via the images[1][alttext] parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nextgen-gallery/" google-query: inurl:"/wp-content/plugins/nextgen-gallery/" shodan-query: 'vuln:CVE-2015-9229' - tags: cve,wordpress,wp-plugin,nextgen-gallery,medium + tags: cve,wordpress,wp-plugin,nextgen-gallery,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9230-05b396118a681cd132367b6e58e8468f.yaml b/nuclei-templates/2015/CVE-2015-9230-05b396118a681cd132367b6e58e8468f.yaml index dd3cfcd498..ad267aa26a 100644 --- a/nuclei-templates/2015/CVE-2015-9230-05b396118a681cd132367b6e58e8468f.yaml +++ b/nuclei-templates/2015/CVE-2015-9230-05b396118a681cd132367b6e58e8468f.yaml @@ -4,7 +4,7 @@ info: name: > BulletProof Security < .52.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > In the admin/db-backup-security/db-backup-security.php page in the BulletProof Security plugin before .52.5 for WordPress, XSS is possible for remote authenticated administrators via the DBTablePrefix parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bulletproof-security/" google-query: inurl:"/wp-content/plugins/bulletproof-security/" shodan-query: 'vuln:CVE-2015-9230' - tags: cve,wordpress,wp-plugin,bulletproof-security,medium + tags: cve,wordpress,wp-plugin,bulletproof-security,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9233-33bb20c48315e8c455839c78ef66e1b1.yaml b/nuclei-templates/2015/CVE-2015-9233-33bb20c48315e8c455839c78ef66e1b1.yaml index 3605524ca3..9ad9e04efe 100644 --- a/nuclei-templates/2015/CVE-2015-9233-33bb20c48315e8c455839c78ef66e1b1.yaml +++ b/nuclei-templates/2015/CVE-2015-9233-33bb20c48315e8c455839c78ef66e1b1.yaml @@ -4,7 +4,7 @@ info: name: > CP Contact Form with PayPal < 1.1.6 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The cp-contact-form-with-paypal (aka CP Contact Form with PayPal) plugin before 1.1.6 for WordPress has CSRF with resultant XSS, related to cp_contactformpp.php and cp_contactformpp_admin_int_list.inc.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cp-contact-form-with-paypal/" google-query: inurl:"/wp-content/plugins/cp-contact-form-with-paypal/" shodan-query: 'vuln:CVE-2015-9233' - tags: cve,wordpress,wp-plugin,cp-contact-form-with-paypal,high + tags: cve,wordpress,wp-plugin,cp-contact-form-with-paypal,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9234-4612690a2b5b9e2adc467251d2200410.yaml b/nuclei-templates/2015/CVE-2015-9234-4612690a2b5b9e2adc467251d2200410.yaml index c8602d5813..d448fe2ffd 100644 --- a/nuclei-templates/2015/CVE-2015-9234-4612690a2b5b9e2adc467251d2200410.yaml +++ b/nuclei-templates/2015/CVE-2015-9234-4612690a2b5b9e2adc467251d2200410.yaml @@ -4,7 +4,7 @@ info: name: > CP Contact Form with PayPal < 1.1.6 - SQL Injection author: topscoder - severity: high + severity: critical description: > The CP Contact Form with PayPal plugin for WordPress is vulnerable to SQL Injection via the 'cp_contactformpp_id' parameter found in the 'cp_contactformpp.php' file in versions up to 1.1.6 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cp-contact-form-with-paypal/" google-query: inurl:"/wp-content/plugins/cp-contact-form-with-paypal/" shodan-query: 'vuln:CVE-2015-9234' - tags: cve,wordpress,wp-plugin,cp-contact-form-with-paypal,high + tags: cve,wordpress,wp-plugin,cp-contact-form-with-paypal,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9270-a669ab86f241324d8d2f2b22eaec997d.yaml b/nuclei-templates/2015/CVE-2015-9270-a669ab86f241324d8d2f2b22eaec997d.yaml index e42b612650..a533e81570 100644 --- a/nuclei-templates/2015/CVE-2015-9270-a669ab86f241324d8d2f2b22eaec997d.yaml +++ b/nuclei-templates/2015/CVE-2015-9270-a669ab86f241324d8d2f2b22eaec997d.yaml @@ -4,7 +4,7 @@ info: name: > The Holiday Calendar < 1.11.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > XSS exists in the the-holiday-calendar plugin before 1.11.3 for WordPress via the thc-month parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/the-holiday-calendar/" google-query: inurl:"/wp-content/plugins/the-holiday-calendar/" shodan-query: 'vuln:CVE-2015-9270' - tags: cve,wordpress,wp-plugin,the-holiday-calendar,medium + tags: cve,wordpress,wp-plugin,the-holiday-calendar,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9273-c568408b66270ee8858beb6b5337a826.yaml b/nuclei-templates/2015/CVE-2015-9273-c568408b66270ee8858beb6b5337a826.yaml index e449b55714..27123fd7cd 100644 --- a/nuclei-templates/2015/CVE-2015-9273-c568408b66270ee8858beb6b5337a826.yaml +++ b/nuclei-templates/2015/CVE-2015-9273-c568408b66270ee8858beb6b5337a826.yaml @@ -4,7 +4,7 @@ info: name: > Slimstat Analytics < 4.1.6.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-slimstat (aka Slimstat Analytics) plugin before 4.1.6.1 for WordPress has XSS via an HTTP Referer header, or via a field associated with JavaScript-based Referer tracking. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-slimstat/" google-query: inurl:"/wp-content/plugins/wp-slimstat/" shodan-query: 'vuln:CVE-2015-9273' - tags: cve,wordpress,wp-plugin,wp-slimstat,medium + tags: cve,wordpress,wp-plugin,wp-slimstat,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9293-5d289d7e578bce569fb34678a49e0c92.yaml b/nuclei-templates/2015/CVE-2015-9293-5d289d7e578bce569fb34678a49e0c92.yaml index afdd5dd8ae..6c3679a9db 100644 --- a/nuclei-templates/2015/CVE-2015-9293-5d289d7e578bce569fb34678a49e0c92.yaml +++ b/nuclei-templates/2015/CVE-2015-9293-5d289d7e578bce569fb34678a49e0c92.yaml @@ -4,7 +4,7 @@ info: name: > All In One WP Security & Firewall <= 3.9.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The all-in-one-wp-security-and-firewall plugin before 3.9.8 for WordPress has XSS in the unlock request feature. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" shodan-query: 'vuln:CVE-2015-9293' - tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,medium + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9295-7d2288f1e4c8fb646fdb55a372b6200a.yaml b/nuclei-templates/2015/CVE-2015-9295-7d2288f1e4c8fb646fdb55a372b6200a.yaml index e792425641..845cd4f5c1 100644 --- a/nuclei-templates/2015/CVE-2015-9295-7d2288f1e4c8fb646fdb55a372b6200a.yaml +++ b/nuclei-templates/2015/CVE-2015-9295-7d2288f1e4c8fb646fdb55a372b6200a.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form by BestWebSoft <= 3.95 - ReflectedCross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Contact Form by BestWebSoft plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 3.95 due to insufficient input sanitization and output escaping on the 'category' parameter. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute in a victim's browser granted they can trick a victim into performing an action, such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-plugin/" google-query: inurl:"/wp-content/plugins/contact-form-plugin/" shodan-query: 'vuln:CVE-2015-9295' - tags: cve,wordpress,wp-plugin,contact-form-plugin,medium + tags: cve,wordpress,wp-plugin,contact-form-plugin,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9297-af430c9858b5bde975d56075509bcf57.yaml b/nuclei-templates/2015/CVE-2015-9297-af430c9858b5bde975d56075509bcf57.yaml index 9786ae95e2..26fe85f72a 100644 --- a/nuclei-templates/2015/CVE-2015-9297-af430c9858b5bde975d56075509bcf57.yaml +++ b/nuclei-templates/2015/CVE-2015-9297-af430c9858b5bde975d56075509bcf57.yaml @@ -4,7 +4,7 @@ info: name: > Events Manager <= 5.5.7.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The events-manager plugin before 5.6 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/events-manager/" google-query: inurl:"/wp-content/plugins/events-manager/" shodan-query: 'vuln:CVE-2015-9297' - tags: cve,wordpress,wp-plugin,events-manager,medium + tags: cve,wordpress,wp-plugin,events-manager,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9299-3f14554541d5c07fa1b8df4c175de3d3.yaml b/nuclei-templates/2015/CVE-2015-9299-3f14554541d5c07fa1b8df4c175de3d3.yaml index 6d1e1b34a2..0df50ef4fc 100644 --- a/nuclei-templates/2015/CVE-2015-9299-3f14554541d5c07fa1b8df4c175de3d3.yaml +++ b/nuclei-templates/2015/CVE-2015-9299-3f14554541d5c07fa1b8df4c175de3d3.yaml @@ -4,7 +4,7 @@ info: name: > Events Manager < 5.5.7.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The events-manager plugin before 5.5.7.1 for WordPress has DOM XSS via the dbem_event_reapproved_email_body parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/events-manager/" google-query: inurl:"/wp-content/plugins/events-manager/" shodan-query: 'vuln:CVE-2015-9299' - tags: cve,wordpress,wp-plugin,events-manager,medium + tags: cve,wordpress,wp-plugin,events-manager,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9300-7f61d132e9ad7bb4333f632fb4ac561f.yaml b/nuclei-templates/2015/CVE-2015-9300-7f61d132e9ad7bb4333f632fb4ac561f.yaml index 536099c96b..cac86bc712 100644 --- a/nuclei-templates/2015/CVE-2015-9300-7f61d132e9ad7bb4333f632fb4ac561f.yaml +++ b/nuclei-templates/2015/CVE-2015-9300-7f61d132e9ad7bb4333f632fb4ac561f.yaml @@ -4,7 +4,7 @@ info: name: > Events Manager < 5.5.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The events-manager plugin before 5.5.7 for WordPress has multiple XSS issues. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/events-manager/" google-query: inurl:"/wp-content/plugins/events-manager/" shodan-query: 'vuln:CVE-2015-9300' - tags: cve,wordpress,wp-plugin,events-manager,medium + tags: cve,wordpress,wp-plugin,events-manager,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9304-afb15d666e098434f8ebcb7a76b5d273.yaml b/nuclei-templates/2015/CVE-2015-9304-afb15d666e098434f8ebcb7a76b5d273.yaml index 34c746d5f4..bad0ce35b7 100644 --- a/nuclei-templates/2015/CVE-2015-9304-afb15d666e098434f8ebcb7a76b5d273.yaml +++ b/nuclei-templates/2015/CVE-2015-9304-afb15d666e098434f8ebcb7a76b5d273.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate Member <= 1.3.17 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The ultimate-member plugin before 1.3.18 for WordPress has XSS via text input. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-member/" google-query: inurl:"/wp-content/plugins/ultimate-member/" shodan-query: 'vuln:CVE-2015-9304' - tags: cve,wordpress,wp-plugin,ultimate-member,medium + tags: cve,wordpress,wp-plugin,ultimate-member,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9306-c5aaff2cbf4515e9a35f03f837f2957f.yaml b/nuclei-templates/2015/CVE-2015-9306-c5aaff2cbf4515e9a35f03f837f2957f.yaml index f572d3045e..d023a76048 100644 --- a/nuclei-templates/2015/CVE-2015-9306-c5aaff2cbf4515e9a35f03f837f2957f.yaml +++ b/nuclei-templates/2015/CVE-2015-9306-c5aaff2cbf4515e9a35f03f837f2957f.yaml @@ -4,7 +4,7 @@ info: name: > Easy Drag And drop All Import : WP Ultimate CSV Importer < 3.8.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-ultimate-csv-importer plugin before 3.8.1 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" shodan-query: 'vuln:CVE-2015-9306' - tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,medium + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9307-0677fc472ce6636d2560dd0fee27206d.yaml b/nuclei-templates/2015/CVE-2015-9307-0677fc472ce6636d2560dd0fee27206d.yaml index 979ac548b7..60230f16a4 100644 --- a/nuclei-templates/2015/CVE-2015-9307-0677fc472ce6636d2560dd0fee27206d.yaml +++ b/nuclei-templates/2015/CVE-2015-9307-0677fc472ce6636d2560dd0fee27206d.yaml @@ -4,7 +4,7 @@ info: name: > WP Google Map Plugin < 2.3.10 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The WP Google Map plugin before 2.3.10 for WordPress has CSRF in the add/edit location feature. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-google-map-plugin/" google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" shodan-query: 'vuln:CVE-2015-9307' - tags: cve,wordpress,wp-plugin,wp-google-map-plugin,high + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9308-6a35bf1797897f8d13c75911c491ac65.yaml b/nuclei-templates/2015/CVE-2015-9308-6a35bf1797897f8d13c75911c491ac65.yaml index c47190a834..9566ad23cc 100644 --- a/nuclei-templates/2015/CVE-2015-9308-6a35bf1797897f8d13c75911c491ac65.yaml +++ b/nuclei-templates/2015/CVE-2015-9308-6a35bf1797897f8d13c75911c491ac65.yaml @@ -4,7 +4,7 @@ info: name: > WP Google Map Plugin < 2.3.10 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The WP Google Map plugin before 2.3.10 for WordPress has CSRF in the add/edit map feature. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-google-map-plugin/" google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" shodan-query: 'vuln:CVE-2015-9308' - tags: cve,wordpress,wp-plugin,wp-google-map-plugin,high + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9309-09e6dfe7f784e608ed0fba91188d7274.yaml b/nuclei-templates/2015/CVE-2015-9309-09e6dfe7f784e608ed0fba91188d7274.yaml index d081fa55fe..3b1a10cfe5 100644 --- a/nuclei-templates/2015/CVE-2015-9309-09e6dfe7f784e608ed0fba91188d7274.yaml +++ b/nuclei-templates/2015/CVE-2015-9309-09e6dfe7f784e608ed0fba91188d7274.yaml @@ -4,7 +4,7 @@ info: name: > WP Google Map Plugin < 2.3.10 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The WP Google Map plugin before 2.3.10 for WordPress has CSRF in the add/edit category feature. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-google-map-plugin/" google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" shodan-query: 'vuln:CVE-2015-9309' - tags: cve,wordpress,wp-plugin,wp-google-map-plugin,high + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9317-266ba42edca3ad9aefeac2a819615d83.yaml b/nuclei-templates/2015/CVE-2015-9317-266ba42edca3ad9aefeac2a819615d83.yaml index db27d82976..b115fa1beb 100644 --- a/nuclei-templates/2015/CVE-2015-9317-266ba42edca3ad9aefeac2a819615d83.yaml +++ b/nuclei-templates/2015/CVE-2015-9317-266ba42edca3ad9aefeac2a819615d83.yaml @@ -4,7 +4,7 @@ info: name: > Awesome Support – WordPress HelpDesk & Support Plugin < 3.1.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The awesome-support plugin before 3.1.7 for WordPress has XSS via custom information messages. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/awesome-support/" google-query: inurl:"/wp-content/plugins/awesome-support/" shodan-query: 'vuln:CVE-2015-9317' - tags: cve,wordpress,wp-plugin,awesome-support,medium + tags: cve,wordpress,wp-plugin,awesome-support,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9320-6e42e23486d09ec34675722772aa1b90.yaml b/nuclei-templates/2015/CVE-2015-9320-6e42e23486d09ec34675722772aa1b90.yaml index 685c1de260..159f805ce2 100644 --- a/nuclei-templates/2015/CVE-2015-9320-6e42e23486d09ec34675722772aa1b90.yaml +++ b/nuclei-templates/2015/CVE-2015-9320-6e42e23486d09ec34675722772aa1b90.yaml @@ -4,7 +4,7 @@ info: name: > Option Tree <= 2.5.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The option-tree plugin before 2.5.4 for WordPress has XSS related to add_query_arg. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/option-tree/" google-query: inurl:"/wp-content/plugins/option-tree/" shodan-query: 'vuln:CVE-2015-9320' - tags: cve,wordpress,wp-plugin,option-tree,medium + tags: cve,wordpress,wp-plugin,option-tree,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9322-1bd28f72c9296305fff71e613d0c8c82.yaml b/nuclei-templates/2015/CVE-2015-9322-1bd28f72c9296305fff71e613d0c8c82.yaml index 0de7df40b0..ac7b258c9d 100644 --- a/nuclei-templates/2015/CVE-2015-9322-1bd28f72c9296305fff71e613d0c8c82.yaml +++ b/nuclei-templates/2015/CVE-2015-9322-1bd28f72c9296305fff71e613d0c8c82.yaml @@ -4,7 +4,7 @@ info: name: > Erident Custom Login and Dashboard <= 3.4.1 - Cross-Site Request Forgery to Stored Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > The Erident Custom Login and Dashboard plugin for WordPress is vulnerable to Cross-Site Request Forgery to Stored Cross-Site Scripting via the ‘er_options_up[dashboard_data_left]’ parameter in versions up to, and including, 3.4.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/erident-custom-login-and-dashboard/" google-query: inurl:"/wp-content/plugins/erident-custom-login-and-dashboard/" shodan-query: 'vuln:CVE-2015-9322' - tags: cve,wordpress,wp-plugin,erident-custom-login-and-dashboard,high + tags: cve,wordpress,wp-plugin,erident-custom-login-and-dashboard,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9329-5b6052811294a634af9b6d15efbb8d49.yaml b/nuclei-templates/2015/CVE-2015-9329-5b6052811294a634af9b6d15efbb8d49.yaml index 6b5f688e1a..8bf8a52f3c 100644 --- a/nuclei-templates/2015/CVE-2015-9329-5b6052811294a634af9b6d15efbb8d49.yaml +++ b/nuclei-templates/2015/CVE-2015-9329-5b6052811294a634af9b6d15efbb8d49.yaml @@ -14,17 +14,17 @@ info: cvss-score: 6.1 cve-id: CVE-2015-9329 metadata: - fofa-query: "wp-content/plugins/wp-all-import-pro/" - google-query: inurl:"/wp-content/plugins/wp-all-import-pro/" + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" shodan-query: 'vuln:CVE-2015-9329' - tags: cve,wordpress,wp-plugin,wp-all-import-pro,medium + tags: cve,wordpress,wp-plugin,wp-all-import,medium http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/wp-all-import-pro/readme.txt" + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "wp-all-import-pro" + - "wp-all-import" part: body - type: dsl dsl: - - compare_versions(version, '<= 4.1.1') \ No newline at end of file + - compare_versions(version, '<= 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/2015/CVE-2015-9331-81844f67a8cb300bf38ea9c090e351aa.yaml b/nuclei-templates/2015/CVE-2015-9331-81844f67a8cb300bf38ea9c090e351aa.yaml index f74d0b8ae3..a08580db8f 100644 --- a/nuclei-templates/2015/CVE-2015-9331-81844f67a8cb300bf38ea9c090e351aa.yaml +++ b/nuclei-templates/2015/CVE-2015-9331-81844f67a8cb300bf38ea9c090e351aa.yaml @@ -14,17 +14,17 @@ info: cvss-score: 7.5 cve-id: CVE-2015-9331 metadata: - fofa-query: "wp-content/plugins/wp-all-import-pro/" - google-query: inurl:"/wp-content/plugins/wp-all-import-pro/" + fofa-query: "wp-content/plugins/wp-all-import/" + google-query: inurl:"/wp-content/plugins/wp-all-import/" shodan-query: 'vuln:CVE-2015-9331' - tags: cve,wordpress,wp-plugin,wp-all-import-pro,high + tags: cve,wordpress,wp-plugin,wp-all-import,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/wp-all-import-pro/readme.txt" + - "{{BaseURL}}/wp-content/plugins/wp-all-import/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "wp-all-import-pro" + - "wp-all-import" part: body - type: dsl dsl: - - compare_versions(version, '< 4.1.1') \ No newline at end of file + - compare_versions(version, '< 3.2.4') \ No newline at end of file diff --git a/nuclei-templates/2015/CVE-2015-9339-558dd2abba5a0995e4e08d93b33b9766.yaml b/nuclei-templates/2015/CVE-2015-9339-558dd2abba5a0995e4e08d93b33b9766.yaml index 6d7fbca716..a18ee4b5b8 100644 --- a/nuclei-templates/2015/CVE-2015-9339-558dd2abba5a0995e4e08d93b33b9766.yaml +++ b/nuclei-templates/2015/CVE-2015-9339-558dd2abba5a0995e4e08d93b33b9766.yaml @@ -4,7 +4,7 @@ info: name: > WordPress File Upload < 2.7.1 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > The wp-file-upload plugin before 2.7.1 for WordPress has insufficient restrictions on upload of .js files. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-file-upload/" google-query: inurl:"/wp-content/plugins/wp-file-upload/" shodan-query: 'vuln:CVE-2015-9339' - tags: cve,wordpress,wp-plugin,wp-file-upload,high + tags: cve,wordpress,wp-plugin,wp-file-upload,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9342-7a4c9972726e4955d433f6a7b81c1d28.yaml b/nuclei-templates/2015/CVE-2015-9342-7a4c9972726e4955d433f6a7b81c1d28.yaml index 2879d286b1..c22b322a0d 100644 --- a/nuclei-templates/2015/CVE-2015-9342-7a4c9972726e4955d433f6a7b81c1d28.yaml +++ b/nuclei-templates/2015/CVE-2015-9342-7a4c9972726e4955d433f6a7b81c1d28.yaml @@ -4,7 +4,7 @@ info: name: > WP Rollback < 1.2.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-rollback plugin before 1.2.3 for WordPress has Cross-Site Scripting. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-rollback/" google-query: inurl:"/wp-content/plugins/wp-rollback/" shodan-query: 'vuln:CVE-2015-9342' - tags: cve,wordpress,wp-plugin,wp-rollback,medium + tags: cve,wordpress,wp-plugin,wp-rollback,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9343-79ab1b5d546d12b519823b2566724735.yaml b/nuclei-templates/2015/CVE-2015-9343-79ab1b5d546d12b519823b2566724735.yaml index 218c72e465..1d4adaaa29 100644 --- a/nuclei-templates/2015/CVE-2015-9343-79ab1b5d546d12b519823b2566724735.yaml +++ b/nuclei-templates/2015/CVE-2015-9343-79ab1b5d546d12b519823b2566724735.yaml @@ -4,7 +4,7 @@ info: name: > Rollback < 1.2.3 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The wp-rollback plugin before 1.2.3 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-rollback/" google-query: inurl:"/wp-content/plugins/wp-rollback/" shodan-query: 'vuln:CVE-2015-9343' - tags: cve,wordpress,wp-plugin,wp-rollback,high + tags: cve,wordpress,wp-plugin,wp-rollback,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9346-ab3c3e9805ecb63c9f5865d7cc04e6fb.yaml b/nuclei-templates/2015/CVE-2015-9346-ab3c3e9805ecb63c9f5865d7cc04e6fb.yaml index 5ad9cbb9eb..3a498a7317 100644 --- a/nuclei-templates/2015/CVE-2015-9346-ab3c3e9805ecb63c9f5865d7cc04e6fb.yaml +++ b/nuclei-templates/2015/CVE-2015-9346-ab3c3e9805ecb63c9f5865d7cc04e6fb.yaml @@ -4,7 +4,7 @@ info: name: > Polls CP < 1.0.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The cp-polls plugin before 1.0.5 for WordPress has XSS via the 'name' parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cp-polls/" google-query: inurl:"/wp-content/plugins/cp-polls/" shodan-query: 'vuln:CVE-2015-9346' - tags: cve,wordpress,wp-plugin,cp-polls,medium + tags: cve,wordpress,wp-plugin,cp-polls,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9347-2304e691feb866a99a567fd410649f69.yaml b/nuclei-templates/2015/CVE-2015-9347-2304e691feb866a99a567fd410649f69.yaml index 83f22678bf..c616819db3 100644 --- a/nuclei-templates/2015/CVE-2015-9347-2304e691feb866a99a567fd410649f69.yaml +++ b/nuclei-templates/2015/CVE-2015-9347-2304e691feb866a99a567fd410649f69.yaml @@ -4,7 +4,7 @@ info: name: > Plotly <= 1.0.2 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Plotly plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-plotly/" google-query: inurl:"/wp-content/plugins/wp-plotly/" shodan-query: 'vuln:CVE-2015-9347' - tags: cve,wordpress,wp-plugin,wp-plotly,medium + tags: cve,wordpress,wp-plugin,wp-plotly,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9353-1a55c20ce9650829e57b6e448599ddb2.yaml b/nuclei-templates/2015/CVE-2015-9353-1a55c20ce9650829e57b6e448599ddb2.yaml index 9050dd7224..9a6a27fa42 100644 --- a/nuclei-templates/2015/CVE-2015-9353-1a55c20ce9650829e57b6e448599ddb2.yaml +++ b/nuclei-templates/2015/CVE-2015-9353-1a55c20ce9650829e57b6e448599ddb2.yaml @@ -4,7 +4,7 @@ info: name: > GigPress <= 2.3.10 - SQL Injection author: topscoder - severity: high + severity: critical description: > The gigpress plugin before 2.3.11 for WordPress has SQL injection in the admin area, a different vulnerability than CVE-2015-4066. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gigpress/" google-query: inurl:"/wp-content/plugins/gigpress/" shodan-query: 'vuln:CVE-2015-9353' - tags: cve,wordpress,wp-plugin,gigpress,high + tags: cve,wordpress,wp-plugin,gigpress,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9355-5e2cda3c648eae11638d20b64a6ac7f2.yaml b/nuclei-templates/2015/CVE-2015-9355-5e2cda3c648eae11638d20b64a6ac7f2.yaml index e9cc4c224c..60c60610b4 100644 --- a/nuclei-templates/2015/CVE-2015-9355-5e2cda3c648eae11638d20b64a6ac7f2.yaml +++ b/nuclei-templates/2015/CVE-2015-9355-5e2cda3c648eae11638d20b64a6ac7f2.yaml @@ -4,7 +4,7 @@ info: name: > Two Factor Authentication < 1.1.10 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The two-factor-authentication plugin before 1.1.10 for WordPress has XSS in the admin area. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/two-factor-authentication/" google-query: inurl:"/wp-content/plugins/two-factor-authentication/" shodan-query: 'vuln:CVE-2015-9355' - tags: cve,wordpress,wp-plugin,two-factor-authentication,medium + tags: cve,wordpress,wp-plugin,two-factor-authentication,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9356-f5789b694dfc2fa041ad362aac79382e.yaml b/nuclei-templates/2015/CVE-2015-9356-f5789b694dfc2fa041ad362aac79382e.yaml index 2b1ee1bbfd..d30b883914 100644 --- a/nuclei-templates/2015/CVE-2015-9356-f5789b694dfc2fa041ad362aac79382e.yaml +++ b/nuclei-templates/2015/CVE-2015-9356-f5789b694dfc2fa041ad362aac79382e.yaml @@ -4,7 +4,7 @@ info: name: > Viper GuestBook <= 1.3.15 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Viper GuestBook plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 1.3.15 due to insufficient input sanitization and output escaping on a query arg. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-vipergb/" google-query: inurl:"/wp-content/plugins/wp-vipergb/" shodan-query: 'vuln:CVE-2015-9356' - tags: cve,wordpress,wp-plugin,wp-vipergb,medium + tags: cve,wordpress,wp-plugin,wp-vipergb,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9357-cff9e4a18682397642168ab27f023202.yaml b/nuclei-templates/2015/CVE-2015-9357-cff9e4a18682397642168ab27f023202.yaml index 36b3206b6b..6f5a1ce957 100644 --- a/nuclei-templates/2015/CVE-2015-9357-cff9e4a18682397642168ab27f023202.yaml +++ b/nuclei-templates/2015/CVE-2015-9357-cff9e4a18682397642168ab27f023202.yaml @@ -4,7 +4,7 @@ info: name: > Akismet <= 3.1.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The akismet plugin before 3.1.5 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/akismet/" google-query: inurl:"/wp-content/plugins/akismet/" shodan-query: 'vuln:CVE-2015-9357' - tags: cve,wordpress,wp-plugin,akismet,medium + tags: cve,wordpress,wp-plugin,akismet,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9360-84290819179c80fad98664a6919a3707.yaml b/nuclei-templates/2015/CVE-2015-9360-84290819179c80fad98664a6919a3707.yaml index d93061a949..b3bef0a250 100644 --- a/nuclei-templates/2015/CVE-2015-9360-84290819179c80fad98664a6919a3707.yaml +++ b/nuclei-templates/2015/CVE-2015-9360-84290819179c80fad98664a6919a3707.yaml @@ -4,7 +4,7 @@ info: name: > UpdraftPlus <= 1.9.63 and UpdraftPlus (paid) <= 2.9.63 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The UpdraftPlus free plugin before 1.9.64 (and UpdraftPlus paid before 2.9.64) are vulnerable to Cross-Site Scripting via add_query_arg() and remove_query_arg(). reference: @@ -14,17 +14,17 @@ info: cvss-score: 6.1 cve-id: CVE-2015-9360 metadata: - fofa-query: "wp-content/plugins/updraftplus/" - google-query: inurl:"/wp-content/plugins/updraftplus/" + fofa-query: "wp-content/plugins/updraftplus-pro/" + google-query: inurl:"/wp-content/plugins/updraftplus-pro/" shodan-query: 'vuln:CVE-2015-9360' - tags: cve,wordpress,wp-plugin,updraftplus,medium + tags: cve,wordpress,wp-plugin,updraftplus-pro,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/updraftplus/readme.txt" + - "{{BaseURL}}/wp-content/plugins/updraftplus-pro/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "updraftplus" + - "updraftplus-pro" part: body - type: dsl dsl: - - compare_versions(version, '< 1.9.64') \ No newline at end of file + - compare_versions(version, '< 2.9.64') \ No newline at end of file diff --git a/nuclei-templates/2015/CVE-2015-9363-f7228bc923e4f7e6b922e94dc9e73ec2.yaml b/nuclei-templates/2015/CVE-2015-9363-f7228bc923e4f7e6b922e94dc9e73ec2.yaml index 178a74f7b9..ab7a2b492f 100644 --- a/nuclei-templates/2015/CVE-2015-9363-f7228bc923e4f7e6b922e94dc9e73ec2.yaml +++ b/nuclei-templates/2015/CVE-2015-9363-f7228bc923e4f7e6b922e94dc9e73ec2.yaml @@ -4,7 +4,7 @@ info: name: > iThemes Exchange < 1.12.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > iThemes Exchange before 1.12.0 for WordPress has XSS via add_query_arg() and remove_query_arg(). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ithemes-exchange/" google-query: inurl:"/wp-content/plugins/ithemes-exchange/" shodan-query: 'vuln:CVE-2015-9363' - tags: cve,wordpress,wp-plugin,ithemes-exchange,medium + tags: cve,wordpress,wp-plugin,ithemes-exchange,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9373-bf5b301e59797812833300e7fc88f201.yaml b/nuclei-templates/2015/CVE-2015-9373-bf5b301e59797812833300e7fc88f201.yaml index 9dd4482629..44b87397e4 100644 --- a/nuclei-templates/2015/CVE-2015-9373-bf5b301e59797812833300e7fc88f201.yaml +++ b/nuclei-templates/2015/CVE-2015-9373-bf5b301e59797812833300e7fc88f201.yaml @@ -4,7 +4,7 @@ info: name: > PayPal Pro Add-on for iThemes Exchange < 1.1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > PayPal Pro Add-on for iThemes Exchange before 1.1.0 for WordPress has XSS via add_query_arg() and remove_query_arg(). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/exchange-addon-paypal-pro/" google-query: inurl:"/wp-content/plugins/exchange-addon-paypal-pro/" shodan-query: 'vuln:CVE-2015-9373' - tags: cve,wordpress,wp-plugin,exchange-addon-paypal-pro,medium + tags: cve,wordpress,wp-plugin,exchange-addon-paypal-pro,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9375-3a6771ca38d2c7d158262d9fbdbb7826.yaml b/nuclei-templates/2015/CVE-2015-9375-3a6771ca38d2c7d158262d9fbdbb7826.yaml index e1722e38bf..cc198027ce 100644 --- a/nuclei-templates/2015/CVE-2015-9375-3a6771ca38d2c7d158262d9fbdbb7826.yaml +++ b/nuclei-templates/2015/CVE-2015-9375-3a6771ca38d2c7d158262d9fbdbb7826.yaml @@ -4,7 +4,7 @@ info: name: > Exchange Addon Table Rate Shipping < 1.1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Table Rate Shipping Add-on for iThemes Exchange before 1.1.0 for WordPress has XSS via add_query_arg() and remove_query_arg(). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/exchange-addon-table-rate-shipping/" google-query: inurl:"/wp-content/plugins/exchange-addon-table-rate-shipping/" shodan-query: 'vuln:CVE-2015-9375' - tags: cve,wordpress,wp-plugin,exchange-addon-table-rate-shipping,medium + tags: cve,wordpress,wp-plugin,exchange-addon-table-rate-shipping,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9379-f87c4c6d53b29231a0f57635f4d257a4.yaml b/nuclei-templates/2015/CVE-2015-9379-f87c4c6d53b29231a0f57635f4d257a4.yaml index 9749d6bbb9..bd25a1e91a 100644 --- a/nuclei-templates/2015/CVE-2015-9379-f87c4c6d53b29231a0f57635f4d257a4.yaml +++ b/nuclei-templates/2015/CVE-2015-9379-f87c4c6d53b29231a0f57635f4d257a4.yaml @@ -4,7 +4,7 @@ info: name: > iThemes Builder Style Manager < 0.7.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > iThemes Builder Style Manager before 0.7.7 for WordPress has XSS via add_query_arg() and remove_query_arg(). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/builder-style-manager/" google-query: inurl:"/wp-content/plugins/builder-style-manager/" shodan-query: 'vuln:CVE-2015-9379' - tags: cve,wordpress,wp-plugin,builder-style-manager,medium + tags: cve,wordpress,wp-plugin,builder-style-manager,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9380-6c9c7c812a4ff55c5f56daa5be2fd373.yaml b/nuclei-templates/2015/CVE-2015-9380-6c9c7c812a4ff55c5f56daa5be2fd373.yaml index a0fcb964c4..7b84b56093 100644 --- a/nuclei-templates/2015/CVE-2015-9380-6c9c7c812a4ff55c5f56daa5be2fd373.yaml +++ b/nuclei-templates/2015/CVE-2015-9380-6c9c7c812a4ff55c5f56daa5be2fd373.yaml @@ -4,7 +4,7 @@ info: name: > Photo Gallery by 10Web <= 1.2.41 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Photo Gallery plugin before 1.2.42 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/photo-gallery/" google-query: inurl:"/wp-content/plugins/photo-gallery/" shodan-query: 'vuln:CVE-2015-9380' - tags: cve,wordpress,wp-plugin,photo-gallery,high + tags: cve,wordpress,wp-plugin,photo-gallery,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9384-c81d2be092773595df7e11c3e43455e6.yaml b/nuclei-templates/2015/CVE-2015-9384-c81d2be092773595df7e11c3e43455e6.yaml index d6fe5efef0..0e9edc83b3 100644 --- a/nuclei-templates/2015/CVE-2015-9384-c81d2be092773595df7e11c3e43455e6.yaml +++ b/nuclei-templates/2015/CVE-2015-9384-c81d2be092773595df7e11c3e43455e6.yaml @@ -4,7 +4,7 @@ info: name: > Relevant – Related, Featured, Latest, and Popular Posts by BestWebSoft <= 1.0.7 - Authenticated (Admin+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Relevant Related Posts plugin up to and including version 1.0.7 for WordPress is vulnerable to stored cross-site scripting via the rltdpstsplgn_options parameter. This makes it possible for authenticated attackers, with administrator-level permissions, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/relevant/" google-query: inurl:"/wp-content/plugins/relevant/" shodan-query: 'vuln:CVE-2015-9384' - tags: cve,wordpress,wp-plugin,relevant,medium + tags: cve,wordpress,wp-plugin,relevant,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9385-105cf32b00a014867c600a479b6d44a5.yaml b/nuclei-templates/2015/CVE-2015-9385-105cf32b00a014867c600a479b6d44a5.yaml index ff92b29de5..161ab61eca 100644 --- a/nuclei-templates/2015/CVE-2015-9385-105cf32b00a014867c600a479b6d44a5.yaml +++ b/nuclei-templates/2015/CVE-2015-9385-105cf32b00a014867c600a479b6d44a5.yaml @@ -4,7 +4,7 @@ info: name: > Quotes and Tips by BestWebSoft < 1.20 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The quotes-and-tips plugin before 1.20 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/quotes-and-tips/" google-query: inurl:"/wp-content/plugins/quotes-and-tips/" shodan-query: 'vuln:CVE-2015-9385' - tags: cve,wordpress,wp-plugin,quotes-and-tips,medium + tags: cve,wordpress,wp-plugin,quotes-and-tips,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9388-5973e024827e1b713c70489b0018d6d3.yaml b/nuclei-templates/2015/CVE-2015-9388-5973e024827e1b713c70489b0018d6d3.yaml index 876ceb2574..4376cd937c 100644 --- a/nuclei-templates/2015/CVE-2015-9388-5973e024827e1b713c70489b0018d6d3.yaml +++ b/nuclei-templates/2015/CVE-2015-9388-5973e024827e1b713c70489b0018d6d3.yaml @@ -4,7 +4,7 @@ info: name: > mTouch Quiz <= 3.1.2 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > The mtouch-quiz plugin before 3.1.3 for WordPress has wp-admin/edit.php CSRF with resultant XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mtouch-quiz/" google-query: inurl:"/wp-content/plugins/mtouch-quiz/" shodan-query: 'vuln:CVE-2015-9388' - tags: cve,wordpress,wp-plugin,mtouch-quiz,high + tags: cve,wordpress,wp-plugin,mtouch-quiz,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9389-5ec6acde81c3a11c030c7e48fb82e3a0.yaml b/nuclei-templates/2015/CVE-2015-9389-5ec6acde81c3a11c030c7e48fb82e3a0.yaml index 93bab91ba3..3e7f28eee0 100644 --- a/nuclei-templates/2015/CVE-2015-9389-5ec6acde81c3a11c030c7e48fb82e3a0.yaml +++ b/nuclei-templates/2015/CVE-2015-9389-5ec6acde81c3a11c030c7e48fb82e3a0.yaml @@ -4,7 +4,7 @@ info: name: > mTouch Quiz <= 3.1.2 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The mTouch Quiz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the quiz name in versions up to, and including, 3.1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a victim access the quiz. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mtouch-quiz/" google-query: inurl:"/wp-content/plugins/mtouch-quiz/" shodan-query: 'vuln:CVE-2015-9389' - tags: cve,wordpress,wp-plugin,mtouch-quiz,medium + tags: cve,wordpress,wp-plugin,mtouch-quiz,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9390-9639beb38d5d1c45bea1fc0af8299ea1.yaml b/nuclei-templates/2015/CVE-2015-9390-9639beb38d5d1c45bea1fc0af8299ea1.yaml index 5c67ccb074..ec091c7046 100644 --- a/nuclei-templates/2015/CVE-2015-9390-9639beb38d5d1c45bea1fc0af8299ea1.yaml +++ b/nuclei-templates/2015/CVE-2015-9390-9639beb38d5d1c45bea1fc0af8299ea1.yaml @@ -4,7 +4,7 @@ info: name: > Admin Management Xtended <= 2.4.0 - Missing Authorization Checks author: topscoder - severity: medium + severity: high description: > The admin-management-xtended plugin before 2.4.0.1 for WordPress has privilege escalation because wp_ajax functions are mishandled. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/admin-management-xtended/" google-query: inurl:"/wp-content/plugins/admin-management-xtended/" shodan-query: 'vuln:CVE-2015-9390' - tags: cve,wordpress,wp-plugin,admin-management-xtended,medium + tags: cve,wordpress,wp-plugin,admin-management-xtended,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9391-6ef860020cf2393d29a3d4b7f6db6475.yaml b/nuclei-templates/2015/CVE-2015-9391-6ef860020cf2393d29a3d4b7f6db6475.yaml index 5580120225..24df0bf3c2 100644 --- a/nuclei-templates/2015/CVE-2015-9391-6ef860020cf2393d29a3d4b7f6db6475.yaml +++ b/nuclei-templates/2015/CVE-2015-9391-6ef860020cf2393d29a3d4b7f6db6475.yaml @@ -4,7 +4,7 @@ info: name: > YAWPP (Yet Another WordPress Petition Plugin) <= 1.2.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The yawpp plugin through 1.2.2 for WordPress has XSS via the field1 parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/yawpp/" google-query: inurl:"/wp-content/plugins/yawpp/" shodan-query: 'vuln:CVE-2015-9391' - tags: cve,wordpress,wp-plugin,yawpp,medium + tags: cve,wordpress,wp-plugin,yawpp,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9392-ccec5144654bab62438c0000b0cd001b.yaml b/nuclei-templates/2015/CVE-2015-9392-ccec5144654bab62438c0000b0cd001b.yaml index 317b62feb1..9e3b8bb541 100644 --- a/nuclei-templates/2015/CVE-2015-9392-ccec5144654bab62438c0000b0cd001b.yaml +++ b/nuclei-templates/2015/CVE-2015-9392-ccec5144654bab62438c0000b0cd001b.yaml @@ -4,7 +4,7 @@ info: name: > Users Ultra Membership, Users Community and Member Profiles With PayPal Integration Plugin < 1.5.63 - Cross-Site Scripting via p_name parameter author: topscoder - severity: medium + severity: high description: > The users-ultra plugin before 1.5.63 for WordPress has XSS via the p_name parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/users-ultra/" google-query: inurl:"/wp-content/plugins/users-ultra/" shodan-query: 'vuln:CVE-2015-9392' - tags: cve,wordpress,wp-plugin,users-ultra,medium + tags: cve,wordpress,wp-plugin,users-ultra,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9393-d7cc53ebc89a0251fb7abbabbb69e870.yaml b/nuclei-templates/2015/CVE-2015-9393-d7cc53ebc89a0251fb7abbabbb69e870.yaml index 2ffe07f10b..54c6e3f09b 100644 --- a/nuclei-templates/2015/CVE-2015-9393-d7cc53ebc89a0251fb7abbabbb69e870.yaml +++ b/nuclei-templates/2015/CVE-2015-9393-d7cc53ebc89a0251fb7abbabbb69e870.yaml @@ -4,7 +4,7 @@ info: name: > Users Ultra Membership, Users Community and Member Profiles With PayPal Integration Plugin < 1.5.63 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The users-ultra plugin before 1.5.63 for WordPress has XSS via the p_desc parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/users-ultra/" google-query: inurl:"/wp-content/plugins/users-ultra/" shodan-query: 'vuln:CVE-2015-9393' - tags: cve,wordpress,wp-plugin,users-ultra,medium + tags: cve,wordpress,wp-plugin,users-ultra,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9394-9ae9897b899214e88181a9313e35781d.yaml b/nuclei-templates/2015/CVE-2015-9394-9ae9897b899214e88181a9313e35781d.yaml index b5b932c379..5b000429f7 100644 --- a/nuclei-templates/2015/CVE-2015-9394-9ae9897b899214e88181a9313e35781d.yaml +++ b/nuclei-templates/2015/CVE-2015-9394-9ae9897b899214e88181a9313e35781d.yaml @@ -4,7 +4,7 @@ info: name: > Users Ultra Membership, Users Community and Member Profiles With PayPal Integration Plugin < 1.5.63 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The users-ultra plugin before 1.5.63 for WordPress has CSRF via action=package_add_new to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/users-ultra/" google-query: inurl:"/wp-content/plugins/users-ultra/" shodan-query: 'vuln:CVE-2015-9394' - tags: cve,wordpress,wp-plugin,users-ultra,high + tags: cve,wordpress,wp-plugin,users-ultra,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9395-4d92bacdb897e72bc7c9b888465bfb12.yaml b/nuclei-templates/2015/CVE-2015-9395-4d92bacdb897e72bc7c9b888465bfb12.yaml index d2addb5059..44feaa3721 100644 --- a/nuclei-templates/2015/CVE-2015-9395-4d92bacdb897e72bc7c9b888465bfb12.yaml +++ b/nuclei-templates/2015/CVE-2015-9395-4d92bacdb897e72bc7c9b888465bfb12.yaml @@ -4,7 +4,7 @@ info: name: > Users Ultra Membership Plugin <= 1.5.63 - Authenticated Blind SQL Injection author: topscoder - severity: high + severity: low description: > The users-ultra plugin before 1.5.64 for WordPress has SQL Injection via ajax actions, by exploiting following WP ajax actions SQL injections attacks can be performed: `edit_video`, `delete_photo`, `delete_gallery`, `delete_video`, `reload_photos`, `edit_gallery`, `edit_gallery_confirm`, `edit_photo`, `edit_photo_confirm`, `edit_video_confirm`, `set_as_main_photo`, `sort_photo_list`,`sort_gallery_list`, `reload_videos` @@ -20,7 +20,7 @@ info: fofa-query: "wp-content/plugins/users-ultra/" google-query: inurl:"/wp-content/plugins/users-ultra/" shodan-query: 'vuln:CVE-2015-9395' - tags: cve,wordpress,wp-plugin,users-ultra,high + tags: cve,wordpress,wp-plugin,users-ultra,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9397-e2b3a3b43a72a2751316fff54c8d6a22.yaml b/nuclei-templates/2015/CVE-2015-9397-e2b3a3b43a72a2751316fff54c8d6a22.yaml index 463f1aefe7..462748d2c7 100644 --- a/nuclei-templates/2015/CVE-2015-9397-e2b3a3b43a72a2751316fff54c8d6a22.yaml +++ b/nuclei-templates/2015/CVE-2015-9397-e2b3a3b43a72a2751316fff54c8d6a22.yaml @@ -4,7 +4,7 @@ info: name: > GoCodes <= 1.3.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The gocodes plugin through 1.3.5 for WordPress has wp-admin/tools.php deletegc XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gocodes/" google-query: inurl:"/wp-content/plugins/gocodes/" shodan-query: 'vuln:CVE-2015-9397' - tags: cve,wordpress,wp-plugin,gocodes,medium + tags: cve,wordpress,wp-plugin,gocodes,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9398-613714f5c2e87c49430822b55db25b79.yaml b/nuclei-templates/2015/CVE-2015-9398-613714f5c2e87c49430822b55db25b79.yaml index 92f9a779bd..ee248b8e69 100644 --- a/nuclei-templates/2015/CVE-2015-9398-613714f5c2e87c49430822b55db25b79.yaml +++ b/nuclei-templates/2015/CVE-2015-9398-613714f5c2e87c49430822b55db25b79.yaml @@ -4,7 +4,7 @@ info: name: > GoCodes <= 1.3.5 - Authenticated Blind SQL Injection author: topscoder - severity: high + severity: low description: > The GoCodes plugin for WordPress is vulnerable to blind SQL Injection via the ‘gcid’ parameter in versions up to, and including, 1.3.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for editor-level attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gocodes/" google-query: inurl:"/wp-content/plugins/gocodes/" shodan-query: 'vuln:CVE-2015-9398' - tags: cve,wordpress,wp-plugin,gocodes,high + tags: cve,wordpress,wp-plugin,gocodes,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9399-cca20bceb29d548b71fff2c6b265d9c3.yaml b/nuclei-templates/2015/CVE-2015-9399-cca20bceb29d548b71fff2c6b265d9c3.yaml index 4cf8c468b2..12e1e38ad4 100644 --- a/nuclei-templates/2015/CVE-2015-9399-cca20bceb29d548b71fff2c6b265d9c3.yaml +++ b/nuclei-templates/2015/CVE-2015-9399-cca20bceb29d548b71fff2c6b265d9c3.yaml @@ -4,7 +4,7 @@ info: name: > WP-Stats-Dashboard <= 2.9.4 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > The wp-stats-dashboard plugin through 2.9.4 for WordPress has admin/graph_trend.php type SQL injection. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-stats-dashboard/" google-query: inurl:"/wp-content/plugins/wp-stats-dashboard/" shodan-query: 'vuln:CVE-2015-9399' - tags: cve,wordpress,wp-plugin,wp-stats-dashboard,high + tags: cve,wordpress,wp-plugin,wp-stats-dashboard,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9400-f1ed96d1b2d98c3026e1dd704ae2087a.yaml b/nuclei-templates/2015/CVE-2015-9400-f1ed96d1b2d98c3026e1dd704ae2087a.yaml index 675e3c7317..39472956f0 100644 --- a/nuclei-templates/2015/CVE-2015-9400-f1ed96d1b2d98c3026e1dd704ae2087a.yaml +++ b/nuclei-templates/2015/CVE-2015-9400-f1ed96d1b2d98c3026e1dd704ae2087a.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Meta Robots <= 2.1 - SQL Injection author: topscoder - severity: high + severity: critical description: > The wordpress-meta-robots plugin through 2.1 for WordPress has wp-admin/post-new.php text SQL injection. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wordpress-meta-robots/" google-query: inurl:"/wp-content/plugins/wordpress-meta-robots/" shodan-query: 'vuln:CVE-2015-9400' - tags: cve,wordpress,wp-plugin,wordpress-meta-robots,high + tags: cve,wordpress,wp-plugin,wordpress-meta-robots,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9402-7d8cf8e800d2870ca230bed514c737c3.yaml b/nuclei-templates/2015/CVE-2015-9402-7d8cf8e800d2870ca230bed514c737c3.yaml index b4e3049ec5..66783f3c18 100644 --- a/nuclei-templates/2015/CVE-2015-9402-7d8cf8e800d2870ca230bed514c737c3.yaml +++ b/nuclei-templates/2015/CVE-2015-9402-7d8cf8e800d2870ca230bed514c737c3.yaml @@ -4,7 +4,7 @@ info: name: > Users Ultra Membership, Users Community and Member Profiles With PayPal Integration Plugin <= 1.5.58 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > The users-ultra plugin before 1.5.59 for WordPress has uultra-form-cvs-form-conf arbitrary file upload. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/users-ultra/" google-query: inurl:"/wp-content/plugins/users-ultra/" shodan-query: 'vuln:CVE-2015-9402' - tags: cve,wordpress,wp-plugin,users-ultra,high + tags: cve,wordpress,wp-plugin,users-ultra,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9405-59221c8c4cf4b83ed678f38b12740d87.yaml b/nuclei-templates/2015/CVE-2015-9405-59221c8c4cf4b83ed678f38b12740d87.yaml index 6a3160b9ea..5c84021ae6 100644 --- a/nuclei-templates/2015/CVE-2015-9405-59221c8c4cf4b83ed678f38b12740d87.yaml +++ b/nuclei-templates/2015/CVE-2015-9405-59221c8c4cf4b83ed678f38b12740d87.yaml @@ -4,7 +4,7 @@ info: name: > WP-Matomo Integration (WP-Piwik) < 1.0.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-piwik plugin before 1.0.5 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-piwik/" google-query: inurl:"/wp-content/plugins/wp-piwik/" shodan-query: 'vuln:CVE-2015-9405' - tags: cve,wordpress,wp-plugin,wp-piwik,medium + tags: cve,wordpress,wp-plugin,wp-piwik,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9407-68634c1a8c946edc4c46f0185186727b.yaml b/nuclei-templates/2015/CVE-2015-9407-68634c1a8c946edc4c46f0185186727b.yaml index 3565109c31..b8b0799160 100644 --- a/nuclei-templates/2015/CVE-2015-9407-68634c1a8c946edc4c46f0185186727b.yaml +++ b/nuclei-templates/2015/CVE-2015-9407-68634c1a8c946edc4c46f0185186727b.yaml @@ -4,7 +4,7 @@ info: name: > XPinner Lite <= 2.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The xpinner-lite plugin through 2.2 for WordPress has xpinner-lite.php XSS via several parameters. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/xpinner-lite/" google-query: inurl:"/wp-content/plugins/xpinner-lite/" shodan-query: 'vuln:CVE-2015-9407' - tags: cve,wordpress,wp-plugin,xpinner-lite,medium + tags: cve,wordpress,wp-plugin,xpinner-lite,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9408-7fd7a99aaec9de09c58a50b6b832a9fa.yaml b/nuclei-templates/2015/CVE-2015-9408-7fd7a99aaec9de09c58a50b6b832a9fa.yaml index de7897f849..dcf1ffafd7 100644 --- a/nuclei-templates/2015/CVE-2015-9408-7fd7a99aaec9de09c58a50b6b832a9fa.yaml +++ b/nuclei-templates/2015/CVE-2015-9408-7fd7a99aaec9de09c58a50b6b832a9fa.yaml @@ -4,7 +4,7 @@ info: name: > xPinner Lite <= 2.2 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The xpinner-lite plugin through 2.2 for WordPress has wp-admin/options-general.php CSRF with resultant XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/xpinner-lite/" google-query: inurl:"/wp-content/plugins/xpinner-lite/" shodan-query: 'vuln:CVE-2015-9408' - tags: cve,wordpress,wp-plugin,xpinner-lite,high + tags: cve,wordpress,wp-plugin,xpinner-lite,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9409-a800af3f915adeb03a4c49e2c0c22f5f.yaml b/nuclei-templates/2015/CVE-2015-9409-a800af3f915adeb03a4c49e2c0c22f5f.yaml index fbc8fa05f5..c0d5af3e2a 100644 --- a/nuclei-templates/2015/CVE-2015-9409-a800af3f915adeb03a4c49e2c0c22f5f.yaml +++ b/nuclei-templates/2015/CVE-2015-9409-a800af3f915adeb03a4c49e2c0c22f5f.yaml @@ -4,7 +4,7 @@ info: name: > ALO EasyMail Newsletter <= 2.6.00 - Cross-Site Request Forgery to Stored Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > The alo-easymail plugin before 2.6.01 for WordPress has CSRF with resultant XSS in pages/alo-easymail-admin-options.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/alo-easymail/" google-query: inurl:"/wp-content/plugins/alo-easymail/" shodan-query: 'vuln:CVE-2015-9409' - tags: cve,wordpress,wp-plugin,alo-easymail,high + tags: cve,wordpress,wp-plugin,alo-easymail,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9411-364140ec5050587d4743f8ad888c8004.yaml b/nuclei-templates/2015/CVE-2015-9411-364140ec5050587d4743f8ad888c8004.yaml index 2db3074bee..da78fc8a83 100644 --- a/nuclei-templates/2015/CVE-2015-9411-364140ec5050587d4743f8ad888c8004.yaml +++ b/nuclei-templates/2015/CVE-2015-9411-364140ec5050587d4743f8ad888c8004.yaml @@ -4,7 +4,7 @@ info: name: > Replyable – Subscribe to Comments and Reply by Email < 1.4.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Postmatic plugin before 1.4.6 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/postmatic/" google-query: inurl:"/wp-content/plugins/postmatic/" shodan-query: 'vuln:CVE-2015-9411' - tags: cve,wordpress,wp-plugin,postmatic,medium + tags: cve,wordpress,wp-plugin,postmatic,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9412-b8b913c56ed39f29c61eb2552bb40930.yaml b/nuclei-templates/2015/CVE-2015-9412-b8b913c56ed39f29c61eb2552bb40930.yaml index 15a0c3c9c9..3258d3f62a 100644 --- a/nuclei-templates/2015/CVE-2015-9412-b8b913c56ed39f29c61eb2552bb40930.yaml +++ b/nuclei-templates/2015/CVE-2015-9412-b8b913c56ed39f29c61eb2552bb40930.yaml @@ -4,7 +4,7 @@ info: name: > Royal Slider Plugin < 3.2.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Royal-Slider plugin before 3.2.7 for WordPress has XSS via the rstype parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/royal-slider/" google-query: inurl:"/wp-content/plugins/royal-slider/" shodan-query: 'vuln:CVE-2015-9412' - tags: cve,wordpress,wp-plugin,royal-slider,medium + tags: cve,wordpress,wp-plugin,royal-slider,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9416-fc97a63071c0bdeea490fe1b61f06d10.yaml b/nuclei-templates/2015/CVE-2015-9416-fc97a63071c0bdeea490fe1b61f06d10.yaml index 3ce3ff92a6..79220069ba 100644 --- a/nuclei-templates/2015/CVE-2015-9416-fc97a63071c0bdeea490fe1b61f06d10.yaml +++ b/nuclei-templates/2015/CVE-2015-9416-fc97a63071c0bdeea490fe1b61f06d10.yaml @@ -4,7 +4,7 @@ info: name: > WPML 2.9.3-3.2.6 - Cross-Site Scripting in Accept-Language Header author: topscoder - severity: medium + severity: high description: > The sitepress-multilingual-cms (WPML) plugin 2.9.3 to 3.2.6 for WordPress has XSS via the Accept-Language HTTP header. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sitepress-multilingual-cms/" google-query: inurl:"/wp-content/plugins/sitepress-multilingual-cms/" shodan-query: 'vuln:CVE-2015-9416' - tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,medium + tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9419-c23ce008dc2473271851552ad5775c2c.yaml b/nuclei-templates/2015/CVE-2015-9419-c23ce008dc2473271851552ad5775c2c.yaml index 840eb07e4f..1dd9d7e765 100644 --- a/nuclei-templates/2015/CVE-2015-9419-c23ce008dc2473271851552ad5775c2c.yaml +++ b/nuclei-templates/2015/CVE-2015-9419-c23ce008dc2473271851552ad5775c2c.yaml @@ -4,7 +4,7 @@ info: name: > Captain Slider <= 1.0.6 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Captain Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ctslider’ parameter in versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/captain-slider/" google-query: inurl:"/wp-content/plugins/captain-slider/" shodan-query: 'vuln:CVE-2015-9419' - tags: cve,wordpress,wp-plugin,captain-slider,medium + tags: cve,wordpress,wp-plugin,captain-slider,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9423-20fb78c96d003cc1a6ca252c0fdacd2e.yaml b/nuclei-templates/2015/CVE-2015-9423-20fb78c96d003cc1a6ca252c0fdacd2e.yaml index bdf1860965..f5d962ca9e 100644 --- a/nuclei-templates/2015/CVE-2015-9423-20fb78c96d003cc1a6ca252c0fdacd2e.yaml +++ b/nuclei-templates/2015/CVE-2015-9423-20fb78c96d003cc1a6ca252c0fdacd2e.yaml @@ -4,7 +4,7 @@ info: name: > PlugNedit Adaptive Editor < 6.2.0 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The PlugNedit Adaptive Editor plugin before 6.2.0 for WordPress has Cross-Site Scripting via wp-admin/admin-ajax.php?action=simple_fields_field_type_post_dialog_load PlugneditBGColor, PlugneditEditorMargin, plugnedit_width, pnemedcount, or plugneditcontent parameters due to insufficient input sanitization and output escaping. This makes it possible for Subscriber-level attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/plugnedit/" google-query: inurl:"/wp-content/plugins/plugnedit/" shodan-query: 'vuln:CVE-2015-9423' - tags: cve,wordpress,wp-plugin,plugnedit,medium + tags: cve,wordpress,wp-plugin,plugnedit,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9428-5ab744233de8cca4ab1cbaa602802c09.yaml b/nuclei-templates/2015/CVE-2015-9428-5ab744233de8cca4ab1cbaa602802c09.yaml index cb4cb521b0..7b985d3df2 100644 --- a/nuclei-templates/2015/CVE-2015-9428-5ab744233de8cca4ab1cbaa602802c09.yaml +++ b/nuclei-templates/2015/CVE-2015-9428-5ab744233de8cca4ab1cbaa602802c09.yaml @@ -4,7 +4,7 @@ info: name: > Privacy Policy Generator, Terms & Conditions Generator WordPress Plugin : WPLegalPages < 1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wplegalpages plugin before 1.1 for WordPress has CSRF with resultant XSS via wp-admin/admin.php?page=legal-pages lp-domain-name, lp-business-name, lp-phone, lp-street, lp-city-state, lp-country, lp-email, lp-address, or lp-niche parameters. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wplegalpages/" google-query: inurl:"/wp-content/plugins/wplegalpages/" shodan-query: 'vuln:CVE-2015-9428' - tags: cve,wordpress,wp-plugin,wplegalpages,medium + tags: cve,wordpress,wp-plugin,wplegalpages,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9433-7e1c6a231bffdfe14a3a2ce673d73608.yaml b/nuclei-templates/2015/CVE-2015-9433-7e1c6a231bffdfe14a3a2ce673d73608.yaml index d5760c9dc5..16536d3d93 100644 --- a/nuclei-templates/2015/CVE-2015-9433-7e1c6a231bffdfe14a3a2ce673d73608.yaml +++ b/nuclei-templates/2015/CVE-2015-9433-7e1c6a231bffdfe14a3a2ce673d73608.yaml @@ -4,7 +4,7 @@ info: name: > WP Social Bookmarking Light < 1.7.10 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-social-bookmarking-light plugin before 1.7.10 for WordPress has CSRF with resultant XSS via configuration parameters for Tumblr, Twitter, Facebook, etc. in wp-admin/options-general.php?page=wp-social-bookmarking-light%2Fmodules%2Fadmin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-social-bookmarking-light/" google-query: inurl:"/wp-content/plugins/wp-social-bookmarking-light/" shodan-query: 'vuln:CVE-2015-9433' - tags: cve,wordpress,wp-plugin,wp-social-bookmarking-light,medium + tags: cve,wordpress,wp-plugin,wp-social-bookmarking-light,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9434-10df21fe953fcd7c84f02b55e2e8260b.yaml b/nuclei-templates/2015/CVE-2015-9434-10df21fe953fcd7c84f02b55e2e8260b.yaml index 1c0a57e313..1633fd95a8 100644 --- a/nuclei-templates/2015/CVE-2015-9434-10df21fe953fcd7c84f02b55e2e8260b.yaml +++ b/nuclei-templates/2015/CVE-2015-9434-10df21fe953fcd7c84f02b55e2e8260b.yaml @@ -4,7 +4,7 @@ info: name: > Logo Carousel < 1.7.2 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Logo Carousel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘wp-admin/edit.php?post_type=kwlogos&page=kwlogos_settings' tab or tab_flags_order parameters in versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers requires contributor or higher role user authentication to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/kiwi-logo-carousel/" google-query: inurl:"/wp-content/plugins/kiwi-logo-carousel/" shodan-query: 'vuln:CVE-2015-9434' - tags: cve,wordpress,wp-plugin,kiwi-logo-carousel,medium + tags: cve,wordpress,wp-plugin,kiwi-logo-carousel,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9436-a4d9b1fab913268578f318671b68ca36.yaml b/nuclei-templates/2015/CVE-2015-9436-a4d9b1fab913268578f318671b68ca36.yaml index ac77747e03..71b22fe4d5 100644 --- a/nuclei-templates/2015/CVE-2015-9436-a4d9b1fab913268578f318671b68ca36.yaml +++ b/nuclei-templates/2015/CVE-2015-9436-a4d9b1fab913268578f318671b68ca36.yaml @@ -4,7 +4,7 @@ info: name: > Dynamic Widgets <= 1.5.10 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The dynamic-widgets plugin before 1.5.11 for WordPress has XSS via the wp-admin/admin-ajax.php?action=term_tree prefix or widget_id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/dynamic-widgets/" google-query: inurl:"/wp-content/plugins/dynamic-widgets/" shodan-query: 'vuln:CVE-2015-9436' - tags: cve,wordpress,wp-plugin,dynamic-widgets,medium + tags: cve,wordpress,wp-plugin,dynamic-widgets,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9437-7c8cf3109f4d4b196459b75b96aa728e.yaml b/nuclei-templates/2015/CVE-2015-9437-7c8cf3109f4d4b196459b75b96aa728e.yaml index f4ea78afde..83a4f81a58 100644 --- a/nuclei-templates/2015/CVE-2015-9437-7c8cf3109f4d4b196459b75b96aa728e.yaml +++ b/nuclei-templates/2015/CVE-2015-9437-7c8cf3109f4d4b196459b75b96aa728e.yaml @@ -4,7 +4,7 @@ info: name: > Dynamic Widgets <= 1.5.10 - Refletced Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The dynamic-widgets plugin before 1.5.11 for WordPress has CSRF with resultant XSS via the wp-admin/themes.php?page=dynwid-config page_limit parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/dynamic-widgets/" google-query: inurl:"/wp-content/plugins/dynamic-widgets/" shodan-query: 'vuln:CVE-2015-9437' - tags: cve,wordpress,wp-plugin,dynamic-widgets,medium + tags: cve,wordpress,wp-plugin,dynamic-widgets,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9438-c88811f07a28a64dae50ff3a4d1213f5.yaml b/nuclei-templates/2015/CVE-2015-9438-c88811f07a28a64dae50ff3a4d1213f5.yaml index 56149f449d..9a9aab4b06 100644 --- a/nuclei-templates/2015/CVE-2015-9438-c88811f07a28a64dae50ff3a4d1213f5.yaml +++ b/nuclei-templates/2015/CVE-2015-9438-c88811f07a28a64dae50ff3a4d1213f5.yaml @@ -4,7 +4,7 @@ info: name: > Display Widgets <= 2.03 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The display-widgets plugin before 2.04 for WordPress has XSS via the wp-admin/admin-ajax.php?action=dw_show_widget id_base, widget_number, or instance parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/display-widgets/" google-query: inurl:"/wp-content/plugins/display-widgets/" shodan-query: 'vuln:CVE-2015-9438' - tags: cve,wordpress,wp-plugin,display-widgets,medium + tags: cve,wordpress,wp-plugin,display-widgets,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9439-400e484570b51dd745ebe0689024ac48.yaml b/nuclei-templates/2015/CVE-2015-9439-400e484570b51dd745ebe0689024ac48.yaml index 1f1147341f..d1d3054c45 100644 --- a/nuclei-templates/2015/CVE-2015-9439-400e484570b51dd745ebe0689024ac48.yaml +++ b/nuclei-templates/2015/CVE-2015-9439-400e484570b51dd745ebe0689024ac48.yaml @@ -4,7 +4,7 @@ info: name: > AddThis Sharing Buttons <= 5.0.12 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The addthis plugin before 5.0.13 for WordPress has CSRF with resultant XSS via the wp-admin/options-general.php?page=addthis_social_widget pubid parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/addthis/" google-query: inurl:"/wp-content/plugins/addthis/" shodan-query: 'vuln:CVE-2015-9439' - tags: cve,wordpress,wp-plugin,addthis,medium + tags: cve,wordpress,wp-plugin,addthis,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9442-3231c8774c4d66bff9d3f46fb317e754.yaml b/nuclei-templates/2015/CVE-2015-9442-3231c8774c4d66bff9d3f46fb317e754.yaml index e608b69138..55ea88b3b8 100644 --- a/nuclei-templates/2015/CVE-2015-9442-3231c8774c4d66bff9d3f46fb317e754.yaml +++ b/nuclei-templates/2015/CVE-2015-9442-3231c8774c4d66bff9d3f46fb317e754.yaml @@ -4,7 +4,7 @@ info: name: > Avenir-soft Direct Download <= 1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The avenirsoft-directdownload plugin 1.0 for WordPress has CSRF with resultant XSS via wp-admin/admin.php?page=avenir_plugin. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/avenirsoft-directdownload/" google-query: inurl:"/wp-content/plugins/avenirsoft-directdownload/" shodan-query: 'vuln:CVE-2015-9442' - tags: cve,wordpress,wp-plugin,avenirsoft-directdownload,medium + tags: cve,wordpress,wp-plugin,avenirsoft-directdownload,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9443-5c23a6c70aea6e2ef9477919b8442851.yaml b/nuclei-templates/2015/CVE-2015-9443-5c23a6c70aea6e2ef9477919b8442851.yaml index 748645486d..03498483e5 100644 --- a/nuclei-templates/2015/CVE-2015-9443-5c23a6c70aea6e2ef9477919b8442851.yaml +++ b/nuclei-templates/2015/CVE-2015-9443-5c23a6c70aea6e2ef9477919b8442851.yaml @@ -4,7 +4,7 @@ info: name: > WP Accurate Form Data <= 1.2 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > The accurate-form-data-real-time-form-validation plugin 1.2 for WordPress has CSRF with resultant XSS via wp-admin/options-general.php?page=Accu_Data_WP. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/accurate-form-data-real-time-form-validation/" google-query: inurl:"/wp-content/plugins/accurate-form-data-real-time-form-validation/" shodan-query: 'vuln:CVE-2015-9443' - tags: cve,wordpress,wp-plugin,accurate-form-data-real-time-form-validation,high + tags: cve,wordpress,wp-plugin,accurate-form-data-real-time-form-validation,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9444-62fcd76831b1e2041b5f8a95a5780c32.yaml b/nuclei-templates/2015/CVE-2015-9444-62fcd76831b1e2041b5f8a95a5780c32.yaml index dd53c6da79..c20fbdbbe7 100644 --- a/nuclei-templates/2015/CVE-2015-9444-62fcd76831b1e2041b5f8a95a5780c32.yaml +++ b/nuclei-templates/2015/CVE-2015-9444-62fcd76831b1e2041b5f8a95a5780c32.yaml @@ -4,7 +4,7 @@ info: name: > Altos Connect <= 1.3.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The altos-connect plugin 1.3.0 for WordPress has XSS via the wp-content/plugins/altos-connect/jquery-validate/demo/demo/captcha/index.php/ PATH_SELF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/altos-connect/" google-query: inurl:"/wp-content/plugins/altos-connect/" shodan-query: 'vuln:CVE-2015-9444' - tags: cve,wordpress,wp-plugin,altos-connect,medium + tags: cve,wordpress,wp-plugin,altos-connect,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9445-103ae57e192be7c58d97324e70895c9f.yaml b/nuclei-templates/2015/CVE-2015-9445-103ae57e192be7c58d97324e70895c9f.yaml index 997aa25521..70ea02f1ba 100644 --- a/nuclei-templates/2015/CVE-2015-9445-103ae57e192be7c58d97324e70895c9f.yaml +++ b/nuclei-templates/2015/CVE-2015-9445-103ae57e192be7c58d97324e70895c9f.yaml @@ -4,7 +4,7 @@ info: name: > Unite Gallery Lite <= 1.4.6 - Cross-Site Request Forgery & Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > The unite-gallery-lite plugin before 1.5 for WordPress has CSRF and SQL injection via wp-admin/admin-ajax.php in a unitegallery_ajax_action operation. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/unite-gallery-lite/" google-query: inurl:"/wp-content/plugins/unite-gallery-lite/" shodan-query: 'vuln:CVE-2015-9445' - tags: cve,wordpress,wp-plugin,unite-gallery-lite,high + tags: cve,wordpress,wp-plugin,unite-gallery-lite,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9446-1ccd8092085adf5a5342024d683bb79b.yaml b/nuclei-templates/2015/CVE-2015-9446-1ccd8092085adf5a5342024d683bb79b.yaml index 835b66ea72..985652f847 100644 --- a/nuclei-templates/2015/CVE-2015-9446-1ccd8092085adf5a5342024d683bb79b.yaml +++ b/nuclei-templates/2015/CVE-2015-9446-1ccd8092085adf5a5342024d683bb79b.yaml @@ -4,7 +4,7 @@ info: name: > Unite Gallery Lite < 1.5 - SQL Injection author: topscoder - severity: high + severity: critical description: > The unite-gallery-lite plugin before 1.5 for WordPress has SQL injection via data[galleryID] to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/unite-gallery-lite/" google-query: inurl:"/wp-content/plugins/unite-gallery-lite/" shodan-query: 'vuln:CVE-2015-9446' - tags: cve,wordpress,wp-plugin,unite-gallery-lite,high + tags: cve,wordpress,wp-plugin,unite-gallery-lite,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9447-e8e6f489ccaee4d00c096c7d8c466fc5.yaml b/nuclei-templates/2015/CVE-2015-9447-e8e6f489ccaee4d00c096c7d8c466fc5.yaml index e2af475d8a..4f607e9cf5 100644 --- a/nuclei-templates/2015/CVE-2015-9447-e8e6f489ccaee4d00c096c7d8c466fc5.yaml +++ b/nuclei-templates/2015/CVE-2015-9447-e8e6f489ccaee4d00c096c7d8c466fc5.yaml @@ -4,7 +4,7 @@ info: name: > Unite Gallery Lite < 1.5 - Cross-Site Request Forgery and SQL Injection author: topscoder - severity: high + severity: medium description: > The unite-gallery-lite plugin before 1.5 for WordPress has CSRF and SQL injection via wp-admin/admin.php galleryid or id parameters. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/unite-gallery-lite/" google-query: inurl:"/wp-content/plugins/unite-gallery-lite/" shodan-query: 'vuln:CVE-2015-9447' - tags: cve,wordpress,wp-plugin,unite-gallery-lite,high + tags: cve,wordpress,wp-plugin,unite-gallery-lite,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9448-f386ff3f48b7d778335b6a97f6c41a43.yaml b/nuclei-templates/2015/CVE-2015-9448-f386ff3f48b7d778335b6a97f6c41a43.yaml index d994261451..26cf1cf40a 100644 --- a/nuclei-templates/2015/CVE-2015-9448-f386ff3f48b7d778335b6a97f6c41a43.yaml +++ b/nuclei-templates/2015/CVE-2015-9448-f386ff3f48b7d778335b6a97f6c41a43.yaml @@ -4,7 +4,7 @@ info: name: > SendPress Newsletters < 1.2 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > The sendpress plugin before 1.2 for WordPress has SQL Injection via the wp-admin/admin.php?page=sp-queue listid parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sendpress/" google-query: inurl:"/wp-content/plugins/sendpress/" shodan-query: 'vuln:CVE-2015-9448' - tags: cve,wordpress,wp-plugin,sendpress,high + tags: cve,wordpress,wp-plugin,sendpress,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9449-02bdb4a60f8caf982b09839a595e4b9c.yaml b/nuclei-templates/2015/CVE-2015-9449-02bdb4a60f8caf982b09839a595e4b9c.yaml index ffdb91c020..3909d5b622 100644 --- a/nuclei-templates/2015/CVE-2015-9449-02bdb4a60f8caf982b09839a595e4b9c.yaml +++ b/nuclei-templates/2015/CVE-2015-9449-02bdb4a60f8caf982b09839a595e4b9c.yaml @@ -4,7 +4,7 @@ info: name: > Microblog Poster < 1.6.2 - Authenticated Blind SQL Injection author: topscoder - severity: high + severity: low description: > The microblog-poster plugin before 1.6.2 for WordPress has SQL Injection via the wp-admin/options-general.php?page=microblogposter.php account_id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/microblog-poster/" google-query: inurl:"/wp-content/plugins/microblog-poster/" shodan-query: 'vuln:CVE-2015-9449' - tags: cve,wordpress,wp-plugin,microblog-poster,high + tags: cve,wordpress,wp-plugin,microblog-poster,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9453-0e68c0b9eccc4d13ea9a31e72c5947b1.yaml b/nuclei-templates/2015/CVE-2015-9453-0e68c0b9eccc4d13ea9a31e72c5947b1.yaml index 13f056d522..184a17292b 100644 --- a/nuclei-templates/2015/CVE-2015-9453-0e68c0b9eccc4d13ea9a31e72c5947b1.yaml +++ b/nuclei-templates/2015/CVE-2015-9453-0e68c0b9eccc4d13ea9a31e72c5947b1.yaml @@ -4,7 +4,7 @@ info: name: > Broken Link Manager < 0.6.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The broken-link-manager plugin before 0.6.0 for WordPress has XSS via the HTTP Referer or User-Agent header to a URL that does not exist. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/broken-link-manager/" google-query: inurl:"/wp-content/plugins/broken-link-manager/" shodan-query: 'vuln:CVE-2015-9453' - tags: cve,wordpress,wp-plugin,broken-link-manager,medium + tags: cve,wordpress,wp-plugin,broken-link-manager,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9454-60f28a7307d8376de999213f19e8d5bb.yaml b/nuclei-templates/2015/CVE-2015-9454-60f28a7307d8376de999213f19e8d5bb.yaml index ae13957637..99d34e3b11 100644 --- a/nuclei-templates/2015/CVE-2015-9454-60f28a7307d8376de999213f19e8d5bb.yaml +++ b/nuclei-templates/2015/CVE-2015-9454-60f28a7307d8376de999213f19e8d5bb.yaml @@ -4,7 +4,7 @@ info: name: > Smooth Slider < 2.7 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > The Smooth Slider plugin before 2.7 for WordPress has SQL Injection via the wp-admin/admin.php?page=smooth-slider-admin current_slider_id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/smooth-slider/" google-query: inurl:"/wp-content/plugins/smooth-slider/" shodan-query: 'vuln:CVE-2015-9454' - tags: cve,wordpress,wp-plugin,smooth-slider,high + tags: cve,wordpress,wp-plugin,smooth-slider,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9455-5f432c656be335dcd6d93a860c52a8ba.yaml b/nuclei-templates/2015/CVE-2015-9455-5f432c656be335dcd6d93a860c52a8ba.yaml index ea5a4001d9..2ae3c51eda 100644 --- a/nuclei-templates/2015/CVE-2015-9455-5f432c656be335dcd6d93a860c52a8ba.yaml +++ b/nuclei-templates/2015/CVE-2015-9455-5f432c656be335dcd6d93a860c52a8ba.yaml @@ -4,7 +4,7 @@ info: name: > BuddyPress Activity Plus <= 1.5 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The buddypress-activity-plus plugin before 1.6.2 for WordPress has CSRF with resultant directory traversal via the wp-admin/admin-ajax.php bpfb_photos[] parameter in a bpfb_remove_temp_images action. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/buddypress-activity-plus/" google-query: inurl:"/wp-content/plugins/buddypress-activity-plus/" shodan-query: 'vuln:CVE-2015-9455' - tags: cve,wordpress,wp-plugin,buddypress-activity-plus,high + tags: cve,wordpress,wp-plugin,buddypress-activity-plus,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9457-41859e395573554f98122582c8a8f0c6.yaml b/nuclei-templates/2015/CVE-2015-9457-41859e395573554f98122582c8a8f0c6.yaml index f3f9d025a4..c25edec7b3 100644 --- a/nuclei-templates/2015/CVE-2015-9457-41859e395573554f98122582c8a8f0c6.yaml +++ b/nuclei-templates/2015/CVE-2015-9457-41859e395573554f98122582c8a8f0c6.yaml @@ -4,7 +4,7 @@ info: name: > Pretty Links – Link Management, Branding, Tracking & Sharing Plugin <= 1.6.7 - SQL Injection author: topscoder - severity: high + severity: critical description: > The pretty-link plugin before 1.6.8 for WordPress has PrliLinksController::list_links SQL injection via the group parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pretty-link/" google-query: inurl:"/wp-content/plugins/pretty-link/" shodan-query: 'vuln:CVE-2015-9457' - tags: cve,wordpress,wp-plugin,pretty-link,high + tags: cve,wordpress,wp-plugin,pretty-link,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9458-4fdb668b4072805be7b723dcf1d44abb.yaml b/nuclei-templates/2015/CVE-2015-9458-4fdb668b4072805be7b723dcf1d44abb.yaml index 70a23674f7..e2a1685060 100644 --- a/nuclei-templates/2015/CVE-2015-9458-4fdb668b4072805be7b723dcf1d44abb.yaml +++ b/nuclei-templates/2015/CVE-2015-9458-4fdb668b4072805be7b723dcf1d44abb.yaml @@ -4,7 +4,7 @@ info: name: > SEO SearchTerms Tagging 2 <=1.535 - SQL Injection author: topscoder - severity: high + severity: critical description: > The searchterms-tagging-2 plugin through 1.535 for WordPress has SQL injection via the pk_stt2_db_get_popular_terms count parameter exploitable via CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/searchterms-tagging-2/" google-query: inurl:"/wp-content/plugins/searchterms-tagging-2/" shodan-query: 'vuln:CVE-2015-9458' - tags: cve,wordpress,wp-plugin,searchterms-tagging-2,high + tags: cve,wordpress,wp-plugin,searchterms-tagging-2,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9460-044e0b800aae833468f672b3d52648b9.yaml b/nuclei-templates/2015/CVE-2015-9460-044e0b800aae833468f672b3d52648b9.yaml index 08d854c6cf..c7e370659e 100644 --- a/nuclei-templates/2015/CVE-2015-9460-044e0b800aae833468f672b3d52648b9.yaml +++ b/nuclei-templates/2015/CVE-2015-9460-044e0b800aae833468f672b3d52648b9.yaml @@ -4,7 +4,7 @@ info: name: > Pinpoint Booking System – #1 WordPress Booking Plugin < 2.1 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > The booking-system plugin before 2.1 for WordPress has DOPBSPBackEndTranslation::display SQL injection via the language parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/booking-system/" google-query: inurl:"/wp-content/plugins/booking-system/" shodan-query: 'vuln:CVE-2015-9460' - tags: cve,wordpress,wp-plugin,booking-system,high + tags: cve,wordpress,wp-plugin,booking-system,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9461-18b2efc80a79b2c683b250abf8605dd3.yaml b/nuclei-templates/2015/CVE-2015-9461-18b2efc80a79b2c683b250abf8605dd3.yaml index 7439375eb0..140476e8ae 100644 --- a/nuclei-templates/2015/CVE-2015-9461-18b2efc80a79b2c683b250abf8605dd3.yaml +++ b/nuclei-templates/2015/CVE-2015-9461-18b2efc80a79b2c683b250abf8605dd3.yaml @@ -4,7 +4,7 @@ info: name: > Awesome Filterable Portfolio < 1.9 - Blind SQL Injection author: topscoder - severity: high + severity: critical description: > The awesome-filterable-portfolio plugin before 1.9 for WordPress has afp_get_new_portfolio_item_page SQL injection via the item_id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/awesome-filterable-portfolio/" google-query: inurl:"/wp-content/plugins/awesome-filterable-portfolio/" shodan-query: 'vuln:CVE-2015-9461' - tags: cve,wordpress,wp-plugin,awesome-filterable-portfolio,high + tags: cve,wordpress,wp-plugin,awesome-filterable-portfolio,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9462-d959830a068b86235ba87177aa38047a.yaml b/nuclei-templates/2015/CVE-2015-9462-d959830a068b86235ba87177aa38047a.yaml index 15f7a68574..2bd7fb2cfa 100644 --- a/nuclei-templates/2015/CVE-2015-9462-d959830a068b86235ba87177aa38047a.yaml +++ b/nuclei-templates/2015/CVE-2015-9462-d959830a068b86235ba87177aa38047a.yaml @@ -4,7 +4,7 @@ info: name: > Awesome Filterable Portfolio < 1.9 - Blind SQL Injection author: topscoder - severity: high + severity: critical description: > The awesome-filterable-portfolio plugin before 1.9 for WordPress has afp_get_new_category_page SQL injection via the cat_id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/awesome-filterable-portfolio/" google-query: inurl:"/wp-content/plugins/awesome-filterable-portfolio/" shodan-query: 'vuln:CVE-2015-9462' - tags: cve,wordpress,wp-plugin,awesome-filterable-portfolio,high + tags: cve,wordpress,wp-plugin,awesome-filterable-portfolio,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9465-61995cd0cadb8b6360d652af233c94df.yaml b/nuclei-templates/2015/CVE-2015-9465-61995cd0cadb8b6360d652af233c94df.yaml index 97a77ed8c3..2a5961805d 100644 --- a/nuclei-templates/2015/CVE-2015-9465-61995cd0cadb8b6360d652af233c94df.yaml +++ b/nuclei-templates/2015/CVE-2015-9465-61995cd0cadb8b6360d652af233c94df.yaml @@ -4,7 +4,7 @@ info: name: > Yasr – Yet Another Stars Rating < 0.9.1 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > The yet-another-stars-rating plugin before 0.9.1 for WordPress has yasr_get_multi_set_values_and_field SQL injection via the set_id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/yet-another-stars-rating/" google-query: inurl:"/wp-content/plugins/yet-another-stars-rating/" shodan-query: 'vuln:CVE-2015-9465' - tags: cve,wordpress,wp-plugin,yet-another-stars-rating,high + tags: cve,wordpress,wp-plugin,yet-another-stars-rating,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9468-426b7dfdb8bc5b0834ad851cf8e9ecfc.yaml b/nuclei-templates/2015/CVE-2015-9468-426b7dfdb8bc5b0834ad851cf8e9ecfc.yaml index 6149bb1138..42f9ab8a26 100644 --- a/nuclei-templates/2015/CVE-2015-9468-426b7dfdb8bc5b0834ad851cf8e9ecfc.yaml +++ b/nuclei-templates/2015/CVE-2015-9468-426b7dfdb8bc5b0834ad851cf8e9ecfc.yaml @@ -4,7 +4,7 @@ info: name: > Broken Link Manager <= 0.4.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The broken-link-manager plugin 0.4.5 for WordPress has XSS via the page parameter in a delURL action. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/broken-link-manager/" google-query: inurl:"/wp-content/plugins/broken-link-manager/" shodan-query: 'vuln:CVE-2015-9468' - tags: cve,wordpress,wp-plugin,broken-link-manager,medium + tags: cve,wordpress,wp-plugin,broken-link-manager,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9469-d1c8ca034f832b8e22c96845d2890940.yaml b/nuclei-templates/2015/CVE-2015-9469-d1c8ca034f832b8e22c96845d2890940.yaml index ba5a55dd5a..0ebb951607 100644 --- a/nuclei-templates/2015/CVE-2015-9469-d1c8ca034f832b8e22c96845d2890940.yaml +++ b/nuclei-templates/2015/CVE-2015-9469-d1c8ca034f832b8e22c96845d2890940.yaml @@ -4,7 +4,7 @@ info: name: > Content Grabber <= 1.0 - Authenticated (Admin+) Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The content-grabber plugin 1.0 for WordPress has XSS via obj_field_name or obj_field_id. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/content-grabber/" google-query: inurl:"/wp-content/plugins/content-grabber/" shodan-query: 'vuln:CVE-2015-9469' - tags: cve,wordpress,wp-plugin,content-grabber,medium + tags: cve,wordpress,wp-plugin,content-grabber,low http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9493-de81b18a854ce81734a5dca6853e283e.yaml b/nuclei-templates/2015/CVE-2015-9493-de81b18a854ce81734a5dca6853e283e.yaml index 42bdf7d67a..7463c1d06a 100644 --- a/nuclei-templates/2015/CVE-2015-9493-de81b18a854ce81734a5dca6853e283e.yaml +++ b/nuclei-templates/2015/CVE-2015-9493-de81b18a854ce81734a5dca6853e283e.yaml @@ -4,7 +4,7 @@ info: name: > My Wish List < 1.4.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The my-wish-list plugin before 1.4.2 for WordPress has multiple XSS issues. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/my-wish-list/" google-query: inurl:"/wp-content/plugins/my-wish-list/" shodan-query: 'vuln:CVE-2015-9493' - tags: cve,wordpress,wp-plugin,my-wish-list,medium + tags: cve,wordpress,wp-plugin,my-wish-list,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9494-76874a7b4a83992edc7c544ab3ce90f7.yaml b/nuclei-templates/2015/CVE-2015-9494-76874a7b4a83992edc7c544ab3ce90f7.yaml index 23ee9bc359..db7c9c40f5 100644 --- a/nuclei-templates/2015/CVE-2015-9494-76874a7b4a83992edc7c544ab3ce90f7.yaml +++ b/nuclei-templates/2015/CVE-2015-9494-76874a7b4a83992edc7c544ab3ce90f7.yaml @@ -4,7 +4,7 @@ info: name: > Post Kinds < 1.3.1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The indieweb-post-kinds plugin before 1.3.1.1 for WordPress has XSS via the genericons/example.html anchor identifier. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/indieweb-post-kinds/" google-query: inurl:"/wp-content/plugins/indieweb-post-kinds/" shodan-query: 'vuln:CVE-2015-9494' - tags: cve,wordpress,wp-plugin,indieweb-post-kinds,medium + tags: cve,wordpress,wp-plugin,indieweb-post-kinds,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9495-85ef6da03e1e6bb00fd985498d35a632.yaml b/nuclei-templates/2015/CVE-2015-9495-85ef6da03e1e6bb00fd985498d35a632.yaml index 3d8a9e926e..41e5577420 100644 --- a/nuclei-templates/2015/CVE-2015-9495-85ef6da03e1e6bb00fd985498d35a632.yaml +++ b/nuclei-templates/2015/CVE-2015-9495-85ef6da03e1e6bb00fd985498d35a632.yaml @@ -4,7 +4,7 @@ info: name: > Syndication Links < 1.0.3 - DOM-based Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Syndication Links plugin for WordPress is vulnerable to DOM-based Cross-Site Scripting via the genericons/example.html anchor identifier in versions up to 1.0.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/syndication-links/" google-query: inurl:"/wp-content/plugins/syndication-links/" shodan-query: 'vuln:CVE-2015-9495' - tags: cve,wordpress,wp-plugin,syndication-links,medium + tags: cve,wordpress,wp-plugin,syndication-links,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9496-65920cbefe2613a05348e64d8746a7b6.yaml b/nuclei-templates/2015/CVE-2015-9496-65920cbefe2613a05348e64d8746a7b6.yaml index 87d0908731..b36a6fa0f1 100644 --- a/nuclei-templates/2015/CVE-2015-9496-65920cbefe2613a05348e64d8746a7b6.yaml +++ b/nuclei-templates/2015/CVE-2015-9496-65920cbefe2613a05348e64d8746a7b6.yaml @@ -4,7 +4,7 @@ info: name: > Freshmail for WordPress <= 1.5.8 - SQL Injection author: topscoder - severity: high + severity: critical description: > The freshmail-newsletter plugin before 1.6 for WordPress has shortcode.php SQL Injection via the 'FM_form id=' substring. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/freshmail-newsletter/" google-query: inurl:"/wp-content/plugins/freshmail-newsletter/" shodan-query: 'vuln:CVE-2015-9496' - tags: cve,wordpress,wp-plugin,freshmail-newsletter,high + tags: cve,wordpress,wp-plugin,freshmail-newsletter,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9497-79f632cd97a0ebb6e16d846a092aa9f0.yaml b/nuclei-templates/2015/CVE-2015-9497-79f632cd97a0ebb6e16d846a092aa9f0.yaml index bfd2e35bae..c8c5a4d84e 100644 --- a/nuclei-templates/2015/CVE-2015-9497-79f632cd97a0ebb6e16d846a092aa9f0.yaml +++ b/nuclei-templates/2015/CVE-2015-9497-79f632cd97a0ebb6e16d846a092aa9f0.yaml @@ -4,7 +4,7 @@ info: name: > Ad Inserter – Ad Manager & AdSense Ads < 1.5.3 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > The ad-inserter plugin before 1.5.3 for WordPress has CSRF with resultant XSS via wp-admin/options-general.php?page=ad-inserter.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ad-inserter/" google-query: inurl:"/wp-content/plugins/ad-inserter/" shodan-query: 'vuln:CVE-2015-9497' - tags: cve,wordpress,wp-plugin,ad-inserter,high + tags: cve,wordpress,wp-plugin,ad-inserter,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9498-efc5740c90ff0a59809e4e9849d0d149.yaml b/nuclei-templates/2015/CVE-2015-9498-efc5740c90ff0a59809e4e9849d0d149.yaml index 5d9e04028d..26917f5b6d 100644 --- a/nuclei-templates/2015/CVE-2015-9498-efc5740c90ff0a59809e4e9849d0d149.yaml +++ b/nuclei-templates/2015/CVE-2015-9498-efc5740c90ff0a59809e4e9849d0d149.yaml @@ -4,7 +4,7 @@ info: name: > WPS Hide Login <= 1.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The wps-hide-login plugin before 1.1 for WordPress has CSRF that affects saving an option value. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wps-hide-login/" google-query: inurl:"/wp-content/plugins/wps-hide-login/" shodan-query: 'vuln:CVE-2015-9498' - tags: cve,wordpress,wp-plugin,wps-hide-login,high + tags: cve,wordpress,wp-plugin,wps-hide-login,medium http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9500-4569fe83ce2bb42a6e266298e47ccef7.yaml b/nuclei-templates/2015/CVE-2015-9500-4569fe83ce2bb42a6e266298e47ccef7.yaml index b4d49afce3..799e75667c 100644 --- a/nuclei-templates/2015/CVE-2015-9500-4569fe83ce2bb42a6e266298e47ccef7.yaml +++ b/nuclei-templates/2015/CVE-2015-9500-4569fe83ce2bb42a6e266298e47ccef7.yaml @@ -4,7 +4,7 @@ info: name: > Exquisite - Ultimate Newspaper Theme <= 1.3.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Exquisite Ultimate Newspaper theme 1.3.3 for WordPress has XSS via the anchor identifier to assets/js/jquery.foundation.plugins.js. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/exquisite-wp/" google-query: inurl:"/wp-content/themes/exquisite-wp/" shodan-query: 'vuln:CVE-2015-9500' - tags: cve,wordpress,wp-theme,exquisite-wp,medium + tags: cve,wordpress,wp-theme,exquisite-wp,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9501-e655964abfea5d2b4e77a9418e2e0409.yaml b/nuclei-templates/2015/CVE-2015-9501-e655964abfea5d2b4e77a9418e2e0409.yaml index 1f5c6954ec..b1ba0eb977 100644 --- a/nuclei-templates/2015/CVE-2015-9501-e655964abfea5d2b4e77a9418e2e0409.yaml +++ b/nuclei-templates/2015/CVE-2015-9501-e655964abfea5d2b4e77a9418e2e0409.yaml @@ -4,7 +4,7 @@ info: name: > Artificial Intelligence < 1.2.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Artificial Intelligence theme before 1.2.4 for WordPress has XSS because Genericons HTML files are unnecessarily placed under the web root. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/artificial-intelligence/" google-query: inurl:"/wp-content/themes/artificial-intelligence/" shodan-query: 'vuln:CVE-2015-9501' - tags: cve,wordpress,wp-theme,artificial-intelligence,medium + tags: cve,wordpress,wp-theme,artificial-intelligence,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9502-5d7be31521ee03a3c41d06e3d9d363f9.yaml b/nuclei-templates/2015/CVE-2015-9502-5d7be31521ee03a3c41d06e3d9d363f9.yaml index 9aa69e974d..51fc8579e9 100644 --- a/nuclei-templates/2015/CVE-2015-9502-5d7be31521ee03a3c41d06e3d9d363f9.yaml +++ b/nuclei-templates/2015/CVE-2015-9502-5d7be31521ee03a3c41d06e3d9d363f9.yaml @@ -4,7 +4,7 @@ info: name: > Auberge < 1.4.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Auberge theme before 1.4.5 for WordPress has XSS via the genericons/example.html anchor identifier. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/auberge/" google-query: inurl:"/wp-content/themes/auberge/" shodan-query: 'vuln:CVE-2015-9502' - tags: cve,wordpress,wp-theme,auberge,medium + tags: cve,wordpress,wp-theme,auberge,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9503-51ba94283b04aa5998cb156cf18689aa.yaml b/nuclei-templates/2015/CVE-2015-9503-51ba94283b04aa5998cb156cf18689aa.yaml index ec68605655..51111b86a4 100644 --- a/nuclei-templates/2015/CVE-2015-9503-51ba94283b04aa5998cb156cf18689aa.yaml +++ b/nuclei-templates/2015/CVE-2015-9503-51ba94283b04aa5998cb156cf18689aa.yaml @@ -4,7 +4,7 @@ info: name: > Modern <= 1.4.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Modern theme before 1.4.2 for WordPress has XSS via the genericons/example.html anchor identifier. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/modern/" google-query: inurl:"/wp-content/themes/modern/" shodan-query: 'vuln:CVE-2015-9503' - tags: cve,wordpress,wp-theme,modern,medium + tags: cve,wordpress,wp-theme,modern,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9504-a66c423ab6d157ff18cae8cbb8d16a15.yaml b/nuclei-templates/2015/CVE-2015-9504-a66c423ab6d157ff18cae8cbb8d16a15.yaml index 6f1328eefa..21e598c7c1 100644 --- a/nuclei-templates/2015/CVE-2015-9504-a66c423ab6d157ff18cae8cbb8d16a15.yaml +++ b/nuclei-templates/2015/CVE-2015-9504-a66c423ab6d157ff18cae8cbb8d16a15.yaml @@ -4,7 +4,7 @@ info: name: > Weekly News < 2.2.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The weeklynews theme before 2.2.9 for WordPress has XSS via the s parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/weeklynews/" google-query: inurl:"/wp-content/themes/weeklynews/" shodan-query: 'vuln:CVE-2015-9504' - tags: cve,wordpress,wp-theme,weeklynews,medium + tags: cve,wordpress,wp-theme,weeklynews,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9505-a71d6df449db20ab9c26824728336769.yaml b/nuclei-templates/2015/CVE-2015-9505-a71d6df449db20ab9c26824728336769.yaml index f1c7646d56..6e4762ca77 100644 --- a/nuclei-templates/2015/CVE-2015-9505-a71d6df449db20ab9c26824728336769.yaml +++ b/nuclei-templates/2015/CVE-2015-9505-a71d6df449db20ab9c26824728336769.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads – Simple eCommerce for Selling Digital Files <= 2.3.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) core component 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7 for WordPress has XSS because add_query_arg is misused. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-digital-downloads/" google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" shodan-query: 'vuln:CVE-2015-9505' - tags: cve,wordpress,wp-plugin,easy-digital-downloads,medium + tags: cve,wordpress,wp-plugin,easy-digital-downloads,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9506-188892e32d2c439c02d6eec7a4adfdb5.yaml b/nuclei-templates/2015/CVE-2015-9506-188892e32d2c439c02d6eec7a4adfdb5.yaml index ec68665e15..2f6abac932 100644 --- a/nuclei-templates/2015/CVE-2015-9506-188892e32d2c439c02d6eec7a4adfdb5.yaml +++ b/nuclei-templates/2015/CVE-2015-9506-188892e32d2c439c02d6eec7a4adfdb5.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads – Amazon S3 <= 2.1.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) Amazon S3 extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/edd-amazon-s3/" google-query: inurl:"/wp-content/plugins/edd-amazon-s3/" shodan-query: 'vuln:CVE-2015-9506' - tags: cve,wordpress,wp-plugin,edd-amazon-s3,medium + tags: cve,wordpress,wp-plugin,edd-amazon-s3,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9511-3b1d00a18f864c139ec613a9e0ffecf2.yaml b/nuclei-templates/2015/CVE-2015-9511-3b1d00a18f864c139ec613a9e0ffecf2.yaml index 9f09fa8ccd..3ba14ca17d 100644 --- a/nuclei-templates/2015/CVE-2015-9511-3b1d00a18f864c139ec613a9e0ffecf2.yaml +++ b/nuclei-templates/2015/CVE-2015-9511-3b1d00a18f864c139ec613a9e0ffecf2.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads – Conditional Success Redirects < 1.1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) Conditional Success Redirects extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/edd-conditional-success-redirects/" google-query: inurl:"/wp-content/plugins/edd-conditional-success-redirects/" shodan-query: 'vuln:CVE-2015-9511' - tags: cve,wordpress,wp-plugin,edd-conditional-success-redirects,medium + tags: cve,wordpress,wp-plugin,edd-conditional-success-redirects,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9512-4ada8035109d6dc47e94b2c651edea20.yaml b/nuclei-templates/2015/CVE-2015-9512-4ada8035109d6dc47e94b2c651edea20.yaml index 405c9fa7eb..95199b796b 100644 --- a/nuclei-templates/2015/CVE-2015-9512-4ada8035109d6dc47e94b2c651edea20.yaml +++ b/nuclei-templates/2015/CVE-2015-9512-4ada8035109d6dc47e94b2c651edea20.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads (Various Versions) - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads Plugin for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-digital-downloads/" google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" shodan-query: 'vuln:CVE-2015-9512' - tags: cve,wordpress,wp-plugin,easy-digital-downloads,medium + tags: cve,wordpress,wp-plugin,easy-digital-downloads,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9513-4f94094a1cb01e1f7943775986788b65.yaml b/nuclei-templates/2015/CVE-2015-9513-4f94094a1cb01e1f7943775986788b65.yaml index c9492b548e..bf47145f27 100644 --- a/nuclei-templates/2015/CVE-2015-9513-4f94094a1cb01e1f7943775986788b65.yaml +++ b/nuclei-templates/2015/CVE-2015-9513-4f94094a1cb01e1f7943775986788b65.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads – Favorites <= 1.0.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) Favorites extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/edd-favorites/" google-query: inurl:"/wp-content/plugins/edd-favorites/" shodan-query: 'vuln:CVE-2015-9513' - tags: cve,wordpress,wp-plugin,edd-favorites,medium + tags: cve,wordpress,wp-plugin,edd-favorites,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9516-61717663c17e62c7f08a76483f0eeff3.yaml b/nuclei-templates/2015/CVE-2015-9516-61717663c17e62c7f08a76483f0eeff3.yaml index 46cc92060e..1faac25c80 100644 --- a/nuclei-templates/2015/CVE-2015-9516-61717663c17e62c7f08a76483f0eeff3.yaml +++ b/nuclei-templates/2015/CVE-2015-9516-61717663c17e62c7f08a76483f0eeff3.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads – Invoices <= 1.0.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) Invoices extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/edd-invoices/" google-query: inurl:"/wp-content/plugins/edd-invoices/" shodan-query: 'vuln:CVE-2015-9516' - tags: cve,wordpress,wp-plugin,edd-invoices,medium + tags: cve,wordpress,wp-plugin,edd-invoices,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9518-d21243f7c0461744fbee4b3ace491e32.yaml b/nuclei-templates/2015/CVE-2015-9518-d21243f7c0461744fbee4b3ace491e32.yaml index 92f8ed799a..7ba4cfbd42 100644 --- a/nuclei-templates/2015/CVE-2015-9518-d21243f7c0461744fbee4b3ace491e32.yaml +++ b/nuclei-templates/2015/CVE-2015-9518-d21243f7c0461744fbee4b3ace491e32.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads – PDF Invoices < 1.0.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) PDF Invoices extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/edd-invoices/" google-query: inurl:"/wp-content/plugins/edd-invoices/" shodan-query: 'vuln:CVE-2015-9518' - tags: cve,wordpress,wp-plugin,edd-invoices,medium + tags: cve,wordpress,wp-plugin,edd-invoices,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9519-7028a373145887022c971f45128fcdba.yaml b/nuclei-templates/2015/CVE-2015-9519-7028a373145887022c971f45128fcdba.yaml index e19674979c..46c9330d1d 100644 --- a/nuclei-templates/2015/CVE-2015-9519-7028a373145887022c971f45128fcdba.yaml +++ b/nuclei-templates/2015/CVE-2015-9519-7028a373145887022c971f45128fcdba.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads – PDF Stamper <= 1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) PDF Stamper extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/edd-pdf-stamper/" google-query: inurl:"/wp-content/plugins/edd-pdf-stamper/" shodan-query: 'vuln:CVE-2015-9519' - tags: cve,wordpress,wp-plugin,edd-pdf-stamper,medium + tags: cve,wordpress,wp-plugin,edd-pdf-stamper,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9520-d51efaf8de0ecaf24f9a181bc5d20bee.yaml b/nuclei-templates/2015/CVE-2015-9520-d51efaf8de0ecaf24f9a181bc5d20bee.yaml index 4b7d645749..99a3af5c1c 100644 --- a/nuclei-templates/2015/CVE-2015-9520-d51efaf8de0ecaf24f9a181bc5d20bee.yaml +++ b/nuclei-templates/2015/CVE-2015-9520-d51efaf8de0ecaf24f9a181bc5d20bee.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads – Per Product Emails < 1.0.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) Per Product Emails extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/edd-per-product-emails/" google-query: inurl:"/wp-content/plugins/edd-per-product-emails/" shodan-query: 'vuln:CVE-2015-9520' - tags: cve,wordpress,wp-plugin,edd-per-product-emails,medium + tags: cve,wordpress,wp-plugin,edd-per-product-emails,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9523-2d450de1fce5683a098921397bf9fd03.yaml b/nuclei-templates/2015/CVE-2015-9523-2d450de1fce5683a098921397bf9fd03.yaml index 42a2d50f59..feff36c75a 100644 --- a/nuclei-templates/2015/CVE-2015-9523-2d450de1fce5683a098921397bf9fd03.yaml +++ b/nuclei-templates/2015/CVE-2015-9523-2d450de1fce5683a098921397bf9fd03.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads – Recommended Products <= 1.2.3.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) Recommended Products extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/recommended-products-edd/" google-query: inurl:"/wp-content/plugins/recommended-products-edd/" shodan-query: 'vuln:CVE-2015-9523' - tags: cve,wordpress,wp-plugin,recommended-products-edd,medium + tags: cve,wordpress,wp-plugin,recommended-products-edd,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9524-5c7b076501be3d3c98666ffe30ae6a26.yaml b/nuclei-templates/2015/CVE-2015-9524-5c7b076501be3d3c98666ffe30ae6a26.yaml index 7c0b3ddf92..b5610aa856 100644 --- a/nuclei-templates/2015/CVE-2015-9524-5c7b076501be3d3c98666ffe30ae6a26.yaml +++ b/nuclei-templates/2015/CVE-2015-9524-5c7b076501be3d3c98666ffe30ae6a26.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads – Recount Earnings <= 1.0.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) Recount Earnings extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. The standalone extension was not patched and a patched version was instead integrated into EDD Core. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/edd-recount-earnings/" google-query: inurl:"/wp-content/plugins/edd-recount-earnings/" shodan-query: 'vuln:CVE-2015-9524' - tags: cve,wordpress,wp-plugin,edd-recount-earnings,medium + tags: cve,wordpress,wp-plugin,edd-recount-earnings,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9525-099ead226109d18c4bc71e3d4e743b55.yaml b/nuclei-templates/2015/CVE-2015-9525-099ead226109d18c4bc71e3d4e743b55.yaml index 80e2855cac..6100b34dda 100644 --- a/nuclei-templates/2015/CVE-2015-9525-099ead226109d18c4bc71e3d4e743b55.yaml +++ b/nuclei-templates/2015/CVE-2015-9525-099ead226109d18c4bc71e3d4e743b55.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads – Recurring Payments <= 2.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) Recurring Payments extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/edd-recurring-payments/" google-query: inurl:"/wp-content/plugins/edd-recurring-payments/" shodan-query: 'vuln:CVE-2015-9525' - tags: cve,wordpress,wp-plugin,edd-recurring-payments,medium + tags: cve,wordpress,wp-plugin,edd-recurring-payments,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9527-c110f3311248c25cc2e6e53a20d9f8d7.yaml b/nuclei-templates/2015/CVE-2015-9527-c110f3311248c25cc2e6e53a20d9f8d7.yaml index fbd39bbb7a..a361d6fbc9 100644 --- a/nuclei-templates/2015/CVE-2015-9527-c110f3311248c25cc2e6e53a20d9f8d7.yaml +++ b/nuclei-templates/2015/CVE-2015-9527-c110f3311248c25cc2e6e53a20d9f8d7.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads – Simple Shipping <= 2.1.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) Simple Shipping extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/simple-shipping-edd/" google-query: inurl:"/wp-content/plugins/simple-shipping-edd/" shodan-query: 'vuln:CVE-2015-9527' - tags: cve,wordpress,wp-plugin,simple-shipping-edd,medium + tags: cve,wordpress,wp-plugin,simple-shipping-edd,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9528-52e4049030db45f1344545c480f7a4ef.yaml b/nuclei-templates/2015/CVE-2015-9528-52e4049030db45f1344545c480f7a4ef.yaml index a260d2edbf..4cfdcfb7ba 100644 --- a/nuclei-templates/2015/CVE-2015-9528-52e4049030db45f1344545c480f7a4ef.yaml +++ b/nuclei-templates/2015/CVE-2015-9528-52e4049030db45f1344545c480f7a4ef.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads – Software Licensing < 3.2.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) Software Licensing extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/edd-software-licensing/" google-query: inurl:"/wp-content/plugins/edd-software-licensing/" shodan-query: 'vuln:CVE-2015-9528' - tags: cve,wordpress,wp-plugin,edd-software-licensing,medium + tags: cve,wordpress,wp-plugin,edd-software-licensing,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9531-0633b5d5c2288fd164f50f774a52dac5.yaml b/nuclei-templates/2015/CVE-2015-9531-0633b5d5c2288fd164f50f774a52dac5.yaml index 99583d8f28..8ad4a38cf4 100644 --- a/nuclei-templates/2015/CVE-2015-9531-0633b5d5c2288fd164f50f774a52dac5.yaml +++ b/nuclei-templates/2015/CVE-2015-9531-0633b5d5c2288fd164f50f774a52dac5.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads – Wish Lists < 1.1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) Wish Lists extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/edd-wish-lists/" google-query: inurl:"/wp-content/plugins/edd-wish-lists/" shodan-query: 'vuln:CVE-2015-9531' - tags: cve,wordpress,wp-plugin,edd-wish-lists,medium + tags: cve,wordpress,wp-plugin,edd-wish-lists,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9532-f5fc5bca6e41d90a9454914bbfeeafc7.yaml b/nuclei-templates/2015/CVE-2015-9532-f5fc5bca6e41d90a9454914bbfeeafc7.yaml index 04de571698..4003cfbd68 100644 --- a/nuclei-templates/2015/CVE-2015-9532-f5fc5bca6e41d90a9454914bbfeeafc7.yaml +++ b/nuclei-templates/2015/CVE-2015-9532-f5fc5bca6e41d90a9454914bbfeeafc7.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads (EDD) Digital Store < 1.3.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) Digital Store theme for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/digital-store/" google-query: inurl:"/wp-content/themes/digital-store/" shodan-query: 'vuln:CVE-2015-9532' - tags: cve,wordpress,wp-theme,digital-store,medium + tags: cve,wordpress,wp-theme,digital-store,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9533-a3693c90a0060afc06ae1758aa95f75e.yaml b/nuclei-templates/2015/CVE-2015-9533-a3693c90a0060afc06ae1758aa95f75e.yaml index 923928f60e..9c20d31e4e 100644 --- a/nuclei-templates/2015/CVE-2015-9533-a3693c90a0060afc06ae1758aa95f75e.yaml +++ b/nuclei-templates/2015/CVE-2015-9533-a3693c90a0060afc06ae1758aa95f75e.yaml @@ -4,7 +4,7 @@ info: name: > Lattice < 1.1.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) Lattice theme for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/lattice/" google-query: inurl:"/wp-content/themes/lattice/" shodan-query: 'vuln:CVE-2015-9533' - tags: cve,wordpress,wp-theme,lattice,medium + tags: cve,wordpress,wp-theme,lattice,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9534-b91f6a56da52c114b3a84093ea345821.yaml b/nuclei-templates/2015/CVE-2015-9534-b91f6a56da52c114b3a84093ea345821.yaml index 31ee398f5d..120937047b 100644 --- a/nuclei-templates/2015/CVE-2015-9534-b91f6a56da52c114b3a84093ea345821.yaml +++ b/nuclei-templates/2015/CVE-2015-9534-b91f6a56da52c114b3a84093ea345821.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads - Quota < 1.2.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) Quota theme for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. @@ -19,7 +19,7 @@ info: fofa-query: "wp-content/themes/quota/" google-query: inurl:"/wp-content/themes/quota/" shodan-query: 'vuln:CVE-2015-9534' - tags: cve,wordpress,wp-theme,quota,medium + tags: cve,wordpress,wp-theme,quota,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9535-c5cd64fdc88a18d66954d78adc22f76d.yaml b/nuclei-templates/2015/CVE-2015-9535-c5cd64fdc88a18d66954d78adc22f76d.yaml index 9c671f7663..4c5a9fdb1e 100644 --- a/nuclei-templates/2015/CVE-2015-9535-c5cd64fdc88a18d66954d78adc22f76d.yaml +++ b/nuclei-templates/2015/CVE-2015-9535-c5cd64fdc88a18d66954d78adc22f76d.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads – Shoppette Theme < 1.0.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) Shoppette theme for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. *Shoppette theme patched in 1.0.5. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/shoppette/" google-query: inurl:"/wp-content/themes/shoppette/" shodan-query: 'vuln:CVE-2015-9535' - tags: cve,wordpress,wp-theme,shoppette,medium + tags: cve,wordpress,wp-theme,shoppette,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9536-b586a8ab64bee13c2ee807e747d50adb.yaml b/nuclei-templates/2015/CVE-2015-9536-b586a8ab64bee13c2ee807e747d50adb.yaml index 0a05b945aa..eb865b50e9 100644 --- a/nuclei-templates/2015/CVE-2015-9536-b586a8ab64bee13c2ee807e747d50adb.yaml +++ b/nuclei-templates/2015/CVE-2015-9536-b586a8ab64bee13c2ee807e747d50adb.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads (EDD) Twenty-Twelve < 1.1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Digital Downloads (EDD) Twenty-Twelve theme for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/twenty-twelve-edd/" google-query: inurl:"/wp-content/themes/twenty-twelve-edd/" shodan-query: 'vuln:CVE-2015-9536' - tags: cve,wordpress,wp-theme,twenty-twelve-edd,medium + tags: cve,wordpress,wp-theme,twenty-twelve-edd,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9537-862a8430206366dd5f1306f54a1da83a.yaml b/nuclei-templates/2015/CVE-2015-9537-862a8430206366dd5f1306f54a1da83a.yaml index 24480916f5..248e3834c6 100644 --- a/nuclei-templates/2015/CVE-2015-9537-862a8430206366dd5f1306f54a1da83a.yaml +++ b/nuclei-templates/2015/CVE-2015-9537-862a8430206366dd5f1306f54a1da83a.yaml @@ -4,7 +4,7 @@ info: name: > NextGen Gallery <= 2.1.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The NextGEN Gallery plugin before 2.1.10 for WordPress has multiple XSS issues involving thumbnail_width, thumbnail_height, thumbwidth, thumbheight, wmXpos, and wmYpos, and template. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nextgen-gallery/" google-query: inurl:"/wp-content/plugins/nextgen-gallery/" shodan-query: 'vuln:CVE-2015-9537' - tags: cve,wordpress,wp-plugin,nextgen-gallery,medium + tags: cve,wordpress,wp-plugin,nextgen-gallery,high http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9538-c2a9c94ee32f4cfd4a8e1474373c16d3.yaml b/nuclei-templates/2015/CVE-2015-9538-c2a9c94ee32f4cfd4a8e1474373c16d3.yaml index c64729f47a..e5c1bc387a 100644 --- a/nuclei-templates/2015/CVE-2015-9538-c2a9c94ee32f4cfd4a8e1474373c16d3.yaml +++ b/nuclei-templates/2015/CVE-2015-9538-c2a9c94ee32f4cfd4a8e1474373c16d3.yaml @@ -4,7 +4,7 @@ info: name: > NextGen Gallery <= 2.1.10 - Local File Inclusion author: topscoder - severity: medium + severity: critical description: > The NextGEN Gallery plugin before 2.1.15 for WordPress allows ../ Directory Traversal in path selection. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nextgen-gallery/" google-query: inurl:"/wp-content/plugins/nextgen-gallery/" shodan-query: 'vuln:CVE-2015-9538' - tags: cve,wordpress,wp-plugin,nextgen-gallery,medium + tags: cve,wordpress,wp-plugin,nextgen-gallery,critical http: - method: GET diff --git a/nuclei-templates/2015/CVE-2015-9539-503833e43a0634ab7984563e9c441bb9.yaml b/nuclei-templates/2015/CVE-2015-9539-503833e43a0634ab7984563e9c441bb9.yaml index 4e3899b2aa..449dd7313d 100644 --- a/nuclei-templates/2015/CVE-2015-9539-503833e43a0634ab7984563e9c441bb9.yaml +++ b/nuclei-templates/2015/CVE-2015-9539-503833e43a0634ab7984563e9c441bb9.yaml @@ -4,7 +4,7 @@ info: name: > Fast Secure Contact Form <= 4.0.37 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Fast Secure Contact Form plugin before 4.0.38 for WordPress allows fs_contact_form1[welcome] XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/si-contact-form/" google-query: inurl:"/wp-content/plugins/si-contact-form/" shodan-query: 'vuln:CVE-2015-9539' - tags: cve,wordpress,wp-plugin,si-contact-form,medium + tags: cve,wordpress,wp-plugin,si-contact-form,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-0765-7e99952543b7586dc6b3250a2122b0f9.yaml b/nuclei-templates/2016/CVE-2016-0765-7e99952543b7586dc6b3250a2122b0f9.yaml index 739c32b915..bbc163a881 100644 --- a/nuclei-templates/2016/CVE-2016-0765-7e99952543b7586dc6b3250a2122b0f9.yaml +++ b/nuclei-templates/2016/CVE-2016-0765-7e99952543b7586dc6b3250a2122b0f9.yaml @@ -4,7 +4,7 @@ info: name: > eShop <= 6.3.14 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in eshop-orders.php in the eShop plugin 6.3.14 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) page or (2) action parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/eshop/" google-query: inurl:"/wp-content/plugins/eshop/" shodan-query: 'vuln:CVE-2016-0765' - tags: cve,wordpress,wp-plugin,eshop,medium + tags: cve,wordpress,wp-plugin,eshop,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-0769-6b1f692527a7829aa26f6946e0d77ddd.yaml b/nuclei-templates/2016/CVE-2016-0769-6b1f692527a7829aa26f6946e0d77ddd.yaml index 1559b96db0..0dbda293aa 100644 --- a/nuclei-templates/2016/CVE-2016-0769-6b1f692527a7829aa26f6946e0d77ddd.yaml +++ b/nuclei-templates/2016/CVE-2016-0769-6b1f692527a7829aa26f6946e0d77ddd.yaml @@ -4,7 +4,7 @@ info: name: > eShop <= 6.3.14 - Multiple SQL Injections author: topscoder - severity: high + severity: critical description: > Multiple SQL injection vulnerabilities in eshop-orders.php in the eShop plugin 6.3.14 for WordPress allow (1) remote administrators to execute arbitrary SQL commands via the delid parameter or remote authenticated users to execute arbitrary SQL commands via the (2) view, (3) mark, or (4) change parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/eshop/" google-query: inurl:"/wp-content/plugins/eshop/" shodan-query: 'vuln:CVE-2016-0769' - tags: cve,wordpress,wp-plugin,eshop,high + tags: cve,wordpress,wp-plugin,eshop,critical http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-0770-cf74b8fc2d5310123c3eee779bc13fa4.yaml b/nuclei-templates/2016/CVE-2016-0770-cf74b8fc2d5310123c3eee779bc13fa4.yaml index bf57d3b474..50f3afeeba 100644 --- a/nuclei-templates/2016/CVE-2016-0770-cf74b8fc2d5310123c3eee779bc13fa4.yaml +++ b/nuclei-templates/2016/CVE-2016-0770-cf74b8fc2d5310123c3eee779bc13fa4.yaml @@ -4,7 +4,7 @@ info: name: > Connections Business Directory < 8.5.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in includes/admin/pages/manage.php in the Connections Business Directory plugin before 8.5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via the s variable. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/connections/" google-query: inurl:"/wp-content/plugins/connections/" shodan-query: 'vuln:CVE-2016-0770' - tags: cve,wordpress,wp-plugin,connections,medium + tags: cve,wordpress,wp-plugin,connections,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-1000147-f1d9f474bbf4576d12894725bd74f389.yaml b/nuclei-templates/2016/CVE-2016-1000147-f1d9f474bbf4576d12894725bd74f389.yaml index 5035e4032e..1afc994202 100644 --- a/nuclei-templates/2016/CVE-2016-1000147-f1d9f474bbf4576d12894725bd74f389.yaml +++ b/nuclei-templates/2016/CVE-2016-1000147-f1d9f474bbf4576d12894725bd74f389.yaml @@ -4,7 +4,7 @@ info: name: > Recipes Writer <= 1.0.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Reflected XSS in wordpress plugin recipes-writer v1.0.4 reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/recipes-writer/" google-query: inurl:"/wp-content/plugins/recipes-writer/" shodan-query: 'vuln:CVE-2016-1000147' - tags: cve,wordpress,wp-plugin,recipes-writer,medium + tags: cve,wordpress,wp-plugin,recipes-writer,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-1000152-885c0e7d869967a6d9428aa8fe4ebe55.yaml b/nuclei-templates/2016/CVE-2016-1000152-885c0e7d869967a6d9428aa8fe4ebe55.yaml index fa029ccb63..c2126a0387 100644 --- a/nuclei-templates/2016/CVE-2016-1000152-885c0e7d869967a6d9428aa8fe4ebe55.yaml +++ b/nuclei-templates/2016/CVE-2016-1000152-885c0e7d869967a6d9428aa8fe4ebe55.yaml @@ -4,7 +4,7 @@ info: name: > Easy Contact Form Builder < 1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Reflected XSS in wordpress plugin tidio-form v1.0 reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/tidio-form/" google-query: inurl:"/wp-content/plugins/tidio-form/" shodan-query: 'vuln:CVE-2016-1000152' - tags: cve,wordpress,wp-plugin,tidio-form,medium + tags: cve,wordpress,wp-plugin,tidio-form,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10112-8157d8b031515138cda4bb1e1c15680c.yaml b/nuclei-templates/2016/CVE-2016-10112-8157d8b031515138cda4bb1e1c15680c.yaml index 548d4c07a1..10c773d13d 100644 --- a/nuclei-templates/2016/CVE-2016-10112-8157d8b031515138cda4bb1e1c15680c.yaml +++ b/nuclei-templates/2016/CVE-2016-10112-8157d8b031515138cda4bb1e1c15680c.yaml @@ -4,7 +4,7 @@ info: name: > WooCommerce <= 2.6.8 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Cross-site scripting (XSS) vulnerability in the WooCommerce plugin before 2.6.9 for WordPress allows remote authenticated administrators to inject arbitrary web script or HTML by providing crafted tax-rate table values in CSV format. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/woocommerce/" google-query: inurl:"/wp-content/plugins/woocommerce/" shodan-query: 'vuln:CVE-2016-10112' - tags: cve,wordpress,wp-plugin,woocommerce,medium + tags: cve,wordpress,wp-plugin,woocommerce,low http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10148-0cd25473d47849a11f534f0b196b97ae.yaml b/nuclei-templates/2016/CVE-2016-10148-0cd25473d47849a11f534f0b196b97ae.yaml index a7aab53377..7e8533086d 100644 --- a/nuclei-templates/2016/CVE-2016-10148-0cd25473d47849a11f534f0b196b97ae.yaml +++ b/nuclei-templates/2016/CVE-2016-10148-0cd25473d47849a11f534f0b196b97ae.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.6 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 makes a get_plugin_data call before checking the update_plugins capability, which allows remote authenticated users to bypass intended read-access restrictions via the plugin parameter to wp-admin/admin-ajax.php, a related issue to CVE-2016-6896. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2016-10148 metadata: shodan-query: 'vuln:CVE-2016-10148' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10705-b0d263ca65579d9d14b154cf891cd65e.yaml b/nuclei-templates/2016/CVE-2016-10705-b0d263ca65579d9d14b154cf891cd65e.yaml index 0ebac63b62..9a457c003c 100644 --- a/nuclei-templates/2016/CVE-2016-10705-b0d263ca65579d9d14b154cf891cd65e.yaml +++ b/nuclei-templates/2016/CVE-2016-10705-b0d263ca65579d9d14b154cf891cd65e.yaml @@ -4,7 +4,7 @@ info: name: > Jetpack <= 4.0.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Jetpack plugin before 4.0.4 for WordPress has XSS via the Likes module. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/jetpack/" google-query: inurl:"/wp-content/plugins/jetpack/" shodan-query: 'vuln:CVE-2016-10705' - tags: cve,wordpress,wp-plugin,jetpack,medium + tags: cve,wordpress,wp-plugin,jetpack,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10706-2be7d29f9bb984978a5f99c0ed30a7ed.yaml b/nuclei-templates/2016/CVE-2016-10706-2be7d29f9bb984978a5f99c0ed30a7ed.yaml index 48325122df..c5a99b2b72 100644 --- a/nuclei-templates/2016/CVE-2016-10706-2be7d29f9bb984978a5f99c0ed30a7ed.yaml +++ b/nuclei-templates/2016/CVE-2016-10706-2be7d29f9bb984978a5f99c0ed30a7ed.yaml @@ -4,7 +4,7 @@ info: name: > Jetpack <= 4.0.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Jetpack plugin before 4.0.3 for WordPress has XSS via a crafted Vimeo link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/jetpack/" google-query: inurl:"/wp-content/plugins/jetpack/" shodan-query: 'vuln:CVE-2016-10706' - tags: cve,wordpress,wp-plugin,jetpack,medium + tags: cve,wordpress,wp-plugin,jetpack,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10763-1b1736563be4cd48928200e2f20f46f4.yaml b/nuclei-templates/2016/CVE-2016-10763-1b1736563be4cd48928200e2f20f46f4.yaml index ed67c1f376..e2eb84c8da 100644 --- a/nuclei-templates/2016/CVE-2016-10763-1b1736563be4cd48928200e2f20f46f4.yaml +++ b/nuclei-templates/2016/CVE-2016-10763-1b1736563be4cd48928200e2f20f46f4.yaml @@ -4,7 +4,7 @@ info: name: > CampTix Event Ticketing < 1.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The CampTix Event Ticketing plugin before 1.5 for WordPress allows XSS in the admin section via a ticket title or body. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/camptix/" google-query: inurl:"/wp-content/plugins/camptix/" shodan-query: 'vuln:CVE-2016-10763' - tags: cve,wordpress,wp-plugin,camptix,medium + tags: cve,wordpress,wp-plugin,camptix,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10867-e1b9583cb78e016115d982acbd157618.yaml b/nuclei-templates/2016/CVE-2016-10867-e1b9583cb78e016115d982acbd157618.yaml index e3454d5a73..0da106bcbb 100644 --- a/nuclei-templates/2016/CVE-2016-10867-e1b9583cb78e016115d982acbd157618.yaml +++ b/nuclei-templates/2016/CVE-2016-10867-e1b9583cb78e016115d982acbd157618.yaml @@ -4,7 +4,7 @@ info: name: > All In One WP Security & Firewall <= 4.0.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The all-in-one-wp-security-and-firewall plugin before 4.0.6 for WordPress has XSS in settings pages. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" shodan-query: 'vuln:CVE-2016-10867' - tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,medium + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10868-7567c31561b747bfa0cbc91d7005334d.yaml b/nuclei-templates/2016/CVE-2016-10868-7567c31561b747bfa0cbc91d7005334d.yaml index aabab4d3b6..bfceeb70ae 100644 --- a/nuclei-templates/2016/CVE-2016-10868-7567c31561b747bfa0cbc91d7005334d.yaml +++ b/nuclei-templates/2016/CVE-2016-10868-7567c31561b747bfa0cbc91d7005334d.yaml @@ -4,7 +4,7 @@ info: name: > All In One WP Security & Firewall <= 4.0.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The all-in-one-wp-security-and-firewall plugin before 4.0.5 for WordPress has XSS in the blacklist, file system, and file change detection settings pages. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" shodan-query: 'vuln:CVE-2016-10868' - tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,medium + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10869-28ac556db560c4dbe8e302546acf1314.yaml b/nuclei-templates/2016/CVE-2016-10869-28ac556db560c4dbe8e302546acf1314.yaml index d2d2fa0d73..80d5c42efc 100644 --- a/nuclei-templates/2016/CVE-2016-10869-28ac556db560c4dbe8e302546acf1314.yaml +++ b/nuclei-templates/2016/CVE-2016-10869-28ac556db560c4dbe8e302546acf1314.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form by BestWebSoft – Advanced Contact Us Form Builder for WordPress <= 4.0.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The contact-form-plugin plugin before 4.0.2 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-plugin/" google-query: inurl:"/wp-content/plugins/contact-form-plugin/" shodan-query: 'vuln:CVE-2016-10869' - tags: cve,wordpress,wp-plugin,contact-form-plugin,medium + tags: cve,wordpress,wp-plugin,contact-form-plugin,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10870-a6e38c48f14b76ed761e5c6ec8e4f3ac.yaml b/nuclei-templates/2016/CVE-2016-10870-a6e38c48f14b76ed761e5c6ec8e4f3ac.yaml index 01ad49f82d..3c7b9144ce 100644 --- a/nuclei-templates/2016/CVE-2016-10870-a6e38c48f14b76ed761e5c6ec8e4f3ac.yaml +++ b/nuclei-templates/2016/CVE-2016-10870-a6e38c48f14b76ed761e5c6ec8e4f3ac.yaml @@ -4,7 +4,7 @@ info: name: > Google Language Translator <= 5.0.05 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The google-language-translator plugin before 5.0.06 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/google-language-translator/" google-query: inurl:"/wp-content/plugins/google-language-translator/" shodan-query: 'vuln:CVE-2016-10870' - tags: cve,wordpress,wp-plugin,google-language-translator,medium + tags: cve,wordpress,wp-plugin,google-language-translator,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10871-b628a5c29017f302cc9e3a317e522425.yaml b/nuclei-templates/2016/CVE-2016-10871-b628a5c29017f302cc9e3a317e522425.yaml index d77f745a7a..60e8574260 100644 --- a/nuclei-templates/2016/CVE-2016-10871-b628a5c29017f302cc9e3a317e522425.yaml +++ b/nuclei-templates/2016/CVE-2016-10871-b628a5c29017f302cc9e3a317e522425.yaml @@ -4,7 +4,7 @@ info: name: > MailChimp for WordPress <= 4.0.10 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The mailchimp-for-wp plugin before 4.0.11 for WordPress has XSS on the integration settings page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mailchimp-for-wp/" google-query: inurl:"/wp-content/plugins/mailchimp-for-wp/" shodan-query: 'vuln:CVE-2016-10871' - tags: cve,wordpress,wp-plugin,mailchimp-for-wp,medium + tags: cve,wordpress,wp-plugin,mailchimp-for-wp,low http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10872-9c147c1fb503983534bc4ea0ae8ec8cf.yaml b/nuclei-templates/2016/CVE-2016-10872-9c147c1fb503983534bc4ea0ae8ec8cf.yaml index 87d737168e..ffc2c34e70 100644 --- a/nuclei-templates/2016/CVE-2016-10872-9c147c1fb503983534bc4ea0ae8ec8cf.yaml +++ b/nuclei-templates/2016/CVE-2016-10872-9c147c1fb503983534bc4ea0ae8ec8cf.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate Member <= 1.3.39 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The ultimate-member plugin before 1.3.40 for WordPress has XSS on the login form. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-member/" google-query: inurl:"/wp-content/plugins/ultimate-member/" shodan-query: 'vuln:CVE-2016-10872' - tags: cve,wordpress,wp-plugin,ultimate-member,medium + tags: cve,wordpress,wp-plugin,ultimate-member,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10873-ad22dd4e7945e819f768594bfd7f51a8.yaml b/nuclei-templates/2016/CVE-2016-10873-ad22dd4e7945e819f768594bfd7f51a8.yaml index fecfd94ba7..32b0497434 100644 --- a/nuclei-templates/2016/CVE-2016-10873-ad22dd4e7945e819f768594bfd7f51a8.yaml +++ b/nuclei-templates/2016/CVE-2016-10873-ad22dd4e7945e819f768594bfd7f51a8.yaml @@ -4,7 +4,7 @@ info: name: > WP Database Backup <= 4.3.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-database-backup plugin before 4.3.3 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-database-backup/" google-query: inurl:"/wp-content/plugins/wp-database-backup/" shodan-query: 'vuln:CVE-2016-10873' - tags: cve,wordpress,wp-plugin,wp-database-backup,medium + tags: cve,wordpress,wp-plugin,wp-database-backup,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10874-230f648691b91c6194be1f415c1bb8f9.yaml b/nuclei-templates/2016/CVE-2016-10874-230f648691b91c6194be1f415c1bb8f9.yaml index 17c938e7f1..eb6e56e54f 100644 --- a/nuclei-templates/2016/CVE-2016-10874-230f648691b91c6194be1f415c1bb8f9.yaml +++ b/nuclei-templates/2016/CVE-2016-10874-230f648691b91c6194be1f415c1bb8f9.yaml @@ -4,7 +4,7 @@ info: name: > WP Database Backup <= 4.3.2 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The wp-database-backup plugin before 4.3.3 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-database-backup/" google-query: inurl:"/wp-content/plugins/wp-database-backup/" shodan-query: 'vuln:CVE-2016-10874' - tags: cve,wordpress,wp-plugin,wp-database-backup,high + tags: cve,wordpress,wp-plugin,wp-database-backup,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10875-434ae7a95fc78d705c7843354abb6396.yaml b/nuclei-templates/2016/CVE-2016-10875-434ae7a95fc78d705c7843354abb6396.yaml index 486573697d..f333d8029c 100644 --- a/nuclei-templates/2016/CVE-2016-10875-434ae7a95fc78d705c7843354abb6396.yaml +++ b/nuclei-templates/2016/CVE-2016-10875-434ae7a95fc78d705c7843354abb6396.yaml @@ -4,7 +4,7 @@ info: name: > WP Database Backup <= 4.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-database-backup plugin before 4.3.1 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-database-backup/" google-query: inurl:"/wp-content/plugins/wp-database-backup/" shodan-query: 'vuln:CVE-2016-10875' - tags: cve,wordpress,wp-plugin,wp-database-backup,medium + tags: cve,wordpress,wp-plugin,wp-database-backup,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10876-01a81435c686a1247dfccda6d4fceb1e.yaml b/nuclei-templates/2016/CVE-2016-10876-01a81435c686a1247dfccda6d4fceb1e.yaml index 65f1451ae9..2fb9504e5a 100644 --- a/nuclei-templates/2016/CVE-2016-10876-01a81435c686a1247dfccda6d4fceb1e.yaml +++ b/nuclei-templates/2016/CVE-2016-10876-01a81435c686a1247dfccda6d4fceb1e.yaml @@ -4,7 +4,7 @@ info: name: > WP Database Backup <= 4.3 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The wp-database-backup plugin before 4.3.1 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-database-backup/" google-query: inurl:"/wp-content/plugins/wp-database-backup/" shodan-query: 'vuln:CVE-2016-10876' - tags: cve,wordpress,wp-plugin,wp-database-backup,high + tags: cve,wordpress,wp-plugin,wp-database-backup,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10877-b9526b8daaa2ae88bfa635ff810051bf.yaml b/nuclei-templates/2016/CVE-2016-10877-b9526b8daaa2ae88bfa635ff810051bf.yaml index ca0f9632f4..6a19eeffe9 100644 --- a/nuclei-templates/2016/CVE-2016-10877-b9526b8daaa2ae88bfa635ff810051bf.yaml +++ b/nuclei-templates/2016/CVE-2016-10877-b9526b8daaa2ae88bfa635ff810051bf.yaml @@ -4,7 +4,7 @@ info: name: > WP Editor <= 1.2.6.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-editor plugin before 1.2.6.3 for WordPress has multiple XSS issues. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-editor/" google-query: inurl:"/wp-content/plugins/wp-editor/" shodan-query: 'vuln:CVE-2016-10877' - tags: cve,wordpress,wp-plugin,wp-editor,medium + tags: cve,wordpress,wp-plugin,wp-editor,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10878-7382281cd5a556c25b2c10e2b81ec2b8.yaml b/nuclei-templates/2016/CVE-2016-10878-7382281cd5a556c25b2c10e2b81ec2b8.yaml index 8f4a01eacc..733cdd3a9a 100644 --- a/nuclei-templates/2016/CVE-2016-10878-7382281cd5a556c25b2c10e2b81ec2b8.yaml +++ b/nuclei-templates/2016/CVE-2016-10878-7382281cd5a556c25b2c10e2b81ec2b8.yaml @@ -4,7 +4,7 @@ info: name: > WP Google Map Plugin <= 3.1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-google-map-plugin plugin before 3.1.2 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-google-map-plugin/" google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" shodan-query: 'vuln:CVE-2016-10878' - tags: cve,wordpress,wp-plugin,wp-google-map-plugin,medium + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10879-ac9a4353796cc2c432e6ec8cb3e235d2.yaml b/nuclei-templates/2016/CVE-2016-10879-ac9a4353796cc2c432e6ec8cb3e235d2.yaml index 8a5bdcf960..01681523b1 100644 --- a/nuclei-templates/2016/CVE-2016-10879-ac9a4353796cc2c432e6ec8cb3e235d2.yaml +++ b/nuclei-templates/2016/CVE-2016-10879-ac9a4353796cc2c432e6ec8cb3e235d2.yaml @@ -4,7 +4,7 @@ info: name: > 3CX Free Live Chat <= 6.2.03 - Unauthenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The WP Live Chat Support plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'name' parameter in versions up to, and including, 6.2.03 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-live-chat-support/" google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" shodan-query: 'vuln:CVE-2016-10879' - tags: cve,wordpress,wp-plugin,wp-live-chat-support,medium + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10880-96e3c232ce32c0e385509a8011930dfa.yaml b/nuclei-templates/2016/CVE-2016-10880-96e3c232ce32c0e385509a8011930dfa.yaml index cc1306528b..e0a87e0790 100644 --- a/nuclei-templates/2016/CVE-2016-10880-96e3c232ce32c0e385509a8011930dfa.yaml +++ b/nuclei-templates/2016/CVE-2016-10880-96e3c232ce32c0e385509a8011930dfa.yaml @@ -4,7 +4,7 @@ info: name: > Google Doc Embedder <= 2.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The google-document-embedder plugin before 2.6.1 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/google-document-embedder/" google-query: inurl:"/wp-content/plugins/google-document-embedder/" shodan-query: 'vuln:CVE-2016-10880' - tags: cve,wordpress,wp-plugin,google-document-embedder,medium + tags: cve,wordpress,wp-plugin,google-document-embedder,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10881-06e9ac1fc5b59d1b8d6fb6e9af4f3f0c.yaml b/nuclei-templates/2016/CVE-2016-10881-06e9ac1fc5b59d1b8d6fb6e9af4f3f0c.yaml index a7c4315ca4..473132c6ad 100644 --- a/nuclei-templates/2016/CVE-2016-10881-06e9ac1fc5b59d1b8d6fb6e9af4f3f0c.yaml +++ b/nuclei-templates/2016/CVE-2016-10881-06e9ac1fc5b59d1b8d6fb6e9af4f3f0c.yaml @@ -4,7 +4,7 @@ info: name: > Google Doc Embedder <= 2.6.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The google-document-embedder plugin before 2.6.2 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/google-document-embedder/" google-query: inurl:"/wp-content/plugins/google-document-embedder/" shodan-query: 'vuln:CVE-2016-10881' - tags: cve,wordpress,wp-plugin,google-document-embedder,medium + tags: cve,wordpress,wp-plugin,google-document-embedder,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10882-4201a049c4e3da0f1f472f8fab792578.yaml b/nuclei-templates/2016/CVE-2016-10882-4201a049c4e3da0f1f472f8fab792578.yaml index bc63d1fff8..4d2d92d34e 100644 --- a/nuclei-templates/2016/CVE-2016-10882-4201a049c4e3da0f1f472f8fab792578.yaml +++ b/nuclei-templates/2016/CVE-2016-10882-4201a049c4e3da0f1f472f8fab792578.yaml @@ -4,7 +4,7 @@ info: name: > Google Doc Embedder <= 2.6.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Google Doc Embedder plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.6.1. This makes it possible for unauthenticated attackers to conduct attacks such as cross-site scripting via forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/google-document-embedder/" google-query: inurl:"/wp-content/plugins/google-document-embedder/" shodan-query: 'vuln:CVE-2016-10882' - tags: cve,wordpress,wp-plugin,google-document-embedder,high + tags: cve,wordpress,wp-plugin,google-document-embedder,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10883-268fe7ccb3ae756c66592ca513b99e93.yaml b/nuclei-templates/2016/CVE-2016-10883-268fe7ccb3ae756c66592ca513b99e93.yaml index 3193a09ed2..8b58e28f8e 100644 --- a/nuclei-templates/2016/CVE-2016-10883-268fe7ccb3ae756c66592ca513b99e93.yaml +++ b/nuclei-templates/2016/CVE-2016-10883-268fe7ccb3ae756c66592ca513b99e93.yaml @@ -4,7 +4,7 @@ info: name: > Simple add pages or posts < 1.7 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The simple-add-pages-or-posts plugin before 1.7 for WordPress has CSRF for deleting users. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/simple-add-pages-or-posts/" google-query: inurl:"/wp-content/plugins/simple-add-pages-or-posts/" shodan-query: 'vuln:CVE-2016-10883' - tags: cve,wordpress,wp-plugin,simple-add-pages-or-posts,high + tags: cve,wordpress,wp-plugin,simple-add-pages-or-posts,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10884-492d26185e3f340adae3b16a9841dc89.yaml b/nuclei-templates/2016/CVE-2016-10884-492d26185e3f340adae3b16a9841dc89.yaml index 41f56b57db..600268ea56 100644 --- a/nuclei-templates/2016/CVE-2016-10884-492d26185e3f340adae3b16a9841dc89.yaml +++ b/nuclei-templates/2016/CVE-2016-10884-492d26185e3f340adae3b16a9841dc89.yaml @@ -4,7 +4,7 @@ info: name: > Simple Membership <= 3.3.2 - Multiple Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Simple Membership plugin for WordPress is vulnerable to multiple Cross-Site Request Forgery attacks in versions up to, and including, 3.3.2. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to gain administrative access and perform otherwise restricted actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/simple-membership/" google-query: inurl:"/wp-content/plugins/simple-membership/" shodan-query: 'vuln:CVE-2016-10884' - tags: cve,wordpress,wp-plugin,simple-membership,high + tags: cve,wordpress,wp-plugin,simple-membership,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10885-eb8ded5298215dd0e82d0abb7c7916df.yaml b/nuclei-templates/2016/CVE-2016-10885-eb8ded5298215dd0e82d0abb7c7916df.yaml index 99007972ba..f803ba023e 100644 --- a/nuclei-templates/2016/CVE-2016-10885-eb8ded5298215dd0e82d0abb7c7916df.yaml +++ b/nuclei-templates/2016/CVE-2016-10885-eb8ded5298215dd0e82d0abb7c7916df.yaml @@ -4,7 +4,7 @@ info: name: > WP Editor < 1.2.6 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to 1.2.6. This is due to missing or incorrect nonce validation on the save_settings() function, in addition to a few other functions. This makes it possible for unauthenticated attackers to modify the plugin's settings and upload files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-editor/" google-query: inurl:"/wp-content/plugins/wp-editor/" shodan-query: 'vuln:CVE-2016-10885' - tags: cve,wordpress,wp-plugin,wp-editor,high + tags: cve,wordpress,wp-plugin,wp-editor,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10889-91308ce2ef066c70ca278e2e191864f4.yaml b/nuclei-templates/2016/CVE-2016-10889-91308ce2ef066c70ca278e2e191864f4.yaml index 8d0bee3c1f..29e708608c 100644 --- a/nuclei-templates/2016/CVE-2016-10889-91308ce2ef066c70ca278e2e191864f4.yaml +++ b/nuclei-templates/2016/CVE-2016-10889-91308ce2ef066c70ca278e2e191864f4.yaml @@ -4,7 +4,7 @@ info: name: > NextGEN Gallery <= 2.1.56 - Authenticated Local File Inclusion & SQL injection author: topscoder - severity: critical + severity: low description: > The nextgen-gallery plugin before 2.1.57 for WordPress has SQL injection via a gallery name. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nextgen-gallery/" google-query: inurl:"/wp-content/plugins/nextgen-gallery/" shodan-query: 'vuln:CVE-2016-10889' - tags: cve,wordpress,wp-plugin,nextgen-gallery,critical + tags: cve,wordpress,wp-plugin,nextgen-gallery,low http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10891-be27c4b6992c035b340ec769cdb51351.yaml b/nuclei-templates/2016/CVE-2016-10891-be27c4b6992c035b340ec769cdb51351.yaml index 27b77ce233..e5b4355b7c 100644 --- a/nuclei-templates/2016/CVE-2016-10891-be27c4b6992c035b340ec769cdb51351.yaml +++ b/nuclei-templates/2016/CVE-2016-10891-be27c4b6992c035b340ec769cdb51351.yaml @@ -4,7 +4,7 @@ info: name: > Activity Log < 2.3.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The aryo-activity-log plugin before 2.3.3 for WordPress has XSS in the search_data parameter in the aryo-activity-log/classes/class-aal-activity-log-list-table.php file. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/aryo-activity-log/" google-query: inurl:"/wp-content/plugins/aryo-activity-log/" shodan-query: 'vuln:CVE-2016-10891' - tags: cve,wordpress,wp-plugin,aryo-activity-log,medium + tags: cve,wordpress,wp-plugin,aryo-activity-log,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10892-b648d871623ad477887d3a2ad417ce75.yaml b/nuclei-templates/2016/CVE-2016-10892-b648d871623ad477887d3a2ad417ce75.yaml index 13e2675663..3f839718e7 100644 --- a/nuclei-templates/2016/CVE-2016-10892-b648d871623ad477887d3a2ad417ce75.yaml +++ b/nuclei-templates/2016/CVE-2016-10892-b648d871623ad477887d3a2ad417ce75.yaml @@ -4,7 +4,7 @@ info: name: > Chained Quiz Plugin < 1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Chained Quiz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via several parameters in versions up to, and including, 0.9.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/chained-quiz/" google-query: inurl:"/wp-content/plugins/chained-quiz/" shodan-query: 'vuln:CVE-2016-10892' - tags: cve,wordpress,wp-plugin,chained-quiz,medium + tags: cve,wordpress,wp-plugin,chained-quiz,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10893-a24d4eae978465f1c7539ec2afb5d89a.yaml b/nuclei-templates/2016/CVE-2016-10893-a24d4eae978465f1c7539ec2afb5d89a.yaml index 594c1b68e5..9bdddb5073 100644 --- a/nuclei-templates/2016/CVE-2016-10893-a24d4eae978465f1c7539ec2afb5d89a.yaml +++ b/nuclei-templates/2016/CVE-2016-10893-a24d4eae978465f1c7539ec2afb5d89a.yaml @@ -4,7 +4,7 @@ info: name: > Crayon Syntax Highlighter < 2.8.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The crayon-syntax-highlighter plugin before 2.8.4 for WordPress has multiple XSS issues via AJAX requests. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/crayon-syntax-highlighter/" google-query: inurl:"/wp-content/plugins/crayon-syntax-highlighter/" shodan-query: 'vuln:CVE-2016-10893' - tags: cve,wordpress,wp-plugin,crayon-syntax-highlighter,medium + tags: cve,wordpress,wp-plugin,crayon-syntax-highlighter,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10895-75c93ad74d45c10e07e436b9060dff63.yaml b/nuclei-templates/2016/CVE-2016-10895-75c93ad74d45c10e07e436b9060dff63.yaml index 07e9ff1d0b..1d37519b0b 100644 --- a/nuclei-templates/2016/CVE-2016-10895-75c93ad74d45c10e07e436b9060dff63.yaml +++ b/nuclei-templates/2016/CVE-2016-10895-75c93ad74d45c10e07e436b9060dff63.yaml @@ -4,7 +4,7 @@ info: name: > Option Tree <= 2.5.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The option-tree plugin before 2.6.0 for WordPress has XSS via an add_list_item or add_social_links AJAX request. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/option-tree/" google-query: inurl:"/wp-content/plugins/option-tree/" shodan-query: 'vuln:CVE-2016-10895' - tags: cve,wordpress,wp-plugin,option-tree,medium + tags: cve,wordpress,wp-plugin,option-tree,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10896-da0195abc3fd621c83febd2fb7f0bcc9.yaml b/nuclei-templates/2016/CVE-2016-10896-da0195abc3fd621c83febd2fb7f0bcc9.yaml index 49fd105678..e67a084c78 100644 --- a/nuclei-templates/2016/CVE-2016-10896-da0195abc3fd621c83febd2fb7f0bcc9.yaml +++ b/nuclei-templates/2016/CVE-2016-10896-da0195abc3fd621c83febd2fb7f0bcc9.yaml @@ -4,7 +4,7 @@ info: name: > SEO Redirection <= 4.2 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The SEO Redirection plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an unknown parameter in versions up to, and including, 4.2 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/seo-redirection/" google-query: inurl:"/wp-content/plugins/seo-redirection/" shodan-query: 'vuln:CVE-2016-10896' - tags: cve,wordpress,wp-plugin,seo-redirection,medium + tags: cve,wordpress,wp-plugin,seo-redirection,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10897-9660e0224b9760d1af88fd4611d7d759.yaml b/nuclei-templates/2016/CVE-2016-10897-9660e0224b9760d1af88fd4611d7d759.yaml index 1c582f8275..56a11a9008 100644 --- a/nuclei-templates/2016/CVE-2016-10897-9660e0224b9760d1af88fd4611d7d759.yaml +++ b/nuclei-templates/2016/CVE-2016-10897-9660e0224b9760d1af88fd4611d7d759.yaml @@ -4,7 +4,7 @@ info: name: > Sermon Browser <= 0.45.15 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Sermon Browser plugin for WordPress is vulnerable to multiple Cross-Site Scripting in versions up to, and including, 0.45.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sermon-browser/" google-query: inurl:"/wp-content/plugins/sermon-browser/" shodan-query: 'vuln:CVE-2016-10897' - tags: cve,wordpress,wp-plugin,sermon-browser,medium + tags: cve,wordpress,wp-plugin,sermon-browser,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10898-d59208c9d25614855049428d0906a55a.yaml b/nuclei-templates/2016/CVE-2016-10898-d59208c9d25614855049428d0906a55a.yaml index edf397e8c8..99604e1474 100644 --- a/nuclei-templates/2016/CVE-2016-10898-d59208c9d25614855049428d0906a55a.yaml +++ b/nuclei-templates/2016/CVE-2016-10898-d59208c9d25614855049428d0906a55a.yaml @@ -4,7 +4,7 @@ info: name: > Total Security <= 3.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The total-security plugin before 3.4.1 for WordPress has XSS via several parameters. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/total-security/" google-query: inurl:"/wp-content/plugins/total-security/" shodan-query: 'vuln:CVE-2016-10898' - tags: cve,wordpress,wp-plugin,total-security,medium + tags: cve,wordpress,wp-plugin,total-security,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10900-72e728e9748e016a77172519c9f57dce.yaml b/nuclei-templates/2016/CVE-2016-10900-72e728e9748e016a77172519c9f57dce.yaml index 8b46363680..caeb11d12a 100644 --- a/nuclei-templates/2016/CVE-2016-10900-72e728e9748e016a77172519c9f57dce.yaml +++ b/nuclei-templates/2016/CVE-2016-10900-72e728e9748e016a77172519c9f57dce.yaml @@ -4,7 +4,7 @@ info: name: > Uji Countdown <= 2.0.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Uji Countdown plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 2.0.6 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/uji-countdown/" google-query: inurl:"/wp-content/plugins/uji-countdown/" shodan-query: 'vuln:CVE-2016-10900' - tags: cve,wordpress,wp-plugin,uji-countdown,medium + tags: cve,wordpress,wp-plugin,uji-countdown,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10901-e97ef8cef65f1238fc33971be91c7b6a.yaml b/nuclei-templates/2016/CVE-2016-10901-e97ef8cef65f1238fc33971be91c7b6a.yaml index 553306498f..b92acf8d74 100644 --- a/nuclei-templates/2016/CVE-2016-10901-e97ef8cef65f1238fc33971be91c7b6a.yaml +++ b/nuclei-templates/2016/CVE-2016-10901-e97ef8cef65f1238fc33971be91c7b6a.yaml @@ -4,7 +4,7 @@ info: name: > Customer Reviews < 3.0.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Customer Reviews Plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'wpcr3_debug_code' parameter in versions up to, and including, 3.0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-customer-reviews/" google-query: inurl:"/wp-content/plugins/wp-customer-reviews/" shodan-query: 'vuln:CVE-2016-10901' - tags: cve,wordpress,wp-plugin,wp-customer-reviews,medium + tags: cve,wordpress,wp-plugin,wp-customer-reviews,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10902-daafab6254624f5514eee093537d860d.yaml b/nuclei-templates/2016/CVE-2016-10902-daafab6254624f5514eee093537d860d.yaml index 2ff6166022..72a9ef084d 100644 --- a/nuclei-templates/2016/CVE-2016-10902-daafab6254624f5514eee093537d860d.yaml +++ b/nuclei-templates/2016/CVE-2016-10902-daafab6254624f5514eee093537d860d.yaml @@ -4,7 +4,7 @@ info: name: > WP Customer Reviews <= 3.0.8 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Customer Reviews Plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.0.8. This is due to missing nonce validation on the 'update_options' function. This makes it possible for unauthenticated attackers modify the plugin's settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-customer-reviews/" google-query: inurl:"/wp-content/plugins/wp-customer-reviews/" shodan-query: 'vuln:CVE-2016-10902' - tags: cve,wordpress,wp-plugin,wp-customer-reviews,high + tags: cve,wordpress,wp-plugin,wp-customer-reviews,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10903-f63791a8b82a8db6f6f51f822aa27ea8.yaml b/nuclei-templates/2016/CVE-2016-10903-f63791a8b82a8db6f6f51f822aa27ea8.yaml index 957ce558da..9c5addd6b5 100644 --- a/nuclei-templates/2016/CVE-2016-10903-f63791a8b82a8db6f6f51f822aa27ea8.yaml +++ b/nuclei-templates/2016/CVE-2016-10903-f63791a8b82a8db6f6f51f822aa27ea8.yaml @@ -4,7 +4,7 @@ info: name: > GoDaddy Email Marketing < 1.1.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The GoDaddy Email Marketing plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions before 1.1.4. This is due to missing or incorrect nonce validation in the page_load function. This makes it possible for unauthenticated attackers to caused all the data associate with the plugin to be deleted via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/godaddy-email-marketing-sign-up-forms/" google-query: inurl:"/wp-content/plugins/godaddy-email-marketing-sign-up-forms/" shodan-query: 'vuln:CVE-2016-10903' - tags: cve,wordpress,wp-plugin,godaddy-email-marketing-sign-up-forms,high + tags: cve,wordpress,wp-plugin,godaddy-email-marketing-sign-up-forms,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10911-da987af29928bc75b0d20d1e2162e5dd.yaml b/nuclei-templates/2016/CVE-2016-10911-da987af29928bc75b0d20d1e2162e5dd.yaml index e5bd71b4e5..39d4a9ce41 100644 --- a/nuclei-templates/2016/CVE-2016-10911-da987af29928bc75b0d20d1e2162e5dd.yaml +++ b/nuclei-templates/2016/CVE-2016-10911-da987af29928bc75b0d20d1e2162e5dd.yaml @@ -4,7 +4,7 @@ info: name: > Profile Builder – User Profile & User Registration Forms < 2.4.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The profile-builder plugin before 2.4.2 for WordPress has multiple XSS issues. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/profile-builder/" google-query: inurl:"/wp-content/plugins/profile-builder/" shodan-query: 'vuln:CVE-2016-10911' - tags: cve,wordpress,wp-plugin,profile-builder,medium + tags: cve,wordpress,wp-plugin,profile-builder,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10912-ac061f34e871527fabbabb8afc45c209.yaml b/nuclei-templates/2016/CVE-2016-10912-ac061f34e871527fabbabb8afc45c209.yaml index 58d445ee88..0cf8a13c50 100644 --- a/nuclei-templates/2016/CVE-2016-10912-ac061f34e871527fabbabb8afc45c209.yaml +++ b/nuclei-templates/2016/CVE-2016-10912-ac061f34e871527fabbabb8afc45c209.yaml @@ -4,7 +4,7 @@ info: name: > Universal Analytics <= 1.3.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Universal Analytics plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/universal-analytics/" google-query: inurl:"/wp-content/plugins/universal-analytics/" shodan-query: 'vuln:CVE-2016-10912' - tags: cve,wordpress,wp-plugin,universal-analytics,medium + tags: cve,wordpress,wp-plugin,universal-analytics,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10914-373c3d1e9d0bf3f43f2574269f041f82.yaml b/nuclei-templates/2016/CVE-2016-10914-373c3d1e9d0bf3f43f2574269f041f82.yaml index 7343ff323c..5710748aaa 100644 --- a/nuclei-templates/2016/CVE-2016-10914-373c3d1e9d0bf3f43f2574269f041f82.yaml +++ b/nuclei-templates/2016/CVE-2016-10914-373c3d1e9d0bf3f43f2574269f041f82.yaml @@ -4,7 +4,7 @@ info: name: > Add From Server <= 3.3.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The add-from-server plugin before 3.3.2 for WordPress has CSRF for importing a large file. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/add-from-server/" google-query: inurl:"/wp-content/plugins/add-from-server/" shodan-query: 'vuln:CVE-2016-10914' - tags: cve,wordpress,wp-plugin,add-from-server,high + tags: cve,wordpress,wp-plugin,add-from-server,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10915-0ff521bb2f967b893b649e52f933e62e.yaml b/nuclei-templates/2016/CVE-2016-10915-0ff521bb2f967b893b649e52f933e62e.yaml index 5cb8e1da04..25318f66f0 100644 --- a/nuclei-templates/2016/CVE-2016-10915-0ff521bb2f967b893b649e52f933e62e.yaml +++ b/nuclei-templates/2016/CVE-2016-10915-0ff521bb2f967b893b649e52f933e62e.yaml @@ -4,7 +4,7 @@ info: name: > Popup by Supsystic < 1.7.9 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The popup-by-supsystic plugin before 1.7.9 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/popup-by-supsystic/" google-query: inurl:"/wp-content/plugins/popup-by-supsystic/" shodan-query: 'vuln:CVE-2016-10915' - tags: cve,wordpress,wp-plugin,popup-by-supsystic,high + tags: cve,wordpress,wp-plugin,popup-by-supsystic,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10918-2f3164fe48781902f2ffb82e4c682a7b.yaml b/nuclei-templates/2016/CVE-2016-10918-2f3164fe48781902f2ffb82e4c682a7b.yaml index a9ea42caa7..819a36aa28 100644 --- a/nuclei-templates/2016/CVE-2016-10918-2f3164fe48781902f2ffb82e4c682a7b.yaml +++ b/nuclei-templates/2016/CVE-2016-10918-2f3164fe48781902f2ffb82e4c682a7b.yaml @@ -4,7 +4,7 @@ info: name: > Photo Gallery by Supsystic <= 1.8.8 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Photo Gallery by Supsystic plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.8.5. This is due to missing or incorrect nonce validation on the 'updateAttachment' action. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gallery-by-supsystic/" google-query: inurl:"/wp-content/plugins/gallery-by-supsystic/" shodan-query: 'vuln:CVE-2016-10918' - tags: cve,wordpress,wp-plugin,gallery-by-supsystic,high + tags: cve,wordpress,wp-plugin,gallery-by-supsystic,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10919-c1bbee5af74211de37a39642515f7de2.yaml b/nuclei-templates/2016/CVE-2016-10919-c1bbee5af74211de37a39642515f7de2.yaml index b4421bf789..da7b8fa654 100644 --- a/nuclei-templates/2016/CVE-2016-10919-c1bbee5af74211de37a39642515f7de2.yaml +++ b/nuclei-templates/2016/CVE-2016-10919-c1bbee5af74211de37a39642515f7de2.yaml @@ -4,7 +4,7 @@ info: name: > WassUp Real Time Analytics < 1.9.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wassup plugin before 1.9.1 for WordPress has XSS via the Top stats widget or the wassupURI::add_siteurl method, a different vulnerability than CVE-2012-2633. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wassup/" google-query: inurl:"/wp-content/plugins/wassup/" shodan-query: 'vuln:CVE-2016-10919' - tags: cve,wordpress,wp-plugin,wassup,medium + tags: cve,wordpress,wp-plugin,wassup,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10920-24f4d698ab0a491686fe5ba91eade3a1.yaml b/nuclei-templates/2016/CVE-2016-10920-24f4d698ab0a491686fe5ba91eade3a1.yaml index ec429eef66..a14c574552 100644 --- a/nuclei-templates/2016/CVE-2016-10920-24f4d698ab0a491686fe5ba91eade3a1.yaml +++ b/nuclei-templates/2016/CVE-2016-10920-24f4d698ab0a491686fe5ba91eade3a1.yaml @@ -4,7 +4,7 @@ info: name: > GNUCommerce < 0.5.7-BETA - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The gnucommerce plugin before 0.5.7-BETA for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gnucommerce/" google-query: inurl:"/wp-content/plugins/gnucommerce/" shodan-query: 'vuln:CVE-2016-10920' - tags: cve,wordpress,wp-plugin,gnucommerce,medium + tags: cve,wordpress,wp-plugin,gnucommerce,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10925-12236d5bb8f3c06e72ec152e136c1986.yaml b/nuclei-templates/2016/CVE-2016-10925-12236d5bb8f3c06e72ec152e136c1986.yaml index 089812b87d..6348e506c4 100644 --- a/nuclei-templates/2016/CVE-2016-10925-12236d5bb8f3c06e72ec152e136c1986.yaml +++ b/nuclei-templates/2016/CVE-2016-10925-12236d5bb8f3c06e72ec152e136c1986.yaml @@ -4,7 +4,7 @@ info: name: > LoginWP < 2.9.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The peters-login-redirect plugin before 2.9.1 for WordPress has XSS during the editing of redirect URLs. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/peters-login-redirect/" google-query: inurl:"/wp-content/plugins/peters-login-redirect/" shodan-query: 'vuln:CVE-2016-10925' - tags: cve,wordpress,wp-plugin,peters-login-redirect,medium + tags: cve,wordpress,wp-plugin,peters-login-redirect,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10928-1108320cabd88205cc0f43eb95edee22.yaml b/nuclei-templates/2016/CVE-2016-10928-1108320cabd88205cc0f43eb95edee22.yaml index 5df44f9d7f..f41239a8ca 100644 --- a/nuclei-templates/2016/CVE-2016-10928-1108320cabd88205cc0f43eb95edee22.yaml +++ b/nuclei-templates/2016/CVE-2016-10928-1108320cabd88205cc0f43eb95edee22.yaml @@ -4,7 +4,7 @@ info: name: > OneLogin SAML SSO < 2.2.0 - Authentication Bypass author: topscoder - severity: high + severity: critical description: > The onelogin-saml-sso plugin before 2.2.0 for WordPress has a hardcoded @@@nopass@@@ password for just-in-time provisioned users. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/onelogin-saml-sso/" google-query: inurl:"/wp-content/plugins/onelogin-saml-sso/" shodan-query: 'vuln:CVE-2016-10928' - tags: cve,wordpress,wp-plugin,onelogin-saml-sso,high + tags: cve,wordpress,wp-plugin,onelogin-saml-sso,critical http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10929-e6b2b9642eaa28f30036533185d6907f.yaml b/nuclei-templates/2016/CVE-2016-10929-e6b2b9642eaa28f30036533185d6907f.yaml index 76b8497b0c..d18e395497 100644 --- a/nuclei-templates/2016/CVE-2016-10929-e6b2b9642eaa28f30036533185d6907f.yaml +++ b/nuclei-templates/2016/CVE-2016-10929-e6b2b9642eaa28f30036533185d6907f.yaml @@ -4,7 +4,7 @@ info: name: > Advanced AJAX Page Loader < 2.7.7 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > The Advanced AJAX Page Loader plugin before 2.7.7 for WordPress has no protection against the reading of uploaded files when not logged in. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/advanced-ajax-page-loader/" google-query: inurl:"/wp-content/plugins/advanced-ajax-page-loader/" shodan-query: 'vuln:CVE-2016-10929' - tags: cve,wordpress,wp-plugin,advanced-ajax-page-loader,high + tags: cve,wordpress,wp-plugin,advanced-ajax-page-loader,critical http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10935-675cb8bcb438f10a9bd4c15d9cbed954.yaml b/nuclei-templates/2016/CVE-2016-10935-675cb8bcb438f10a9bd4c15d9cbed954.yaml index 6a4601b836..3ab2a1beb0 100644 --- a/nuclei-templates/2016/CVE-2016-10935-675cb8bcb438f10a9bd4c15d9cbed954.yaml +++ b/nuclei-templates/2016/CVE-2016-10935-675cb8bcb438f10a9bd4c15d9cbed954.yaml @@ -4,7 +4,7 @@ info: name: > WooCommerce – Store Exporter <= 1.8.3 - Missing Authorization author: topscoder - severity: critical + severity: high description: > The WooCommerce – Store Exporter plugin for WordPress is vulnerable to authorization bypass due to a missing capability check in the woo_ce_admin_init function hooked via 'init' in versions up to, and including 1.8.3. This makes it possible for unauthenticated attackers to perform actions like exporting data that may contain sensitive information. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/woocommerce-exporter/" google-query: inurl:"/wp-content/plugins/woocommerce-exporter/" shodan-query: 'vuln:CVE-2016-10935' - tags: cve,wordpress,wp-plugin,woocommerce-exporter,critical + tags: cve,wordpress,wp-plugin,woocommerce-exporter,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10936-72b547593d28ba78083c2d30dcb45b59.yaml b/nuclei-templates/2016/CVE-2016-10936-72b547593d28ba78083c2d30dcb45b59.yaml index f458dba875..441a50a084 100644 --- a/nuclei-templates/2016/CVE-2016-10936-72b547593d28ba78083c2d30dcb45b59.yaml +++ b/nuclei-templates/2016/CVE-2016-10936-72b547593d28ba78083c2d30dcb45b59.yaml @@ -4,7 +4,7 @@ info: name: > WP-Polls <= 2.73 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-polls plugin before 2.73.1 for WordPress has XSS via the Poll bar option. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-polls/" google-query: inurl:"/wp-content/plugins/wp-polls/" shodan-query: 'vuln:CVE-2016-10936' - tags: cve,wordpress,wp-plugin,wp-polls,medium + tags: cve,wordpress,wp-plugin,wp-polls,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10939-2adf451d71caa92a7f7c155d4ef7aae4.yaml b/nuclei-templates/2016/CVE-2016-10939-2adf451d71caa92a7f7c155d4ef7aae4.yaml index 834b2d9164..553bad9c46 100644 --- a/nuclei-templates/2016/CVE-2016-10939-2adf451d71caa92a7f7c155d4ef7aae4.yaml +++ b/nuclei-templates/2016/CVE-2016-10939-2adf451d71caa92a7f7c155d4ef7aae4.yaml @@ -4,7 +4,7 @@ info: name: > Xtreme Locator Dealer Locator Plugin <= 3.0.1 - Authenticated (Admin+) SQL Injection author: topscoder - severity: high + severity: low description: > The xtremelocator plugin 3.0.1 for WordPress has SQL injection via the id parameter for high-privilege (admin+) users. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/xtremelocator/" google-query: inurl:"/wp-content/plugins/xtremelocator/" shodan-query: 'vuln:CVE-2016-10939' - tags: cve,wordpress,wp-plugin,xtremelocator,high + tags: cve,wordpress,wp-plugin,xtremelocator,low http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10940-d6a4a05c68d8a3214ff9eb4a728a2600.yaml b/nuclei-templates/2016/CVE-2016-10940-d6a4a05c68d8a3214ff9eb4a728a2600.yaml index 243cccbd68..05e6cf60a2 100644 --- a/nuclei-templates/2016/CVE-2016-10940-d6a4a05c68d8a3214ff9eb4a728a2600.yaml +++ b/nuclei-templates/2016/CVE-2016-10940-d6a4a05c68d8a3214ff9eb4a728a2600.yaml @@ -4,7 +4,7 @@ info: name: > ZM Gallery <= 1.0 - Authenticated (Admin+) SQL Injection author: topscoder - severity: high + severity: low description: > The zm-gallery plugin 1.0 for WordPress has SQL injection via the order parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/zm-gallery/" google-query: inurl:"/wp-content/plugins/zm-gallery/" shodan-query: 'vuln:CVE-2016-10940' - tags: cve,wordpress,wp-plugin,zm-gallery,high + tags: cve,wordpress,wp-plugin,zm-gallery,low http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10941-e253bc9eb60b3ba0170a2740ba27c2f4.yaml b/nuclei-templates/2016/CVE-2016-10941-e253bc9eb60b3ba0170a2740ba27c2f4.yaml index ad74cb601e..143c937a28 100644 --- a/nuclei-templates/2016/CVE-2016-10941-e253bc9eb60b3ba0170a2740ba27c2f4.yaml +++ b/nuclei-templates/2016/CVE-2016-10941-e253bc9eb60b3ba0170a2740ba27c2f4.yaml @@ -4,7 +4,7 @@ info: name: > Podlove Podcast Publisher < 2.3.16 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > The podlove-podcasting-plugin-for-wordpress plugin before 2.3.16 for WordPress has XSS exploitable via CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" google-query: inurl:"/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" shodan-query: 'vuln:CVE-2016-10941' - tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,high + tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10942-f9c4a4753797c567682067fdd891aa71.yaml b/nuclei-templates/2016/CVE-2016-10942-f9c4a4753797c567682067fdd891aa71.yaml index 18811246ed..0c504e5364 100644 --- a/nuclei-templates/2016/CVE-2016-10942-f9c4a4753797c567682067fdd891aa71.yaml +++ b/nuclei-templates/2016/CVE-2016-10942-f9c4a4753797c567682067fdd891aa71.yaml @@ -4,7 +4,7 @@ info: name: > Podlove Podcast Publisher < 2.3.16 - SQL Injection author: topscoder - severity: high + severity: critical description: > The podlove-podcasting-plugin-for-wordpress plugin before 2.3.16 for WordPress has SQL injection via the insert_id parameter exploitable via CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" google-query: inurl:"/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" shodan-query: 'vuln:CVE-2016-10942' - tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,high + tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,critical http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10943-11b8e915a665a007145e1d71a284462b.yaml b/nuclei-templates/2016/CVE-2016-10943-11b8e915a665a007145e1d71a284462b.yaml index a7ac83365d..d8b03e7e8f 100644 --- a/nuclei-templates/2016/CVE-2016-10943-11b8e915a665a007145e1d71a284462b.yaml +++ b/nuclei-templates/2016/CVE-2016-10943-11b8e915a665a007145e1d71a284462b.yaml @@ -4,7 +4,7 @@ info: name: > ZX_CSV Upload <= 1 - Authenticated (Admin+) SQL Injection author: topscoder - severity: high + severity: low description: > The zx-csv-upload plugin 1 for WordPress has SQL injection via the id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/zx-csv-upload/" google-query: inurl:"/wp-content/plugins/zx-csv-upload/" shodan-query: 'vuln:CVE-2016-10943' - tags: cve,wordpress,wp-plugin,zx-csv-upload,high + tags: cve,wordpress,wp-plugin,zx-csv-upload,low http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10944-6df6e844abfccff24d48183d808487ab.yaml b/nuclei-templates/2016/CVE-2016-10944-6df6e844abfccff24d48183d808487ab.yaml index 793bd2192e..21cdc3cbb3 100644 --- a/nuclei-templates/2016/CVE-2016-10944-6df6e844abfccff24d48183d808487ab.yaml +++ b/nuclei-templates/2016/CVE-2016-10944-6df6e844abfccff24d48183d808487ab.yaml @@ -4,7 +4,7 @@ info: name: > Multisite Post Duplicator <= 1.7.6 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The multisite-post-duplicator plugin for WordPress has wp-admin/tools.php?page=mpd CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/multisite-post-duplicator/" google-query: inurl:"/wp-content/plugins/multisite-post-duplicator/" shodan-query: 'vuln:CVE-2016-10944' - tags: cve,wordpress,wp-plugin,multisite-post-duplicator,high + tags: cve,wordpress,wp-plugin,multisite-post-duplicator,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10945-39d9e91ebde9c4d0e5ed1e82b99b21f1.yaml b/nuclei-templates/2016/CVE-2016-10945-39d9e91ebde9c4d0e5ed1e82b99b21f1.yaml index 8782a62589..cf8eee69fd 100644 --- a/nuclei-templates/2016/CVE-2016-10945-39d9e91ebde9c4d0e5ed1e82b99b21f1.yaml +++ b/nuclei-templates/2016/CVE-2016-10945-39d9e91ebde9c4d0e5ed1e82b99b21f1.yaml @@ -4,7 +4,7 @@ info: name: > Platform 4 <= 1.1.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Platform 4 theme for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.1.4. This is due to missing or incorrect nonce validation in the 'includes/library.options.php' file. This makes it possible for unauthenticated attackers to gain otherwise restricted access to administrative actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/platform/" google-query: inurl:"/wp-content/themes/platform/" shodan-query: 'vuln:CVE-2016-10945' - tags: cve,wordpress,wp-theme,platform,high + tags: cve,wordpress,wp-theme,platform,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10946-5b558ed2503b6bdcb6a02e6d5ffb6d95.yaml b/nuclei-templates/2016/CVE-2016-10946-5b558ed2503b6bdcb6a02e6d5ffb6d95.yaml index 7d8c80b6fb..671522c493 100644 --- a/nuclei-templates/2016/CVE-2016-10946-5b558ed2503b6bdcb6a02e6d5ffb6d95.yaml +++ b/nuclei-templates/2016/CVE-2016-10946-5b558ed2503b6bdcb6a02e6d5ffb6d95.yaml @@ -4,7 +4,7 @@ info: name: > Wp-D3 < 2.4.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The wp-d3 plugin before 2.4.1 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-d3/" google-query: inurl:"/wp-content/plugins/wp-d3/" shodan-query: 'vuln:CVE-2016-10946' - tags: cve,wordpress,wp-plugin,wp-d3,high + tags: cve,wordpress,wp-plugin,wp-d3,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10947-e8e5df43b04b7f37f9a558b78548b1cb.yaml b/nuclei-templates/2016/CVE-2016-10947-e8e5df43b04b7f37f9a558b78548b1cb.yaml index ec9c9edbf4..89a1d052db 100644 --- a/nuclei-templates/2016/CVE-2016-10947-e8e5df43b04b7f37f9a558b78548b1cb.yaml +++ b/nuclei-templates/2016/CVE-2016-10947-e8e5df43b04b7f37f9a558b78548b1cb.yaml @@ -4,7 +4,7 @@ info: name: > Post Indexer <= 3.0.6.1 - Authenticated (Super Admin+) SQL Injection author: topscoder - severity: high + severity: low description: > The Post Indexer plugin before 3.0.6.2 for WordPress has SQL injection via the period parameter by a super admin. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/post-indexer/" google-query: inurl:"/wp-content/plugins/post-indexer/" shodan-query: 'vuln:CVE-2016-10947' - tags: cve,wordpress,wp-plugin,post-indexer,high + tags: cve,wordpress,wp-plugin,post-indexer,low http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10949-3770a5a68072ae899f0f18af895e3c7e.yaml b/nuclei-templates/2016/CVE-2016-10949-3770a5a68072ae899f0f18af895e3c7e.yaml index ba4aafd735..abc528fc43 100644 --- a/nuclei-templates/2016/CVE-2016-10949-3770a5a68072ae899f0f18af895e3c7e.yaml +++ b/nuclei-templates/2016/CVE-2016-10949-3770a5a68072ae899f0f18af895e3c7e.yaml @@ -4,7 +4,7 @@ info: name: > Relevanssi Premium < 1.14.6.1 - SQL Injection author: topscoder - severity: high + severity: critical description: > The Relevanssi Premium plugin before 1.14.6.1 for WordPress has SQL injection with resultant unsafe unserialization. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/relevanssi-premium/" google-query: inurl:"/wp-content/plugins/relevanssi-premium/" shodan-query: 'vuln:CVE-2016-10949' - tags: cve,wordpress,wp-plugin,relevanssi-premium,high + tags: cve,wordpress,wp-plugin,relevanssi-premium,critical http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10950-28a2dfdb4b89718535fa7dedda6260e9.yaml b/nuclei-templates/2016/CVE-2016-10950-28a2dfdb4b89718535fa7dedda6260e9.yaml index 65ecf73e8c..8f56726a8f 100644 --- a/nuclei-templates/2016/CVE-2016-10950-28a2dfdb4b89718535fa7dedda6260e9.yaml +++ b/nuclei-templates/2016/CVE-2016-10950-28a2dfdb4b89718535fa7dedda6260e9.yaml @@ -4,7 +4,7 @@ info: name: > Image Optimizer, Resizer and CDN – Sirv < 1.3.2 - SQL Injection author: topscoder - severity: high + severity: critical description: > The sirv plugin before 1.3.2 for WordPress has SQL injection via the id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sirv/" google-query: inurl:"/wp-content/plugins/sirv/" shodan-query: 'vuln:CVE-2016-10950' - tags: cve,wordpress,wp-plugin,sirv,high + tags: cve,wordpress,wp-plugin,sirv,critical http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10951-41d0ef3672db9c552872805c429ef89f.yaml b/nuclei-templates/2016/CVE-2016-10951-41d0ef3672db9c552872805c429ef89f.yaml index 904cdc2e9e..65c2f01081 100644 --- a/nuclei-templates/2016/CVE-2016-10951-41d0ef3672db9c552872805c429ef89f.yaml +++ b/nuclei-templates/2016/CVE-2016-10951-41d0ef3672db9c552872805c429ef89f.yaml @@ -4,7 +4,7 @@ info: name: > FireStorm Shopping Cart eCommerce Plugin <= 2.07.02 - SQL Injection author: topscoder - severity: high + severity: critical description: > The fs-shopping-cart plugin 2.07.02 for WordPress has SQL injection via the pid parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/fs-shopping-cart/" google-query: inurl:"/wp-content/plugins/fs-shopping-cart/" shodan-query: 'vuln:CVE-2016-10951' - tags: cve,wordpress,wp-plugin,fs-shopping-cart,high + tags: cve,wordpress,wp-plugin,fs-shopping-cart,critical http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10952-62f03cd88708d633c3bea1020189b887.yaml b/nuclei-templates/2016/CVE-2016-10952-62f03cd88708d633c3bea1020189b887.yaml index 2336c6575b..f7016a8a41 100644 --- a/nuclei-templates/2016/CVE-2016-10952-62f03cd88708d633c3bea1020189b887.yaml +++ b/nuclei-templates/2016/CVE-2016-10952-62f03cd88708d633c3bea1020189b887.yaml @@ -4,7 +4,7 @@ info: name: > Quotes Collection < 2.0.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The quotes-collection plugin before 2.0.6 for WordPress has XSS via the wp-admin/admin.php?page=quotes-collection page parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/quotes-collection/" google-query: inurl:"/wp-content/plugins/quotes-collection/" shodan-query: 'vuln:CVE-2016-10952' - tags: cve,wordpress,wp-plugin,quotes-collection,medium + tags: cve,wordpress,wp-plugin,quotes-collection,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10953-27ec034aba5d4951c82cebc35f1cf5b5.yaml b/nuclei-templates/2016/CVE-2016-10953-27ec034aba5d4951c82cebc35f1cf5b5.yaml index 35bfb115b0..b22ec4ff03 100644 --- a/nuclei-templates/2016/CVE-2016-10953-27ec034aba5d4951c82cebc35f1cf5b5.yaml +++ b/nuclei-templates/2016/CVE-2016-10953-27ec034aba5d4951c82cebc35f1cf5b5.yaml @@ -4,7 +4,7 @@ info: name: > Headway < 3.8.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Headway theme before 3.8.9 for WordPress has XSS via the license key field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/headway/" google-query: inurl:"/wp-content/themes/headway/" shodan-query: 'vuln:CVE-2016-10953' - tags: cve,wordpress,wp-theme,headway,medium + tags: cve,wordpress,wp-theme,headway,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10959-2dab9495e3032fc043db0a21d11fd446.yaml b/nuclei-templates/2016/CVE-2016-10959-2dab9495e3032fc043db0a21d11fd446.yaml index fa4844440f..68f65ec47f 100644 --- a/nuclei-templates/2016/CVE-2016-10959-2dab9495e3032fc043db0a21d11fd446.yaml +++ b/nuclei-templates/2016/CVE-2016-10959-2dab9495e3032fc043db0a21d11fd446.yaml @@ -4,7 +4,7 @@ info: name: > Estatik <= 2.3.0 - Cross-Site Request Forgery to Arbitrary File Upload author: topscoder - severity: high + severity: medium description: > The estatik plugin before 2.3.1 for WordPress has authenticated arbitrary file upload (exploitable with CSRF) via es_media_images[] to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/estatik/" google-query: inurl:"/wp-content/plugins/estatik/" shodan-query: 'vuln:CVE-2016-10959' - tags: cve,wordpress,wp-plugin,estatik,high + tags: cve,wordpress,wp-plugin,estatik,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10960-8435cd6b84481f3b14132a8d7f815c94.yaml b/nuclei-templates/2016/CVE-2016-10960-8435cd6b84481f3b14132a8d7f815c94.yaml index b4729cf25a..e023f5e613 100644 --- a/nuclei-templates/2016/CVE-2016-10960-8435cd6b84481f3b14132a8d7f815c94.yaml +++ b/nuclei-templates/2016/CVE-2016-10960-8435cd6b84481f3b14132a8d7f815c94.yaml @@ -4,7 +4,7 @@ info: name: > wSecure Lite < 2.4 - Remote Code Execution author: topscoder - severity: high + severity: critical description: > The wsecure plugin before 2.4 for WordPress has remote code execution via shell metacharacters in the wsecure-config.php publish parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wsecure/" google-query: inurl:"/wp-content/plugins/wsecure/" shodan-query: 'vuln:CVE-2016-10960' - tags: cve,wordpress,wp-plugin,wsecure,high + tags: cve,wordpress,wp-plugin,wsecure,critical http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10961-eec026409b2ce5ae4162f07361f714bc.yaml b/nuclei-templates/2016/CVE-2016-10961-eec026409b2ce5ae4162f07361f714bc.yaml index 9a180b63ed..730f0cf94f 100644 --- a/nuclei-templates/2016/CVE-2016-10961-eec026409b2ce5ae4162f07361f714bc.yaml +++ b/nuclei-templates/2016/CVE-2016-10961-eec026409b2ce5ae4162f07361f714bc.yaml @@ -4,7 +4,7 @@ info: name: > ColorWay <= 3.4.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The colorway theme before 3.4.2 for WordPress has XSS via the contactName parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/colorway/" google-query: inurl:"/wp-content/themes/colorway/" shodan-query: 'vuln:CVE-2016-10961' - tags: cve,wordpress,wp-theme,colorway,medium + tags: cve,wordpress,wp-theme,colorway,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10962-c7d2eaa1bef247cc946f12a77351dbbb.yaml b/nuclei-templates/2016/CVE-2016-10962-c7d2eaa1bef247cc946f12a77351dbbb.yaml index 4bf0223ed9..b2f7051f5e 100644 --- a/nuclei-templates/2016/CVE-2016-10962-c7d2eaa1bef247cc946f12a77351dbbb.yaml +++ b/nuclei-templates/2016/CVE-2016-10962-c7d2eaa1bef247cc946f12a77351dbbb.yaml @@ -4,7 +4,7 @@ info: name: > Icegram <= 1.9.18 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The icegram plugin before 1.9.19 for WordPress has CSRF via the wp-admin/edit.php option_name parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/icegram/" google-query: inurl:"/wp-content/plugins/icegram/" shodan-query: 'vuln:CVE-2016-10962' - tags: cve,wordpress,wp-plugin,icegram,high + tags: cve,wordpress,wp-plugin,icegram,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10963-1b90a29b0e05edb9e0100d5bac6dd543.yaml b/nuclei-templates/2016/CVE-2016-10963-1b90a29b0e05edb9e0100d5bac6dd543.yaml index 4167283d79..1d2a1c6d01 100644 --- a/nuclei-templates/2016/CVE-2016-10963-1b90a29b0e05edb9e0100d5bac6dd543.yaml +++ b/nuclei-templates/2016/CVE-2016-10963-1b90a29b0e05edb9e0100d5bac6dd543.yaml @@ -4,7 +4,7 @@ info: name: > Icegram <= 1.9.18 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The icegram plugin before 1.9.19 for WordPress has XSS in 'message' parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/icegram/" google-query: inurl:"/wp-content/plugins/icegram/" shodan-query: 'vuln:CVE-2016-10963' - tags: cve,wordpress,wp-plugin,icegram,medium + tags: cve,wordpress,wp-plugin,icegram,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10964-266cec63957d7dffbe45528e32eb40a1.yaml b/nuclei-templates/2016/CVE-2016-10964-266cec63957d7dffbe45528e32eb40a1.yaml index 9308f67841..2da1bf18ab 100644 --- a/nuclei-templates/2016/CVE-2016-10964-266cec63957d7dffbe45528e32eb40a1.yaml +++ b/nuclei-templates/2016/CVE-2016-10964-266cec63957d7dffbe45528e32eb40a1.yaml @@ -4,7 +4,7 @@ info: name: > dwnldr < 1.01 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The dwnldr plugin before 1.01 for WordPress has XSS via the User-Agent HTTP header. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/dwnldr/" google-query: inurl:"/wp-content/plugins/dwnldr/" shodan-query: 'vuln:CVE-2016-10964' - tags: cve,wordpress,wp-plugin,dwnldr,medium + tags: cve,wordpress,wp-plugin,dwnldr,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10970-ce31848b731129452978ca83014199c1.yaml b/nuclei-templates/2016/CVE-2016-10970-ce31848b731129452978ca83014199c1.yaml index e5943112e7..5a0972d73d 100644 --- a/nuclei-templates/2016/CVE-2016-10970-ce31848b731129452978ca83014199c1.yaml +++ b/nuclei-templates/2016/CVE-2016-10970-ce31848b731129452978ca83014199c1.yaml @@ -4,7 +4,7 @@ info: name: > SupportFlow <= 0.6 - Cross-Site Scripting via a ticket excerpt. author: topscoder - severity: medium + severity: high description: > The supportflow plugin before 0.7 for WordPress has XSS via a ticket excerpt. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/supportflow/" google-query: inurl:"/wp-content/plugins/supportflow/" shodan-query: 'vuln:CVE-2016-10970' - tags: cve,wordpress,wp-plugin,supportflow,medium + tags: cve,wordpress,wp-plugin,supportflow,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10974-656ffc00f499b97cc92334beba62fc4e.yaml b/nuclei-templates/2016/CVE-2016-10974-656ffc00f499b97cc92334beba62fc4e.yaml index 6feae928f3..4fe1d13aeb 100644 --- a/nuclei-templates/2016/CVE-2016-10974-656ffc00f499b97cc92334beba62fc4e.yaml +++ b/nuclei-templates/2016/CVE-2016-10974-656ffc00f499b97cc92334beba62fc4e.yaml @@ -4,7 +4,7 @@ info: name: > Fluid Responsive Slideshow < 2.2.7 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The fluid-responsive-slideshow plugin before 2.2.7 for WordPress has frs_save CSRF bug with Reflected XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/fluid-responsive-slideshow/" google-query: inurl:"/wp-content/plugins/fluid-responsive-slideshow/" shodan-query: 'vuln:CVE-2016-10974' - tags: cve,wordpress,wp-plugin,fluid-responsive-slideshow,high + tags: cve,wordpress,wp-plugin,fluid-responsive-slideshow,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10978-18c927eeaab747daf8dbc085388c3619.yaml b/nuclei-templates/2016/CVE-2016-10978-18c927eeaab747daf8dbc085388c3619.yaml index f2ed169445..d6b11d69a5 100644 --- a/nuclei-templates/2016/CVE-2016-10978-18c927eeaab747daf8dbc085388c3619.yaml +++ b/nuclei-templates/2016/CVE-2016-10978-18c927eeaab747daf8dbc085388c3619.yaml @@ -4,7 +4,7 @@ info: name: > Tag Miner (Automatic Tag Extraction) < 1.1.5 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The fossura-tag-miner plugin before 1.1.5 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/fossura-tag-miner/" google-query: inurl:"/wp-content/plugins/fossura-tag-miner/" shodan-query: 'vuln:CVE-2016-10978' - tags: cve,wordpress,wp-plugin,fossura-tag-miner,high + tags: cve,wordpress,wp-plugin,fossura-tag-miner,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10979-b1f4f06fa1d08e23be33495079a7bf7e.yaml b/nuclei-templates/2016/CVE-2016-10979-b1f4f06fa1d08e23be33495079a7bf7e.yaml index ff5cc2eb2f..d064941aa9 100644 --- a/nuclei-templates/2016/CVE-2016-10979-b1f4f06fa1d08e23be33495079a7bf7e.yaml +++ b/nuclei-templates/2016/CVE-2016-10979-b1f4f06fa1d08e23be33495079a7bf7e.yaml @@ -4,7 +4,7 @@ info: name: > Tag Miner (Automatic Tag Extraction) < 1.1.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The fossura-tag-miner plugin before 1.1.5 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/fossura-tag-miner/" google-query: inurl:"/wp-content/plugins/fossura-tag-miner/" shodan-query: 'vuln:CVE-2016-10979' - tags: cve,wordpress,wp-plugin,fossura-tag-miner,medium + tags: cve,wordpress,wp-plugin,fossura-tag-miner,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10981-4f2a3c77ca82525aff6c0c722c03bbb8.yaml b/nuclei-templates/2016/CVE-2016-10981-4f2a3c77ca82525aff6c0c722c03bbb8.yaml index a3769aa1ec..88b326a828 100644 --- a/nuclei-templates/2016/CVE-2016-10981-4f2a3c77ca82525aff6c0c722c03bbb8.yaml +++ b/nuclei-templates/2016/CVE-2016-10981-4f2a3c77ca82525aff6c0c722c03bbb8.yaml @@ -4,7 +4,7 @@ info: name: > Kento Post View Counter <= 2.8 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The kento-post-view-counter plugin through 2.8 for WordPress has stored XSS via kento_pvc_numbers_lang, kento_pvc_today_text, or kento_pvc_total_text. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/kento-post-view-counter/" google-query: inurl:"/wp-content/plugins/kento-post-view-counter/" shodan-query: 'vuln:CVE-2016-10981' - tags: cve,wordpress,wp-plugin,kento-post-view-counter,medium + tags: cve,wordpress,wp-plugin,kento-post-view-counter,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10982-e343250b5d78372d282c8933d6d57ce1.yaml b/nuclei-templates/2016/CVE-2016-10982-e343250b5d78372d282c8933d6d57ce1.yaml index 2125a9d0e5..d010e42a94 100644 --- a/nuclei-templates/2016/CVE-2016-10982-e343250b5d78372d282c8933d6d57ce1.yaml +++ b/nuclei-templates/2016/CVE-2016-10982-e343250b5d78372d282c8933d6d57ce1.yaml @@ -4,7 +4,7 @@ info: name: > Kento Post View Counter <= 2.8 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The kento-post-view-counter plugin through 2.8 for WordPress has wp-admin/admin.php?page=kentopvc_settings CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/kento-post-view-counter/" google-query: inurl:"/wp-content/plugins/kento-post-view-counter/" shodan-query: 'vuln:CVE-2016-10982' - tags: cve,wordpress,wp-plugin,kento-post-view-counter,high + tags: cve,wordpress,wp-plugin,kento-post-view-counter,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10987-99d48d97197070fa6f8afc1ea6ec2bed.yaml b/nuclei-templates/2016/CVE-2016-10987-99d48d97197070fa6f8afc1ea6ec2bed.yaml index d09a7e4712..060c34b780 100644 --- a/nuclei-templates/2016/CVE-2016-10987-99d48d97197070fa6f8afc1ea6ec2bed.yaml +++ b/nuclei-templates/2016/CVE-2016-10987-99d48d97197070fa6f8afc1ea6ec2bed.yaml @@ -4,7 +4,7 @@ info: name: > افزونه پیامک ووکامرس Persian WooCommerce SMS < 3.3.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The persian-woocommerce-sms plugin before 3.3.3 for WordPress has ps_sms_numbers XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/persian-woocommerce-sms/" google-query: inurl:"/wp-content/plugins/persian-woocommerce-sms/" shodan-query: 'vuln:CVE-2016-10987' - tags: cve,wordpress,wp-plugin,persian-woocommerce-sms,medium + tags: cve,wordpress,wp-plugin,persian-woocommerce-sms,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10988-aa03d96ef5988adea4feb7a4e959e6b8.yaml b/nuclei-templates/2016/CVE-2016-10988-aa03d96ef5988adea4feb7a4e959e6b8.yaml index b3c0c156cf..eb702adb27 100644 --- a/nuclei-templates/2016/CVE-2016-10988-aa03d96ef5988adea4feb7a4e959e6b8.yaml +++ b/nuclei-templates/2016/CVE-2016-10988-aa03d96ef5988adea4feb7a4e959e6b8.yaml @@ -4,7 +4,7 @@ info: name: > leenk.me < 2.6.0 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The leenkme plugin before 2.6.0 for WordPress has stored XSS via facebook_message, facebook_linkname, facebook_caption, facebook_description, default_image, or _wp_http_referer. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/leenkme/" google-query: inurl:"/wp-content/plugins/leenkme/" shodan-query: 'vuln:CVE-2016-10988' - tags: cve,wordpress,wp-plugin,leenkme,medium + tags: cve,wordpress,wp-plugin,leenkme,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10989-e628e638290643fc84f3ec2a1da56d28.yaml b/nuclei-templates/2016/CVE-2016-10989-e628e638290643fc84f3ec2a1da56d28.yaml index a311588159..a35a35555c 100644 --- a/nuclei-templates/2016/CVE-2016-10989-e628e638290643fc84f3ec2a1da56d28.yaml +++ b/nuclei-templates/2016/CVE-2016-10989-e628e638290643fc84f3ec2a1da56d28.yaml @@ -4,7 +4,7 @@ info: name: > leenk.me <= 2.5.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The leenkme plugin before 2.6.0 for WordPress has wp-admin/admin.php?page=leenkme_facebook CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/leenkme/" google-query: inurl:"/wp-content/plugins/leenkme/" shodan-query: 'vuln:CVE-2016-10989' - tags: cve,wordpress,wp-plugin,leenkme,high + tags: cve,wordpress,wp-plugin,leenkme,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10991-348a1a0272fab4e16c4ec4e28b1cc2f1.yaml b/nuclei-templates/2016/CVE-2016-10991-348a1a0272fab4e16c4ec4e28b1cc2f1.yaml index 0149e52553..3f242f447a 100644 --- a/nuclei-templates/2016/CVE-2016-10991-348a1a0272fab4e16c4ec4e28b1cc2f1.yaml +++ b/nuclei-templates/2016/CVE-2016-10991-348a1a0272fab4e16c4ec4e28b1cc2f1.yaml @@ -4,7 +4,7 @@ info: name: > IMDB Profile Widget < 1.0.9 - Local File Inclusion author: topscoder - severity: high + severity: critical description: > The IMDB Profile Widget plugin for WordPress is vulnerable to Local File Inclusion in versions up to 1.0.9 via the 'url' parameter found in the 'pic' file. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/imdb-widget/" google-query: inurl:"/wp-content/plugins/imdb-widget/" shodan-query: 'vuln:CVE-2016-10991' - tags: cve,wordpress,wp-plugin,imdb-widget,high + tags: cve,wordpress,wp-plugin,imdb-widget,critical http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10992-f2983beb380d477fba46a5c5deed43dd.yaml b/nuclei-templates/2016/CVE-2016-10992-f2983beb380d477fba46a5c5deed43dd.yaml index 1d6b723432..250e20069e 100644 --- a/nuclei-templates/2016/CVE-2016-10992-f2983beb380d477fba46a5c5deed43dd.yaml +++ b/nuclei-templates/2016/CVE-2016-10992-f2983beb380d477fba46a5c5deed43dd.yaml @@ -4,7 +4,7 @@ info: name: > Music Store <= 1.0.41 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The music-store plugin before 1.0.43 for WordPress has XSS via the wp-admin/admin.php?page=music-store-menu-reports from_year parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/music-store/" google-query: inurl:"/wp-content/plugins/music-store/" shodan-query: 'vuln:CVE-2016-10992' - tags: cve,wordpress,wp-plugin,music-store,medium + tags: cve,wordpress,wp-plugin,music-store,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10993-88013bc8aa189f38a19a59f4e02b7e1e.yaml b/nuclei-templates/2016/CVE-2016-10993-88013bc8aa189f38a19a59f4e02b7e1e.yaml index cc86e62e37..5e1bc26c94 100644 --- a/nuclei-templates/2016/CVE-2016-10993-88013bc8aa189f38a19a59f4e02b7e1e.yaml +++ b/nuclei-templates/2016/CVE-2016-10993-88013bc8aa189f38a19a59f4e02b7e1e.yaml @@ -4,7 +4,7 @@ info: name: > ScoreMe <= 2016-04-01 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The ScoreMe theme through 2016-04-01 for WordPress has XSS via the s parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/scoreme/" google-query: inurl:"/wp-content/themes/scoreme/" shodan-query: 'vuln:CVE-2016-10993' - tags: cve,wordpress,wp-theme,scoreme,medium + tags: cve,wordpress,wp-theme,scoreme,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10996-8105121190d01c38a4c87c0ee0fe8654.yaml b/nuclei-templates/2016/CVE-2016-10996-8105121190d01c38a4c87c0ee0fe8654.yaml index cc89909178..aaac7ff2e7 100644 --- a/nuclei-templates/2016/CVE-2016-10996-8105121190d01c38a4c87c0ee0fe8654.yaml +++ b/nuclei-templates/2016/CVE-2016-10996-8105121190d01c38a4c87c0ee0fe8654.yaml @@ -4,7 +4,7 @@ info: name: > Popup Builder by OptinMonster <= 1.1.4.5 - Remote Code Execution author: topscoder - severity: medium + severity: critical description: > The OptinMonster plugin for WordPress is vulnerable to Remote Code Execution in versions up to, and including, 1.1.4.5 via the shortcode() function. This allows unauthenticated attackers to execute code on the server. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/optinmonster/" google-query: inurl:"/wp-content/plugins/optinmonster/" shodan-query: 'vuln:CVE-2016-10996' - tags: cve,wordpress,wp-plugin,optinmonster,medium + tags: cve,wordpress,wp-plugin,optinmonster,critical http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10997-430614badd7183227eb02d22143e3a52.yaml b/nuclei-templates/2016/CVE-2016-10997-430614badd7183227eb02d22143e3a52.yaml index 17e6ba7255..825581ea24 100644 --- a/nuclei-templates/2016/CVE-2016-10997-430614badd7183227eb02d22143e3a52.yaml +++ b/nuclei-templates/2016/CVE-2016-10997-430614badd7183227eb02d22143e3a52.yaml @@ -4,7 +4,7 @@ info: name: > Beauty & Clean <= 1.0.8 - Cross-Site Request Forgery & Arbitrary File Upload author: topscoder - severity: high + severity: medium description: > The beauty-premium theme 1.0.8 for WordPress has CSRF with resultant arbitrary file upload in includes/sendmail.php. This can also be exploited without using CSRF tactics. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/beauty-premium/" google-query: inurl:"/wp-content/themes/beauty-premium/" shodan-query: 'vuln:CVE-2016-10997' - tags: cve,wordpress,wp-theme,beauty-premium,high + tags: cve,wordpress,wp-theme,beauty-premium,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-10998-427c0efd9f4fe0120009a410add6694b.yaml b/nuclei-templates/2016/CVE-2016-10998-427c0efd9f4fe0120009a410add6694b.yaml index e9371ac312..1620d2c83b 100644 --- a/nuclei-templates/2016/CVE-2016-10998-427c0efd9f4fe0120009a410add6694b.yaml +++ b/nuclei-templates/2016/CVE-2016-10998-427c0efd9f4fe0120009a410add6694b.yaml @@ -4,7 +4,7 @@ info: name: > Ocim MP3 (All Versions) - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The ocim-mp3 plugin through 2016-03-07 for WordPress has wp-content/plugins/ocim-mp3/source/pages.php?id= XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ocim-mp3/" google-query: inurl:"/wp-content/plugins/ocim-mp3/" shodan-query: 'vuln:CVE-2016-10998' - tags: cve,wordpress,wp-plugin,ocim-mp3,medium + tags: cve,wordpress,wp-plugin,ocim-mp3,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-11001-e52fe8ccbb854729b4cd4efd3c029a6b.yaml b/nuclei-templates/2016/CVE-2016-11001-e52fe8ccbb854729b4cd4efd3c029a6b.yaml index fefe78fb9d..cd1836656d 100644 --- a/nuclei-templates/2016/CVE-2016-11001-e52fe8ccbb854729b4cd4efd3c029a6b.yaml +++ b/nuclei-templates/2016/CVE-2016-11001-e52fe8ccbb854729b4cd4efd3c029a6b.yaml @@ -4,7 +4,7 @@ info: name: > User Submitted Posts < 20160215 - Reflected Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > The user-submitted-posts plugin before 20160215 for WordPress has XSS via the user-submitted-content field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/user-submitted-posts/" google-query: inurl:"/wp-content/plugins/user-submitted-posts/" shodan-query: 'vuln:CVE-2016-11001' - tags: cve,wordpress,wp-plugin,user-submitted-posts,high + tags: cve,wordpress,wp-plugin,user-submitted-posts,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-11004-a2b478ab05dc0dd0616e45e762ef893a.yaml b/nuclei-templates/2016/CVE-2016-11004-a2b478ab05dc0dd0616e45e762ef893a.yaml index b52c671d08..ed85aece94 100644 --- a/nuclei-templates/2016/CVE-2016-11004-a2b478ab05dc0dd0616e45e762ef893a.yaml +++ b/nuclei-templates/2016/CVE-2016-11004-a2b478ab05dc0dd0616e45e762ef893a.yaml @@ -14,17 +14,17 @@ info: cvss-score: 8.8 cve-id: CVE-2016-11004 metadata: - fofa-query: "wp-content/plugins/bloom/" - google-query: inurl:"/wp-content/plugins/bloom/" + fofa-query: "wp-content/plugins/monarch/" + google-query: inurl:"/wp-content/plugins/monarch/" shodan-query: 'vuln:CVE-2016-11004' - tags: cve,wordpress,wp-plugin,bloom,high + tags: cve,wordpress,wp-plugin,monarch,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/bloom/readme.txt" + - "{{BaseURL}}/wp-content/plugins/monarch/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "bloom" + - "monarch" part: body - type: dsl dsl: - - compare_versions(version, '<= 1.1.0') \ No newline at end of file + - compare_versions(version, '<= 1.2.6') \ No newline at end of file diff --git a/nuclei-templates/2016/CVE-2016-11008-916c5b9976a17729e06d1b6fb0458ebf.yaml b/nuclei-templates/2016/CVE-2016-11008-916c5b9976a17729e06d1b6fb0458ebf.yaml index d67691f565..e0b1084470 100644 --- a/nuclei-templates/2016/CVE-2016-11008-916c5b9976a17729e06d1b6fb0458ebf.yaml +++ b/nuclei-templates/2016/CVE-2016-11008-916c5b9976a17729e06d1b6fb0458ebf.yaml @@ -4,7 +4,7 @@ info: name: > WP-Invoice – Web Invoice and Billing <= 4.1.0 - Missing Authorization author: topscoder - severity: medium + severity: high description: > The WP-Invoice – Web Invoice and Billing plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the wpi_gateway_base::process_payment() function when using the wpi_paypal payment gateway handler in versions up to, and including, 4.1.0. This makes it possible for unauthenticated attackers to update the meta data of previously invoiced users. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-invoice/" google-query: inurl:"/wp-content/plugins/wp-invoice/" shodan-query: 'vuln:CVE-2016-11008' - tags: cve,wordpress,wp-plugin,wp-invoice,medium + tags: cve,wordpress,wp-plugin,wp-invoice,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-11009-7137b8fac252650babdfc2fa8502b307.yaml b/nuclei-templates/2016/CVE-2016-11009-7137b8fac252650babdfc2fa8502b307.yaml index b5a76a830b..45386271c6 100644 --- a/nuclei-templates/2016/CVE-2016-11009-7137b8fac252650babdfc2fa8502b307.yaml +++ b/nuclei-templates/2016/CVE-2016-11009-7137b8fac252650babdfc2fa8502b307.yaml @@ -4,7 +4,7 @@ info: name: > WP-Invoice – Web Invoice and Billing <= 4.1.0 - Missing Authorization author: topscoder - severity: medium + severity: high description: > The WP-Invoice – Web Invoice and Billing plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the wpi_gateway_base::process_payment() function when using the wpi_interkassa payment gateway handler in versions up to, and including, 4.1.0. This makes it possible for unauthenticated attackers to update the meta data of previously invoiced users. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-invoice/" google-query: inurl:"/wp-content/plugins/wp-invoice/" shodan-query: 'vuln:CVE-2016-11009' - tags: cve,wordpress,wp-plugin,wp-invoice,medium + tags: cve,wordpress,wp-plugin,wp-invoice,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-11010-875ad9422b6c5059d922fea2bec00a1f.yaml b/nuclei-templates/2016/CVE-2016-11010-875ad9422b6c5059d922fea2bec00a1f.yaml index 10d8ca37f3..ac54ace343 100644 --- a/nuclei-templates/2016/CVE-2016-11010-875ad9422b6c5059d922fea2bec00a1f.yaml +++ b/nuclei-templates/2016/CVE-2016-11010-875ad9422b6c5059d922fea2bec00a1f.yaml @@ -4,7 +4,7 @@ info: name: > WP-Invoice – Web Invoice and Billing <= 4.1.0 - Missing Authorization author: topscoder - severity: medium + severity: high description: > The WP-Invoice – Web Invoice and Billing plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the wpi_gateway_base::process_payment() function when using the wpi_twocheckout payment gateway handler in versions up to, and including, 4.1.0. This makes it possible for unauthenticated attackers to update the meta data of previously invoiced users. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-invoice/" google-query: inurl:"/wp-content/plugins/wp-invoice/" shodan-query: 'vuln:CVE-2016-11010' - tags: cve,wordpress,wp-plugin,wp-invoice,medium + tags: cve,wordpress,wp-plugin,wp-invoice,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-11012-753b1cfc0cff5215c4137639d86b10b2.yaml b/nuclei-templates/2016/CVE-2016-11012-753b1cfc0cff5215c4137639d86b10b2.yaml index 001af1da2a..f84ce31930 100644 --- a/nuclei-templates/2016/CVE-2016-11012-753b1cfc0cff5215c4137639d86b10b2.yaml +++ b/nuclei-templates/2016/CVE-2016-11012-753b1cfc0cff5215c4137639d86b10b2.yaml @@ -4,7 +4,7 @@ info: name: > Sola Support Tickets < 3.13 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The sola-support-tickets plugin before 3.13 for WordPress has incorrect access control for /wp-admin with resultant XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sola-support-tickets/" google-query: inurl:"/wp-content/plugins/sola-support-tickets/" shodan-query: 'vuln:CVE-2016-11012' - tags: cve,wordpress,wp-plugin,sola-support-tickets,medium + tags: cve,wordpress,wp-plugin,sola-support-tickets,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-11085-658febabd8f8ee9b00c71e69efcbac2c.yaml b/nuclei-templates/2016/CVE-2016-11085-658febabd8f8ee9b00c71e69efcbac2c.yaml index 32f9c8d013..6cda2e749d 100644 --- a/nuclei-templates/2016/CVE-2016-11085-658febabd8f8ee9b00c71e69efcbac2c.yaml +++ b/nuclei-templates/2016/CVE-2016-11085-658febabd8f8ee9b00c71e69efcbac2c.yaml @@ -4,7 +4,7 @@ info: name: > Quiz And Survey Master <= 4.7.8 - Cross-Site Request Forgery to Stored Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > The Quiz And Survey Master plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.7.8. This is due to missing or incorrect nonce validation in the php/qmn_options_questions_tab.php file. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page via forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/quiz-master-next/" google-query: inurl:"/wp-content/plugins/quiz-master-next/" shodan-query: 'vuln:CVE-2016-11085' - tags: cve,wordpress,wp-plugin,quiz-master-next,high + tags: cve,wordpress,wp-plugin,quiz-master-next,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-1160-7d31af080da908940b0bf5332e53662b.yaml b/nuclei-templates/2016/CVE-2016-1160-7d31af080da908940b0bf5332e53662b.yaml index f457b04791..5a23ce8462 100644 --- a/nuclei-templates/2016/CVE-2016-1160-7d31af080da908940b0bf5332e53662b.yaml +++ b/nuclei-templates/2016/CVE-2016-1160-7d31af080da908940b0bf5332e53662b.yaml @@ -4,7 +4,7 @@ info: name: > WP Favorite Posts <= 1.6.5 - Unauthenticated Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the WP Favorite Posts plugin before 1.6.6 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-favorite-posts/" google-query: inurl:"/wp-content/plugins/wp-favorite-posts/" shodan-query: 'vuln:CVE-2016-1160' - tags: cve,wordpress,wp-plugin,wp-favorite-posts,medium + tags: cve,wordpress,wp-plugin,wp-favorite-posts,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-1564-1793fc29de6c51f3e1cf00f2d46b91e7.yaml b/nuclei-templates/2016/CVE-2016-1564-1793fc29de6c51f3e1cf00f2d46b91e7.yaml index f3f37ad1d3..9fa8e0687c 100644 --- a/nuclei-templates/2016/CVE-2016-1564-1793fc29de6c51f3e1cf00f2d46b91e7.yaml +++ b/nuclei-templates/2016/CVE-2016-1564-1793fc29de6c51f3e1cf00f2d46b91e7.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.4.1 - Cross-Site Scripting via Theme Names author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in wp-includes/class-wp-theme.php in WordPress before 4.4.1 allow remote attackers to inject arbitrary web script or HTML via a (1) stylesheet name or (2) template name to wp-admin/customize.php. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2016-1564 metadata: shodan-query: 'vuln:CVE-2016-1564' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-4566-531502c1a73b5136edeed41b3c25b40a.yaml b/nuclei-templates/2016/CVE-2016-4566-531502c1a73b5136edeed41b3c25b40a.yaml index a602002322..a742b2e524 100644 --- a/nuclei-templates/2016/CVE-2016-4566-531502c1a73b5136edeed41b3c25b40a.yaml +++ b/nuclei-templates/2016/CVE-2016-4566-531502c1a73b5136edeed41b3c25b40a.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.5.2 - Cross-Site Scripting via plupload.flash.swf author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in plupload.flash.swf in Plupload before 2.1.9, as used in WordPress before 4.5.2, allows remote attackers to inject arbitrary web script or HTML via a Same-Origin Method Execution (SOME) attack. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2016-4566 metadata: shodan-query: 'vuln:CVE-2016-4566' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-4567-6dae0916c42cb6d2e594be15be242836.yaml b/nuclei-templates/2016/CVE-2016-4567-6dae0916c42cb6d2e594be15be242836.yaml index 91664da567..689af8d24e 100644 --- a/nuclei-templates/2016/CVE-2016-4567-6dae0916c42cb6d2e594be15be242836.yaml +++ b/nuclei-templates/2016/CVE-2016-4567-6dae0916c42cb6d2e594be15be242836.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.5.2 - Cross-Site Scripting via MediaElement.js author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in flash/FlashMediaElement.as in MediaElement.js before 2.21.0, as used in WordPress before 4.5.2, allows remote attackers to inject arbitrary web script or HTML via an obfuscated form of the jsinitfunction parameter, as demonstrated by "jsinitfunctio%gn." reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2016-4567 metadata: shodan-query: 'vuln:CVE-2016-4567' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-4812-050d7cb19f5f214c16e87b6deb3805d1.yaml b/nuclei-templates/2016/CVE-2016-4812-050d7cb19f5f214c16e87b6deb3805d1.yaml index 7e6b665d97..b5880e0c51 100644 --- a/nuclei-templates/2016/CVE-2016-4812-050d7cb19f5f214c16e87b6deb3805d1.yaml +++ b/nuclei-templates/2016/CVE-2016-4812-050d7cb19f5f214c16e87b6deb3805d1.yaml @@ -4,7 +4,7 @@ info: name: > Markdown on Save Improved <= 2.5 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Markdown on Save Improved plugin before 2.5.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/markdown-on-save-improved/" google-query: inurl:"/wp-content/plugins/markdown-on-save-improved/" shodan-query: 'vuln:CVE-2016-4812' - tags: cve,wordpress,wp-plugin,markdown-on-save-improved,medium + tags: cve,wordpress,wp-plugin,markdown-on-save-improved,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-4827-c124fe326fda2227cda364e6977789ed.yaml b/nuclei-templates/2016/CVE-2016-4827-c124fe326fda2227cda364e6977789ed.yaml index 0bb40eac64..e73dd7078e 100644 --- a/nuclei-templates/2016/CVE-2016-4827-c124fe326fda2227cda364e6977789ed.yaml +++ b/nuclei-templates/2016/CVE-2016-4827-c124fe326fda2227cda364e6977789ed.yaml @@ -4,7 +4,7 @@ info: name: > Welcart e-Commerce <= 1.8.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Collne Welcart e-Commerce plugin before 1.8.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2016-4826. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/usc-e-shop/" google-query: inurl:"/wp-content/plugins/usc-e-shop/" shodan-query: 'vuln:CVE-2016-4827' - tags: cve,wordpress,wp-plugin,usc-e-shop,medium + tags: cve,wordpress,wp-plugin,usc-e-shop,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-4833-acc6eb8dd4e1bc540251436012892eb1.yaml b/nuclei-templates/2016/CVE-2016-4833-acc6eb8dd4e1bc540251436012892eb1.yaml index ffe48165a3..287c482a49 100644 --- a/nuclei-templates/2016/CVE-2016-4833-acc6eb8dd4e1bc540251436012892eb1.yaml +++ b/nuclei-templates/2016/CVE-2016-4833-acc6eb8dd4e1bc540251436012892eb1.yaml @@ -4,7 +4,7 @@ info: name: > Nofollow Links <= 1.0.10 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Nofollow Links plugin before 1.0.11 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nofollow-links/" google-query: inurl:"/wp-content/plugins/nofollow-links/" shodan-query: 'vuln:CVE-2016-4833' - tags: cve,wordpress,wp-plugin,nofollow-links,medium + tags: cve,wordpress,wp-plugin,nofollow-links,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-5832-06eaa8e1425630a567e0b531b6144921.yaml b/nuclei-templates/2016/CVE-2016-5832-06eaa8e1425630a567e0b531b6144921.yaml index 23452996b3..0229b4987b 100644 --- a/nuclei-templates/2016/CVE-2016-5832-06eaa8e1425630a567e0b531b6144921.yaml +++ b/nuclei-templates/2016/CVE-2016-5832-06eaa8e1425630a567e0b531b6144921.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.5.3 - Cross-Site Scripting via Customizer author: topscoder - severity: medium + severity: high description: > The customizer in WordPress before 4.5.3 allows remote attackers to bypass intended redirection restrictions via unspecified vectors. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2016-5832 metadata: shodan-query: 'vuln:CVE-2016-5832' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-5833-b4ae1cbd422cc707f6a60d7100bb98f1.yaml b/nuclei-templates/2016/CVE-2016-5833-b4ae1cbd422cc707f6a60d7100bb98f1.yaml index 571b5697dc..bcf34faa89 100644 --- a/nuclei-templates/2016/CVE-2016-5833-b4ae1cbd422cc707f6a60d7100bb98f1.yaml +++ b/nuclei-templates/2016/CVE-2016-5833-b4ae1cbd422cc707f6a60d7100bb98f1.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.5.3 - Cross-Site Scripting via Attachment Name #2 author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the column_title function in wp-admin/includes/class-wp-media-list-table.php in WordPress before 4.5.3 allows remote attackers to inject arbitrary web script or HTML via a crafted attachment name, a different vulnerability than CVE-2016-5834. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2016-5833 metadata: shodan-query: 'vuln:CVE-2016-5833' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-5834-189bad7014e697047ef9a98286efd4ba.yaml b/nuclei-templates/2016/CVE-2016-5834-189bad7014e697047ef9a98286efd4ba.yaml index e298564a44..931bb29e1b 100644 --- a/nuclei-templates/2016/CVE-2016-5834-189bad7014e697047ef9a98286efd4ba.yaml +++ b/nuclei-templates/2016/CVE-2016-5834-189bad7014e697047ef9a98286efd4ba.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.5.3 - Cross-Site Scripting via Attachment Name author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the wp_get_attachment_link function in wp-includes/post-template.php in WordPress before 4.5.3 allows remote attackers to inject arbitrary web script or HTML via a crafted attachment name, a different vulnerability than CVE-2016-5833. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2016-5834 metadata: shodan-query: 'vuln:CVE-2016-5834' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-5837-3556353803358c712408f57b48c86c15.yaml b/nuclei-templates/2016/CVE-2016-5837-3556353803358c712408f57b48c86c15.yaml index d238dbbcf0..1472b08422 100644 --- a/nuclei-templates/2016/CVE-2016-5837-3556353803358c712408f57b48c86c15.yaml +++ b/nuclei-templates/2016/CVE-2016-5837-3556353803358c712408f57b48c86c15.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.5.3 - Authorization Bypass to Remove Category Attribute author: topscoder - severity: medium + severity: high description: > WordPress before 4.5.3 allows remote attackers to bypass intended access restrictions and remove a category attribute from a post via unspecified vectors. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2016-5837 metadata: shodan-query: 'vuln:CVE-2016-5837' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-6565-4a8d217f64c4cdfb18ee166f8cd3bec7.yaml b/nuclei-templates/2016/CVE-2016-6565-4a8d217f64c4cdfb18ee166f8cd3bec7.yaml index f34415fb6d..61d2543fe0 100644 --- a/nuclei-templates/2016/CVE-2016-6565-4a8d217f64c4cdfb18ee166f8cd3bec7.yaml +++ b/nuclei-templates/2016/CVE-2016-6565-4a8d217f64c4cdfb18ee166f8cd3bec7.yaml @@ -4,7 +4,7 @@ info: name: > NextGen Gallery <= 2.1.56 - Remote File Inclusion author: topscoder - severity: high + severity: critical description: > The Imagely NextGen Gallery plugin for Wordpress prior to version 2.1.57 does not properly validate user input in the cssfile parameter of a HTTP POST request, which may allow an authenticated user to read arbitrary files from the server, or execute arbitrary code on the server in some circumstances (dependent on server configuration). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nextgen-gallery/" google-query: inurl:"/wp-content/plugins/nextgen-gallery/" shodan-query: 'vuln:CVE-2016-6565' - tags: cve,wordpress,wp-plugin,nextgen-gallery,high + tags: cve,wordpress,wp-plugin,nextgen-gallery,critical http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-6634-dda97c7f3b2cab605b5ded8dc805330d.yaml b/nuclei-templates/2016/CVE-2016-6634-dda97c7f3b2cab605b5ded8dc805330d.yaml index 0abb7419fe..4e3a682c1b 100644 --- a/nuclei-templates/2016/CVE-2016-6634-dda97c7f3b2cab605b5ded8dc805330d.yaml +++ b/nuclei-templates/2016/CVE-2016-6634-dda97c7f3b2cab605b5ded8dc805330d.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.5 - Cross-Site Scripting via Network Settings Page author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the network settings page in WordPress before 4.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2016-6634 metadata: shodan-query: 'vuln:CVE-2016-6634' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-6635-f53eb1a5057e991c005e324155224f96.yaml b/nuclei-templates/2016/CVE-2016-6635-f53eb1a5057e991c005e324155224f96.yaml index 46d039602c..acacef9e65 100644 --- a/nuclei-templates/2016/CVE-2016-6635-f53eb1a5057e991c005e324155224f96.yaml +++ b/nuclei-templates/2016/CVE-2016-6635-f53eb1a5057e991c005e324155224f96.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.5 - Cross-Site Request Forgery via wp_ajax_wp_compression_test author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the wp_ajax_wp_compression_test function in wp-admin/includes/ajax-actions.php in WordPress before 4.5 allows remote attackers to hijack the authentication of administrators for requests that change the script compression option. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2016-6635 metadata: shodan-query: 'vuln:CVE-2016-6635' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-6897-793575cb782549abec6279e8981305af.yaml b/nuclei-templates/2016/CVE-2016-6897-793575cb782549abec6279e8981305af.yaml index 73249c30f2..322fbe6b51 100644 --- a/nuclei-templates/2016/CVE-2016-6897-793575cb782549abec6279e8981305af.yaml +++ b/nuclei-templates/2016/CVE-2016-6897-793575cb782549abec6279e8981305af.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.6 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 allows remote attackers to hijack the authentication of subscribers for /dev/random read operations by leveraging a late call to the check_ajax_referer function, a related issue to CVE-2016-6896. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2016-6897 metadata: shodan-query: 'vuln:CVE-2016-6897' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,medium http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-7168-c9150acbdbbdbe684264580cb26cfc8d.yaml b/nuclei-templates/2016/CVE-2016-7168-c9150acbdbbdbe684264580cb26cfc8d.yaml index 6964cb9513..74d4111e96 100644 --- a/nuclei-templates/2016/CVE-2016-7168-c9150acbdbbdbe684264580cb26cfc8d.yaml +++ b/nuclei-templates/2016/CVE-2016-7168-c9150acbdbbdbe684264580cb26cfc8d.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.6.1 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Cross-site scripting (XSS) vulnerability in the media_handle_upload function in wp-admin/includes/media.php in WordPress before 4.6.1 might allow remote attackers to inject arbitrary web script or HTML by tricking an administrator into uploading an image file that has a crafted filename. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2016-7168 metadata: shodan-query: 'vuln:CVE-2016-7168' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2016/CVE-2016-7169-68cd0d8404410b84b22d009411f84df8.yaml b/nuclei-templates/2016/CVE-2016-7169-68cd0d8404410b84b22d009411f84df8.yaml index efd4503f6b..154f022fcc 100644 --- a/nuclei-templates/2016/CVE-2016-7169-68cd0d8404410b84b22d009411f84df8.yaml +++ b/nuclei-templates/2016/CVE-2016-7169-68cd0d8404410b84b22d009411f84df8.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.6.1 - Authenticated Directory Traversal to Arbitrary File Access author: topscoder - severity: medium + severity: low description: > Directory traversal vulnerability in the File_Upload_Upgrader class in wp-admin/includes/class-file-upload-upgrader.php in the upgrade package uploader in WordPress before 4.6.1 allows remote authenticated users to access arbitrary files via a crafted urlholder parameter. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2016-7169 metadata: shodan-query: 'vuln:CVE-2016-7169' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-1000038-13c50b13a503600e0189283b0a2ceddd.yaml b/nuclei-templates/2017/CVE-2017-1000038-13c50b13a503600e0189283b0a2ceddd.yaml index 715c058f38..82917386a5 100644 --- a/nuclei-templates/2017/CVE-2017-1000038-13c50b13a503600e0189283b0a2ceddd.yaml +++ b/nuclei-templates/2017/CVE-2017-1000038-13c50b13a503600e0189283b0a2ceddd.yaml @@ -4,7 +4,7 @@ info: name: > Relevanssi – A Better Search <= 3.5.7.1 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > WordPress plugin Relevanssi version 3.5.7.1 is vulnerable to stored XSS resulting in attacker being able to execute JavaScript on the affected site reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/relevanssi/" google-query: inurl:"/wp-content/plugins/relevanssi/" shodan-query: 'vuln:CVE-2017-1000038' - tags: cve,wordpress,wp-plugin,relevanssi,medium + tags: cve,wordpress,wp-plugin,relevanssi,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-1000170-49f7af60a7d6ca8e6785ad7873768f2a.yaml b/nuclei-templates/2017/CVE-2017-1000170-49f7af60a7d6ca8e6785ad7873768f2a.yaml index 186b0c72a7..42beae3c95 100644 --- a/nuclei-templates/2017/CVE-2017-1000170-49f7af60a7d6ca8e6785ad7873768f2a.yaml +++ b/nuclei-templates/2017/CVE-2017-1000170-49f7af60a7d6ca8e6785ad7873768f2a.yaml @@ -14,17 +14,17 @@ info: cvss-score: 7.5 cve-id: CVE-2017-1000170 metadata: - fofa-query: "wp-content/plugins/better-search-tmc/" - google-query: inurl:"/wp-content/plugins/better-search-tmc/" + fofa-query: "wp-content/plugins/delightful-downloads/" + google-query: inurl:"/wp-content/plugins/delightful-downloads/" shodan-query: 'vuln:CVE-2017-1000170' - tags: cve,wordpress,wp-plugin,better-search-tmc,high + tags: cve,wordpress,wp-plugin,delightful-downloads,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/better-search-tmc/readme.txt" + - "{{BaseURL}}/wp-content/plugins/delightful-downloads/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "better-search-tmc" + - "delightful-downloads" part: body - type: dsl dsl: - - compare_versions(version, '<= 1.0.52') \ No newline at end of file + - compare_versions(version, '<= 2.1.5') \ No newline at end of file diff --git a/nuclei-templates/2017/CVE-2017-1000227-26ee088c8368fd2a8bcecfc18ae8bb11.yaml b/nuclei-templates/2017/CVE-2017-1000227-26ee088c8368fd2a8bcecfc18ae8bb11.yaml index f3dff93584..feb453e213 100644 --- a/nuclei-templates/2017/CVE-2017-1000227-26ee088c8368fd2a8bcecfc18ae8bb11.yaml +++ b/nuclei-templates/2017/CVE-2017-1000227-26ee088c8368fd2a8bcecfc18ae8bb11.yaml @@ -4,7 +4,7 @@ info: name: > Salutation < 3.0.16 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Stored XSS in Salutation Responsive WordPress + BuddyPress Theme version 3.0.15 could allow logged-in users to do almost anything an admin can. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/salutation-wp/" google-query: inurl:"/wp-content/themes/salutation-wp/" shodan-query: 'vuln:CVE-2017-1000227' - tags: cve,wordpress,wp-theme,salutation-wp,medium + tags: cve,wordpress,wp-theme,salutation-wp,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-1000227-ab49cd0603fd2aad8bd2addfd19e8e37.yaml b/nuclei-templates/2017/CVE-2017-1000227-ab49cd0603fd2aad8bd2addfd19e8e37.yaml index f2ca970734..8ab4754606 100644 --- a/nuclei-templates/2017/CVE-2017-1000227-ab49cd0603fd2aad8bd2addfd19e8e37.yaml +++ b/nuclei-templates/2017/CVE-2017-1000227-ab49cd0603fd2aad8bd2addfd19e8e37.yaml @@ -4,7 +4,7 @@ info: name: > Salutation Responsive WordPress Theme < 3.0.16 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Stored XSS in Salutation Responsive WordPress + BuddyPress Theme version 3.0.15 could allow logged-in users to do almost anything an admin can. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/parallelus-salutation/" google-query: inurl:"/wp-content/themes/parallelus-salutation/" shodan-query: 'vuln:CVE-2017-1000227' - tags: cve,wordpress,wp-theme,parallelus-salutation,medium + tags: cve,wordpress,wp-theme,parallelus-salutation,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-1002000-719ff6e603e56a8355496bcf6077970d.yaml b/nuclei-templates/2017/CVE-2017-1002000-719ff6e603e56a8355496bcf6077970d.yaml index 8919f78f99..f7519b4e3a 100644 --- a/nuclei-templates/2017/CVE-2017-1002000-719ff6e603e56a8355496bcf6077970d.yaml +++ b/nuclei-templates/2017/CVE-2017-1002000-719ff6e603e56a8355496bcf6077970d.yaml @@ -4,7 +4,7 @@ info: name: > How to Create an App for Android iPhone Easytouch <= 3.0 - Missing Authorization author: topscoder - severity: medium + severity: high description: > Vulnerability in wordpress plugin mobile-friendly-app-builder-by-easytouch v3.0, The code in file ./mobile-friendly-app-builder-by-easytouch/server/images.php doesn't require authentication or check that the user is allowed to upload content. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mobile-friendly-app-builder-by-easytouch/" google-query: inurl:"/wp-content/plugins/mobile-friendly-app-builder-by-easytouch/" shodan-query: 'vuln:CVE-2017-1002000' - tags: cve,wordpress,wp-plugin,mobile-friendly-app-builder-by-easytouch,medium + tags: cve,wordpress,wp-plugin,mobile-friendly-app-builder-by-easytouch,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-1002010-c2edf18b1dc2c5d697f81727cd0bac3f.yaml b/nuclei-templates/2017/CVE-2017-1002010-c2edf18b1dc2c5d697f81727cd0bac3f.yaml index d186d1b01f..01b493cf62 100644 --- a/nuclei-templates/2017/CVE-2017-1002010-c2edf18b1dc2c5d697f81727cd0bac3f.yaml +++ b/nuclei-templates/2017/CVE-2017-1002010-c2edf18b1dc2c5d697f81727cd0bac3f.yaml @@ -4,7 +4,7 @@ info: name: > Membership Simplified <= 1.58 Beta - SQL Injection author: topscoder - severity: high + severity: critical description: > Vulnerability in wordpress plugin Membership Simplified v1.58, The code in membership-simplified-for-oap-members-only/updateDB.php is vulnerable to blind SQL injection because it doesn't sanitize user input via recordId in the delete_media function. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/membership-simplified-for-oap-members-only/" google-query: inurl:"/wp-content/plugins/membership-simplified-for-oap-members-only/" shodan-query: 'vuln:CVE-2017-1002010' - tags: cve,wordpress,wp-plugin,membership-simplified-for-oap-members-only,high + tags: cve,wordpress,wp-plugin,membership-simplified-for-oap-members-only,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-1002011-f04fb223e6bc1b82dc5e818d9e40fb20.yaml b/nuclei-templates/2017/CVE-2017-1002011-f04fb223e6bc1b82dc5e818d9e40fb20.yaml index fcfa7d54f3..a959af1452 100644 --- a/nuclei-templates/2017/CVE-2017-1002011-f04fb223e6bc1b82dc5e818d9e40fb20.yaml +++ b/nuclei-templates/2017/CVE-2017-1002011-f04fb223e6bc1b82dc5e818d9e40fb20.yaml @@ -4,7 +4,7 @@ info: name: > Image Gallery with Slideshow Plugin <= 1.5.2 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Vulnerability in wordpress plugin image-gallery-with-slideshow v1.5.2, There is a stored XSS vulnerability via the $value->gallery_name and $value->gallery_description where anyone with privileges to modify or add galleries/images and inject javascript into the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/image-gallery-with-slideshow/" google-query: inurl:"/wp-content/plugins/image-gallery-with-slideshow/" shodan-query: 'vuln:CVE-2017-1002011' - tags: cve,wordpress,wp-plugin,image-gallery-with-slideshow,medium + tags: cve,wordpress,wp-plugin,image-gallery-with-slideshow,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-1002020-ed4e4356cd22d0451cce02bf7c3fe0f8.yaml b/nuclei-templates/2017/CVE-2017-1002020-ed4e4356cd22d0451cce02bf7c3fe0f8.yaml index e4cfa0fca9..659d40df02 100644 --- a/nuclei-templates/2017/CVE-2017-1002020-ed4e4356cd22d0451cce02bf7c3fe0f8.yaml +++ b/nuclei-templates/2017/CVE-2017-1002020-ed4e4356cd22d0451cce02bf7c3fe0f8.yaml @@ -4,7 +4,7 @@ info: name: > Surveys 1.01.8 - Authenticated SQL Injection author: topscoder - severity: critical + severity: low description: > Vulnerability in wordpress plugin surveys v1.01.8, The code in survey_form.php does not sanitize the action variable before placing it inside of an SQL query. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/surveys/" google-query: inurl:"/wp-content/plugins/surveys/" shodan-query: 'vuln:CVE-2017-1002020' - tags: cve,wordpress,wp-plugin,surveys,critical + tags: cve,wordpress,wp-plugin,surveys,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-1002022-ddf10b902ecdb6f3ecf20febec84cbe8.yaml b/nuclei-templates/2017/CVE-2017-1002022-ddf10b902ecdb6f3ecf20febec84cbe8.yaml index 05435d450a..2d75d6681a 100644 --- a/nuclei-templates/2017/CVE-2017-1002022-ddf10b902ecdb6f3ecf20febec84cbe8.yaml +++ b/nuclei-templates/2017/CVE-2017-1002022-ddf10b902ecdb6f3ecf20febec84cbe8.yaml @@ -4,7 +4,7 @@ info: name: > surveys <= 1.01.8 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > The surveys plugin for WordPress is vulnerable to generic SQL Injection via the ‘action’ parameter in versions up to, and including, 1.01.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. @@ -19,7 +19,7 @@ info: fofa-query: "wp-content/plugins/surveys/" google-query: inurl:"/wp-content/plugins/surveys/" shodan-query: 'vuln:CVE-2017-1002022' - tags: cve,wordpress,wp-plugin,surveys,high + tags: cve,wordpress,wp-plugin,surveys,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-1002025-1b2dceeb5f112c4d4e1d47bb3fb62e6f.yaml b/nuclei-templates/2017/CVE-2017-1002025-1b2dceeb5f112c4d4e1d47bb3fb62e6f.yaml index b1d93b0cd0..1a90ee76b2 100644 --- a/nuclei-templates/2017/CVE-2017-1002025-1b2dceeb5f112c4d4e1d47bb3fb62e6f.yaml +++ b/nuclei-templates/2017/CVE-2017-1002025-1b2dceeb5f112c4d4e1d47bb3fb62e6f.yaml @@ -4,7 +4,7 @@ info: name: > Add Edit Delete Listing Module <= 1.0 - SQL Injection author: topscoder - severity: high + severity: critical description: > Vulnerability in wordpress plugin add-edit-delete-listing-for-member-module v1.0, The plugin author does not sanitize user supplied input via $act before passing it into an SQL statement. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/add-edit-delete-listing-for-member-module/" google-query: inurl:"/wp-content/plugins/add-edit-delete-listing-for-member-module/" shodan-query: 'vuln:CVE-2017-1002025' - tags: cve,wordpress,wp-plugin,add-edit-delete-listing-for-member-module,high + tags: cve,wordpress,wp-plugin,add-edit-delete-listing-for-member-module,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-1002026-3faf59fe255a23ab6371375fbe88c459.yaml b/nuclei-templates/2017/CVE-2017-1002026-3faf59fe255a23ab6371375fbe88c459.yaml index 41ee33b872..eb540f35e7 100644 --- a/nuclei-templates/2017/CVE-2017-1002026-3faf59fe255a23ab6371375fbe88c459.yaml +++ b/nuclei-templates/2017/CVE-2017-1002026-3faf59fe255a23ab6371375fbe88c459.yaml @@ -4,7 +4,7 @@ info: name: > Event Expresso Free <= 3.1.37.11.L - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > Vulnerability in wordpress plugin Event Expresso Free v3.1.37.11.L, The function edit_event_category does not sanitize user-supplied input via the $id parameter before passing it into an SQL statement. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/event-espresso-free/" google-query: inurl:"/wp-content/plugins/event-espresso-free/" shodan-query: 'vuln:CVE-2017-1002026' - tags: cve,wordpress,wp-plugin,event-espresso-free,high + tags: cve,wordpress,wp-plugin,event-espresso-free,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-1002027-9a2bf7d17126275dce9aeca280888e4f.yaml b/nuclei-templates/2017/CVE-2017-1002027-9a2bf7d17126275dce9aeca280888e4f.yaml index 260f8a169e..b85e6278e6 100644 --- a/nuclei-templates/2017/CVE-2017-1002027-9a2bf7d17126275dce9aeca280888e4f.yaml +++ b/nuclei-templates/2017/CVE-2017-1002027-9a2bf7d17126275dce9aeca280888e4f.yaml @@ -4,7 +4,7 @@ info: name: > RK Responsive Contact Form <= 1.0.0 - SQL Injection author: topscoder - severity: high + severity: critical description: > Vulnerability in wordpress plugin rk-responsive-contact-form v1.0.0, The variable $delid isn't sanitized before being passed into an SQL query in file ./rk-responsive-contact-form/include/rk_user_list.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/rk-responsive-contact-form/" google-query: inurl:"/wp-content/plugins/rk-responsive-contact-form/" shodan-query: 'vuln:CVE-2017-1002027' - tags: cve,wordpress,wp-plugin,rk-responsive-contact-form,high + tags: cve,wordpress,wp-plugin,rk-responsive-contact-form,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-10991-d323b2ee541571a78879d377867cb57c.yaml b/nuclei-templates/2017/CVE-2017-10991-d323b2ee541571a78879d377867cb57c.yaml index c2791ca6c1..2c3665d1c8 100644 --- a/nuclei-templates/2017/CVE-2017-10991-d323b2ee541571a78879d377867cb57c.yaml +++ b/nuclei-templates/2017/CVE-2017-10991-d323b2ee541571a78879d377867cb57c.yaml @@ -4,7 +4,7 @@ info: name: > WP Statistics <= 12.0.9 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The WP Statistics plugin through 12.0.9 for WordPress has XSS in the rangestart and rangeend parameters on the wps_referrers_page page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-statistics/" google-query: inurl:"/wp-content/plugins/wp-statistics/" shodan-query: 'vuln:CVE-2017-10991' - tags: cve,wordpress,wp-plugin,wp-statistics,medium + tags: cve,wordpress,wp-plugin,wp-statistics,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-11658-b300eab2789f0638494228aea0ada3b0.yaml b/nuclei-templates/2017/CVE-2017-11658-b300eab2789f0638494228aea0ada3b0.yaml index 828b848dd2..3e83afbbbd 100644 --- a/nuclei-templates/2017/CVE-2017-11658-b300eab2789f0638494228aea0ada3b0.yaml +++ b/nuclei-templates/2017/CVE-2017-11658-b300eab2789f0638494228aea0ada3b0.yaml @@ -4,7 +4,7 @@ info: name: > WP Rocket <= 2.10.3 - Local File Inclusion author: topscoder - severity: high + severity: critical description: > In the WP Rocket plugin 2.10.3 for WordPress, the Local File Inclusion mitigation technique is to trim traversal characters (..) -- however, this is insufficient to stop remote attacks and can be bypassed by using 0x00 bytes, as demonstrated by a .%00.../.%00.../ attack. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-rocket/" google-query: inurl:"/wp-content/plugins/wp-rocket/" shodan-query: 'vuln:CVE-2017-11658' - tags: cve,wordpress,wp-plugin,wp-rocket,high + tags: cve,wordpress,wp-plugin,wp-rocket,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-12068-1b4409ad110c3c389ee584578fde5c3f.yaml b/nuclei-templates/2017/CVE-2017-12068-1b4409ad110c3c389ee584578fde5c3f.yaml index 73d1a5dcff..9f2e5c3bbe 100644 --- a/nuclei-templates/2017/CVE-2017-12068-1b4409ad110c3c389ee584578fde5c3f.yaml +++ b/nuclei-templates/2017/CVE-2017-12068-1b4409ad110c3c389ee584578fde5c3f.yaml @@ -4,7 +4,7 @@ info: name: > Event List <= 0.7.9 - Unauthenticated Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Event List plugin 0.7.9 for WordPress has XSS in the slug array parameter to wp-admin/admin.php in an el_admin_categories delete_bulk action. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/event-list/" google-query: inurl:"/wp-content/plugins/event-list/" shodan-query: 'vuln:CVE-2017-12068' - tags: cve,wordpress,wp-plugin,event-list,medium + tags: cve,wordpress,wp-plugin,event-list,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-12131-ded406378489866866417fd6ec210840.yaml b/nuclei-templates/2017/CVE-2017-12131-ded406378489866866417fd6ec210840.yaml index 25cf13b217..1bd5e7a0c0 100644 --- a/nuclei-templates/2017/CVE-2017-12131-ded406378489866866417fd6ec210840.yaml +++ b/nuclei-templates/2017/CVE-2017-12131-ded406378489866866417fd6ec210840.yaml @@ -4,7 +4,7 @@ info: name: > Easy Testimonials <= 3.0.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Testimonials plugin 3.0.4 for WordPress has XSS in include/settings/display.options.php, as demonstrated by the Default Testimonials Width, View More Testimonials Link, and Testimonial Excerpt Options screens. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-testimonials/" google-query: inurl:"/wp-content/plugins/easy-testimonials/" shodan-query: 'vuln:CVE-2017-12131' - tags: cve,wordpress,wp-plugin,easy-testimonials,medium + tags: cve,wordpress,wp-plugin,easy-testimonials,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-12200-299e26f66452f89b69cd95a12049938a.yaml b/nuclei-templates/2017/CVE-2017-12200-299e26f66452f89b69cd95a12049938a.yaml index e5eb60f4ab..b2f184f880 100644 --- a/nuclei-templates/2017/CVE-2017-12200-299e26f66452f89b69cd95a12049938a.yaml +++ b/nuclei-templates/2017/CVE-2017-12200-299e26f66452f89b69cd95a12049938a.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate Product Catalog <= 4.2.11 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Etoile Ultimate Product Catalog plugin 4.2.11 for WordPress has XSS in the Add Product Manually component. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-product-catalogue/" google-query: inurl:"/wp-content/plugins/ultimate-product-catalogue/" shodan-query: 'vuln:CVE-2017-12200' - tags: cve,wordpress,wp-plugin,ultimate-product-catalogue,medium + tags: cve,wordpress,wp-plugin,ultimate-product-catalogue,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-12651-c17200ba4236119c0958120e5b5ef5cb.yaml b/nuclei-templates/2017/CVE-2017-12651-c17200ba4236119c0958120e5b5ef5cb.yaml index 3b81e2cc2e..82fb306e08 100644 --- a/nuclei-templates/2017/CVE-2017-12651-c17200ba4236119c0958120e5b5ef5cb.yaml +++ b/nuclei-templates/2017/CVE-2017-12651-c17200ba4236119c0958120e5b5ef5cb.yaml @@ -4,7 +4,7 @@ info: name: > Loginizer <= 1.3.5 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross Site Request Forgery (CSRF) exists in the Blacklist and Whitelist IP Wizard in init.php in the Loginizer plugin before 1.3.6 for WordPress because the HTTP Referer header is not checked. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/loginizer/" google-query: inurl:"/wp-content/plugins/loginizer/" shodan-query: 'vuln:CVE-2017-12651' - tags: cve,wordpress,wp-plugin,loginizer,high + tags: cve,wordpress,wp-plugin,loginizer,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-12946-c2574a7a9b79ad452c99c332f592fe5f.yaml b/nuclei-templates/2017/CVE-2017-12946-c2574a7a9b79ad452c99c332f592fe5f.yaml index 7b9fe14487..6103e045d4 100644 --- a/nuclei-templates/2017/CVE-2017-12946-c2574a7a9b79ad452c99c332f592fe5f.yaml +++ b/nuclei-templates/2017/CVE-2017-12946-c2574a7a9b79ad452c99c332f592fe5f.yaml @@ -4,7 +4,7 @@ info: name: > Easy Modal < 2.1.0 - Authenticated (Admin+) SQL Injection author: topscoder - severity: high + severity: low description: > classes\controller\admin\modals.php in the Easy Modal plugin before 2.1.0 for WordPress has SQL injection in a delete action with the id, ids, or modal parameter to wp-admin/admin.php, exploitable by administrators. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-modal/" google-query: inurl:"/wp-content/plugins/easy-modal/" shodan-query: 'vuln:CVE-2017-12946' - tags: cve,wordpress,wp-plugin,easy-modal,high + tags: cve,wordpress,wp-plugin,easy-modal,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-12947-f615078fb53a8f47f20c6cb2792c121c.yaml b/nuclei-templates/2017/CVE-2017-12947-f615078fb53a8f47f20c6cb2792c121c.yaml index f4df3f4b05..e5970da05b 100644 --- a/nuclei-templates/2017/CVE-2017-12947-f615078fb53a8f47f20c6cb2792c121c.yaml +++ b/nuclei-templates/2017/CVE-2017-12947-f615078fb53a8f47f20c6cb2792c121c.yaml @@ -4,7 +4,7 @@ info: name: > Easy Modal < 2.1.0 - SQL Injection author: topscoder - severity: high + severity: critical description: > classes\controller\admin\modals.php in the Easy Modal plugin before 2.1.0 for WordPress has SQL injection in an untrash action with the id, ids, or modal parameter to wp-admin/admin.php, exploitable by administrators. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-modal/" google-query: inurl:"/wp-content/plugins/easy-modal/" shodan-query: 'vuln:CVE-2017-12947' - tags: cve,wordpress,wp-plugin,easy-modal,high + tags: cve,wordpress,wp-plugin,easy-modal,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-12948-618eabaed47a418425ba258f61366c0d.yaml b/nuclei-templates/2017/CVE-2017-12948-618eabaed47a418425ba258f61366c0d.yaml index d9e32d1755..54b6482af7 100644 --- a/nuclei-templates/2017/CVE-2017-12948-618eabaed47a418425ba258f61366c0d.yaml +++ b/nuclei-templates/2017/CVE-2017-12948-618eabaed47a418425ba258f61366c0d.yaml @@ -4,7 +4,7 @@ info: name: > PressForward <= 5.2.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Core\Admin\PFTemplater.php in the PressForward plugin 5.2.3 and earlier for WordPress has XSS in the PATH_INFO to wp-admin/admin.php, related to PHP_SELF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pressforward/" google-query: inurl:"/wp-content/plugins/pressforward/" shodan-query: 'vuln:CVE-2017-12948' - tags: cve,wordpress,wp-plugin,pressforward,medium + tags: cve,wordpress,wp-plugin,pressforward,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-12949-c5c5fe7ae04b300c4245ab22359369aa.yaml b/nuclei-templates/2017/CVE-2017-12949-c5c5fe7ae04b300c4245ab22359369aa.yaml index e817beb22c..d986f88adf 100644 --- a/nuclei-templates/2017/CVE-2017-12949-c5c5fe7ae04b300c4245ab22359369aa.yaml +++ b/nuclei-templates/2017/CVE-2017-12949-c5c5fe7ae04b300c4245ab22359369aa.yaml @@ -4,7 +4,7 @@ info: name: > Podlove Podcast Publisher <= 2.5.3 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > lib\modules\contributors\contributor_list_table.php in the Podlove Podcast Publisher plugin 2.5.3 and earlier for WordPress has SQL injection in the orderby parameter to wp-admin/admin.php, exploitable through CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" google-query: inurl:"/wp-content/plugins/podlove-podcasting-plugin-for-wordpress/" shodan-query: 'vuln:CVE-2017-12949' - tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,high + tags: cve,wordpress,wp-plugin,podlove-podcasting-plugin-for-wordpress,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-12977-7d9c26b229d5c8003d8d09b623e0e129.yaml b/nuclei-templates/2017/CVE-2017-12977-7d9c26b229d5c8003d8d09b623e0e129.yaml index 408791c755..af0d41591d 100644 --- a/nuclei-templates/2017/CVE-2017-12977-7d9c26b229d5c8003d8d09b623e0e129.yaml +++ b/nuclei-templates/2017/CVE-2017-12977-7d9c26b229d5c8003d8d09b623e0e129.yaml @@ -4,7 +4,7 @@ info: name: > Photo Gallery by 10Web <= 1.3.50 - Authenticated SQL Injection via tag_id Parameter author: topscoder - severity: high + severity: low description: > The Web-Dorado "Photo Gallery by WD - Responsive Photo Gallery" plugin before 1.3.51 for WordPress has a SQL injection vulnerability related to bwg_edit_tag() in photo-gallery.php and edit_tag() in admin/controllers/BWGControllerTags_bwg.php. It is exploitable by administrators via the tag_id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/photo-gallery/" google-query: inurl:"/wp-content/plugins/photo-gallery/" shodan-query: 'vuln:CVE-2017-12977' - tags: cve,wordpress,wp-plugin,photo-gallery,high + tags: cve,wordpress,wp-plugin,photo-gallery,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-13138-c39e88fb98a263a4718fa22351cd75a3.yaml b/nuclei-templates/2017/CVE-2017-13138-c39e88fb98a263a4718fa22351cd75a3.yaml index 5745383b03..516b9486c7 100644 --- a/nuclei-templates/2017/CVE-2017-13138-c39e88fb98a263a4718fa22351cd75a3.yaml +++ b/nuclei-templates/2017/CVE-2017-13138-c39e88fb98a263a4718fa22351cd75a3.yaml @@ -4,7 +4,7 @@ info: name: > Bridge - Creative Multipurpose WordPress Theme < 11.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > DOM based Cross-site scripting (XSS) vulnerability in the Bridge theme before 11.2 for WordPress allows remote attackers to inject arbitrary JavaScript. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/bridge/" google-query: inurl:"/wp-content/themes/bridge/" shodan-query: 'vuln:CVE-2017-13138' - tags: cve,wordpress,wp-theme,bridge,medium + tags: cve,wordpress,wp-theme,bridge,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-14126-e0584db35cbb9869be95ba6010b7c0f4.yaml b/nuclei-templates/2017/CVE-2017-14126-e0584db35cbb9869be95ba6010b7c0f4.yaml index 46bcfac6b5..fbf10cc75c 100644 --- a/nuclei-templates/2017/CVE-2017-14126-e0584db35cbb9869be95ba6010b7c0f4.yaml +++ b/nuclei-templates/2017/CVE-2017-14126-e0584db35cbb9869be95ba6010b7c0f4.yaml @@ -4,7 +4,7 @@ info: name: > Participants Database <= 1.7.5.9 - Unauthorized Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Participants Database plugin for WordPress is vulnerable to Cross-Site Scripting via the 'Name' paremeter in versions up to, and including, 1.7.5.9 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/participants-database/" google-query: inurl:"/wp-content/plugins/participants-database/" shodan-query: 'vuln:CVE-2017-14126' - tags: cve,wordpress,wp-plugin,participants-database,medium + tags: cve,wordpress,wp-plugin,participants-database,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-14530-44c866df4156e18647ea081befd62b4f.yaml b/nuclei-templates/2017/CVE-2017-14530-44c866df4156e18647ea081befd62b4f.yaml index 3249d98740..92c6c10627 100644 --- a/nuclei-templates/2017/CVE-2017-14530-44c866df4156e18647ea081befd62b4f.yaml +++ b/nuclei-templates/2017/CVE-2017-14530-44c866df4156e18647ea081befd62b4f.yaml @@ -4,7 +4,7 @@ info: name: > Crony Cronjob Manager < 0.4.7 - Cross-Site Request Forgery to Stored Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > WP_Admin_UI in the Crony Cronjob Manager plugin before 0.4.7 for WordPress has CSRF via the name parameter in an action=manage&do=create operation, as demonstrated by inserting XSS sequences. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/crony/" google-query: inurl:"/wp-content/plugins/crony/" shodan-query: 'vuln:CVE-2017-14530' - tags: cve,wordpress,wp-plugin,crony,high + tags: cve,wordpress,wp-plugin,crony,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-14718-07ca900da4dc5001e6cb25234fc6e73d.yaml b/nuclei-templates/2017/CVE-2017-14718-07ca900da4dc5001e6cb25234fc6e73d.yaml index 02ea8df378..ade2493510 100644 --- a/nuclei-templates/2017/CVE-2017-14718-07ca900da4dc5001e6cb25234fc6e73d.yaml +++ b/nuclei-templates/2017/CVE-2017-14718-07ca900da4dc5001e6cb25234fc6e73d.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.8.2 - Cross-Site Scripting via Javascript: and Data: URLs author: topscoder - severity: medium + severity: high description: > Before version 4.8.2, WordPress was susceptible to a Cross-Site Scripting attack in the link modal via a javascript: or data: URL. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-14718 metadata: shodan-query: 'vuln:CVE-2017-14718' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-14720-2bba5d9d8ab9c1e3d8162257b423cea8.yaml b/nuclei-templates/2017/CVE-2017-14720-2bba5d9d8ab9c1e3d8162257b423cea8.yaml index 0dcf6697b9..a10366e3fe 100644 --- a/nuclei-templates/2017/CVE-2017-14720-2bba5d9d8ab9c1e3d8162257b423cea8.yaml +++ b/nuclei-templates/2017/CVE-2017-14720-2bba5d9d8ab9c1e3d8162257b423cea8.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.8.2 - Cross-Site Scripting via Template Name author: topscoder - severity: medium + severity: high description: > Before version 4.8.2, WordPress allowed a Cross-Site scripting attack in the template list view via a crafted template name. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-14720 metadata: shodan-query: 'vuln:CVE-2017-14720' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-14721-c8fd14ca7da27ed4c689b2c4e745761c.yaml b/nuclei-templates/2017/CVE-2017-14721-c8fd14ca7da27ed4c689b2c4e745761c.yaml index dee172b1c7..1a83aa270c 100644 --- a/nuclei-templates/2017/CVE-2017-14721-c8fd14ca7da27ed4c689b2c4e745761c.yaml +++ b/nuclei-templates/2017/CVE-2017-14721-c8fd14ca7da27ed4c689b2c4e745761c.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.8.2 - Stored Cross-Site Scripting via Plugin Names author: topscoder - severity: medium + severity: high description: > Before version 4.8.2, WordPress allowed Cross-Site scripting in the plugin editor via a crafted plugin name. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-14721 metadata: shodan-query: 'vuln:CVE-2017-14721' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-14724-77d0dd5a2fc10c56c574031709910e3c.yaml b/nuclei-templates/2017/CVE-2017-14724-77d0dd5a2fc10c56c574031709910e3c.yaml index 209631fafa..a9b9d2c7a7 100644 --- a/nuclei-templates/2017/CVE-2017-14724-77d0dd5a2fc10c56c574031709910e3c.yaml +++ b/nuclei-templates/2017/CVE-2017-14724-77d0dd5a2fc10c56c574031709910e3c.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.8.2 - Cross-Site Scripting in oEmbed author: topscoder - severity: medium + severity: high description: > Before version 4.8.2, WordPress was vulnerable to cross-site scripting in oEmbed discovery. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-14724 metadata: shodan-query: 'vuln:CVE-2017-14724' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-14726-c64e96aaac6f414a27f722db57e620e7.yaml b/nuclei-templates/2017/CVE-2017-14726-c64e96aaac6f414a27f722db57e620e7.yaml index c5fb6b4730..84cd667b88 100644 --- a/nuclei-templates/2017/CVE-2017-14726-c64e96aaac6f414a27f722db57e620e7.yaml +++ b/nuclei-templates/2017/CVE-2017-14726-c64e96aaac6f414a27f722db57e620e7.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.8.2 - Cross-Site Scripting via Shortcodes author: topscoder - severity: medium + severity: high description: > Before version 4.8.2, WordPress was vulnerable to a cross-site scripting attack via shortcodes in the TinyMCE visual editor. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-14726 metadata: shodan-query: 'vuln:CVE-2017-14726' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-14751-1a1e231870f2d36ae969bc3201047b95.yaml b/nuclei-templates/2017/CVE-2017-14751-1a1e231870f2d36ae969bc3201047b95.yaml index 53190701b9..974784aa93 100644 --- a/nuclei-templates/2017/CVE-2017-14751-1a1e231870f2d36ae969bc3201047b95.yaml +++ b/nuclei-templates/2017/CVE-2017-14751-1a1e231870f2d36ae969bc3201047b95.yaml @@ -4,7 +4,7 @@ info: name: > WP Jobs < 1.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Intense WP "WP Jobs" plugin 1.5 for WordPress has XSS, related to the Job Qualification field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-jobs/" google-query: inurl:"/wp-content/plugins/wp-jobs/" shodan-query: 'vuln:CVE-2017-14751' - tags: cve,wordpress,wp-plugin,wp-jobs,medium + tags: cve,wordpress,wp-plugin,wp-jobs,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-14842-43a98edb387e539611a5da070feef314.yaml b/nuclei-templates/2017/CVE-2017-14842-43a98edb387e539611a5da070feef314.yaml index 85cf90163b..0a9fbf7bb7 100644 --- a/nuclei-templates/2017/CVE-2017-14842-43a98edb387e539611a5da070feef314.yaml +++ b/nuclei-templates/2017/CVE-2017-14842-43a98edb387e539611a5da070feef314.yaml @@ -4,7 +4,7 @@ info: name: > SMSmaster – Multipurpose SMS Gateway for Wordpress (All Versions) - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > Mojoomla SMSmaster Multipurpose SMS Gateway for WordPress allows SQL Injection via the id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/smsmaster/" google-query: inurl:"/wp-content/plugins/smsmaster/" shodan-query: 'vuln:CVE-2017-14842' - tags: cve,wordpress,wp-plugin,smsmaster,high + tags: cve,wordpress,wp-plugin,smsmaster,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-14843-b8bed2657e8d7d4ab8d4bb6fbdc93698.yaml b/nuclei-templates/2017/CVE-2017-14843-b8bed2657e8d7d4ab8d4bb6fbdc93698.yaml index 861c9f9caf..ba8aec5a89 100644 --- a/nuclei-templates/2017/CVE-2017-14843-b8bed2657e8d7d4ab8d4bb6fbdc93698.yaml +++ b/nuclei-templates/2017/CVE-2017-14843-b8bed2657e8d7d4ab8d4bb6fbdc93698.yaml @@ -4,7 +4,7 @@ info: name: > Mojoomla School Management System (Unspecified Version) - Authenticated (Student+) SQL Injection author: topscoder - severity: high + severity: low description: > The Mojoomla School Management System plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in unknown versions due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers with student-level access to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/school-management/" google-query: inurl:"/wp-content/plugins/school-management/" shodan-query: 'vuln:CVE-2017-14843' - tags: cve,wordpress,wp-plugin,school-management,high + tags: cve,wordpress,wp-plugin,school-management,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-14844-398be83e4279f1a443c4d3cb2c5b8198.yaml b/nuclei-templates/2017/CVE-2017-14844-398be83e4279f1a443c4d3cb2c5b8198.yaml index 5006b84bb2..2c16fcd5db 100644 --- a/nuclei-templates/2017/CVE-2017-14844-398be83e4279f1a443c4d3cb2c5b8198.yaml +++ b/nuclei-templates/2017/CVE-2017-14844-398be83e4279f1a443c4d3cb2c5b8198.yaml @@ -4,7 +4,7 @@ info: name: > WPGYM - Wordpress Gym Management System (Unknown Version) - SQL Injection author: topscoder - severity: high + severity: critical description: > Mojoomla WPGYM WordPress Gym Management System allows SQL Injection via the id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gym-management/" google-query: inurl:"/wp-content/plugins/gym-management/" shodan-query: 'vuln:CVE-2017-14844' - tags: cve,wordpress,wp-plugin,gym-management,high + tags: cve,wordpress,wp-plugin,gym-management,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-14845-a6893186307907fca26272a54fd950bf.yaml b/nuclei-templates/2017/CVE-2017-14845-a6893186307907fca26272a54fd950bf.yaml index 34cbca5287..06204024a2 100644 --- a/nuclei-templates/2017/CVE-2017-14845-a6893186307907fca26272a54fd950bf.yaml +++ b/nuclei-templates/2017/CVE-2017-14845-a6893186307907fca26272a54fd950bf.yaml @@ -4,7 +4,7 @@ info: name: > WPCHURCH - Church Management System for Wordpress Theme < 13-07-2019 - SQL Injection author: topscoder - severity: high + severity: critical description: > Mojoomla WPCHURCH Church Management System for WordPress allows SQL Injection via the id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/church-management/" google-query: inurl:"/wp-content/plugins/church-management/" shodan-query: 'vuln:CVE-2017-14845' - tags: cve,wordpress,wp-plugin,church-management,high + tags: cve,wordpress,wp-plugin,church-management,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-14846-6c841a99daf37cae6f46cd0d753efccb.yaml b/nuclei-templates/2017/CVE-2017-14846-6c841a99daf37cae6f46cd0d753efccb.yaml index 585f5d8c8e..18be2f534a 100644 --- a/nuclei-templates/2017/CVE-2017-14846-6c841a99daf37cae6f46cd0d753efccb.yaml +++ b/nuclei-templates/2017/CVE-2017-14846-6c841a99daf37cae6f46cd0d753efccb.yaml @@ -4,7 +4,7 @@ info: name: > Mojoomla Hospital Management System for WordPress Theme < 22-05-2018 - SQL Injection author: topscoder - severity: high + severity: critical description: > Mojoomla Hospital Management System for WordPress allows SQL Injection via the id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/hospital-management/" google-query: inurl:"/wp-content/plugins/hospital-management/" shodan-query: 'vuln:CVE-2017-14846' - tags: cve,wordpress,wp-plugin,hospital-management,high + tags: cve,wordpress,wp-plugin,hospital-management,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-14847-00968ba3e8c09884c42e4fbfc8959579.yaml b/nuclei-templates/2017/CVE-2017-14847-00968ba3e8c09884c42e4fbfc8959579.yaml index d2ee2b0b4b..44915ae062 100644 --- a/nuclei-templates/2017/CVE-2017-14847-00968ba3e8c09884c42e4fbfc8959579.yaml +++ b/nuclei-templates/2017/CVE-2017-14847-00968ba3e8c09884c42e4fbfc8959579.yaml @@ -4,7 +4,7 @@ info: name: > WPAMS - Apartment Management System for wordpress Theme < 17-07-2019 - SQL Injection author: topscoder - severity: high + severity: critical description: > Mojoomla WPAMS Apartment Management System for WordPress allows SQL Injection via the id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/apartment-management/" google-query: inurl:"/wp-content/plugins/apartment-management/" shodan-query: 'vuln:CVE-2017-14847' - tags: cve,wordpress,wp-plugin,apartment-management,high + tags: cve,wordpress,wp-plugin,apartment-management,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-14848-d1dc7536ba0bbf23ad7893c422769d48.yaml b/nuclei-templates/2017/CVE-2017-14848-d1dc7536ba0bbf23ad7893c422769d48.yaml index f185c79033..6c04d39ca5 100644 --- a/nuclei-templates/2017/CVE-2017-14848-d1dc7536ba0bbf23ad7893c422769d48.yaml +++ b/nuclei-templates/2017/CVE-2017-14848-d1dc7536ba0bbf23ad7893c422769d48.yaml @@ -4,7 +4,7 @@ info: name: > WPHRM - Human Resource Management System < 1.1 - SQL Injection author: topscoder - severity: high + severity: critical description: > WPHRM Human Resource Management System for WordPress 1.0 allows SQL Injection via the employee_id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/wphrm/" google-query: inurl:"/wp-content/themes/wphrm/" shodan-query: 'vuln:CVE-2017-14848' - tags: cve,wordpress,wp-theme,wphrm,high + tags: cve,wordpress,wp-theme,wphrm,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-15375-251f38cefaa8d1370dc48f71e7aae210.yaml b/nuclei-templates/2017/CVE-2017-15375-251f38cefaa8d1370dc48f71e7aae210.yaml index 1e7f25bc58..185278db64 100644 --- a/nuclei-templates/2017/CVE-2017-15375-251f38cefaa8d1370dc48f71e7aae210.yaml +++ b/nuclei-templates/2017/CVE-2017-15375-251f38cefaa8d1370dc48f71e7aae210.yaml @@ -4,7 +4,7 @@ info: name: > WPJobBoard <= 4.5.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple client-side cross site scripting vulnerabilities have been discovered in the WpJobBoard v4.5.1 web-application for WordPress. The vulnerabilities are located in the `query` and `id` parameters of the `wpjb-email`, `wpjb-job`, `wpjb-application`, and `wpjb-membership` modules. Remote attackers are able to inject malicious script code to hijack admin session credentials via the backend, or to manipulate the backend on client-side performed requests. The attack vector is non-persistent and the request method to inject is GET. The attacker does not need a privileged user account to perform a successful exploitation. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpjobboard/" google-query: inurl:"/wp-content/plugins/wpjobboard/" shodan-query: 'vuln:CVE-2017-15375' - tags: cve,wordpress,wp-plugin,wpjobboard,medium + tags: cve,wordpress,wp-plugin,wpjobboard,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-15812-84cb3311236885a9e904cbe429619629.yaml b/nuclei-templates/2017/CVE-2017-15812-84cb3311236885a9e904cbe429619629.yaml index 5566f94126..0887185491 100644 --- a/nuclei-templates/2017/CVE-2017-15812-84cb3311236885a9e904cbe429619629.yaml +++ b/nuclei-templates/2017/CVE-2017-15812-84cb3311236885a9e904cbe429619629.yaml @@ -4,7 +4,7 @@ info: name: > Easy Appointments < 1.12.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Appointments plugin before 1.12.0 for WordPress has XSS via a Settings value in the admin panel. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-appointments/" google-query: inurl:"/wp-content/plugins/easy-appointments/" shodan-query: 'vuln:CVE-2017-15812' - tags: cve,wordpress,wp-plugin,easy-appointments,medium + tags: cve,wordpress,wp-plugin,easy-appointments,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-15867-933c9d4b3eacccddbe4abc821f273b41.yaml b/nuclei-templates/2017/CVE-2017-15867-933c9d4b3eacccddbe4abc821f273b41.yaml index 16489b87fa..c7de3763a3 100644 --- a/nuclei-templates/2017/CVE-2017-15867-933c9d4b3eacccddbe4abc821f273b41.yaml +++ b/nuclei-templates/2017/CVE-2017-15867-933c9d4b3eacccddbe4abc821f273b41.yaml @@ -4,7 +4,7 @@ info: name: > User Login History Plugin <= 1.5.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the user-login-history plugin through 1.5.2 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) date_from, (2) date_to, (3) user_id, (4) username, (5) country_name, (6) browser, (7) operating_system, or (8) ip_address parameter to admin/partials/listing/listing.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/user-login-history/" google-query: inurl:"/wp-content/plugins/user-login-history/" shodan-query: 'vuln:CVE-2017-15867' - tags: cve,wordpress,wp-plugin,user-login-history,medium + tags: cve,wordpress,wp-plugin,user-login-history,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-16815-718986dcd5947a1beb7efad526e28827.yaml b/nuclei-templates/2017/CVE-2017-16815-718986dcd5947a1beb7efad526e28827.yaml index 4401183b8a..82d86f5e57 100644 --- a/nuclei-templates/2017/CVE-2017-16815-718986dcd5947a1beb7efad526e28827.yaml +++ b/nuclei-templates/2017/CVE-2017-16815-718986dcd5947a1beb7efad526e28827.yaml @@ -4,7 +4,7 @@ info: name: > Duplicator <= 1.2.28 – Unauthenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > installer.php in the Snap Creek Duplicator (WordPress Site Migration & Backup) plugin before 1.2.30 for WordPress has XSS because the values "url_new" (/wp-content/plugins/duplicator/installer/build/view.step4.php) and "logging" (wp-content/plugins/duplicator/installer/build/view.step2.php) are not filtered correctly. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/duplicator/" google-query: inurl:"/wp-content/plugins/duplicator/" shodan-query: 'vuln:CVE-2017-16815' - tags: cve,wordpress,wp-plugin,duplicator,medium + tags: cve,wordpress,wp-plugin,duplicator,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-16955-94786cf22c04d1dd0ce4fe28ab98e98a.yaml b/nuclei-templates/2017/CVE-2017-16955-94786cf22c04d1dd0ce4fe28ab98e98a.yaml index 8ae516601f..23861fd0b9 100644 --- a/nuclei-templates/2017/CVE-2017-16955-94786cf22c04d1dd0ce4fe28ab98e98a.yaml +++ b/nuclei-templates/2017/CVE-2017-16955-94786cf22c04d1dd0ce4fe28ab98e98a.yaml @@ -4,7 +4,7 @@ info: name: > InLinks <= 1.1 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > SQL injection vulnerability in the InLinks plugin through 1.1 for WordPress allows authenticated users to execute arbitrary SQL commands via the "keyword" parameter to /wp-admin/options-general.php?page=inlinks/inlinks.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/inlinks/" google-query: inurl:"/wp-content/plugins/inlinks/" shodan-query: 'vuln:CVE-2017-16955' - tags: cve,wordpress,wp-plugin,inlinks,high + tags: cve,wordpress,wp-plugin,inlinks,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-17059-95db80ffd1d934591e0e0a483a99236e.yaml b/nuclei-templates/2017/CVE-2017-17059-95db80ffd1d934591e0e0a483a99236e.yaml index 43c0d504a2..3a61d11baf 100644 --- a/nuclei-templates/2017/CVE-2017-17059-95db80ffd1d934591e0e0a483a99236e.yaml +++ b/nuclei-templates/2017/CVE-2017-17059-95db80ffd1d934591e0e0a483a99236e.yaml @@ -4,7 +4,7 @@ info: name: > amtyThumb posts <= 8.2.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > XSS exists in the amtyThumb amty-thumb-recent-post (aka amtyThumb posts or wp-thumb-post) plugin 8.1.3 for WordPress via the query string to amtyThumbPostsAdminPg.php. An attempt to patch this vulnerability was made with 8.2.0, however, it is still exploitable by users who are logged-in. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/amty-thumb-recent-post/" google-query: inurl:"/wp-content/plugins/amty-thumb-recent-post/" shodan-query: 'vuln:CVE-2017-17059' - tags: cve,wordpress,wp-plugin,amty-thumb-recent-post,medium + tags: cve,wordpress,wp-plugin,amty-thumb-recent-post,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-17091-3dc787f0bf6215df748b832ffc87f8cd.yaml b/nuclei-templates/2017/CVE-2017-17091-3dc787f0bf6215df748b832ffc87f8cd.yaml index 188f2c4f63..20e37bcfb1 100644 --- a/nuclei-templates/2017/CVE-2017-17091-3dc787f0bf6215df748b832ffc87f8cd.yaml +++ b/nuclei-templates/2017/CVE-2017-17091-3dc787f0bf6215df748b832ffc87f8cd.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.9.1 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > wp-admin/user-new.php in WordPress before 4.9.1 sets the newbloguser key to a string that can be directly derived from the user ID, which allows remote attackers to bypass intended access restrictions by entering this string. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-17091 metadata: shodan-query: 'vuln:CVE-2017-17091' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-17092-7665a25ea15e9e9b2d624d595bf5298e.yaml b/nuclei-templates/2017/CVE-2017-17092-7665a25ea15e9e9b2d624d595bf5298e.yaml index e39beb8ae2..a1b75686ec 100644 --- a/nuclei-templates/2017/CVE-2017-17092-7665a25ea15e9e9b2d624d595bf5298e.yaml +++ b/nuclei-templates/2017/CVE-2017-17092-7665a25ea15e9e9b2d624d595bf5298e.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.9.1 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > wp-includes/functions.php in WordPress before 4.9.1 does not require the unfiltered_html capability for upload of .js files, which might allow remote attackers to conduct XSS attacks via a crafted file. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-17092 metadata: shodan-query: 'vuln:CVE-2017-17092' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-17093-6afe85808d3f8414da9c4627bea64467.yaml b/nuclei-templates/2017/CVE-2017-17093-6afe85808d3f8414da9c4627bea64467.yaml index ba9b912e78..02ea8962ea 100644 --- a/nuclei-templates/2017/CVE-2017-17093-6afe85808d3f8414da9c4627bea64467.yaml +++ b/nuclei-templates/2017/CVE-2017-17093-6afe85808d3f8414da9c4627bea64467.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.9.1- Stored Cross-Site Scripting via Language author: topscoder - severity: medium + severity: high description: > wp-includes/general-template.php in WordPress before 4.9.1 does not properly restrict the lang attribute of an HTML element, which might allow attackers to conduct XSS attacks via the language setting of a site. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-17093 metadata: shodan-query: 'vuln:CVE-2017-17093' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-17096-3504e7e5ce554ea17877d4ad4d619862.yaml b/nuclei-templates/2017/CVE-2017-17096-3504e7e5ce554ea17877d4ad4d619862.yaml index dcccc0b139..b51964b4b6 100644 --- a/nuclei-templates/2017/CVE-2017-17096-3504e7e5ce554ea17877d4ad4d619862.yaml +++ b/nuclei-templates/2017/CVE-2017-17096-3504e7e5ce554ea17877d4ad4d619862.yaml @@ -4,7 +4,7 @@ info: name: > Content Cards <= 0.9.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Content Cards plugin before 0.9.7 for WordPress allows remote attackers to inject arbitrary JavaScript via crafted OpenGraph data. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/content-cards/" google-query: inurl:"/wp-content/plugins/content-cards/" shodan-query: 'vuln:CVE-2017-17096' - tags: cve,wordpress,wp-plugin,content-cards,medium + tags: cve,wordpress,wp-plugin,content-cards,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-17451-6435ffbe89f0f4a16cb704e9095f5d40.yaml b/nuclei-templates/2017/CVE-2017-17451-6435ffbe89f0f4a16cb704e9095f5d40.yaml index 69b2f0f49e..831628f051 100644 --- a/nuclei-templates/2017/CVE-2017-17451-6435ffbe89f0f4a16cb704e9095f5d40.yaml +++ b/nuclei-templates/2017/CVE-2017-17451-6435ffbe89f0f4a16cb704e9095f5d40.yaml @@ -4,7 +4,7 @@ info: name: > WP Mailster < 1.5.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The WP Mailster plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'mes' parameter found in the 'view/subscription/unsubscribe2.php' file in versions up to 1.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-mailster/" google-query: inurl:"/wp-content/plugins/wp-mailster/" shodan-query: 'vuln:CVE-2017-17451' - tags: cve,wordpress,wp-plugin,wp-mailster,medium + tags: cve,wordpress,wp-plugin,wp-mailster,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-17719-31a7c57e145b1990f031344b13acb01b.yaml b/nuclei-templates/2017/CVE-2017-17719-31a7c57e145b1990f031344b13acb01b.yaml index 67679bf002..66368287ff 100644 --- a/nuclei-templates/2017/CVE-2017-17719-31a7c57e145b1990f031344b13acb01b.yaml +++ b/nuclei-templates/2017/CVE-2017-17719-31a7c57e145b1990f031344b13acb01b.yaml @@ -4,7 +4,7 @@ info: name: > WP Concours <= 1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > A cross-site scripting (XSS) vulnerability in the wp-concours plugin through 1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the result_message parameter to includes/concours_page.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-concours/" google-query: inurl:"/wp-content/plugins/wp-concours/" shodan-query: 'vuln:CVE-2017-17719' - tags: cve,wordpress,wp-plugin,wp-concours,medium + tags: cve,wordpress,wp-plugin,wp-concours,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-17744-afd7cbc1a6da1a4ae770134f7fa61d59.yaml b/nuclei-templates/2017/CVE-2017-17744-afd7cbc1a6da1a4ae770134f7fa61d59.yaml index dccb8fdbfe..6759e0a0c2 100644 --- a/nuclei-templates/2017/CVE-2017-17744-afd7cbc1a6da1a4ae770134f7fa61d59.yaml +++ b/nuclei-templates/2017/CVE-2017-17744-afd7cbc1a6da1a4ae770134f7fa61d59.yaml @@ -4,7 +4,7 @@ info: name: > Custom Map <= 1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > A cross-site scripting (XSS) vulnerability in the custom-map plugin through 1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the map_id parameter to view/advancedsettings.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/custom-map/" google-query: inurl:"/wp-content/plugins/custom-map/" shodan-query: 'vuln:CVE-2017-17744' - tags: cve,wordpress,wp-plugin,custom-map,medium + tags: cve,wordpress,wp-plugin,custom-map,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-17753-888fd755a466f61b6b5975477e6bfb5b.yaml b/nuclei-templates/2017/CVE-2017-17753-888fd755a466f61b6b5975477e6bfb5b.yaml index 6edc383863..289c51a39b 100644 --- a/nuclei-templates/2017/CVE-2017-17753-888fd755a466f61b6b5975477e6bfb5b.yaml +++ b/nuclei-templates/2017/CVE-2017-17753-888fd755a466f61b6b5975477e6bfb5b.yaml @@ -4,7 +4,7 @@ info: name: > CSV Import Export <= 1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the esb-csv-import-export plugin through 1.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) cie_type, (2) cie_import, (3) cie_update, or (4) cie_ignore parameter to includes/admin/views/esb-cie-import-export-page.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/csv-import-export/" google-query: inurl:"/wp-content/plugins/csv-import-export/" shodan-query: 'vuln:CVE-2017-17753' - tags: cve,wordpress,wp-plugin,csv-import-export,medium + tags: cve,wordpress,wp-plugin,csv-import-export,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-17780-167d9672411be44feb72a5175fd0987c.yaml b/nuclei-templates/2017/CVE-2017-17780-167d9672411be44feb72a5175fd0987c.yaml index e4bac94c39..760fe77299 100644 --- a/nuclei-templates/2017/CVE-2017-17780-167d9672411be44feb72a5175fd0987c.yaml +++ b/nuclei-templates/2017/CVE-2017-17780-167d9672411be44feb72a5175fd0987c.yaml @@ -4,7 +4,7 @@ info: name: > Clockwork SMS Plugins - Multiple Versions - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Clockwork SMS clockwork-test-message.php component has XSS via a crafted "to" parameter in a clockwork-test-message request to wp-admin/admin.php. This component code is found in the following WordPress plugins: Clockwork Free and Paid SMS Notifications 2.0.3, Two-Factor Authentication - Clockwork SMS 1.0.2, Booking Calendar - Clockwork SMS 1.0.5, Contact Form 7 - Clockwork SMS 2.3.0, Fast Secure Contact Form - Clockwork SMS 2.1.2, Formidable - Clockwork SMS 1.0.2, Gravity Forms - Clockwork SMS 2.2, and WP e-Commerce - Clockwork SMS 2.0.5. reference: @@ -14,17 +14,17 @@ info: cvss-score: 6.1 cve-id: CVE-2017-17780 metadata: - fofa-query: "wp-content/plugins/mediaburst-email-to-sms/" - google-query: inurl:"/wp-content/plugins/mediaburst-email-to-sms/" + fofa-query: "wp-content/plugins/fscf-sms/" + google-query: inurl:"/wp-content/plugins/fscf-sms/" shodan-query: 'vuln:CVE-2017-17780' - tags: cve,wordpress,wp-plugin,mediaburst-email-to-sms,medium + tags: cve,wordpress,wp-plugin,fscf-sms,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/mediaburst-email-to-sms/readme.txt" + - "{{BaseURL}}/wp-content/plugins/fscf-sms/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "mediaburst-email-to-sms" + - "fscf-sms" part: body - type: dsl dsl: - - compare_versions(version, '<= 2.0.3') \ No newline at end of file + - compare_versions(version, '<= 2.1.2') \ No newline at end of file diff --git a/nuclei-templates/2017/CVE-2017-17869-fe1f1b8568ab900402e4ee21af348064.yaml b/nuclei-templates/2017/CVE-2017-17869-fe1f1b8568ab900402e4ee21af348064.yaml index bbd4ac6f0d..ba5aac354e 100644 --- a/nuclei-templates/2017/CVE-2017-17869-fe1f1b8568ab900402e4ee21af348064.yaml +++ b/nuclei-templates/2017/CVE-2017-17869-fe1f1b8568ab900402e4ee21af348064.yaml @@ -4,7 +4,7 @@ info: name: > mgl-instagram-gallery Plugin (Unknown Versions) - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The mgl-instagram-gallery plugin for WordPress has XSS via the single-gallery.php media parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mgl-instagram-gallery/" google-query: inurl:"/wp-content/plugins/mgl-instagram-gallery/" shodan-query: 'vuln:CVE-2017-17869' - tags: cve,wordpress,wp-plugin,mgl-instagram-gallery,medium + tags: cve,wordpress,wp-plugin,mgl-instagram-gallery,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18010-5d316e62377c24672c816fca478bdf84.yaml b/nuclei-templates/2017/CVE-2017-18010-5d316e62377c24672c816fca478bdf84.yaml index d17806ee62..26f59e3980 100644 --- a/nuclei-templates/2017/CVE-2017-18010-5d316e62377c24672c816fca478bdf84.yaml +++ b/nuclei-templates/2017/CVE-2017-18010-5d316e62377c24672c816fca478bdf84.yaml @@ -4,7 +4,7 @@ info: name: > Smart Marketing SMS and Newsletters Forms < 2.0.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The E-goi Smart Marketing SMS and Newsletters Forms plugin before 2.0.0 for WordPress has XSS via the admin/partials/custom/egoi-for-wp-form_egoi.php url parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/smart-marketing-for-wp/" google-query: inurl:"/wp-content/plugins/smart-marketing-for-wp/" shodan-query: 'vuln:CVE-2017-18010' - tags: cve,wordpress,wp-plugin,smart-marketing-for-wp,medium + tags: cve,wordpress,wp-plugin,smart-marketing-for-wp,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18011-9960c486a0af8a01fba712be84f42610.yaml b/nuclei-templates/2017/CVE-2017-18011-9960c486a0af8a01fba712be84f42610.yaml index 40d671a075..538bbf872b 100644 --- a/nuclei-templates/2017/CVE-2017-18011-9960c486a0af8a01fba712be84f42610.yaml +++ b/nuclei-templates/2017/CVE-2017-18011-9960c486a0af8a01fba712be84f42610.yaml @@ -4,7 +4,7 @@ info: name: > Affiliate Ads for Clickbank Products < 1.7 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Affiliate Ads for Clickbank Products plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'border_color' parameter found in the text_ads_ajax.php file in versions up to to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/affiliate-ads-builder-for-clickbank-products/" google-query: inurl:"/wp-content/plugins/affiliate-ads-builder-for-clickbank-products/" shodan-query: 'vuln:CVE-2017-18011' - tags: cve,wordpress,wp-plugin,affiliate-ads-builder-for-clickbank-products,medium + tags: cve,wordpress,wp-plugin,affiliate-ads-builder-for-clickbank-products,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18012-7afc53a437871814faec30b27e8447a5.yaml b/nuclei-templates/2017/CVE-2017-18012-7afc53a437871814faec30b27e8447a5.yaml index b68d676135..b294bdb660 100644 --- a/nuclei-templates/2017/CVE-2017-18012-7afc53a437871814faec30b27e8447a5.yaml +++ b/nuclei-templates/2017/CVE-2017-18012-7afc53a437871814faec30b27e8447a5.yaml @@ -4,7 +4,7 @@ info: name: > Z-URL Preview <= 1.6.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Z-URL Preview plugin 1.6.1 for WordPress has XSS via the class.zlinkpreview.php url parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/z-url-preview/" google-query: inurl:"/wp-content/plugins/z-url-preview/" shodan-query: 'vuln:CVE-2017-18012' - tags: cve,wordpress,wp-plugin,z-url-preview,medium + tags: cve,wordpress,wp-plugin,z-url-preview,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18015-7bc3b9cd6e8ea033c22ca8523f43d4e5.yaml b/nuclei-templates/2017/CVE-2017-18015-7bc3b9cd6e8ea033c22ca8523f43d4e5.yaml index 0232a15f79..662393217d 100644 --- a/nuclei-templates/2017/CVE-2017-18015-7bc3b9cd6e8ea033c22ca8523f43d4e5.yaml +++ b/nuclei-templates/2017/CVE-2017-18015-7bc3b9cd6e8ea033c22ca8523f43d4e5.yaml @@ -4,7 +4,7 @@ info: name: > Share This Image < 1.04 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The ILLID Share This Image plugin before 1.04 for WordPress has XSS via the sharer.php url parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/share-this-image/" google-query: inurl:"/wp-content/plugins/share-this-image/" shodan-query: 'vuln:CVE-2017-18015' - tags: cve,wordpress,wp-plugin,share-this-image,medium + tags: cve,wordpress,wp-plugin,share-this-image,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18032-dc6aa910a851ae74e5606d96e36b1052.yaml b/nuclei-templates/2017/CVE-2017-18032-dc6aa910a851ae74e5606d96e36b1052.yaml index f1483af695..3521b3e71d 100644 --- a/nuclei-templates/2017/CVE-2017-18032-dc6aa910a851ae74e5606d96e36b1052.yaml +++ b/nuclei-templates/2017/CVE-2017-18032-dc6aa910a851ae74e5606d96e36b1052.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Download Manager <= 2.9.51 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The download-manager plugin before 2.9.52 for WordPress has XSS via the id parameter in a wpdm_generate_password action to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/download-manager/" google-query: inurl:"/wp-content/plugins/download-manager/" shodan-query: 'vuln:CVE-2017-18032' - tags: cve,wordpress,wp-plugin,download-manager,medium + tags: cve,wordpress,wp-plugin,download-manager,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18356-aca82f89029d85161f52ea200f7cad49.yaml b/nuclei-templates/2017/CVE-2017-18356-aca82f89029d85161f52ea200f7cad49.yaml index a3c1edb597..1266c4eac3 100644 --- a/nuclei-templates/2017/CVE-2017-18356-aca82f89029d85161f52ea200f7cad49.yaml +++ b/nuclei-templates/2017/CVE-2017-18356-aca82f89029d85161f52ea200f7cad49.yaml @@ -4,7 +4,7 @@ info: name: > WooCommerce <= 3.2.3 - Authenticated PHP Object Injection author: topscoder - severity: high + severity: low description: > In the Automattic WooCommerce plugin before 3.2.4 for WordPress, an attack is possible after gaining access to the target site with a user account that has at least Shop manager privileges. The attacker then constructs a specifically crafted string that will turn into a PHP object injection involving the includes/shortcodes/class-wc-shortcode-products.php WC_Shortcode_Products::get_products() use of cached queries within shortcodes. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/woocommerce/" google-query: inurl:"/wp-content/plugins/woocommerce/" shodan-query: 'vuln:CVE-2017-18356' - tags: cve,wordpress,wp-plugin,woocommerce,high + tags: cve,wordpress,wp-plugin,woocommerce,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18487-4e7aa84fdbb125f3fa6adbf786ab8d90.yaml b/nuclei-templates/2017/CVE-2017-18487-4e7aa84fdbb125f3fa6adbf786ab8d90.yaml index bdd9ecde60..887c24599d 100644 --- a/nuclei-templates/2017/CVE-2017-18487-4e7aa84fdbb125f3fa6adbf786ab8d90.yaml +++ b/nuclei-templates/2017/CVE-2017-18487-4e7aa84fdbb125f3fa6adbf786ab8d90.yaml @@ -4,7 +4,7 @@ info: name: > AdPush <= 1.43 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The AdPush plugin for WordPress is vulnerable to multiple Cross-Site Scripting in versions up to, and including, 1.43 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/adsense-plugin/" google-query: inurl:"/wp-content/plugins/adsense-plugin/" shodan-query: 'vuln:CVE-2017-18487' - tags: cve,wordpress,wp-plugin,adsense-plugin,medium + tags: cve,wordpress,wp-plugin,adsense-plugin,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18488-ec758abe67d8493d911d656fdfa690f2.yaml b/nuclei-templates/2017/CVE-2017-18488-ec758abe67d8493d911d656fdfa690f2.yaml index e522c8b871..0d88de232c 100644 --- a/nuclei-templates/2017/CVE-2017-18488-ec758abe67d8493d911d656fdfa690f2.yaml +++ b/nuclei-templates/2017/CVE-2017-18488-ec758abe67d8493d911d656fdfa690f2.yaml @@ -4,7 +4,7 @@ info: name: > Backup Guard <= 1.1.46 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Backup Guard plugin before 1.1.47 for WordPress has multiple XSS issues. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/backup/" google-query: inurl:"/wp-content/plugins/backup/" shodan-query: 'vuln:CVE-2017-18488' - tags: cve,wordpress,wp-plugin,backup,medium + tags: cve,wordpress,wp-plugin,backup,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18492-008dc0e9968f6799131ae4b8b208b112.yaml b/nuclei-templates/2017/CVE-2017-18492-008dc0e9968f6799131ae4b8b208b112.yaml index 236a310445..a95b2d23f7 100644 --- a/nuclei-templates/2017/CVE-2017-18492-008dc0e9968f6799131ae4b8b208b112.yaml +++ b/nuclei-templates/2017/CVE-2017-18492-008dc0e9968f6799131ae4b8b208b112.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form to DB <= 1.5.6 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Contact Form to DB plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 1.5.6 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-to-db/" google-query: inurl:"/wp-content/plugins/contact-form-to-db/" shodan-query: 'vuln:CVE-2017-18492' - tags: cve,wordpress,wp-plugin,contact-form-to-db,medium + tags: cve,wordpress,wp-plugin,contact-form-to-db,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18495-8536de3de245d6a4ab6eeac77e95e618.yaml b/nuclei-templates/2017/CVE-2017-18495-8536de3de245d6a4ab6eeac77e95e618.yaml index eb94f1bfb1..4d5abc3bc6 100644 --- a/nuclei-templates/2017/CVE-2017-18495-8536de3de245d6a4ab6eeac77e95e618.yaml +++ b/nuclei-templates/2017/CVE-2017-18495-8536de3de245d6a4ab6eeac77e95e618.yaml @@ -4,7 +4,7 @@ info: name: > Clockwork SMS Notfications < 2.4.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The gravity-forms-sms-notifications plugin before 2.4.2 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mediaburst-email-to-sms/" google-query: inurl:"/wp-content/plugins/mediaburst-email-to-sms/" shodan-query: 'vuln:CVE-2017-18495' - tags: cve,wordpress,wp-plugin,mediaburst-email-to-sms,medium + tags: cve,wordpress,wp-plugin,mediaburst-email-to-sms,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18497-fbafef1583d66ee6ba3521f29ba434a8.yaml b/nuclei-templates/2017/CVE-2017-18497-fbafef1583d66ee6ba3521f29ba434a8.yaml index 41c323f59a..6715bc8e6d 100644 --- a/nuclei-templates/2017/CVE-2017-18497-fbafef1583d66ee6ba3521f29ba434a8.yaml +++ b/nuclei-templates/2017/CVE-2017-18497-fbafef1583d66ee6ba3521f29ba434a8.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Contact Form, Drag and Drop Form Builder Plugin – Live Forms <= 3.2.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The liveforms plugin before 3.4.0 for WordPress has XSS via several parameters. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/liveforms/" google-query: inurl:"/wp-content/plugins/liveforms/" shodan-query: 'vuln:CVE-2017-18497' - tags: cve,wordpress,wp-plugin,liveforms,medium + tags: cve,wordpress,wp-plugin,liveforms,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18499-d87695af989823f3f60bb3499466b104.yaml b/nuclei-templates/2017/CVE-2017-18499-d87695af989823f3f60bb3499466b104.yaml index 6212850003..9768c2f317 100644 --- a/nuclei-templates/2017/CVE-2017-18499-d87695af989823f3f60bb3499466b104.yaml +++ b/nuclei-templates/2017/CVE-2017-18499-d87695af989823f3f60bb3499466b104.yaml @@ -4,7 +4,7 @@ info: name: > Simple Membership <= 3.5.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Simple Membership plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 3.5.6 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/simple-membership/" google-query: inurl:"/wp-content/plugins/simple-membership/" shodan-query: 'vuln:CVE-2017-18499' - tags: cve,wordpress,wp-plugin,simple-membership,medium + tags: cve,wordpress,wp-plugin,simple-membership,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18501-70c3e0a35f7627ffa035ef5b1d41e423.yaml b/nuclei-templates/2017/CVE-2017-18501-70c3e0a35f7627ffa035ef5b1d41e423.yaml index 1258f1bfd4..f2e07674f5 100644 --- a/nuclei-templates/2017/CVE-2017-18501-70c3e0a35f7627ffa035ef5b1d41e423.yaml +++ b/nuclei-templates/2017/CVE-2017-18501-70c3e0a35f7627ffa035ef5b1d41e423.yaml @@ -4,7 +4,7 @@ info: name: > Social Login by BestWebSoft <= 0.1 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Social Login by BestWebSoft plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 0.1 due to insufficient input sanitization and output escaping on the 'category' parameter. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/social-login-bws/" google-query: inurl:"/wp-content/plugins/social-login-bws/" shodan-query: 'vuln:CVE-2017-18501' - tags: cve,wordpress,wp-plugin,social-login-bws,medium + tags: cve,wordpress,wp-plugin,social-login-bws,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18502-6e4e8347273d5c0e2b6b13d913498882.yaml b/nuclei-templates/2017/CVE-2017-18502-6e4e8347273d5c0e2b6b13d913498882.yaml index 3be3068de4..f79950817e 100644 --- a/nuclei-templates/2017/CVE-2017-18502-6e4e8347273d5c0e2b6b13d913498882.yaml +++ b/nuclei-templates/2017/CVE-2017-18502-6e4e8347273d5c0e2b6b13d913498882.yaml @@ -4,7 +4,7 @@ info: name: > Subscriber by BestWebSoft <= 1.3.4 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The subscriber plugin before 1.3.5 for WordPress has multiple XSS issues. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/subscriber/" google-query: inurl:"/wp-content/plugins/subscriber/" shodan-query: 'vuln:CVE-2017-18502' - tags: cve,wordpress,wp-plugin,subscriber,medium + tags: cve,wordpress,wp-plugin,subscriber,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18503-f47b58aa7a47ddf3e1cee744a91d58ee.yaml b/nuclei-templates/2017/CVE-2017-18503-f47b58aa7a47ddf3e1cee744a91d58ee.yaml index fb8a5db958..b05834c705 100644 --- a/nuclei-templates/2017/CVE-2017-18503-f47b58aa7a47ddf3e1cee744a91d58ee.yaml +++ b/nuclei-templates/2017/CVE-2017-18503-f47b58aa7a47ddf3e1cee744a91d58ee.yaml @@ -4,7 +4,7 @@ info: name: > Twitter Cards Meta – Best Twitter Card Plugin for WordPress < 2.5.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The twitter-cards-meta plugin before 2.5.0 for WordPress has XSS via several parameters. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/twitter-cards-meta/" google-query: inurl:"/wp-content/plugins/twitter-cards-meta/" shodan-query: 'vuln:CVE-2017-18503' - tags: cve,wordpress,wp-plugin,twitter-cards-meta,medium + tags: cve,wordpress,wp-plugin,twitter-cards-meta,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18504-61a96d10635962decc1ce6046743090a.yaml b/nuclei-templates/2017/CVE-2017-18504-61a96d10635962decc1ce6046743090a.yaml index 4073e0a1c9..090a837e6c 100644 --- a/nuclei-templates/2017/CVE-2017-18504-61a96d10635962decc1ce6046743090a.yaml +++ b/nuclei-templates/2017/CVE-2017-18504-61a96d10635962decc1ce6046743090a.yaml @@ -4,7 +4,7 @@ info: name: > Twitter Cards Meta <= 2.4.5 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Twitter Cards Meta plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.4.5. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to gain administrative privileges and execute otherwise restricted actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/twitter-cards-meta/" google-query: inurl:"/wp-content/plugins/twitter-cards-meta/" shodan-query: 'vuln:CVE-2017-18504' - tags: cve,wordpress,wp-plugin,twitter-cards-meta,high + tags: cve,wordpress,wp-plugin,twitter-cards-meta,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18505-df50b4bafe4c4501f744155f1ffc2d55.yaml b/nuclei-templates/2017/CVE-2017-18505-df50b4bafe4c4501f744155f1ffc2d55.yaml index 8834d15cfc..2de60046ec 100644 --- a/nuclei-templates/2017/CVE-2017-18505-df50b4bafe4c4501f744155f1ffc2d55.yaml +++ b/nuclei-templates/2017/CVE-2017-18505-df50b4bafe4c4501f744155f1ffc2d55.yaml @@ -4,7 +4,7 @@ info: name: > BestWebSoft's Twitter < 2.55 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The BestWebSoft's Twitter plugin before 2.55 for WordPress has XSS via several parameters. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/twitter-plugin/" google-query: inurl:"/wp-content/plugins/twitter-plugin/" shodan-query: 'vuln:CVE-2017-18505' - tags: cve,wordpress,wp-plugin,twitter-plugin,medium + tags: cve,wordpress,wp-plugin,twitter-plugin,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18506-7e729c66876df948651c9d3837d1f01c.yaml b/nuclei-templates/2017/CVE-2017-18506-7e729c66876df948651c9d3837d1f01c.yaml index 5dce88991c..5ba07332f5 100644 --- a/nuclei-templates/2017/CVE-2017-18506-7e729c66876df948651c9d3837d1f01c.yaml +++ b/nuclei-templates/2017/CVE-2017-18506-7e729c66876df948651c9d3837d1f01c.yaml @@ -4,7 +4,7 @@ info: name: > WooCommerce PDF Invoices & Packing Slips <= 2.0.12 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The woocommerce-pdf-invoices-packing-slips plugin before 2.0.13 for WordPress has XSS via the tab or section variable on settings screens. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" google-query: inurl:"/wp-content/plugins/woocommerce-pdf-invoices-packing-slips/" shodan-query: 'vuln:CVE-2017-18506' - tags: cve,wordpress,wp-plugin,woocommerce-pdf-invoices-packing-slips,medium + tags: cve,wordpress,wp-plugin,woocommerce-pdf-invoices-packing-slips,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18507-0afdcc5a66b8604c315ccd15a101d49e.yaml b/nuclei-templates/2017/CVE-2017-18507-0afdcc5a66b8604c315ccd15a101d49e.yaml index 5a395fff65..feffce7bce 100644 --- a/nuclei-templates/2017/CVE-2017-18507-0afdcc5a66b8604c315ccd15a101d49e.yaml +++ b/nuclei-templates/2017/CVE-2017-18507-0afdcc5a66b8604c315ccd15a101d49e.yaml @@ -4,7 +4,7 @@ info: name: > WP Live Chat Support <= 7.1.04 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-live-chat-support plugin before 7.1.05 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-live-chat-support/" google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" shodan-query: 'vuln:CVE-2017-18507' - tags: cve,wordpress,wp-plugin,wp-live-chat-support,medium + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18508-e810e3355fe67bdcfcad0632d29d1e56.yaml b/nuclei-templates/2017/CVE-2017-18508-e810e3355fe67bdcfcad0632d29d1e56.yaml index 395942cd15..4ccfdf4541 100644 --- a/nuclei-templates/2017/CVE-2017-18508-e810e3355fe67bdcfcad0632d29d1e56.yaml +++ b/nuclei-templates/2017/CVE-2017-18508-e810e3355fe67bdcfcad0632d29d1e56.yaml @@ -4,7 +4,7 @@ info: name: > WP Live Chat Support <= 7.1.02 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-live-chat-support plugin before 7.1.03 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-live-chat-support/" google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" shodan-query: 'vuln:CVE-2017-18508' - tags: cve,wordpress,wp-plugin,wp-live-chat-support,medium + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18510-aea09105f0f61d6ceb820ac11ed09e51.yaml b/nuclei-templates/2017/CVE-2017-18510-aea09105f0f61d6ceb820ac11ed09e51.yaml index cc381ed895..751c45289d 100644 --- a/nuclei-templates/2017/CVE-2017-18510-aea09105f0f61d6ceb820ac11ed09e51.yaml +++ b/nuclei-templates/2017/CVE-2017-18510-aea09105f0f61d6ceb820ac11ed09e51.yaml @@ -4,7 +4,7 @@ info: name: > Custom Sidebars <= 3.0.9 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The custom-sidebars plugin before 3.1.0 for WordPress has CSRF related to set location, import actions, and export actions. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/custom-sidebars/" google-query: inurl:"/wp-content/plugins/custom-sidebars/" shodan-query: 'vuln:CVE-2017-18510' - tags: cve,wordpress,wp-plugin,custom-sidebars,high + tags: cve,wordpress,wp-plugin,custom-sidebars,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18511-e7cf3375d8a38efd1be42356dbb74de4.yaml b/nuclei-templates/2017/CVE-2017-18511-e7cf3375d8a38efd1be42356dbb74de4.yaml index 76ef3a45ea..25eb47f0cd 100644 --- a/nuclei-templates/2017/CVE-2017-18511-e7cf3375d8a38efd1be42356dbb74de4.yaml +++ b/nuclei-templates/2017/CVE-2017-18511-e7cf3375d8a38efd1be42356dbb74de4.yaml @@ -4,7 +4,7 @@ info: name: > Custom Sidebars <= 3.0.8 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The custom-sidebars plugin before 3.0.8.1 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/custom-sidebars/" google-query: inurl:"/wp-content/plugins/custom-sidebars/" shodan-query: 'vuln:CVE-2017-18511' - tags: cve,wordpress,wp-plugin,custom-sidebars,high + tags: cve,wordpress,wp-plugin,custom-sidebars,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18512-62fd42906a2acfa6303c130d21470bd3.yaml b/nuclei-templates/2017/CVE-2017-18512-62fd42906a2acfa6303c130d21470bd3.yaml index 66565eeec6..4b39cecb9d 100644 --- a/nuclei-templates/2017/CVE-2017-18512-62fd42906a2acfa6303c130d21470bd3.yaml +++ b/nuclei-templates/2017/CVE-2017-18512-62fd42906a2acfa6303c130d21470bd3.yaml @@ -4,7 +4,7 @@ info: name: > Newsletter by Supsystic < 1.1.8 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The newsletter-by-supsystic plugin before 1.1.8 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/newsletter-by-supsystic/" google-query: inurl:"/wp-content/plugins/newsletter-by-supsystic/" shodan-query: 'vuln:CVE-2017-18512' - tags: cve,wordpress,wp-plugin,newsletter-by-supsystic,high + tags: cve,wordpress,wp-plugin,newsletter-by-supsystic,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18513-05079d9697e3f59f6cb3b3fffd76d6cd.yaml b/nuclei-templates/2017/CVE-2017-18513-05079d9697e3f59f6cb3b3fffd76d6cd.yaml index 92c4861d1c..8b0eee7bc3 100644 --- a/nuclei-templates/2017/CVE-2017-18513-05079d9697e3f59f6cb3b3fffd76d6cd.yaml +++ b/nuclei-templates/2017/CVE-2017-18513-05079d9697e3f59f6cb3b3fffd76d6cd.yaml @@ -4,7 +4,7 @@ info: name: > Responsive Menu <= 3.1.3 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The responsive-menu plugin before 3.1.4 for WordPress has no CSRF protection mechanism for the admin interface. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/responsive-menu/" google-query: inurl:"/wp-content/plugins/responsive-menu/" shodan-query: 'vuln:CVE-2017-18513' - tags: cve,wordpress,wp-plugin,responsive-menu,high + tags: cve,wordpress,wp-plugin,responsive-menu,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18515-4533ca9d47b3b4f7b077cc893cacad61.yaml b/nuclei-templates/2017/CVE-2017-18515-4533ca9d47b3b4f7b077cc893cacad61.yaml index ef63da1d23..14268c6533 100644 --- a/nuclei-templates/2017/CVE-2017-18515-4533ca9d47b3b4f7b077cc893cacad61.yaml +++ b/nuclei-templates/2017/CVE-2017-18515-4533ca9d47b3b4f7b077cc893cacad61.yaml @@ -4,7 +4,7 @@ info: name: > WP Statistics <= 12.0.7 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > The wp-statistics plugin before 12.0.8 for WordPress has SQL injection. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-statistics/" google-query: inurl:"/wp-content/plugins/wp-statistics/" shodan-query: 'vuln:CVE-2017-18515' - tags: cve,wordpress,wp-plugin,wp-statistics,high + tags: cve,wordpress,wp-plugin,wp-statistics,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18516-b2f000587e20cf237a45ef2d6036a9a0.yaml b/nuclei-templates/2017/CVE-2017-18516-b2f000587e20cf237a45ef2d6036a9a0.yaml index 8c4aed3192..6aa55098a4 100644 --- a/nuclei-templates/2017/CVE-2017-18516-b2f000587e20cf237a45ef2d6036a9a0.yaml +++ b/nuclei-templates/2017/CVE-2017-18516-b2f000587e20cf237a45ef2d6036a9a0.yaml @@ -4,7 +4,7 @@ info: name: > BestWebSoft's LinkedIn < 1.0.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The BestWebSoft's LinkedIn plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 1.0.4 due to insufficient input sanitization and output escaping on the 'category' parameter. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute in a victim's browser granted they can trick a victim into performing an action, such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bws-linkedin/" google-query: inurl:"/wp-content/plugins/bws-linkedin/" shodan-query: 'vuln:CVE-2017-18516' - tags: cve,wordpress,wp-plugin,bws-linkedin,medium + tags: cve,wordpress,wp-plugin,bws-linkedin,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18518-6356cf8af8f87c1115ab1b364de5897a.yaml b/nuclei-templates/2017/CVE-2017-18518-6356cf8af8f87c1115ab1b364de5897a.yaml index a2fe41af74..a6f6b1c8b0 100644 --- a/nuclei-templates/2017/CVE-2017-18518-6356cf8af8f87c1115ab1b364de5897a.yaml +++ b/nuclei-templates/2017/CVE-2017-18518-6356cf8af8f87c1115ab1b364de5897a.yaml @@ -4,7 +4,7 @@ info: name: > SMTP by BestWebSoft <= 1.0.9 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The SMTP by BestWebSoft plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 1.0.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bws-smtp/" google-query: inurl:"/wp-content/plugins/bws-smtp/" shodan-query: 'vuln:CVE-2017-18518' - tags: cve,wordpress,wp-plugin,bws-smtp,medium + tags: cve,wordpress,wp-plugin,bws-smtp,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18519-f9650549fbf42fb03bc206714accabe1.yaml b/nuclei-templates/2017/CVE-2017-18519-f9650549fbf42fb03bc206714accabe1.yaml index 6b2cb8801e..857da74ed2 100644 --- a/nuclei-templates/2017/CVE-2017-18519-f9650549fbf42fb03bc206714accabe1.yaml +++ b/nuclei-templates/2017/CVE-2017-18519-f9650549fbf42fb03bc206714accabe1.yaml @@ -4,7 +4,7 @@ info: name: > WP Customer Area <= 7.4.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The customer-area plugin before 7.4.3 for WordPress has XSS via admin pages. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/customer-area/" google-query: inurl:"/wp-content/plugins/customer-area/" shodan-query: 'vuln:CVE-2017-18519' - tags: cve,wordpress,wp-plugin,customer-area,medium + tags: cve,wordpress,wp-plugin,customer-area,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18520-2e7b0b07966525201b04f4b815659d00.yaml b/nuclei-templates/2017/CVE-2017-18520-2e7b0b07966525201b04f4b815659d00.yaml index 88b499df97..374db76b69 100644 --- a/nuclei-templates/2017/CVE-2017-18520-2e7b0b07966525201b04f4b815659d00.yaml +++ b/nuclei-templates/2017/CVE-2017-18520-2e7b0b07966525201b04f4b815659d00.yaml @@ -4,7 +4,7 @@ info: name: > Democracy Poll < 5.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The democracy-poll plugin before 5.4 for WordPress has XSS via update_l10n in admin/class.DemAdminInit.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/democracy-poll/" google-query: inurl:"/wp-content/plugins/democracy-poll/" shodan-query: 'vuln:CVE-2017-18520' - tags: cve,wordpress,wp-plugin,democracy-poll,medium + tags: cve,wordpress,wp-plugin,democracy-poll,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18521-a76e6fad4bf5d5ba93f81a78338ef54e.yaml b/nuclei-templates/2017/CVE-2017-18521-a76e6fad4bf5d5ba93f81a78338ef54e.yaml index 0a9b9861c2..61a8d8fd32 100644 --- a/nuclei-templates/2017/CVE-2017-18521-a76e6fad4bf5d5ba93f81a78338ef54e.yaml +++ b/nuclei-templates/2017/CVE-2017-18521-a76e6fad4bf5d5ba93f81a78338ef54e.yaml @@ -4,7 +4,7 @@ info: name: > Democracy Poll <= 5.3.6 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The democracy-poll plugin before 5.4 for WordPress has CSRF via wp-admin/options-general.php?page=democracy-poll&subpage=l10n. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/democracy-poll/" google-query: inurl:"/wp-content/plugins/democracy-poll/" shodan-query: 'vuln:CVE-2017-18521' - tags: cve,wordpress,wp-plugin,democracy-poll,high + tags: cve,wordpress,wp-plugin,democracy-poll,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18522-af90005e3634d51c613c584f0861c0a2.yaml b/nuclei-templates/2017/CVE-2017-18522-af90005e3634d51c613c584f0861c0a2.yaml index 7b38029371..a6312c9721 100644 --- a/nuclei-templates/2017/CVE-2017-18522-af90005e3634d51c613c584f0861c0a2.yaml +++ b/nuclei-templates/2017/CVE-2017-18522-af90005e3634d51c613c584f0861c0a2.yaml @@ -4,7 +4,7 @@ info: name: > EELV Newsletter < 4.6.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The eelv-newsletter plugin before 4.6.1 for WordPress has XSS in the address book. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/eelv-newsletter/" google-query: inurl:"/wp-content/plugins/eelv-newsletter/" shodan-query: 'vuln:CVE-2017-18522' - tags: cve,wordpress,wp-plugin,eelv-newsletter,medium + tags: cve,wordpress,wp-plugin,eelv-newsletter,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18523-77b95b2fd3fc9982f02a243980235615.yaml b/nuclei-templates/2017/CVE-2017-18523-77b95b2fd3fc9982f02a243980235615.yaml index 904e56f240..c39a646de2 100644 --- a/nuclei-templates/2017/CVE-2017-18523-77b95b2fd3fc9982f02a243980235615.yaml +++ b/nuclei-templates/2017/CVE-2017-18523-77b95b2fd3fc9982f02a243980235615.yaml @@ -4,7 +4,7 @@ info: name: > EELV Newsletter <= 4.6.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The EELV Newsletter plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.6.0. This is due to missing or incorrect nonce validation in the 'eelv-newsletter/trunk/lettreinfo.php' file. This makes it possible for unauthenticated attackers to gain otherwise restricted access to administrative actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/eelv-newsletter/" google-query: inurl:"/wp-content/plugins/eelv-newsletter/" shodan-query: 'vuln:CVE-2017-18523' - tags: cve,wordpress,wp-plugin,eelv-newsletter,high + tags: cve,wordpress,wp-plugin,eelv-newsletter,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18524-924ca2bb4d17021fd01ade1e50b5f40f.yaml b/nuclei-templates/2017/CVE-2017-18524-924ca2bb4d17021fd01ade1e50b5f40f.yaml index 646fe22929..36ddbeaf61 100644 --- a/nuclei-templates/2017/CVE-2017-18524-924ca2bb4d17021fd01ade1e50b5f40f.yaml +++ b/nuclei-templates/2017/CVE-2017-18524-924ca2bb4d17021fd01ade1e50b5f40f.yaml @@ -4,7 +4,7 @@ info: name: > Football Pool < 2.6.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The football-pool plugin before 2.6.5 for WordPress has multiple XSS issues. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/football-pool/" google-query: inurl:"/wp-content/plugins/football-pool/" shodan-query: 'vuln:CVE-2017-18524' - tags: cve,wordpress,wp-plugin,football-pool,medium + tags: cve,wordpress,wp-plugin,football-pool,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18525-68c192a64ec1c6719c741f7b5a598887.yaml b/nuclei-templates/2017/CVE-2017-18525-68c192a64ec1c6719c741f7b5a598887.yaml index e679314d0d..20f7da5b99 100644 --- a/nuclei-templates/2017/CVE-2017-18525-68c192a64ec1c6719c741f7b5a598887.yaml +++ b/nuclei-templates/2017/CVE-2017-18525-68c192a64ec1c6719c741f7b5a598887.yaml @@ -4,7 +4,7 @@ info: name: > Max Mega Menu <= 2.3.8 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The megamenu plugin before 2.4 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/megamenu/" google-query: inurl:"/wp-content/plugins/megamenu/" shodan-query: 'vuln:CVE-2017-18525' - tags: cve,wordpress,wp-plugin,megamenu,medium + tags: cve,wordpress,wp-plugin,megamenu,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18526-61f56b8a3def3b7154a28f2e5a9ff0a6.yaml b/nuclei-templates/2017/CVE-2017-18526-61f56b8a3def3b7154a28f2e5a9ff0a6.yaml index 6904837c50..078c4d2b9b 100644 --- a/nuclei-templates/2017/CVE-2017-18526-61f56b8a3def3b7154a28f2e5a9ff0a6.yaml +++ b/nuclei-templates/2017/CVE-2017-18526-61f56b8a3def3b7154a28f2e5a9ff0a6.yaml @@ -4,7 +4,7 @@ info: name: > moreAds SE <= 1.4.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The moreAds SE plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 1.4.6 due to insufficient input sanitization and output escaping on the 'i' parameter. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/moreads-se/" google-query: inurl:"/wp-content/plugins/moreads-se/" shodan-query: 'vuln:CVE-2017-18526' - tags: cve,wordpress,wp-plugin,moreads-se,medium + tags: cve,wordpress,wp-plugin,moreads-se,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18527-b86bab5c8fb0747eadd8257097e9b226.yaml b/nuclei-templates/2017/CVE-2017-18527-b86bab5c8fb0747eadd8257097e9b226.yaml index e9f1780731..cf926e5741 100644 --- a/nuclei-templates/2017/CVE-2017-18527-b86bab5c8fb0747eadd8257097e9b226.yaml +++ b/nuclei-templates/2017/CVE-2017-18527-b86bab5c8fb0747eadd8257097e9b226.yaml @@ -4,7 +4,7 @@ info: name: > Pagination by BestWebSoft <= 1.0.6 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Pagination by BestWebSoft plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pagination/" google-query: inurl:"/wp-content/plugins/pagination/" shodan-query: 'vuln:CVE-2017-18527' - tags: cve,wordpress,wp-plugin,pagination,medium + tags: cve,wordpress,wp-plugin,pagination,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18528-3c928fa432700e9d8d2c446de566746a.yaml b/nuclei-templates/2017/CVE-2017-18528-3c928fa432700e9d8d2c446de566746a.yaml index f5bb926439..32f92da4da 100644 --- a/nuclei-templates/2017/CVE-2017-18528-3c928fa432700e9d8d2c446de566746a.yaml +++ b/nuclei-templates/2017/CVE-2017-18528-3c928fa432700e9d8d2c446de566746a.yaml @@ -4,7 +4,7 @@ info: name: > Download PDF & Print by BestWebSoft – WordPress Posts and Pages PDF Generator Plugin <= 1.9.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The pdf-print plugin before 1.9.4 for WordPress has multiple XSS issues. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pdf-print/" google-query: inurl:"/wp-content/plugins/pdf-print/" shodan-query: 'vuln:CVE-2017-18528' - tags: cve,wordpress,wp-plugin,pdf-print,medium + tags: cve,wordpress,wp-plugin,pdf-print,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18531-942951937c68cc5db7a5bc776617ab05.yaml b/nuclei-templates/2017/CVE-2017-18531-942951937c68cc5db7a5bc776617ab05.yaml index a1390e607c..e403519d22 100644 --- a/nuclei-templates/2017/CVE-2017-18531-942951937c68cc5db7a5bc776617ab05.yaml +++ b/nuclei-templates/2017/CVE-2017-18531-942951937c68cc5db7a5bc776617ab05.yaml @@ -4,7 +4,7 @@ info: name: > Raygun4WP <= 1.8.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The raygun4wp plugin before 1.8.3 for WordPress has XSS in the settings, a different issue than CVE-2017-9288. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/raygun4wp/" google-query: inurl:"/wp-content/plugins/raygun4wp/" shodan-query: 'vuln:CVE-2017-18531' - tags: cve,wordpress,wp-plugin,raygun4wp,medium + tags: cve,wordpress,wp-plugin,raygun4wp,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18533-94ba05091d5c1c002f96ded27dad7e5c.yaml b/nuclei-templates/2017/CVE-2017-18533-94ba05091d5c1c002f96ded27dad7e5c.yaml index f5cbb1b105..27fc18aa09 100644 --- a/nuclei-templates/2017/CVE-2017-18533-94ba05091d5c1c002f96ded27dad7e5c.yaml +++ b/nuclei-templates/2017/CVE-2017-18533-94ba05091d5c1c002f96ded27dad7e5c.yaml @@ -4,7 +4,7 @@ info: name: > Rimons Twitter Widget <= 1.2.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Rimons Twitter Widget plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 1.2.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/rimons-twitter-widget/" google-query: inurl:"/wp-content/plugins/rimons-twitter-widget/" shodan-query: 'vuln:CVE-2017-18533' - tags: cve,wordpress,wp-plugin,rimons-twitter-widget,medium + tags: cve,wordpress,wp-plugin,rimons-twitter-widget,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18535-43890f1f23768c00ae2a757d58110ef2.yaml b/nuclei-templates/2017/CVE-2017-18535-43890f1f23768c00ae2a757d58110ef2.yaml index 54686f287c..5ac7b26e17 100644 --- a/nuclei-templates/2017/CVE-2017-18535-43890f1f23768c00ae2a757d58110ef2.yaml +++ b/nuclei-templates/2017/CVE-2017-18535-43890f1f23768c00ae2a757d58110ef2.yaml @@ -4,7 +4,7 @@ info: name: > SmokeSignal <= 1.2.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The smokesignal plugin before 1.2.7 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/smokesignal/" google-query: inurl:"/wp-content/plugins/smokesignal/" shodan-query: 'vuln:CVE-2017-18535' - tags: cve,wordpress,wp-plugin,smokesignal,medium + tags: cve,wordpress,wp-plugin,smokesignal,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18536-bdfa460006d70b85bf4366e301016193.yaml b/nuclei-templates/2017/CVE-2017-18536-bdfa460006d70b85bf4366e301016193.yaml index 2dd4c5dce9..427d1d4a8e 100644 --- a/nuclei-templates/2017/CVE-2017-18536-bdfa460006d70b85bf4366e301016193.yaml +++ b/nuclei-templates/2017/CVE-2017-18536-bdfa460006d70b85bf4366e301016193.yaml @@ -4,7 +4,7 @@ info: name: > Stop User Enumeration <= 1.3.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Stop User Enumeration plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 1.3.7 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/stop-user-enumeration/" google-query: inurl:"/wp-content/plugins/stop-user-enumeration/" shodan-query: 'vuln:CVE-2017-18536' - tags: cve,wordpress,wp-plugin,stop-user-enumeration,medium + tags: cve,wordpress,wp-plugin,stop-user-enumeration,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18538-09a7bcc8ea30f2211fb747659d8fc0b2.yaml b/nuclei-templates/2017/CVE-2017-18538-09a7bcc8ea30f2211fb747659d8fc0b2.yaml index 21282f2808..9293f54bf4 100644 --- a/nuclei-templates/2017/CVE-2017-18538-09a7bcc8ea30f2211fb747659d8fc0b2.yaml +++ b/nuclei-templates/2017/CVE-2017-18538-09a7bcc8ea30f2211fb747659d8fc0b2.yaml @@ -4,7 +4,7 @@ info: name: > WebLibrarian < 3.4.8.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The weblibrarian plugin before 3.4.8.5 for WordPress has XSS via front-end short codes. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/weblibrarian/" google-query: inurl:"/wp-content/plugins/weblibrarian/" shodan-query: 'vuln:CVE-2017-18538' - tags: cve,wordpress,wp-plugin,weblibrarian,medium + tags: cve,wordpress,wp-plugin,weblibrarian,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18539-078737c487b7cb7dd59dfa47479456c5.yaml b/nuclei-templates/2017/CVE-2017-18539-078737c487b7cb7dd59dfa47479456c5.yaml index ab3478be83..745dd3d178 100644 --- a/nuclei-templates/2017/CVE-2017-18539-078737c487b7cb7dd59dfa47479456c5.yaml +++ b/nuclei-templates/2017/CVE-2017-18539-078737c487b7cb7dd59dfa47479456c5.yaml @@ -4,7 +4,7 @@ info: name: > WebLibrarian < 3.4.8.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The weblibrarian plugin before 3.4.8.6 for WordPress has XSS via front-end short codes. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/weblibrarian/" google-query: inurl:"/wp-content/plugins/weblibrarian/" shodan-query: 'vuln:CVE-2017-18539' - tags: cve,wordpress,wp-plugin,weblibrarian,medium + tags: cve,wordpress,wp-plugin,weblibrarian,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18540-721a4bb5a70d51824521f6e59c15ccd0.yaml b/nuclei-templates/2017/CVE-2017-18540-721a4bb5a70d51824521f6e59c15ccd0.yaml index 93ea18b212..4e5603cb52 100644 --- a/nuclei-templates/2017/CVE-2017-18540-721a4bb5a70d51824521f6e59c15ccd0.yaml +++ b/nuclei-templates/2017/CVE-2017-18540-721a4bb5a70d51824521f6e59c15ccd0.yaml @@ -4,7 +4,7 @@ info: name: > WebLibrarian < 3.4.8.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The weblibrarian plugin before 3.4.8.7 for WordPress has XSS via front-end short codes. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/weblibrarian/" google-query: inurl:"/wp-content/plugins/weblibrarian/" shodan-query: 'vuln:CVE-2017-18540' - tags: cve,wordpress,wp-plugin,weblibrarian,medium + tags: cve,wordpress,wp-plugin,weblibrarian,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18541-0d6d2e1e75a3d7c24aa16b9420abf358.yaml b/nuclei-templates/2017/CVE-2017-18541-0d6d2e1e75a3d7c24aa16b9420abf358.yaml index 6097072a9b..96052fa217 100644 --- a/nuclei-templates/2017/CVE-2017-18541-0d6d2e1e75a3d7c24aa16b9420abf358.yaml +++ b/nuclei-templates/2017/CVE-2017-18541-0d6d2e1e75a3d7c24aa16b9420abf358.yaml @@ -4,7 +4,7 @@ info: name: > XO Security < 1.5.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The xo-security plugin before 1.5.3 for WordPress has XSS via 'password' parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/xo-security/" google-query: inurl:"/wp-content/plugins/xo-security/" shodan-query: 'vuln:CVE-2017-18541' - tags: cve,wordpress,wp-plugin,xo-security,medium + tags: cve,wordpress,wp-plugin,xo-security,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18542-83e7004306bfbb58dbc0b94ba733c14a.yaml b/nuclei-templates/2017/CVE-2017-18542-83e7004306bfbb58dbc0b94ba733c14a.yaml index 3baed514fb..405438162d 100644 --- a/nuclei-templates/2017/CVE-2017-18542-83e7004306bfbb58dbc0b94ba733c14a.yaml +++ b/nuclei-templates/2017/CVE-2017-18542-83e7004306bfbb58dbc0b94ba733c14a.yaml @@ -4,7 +4,7 @@ info: name: > Help Center by BestWebSoft <= 1.0.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Help Center by BestWebSoft plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 1.0.4 due to insufficient input sanitization and output escaping on the 'category' parameter. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute in a victim's browser granted they can trick a victim into performing an action, such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/zendesk-help-center/" google-query: inurl:"/wp-content/plugins/zendesk-help-center/" shodan-query: 'vuln:CVE-2017-18542' - tags: cve,wordpress,wp-plugin,zendesk-help-center,medium + tags: cve,wordpress,wp-plugin,zendesk-help-center,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18544-378de5a4c8a761e6f865e9b293282366.yaml b/nuclei-templates/2017/CVE-2017-18544-378de5a4c8a761e6f865e9b293282366.yaml index 5a33837980..089581be2d 100644 --- a/nuclei-templates/2017/CVE-2017-18544-378de5a4c8a761e6f865e9b293282366.yaml +++ b/nuclei-templates/2017/CVE-2017-18544-378de5a4c8a761e6f865e9b293282366.yaml @@ -4,7 +4,7 @@ info: name: > Invite Anyone < 1.3.16 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Invite Anyone plugin before 1.3.16 for WordPress has admin-panel CSRF. The plugin’s setting pages had a vulnerability found in the nonce, which is used to prevent CSRF, but when the settings are saved there was no check to a validate if a nonce was included. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/invite-anyone/" google-query: inurl:"/wp-content/plugins/invite-anyone/" shodan-query: 'vuln:CVE-2017-18544' - tags: cve,wordpress,wp-plugin,invite-anyone,high + tags: cve,wordpress,wp-plugin,invite-anyone,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18546-a6cb60a315c6c7a94894e2123d4f4da7.yaml b/nuclei-templates/2017/CVE-2017-18546-a6cb60a315c6c7a94894e2123d4f4da7.yaml index 31edaedaa2..0f454adbd4 100644 --- a/nuclei-templates/2017/CVE-2017-18546-a6cb60a315c6c7a94894e2123d4f4da7.yaml +++ b/nuclei-templates/2017/CVE-2017-18546-a6cb60a315c6c7a94894e2123d4f4da7.yaml @@ -4,7 +4,7 @@ info: name: > Jayj Quicktag < 1.3.2 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The jayj-quicktag plugin before 1.3.2 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/jayj-quicktag/" google-query: inurl:"/wp-content/plugins/jayj-quicktag/" shodan-query: 'vuln:CVE-2017-18546' - tags: cve,wordpress,wp-plugin,jayj-quicktag,high + tags: cve,wordpress,wp-plugin,jayj-quicktag,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18547-a591950f40f9d0373366c6581aa5c23f.yaml b/nuclei-templates/2017/CVE-2017-18547-a591950f40f9d0373366c6581aa5c23f.yaml index fde8f07a5e..666c38d9ab 100644 --- a/nuclei-templates/2017/CVE-2017-18547-a591950f40f9d0373366c6581aa5c23f.yaml +++ b/nuclei-templates/2017/CVE-2017-18547-a591950f40f9d0373366c6581aa5c23f.yaml @@ -4,7 +4,7 @@ info: name: > Nelio AB Testing < 4.6.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The nelio-ab-testing plugin before 4.6.4 for WordPress has CSRF in experiment forms. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nelio-ab-testing/" google-query: inurl:"/wp-content/plugins/nelio-ab-testing/" shodan-query: 'vuln:CVE-2017-18547' - tags: cve,wordpress,wp-plugin,nelio-ab-testing,high + tags: cve,wordpress,wp-plugin,nelio-ab-testing,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18554-8f9bc8ffd93a472c3d732de50d85129c.yaml b/nuclei-templates/2017/CVE-2017-18554-8f9bc8ffd93a472c3d732de50d85129c.yaml index 0a320497bb..27dd81a206 100644 --- a/nuclei-templates/2017/CVE-2017-18554-8f9bc8ffd93a472c3d732de50d85129c.yaml +++ b/nuclei-templates/2017/CVE-2017-18554-8f9bc8ffd93a472c3d732de50d85129c.yaml @@ -4,7 +4,7 @@ info: name: > Analytics Tracker <= 1.1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Analytics Tracker plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/analytics-tracker/" google-query: inurl:"/wp-content/plugins/analytics-tracker/" shodan-query: 'vuln:CVE-2017-18554' - tags: cve,wordpress,wp-plugin,analytics-tracker,medium + tags: cve,wordpress,wp-plugin,analytics-tracker,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18556-1758588699ac13a0da770bd7cd456b77.yaml b/nuclei-templates/2017/CVE-2017-18556-1758588699ac13a0da770bd7cd456b77.yaml index cf4c8e94d7..1328faba39 100644 --- a/nuclei-templates/2017/CVE-2017-18556-1758588699ac13a0da770bd7cd456b77.yaml +++ b/nuclei-templates/2017/CVE-2017-18556-1758588699ac13a0da770bd7cd456b77.yaml @@ -4,7 +4,7 @@ info: name: > Analytics <= 1.7.0 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Analytics plugin is vulnerable to multiple Cross-Site Scripting vulnerabilities in versions up to, and including, 1.7.0 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bws-google-analytics/" google-query: inurl:"/wp-content/plugins/bws-google-analytics/" shodan-query: 'vuln:CVE-2017-18556' - tags: cve,wordpress,wp-plugin,bws-google-analytics,medium + tags: cve,wordpress,wp-plugin,bws-google-analytics,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18559-6e2fc253c488c9fb6b9867ac9b52ef35.yaml b/nuclei-templates/2017/CVE-2017-18559-6e2fc253c488c9fb6b9867ac9b52ef35.yaml index 5e83c1d025..dd885b6261 100644 --- a/nuclei-templates/2017/CVE-2017-18559-6e2fc253c488c9fb6b9867ac9b52ef35.yaml +++ b/nuclei-templates/2017/CVE-2017-18559-6e2fc253c488c9fb6b9867ac9b52ef35.yaml @@ -4,7 +4,7 @@ info: name: > cformsII <= 14.13.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The cformsII plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 14.13.2 due to insufficient input sanitization and output escaping on the 'switchform', 'pickform', and 'noSub' parameters. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cforms2/" google-query: inurl:"/wp-content/plugins/cforms2/" shodan-query: 'vuln:CVE-2017-18559' - tags: cve,wordpress,wp-plugin,cforms2,medium + tags: cve,wordpress,wp-plugin,cforms2,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18561-ce946f2b4359bb7fac48391b993074ae.yaml b/nuclei-templates/2017/CVE-2017-18561-ce946f2b4359bb7fac48391b993074ae.yaml index a8f1c36ef8..5d2243add7 100644 --- a/nuclei-templates/2017/CVE-2017-18561-ce946f2b4359bb7fac48391b993074ae.yaml +++ b/nuclei-templates/2017/CVE-2017-18561-ce946f2b4359bb7fac48391b993074ae.yaml @@ -4,7 +4,7 @@ info: name: > Embed Images in Comments < 0.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The embed-comment-images plugin before 0.6 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/embed-comment-images/" google-query: inurl:"/wp-content/plugins/embed-comment-images/" shodan-query: 'vuln:CVE-2017-18561' - tags: cve,wordpress,wp-plugin,embed-comment-images,medium + tags: cve,wordpress,wp-plugin,embed-comment-images,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18563-9a3fa62818d09a4c2a4693cadbb72035.yaml b/nuclei-templates/2017/CVE-2017-18563-9a3fa62818d09a4c2a4693cadbb72035.yaml index e718a99f39..20655630f8 100644 --- a/nuclei-templates/2017/CVE-2017-18563-9a3fa62818d09a4c2a4693cadbb72035.yaml +++ b/nuclei-templates/2017/CVE-2017-18563-9a3fa62818d09a4c2a4693cadbb72035.yaml @@ -4,7 +4,7 @@ info: name: > RSVP and Event Management Plugin <= 2.3.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The rsvp plugin before 2.3.8 for WordPress has persistent XSS via the note field on the attendee-list screen. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/rsvp/" google-query: inurl:"/wp-content/plugins/rsvp/" shodan-query: 'vuln:CVE-2017-18563' - tags: cve,wordpress,wp-plugin,rsvp,medium + tags: cve,wordpress,wp-plugin,rsvp,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18566-19953c61fa61f206c9ea957d11e2d617.yaml b/nuclei-templates/2017/CVE-2017-18566-19953c61fa61f206c9ea957d11e2d617.yaml index 18ceae6c05..6874f46a08 100644 --- a/nuclei-templates/2017/CVE-2017-18566-19953c61fa61f206c9ea957d11e2d617.yaml +++ b/nuclei-templates/2017/CVE-2017-18566-19953c61fa61f206c9ea957d11e2d617.yaml @@ -4,7 +4,7 @@ info: name: > User Role <= 1.5.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The User Role plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 1.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/user-role/" google-query: inurl:"/wp-content/plugins/user-role/" shodan-query: 'vuln:CVE-2017-18566' - tags: cve,wordpress,wp-plugin,user-role,medium + tags: cve,wordpress,wp-plugin,user-role,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18567-655d94e53e4a588a8f5f35013abd45f6.yaml b/nuclei-templates/2017/CVE-2017-18567-655d94e53e4a588a8f5f35013abd45f6.yaml index c2ee865091..bf0dbe1c5b 100644 --- a/nuclei-templates/2017/CVE-2017-18567-655d94e53e4a588a8f5f35013abd45f6.yaml +++ b/nuclei-templates/2017/CVE-2017-18567-655d94e53e4a588a8f5f35013abd45f6.yaml @@ -4,7 +4,7 @@ info: name: > Import any XML or CSV File to WordPress <= 3.4.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-all-import plugin before 3.4.6 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-all-import/" google-query: inurl:"/wp-content/plugins/wp-all-import/" shodan-query: 'vuln:CVE-2017-18567' - tags: cve,wordpress,wp-plugin,wp-all-import,medium + tags: cve,wordpress,wp-plugin,wp-all-import,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18570-84b6699e5f738c5aa2a22a553abe9531.yaml b/nuclei-templates/2017/CVE-2017-18570-84b6699e5f738c5aa2a22a553abe9531.yaml index 326ac9735b..d0b229a2c9 100644 --- a/nuclei-templates/2017/CVE-2017-18570-84b6699e5f738c5aa2a22a553abe9531.yaml +++ b/nuclei-templates/2017/CVE-2017-18570-84b6699e5f738c5aa2a22a553abe9531.yaml @@ -4,7 +4,7 @@ info: name: > cformsII <= 14.12.3 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > The cformsII plugin for WordPress is vulnerable to generic SQL Injection via Delete Entries or Download Entries in versions up to, and including, 14.12.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for highly-privileged attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cforms2/" google-query: inurl:"/wp-content/plugins/cforms2/" shodan-query: 'vuln:CVE-2017-18570' - tags: cve,wordpress,wp-plugin,cforms2,high + tags: cve,wordpress,wp-plugin,cforms2,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18576-a1a48fe23ddfed810a2068245669c30f.yaml b/nuclei-templates/2017/CVE-2017-18576-a1a48fe23ddfed810a2068245669c30f.yaml index 072f77bd72..abd9d03bee 100644 --- a/nuclei-templates/2017/CVE-2017-18576-a1a48fe23ddfed810a2068245669c30f.yaml +++ b/nuclei-templates/2017/CVE-2017-18576-a1a48fe23ddfed810a2068245669c30f.yaml @@ -4,7 +4,7 @@ info: name: > Event Notifier <= 1.2.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The event-notifier plugin before 1.2.1 for WordPress has XSS via the loading animation. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/event-notifier/" google-query: inurl:"/wp-content/plugins/event-notifier/" shodan-query: 'vuln:CVE-2017-18576' - tags: cve,wordpress,wp-plugin,event-notifier,medium + tags: cve,wordpress,wp-plugin,event-notifier,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18577-324bc23c2f374afaaf9c80c2964d5db4.yaml b/nuclei-templates/2017/CVE-2017-18577-324bc23c2f374afaaf9c80c2964d5db4.yaml index 0a2c9e664b..c293cc97ce 100644 --- a/nuclei-templates/2017/CVE-2017-18577-324bc23c2f374afaaf9c80c2964d5db4.yaml +++ b/nuclei-templates/2017/CVE-2017-18577-324bc23c2f374afaaf9c80c2964d5db4.yaml @@ -4,7 +4,7 @@ info: name: > Mailchimp For WP <= 4.1.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The mailchimp-for-wp plugin before 4.1.8 for WordPress has XSS via the return value of add_query_arg. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mailchimp-for-wp/" google-query: inurl:"/wp-content/plugins/mailchimp-for-wp/" shodan-query: 'vuln:CVE-2017-18577' - tags: cve,wordpress,wp-plugin,mailchimp-for-wp,medium + tags: cve,wordpress,wp-plugin,mailchimp-for-wp,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18578-10ee5b6870d72574cd2ceacdf76db39e.yaml b/nuclei-templates/2017/CVE-2017-18578-10ee5b6870d72574cd2ceacdf76db39e.yaml index ca27e8378e..e46734930e 100644 --- a/nuclei-templates/2017/CVE-2017-18578-10ee5b6870d72574cd2ceacdf76db39e.yaml +++ b/nuclei-templates/2017/CVE-2017-18578-10ee5b6870d72574cd2ceacdf76db39e.yaml @@ -4,7 +4,7 @@ info: name: > Crafty Social Buttons < 1.5.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The crafty-social-buttons plugin before 1.5.8 for WordPress has XSS via several parameters. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/crafty-social-buttons/" google-query: inurl:"/wp-content/plugins/crafty-social-buttons/" shodan-query: 'vuln:CVE-2017-18578' - tags: cve,wordpress,wp-plugin,crafty-social-buttons,medium + tags: cve,wordpress,wp-plugin,crafty-social-buttons,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18579-490cf4e76b6c86f1bd637de80c3840f0.yaml b/nuclei-templates/2017/CVE-2017-18579-490cf4e76b6c86f1bd637de80c3840f0.yaml index 5de24da59e..46d14e23df 100644 --- a/nuclei-templates/2017/CVE-2017-18579-490cf4e76b6c86f1bd637de80c3840f0.yaml +++ b/nuclei-templates/2017/CVE-2017-18579-490cf4e76b6c86f1bd637de80c3840f0.yaml @@ -4,7 +4,7 @@ info: name: > Corner Ad < 1.0.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The corner-ad plugin before 1.0.8 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/corner-ad/" google-query: inurl:"/wp-content/plugins/corner-ad/" shodan-query: 'vuln:CVE-2017-18579' - tags: cve,wordpress,wp-plugin,corner-ad,medium + tags: cve,wordpress,wp-plugin,corner-ad,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18580-235127c1445e6eee4f6de6fb13cf776e.yaml b/nuclei-templates/2017/CVE-2017-18580-235127c1445e6eee4f6de6fb13cf776e.yaml index fb4bf1f859..02dc5af471 100644 --- a/nuclei-templates/2017/CVE-2017-18580-235127c1445e6eee4f6de6fb13cf776e.yaml +++ b/nuclei-templates/2017/CVE-2017-18580-235127c1445e6eee4f6de6fb13cf776e.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Shortcodes Plugin — Shortcodes Ultimate <= 5.0.0 - Authenticated Remote Code Execution author: topscoder - severity: high + severity: low description: > The shortcodes-ultimate plugin before 5.0.1 for WordPress has remote code execution via a filter in a meta, post, or user shortcode. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/shortcodes-ultimate/" google-query: inurl:"/wp-content/plugins/shortcodes-ultimate/" shodan-query: 'vuln:CVE-2017-18580' - tags: cve,wordpress,wp-plugin,shortcodes-ultimate,high + tags: cve,wordpress,wp-plugin,shortcodes-ultimate,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18582-f2aba70ce8a44005876e1620c7a6d111.yaml b/nuclei-templates/2017/CVE-2017-18582-f2aba70ce8a44005876e1620c7a6d111.yaml index 05efaa585a..517a3b657a 100644 --- a/nuclei-templates/2017/CVE-2017-18582-f2aba70ce8a44005876e1620c7a6d111.yaml +++ b/nuclei-templates/2017/CVE-2017-18582-f2aba70ce8a44005876e1620c7a6d111.yaml @@ -4,7 +4,7 @@ info: name: > Time Sheets < 1.5.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The time-sheets plugin before 1.5.2 for WordPress has multiple XSS issues. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/time-sheets/" google-query: inurl:"/wp-content/plugins/time-sheets/" shodan-query: 'vuln:CVE-2017-18582' - tags: cve,wordpress,wp-plugin,time-sheets,medium + tags: cve,wordpress,wp-plugin,time-sheets,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18585-4146040381375fe3470534dfb0d8c368.yaml b/nuclei-templates/2017/CVE-2017-18585-4146040381375fe3470534dfb0d8c368.yaml index 9e7fe7c50b..00997cd830 100644 --- a/nuclei-templates/2017/CVE-2017-18585-4146040381375fe3470534dfb0d8c368.yaml +++ b/nuclei-templates/2017/CVE-2017-18585-4146040381375fe3470534dfb0d8c368.yaml @@ -4,7 +4,7 @@ info: name: > Posts in Page <= 1.2.4 - Authenticated Directory Traversal leading to Local File Inclusion author: topscoder - severity: high + severity: low description: > The Posts in Page plugin for WordPress is vulnerable to Directory Traversal in versions up to, and including, 1.2.4 via the [ic_add_posts template] shortcode. This allows contributor-level attackers to read the contents of arbitrary files on the server, which can contain sensitive information. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/posts-in-page/" google-query: inurl:"/wp-content/plugins/posts-in-page/" shodan-query: 'vuln:CVE-2017-18585' - tags: cve,wordpress,wp-plugin,posts-in-page,high + tags: cve,wordpress,wp-plugin,posts-in-page,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18586-20a34e507c4fa6283c8c06e9c7d18117.yaml b/nuclei-templates/2017/CVE-2017-18586-20a34e507c4fa6283c8c06e9c7d18117.yaml index ce6ea93748..6154f9be8f 100644 --- a/nuclei-templates/2017/CVE-2017-18586-20a34e507c4fa6283c8c06e9c7d18117.yaml +++ b/nuclei-templates/2017/CVE-2017-18586-20a34e507c4fa6283c8c06e9c7d18117.yaml @@ -4,7 +4,7 @@ info: name: > Insert Pages < 3.2.4 - Authenticated Directory Traversal author: topscoder - severity: medium + severity: low description: > The Insert Pages plugin for WordPress is vulnerable to directory traversal via custom template paths in versions before 3.2.4. This allows editor-level attackers to read the contents of arbitrary files on the server, which can contain sensitive information. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/insert-pages/" google-query: inurl:"/wp-content/plugins/insert-pages/" shodan-query: 'vuln:CVE-2017-18586' - tags: cve,wordpress,wp-plugin,insert-pages,medium + tags: cve,wordpress,wp-plugin,insert-pages,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18593-c3cfc3a43625bfa414c3f27665757d46.yaml b/nuclei-templates/2017/CVE-2017-18593-c3cfc3a43625bfa414c3f27665757d46.yaml index f48ca655e9..3d7598714c 100644 --- a/nuclei-templates/2017/CVE-2017-18593-c3cfc3a43625bfa414c3f27665757d46.yaml +++ b/nuclei-templates/2017/CVE-2017-18593-c3cfc3a43625bfa414c3f27665757d46.yaml @@ -4,7 +4,7 @@ info: name: > UpdraftPlus <= 1.13.4 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The updraftplus plugin before 1.13.5 for WordPress has XSS in rare cases where an attacker controls a string logged to a log file. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/updraftplus/" google-query: inurl:"/wp-content/plugins/updraftplus/" shodan-query: 'vuln:CVE-2017-18593' - tags: cve,wordpress,wp-plugin,updraftplus,medium + tags: cve,wordpress,wp-plugin,updraftplus,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18597-8a2f1e9cb4e65657070d3644661c86c5.yaml b/nuclei-templates/2017/CVE-2017-18597-8a2f1e9cb4e65657070d3644661c86c5.yaml index 1379910645..ee384dfda7 100644 --- a/nuclei-templates/2017/CVE-2017-18597-8a2f1e9cb4e65657070d3644661c86c5.yaml +++ b/nuclei-templates/2017/CVE-2017-18597-8a2f1e9cb4e65657070d3644661c86c5.yaml @@ -4,7 +4,7 @@ info: name: > JTRT Responsive Tables < 4.1.2 - SQL Injection author: topscoder - severity: high + severity: critical description: > The JTRT Responsive Tables plugin before 4.1.2 for WordPress has SQL Injection via the admin/class-jtrt-responsive-tables-admin.php tableId parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/jtrt-responsive-tables/" google-query: inurl:"/wp-content/plugins/jtrt-responsive-tables/" shodan-query: 'vuln:CVE-2017-18597' - tags: cve,wordpress,wp-plugin,jtrt-responsive-tables,high + tags: cve,wordpress,wp-plugin,jtrt-responsive-tables,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18598-e6cabe992a07b751187d2c7299c53fb6.yaml b/nuclei-templates/2017/CVE-2017-18598-e6cabe992a07b751187d2c7299c53fb6.yaml index c64e93faf9..c25c2b948f 100644 --- a/nuclei-templates/2017/CVE-2017-18598-e6cabe992a07b751187d2c7299c53fb6.yaml +++ b/nuclei-templates/2017/CVE-2017-18598-e6cabe992a07b751187d2c7299c53fb6.yaml @@ -4,7 +4,7 @@ info: name: > Qards (Unspecified Version) - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Qards plugin through 2017-10-11 for WordPress has XSS via a remote document specified in the url parameter to html2canvasproxy.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/qards/" google-query: inurl:"/wp-content/plugins/qards/" shodan-query: 'vuln:CVE-2017-18598' - tags: cve,wordpress,wp-plugin,qards,medium + tags: cve,wordpress,wp-plugin,qards,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18600-633d0b293826c4a61b61e1d3210e0346.yaml b/nuclei-templates/2017/CVE-2017-18600-633d0b293826c4a61b61e1d3210e0346.yaml index 507606344c..a3acadab23 100644 --- a/nuclei-templates/2017/CVE-2017-18600-633d0b293826c4a61b61e1d3210e0346.yaml +++ b/nuclei-templates/2017/CVE-2017-18600-633d0b293826c4a61b61e1d3210e0346.yaml @@ -4,7 +4,7 @@ info: name: > Premium WordPress Form Builder <= 3.2.31 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The formcraft3 plugin before 3.4 for WordPress has stored XSS via the "New Form > Heading > Heading Text" field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/formcraft3/" google-query: inurl:"/wp-content/plugins/formcraft3/" shodan-query: 'vuln:CVE-2017-18600' - tags: cve,wordpress,wp-plugin,formcraft3,medium + tags: cve,wordpress,wp-plugin,formcraft3,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18601-1cb146595e5a6af092ba6cf697572ca5.yaml b/nuclei-templates/2017/CVE-2017-18601-1cb146595e5a6af092ba6cf697572ca5.yaml index aa12c97db9..d7084e8e6b 100644 --- a/nuclei-templates/2017/CVE-2017-18601-1cb146595e5a6af092ba6cf697572ca5.yaml +++ b/nuclei-templates/2017/CVE-2017-18601-1cb146595e5a6af092ba6cf697572ca5.yaml @@ -4,7 +4,7 @@ info: name: > IBPS Online Exam <= 1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The examapp plugin 1.0 for WordPress has XSS via exam input text fields. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/examapp/" google-query: inurl:"/wp-content/plugins/examapp/" shodan-query: 'vuln:CVE-2017-18601' - tags: cve,wordpress,wp-plugin,examapp,medium + tags: cve,wordpress,wp-plugin,examapp,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18602-1c6e8ef696086c4cf5cf1464c84048ce.yaml b/nuclei-templates/2017/CVE-2017-18602-1c6e8ef696086c4cf5cf1464c84048ce.yaml index c9fa1ed07a..f5fc7442c6 100644 --- a/nuclei-templates/2017/CVE-2017-18602-1c6e8ef696086c4cf5cf1464c84048ce.yaml +++ b/nuclei-templates/2017/CVE-2017-18602-1c6e8ef696086c4cf5cf1464c84048ce.yaml @@ -4,7 +4,7 @@ info: name: > IBPS Online Exam Plugin for WordPress <= 1.0 - SQL Injection author: topscoder - severity: high + severity: critical description: > The examapp plugin 1.0 for WordPress has SQL injection via the wp-admin/admin.php?page=examapp_UserResult id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/examapp/" google-query: inurl:"/wp-content/plugins/examapp/" shodan-query: 'vuln:CVE-2017-18602' - tags: cve,wordpress,wp-plugin,examapp,high + tags: cve,wordpress,wp-plugin,examapp,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18606-45a743f5d162595c13c7d51a595d52ef.yaml b/nuclei-templates/2017/CVE-2017-18606-45a743f5d162595c13c7d51a595d52ef.yaml index b373b289fa..a78ceaab15 100644 --- a/nuclei-templates/2017/CVE-2017-18606-45a743f5d162595c13c7d51a595d52ef.yaml +++ b/nuclei-templates/2017/CVE-2017-18606-45a743f5d162595c13c7d51a595d52ef.yaml @@ -4,7 +4,7 @@ info: name: > Avada <= 5.1.4 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Avada theme for WordPress is vulnerable to Stored Cross-Site Scripting via avada_portfolio_category_slug parameter saved by the save_permalink_settings() function called via 'admin_init' in versions up to 5.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/Avada/" google-query: inurl:"/wp-content/themes/Avada/" shodan-query: 'vuln:CVE-2017-18606' - tags: cve,wordpress,wp-theme,Avada,medium + tags: cve,wordpress,wp-theme,Avada,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18607-ed2bbae23b6c0e2ec39d5d24fb1592c1.yaml b/nuclei-templates/2017/CVE-2017-18607-ed2bbae23b6c0e2ec39d5d24fb1592c1.yaml index f628533fd6..c1e3615d3f 100644 --- a/nuclei-templates/2017/CVE-2017-18607-ed2bbae23b6c0e2ec39d5d24fb1592c1.yaml +++ b/nuclei-templates/2017/CVE-2017-18607-ed2bbae23b6c0e2ec39d5d24fb1592c1.yaml @@ -4,7 +4,7 @@ info: name: > Avada <= 5.1.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Avada theme for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 5.1.4. This is due to missing nonce validation on the fusion_builder_importer() function. This makes it possible for unauthenticated attackers to trigger the importer and upload arbitrary files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/Avada/" google-query: inurl:"/wp-content/themes/Avada/" shodan-query: 'vuln:CVE-2017-18607' - tags: cve,wordpress,wp-theme,Avada,high + tags: cve,wordpress,wp-theme,Avada,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18608-ad069f3a56279cbff65458936b83abde.yaml b/nuclei-templates/2017/CVE-2017-18608-ad069f3a56279cbff65458936b83abde.yaml index 56193a5f8e..0f9bbd4e2f 100644 --- a/nuclei-templates/2017/CVE-2017-18608-ad069f3a56279cbff65458936b83abde.yaml +++ b/nuclei-templates/2017/CVE-2017-18608-ad069f3a56279cbff65458936b83abde.yaml @@ -4,7 +4,7 @@ info: name: > Spot.IM Comments < 4.0.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The spotim-comments plugin before 4.0.4 for WordPress has multiple XSS issues. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/spotim-comments/" google-query: inurl:"/wp-content/plugins/spotim-comments/" shodan-query: 'vuln:CVE-2017-18608' - tags: cve,wordpress,wp-plugin,spotim-comments,medium + tags: cve,wordpress,wp-plugin,spotim-comments,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18609-b42951305c8f37d90390c15daed2c5f3.yaml b/nuclei-templates/2017/CVE-2017-18609-b42951305c8f37d90390c15daed2c5f3.yaml index eccaec7fc7..91645eeafd 100644 --- a/nuclei-templates/2017/CVE-2017-18609-b42951305c8f37d90390c15daed2c5f3.yaml +++ b/nuclei-templates/2017/CVE-2017-18609-b42951305c8f37d90390c15daed2c5f3.yaml @@ -4,7 +4,7 @@ info: name: > Magic Fields 1 <= 1.7.1 - Cross-Site Scripting via custom-write-panel-id Parameter author: topscoder - severity: medium + severity: high description: > The magic-fields plugin before 1.7.2 for WordPress has XSS via the custom-write-panel-id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/magic-fields/" google-query: inurl:"/wp-content/plugins/magic-fields/" shodan-query: 'vuln:CVE-2017-18609' - tags: cve,wordpress,wp-plugin,magic-fields,medium + tags: cve,wordpress,wp-plugin,magic-fields,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18610-83aff6544a7c919044e1d77f749ea1cb.yaml b/nuclei-templates/2017/CVE-2017-18610-83aff6544a7c919044e1d77f749ea1cb.yaml index c7c0b94990..a64a21fd42 100644 --- a/nuclei-templates/2017/CVE-2017-18610-83aff6544a7c919044e1d77f749ea1cb.yaml +++ b/nuclei-templates/2017/CVE-2017-18610-83aff6544a7c919044e1d77f749ea1cb.yaml @@ -4,7 +4,7 @@ info: name: > Magic Fields 1 <= 1.7.1 - Cross-Site Scripting via RCCWP_CreateCustomFieldPage.php custom-group-id parameter author: topscoder - severity: medium + severity: high description: > The magic-fields plugin before 1.7.2 for WordPress has XSS via the RCCWP_CreateCustomFieldPage.php custom-group-id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/magic-fields/" google-query: inurl:"/wp-content/plugins/magic-fields/" shodan-query: 'vuln:CVE-2017-18610' - tags: cve,wordpress,wp-plugin,magic-fields,medium + tags: cve,wordpress,wp-plugin,magic-fields,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18611-57123cd71067e91d2b8fed604519bb45.yaml b/nuclei-templates/2017/CVE-2017-18611-57123cd71067e91d2b8fed604519bb45.yaml index d01885a2c6..b345101b37 100644 --- a/nuclei-templates/2017/CVE-2017-18611-57123cd71067e91d2b8fed604519bb45.yaml +++ b/nuclei-templates/2017/CVE-2017-18611-57123cd71067e91d2b8fed604519bb45.yaml @@ -4,7 +4,7 @@ info: name: > Magic Fields 1 <= 1.7.1 - Cross-Site Scripting via RCCWP_CreateCustomFieldPage.php custom-field-css parameter author: topscoder - severity: medium + severity: high description: > The magic-fields plugin before 1.7.2 for WordPress has XSS via the RCCWP_CreateCustomFieldPage.php custom-field-css parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/magic-fields/" google-query: inurl:"/wp-content/plugins/magic-fields/" shodan-query: 'vuln:CVE-2017-18611' - tags: cve,wordpress,wp-plugin,magic-fields,medium + tags: cve,wordpress,wp-plugin,magic-fields,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18613-68ca9f8a242a5c678fbfe7eb11cba349.yaml b/nuclei-templates/2017/CVE-2017-18613-68ca9f8a242a5c678fbfe7eb11cba349.yaml index ddc3aeb980..3916d24b5f 100644 --- a/nuclei-templates/2017/CVE-2017-18613-68ca9f8a242a5c678fbfe7eb11cba349.yaml +++ b/nuclei-templates/2017/CVE-2017-18613-68ca9f8a242a5c678fbfe7eb11cba349.yaml @@ -4,7 +4,7 @@ info: name: > Trust Form <= 2.0.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The trust-form plugin 2.0 for WordPress has XSS via the wp-admin/admin.php?page=trust-form-edit page parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/trust-form/" google-query: inurl:"/wp-content/plugins/trust-form/" shodan-query: 'vuln:CVE-2017-18613' - tags: cve,wordpress,wp-plugin,trust-form,medium + tags: cve,wordpress,wp-plugin,trust-form,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18614-738043af82effea7b721b2ac598247ee.yaml b/nuclei-templates/2017/CVE-2017-18614-738043af82effea7b721b2ac598247ee.yaml index 740a005ac6..0dafb070d4 100644 --- a/nuclei-templates/2017/CVE-2017-18614-738043af82effea7b721b2ac598247ee.yaml +++ b/nuclei-templates/2017/CVE-2017-18614-738043af82effea7b721b2ac598247ee.yaml @@ -4,7 +4,7 @@ info: name: > Kama Click Counter <= 3.4.9 - Blind SQL Injection author: topscoder - severity: high + severity: critical description: > The kama-clic-counter plugin 3.4.9 for WordPress has SQL injection via the admin.php order parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/kama-clic-counter/" google-query: inurl:"/wp-content/plugins/kama-clic-counter/" shodan-query: 'vuln:CVE-2017-18614' - tags: cve,wordpress,wp-plugin,kama-clic-counter,high + tags: cve,wordpress,wp-plugin,kama-clic-counter,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18615-703cbb2bd8ca38850245b92d6dc648dc.yaml b/nuclei-templates/2017/CVE-2017-18615-703cbb2bd8ca38850245b92d6dc648dc.yaml index 8f3fb5f868..d848aac9c1 100644 --- a/nuclei-templates/2017/CVE-2017-18615-703cbb2bd8ca38850245b92d6dc648dc.yaml +++ b/nuclei-templates/2017/CVE-2017-18615-703cbb2bd8ca38850245b92d6dc648dc.yaml @@ -4,7 +4,7 @@ info: name: > Kama Click Counter <= 3.4.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Kama Click Counter plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 3.4.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthorized attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/kama-clic-counter/" google-query: inurl:"/wp-content/plugins/kama-clic-counter/" shodan-query: 'vuln:CVE-2017-18615' - tags: cve,wordpress,wp-plugin,kama-clic-counter,medium + tags: cve,wordpress,wp-plugin,kama-clic-counter,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-18634-f7df930f39831ca9c998366434d0f175.yaml b/nuclei-templates/2017/CVE-2017-18634-f7df930f39831ca9c998366434d0f175.yaml index 6d58ec2433..341b2b2925 100644 --- a/nuclei-templates/2017/CVE-2017-18634-f7df930f39831ca9c998366434d0f175.yaml +++ b/nuclei-templates/2017/CVE-2017-18634-f7df930f39831ca9c998366434d0f175.yaml @@ -4,7 +4,7 @@ info: name: > Newspaper - News & WooCommerce WordPress Theme < 6.7.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The newspaper theme before 6.7.2 for WordPress has script injection via td_ads[header] to admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/Newspaper/" google-query: inurl:"/wp-content/themes/Newspaper/" shodan-query: 'vuln:CVE-2017-18634' - tags: cve,wordpress,wp-theme,Newspaper,medium + tags: cve,wordpress,wp-theme,Newspaper,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-20053-362c09e706e4df3c312dbda6ffdf171c.yaml b/nuclei-templates/2017/CVE-2017-20053-362c09e706e4df3c312dbda6ffdf171c.yaml index 88dd043c7e..9026bac515 100644 --- a/nuclei-templates/2017/CVE-2017-20053-362c09e706e4df3c312dbda6ffdf171c.yaml +++ b/nuclei-templates/2017/CVE-2017-20053-362c09e706e4df3c312dbda6ffdf171c.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form Manager <= 1.4.3 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > A vulnerability was found in XYZScripts Contact Form Manager Plugin. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-manager/" google-query: inurl:"/wp-content/plugins/contact-form-manager/" shodan-query: 'vuln:CVE-2017-20053' - tags: cve,wordpress,wp-plugin,contact-form-manager,high + tags: cve,wordpress,wp-plugin,contact-form-manager,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-20054-dd0f7c53e188e7bf56ca28fcdda5f28e.yaml b/nuclei-templates/2017/CVE-2017-20054-dd0f7c53e188e7bf56ca28fcdda5f28e.yaml index e306f94bd8..633baa9dfb 100644 --- a/nuclei-templates/2017/CVE-2017-20054-dd0f7c53e188e7bf56ca28fcdda5f28e.yaml +++ b/nuclei-templates/2017/CVE-2017-20054-dd0f7c53e188e7bf56ca28fcdda5f28e.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form Manager <= 1.4.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > A vulnerability was found in XYZScripts Contact Form Manager Plugin. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-manager/" google-query: inurl:"/wp-content/plugins/contact-form-manager/" shodan-query: 'vuln:CVE-2017-20054' - tags: cve,wordpress,wp-plugin,contact-form-manager,medium + tags: cve,wordpress,wp-plugin,contact-form-manager,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-20055-3ecd0cc847951c575bdce3ab52ae1765.yaml b/nuclei-templates/2017/CVE-2017-20055-3ecd0cc847951c575bdce3ab52ae1765.yaml index 1d4a4e2de2..4b7b901bf7 100644 --- a/nuclei-templates/2017/CVE-2017-20055-3ecd0cc847951c575bdce3ab52ae1765.yaml +++ b/nuclei-templates/2017/CVE-2017-20055-3ecd0cc847951c575bdce3ab52ae1765.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form Plugin <= 4.0.1 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > A vulnerability classified as problematic has been found in BestWebSoft Contact Form Plugin 4.0.0. This affects an unknown part. The manipulation leads to basic cross site scripting (Stored). It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 4.0.2 is able to address this issue. It is recommended to upgrade the affected component. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-lite/" google-query: inurl:"/wp-content/plugins/contact-form-lite/" shodan-query: 'vuln:CVE-2017-20055' - tags: cve,wordpress,wp-plugin,contact-form-lite,medium + tags: cve,wordpress,wp-plugin,contact-form-lite,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-20056-f899587161f02b977d621dc3afe7bca7.yaml b/nuclei-templates/2017/CVE-2017-20056-f899587161f02b977d621dc3afe7bca7.yaml index 441653fb9d..1dfcd217ba 100644 --- a/nuclei-templates/2017/CVE-2017-20056-f899587161f02b977d621dc3afe7bca7.yaml +++ b/nuclei-templates/2017/CVE-2017-20056-f899587161f02b977d621dc3afe7bca7.yaml @@ -4,7 +4,7 @@ info: name: > User Login Log <= 2.2.2 - Authenticated (Subscriber+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The User Login Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘column_name’ parameter in versions up to, and including, 2.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Subscriber+ level permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/user-login-log/" google-query: inurl:"/wp-content/plugins/user-login-log/" shodan-query: 'vuln:CVE-2017-20056' - tags: cve,wordpress,wp-plugin,user-login-log,medium + tags: cve,wordpress,wp-plugin,user-login-log,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-20090-6765f94f6a40bfeac4a799a7a22b461e.yaml b/nuclei-templates/2017/CVE-2017-20090-6765f94f6a40bfeac4a799a7a22b461e.yaml index 0b0f085d69..5c972ce350 100644 --- a/nuclei-templates/2017/CVE-2017-20090-6765f94f6a40bfeac4a799a7a22b461e.yaml +++ b/nuclei-templates/2017/CVE-2017-20090-6765f94f6a40bfeac4a799a7a22b461e.yaml @@ -4,7 +4,7 @@ info: name: > Global Content Blocks <= 2.1.5 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > A vulnerability was found in Global Content Blocks Plugin 2.1.5. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/global-content-blocks/" google-query: inurl:"/wp-content/plugins/global-content-blocks/" shodan-query: 'vuln:CVE-2017-20090' - tags: cve,wordpress,wp-plugin,global-content-blocks,high + tags: cve,wordpress,wp-plugin,global-content-blocks,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-20108-1d7d7c5febd898bd86b248bdd1c64ad3.yaml b/nuclei-templates/2017/CVE-2017-20108-1d7d7c5febd898bd86b248bdd1c64ad3.yaml index d82b27cf74..a2a9f90e82 100644 --- a/nuclei-templates/2017/CVE-2017-20108-1d7d7c5febd898bd86b248bdd1c64ad3.yaml +++ b/nuclei-templates/2017/CVE-2017-20108-1d7d7c5febd898bd86b248bdd1c64ad3.yaml @@ -4,7 +4,7 @@ info: name: > Easy Table <= 1.6 - Authenticated (Admin+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Easy Table plugin for WordPress is vulnerable to Stored Cross-Site Scripting via 'easy_table_plugin_option' parameters in versions up to, and including, 1.6 due to insufficient input sanitization and output escaping. This makes it possible for administrator-level attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-table/" google-query: inurl:"/wp-content/plugins/easy-table/" shodan-query: 'vuln:CVE-2017-20108' - tags: cve,wordpress,wp-plugin,easy-table,medium + tags: cve,wordpress,wp-plugin,easy-table,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-2136-b396ad7ddae66e7db7a5d4c1747eea0d.yaml b/nuclei-templates/2017/CVE-2017-2136-b396ad7ddae66e7db7a5d4c1747eea0d.yaml index b4379d500b..a05bc583dd 100644 --- a/nuclei-templates/2017/CVE-2017-2136-b396ad7ddae66e7db7a5d4c1747eea0d.yaml +++ b/nuclei-templates/2017/CVE-2017-2136-b396ad7ddae66e7db7a5d4c1747eea0d.yaml @@ -4,7 +4,7 @@ info: name: > WP Statistics <= 12.0.4 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in WP Statistics version 12.0.4 and earlier allows remote attackers to inject arbitrary web script or HTML via specially crafted HTTP Referer headers. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-statistics/" google-query: inurl:"/wp-content/plugins/wp-statistics/" shodan-query: 'vuln:CVE-2017-2136' - tags: cve,wordpress,wp-plugin,wp-statistics,medium + tags: cve,wordpress,wp-plugin,wp-statistics,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-2168-cb489cb39876b1f1dad08fd79397698a.yaml b/nuclei-templates/2017/CVE-2017-2168-cb489cb39876b1f1dad08fd79397698a.yaml index bb7b30c5fd..66f0b38c7f 100644 --- a/nuclei-templates/2017/CVE-2017-2168-cb489cb39876b1f1dad08fd79397698a.yaml +++ b/nuclei-templates/2017/CVE-2017-2168-cb489cb39876b1f1dad08fd79397698a.yaml @@ -4,7 +4,7 @@ info: name: > WP Booking System – Booking Calendar < 1.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in WP Booking System Free version prior to version 1.4 and WP Booking System Premium version prior to version 3.7 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -14,17 +14,17 @@ info: cvss-score: 6.1 cve-id: CVE-2017-2168 metadata: - fofa-query: "wp-content/plugins/wp-booking-system/" - google-query: inurl:"/wp-content/plugins/wp-booking-system/" + fofa-query: "wp-content/plugins/wp-booking-system-premium/" + google-query: inurl:"/wp-content/plugins/wp-booking-system-premium/" shodan-query: 'vuln:CVE-2017-2168' - tags: cve,wordpress,wp-plugin,wp-booking-system,medium + tags: cve,wordpress,wp-plugin,wp-booking-system-premium,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/wp-booking-system/readme.txt" + - "{{BaseURL}}/wp-content/plugins/wp-booking-system-premium/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "wp-booking-system" + - "wp-booking-system-premium" part: body - type: dsl dsl: - - compare_versions(version, '< 1.4') \ No newline at end of file + - compare_versions(version, '< 3.7') \ No newline at end of file diff --git a/nuclei-templates/2017/CVE-2017-2169-791eff0c2052bc2e9edb50c4e621f28e.yaml b/nuclei-templates/2017/CVE-2017-2169-791eff0c2052bc2e9edb50c4e621f28e.yaml index f7a49146bc..b669893869 100644 --- a/nuclei-templates/2017/CVE-2017-2169-791eff0c2052bc2e9edb50c4e621f28e.yaml +++ b/nuclei-templates/2017/CVE-2017-2169-791eff0c2052bc2e9edb50c4e621f28e.yaml @@ -4,7 +4,7 @@ info: name: > MaxButtons <= 6.18 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in MaxButtons prior to version 6.19 and MaxButtons Pro prior to version 6.19 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/maxbuttons/" google-query: inurl:"/wp-content/plugins/maxbuttons/" shodan-query: 'vuln:CVE-2017-2169' - tags: cve,wordpress,wp-plugin,maxbuttons,medium + tags: cve,wordpress,wp-plugin,maxbuttons,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-2187-245c40ef7971bdcc79b4668a4d4b1ccf.yaml b/nuclei-templates/2017/CVE-2017-2187-245c40ef7971bdcc79b4668a4d4b1ccf.yaml index 4d168a7e51..900bee6315 100644 --- a/nuclei-templates/2017/CVE-2017-2187-245c40ef7971bdcc79b4668a4d4b1ccf.yaml +++ b/nuclei-templates/2017/CVE-2017-2187-245c40ef7971bdcc79b4668a4d4b1ccf.yaml @@ -4,7 +4,7 @@ info: name: > WP Live Chat Support <= 7.0.06 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in WP Live Chat Support prior to version 7.0.07 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-live-chat-support/" google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" shodan-query: 'vuln:CVE-2017-2187' - tags: cve,wordpress,wp-plugin,wp-live-chat-support,medium + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-2195-ae474b19622d960a9a30327a508a7a8c.yaml b/nuclei-templates/2017/CVE-2017-2195-ae474b19622d960a9a30327a508a7a8c.yaml index 92b582d5a2..647d66f16d 100644 --- a/nuclei-templates/2017/CVE-2017-2195-ae474b19622d960a9a30327a508a7a8c.yaml +++ b/nuclei-templates/2017/CVE-2017-2195-ae474b19622d960a9a30327a508a7a8c.yaml @@ -4,7 +4,7 @@ info: name: > Multi Feed Reader <= 2.2.3 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > SQL injection vulnerability in the Multi Feed Reader prior to version 2.2.4 allows authenticated attackers to execute arbitrary SQL commands via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/multi-feed-reader/" google-query: inurl:"/wp-content/plugins/multi-feed-reader/" shodan-query: 'vuln:CVE-2017-2195' - tags: cve,wordpress,wp-plugin,multi-feed-reader,high + tags: cve,wordpress,wp-plugin,multi-feed-reader,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-2222-a980d40221670f484b92312f4acbd125.yaml b/nuclei-templates/2017/CVE-2017-2222-a980d40221670f484b92312f4acbd125.yaml index e04e24196b..7512730c3a 100644 --- a/nuclei-templates/2017/CVE-2017-2222-a980d40221670f484b92312f4acbd125.yaml +++ b/nuclei-templates/2017/CVE-2017-2222-a980d40221670f484b92312f4acbd125.yaml @@ -4,7 +4,7 @@ info: name: > WP-Members < 3.1.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The WP-Members plugin for WordPress is vulnerable to Cross-Site Scripting in versions before 3.1.8 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-members/" google-query: inurl:"/wp-content/plugins/wp-members/" shodan-query: 'vuln:CVE-2017-2222' - tags: cve,wordpress,wp-plugin,wp-members,medium + tags: cve,wordpress,wp-plugin,wp-members,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-2224-4f2124ce38e5b11836dd224eb87f80c1.yaml b/nuclei-templates/2017/CVE-2017-2224-4f2124ce38e5b11836dd224eb87f80c1.yaml index a5d9fe672a..35238c1c31 100644 --- a/nuclei-templates/2017/CVE-2017-2224-4f2124ce38e5b11836dd224eb87f80c1.yaml +++ b/nuclei-templates/2017/CVE-2017-2224-4f2124ce38e5b11836dd224eb87f80c1.yaml @@ -4,7 +4,7 @@ info: name: > EventCalendar < 1.0.94 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The EventCalendar plugin for WordPress is vulnerable to Cross-Site Scripting in versions before 1.0.94 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/event-calendar-wd/" google-query: inurl:"/wp-content/plugins/event-calendar-wd/" shodan-query: 'vuln:CVE-2017-2224' - tags: cve,wordpress,wp-plugin,event-calendar-wd,medium + tags: cve,wordpress,wp-plugin,event-calendar-wd,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-2243-d3aee972ef803bd73b594546fe5f08d6.yaml b/nuclei-templates/2017/CVE-2017-2243-d3aee972ef803bd73b594546fe5f08d6.yaml index ef3841b96d..cc96cd1670 100644 --- a/nuclei-templates/2017/CVE-2017-2243-d3aee972ef803bd73b594546fe5f08d6.yaml +++ b/nuclei-templates/2017/CVE-2017-2243-d3aee972ef803bd73b594546fe5f08d6.yaml @@ -4,7 +4,7 @@ info: name: > Responsive Lightbox & Gallery <= 1.7.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in Responsive Lightbox prior to version 1.7.2 allows an attacker to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/responsive-lightbox/" google-query: inurl:"/wp-content/plugins/responsive-lightbox/" shodan-query: 'vuln:CVE-2017-2243' - tags: cve,wordpress,wp-plugin,responsive-lightbox,medium + tags: cve,wordpress,wp-plugin,responsive-lightbox,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-2285-237f33dd283cbe8ba991ef6c6d099f49.yaml b/nuclei-templates/2017/CVE-2017-2285-237f33dd283cbe8ba991ef6c6d099f49.yaml index 56366adae4..0b86c6d9fb 100644 --- a/nuclei-templates/2017/CVE-2017-2285-237f33dd283cbe8ba991ef6c6d099f49.yaml +++ b/nuclei-templates/2017/CVE-2017-2285-237f33dd283cbe8ba991ef6c6d099f49.yaml @@ -4,7 +4,7 @@ info: name: > Simple Custom CSS and JS <= 3.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in Simple Custom CSS and JS prior to version 3.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/custom-css-js/" google-query: inurl:"/wp-content/plugins/custom-css-js/" shodan-query: 'vuln:CVE-2017-2285' - tags: cve,wordpress,wp-plugin,custom-css-js,medium + tags: cve,wordpress,wp-plugin,custom-css-js,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-5488-54dec93948946561e928da0b2ec5342b.yaml b/nuclei-templates/2017/CVE-2017-5488-54dec93948946561e928da0b2ec5342b.yaml index 1fd6c30f48..8196d649aa 100644 --- a/nuclei-templates/2017/CVE-2017-5488-54dec93948946561e928da0b2ec5342b.yaml +++ b/nuclei-templates/2017/CVE-2017-5488-54dec93948946561e928da0b2ec5342b.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.7.1 - Cross-Site Scripting via Name and Version Header of Plugin author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in wp-admin/update-core.php in WordPress before 4.7.1 allow remote attackers to inject arbitrary web script or HTML via the (1) name or (2) version header of a plugin. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-5488 metadata: shodan-query: 'vuln:CVE-2017-5488' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-5489-39916ed0568dcf6437aaa303323a2034.yaml b/nuclei-templates/2017/CVE-2017-5489-39916ed0568dcf6437aaa303323a2034.yaml index ceea447a5a..4fec01d497 100644 --- a/nuclei-templates/2017/CVE-2017-5489-39916ed0568dcf6437aaa303323a2034.yaml +++ b/nuclei-templates/2017/CVE-2017-5489-39916ed0568dcf6437aaa303323a2034.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.7.1 - Cross-Site Request Forgery via Uploading Flash File author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in WordPress before 4.7.1 allows remote attackers to hijack the authentication of unspecified victims via vectors involving a Flash file upload. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-5489 metadata: shodan-query: 'vuln:CVE-2017-5489' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-5490-e104142bc1fb6f9114a1a8ff34f8d8a2.yaml b/nuclei-templates/2017/CVE-2017-5490-e104142bc1fb6f9114a1a8ff34f8d8a2.yaml index 5a57b581c9..faa1075c30 100644 --- a/nuclei-templates/2017/CVE-2017-5490-e104142bc1fb6f9114a1a8ff34f8d8a2.yaml +++ b/nuclei-templates/2017/CVE-2017-5490-e104142bc1fb6f9114a1a8ff34f8d8a2.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.7.1 - Stored Cross-Site Scripting via theme directory name author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the theme-name fallback functionality in wp-includes/class-wp-theme.php in WordPress before 4.7.1 allows remote attackers to inject arbitrary web script or HTML via a crafted directory name of a theme, related to wp-admin/includes/class-theme-installer-skin.php. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-5490 metadata: shodan-query: 'vuln:CVE-2017-5490' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-5492-bcdd353c7595eb2f2eb76b75cc1e43b8.yaml b/nuclei-templates/2017/CVE-2017-5492-bcdd353c7595eb2f2eb76b75cc1e43b8.yaml index 229a88b521..a6f98b1d43 100644 --- a/nuclei-templates/2017/CVE-2017-5492-bcdd353c7595eb2f2eb76b75cc1e43b8.yaml +++ b/nuclei-templates/2017/CVE-2017-5492-bcdd353c7595eb2f2eb76b75cc1e43b8.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.7.1 - Cross-Site Request Forgery via Widget Editing author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in the widget-editing accessibility-mode feature in WordPress before 4.7.1 allows remote attackers to hijack the authentication of unspecified victims for requests that perform a widgets-access action, related to wp-admin/includes/class-wp-screen.php and wp-admin/widgets.php. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-5492 metadata: shodan-query: 'vuln:CVE-2017-5492' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-5610-fd782d56e4b98d3f89d6bafb5ab8e0f0.yaml b/nuclei-templates/2017/CVE-2017-5610-fd782d56e4b98d3f89d6bafb5ab8e0f0.yaml index 7a58c04ab8..78c19e7a58 100644 --- a/nuclei-templates/2017/CVE-2017-5610-fd782d56e4b98d3f89d6bafb5ab8e0f0.yaml +++ b/nuclei-templates/2017/CVE-2017-5610-fd782d56e4b98d3f89d6bafb5ab8e0f0.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.7.2 - Authorization Bypass to Term Disclosure author: topscoder - severity: medium + severity: high description: > wp-admin/includes/class-wp-press-this.php in Press This in WordPress before 4.7.2 does not properly restrict visibility of a taxonomy-assignment user interface, which allows remote attackers to bypass intended access restrictions by reading terms. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-5610 metadata: shodan-query: 'vuln:CVE-2017-5610' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-5611-23c7538b5ae837a8600364853bf7a88b.yaml b/nuclei-templates/2017/CVE-2017-5611-23c7538b5ae837a8600364853bf7a88b.yaml index 23068667d9..8e6d69d7fd 100644 --- a/nuclei-templates/2017/CVE-2017-5611-23c7538b5ae837a8600364853bf7a88b.yaml +++ b/nuclei-templates/2017/CVE-2017-5611-23c7538b5ae837a8600364853bf7a88b.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.7.2 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > SQL injection vulnerability in wp-includes/class-wp-query.php in WP_Query in WordPress before 4.7.2 allows remote attackers to execute arbitrary SQL commands by leveraging the presence of an affected plugin or theme that mishandles a crafted post type name. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-5611 metadata: shodan-query: 'vuln:CVE-2017-5611' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-5612-ccba560ddddde5bfcc32d210efed4a87.yaml b/nuclei-templates/2017/CVE-2017-5612-ccba560ddddde5bfcc32d210efed4a87.yaml index d0e7764f32..197125c42f 100644 --- a/nuclei-templates/2017/CVE-2017-5612-ccba560ddddde5bfcc32d210efed4a87.yaml +++ b/nuclei-templates/2017/CVE-2017-5612-ccba560ddddde5bfcc32d210efed4a87.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.7.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in wp-admin/includes/class-wp-posts-list-table.php in the posts list table in WordPress before 4.7.2 allows remote attackers to inject arbitrary web script or HTML via a crafted excerpt. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-5612 metadata: shodan-query: 'vuln:CVE-2017-5612' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6096-367d3a73f5196cd91ac495a3ac0b62f5.yaml b/nuclei-templates/2017/CVE-2017-6096-367d3a73f5196cd91ac495a3ac0b62f5.yaml index 0e09ece526..fadb12b522 100644 --- a/nuclei-templates/2017/CVE-2017-6096-367d3a73f5196cd91ac495a3ac0b62f5.yaml +++ b/nuclei-templates/2017/CVE-2017-6096-367d3a73f5196cd91ac495a3ac0b62f5.yaml @@ -4,7 +4,7 @@ info: name: > Mail Masta <= 1.0 - SQL Injection via filter_list parameter author: topscoder - severity: high + severity: critical description: > A SQL injection issue was discovered in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects /inc/lists/view-list.php (Requires authentication to Wordpress admin) with the GET Parameter: filter_list. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mail-masta/" google-query: inurl:"/wp-content/plugins/mail-masta/" shodan-query: 'vuln:CVE-2017-6096' - tags: cve,wordpress,wp-plugin,mail-masta,high + tags: cve,wordpress,wp-plugin,mail-masta,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6097-d853b0e423f8ed0a8520b3730f92bb07.yaml b/nuclei-templates/2017/CVE-2017-6097-d853b0e423f8ed0a8520b3730f92bb07.yaml index 94c033e30a..9c812670ff 100644 --- a/nuclei-templates/2017/CVE-2017-6097-d853b0e423f8ed0a8520b3730f92bb07.yaml +++ b/nuclei-templates/2017/CVE-2017-6097-d853b0e423f8ed0a8520b3730f92bb07.yaml @@ -4,7 +4,7 @@ info: name: > Mail Masta <= 1.0 - SQL Injection via camp_id parameter author: topscoder - severity: high + severity: critical description: > A SQL injection issue was discovered in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects /inc/campaign/count_of_send.php (Requires authentication to Wordpress admin) with the POST Parameter: camp_id. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mail-masta/" google-query: inurl:"/wp-content/plugins/mail-masta/" shodan-query: 'vuln:CVE-2017-6097' - tags: cve,wordpress,wp-plugin,mail-masta,high + tags: cve,wordpress,wp-plugin,mail-masta,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6098-0ae464a32aa65e97054ff65a6cd1aac7.yaml b/nuclei-templates/2017/CVE-2017-6098-0ae464a32aa65e97054ff65a6cd1aac7.yaml index c7ae8a66e7..cb3a3ac88b 100644 --- a/nuclei-templates/2017/CVE-2017-6098-0ae464a32aa65e97054ff65a6cd1aac7.yaml +++ b/nuclei-templates/2017/CVE-2017-6098-0ae464a32aa65e97054ff65a6cd1aac7.yaml @@ -4,7 +4,7 @@ info: name: > Mail Masta <= 1.0 - SQL Injection via list_id parameter author: topscoder - severity: high + severity: critical description: > A SQL injection issue was discovered in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects /inc/campaign_save.php (Requires authentication to Wordpress admin) with the POST Parameter: list_id. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mail-masta/" google-query: inurl:"/wp-content/plugins/mail-masta/" shodan-query: 'vuln:CVE-2017-6098' - tags: cve,wordpress,wp-plugin,mail-masta,high + tags: cve,wordpress,wp-plugin,mail-masta,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6102-b501e58c10633b07f2bbf5ed16ac706e.yaml b/nuclei-templates/2017/CVE-2017-6102-b501e58c10633b07f2bbf5ed16ac706e.yaml index c407c7004c..a3fa0caf77 100644 --- a/nuclei-templates/2017/CVE-2017-6102-b501e58c10633b07f2bbf5ed16ac706e.yaml +++ b/nuclei-templates/2017/CVE-2017-6102-b501e58c10633b07f2bbf5ed16ac706e.yaml @@ -4,7 +4,7 @@ info: name: > Rockhoist Badges <= 1.2.2 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Persistent XSS in wordpress plugin rockhoist-badges v1.2.2 via badge description and title fields. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/rockhoist-badges/" google-query: inurl:"/wp-content/plugins/rockhoist-badges/" shodan-query: 'vuln:CVE-2017-6102' - tags: cve,wordpress,wp-plugin,rockhoist-badges,medium + tags: cve,wordpress,wp-plugin,rockhoist-badges,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6103-180f313b58923b98a121e2e279750680.yaml b/nuclei-templates/2017/CVE-2017-6103-180f313b58923b98a121e2e279750680.yaml index 27c14b5687..b27a641a40 100644 --- a/nuclei-templates/2017/CVE-2017-6103-180f313b58923b98a121e2e279750680.yaml +++ b/nuclei-templates/2017/CVE-2017-6103-180f313b58923b98a121e2e279750680.yaml @@ -4,7 +4,7 @@ info: name: > AnyVar <= 0.1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Persistent XSS Vulnerability in Wordpress plugin AnyVar v0.1.1 via var_name parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/anyvar/" google-query: inurl:"/wp-content/plugins/anyvar/" shodan-query: 'vuln:CVE-2017-6103' - tags: cve,wordpress,wp-plugin,anyvar,medium + tags: cve,wordpress,wp-plugin,anyvar,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6570-61f3e3f11790d6bb7105200ca41924cd.yaml b/nuclei-templates/2017/CVE-2017-6570-61f3e3f11790d6bb7105200ca41924cd.yaml index e82c775e56..b5fab6cc81 100644 --- a/nuclei-templates/2017/CVE-2017-6570-61f3e3f11790d6bb7105200ca41924cd.yaml +++ b/nuclei-templates/2017/CVE-2017-6570-61f3e3f11790d6bb7105200ca41924cd.yaml @@ -4,7 +4,7 @@ info: name: > Mail Masta <= 1.0 - SQL Injection via id parameter author: topscoder - severity: high + severity: critical description: > A SQL injection issue is exploitable, with WordPress admin access, in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects ./inc/campaign/view-campaign-list.php with the GET Parameter: id. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mail-masta/" google-query: inurl:"/wp-content/plugins/mail-masta/" shodan-query: 'vuln:CVE-2017-6570' - tags: cve,wordpress,wp-plugin,mail-masta,high + tags: cve,wordpress,wp-plugin,mail-masta,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6571-ab348c720a0710e52e24c076c92c0cb1.yaml b/nuclei-templates/2017/CVE-2017-6571-ab348c720a0710e52e24c076c92c0cb1.yaml index 4df55f7ad8..8b2eb51bbb 100644 --- a/nuclei-templates/2017/CVE-2017-6571-ab348c720a0710e52e24c076c92c0cb1.yaml +++ b/nuclei-templates/2017/CVE-2017-6571-ab348c720a0710e52e24c076c92c0cb1.yaml @@ -4,7 +4,7 @@ info: name: > Mail Masta <= 1.0 - SQL Injection via id parameter author: topscoder - severity: high + severity: critical description: > A SQL injection issue is exploitable, with WordPress admin access, in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects ./inc/campaign/view-campaign.php with the GET Parameter: id. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mail-masta/" google-query: inurl:"/wp-content/plugins/mail-masta/" shodan-query: 'vuln:CVE-2017-6571' - tags: cve,wordpress,wp-plugin,mail-masta,high + tags: cve,wordpress,wp-plugin,mail-masta,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6572-2a026b3abf7a570fa9c1168601d16d6c.yaml b/nuclei-templates/2017/CVE-2017-6572-2a026b3abf7a570fa9c1168601d16d6c.yaml index 29c47620e8..b7f24be82d 100644 --- a/nuclei-templates/2017/CVE-2017-6572-2a026b3abf7a570fa9c1168601d16d6c.yaml +++ b/nuclei-templates/2017/CVE-2017-6572-2a026b3abf7a570fa9c1168601d16d6c.yaml @@ -4,7 +4,7 @@ info: name: > Mail Masta <= 1.0 - SQL Injection via filter_list parameter author: topscoder - severity: high + severity: critical description: > A SQL injection issue is exploitable, with WordPress admin access, in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects ./inc/lists/add_member.php with the GET Parameter: filter_list. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mail-masta/" google-query: inurl:"/wp-content/plugins/mail-masta/" shodan-query: 'vuln:CVE-2017-6572' - tags: cve,wordpress,wp-plugin,mail-masta,high + tags: cve,wordpress,wp-plugin,mail-masta,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6573-9f041e8fa181897986208bfc1b4d15f9.yaml b/nuclei-templates/2017/CVE-2017-6573-9f041e8fa181897986208bfc1b4d15f9.yaml index 1cb423c9a6..43e24869c8 100644 --- a/nuclei-templates/2017/CVE-2017-6573-9f041e8fa181897986208bfc1b4d15f9.yaml +++ b/nuclei-templates/2017/CVE-2017-6573-9f041e8fa181897986208bfc1b4d15f9.yaml @@ -4,7 +4,7 @@ info: name: > Mail Masta <= 1.0 - SQL Injection via id parameter author: topscoder - severity: high + severity: critical description: > A SQL injection issue is exploitable, with WordPress admin access, in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects ./inc/lists/edit-list.php with the GET Parameter: id. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mail-masta/" google-query: inurl:"/wp-content/plugins/mail-masta/" shodan-query: 'vuln:CVE-2017-6573' - tags: cve,wordpress,wp-plugin,mail-masta,high + tags: cve,wordpress,wp-plugin,mail-masta,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6574-d349201003f1e073b123310455ca065d.yaml b/nuclei-templates/2017/CVE-2017-6574-d349201003f1e073b123310455ca065d.yaml index d915ad15a8..6c52ef963a 100644 --- a/nuclei-templates/2017/CVE-2017-6574-d349201003f1e073b123310455ca065d.yaml +++ b/nuclei-templates/2017/CVE-2017-6574-d349201003f1e073b123310455ca065d.yaml @@ -4,7 +4,7 @@ info: name: > Mail Masta Plugin <= 1.0 - SQL Injection via filter_list author: topscoder - severity: high + severity: critical description: > A SQL injection issue is exploitable, with WordPress admin access, in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects ./inc/lists/edit_member.php with the GET Parameter: filter_list. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mail-masta/" google-query: inurl:"/wp-content/plugins/mail-masta/" shodan-query: 'vuln:CVE-2017-6574' - tags: cve,wordpress,wp-plugin,mail-masta,high + tags: cve,wordpress,wp-plugin,mail-masta,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6575-71386814122d58a47245526972d56d40.yaml b/nuclei-templates/2017/CVE-2017-6575-71386814122d58a47245526972d56d40.yaml index 5fce1345e6..7cebbc0353 100644 --- a/nuclei-templates/2017/CVE-2017-6575-71386814122d58a47245526972d56d40.yaml +++ b/nuclei-templates/2017/CVE-2017-6575-71386814122d58a47245526972d56d40.yaml @@ -4,7 +4,7 @@ info: name: > Mail Masta <= 1.0 - SQL Injection via member_id parameter author: topscoder - severity: high + severity: critical description: > A SQL injection issue is exploitable, with WordPress admin access, in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects ./inc/lists/edit_member.php with the GET Parameter: member_id. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mail-masta/" google-query: inurl:"/wp-content/plugins/mail-masta/" shodan-query: 'vuln:CVE-2017-6575' - tags: cve,wordpress,wp-plugin,mail-masta,high + tags: cve,wordpress,wp-plugin,mail-masta,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6576-346d51a39433f3f2e66028061115352b.yaml b/nuclei-templates/2017/CVE-2017-6576-346d51a39433f3f2e66028061115352b.yaml index 3f7f0cbe67..6356cf52d3 100644 --- a/nuclei-templates/2017/CVE-2017-6576-346d51a39433f3f2e66028061115352b.yaml +++ b/nuclei-templates/2017/CVE-2017-6576-346d51a39433f3f2e66028061115352b.yaml @@ -4,7 +4,7 @@ info: name: > Mail Masta <= 1.0 - SQL Injection via id parameter author: topscoder - severity: high + severity: critical description: > A SQL injection issue is exploitable, with WordPress admin access, in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects ./inc/campaign/campaign-delete.php with the GET Parameter: id. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mail-masta/" google-query: inurl:"/wp-content/plugins/mail-masta/" shodan-query: 'vuln:CVE-2017-6576' - tags: cve,wordpress,wp-plugin,mail-masta,high + tags: cve,wordpress,wp-plugin,mail-masta,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6577-56b6a95b36a0bf98a099f526d08412cb.yaml b/nuclei-templates/2017/CVE-2017-6577-56b6a95b36a0bf98a099f526d08412cb.yaml index 123e44114f..54ddfe24a2 100644 --- a/nuclei-templates/2017/CVE-2017-6577-56b6a95b36a0bf98a099f526d08412cb.yaml +++ b/nuclei-templates/2017/CVE-2017-6577-56b6a95b36a0bf98a099f526d08412cb.yaml @@ -4,7 +4,7 @@ info: name: > Mail Masta <= 1.0 - SQL Injection via list_id parameter author: topscoder - severity: high + severity: critical description: > A SQL injection issue is exploitable, with WordPress admin access, in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects ./inc/subscriber_list.php with the POST Parameter: list_id. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mail-masta/" google-query: inurl:"/wp-content/plugins/mail-masta/" shodan-query: 'vuln:CVE-2017-6577' - tags: cve,wordpress,wp-plugin,mail-masta,high + tags: cve,wordpress,wp-plugin,mail-masta,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6578-882cb2013f62250b85eee3042b3892e0.yaml b/nuclei-templates/2017/CVE-2017-6578-882cb2013f62250b85eee3042b3892e0.yaml index 760d0b9343..9659d81177 100644 --- a/nuclei-templates/2017/CVE-2017-6578-882cb2013f62250b85eee3042b3892e0.yaml +++ b/nuclei-templates/2017/CVE-2017-6578-882cb2013f62250b85eee3042b3892e0.yaml @@ -4,7 +4,7 @@ info: name: > Mail Masta <= 1.0 - SQL Injection via subscriber_email parameter author: topscoder - severity: high + severity: critical description: > A SQL injection issue is exploitable, with WordPress admin access, in the Mail Masta (aka mail-masta) plugin 1.0 for WordPress. This affects ./inc/subscriber_list.php with the POST Parameter: subscriber_email. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mail-masta/" google-query: inurl:"/wp-content/plugins/mail-masta/" shodan-query: 'vuln:CVE-2017-6578' - tags: cve,wordpress,wp-plugin,mail-masta,high + tags: cve,wordpress,wp-plugin,mail-masta,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6814-149dcf7cdb4497ad56e6c587550c43ab.yaml b/nuclei-templates/2017/CVE-2017-6814-149dcf7cdb4497ad56e6c587550c43ab.yaml index bf80256bd3..2297339c65 100644 --- a/nuclei-templates/2017/CVE-2017-6814-149dcf7cdb4497ad56e6c587550c43ab.yaml +++ b/nuclei-templates/2017/CVE-2017-6814-149dcf7cdb4497ad56e6c587550c43ab.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.7.3 - Cross-Site Scripting via Media Metadata author: topscoder - severity: medium + severity: high description: > In WordPress before 4.7.3, there is authenticated Cross-Site Scripting (XSS) via Media File Metadata. This is demonstrated by both (1) mishandling of the playlist shortcode in the wp_playlist_shortcode function in wp-includes/media.php and (2) mishandling of meta information in the renderTracks function in wp-includes/js/mediaelement/wp-playlist.js. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-6814 metadata: shodan-query: 'vuln:CVE-2017-6814' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6817-7c8aa1bb9118332e4c00a1f8fbc13540.yaml b/nuclei-templates/2017/CVE-2017-6817-7c8aa1bb9118332e4c00a1f8fbc13540.yaml index 91bb61ab5e..6a86cc6ee9 100644 --- a/nuclei-templates/2017/CVE-2017-6817-7c8aa1bb9118332e4c00a1f8fbc13540.yaml +++ b/nuclei-templates/2017/CVE-2017-6817-7c8aa1bb9118332e4c00a1f8fbc13540.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.7.3 - Authenticated Cross-Site Scripting in Youtube URL Embeds author: topscoder - severity: medium + severity: low description: > In WordPress before 4.7.3 (wp-includes/embed.php), there is authenticated Cross-Site Scripting (XSS) in YouTube URL Embeds. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-6817 metadata: shodan-query: 'vuln:CVE-2017-6817' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6818-0a8a35fbbc78dd50ed9a1fd51d25c173.yaml b/nuclei-templates/2017/CVE-2017-6818-0a8a35fbbc78dd50ed9a1fd51d25c173.yaml index dcc3a22fac..b2f959f7e4 100644 --- a/nuclei-templates/2017/CVE-2017-6818-0a8a35fbbc78dd50ed9a1fd51d25c173.yaml +++ b/nuclei-templates/2017/CVE-2017-6818-0a8a35fbbc78dd50ed9a1fd51d25c173.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.7.3 - Cross-Site Scripting via Taxonomy names author: topscoder - severity: medium + severity: high description: > In WordPress before 4.7.3 (wp-admin/js/tags-box.js), there is cross-site scripting (XSS) via taxonomy term names. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-6818 metadata: shodan-query: 'vuln:CVE-2017-6818' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6819-25c3fb96e305a88e28c455667db0b60d.yaml b/nuclei-templates/2017/CVE-2017-6819-25c3fb96e305a88e28c455667db0b60d.yaml index 101f5f37b2..206e25c99f 100644 --- a/nuclei-templates/2017/CVE-2017-6819-25c3fb96e305a88e28c455667db0b60d.yaml +++ b/nuclei-templates/2017/CVE-2017-6819-25c3fb96e305a88e28c455667db0b60d.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.7.3 - Cross-Site Request Forgery via Press This author: topscoder - severity: high + severity: medium description: > In WordPress before 4.7.3, there is cross-site request forgery (CSRF) in Press This (wp-admin/includes/class-wp-press-this.php), leading to excessive use of server resources. The CSRF can trigger an outbound HTTP request for a large file that is then parsed by Press This. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-6819 metadata: shodan-query: 'vuln:CVE-2017-6819' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-6954-8dce3163a90bed75fd5b9e557a28f3b3.yaml b/nuclei-templates/2017/CVE-2017-6954-8dce3163a90bed75fd5b9e557a28f3b3.yaml index a4158a0c00..131830e60b 100644 --- a/nuclei-templates/2017/CVE-2017-6954-8dce3163a90bed75fd5b9e557a28f3b3.yaml +++ b/nuclei-templates/2017/CVE-2017-6954-8dce3163a90bed75fd5b9e557a28f3b3.yaml @@ -4,7 +4,7 @@ info: name: > BuddyPress Docs <= 1.9.2 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > An issue was discovered in includes/component.php in the BuddyPress Docs plugin before 1.9.3 for WordPress. It is possible for authenticated users to edit documents of other users without proper permissions. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/buddypress-docs/" google-query: inurl:"/wp-content/plugins/buddypress-docs/" shodan-query: 'vuln:CVE-2017-6954' - tags: cve,wordpress,wp-plugin,buddypress-docs,medium + tags: cve,wordpress,wp-plugin,buddypress-docs,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-7723-e3f24a45c97373cce269e0ae75379f47.yaml b/nuclei-templates/2017/CVE-2017-7723-e3f24a45c97373cce269e0ae75379f47.yaml index 7c8c491318..7b4d5f8969 100644 --- a/nuclei-templates/2017/CVE-2017-7723-e3f24a45c97373cce269e0ae75379f47.yaml +++ b/nuclei-templates/2017/CVE-2017-7723-e3f24a45c97373cce269e0ae75379f47.yaml @@ -4,7 +4,7 @@ info: name: > Easy WP SMTP <= 1.2.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > XSS exists in Easy WP SMTP (before 1.2.5), a WordPress Plugin, via the e-mail subject or body. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-wp-smtp/" google-query: inurl:"/wp-content/plugins/easy-wp-smtp/" shodan-query: 'vuln:CVE-2017-7723' - tags: cve,wordpress,wp-plugin,easy-wp-smtp,medium + tags: cve,wordpress,wp-plugin,easy-wp-smtp,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-8099-8475202b9f0509bc3f7f733c6c0c1b7b.yaml b/nuclei-templates/2017/CVE-2017-8099-8475202b9f0509bc3f7f733c6c0c1b7b.yaml index 3c4bd39c0f..f77efbd45d 100644 --- a/nuclei-templates/2017/CVE-2017-8099-8475202b9f0509bc3f7f733c6c0c1b7b.yaml +++ b/nuclei-templates/2017/CVE-2017-8099-8475202b9f0509bc3f7f733c6c0c1b7b.yaml @@ -4,7 +4,7 @@ info: name: > WHIZZ < 1.1.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The WHIZZ plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to 1.1.1. This is due to missing nonce validation on several different functions. This makes it possible for unauthenticated attackers to delete WordPress users and change the plugin's status via forged requests granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/whizz/" google-query: inurl:"/wp-content/plugins/whizz/" shodan-query: 'vuln:CVE-2017-8099' - tags: cve,wordpress,wp-plugin,whizz,high + tags: cve,wordpress,wp-plugin,whizz,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-8875-b85e6f076cf78bc83dad21e66d70a2d9.yaml b/nuclei-templates/2017/CVE-2017-8875-b85e6f076cf78bc83dad21e66d70a2d9.yaml index 41ab84b02f..b3f865e512 100644 --- a/nuclei-templates/2017/CVE-2017-8875-b85e6f076cf78bc83dad21e66d70a2d9.yaml +++ b/nuclei-templates/2017/CVE-2017-8875-b85e6f076cf78bc83dad21e66d70a2d9.yaml @@ -4,7 +4,7 @@ info: name: > Clean Login <= 1.10.3 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Clean Login for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.10.3. This is due to missing or incorrect nonce validation on the clean_login_options() function. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Note this vulnerability was not patched in version 1.8 as stated in the CVE record. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/clean-login/" google-query: inurl:"/wp-content/plugins/clean-login/" shodan-query: 'vuln:CVE-2017-8875' - tags: cve,wordpress,wp-plugin,clean-login,high + tags: cve,wordpress,wp-plugin,clean-login,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-9061-2059eacfa2b817cc7e2dee40b1d8ccd8.yaml b/nuclei-templates/2017/CVE-2017-9061-2059eacfa2b817cc7e2dee40b1d8ccd8.yaml index 4f158a66d8..f2c3bef504 100644 --- a/nuclei-templates/2017/CVE-2017-9061-2059eacfa2b817cc7e2dee40b1d8ccd8.yaml +++ b/nuclei-templates/2017/CVE-2017-9061-2059eacfa2b817cc7e2dee40b1d8ccd8.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.7.5 - Stored Cross-Site Scripting via filenames author: topscoder - severity: medium + severity: high description: > In WordPress before 4.7.5, a cross-site scripting (XSS) vulnerability exists when attempting to upload very large files, because the error message does not properly restrict presentation of the filename. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-9061 metadata: shodan-query: 'vuln:CVE-2017-9061' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-9063-b31baacf3424b6f807916c83cd50d239.yaml b/nuclei-templates/2017/CVE-2017-9063-b31baacf3424b6f807916c83cd50d239.yaml index e34860230f..70c7ca2b6b 100644 --- a/nuclei-templates/2017/CVE-2017-9063-b31baacf3424b6f807916c83cd50d239.yaml +++ b/nuclei-templates/2017/CVE-2017-9063-b31baacf3424b6f807916c83cd50d239.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.7.5 - Cross-Site Scripting via Customizer author: topscoder - severity: medium + severity: high description: > In WordPress before 4.7.5, a cross-site scripting (XSS) vulnerability related to the Customizer exists, involving an invalid customization session. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-9063 metadata: shodan-query: 'vuln:CVE-2017-9063' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-9064-fa8a087263ff15310b12026bf0398947.yaml b/nuclei-templates/2017/CVE-2017-9064-fa8a087263ff15310b12026bf0398947.yaml index f833da1bf8..82c5caf415 100644 --- a/nuclei-templates/2017/CVE-2017-9064-fa8a087263ff15310b12026bf0398947.yaml +++ b/nuclei-templates/2017/CVE-2017-9064-fa8a087263ff15310b12026bf0398947.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.7.5 - Cross-Site Request Forgery Filesystem Credential Update author: topscoder - severity: high + severity: medium description: > In WordPress before 4.7.5, a Cross Site Request Forgery (CSRF) vulnerability exists in the filesystem credentials dialog because a nonce is not required for updating credentials. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-9064 metadata: shodan-query: 'vuln:CVE-2017-9064' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,medium http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-9065-e8d59ad5e812b7bb724e8a40d7c112fd.yaml b/nuclei-templates/2017/CVE-2017-9065-e8d59ad5e812b7bb724e8a40d7c112fd.yaml index d53dbccc2f..6105c9c1ef 100644 --- a/nuclei-templates/2017/CVE-2017-9065-e8d59ad5e812b7bb724e8a40d7c112fd.yaml +++ b/nuclei-templates/2017/CVE-2017-9065-e8d59ad5e812b7bb724e8a40d7c112fd.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.7.5 - Authorization Bypass Allowing Post Meta Updates author: topscoder - severity: medium + severity: high description: > In WordPress before 4.7.5, there is a lack of capability checks for post meta data in the XML-RPC API. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2017-9065 metadata: shodan-query: 'vuln:CVE-2017-9065' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-9337-c99fdfdd6f51accf3ed6f44f28e23a84.yaml b/nuclei-templates/2017/CVE-2017-9337-c99fdfdd6f51accf3ed6f44f28e23a84.yaml index 501d887972..2d6adb6739 100644 --- a/nuclei-templates/2017/CVE-2017-9337-c99fdfdd6f51accf3ed6f44f28e23a84.yaml +++ b/nuclei-templates/2017/CVE-2017-9337-c99fdfdd6f51accf3ed6f44f28e23a84.yaml @@ -4,7 +4,7 @@ info: name: > Markdown on Save Improved <= 2.5 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Markdown on Save Improved plugin 2.5 for WordPress has a stored XSS vulnerability in the content of a post. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/markdown-on-save-improved/" google-query: inurl:"/wp-content/plugins/markdown-on-save-improved/" shodan-query: 'vuln:CVE-2017-9337' - tags: cve,wordpress,wp-plugin,markdown-on-save-improved,medium + tags: cve,wordpress,wp-plugin,markdown-on-save-improved,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-9418-b810e04fd2ee9ba72626a776c33f0a7b.yaml b/nuclei-templates/2017/CVE-2017-9418-b810e04fd2ee9ba72626a776c33f0a7b.yaml index f9233ffc4c..3ba76438f5 100644 --- a/nuclei-templates/2017/CVE-2017-9418-b810e04fd2ee9ba72626a776c33f0a7b.yaml +++ b/nuclei-templates/2017/CVE-2017-9418-b810e04fd2ee9ba72626a776c33f0a7b.yaml @@ -4,7 +4,7 @@ info: name: > WP-Testimonials <= 3.4.1 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in the WP-Testimonials plugin 3.4.1 for WordPress allows an authenticated user to execute arbitrary SQL commands via the testid parameter to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-testimonials/" google-query: inurl:"/wp-content/plugins/wp-testimonials/" shodan-query: 'vuln:CVE-2017-9418' - tags: cve,wordpress,wp-plugin,wp-testimonials,high + tags: cve,wordpress,wp-plugin,wp-testimonials,critical http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-9419-8eccd870a6d15f799494bf58d6a610b0.yaml b/nuclei-templates/2017/CVE-2017-9419-8eccd870a6d15f799494bf58d6a610b0.yaml index 8b2f19f5be..1b24455948 100644 --- a/nuclei-templates/2017/CVE-2017-9419-8eccd870a6d15f799494bf58d6a610b0.yaml +++ b/nuclei-templates/2017/CVE-2017-9419-8eccd870a6d15f799494bf58d6a610b0.yaml @@ -4,7 +4,7 @@ info: name: > WP Custom Fields Search <= 0.3.28 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Webhammer WP Custom Fields Search plugin 0.3.28 for WordPress allows remote attackers to inject arbitrary JavaScript via the cs-all-0 parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-custom-fields-search/" google-query: inurl:"/wp-content/plugins/wp-custom-fields-search/" shodan-query: 'vuln:CVE-2017-9419' - tags: cve,wordpress,wp-plugin,wp-custom-fields-search,medium + tags: cve,wordpress,wp-plugin,wp-custom-fields-search,high http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-9429-b6feac7a7902db970215a4fc933d4825.yaml b/nuclei-templates/2017/CVE-2017-9429-b6feac7a7902db970215a4fc933d4825.yaml index f23ded3c4e..d6a46151fa 100644 --- a/nuclei-templates/2017/CVE-2017-9429-b6feac7a7902db970215a4fc933d4825.yaml +++ b/nuclei-templates/2017/CVE-2017-9429-b6feac7a7902db970215a4fc933d4825.yaml @@ -4,7 +4,7 @@ info: name: > Event List < 0.7.9 - Authenticated (Admin+) SQL Injection author: topscoder - severity: high + severity: low description: > The Event List plugin for WordPress is vulnerable to time-based SQL Injection via the ‘id’ parameter in versions before 0.7.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/event-list/" google-query: inurl:"/wp-content/plugins/event-list/" shodan-query: 'vuln:CVE-2017-9429' - tags: cve,wordpress,wp-plugin,event-list,high + tags: cve,wordpress,wp-plugin,event-list,low http: - method: GET diff --git a/nuclei-templates/2017/CVE-2017-9603-b2a0f64728c134eb1a214207f2b340c0.yaml b/nuclei-templates/2017/CVE-2017-9603-b2a0f64728c134eb1a214207f2b340c0.yaml index 98b5c450a0..5243228784 100644 --- a/nuclei-templates/2017/CVE-2017-9603-b2a0f64728c134eb1a214207f2b340c0.yaml +++ b/nuclei-templates/2017/CVE-2017-9603-b2a0f64728c134eb1a214207f2b340c0.yaml @@ -4,7 +4,7 @@ info: name: > WP Jobs < 1.5 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL injection vulnerability in the WP Jobs plugin before 1.5 for WordPress allows authenticated users to execute arbitrary SQL commands via the jobid parameter to wp-admin/edit.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-jobs/" google-query: inurl:"/wp-content/plugins/wp-jobs/" shodan-query: 'vuln:CVE-2017-9603' - tags: cve,wordpress,wp-plugin,wp-jobs,high + tags: cve,wordpress,wp-plugin,wp-jobs,critical http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-0511-ad6eca81b2e556f270b3ae3f5090cf96.yaml b/nuclei-templates/2018/CVE-2018-0511-ad6eca81b2e556f270b3ae3f5090cf96.yaml index 41d73ecd8c..b0544b4d39 100644 --- a/nuclei-templates/2018/CVE-2018-0511-ad6eca81b2e556f270b3ae3f5090cf96.yaml +++ b/nuclei-templates/2018/CVE-2018-0511-ad6eca81b2e556f270b3ae3f5090cf96.yaml @@ -4,7 +4,7 @@ info: name: > WP Retina 2x <= 5.2.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in WP Retina 2x prior to version 5.2.2 allows an attacker to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-retina-2x/" google-query: inurl:"/wp-content/plugins/wp-retina-2x/" shodan-query: 'vuln:CVE-2018-0511' - tags: cve,wordpress,wp-plugin,wp-retina-2x,medium + tags: cve,wordpress,wp-plugin,wp-retina-2x,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-0546-6542eb9293767f9620f37e7f59fd2a40.yaml b/nuclei-templates/2018/CVE-2018-0546-6542eb9293767f9620f37e7f59fd2a40.yaml index 6d1365c0cb..4e6b076869 100644 --- a/nuclei-templates/2018/CVE-2018-0546-6542eb9293767f9620f37e7f59fd2a40.yaml +++ b/nuclei-templates/2018/CVE-2018-0546-6542eb9293767f9620f37e7f59fd2a40.yaml @@ -4,7 +4,7 @@ info: name: > WP All Import <= 3.4.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in WP All Import plugin prior to version 3.4.6 for WordPress allows an attacker to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-all-import/" google-query: inurl:"/wp-content/plugins/wp-all-import/" shodan-query: 'vuln:CVE-2018-0546' - tags: cve,wordpress,wp-plugin,wp-all-import,medium + tags: cve,wordpress,wp-plugin,wp-all-import,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-0547-d244aad713442e8917ed457759893c6e.yaml b/nuclei-templates/2018/CVE-2018-0547-d244aad713442e8917ed457759893c6e.yaml index 4a44311dc2..0eb46da817 100644 --- a/nuclei-templates/2018/CVE-2018-0547-d244aad713442e8917ed457759893c6e.yaml +++ b/nuclei-templates/2018/CVE-2018-0547-d244aad713442e8917ed457759893c6e.yaml @@ -4,7 +4,7 @@ info: name: > WP All Import <= 3.4.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in WP All Import plugin prior to version 3.4.7 for WordPress allows an attacker to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-all-import/" google-query: inurl:"/wp-content/plugins/wp-all-import/" shodan-query: 'vuln:CVE-2018-0547' - tags: cve,wordpress,wp-plugin,wp-all-import,medium + tags: cve,wordpress,wp-plugin,wp-all-import,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-0576-bf648a28f236904436ac42427351efb1.yaml b/nuclei-templates/2018/CVE-2018-0576-bf648a28f236904436ac42427351efb1.yaml index 85fed4677c..4b2ee0f03c 100644 --- a/nuclei-templates/2018/CVE-2018-0576-bf648a28f236904436ac42427351efb1.yaml +++ b/nuclei-templates/2018/CVE-2018-0576-bf648a28f236904436ac42427351efb1.yaml @@ -4,7 +4,7 @@ info: name: > Events Manager <= 5.8.1.3 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in Events Manager plugin prior to version 5.9 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/events-manager/" google-query: inurl:"/wp-content/plugins/events-manager/" shodan-query: 'vuln:CVE-2018-0576' - tags: cve,wordpress,wp-plugin,events-manager,medium + tags: cve,wordpress,wp-plugin,events-manager,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-0577-7149f44d871608d660e807410983089b.yaml b/nuclei-templates/2018/CVE-2018-0577-7149f44d871608d660e807410983089b.yaml index 20e970aa11..e8947b241c 100644 --- a/nuclei-templates/2018/CVE-2018-0577-7149f44d871608d660e807410983089b.yaml +++ b/nuclei-templates/2018/CVE-2018-0577-7149f44d871608d660e807410983089b.yaml @@ -4,7 +4,7 @@ info: name: > WP MAPS – Easiest & Most Advanced WordPress Plugin for Google Maps < 4.0.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in WP Google Map Plugin prior to version 4.0.4 for WordPress allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-google-map-plugin/" google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" shodan-query: 'vuln:CVE-2018-0577' - tags: cve,wordpress,wp-plugin,wp-google-map-plugin,medium + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-0587-caa94527ec89b606495dedb1b363e9ed.yaml b/nuclei-templates/2018/CVE-2018-0587-caa94527ec89b606495dedb1b363e9ed.yaml index ee05b8f6bd..3f1b3880dd 100644 --- a/nuclei-templates/2018/CVE-2018-0587-caa94527ec89b606495dedb1b363e9ed.yaml +++ b/nuclei-templates/2018/CVE-2018-0587-caa94527ec89b606495dedb1b363e9ed.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate Member < 2.0.4 - Authenticated Unrestricted File Upload author: topscoder - severity: medium + severity: low description: > The Ultimate Member plugin for WordPress is vulnerable to unrestricted file uploads in versions prior to version 2.0.4. This makes it possible for authenticated attackers to upload arbitrary image files via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-member/" google-query: inurl:"/wp-content/plugins/ultimate-member/" shodan-query: 'vuln:CVE-2018-0587' - tags: cve,wordpress,wp-plugin,ultimate-member,medium + tags: cve,wordpress,wp-plugin,ultimate-member,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-0602-865ecb5d1f3a9d92057b3c2510337cb0.yaml b/nuclei-templates/2018/CVE-2018-0602-865ecb5d1f3a9d92057b3c2510337cb0.yaml index 0f72b0e947..e3334f741d 100644 --- a/nuclei-templates/2018/CVE-2018-0602-865ecb5d1f3a9d92057b3c2510337cb0.yaml +++ b/nuclei-templates/2018/CVE-2018-0602-865ecb5d1f3a9d92057b3c2510337cb0.yaml @@ -4,7 +4,7 @@ info: name: > Email Subscribers & Newsletters <= 3.4.12 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in Email Subscribers & Newsletters versions prior to 3.5.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/email-subscribers/" google-query: inurl:"/wp-content/plugins/email-subscribers/" shodan-query: 'vuln:CVE-2018-0602' - tags: cve,wordpress,wp-plugin,email-subscribers,medium + tags: cve,wordpress,wp-plugin,email-subscribers,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-0603-363cf849a90f39fbc05b59e8ab91a270.yaml b/nuclei-templates/2018/CVE-2018-0603-363cf849a90f39fbc05b59e8ab91a270.yaml index b88cca2307..ec5f742a77 100644 --- a/nuclei-templates/2018/CVE-2018-0603-363cf849a90f39fbc05b59e8ab91a270.yaml +++ b/nuclei-templates/2018/CVE-2018-0603-363cf849a90f39fbc05b59e8ab91a270.yaml @@ -4,7 +4,7 @@ info: name: > Site Reviews <= 2.15.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in Site Reviews versions prior to 2.15.3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/site-reviews/" google-query: inurl:"/wp-content/plugins/site-reviews/" shodan-query: 'vuln:CVE-2018-0603' - tags: cve,wordpress,wp-plugin,site-reviews,medium + tags: cve,wordpress,wp-plugin,site-reviews,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-0642-3af842e4b028602d05da06af8493bf21.yaml b/nuclei-templates/2018/CVE-2018-0642-3af842e4b028602d05da06af8493bf21.yaml index 05531c61ee..66e8f509b6 100644 --- a/nuclei-templates/2018/CVE-2018-0642-3af842e4b028602d05da06af8493bf21.yaml +++ b/nuclei-templates/2018/CVE-2018-0642-3af842e4b028602d05da06af8493bf21.yaml @@ -4,7 +4,7 @@ info: name: > FV Flowplayer Video Player 6.1.2 - 6.6.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in FV Flowplayer Video Player 6.1.2 to 6.6.4 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" shodan-query: 'vuln:CVE-2018-0642' - tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,medium + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-1000172-ac32959f74b06f08f41c35d9de9637f2.yaml b/nuclei-templates/2018/CVE-2018-1000172-ac32959f74b06f08f41c35d9de9637f2.yaml index 34c59d8bd0..b9b3c5f6b2 100644 --- a/nuclei-templates/2018/CVE-2018-1000172-ac32959f74b06f08f41c35d9de9637f2.yaml +++ b/nuclei-templates/2018/CVE-2018-1000172-ac32959f74b06f08f41c35d9de9637f2.yaml @@ -4,7 +4,7 @@ info: name: > NextGEN Gallery <= 2.2.44 - Cross-Site Scripting via image alt and title text author: topscoder - severity: medium + severity: high description: > Imagely NextGEN Gallery version 2.2.30 and earlier contains a Cross Site Scripting (XSS) vulnerability in Image Alt & Title Text. This attack appears to be exploitable via a victim viewing the image in the administrator page. This vulnerability appears to have been fixed in 2.2.45. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nextgen-gallery/" google-query: inurl:"/wp-content/plugins/nextgen-gallery/" shodan-query: 'vuln:CVE-2018-1000172' - tags: cve,wordpress,wp-plugin,nextgen-gallery,medium + tags: cve,wordpress,wp-plugin,nextgen-gallery,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-1000504-660c79b80e87c9453730e77d4013c8f0.yaml b/nuclei-templates/2018/CVE-2018-1000504-660c79b80e87c9453730e77d4013c8f0.yaml index c02108bedf..f810384941 100644 --- a/nuclei-templates/2018/CVE-2018-1000504-660c79b80e87c9453730e77d4013c8f0.yaml +++ b/nuclei-templates/2018/CVE-2018-1000504-660c79b80e87c9453730e77d4013c8f0.yaml @@ -4,7 +4,7 @@ info: name: > Redirection <= 2.7.3 - Local File Inclusion author: topscoder - severity: high + severity: critical description: > Redirection version 2.7.3 contains a ACE via file inclusion vulnerability in Pass-through mode that can result in allows admins to execute any PHP file in the filesystem. This attack appear to be exploitable via Attacker must be have access to an admin account on the target site. This vulnerability appears to have been fixed in 2.8. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/redirection/" google-query: inurl:"/wp-content/plugins/redirection/" shodan-query: 'vuln:CVE-2018-1000504' - tags: cve,wordpress,wp-plugin,redirection,high + tags: cve,wordpress,wp-plugin,redirection,critical http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-1000506-3d637613552d802b9173bc064749bb1c.yaml b/nuclei-templates/2018/CVE-2018-1000506-3d637613552d802b9173bc064749bb1c.yaml index bb95954878..8faaf17a83 100644 --- a/nuclei-templates/2018/CVE-2018-1000506-3d637613552d802b9173bc064749bb1c.yaml +++ b/nuclei-templates/2018/CVE-2018-1000506-3d637613552d802b9173bc064749bb1c.yaml @@ -4,7 +4,7 @@ info: name: > Metronet Tag Manager < 1.2.9 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Metronet Tag Manager version 1.2.7 contains a Cross site Request Forgery (CSRF) vulnerability in Settings page /wp-admin/options-general.php?page=metronet-tag-manager that allows anybody to do almost anything an admin can. This attack appear to be exploitable via Logged in user must following a link. This vulnerability appears to have been fixed in 1.2.9. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/metronet-tag-manager/" google-query: inurl:"/wp-content/plugins/metronet-tag-manager/" shodan-query: 'vuln:CVE-2018-1000506' - tags: cve,wordpress,wp-plugin,metronet-tag-manager,high + tags: cve,wordpress,wp-plugin,metronet-tag-manager,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-1002000-33bf8f8eb63499d2436cf7f9e5a448fa.yaml b/nuclei-templates/2018/CVE-2018-1002000-33bf8f8eb63499d2436cf7f9e5a448fa.yaml index a129eed1c9..5fed5531ea 100644 --- a/nuclei-templates/2018/CVE-2018-1002000-33bf8f8eb63499d2436cf7f9e5a448fa.yaml +++ b/nuclei-templates/2018/CVE-2018-1002000-33bf8f8eb63499d2436cf7f9e5a448fa.yaml @@ -4,7 +4,7 @@ info: name: > Arigato Autoresponder and Newsletter <= 2.5.1.8 - SQL Injection author: topscoder - severity: high + severity: critical description: > There is blind SQL injection in WordPress Arigato Autoresponder and Newsletter v2.5.1.8 These vulnerabilities require administrative privileges to exploit. There is an exploitable blind SQL injection vulnerability via the del_ids variable by POST request. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bft-autoresponder/" google-query: inurl:"/wp-content/plugins/bft-autoresponder/" shodan-query: 'vuln:CVE-2018-1002000' - tags: cve,wordpress,wp-plugin,bft-autoresponder,high + tags: cve,wordpress,wp-plugin,bft-autoresponder,critical http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-1002005-53f4d866310c8c093dd280b48d69df62.yaml b/nuclei-templates/2018/CVE-2018-1002005-53f4d866310c8c093dd280b48d69df62.yaml index 4c764fc177..8e198e1a99 100644 --- a/nuclei-templates/2018/CVE-2018-1002005-53f4d866310c8c093dd280b48d69df62.yaml +++ b/nuclei-templates/2018/CVE-2018-1002005-53f4d866310c8c093dd280b48d69df62.yaml @@ -4,7 +4,7 @@ info: name: > Arigato Autoresponder and Newsletter <= 2.5.1.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > These vulnerabilities require administrative privileges to exploit. There is an XSS vulnerability in bft_list.html.php:43: via the filter_signup_date parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bft-autoresponder/" google-query: inurl:"/wp-content/plugins/bft-autoresponder/" shodan-query: 'vuln:CVE-2018-1002005' - tags: cve,wordpress,wp-plugin,bft-autoresponder,medium + tags: cve,wordpress,wp-plugin,bft-autoresponder,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-1002006-3c224c321d9ba7c36132b340a7d491de.yaml b/nuclei-templates/2018/CVE-2018-1002006-3c224c321d9ba7c36132b340a7d491de.yaml index c5e7615c4e..b69dbf35f4 100644 --- a/nuclei-templates/2018/CVE-2018-1002006-3c224c321d9ba7c36132b340a7d491de.yaml +++ b/nuclei-templates/2018/CVE-2018-1002006-3c224c321d9ba7c36132b340a7d491de.yaml @@ -4,7 +4,7 @@ info: name: > Arigato Autoresponder and Newsletter <= 2.5.1.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > These vulnerabilities require administrative privileges to exploit. There is an XSS vulnerability in integration-contact-form.html.php:14: via POST request variable classes reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bft-autoresponder/" google-query: inurl:"/wp-content/plugins/bft-autoresponder/" shodan-query: 'vuln:CVE-2018-1002006' - tags: cve,wordpress,wp-plugin,bft-autoresponder,medium + tags: cve,wordpress,wp-plugin,bft-autoresponder,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-10102-451f562a663eda2ff6d506be6cf980bd.yaml b/nuclei-templates/2018/CVE-2018-10102-451f562a663eda2ff6d506be6cf980bd.yaml index 7af422f1fb..b9bfd35a33 100644 --- a/nuclei-templates/2018/CVE-2018-10102-451f562a663eda2ff6d506be6cf980bd.yaml +++ b/nuclei-templates/2018/CVE-2018-10102-451f562a663eda2ff6d506be6cf980bd.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.9.5 - Authenticated Stored Cross-Site Scripting via Generator Tag author: topscoder - severity: medium + severity: low description: > Before WordPress 4.9.5, the version string was not escaped in the get_the_generator function, and could lead to XSS in a generator tag. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2018-10102 metadata: shodan-query: 'vuln:CVE-2018-10102' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-10233-a6054d32c09f0a33057b0746bec92f89.yaml b/nuclei-templates/2018/CVE-2018-10233-a6054d32c09f0a33057b0746bec92f89.yaml index a9c19fed38..bd809329f3 100644 --- a/nuclei-templates/2018/CVE-2018-10233-a6054d32c09f0a33057b0746bec92f89.yaml +++ b/nuclei-templates/2018/CVE-2018-10233-a6054d32c09f0a33057b0746bec92f89.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate Member <= 2.0.6 - Multiple Cross-Site Request Forgery Issues author: topscoder - severity: high + severity: medium description: > The User Profile & Membership plugin before 2.0.7 for WordPress has no mitigations implemented against cross site request forgery attacks. This is a structural finding throughout the entire plugin. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-member/" google-query: inurl:"/wp-content/plugins/ultimate-member/" shodan-query: 'vuln:CVE-2018-10233' - tags: cve,wordpress,wp-plugin,ultimate-member,high + tags: cve,wordpress,wp-plugin,ultimate-member,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-10234-08b6d9dc73cde56d748bcfad89022c1b.yaml b/nuclei-templates/2018/CVE-2018-10234-08b6d9dc73cde56d748bcfad89022c1b.yaml index 4146885397..8d8beeaecc 100644 --- a/nuclei-templates/2018/CVE-2018-10234-08b6d9dc73cde56d748bcfad89022c1b.yaml +++ b/nuclei-templates/2018/CVE-2018-10234-08b6d9dc73cde56d748bcfad89022c1b.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate Member <= 2.0.10 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Authenticated Cross site Scripting exists in the User Profile & Membership plugin before 2.0.11 for WordPress via the "Account Deletion Custom Text" input field on the wp-admin/admin.php?page=um_options§ion=account page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-member/" google-query: inurl:"/wp-content/plugins/ultimate-member/" shodan-query: 'vuln:CVE-2018-10234' - tags: cve,wordpress,wp-plugin,ultimate-member,medium + tags: cve,wordpress,wp-plugin,ultimate-member,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-10301-81a1379b5306a9cfccfcaaf08bd3abdb.yaml b/nuclei-templates/2018/CVE-2018-10301-81a1379b5306a9cfccfcaaf08bd3abdb.yaml index 74b7933bce..2067705c08 100644 --- a/nuclei-templates/2018/CVE-2018-10301-81a1379b5306a9cfccfcaaf08bd3abdb.yaml +++ b/nuclei-templates/2018/CVE-2018-10301-81a1379b5306a9cfccfcaaf08bd3abdb.yaml @@ -4,7 +4,7 @@ info: name: > WD Instagram Feed Premium <= 1.3.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in the Web-Dorado Instagram Feed WD plugin before 1.3.1 Premium for WordPress allows remote attackers to inject arbitrary web script or HTML by passing payloads in a comment on an Instagram post. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wordpress-instagram-feed/" google-query: inurl:"/wp-content/plugins/wordpress-instagram-feed/" shodan-query: 'vuln:CVE-2018-10301' - tags: cve,wordpress,wp-plugin,wordpress-instagram-feed,medium + tags: cve,wordpress,wp-plugin,wordpress-instagram-feed,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-10309-d2ced4606aa87805c35fba9cf8d5be3f.yaml b/nuclei-templates/2018/CVE-2018-10309-d2ced4606aa87805c35fba9cf8d5be3f.yaml index f8cb88a125..b2cee78fc3 100644 --- a/nuclei-templates/2018/CVE-2018-10309-d2ced4606aa87805c35fba9cf8d5be3f.yaml +++ b/nuclei-templates/2018/CVE-2018-10309-d2ced4606aa87805c35fba9cf8d5be3f.yaml @@ -4,7 +4,7 @@ info: name: > Responsive Cookie Consent < 1.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Responsive Cookie Consent plugin before 1.8 for WordPress mishandles number fields, leading to XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/responsive-cookie-consent/" google-query: inurl:"/wp-content/plugins/responsive-cookie-consent/" shodan-query: 'vuln:CVE-2018-10309' - tags: cve,wordpress,wp-plugin,responsive-cookie-consent,medium + tags: cve,wordpress,wp-plugin,responsive-cookie-consent,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-10310-c62e1a09b5d25064f2b824e42c65ea26.yaml b/nuclei-templates/2018/CVE-2018-10310-c62e1a09b5d25064f2b824e42c65ea26.yaml index 84808c7c3e..ced981fbf7 100644 --- a/nuclei-templates/2018/CVE-2018-10310-c62e1a09b5d25064f2b824e42c65ea26.yaml +++ b/nuclei-templates/2018/CVE-2018-10310-c62e1a09b5d25064f2b824e42c65ea26.yaml @@ -4,7 +4,7 @@ info: name: > Catapult UK Cookie Consent <= 2.3.9 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > A persistent cross-site scripting vulnerability has been identified in the web interface of the Catapult UK Cookie Consent plugin before 2.3.10 for WordPress that allows the execution of arbitrary HTML/script code in the context of a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/uk-cookie-consent/" google-query: inurl:"/wp-content/plugins/uk-cookie-consent/" shodan-query: 'vuln:CVE-2018-10310' - tags: cve,wordpress,wp-plugin,uk-cookie-consent,medium + tags: cve,wordpress,wp-plugin,uk-cookie-consent,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-10371-0533a60780cf9a211a23b93d336f2dae.yaml b/nuclei-templates/2018/CVE-2018-10371-0533a60780cf9a211a23b93d336f2dae.yaml index 7388d7f422..93ca44ecd2 100644 --- a/nuclei-templates/2018/CVE-2018-10371-0533a60780cf9a211a23b93d336f2dae.yaml +++ b/nuclei-templates/2018/CVE-2018-10371-0533a60780cf9a211a23b93d336f2dae.yaml @@ -4,7 +4,7 @@ info: name: > WF Cookie Consent <= 1.1.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An issue was discovered in the wunderfarm WF Cookie Consent plugin 1.1.3 for WordPress. A persistent cross-site scripting vulnerability has been identified in the web interface of the plugin that allows the execution of arbitrary HTML/script code to be executed in a victim's web browser via a page title. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wf-cookie-consent/" google-query: inurl:"/wp-content/plugins/wf-cookie-consent/" shodan-query: 'vuln:CVE-2018-10371' - tags: cve,wordpress,wp-plugin,wf-cookie-consent,medium + tags: cve,wordpress,wp-plugin,wf-cookie-consent,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-10752-42f689e89098e402a672dac5ec8f6c89.yaml b/nuclei-templates/2018/CVE-2018-10752-42f689e89098e402a672dac5ec8f6c89.yaml index c4310adf7a..392e527130 100644 --- a/nuclei-templates/2018/CVE-2018-10752-42f689e89098e402a672dac5ec8f6c89.yaml +++ b/nuclei-templates/2018/CVE-2018-10752-42f689e89098e402a672dac5ec8f6c89.yaml @@ -4,7 +4,7 @@ info: name: > Tagregator <= 0.6 - Authenticated (Admin+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Tagregator plugin 0.6 for WordPress has stored XSS via the title field in an Add New action. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/tagregator/" google-query: inurl:"/wp-content/plugins/tagregator/" shodan-query: 'vuln:CVE-2018-10752' - tags: cve,wordpress,wp-plugin,tagregator,medium + tags: cve,wordpress,wp-plugin,tagregator,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-11105-66eb7f5c446de79e267dceb74a880097.yaml b/nuclei-templates/2018/CVE-2018-11105-66eb7f5c446de79e267dceb74a880097.yaml index b048ad54b2..7b32d833e2 100644 --- a/nuclei-templates/2018/CVE-2018-11105-66eb7f5c446de79e267dceb74a880097.yaml +++ b/nuclei-templates/2018/CVE-2018-11105-66eb7f5c446de79e267dceb74a880097.yaml @@ -4,7 +4,7 @@ info: name: > 3CX Live Chat <= 8.0.07 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > There is stored cross site scripting in the wp-live-chat-support plugin before 8.0.08 for WordPress via the "name" (aka wplc_name) and "email" (aka wplc_email) input fields to wp-json/wp_live_chat_support/v1/start_chat whenever a malicious attacker would initiate a new chat with an administrator. NOTE: this issue exists because of an incomplete fix for CVE-2018-9864. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-live-chat-support/" google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" shodan-query: 'vuln:CVE-2018-11105' - tags: cve,wordpress,wp-plugin,wp-live-chat-support,medium + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-11244-9d3718684afa0305d0420944743522e1.yaml b/nuclei-templates/2018/CVE-2018-11244-9d3718684afa0305d0420944743522e1.yaml index 8edb11d860..46acb25ebd 100644 --- a/nuclei-templates/2018/CVE-2018-11244-9d3718684afa0305d0420944743522e1.yaml +++ b/nuclei-templates/2018/CVE-2018-11244-9d3718684afa0305d0420944743522e1.yaml @@ -4,7 +4,7 @@ info: name: > BBE < 1.53 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > The BBE theme before 1.53 for WordPress allows a direct launch of an HTML editor. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/bbe/" google-query: inurl:"/wp-content/themes/bbe/" shodan-query: 'vuln:CVE-2018-11244' - tags: cve,wordpress,wp-theme,bbe,medium + tags: cve,wordpress,wp-theme,bbe,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-11366-cfd6c4a67043af04f9e4f98a73eab3fa.yaml b/nuclei-templates/2018/CVE-2018-11366-cfd6c4a67043af04f9e4f98a73eab3fa.yaml index 33875cdc56..dde41a664b 100644 --- a/nuclei-templates/2018/CVE-2018-11366-cfd6c4a67043af04f9e4f98a73eab3fa.yaml +++ b/nuclei-templates/2018/CVE-2018-11366-cfd6c4a67043af04f9e4f98a73eab3fa.yaml @@ -4,7 +4,7 @@ info: name: > Loginizer 1.3.8-1.3.9 - Unauthenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > init.php in the Loginizer plugin 1.3.8 through 1.3.9 for WordPress has Unauthenticated Stored Cross-Site Scripting (XSS) because logging is mishandled. This is fixed in 1.4.0. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/loginizer/" google-query: inurl:"/wp-content/plugins/loginizer/" shodan-query: 'vuln:CVE-2018-11366' - tags: cve,wordpress,wp-plugin,loginizer,medium + tags: cve,wordpress,wp-plugin,loginizer,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-11485-c0b1d947b4291937f57429344da7ac74.yaml b/nuclei-templates/2018/CVE-2018-11485-c0b1d947b4291937f57429344da7ac74.yaml index 39a7302e8e..9d2cfb4fe7 100644 --- a/nuclei-templates/2018/CVE-2018-11485-c0b1d947b4291937f57429344da7ac74.yaml +++ b/nuclei-templates/2018/CVE-2018-11485-c0b1d947b4291937f57429344da7ac74.yaml @@ -4,7 +4,7 @@ info: name: > Advance Search for WooCommerce < 1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The MULTIDOTS WooCommerce Quick Reports plugin 1.0.6 and earlier for WordPress is vulnerable to Stored XSS. It allows an attacker to inject malicious JavaScript code on the WooCommerce -> Orders admin page. The attack is possible by modifying the "referral_site" cookie to have an XSS payload, and placing an order. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/woo-advance-search/" google-query: inurl:"/wp-content/plugins/woo-advance-search/" shodan-query: 'vuln:CVE-2018-11485' - tags: cve,wordpress,wp-plugin,woo-advance-search,medium + tags: cve,wordpress,wp-plugin,woo-advance-search,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-11486-cd59c1c91da7bd7850f2d8eefef7525f.yaml b/nuclei-templates/2018/CVE-2018-11486-cd59c1c91da7bd7850f2d8eefef7525f.yaml index 7d5301569c..b974d03a9c 100644 --- a/nuclei-templates/2018/CVE-2018-11486-cd59c1c91da7bd7850f2d8eefef7525f.yaml +++ b/nuclei-templates/2018/CVE-2018-11486-cd59c1c91da7bd7850f2d8eefef7525f.yaml @@ -4,7 +4,7 @@ info: name: > Advance Search for WooCommerce <= 1.0.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An issue was discovered in the MULTIDOTS Advance Search for WooCommerce plugin 1.0.9 and earlier for WordPress. This plugin is vulnerable to a stored Cross-site scripting (XSS) vulnerability. A non-authenticated user can save the plugin settings and inject malicious JavaScript code in the Custom CSS textarea field, which will be loaded on every site page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/woo-advance-search/" google-query: inurl:"/wp-content/plugins/woo-advance-search/" shodan-query: 'vuln:CVE-2018-11486' - tags: cve,wordpress,wp-plugin,woo-advance-search,medium + tags: cve,wordpress,wp-plugin,woo-advance-search,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-11579-0167f45d0f324e4791bf42a58fe0f3d4.yaml b/nuclei-templates/2018/CVE-2018-11579-0167f45d0f324e4791bf42a58fe0f3d4.yaml index de1da11d84..dd1537e6ec 100644 --- a/nuclei-templates/2018/CVE-2018-11579-0167f45d0f324e4791bf42a58fe0f3d4.yaml +++ b/nuclei-templates/2018/CVE-2018-11579-0167f45d0f324e4791bf42a58fe0f3d4.yaml @@ -4,7 +4,7 @@ info: name: > Woocommerce Category Banner Management <= 1.1.0 - Missing Authorization author: topscoder - severity: medium + severity: high description: > class-woo-banner-management.php in the MULTIDOTS WooCommerce Category Banner Management plugin 1.1.0 for WordPress has an Unauthenticated Settings Change Vulnerability, related to certain wp_ajax_nopriv_ usage. Anyone can change the plugin's setting by simply sending a request with a wbm_save_shop_page_banner_data action. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/banner-management-for-woocommerce/" google-query: inurl:"/wp-content/plugins/banner-management-for-woocommerce/" shodan-query: 'vuln:CVE-2018-11579' - tags: cve,wordpress,wp-plugin,banner-management-for-woocommerce,medium + tags: cve,wordpress,wp-plugin,banner-management-for-woocommerce,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-12636-8a1c6c8c0e2f1e2277e0443f4946d572.yaml b/nuclei-templates/2018/CVE-2018-12636-8a1c6c8c0e2f1e2277e0443f4946d572.yaml index 7bca40340b..459dcbc339 100644 --- a/nuclei-templates/2018/CVE-2018-12636-8a1c6c8c0e2f1e2277e0443f4946d572.yaml +++ b/nuclei-templates/2018/CVE-2018-12636-8a1c6c8c0e2f1e2277e0443f4946d572.yaml @@ -4,7 +4,7 @@ info: name: > iThemes Security <= 7.0.2 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > The iThemes Security (better-wp-security) plugin before 7.0.3 for WordPress allows SQL Injection (by attackers with Admin privileges) via the logs page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/better-wp-security/" google-query: inurl:"/wp-content/plugins/better-wp-security/" shodan-query: 'vuln:CVE-2018-12636' - tags: cve,wordpress,wp-plugin,better-wp-security,high + tags: cve,wordpress,wp-plugin,better-wp-security,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-12895-8cfb86a7329c0d8dd964b15f121c0465.yaml b/nuclei-templates/2018/CVE-2018-12895-8cfb86a7329c0d8dd964b15f121c0465.yaml index 574b8e47de..2f0d68e119 100644 --- a/nuclei-templates/2018/CVE-2018-12895-8cfb86a7329c0d8dd964b15f121c0465.yaml +++ b/nuclei-templates/2018/CVE-2018-12895-8cfb86a7329c0d8dd964b15f121c0465.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.9.7 - Authenticated Arbitrary File Deletion author: topscoder - severity: high + severity: low description: > WordPress through 4.9.6 allows Author users to execute arbitrary code by leveraging directory traversal in the wp-admin/post.php thumb parameter, which is passed to the PHP unlink function and can delete the wp-config.php file. This is related to missing filename validation in the wp-includes/post.php wp_delete_attachment function. The attacker must have capabilities for files and posts that are normally available only to the Author, Editor, and Administrator roles. The attack methodology is to delete wp-config.php and then launch a new installation process to increase the attacker's privileges. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2018-12895 metadata: shodan-query: 'vuln:CVE-2018-12895' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-13136-a3c4d74b63323bef472fb10b591d6314.yaml b/nuclei-templates/2018/CVE-2018-13136-a3c4d74b63323bef472fb10b591d6314.yaml index 1af94e3301..33865a028f 100644 --- a/nuclei-templates/2018/CVE-2018-13136-a3c4d74b63323bef472fb10b591d6314.yaml +++ b/nuclei-templates/2018/CVE-2018-13136-a3c4d74b63323bef472fb10b591d6314.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate Member <= 2.0.17 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Ultimate Member (aka ultimatemember) plugin before 2.0.18 for WordPress has XSS via the wp-admin settings screen. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-member/" google-query: inurl:"/wp-content/plugins/ultimate-member/" shodan-query: 'vuln:CVE-2018-13136' - tags: cve,wordpress,wp-plugin,ultimate-member,medium + tags: cve,wordpress,wp-plugin,ultimate-member,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-13137-ee6754b66c3dcc79f507ad42121825d8.yaml b/nuclei-templates/2018/CVE-2018-13137-ee6754b66c3dcc79f507ad42121825d8.yaml index 4a145b78cd..3553743616 100644 --- a/nuclei-templates/2018/CVE-2018-13137-ee6754b66c3dcc79f507ad42121825d8.yaml +++ b/nuclei-templates/2018/CVE-2018-13137-ee6754b66c3dcc79f507ad42121825d8.yaml @@ -4,7 +4,7 @@ info: name: > Events Manager <= 5.9.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Events Manager plugin 5.9.4 for WordPress has XSS via the dbem_event_reapproved_email_body parameter to the wp-admin/edit.php?post_type=event&page=events-manager-options URI. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/events-manager/" google-query: inurl:"/wp-content/plugins/events-manager/" shodan-query: 'vuln:CVE-2018-13137' - tags: cve,wordpress,wp-plugin,events-manager,medium + tags: cve,wordpress,wp-plugin,events-manager,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-13832-adf6fd1cec72a101892ceb2db93bece6.yaml b/nuclei-templates/2018/CVE-2018-13832-adf6fd1cec72a101892ceb2db93bece6.yaml index 55653e7fe5..9c2bcd8171 100644 --- a/nuclei-templates/2018/CVE-2018-13832-adf6fd1cec72a101892ceb2db93bece6.yaml +++ b/nuclei-templates/2018/CVE-2018-13832-adf6fd1cec72a101892ceb2db93bece6.yaml @@ -4,7 +4,7 @@ info: name: > All In One Favicon <= 4.6 - Authenticated (Admin+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Multiple Persistent cross-site scripting (XSS) issues in the Techotronic all-in-one-favicon (aka All In One Favicon) plugin 4.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via Apple-Text, GIF-Text, ICO-Text, PNG-Text, or JPG-Text. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/all-in-one-favicon/" google-query: inurl:"/wp-content/plugins/all-in-one-favicon/" shodan-query: 'vuln:CVE-2018-13832' - tags: cve,wordpress,wp-plugin,all-in-one-favicon,medium + tags: cve,wordpress,wp-plugin,all-in-one-favicon,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-14028-70d9b727752f76af972d40070c1204ab.yaml b/nuclei-templates/2018/CVE-2018-14028-70d9b727752f76af972d40070c1204ab.yaml index 0f87a36608..ebcf3cec40 100644 --- a/nuclei-templates/2018/CVE-2018-14028-70d9b727752f76af972d40070c1204ab.yaml +++ b/nuclei-templates/2018/CVE-2018-14028-70d9b727752f76af972d40070c1204ab.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 6.4.3 - Authenticated(Administrator+) PHP File Upload author: topscoder - severity: medium + severity: low description: > In all current versions of WordPress Core before 6.4.3, plugins uploaded via the admin area are not verified as being ZIP files. This allows for PHP files to be uploaded. Once a PHP file is uploaded, the plugin extraction fails, but the PHP file remains in a predictable wp-content/uploads location, allowing for an attacker to then execute the file. This represents a security risk in limited scenarios where an attacker (who does have the required capabilities for plugin uploads) cannot simply place arbitrary PHP code into a valid plugin ZIP file and upload that plugin, because a machine's wp-content/plugins directory permissions were set up to block all new plugins. Please note that this requires administrator or super administrator permissions(on multisite installations) and only impacts heavily locked-down installations where even these users cannot install new plugins. CVE-2024-31210 may be a duplicate of this issue. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2018-14028 metadata: shodan-query: 'vuln:CVE-2018-14028' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-14071-381d6cb0faea51f097b85258ee0a1587.yaml b/nuclei-templates/2018/CVE-2018-14071-381d6cb0faea51f097b85258ee0a1587.yaml index 3d7d0a2257..c155673f08 100644 --- a/nuclei-templates/2018/CVE-2018-14071-381d6cb0faea51f097b85258ee0a1587.yaml +++ b/nuclei-templates/2018/CVE-2018-14071-381d6cb0faea51f097b85258ee0a1587.yaml @@ -4,7 +4,7 @@ info: name: > Geo Mashup - < 1.10.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Geo Mashup plugin before 1.10.4 for WordPress has insufficient sanitization of post editor and other user input. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/geo-mashup/" google-query: inurl:"/wp-content/plugins/geo-mashup/" shodan-query: 'vuln:CVE-2018-14071' - tags: cve,wordpress,wp-plugin,geo-mashup,medium + tags: cve,wordpress,wp-plugin,geo-mashup,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-14846-962810e9bfe68aabdf565feb933a98a3.yaml b/nuclei-templates/2018/CVE-2018-14846-962810e9bfe68aabdf565feb933a98a3.yaml index 258745010d..a6baf5498c 100644 --- a/nuclei-templates/2018/CVE-2018-14846-962810e9bfe68aabdf565feb933a98a3.yaml +++ b/nuclei-templates/2018/CVE-2018-14846-962810e9bfe68aabdf565feb933a98a3.yaml @@ -4,7 +4,7 @@ info: name: > Multi Step Form <= 1.2.5 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Mondula Multi Step Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘fw_wizard_save’ action in versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The following parameters are affected: data[wizard][steps][0][title] @@ -27,7 +27,7 @@ info: fofa-query: "wp-content/plugins/multi-step-form/" google-query: inurl:"/wp-content/plugins/multi-step-form/" shodan-query: 'vuln:CVE-2018-14846' - tags: cve,wordpress,wp-plugin,multi-step-form,medium + tags: cve,wordpress,wp-plugin,multi-step-form,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-16164-209b175b2921345ce72870696dcb5d5d.yaml b/nuclei-templates/2018/CVE-2018-16164-209b175b2921345ce72870696dcb5d5d.yaml index 6326a8f5e6..a47b4c1fa6 100644 --- a/nuclei-templates/2018/CVE-2018-16164-209b175b2921345ce72870696dcb5d5d.yaml +++ b/nuclei-templates/2018/CVE-2018-16164-209b175b2921345ce72870696dcb5d5d.yaml @@ -4,7 +4,7 @@ info: name: > EventCalendar <= 1.1.21 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in Event Calendar WD version 1.1.21 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/event-calendar-wd/" google-query: inurl:"/wp-content/plugins/event-calendar-wd/" shodan-query: 'vuln:CVE-2018-16164' - tags: cve,wordpress,wp-plugin,event-calendar-wd,medium + tags: cve,wordpress,wp-plugin,event-calendar-wd,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-16173-6d3b26eeb9dd4b508b1794df4cfed998.yaml b/nuclei-templates/2018/CVE-2018-16173-6d3b26eeb9dd4b508b1794df4cfed998.yaml index d9fb7ac021..fadf7fc22f 100644 --- a/nuclei-templates/2018/CVE-2018-16173-6d3b26eeb9dd4b508b1794df4cfed998.yaml +++ b/nuclei-templates/2018/CVE-2018-16173-6d3b26eeb9dd4b508b1794df4cfed998.yaml @@ -4,7 +4,7 @@ info: name: > LearnPress <= 3.0.12 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in LearnPress prior to version 3.1.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/learnpress/" google-query: inurl:"/wp-content/plugins/learnpress/" shodan-query: 'vuln:CVE-2018-16173' - tags: cve,wordpress,wp-plugin,learnpress,medium + tags: cve,wordpress,wp-plugin,learnpress,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-16175-d5338c51a39110eb82434918065d2ccd.yaml b/nuclei-templates/2018/CVE-2018-16175-d5338c51a39110eb82434918065d2ccd.yaml index a9ceb7e705..6f788a0551 100644 --- a/nuclei-templates/2018/CVE-2018-16175-d5338c51a39110eb82434918065d2ccd.yaml +++ b/nuclei-templates/2018/CVE-2018-16175-d5338c51a39110eb82434918065d2ccd.yaml @@ -4,7 +4,7 @@ info: name: > LearnPress <= 3.0.12 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > SQL injection vulnerability in the LearnPress prior to version 3.1.0 allows attacker with administrator rights to execute arbitrary SQL commands via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/learnpress/" google-query: inurl:"/wp-content/plugins/learnpress/" shodan-query: 'vuln:CVE-2018-16175' - tags: cve,wordpress,wp-plugin,learnpress,high + tags: cve,wordpress,wp-plugin,learnpress,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-16204-877bab778ddda7032844b19d4fdbee7a.yaml b/nuclei-templates/2018/CVE-2018-16204-877bab778ddda7032844b19d4fdbee7a.yaml index 508898201e..d3bc890e93 100644 --- a/nuclei-templates/2018/CVE-2018-16204-877bab778ddda7032844b19d4fdbee7a.yaml +++ b/nuclei-templates/2018/CVE-2018-16204-877bab778ddda7032844b19d4fdbee7a.yaml @@ -4,7 +4,7 @@ info: name: > XML Sitemaps <= 4.0.9 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Cross-site scripting vulnerability in Google XML Sitemaps Version 4.0.9 and earlier allows remote authenticated attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/google-sitemap-generator/" google-query: inurl:"/wp-content/plugins/google-sitemap-generator/" shodan-query: 'vuln:CVE-2018-16204' - tags: cve,wordpress,wp-plugin,google-sitemap-generator,medium + tags: cve,wordpress,wp-plugin,google-sitemap-generator,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-16206-e9caa2ebc5663770aed9ca1501187910.yaml b/nuclei-templates/2018/CVE-2018-16206-e9caa2ebc5663770aed9ca1501187910.yaml index ff20a8c8eb..40b99db86b 100644 --- a/nuclei-templates/2018/CVE-2018-16206-e9caa2ebc5663770aed9ca1501187910.yaml +++ b/nuclei-templates/2018/CVE-2018-16206-e9caa2ebc5663770aed9ca1501187910.yaml @@ -4,7 +4,7 @@ info: name: > spam-byebye <= 2.2.1 - Unauthenticated Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in WordPress plugin spam-byebye 2.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/spam-byebye/" google-query: inurl:"/wp-content/plugins/spam-byebye/" shodan-query: 'vuln:CVE-2018-16206' - tags: cve,wordpress,wp-plugin,spam-byebye,medium + tags: cve,wordpress,wp-plugin,spam-byebye,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-16285-656244efbeeadce5c71da45e29bb9a67.yaml b/nuclei-templates/2018/CVE-2018-16285-656244efbeeadce5c71da45e29bb9a67.yaml index caab77e7c0..413f5204be 100644 --- a/nuclei-templates/2018/CVE-2018-16285-656244efbeeadce5c71da45e29bb9a67.yaml +++ b/nuclei-templates/2018/CVE-2018-16285-656244efbeeadce5c71da45e29bb9a67.yaml @@ -4,7 +4,7 @@ info: name: > UserPro <= 4.9.23 - Unauthenticated Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The UserPro plugin through 4.9.23 for WordPress allows XSS via the shortcode parameter in a userpro_shortcode_template action to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/userpro/" google-query: inurl:"/wp-content/plugins/userpro/" shodan-query: 'vuln:CVE-2018-16285' - tags: cve,wordpress,wp-plugin,userpro,medium + tags: cve,wordpress,wp-plugin,userpro,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-16966-6943b3fa4f51347e8c8fc20d043e8814.yaml b/nuclei-templates/2018/CVE-2018-16966-6943b3fa4f51347e8c8fc20d043e8814.yaml index 58eaa5e9ab..ae75ac530c 100644 --- a/nuclei-templates/2018/CVE-2018-16966-6943b3fa4f51347e8c8fc20d043e8814.yaml +++ b/nuclei-templates/2018/CVE-2018-16966-6943b3fa4f51347e8c8fc20d043e8814.yaml @@ -4,7 +4,7 @@ info: name: > File Manager <= 3.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > There is a CSRF vulnerability in the File Manager plugin 3.0 for WordPress via the page=wp_file_manager_root public_path parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-file-manager/" google-query: inurl:"/wp-content/plugins/wp-file-manager/" shodan-query: 'vuln:CVE-2018-16966' - tags: cve,wordpress,wp-plugin,wp-file-manager,high + tags: cve,wordpress,wp-plugin,wp-file-manager,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-16967-e2709c74f557b8f05efa6466674d741e.yaml b/nuclei-templates/2018/CVE-2018-16967-e2709c74f557b8f05efa6466674d741e.yaml index 0ac513ef7e..250bbf6b20 100644 --- a/nuclei-templates/2018/CVE-2018-16967-e2709c74f557b8f05efa6466674d741e.yaml +++ b/nuclei-templates/2018/CVE-2018-16967-e2709c74f557b8f05efa6466674d741e.yaml @@ -4,7 +4,7 @@ info: name: > File Manager <= 3.0 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > There is an XSS vulnerability in the File Manager plugin 3.0 for WordPress via the page=wp_file_manager_root public_path parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-file-manager/" google-query: inurl:"/wp-content/plugins/wp-file-manager/" shodan-query: 'vuln:CVE-2018-16967' - tags: cve,wordpress,wp-plugin,wp-file-manager,medium + tags: cve,wordpress,wp-plugin,wp-file-manager,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-17138-1318af711c3fe0fec9bc7d351421ab5e.yaml b/nuclei-templates/2018/CVE-2018-17138-1318af711c3fe0fec9bc7d351421ab5e.yaml index ac3597a64c..eb06b409ad 100644 --- a/nuclei-templates/2018/CVE-2018-17138-1318af711c3fe0fec9bc7d351421ab5e.yaml +++ b/nuclei-templates/2018/CVE-2018-17138-1318af711c3fe0fec9bc7d351421ab5e.yaml @@ -4,7 +4,7 @@ info: name: > Jibu Pro <= 1.7 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Jibu Pro plugin through 1.7 for WordPress is prone to Stored XSS via the wp-content/plugins/jibu-pro/quiz_action.php name (aka Quiz Name) field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/jibu-pro/" google-query: inurl:"/wp-content/plugins/jibu-pro/" shodan-query: 'vuln:CVE-2018-17138' - tags: cve,wordpress,wp-plugin,jibu-pro,medium + tags: cve,wordpress,wp-plugin,jibu-pro,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-17140-05b1f0bb86ade4c6c32252e799c74986.yaml b/nuclei-templates/2018/CVE-2018-17140-05b1f0bb86ade4c6c32252e799c74986.yaml index 0667ed9484..4d856ca5e8 100644 --- a/nuclei-templates/2018/CVE-2018-17140-05b1f0bb86ade4c6c32252e799c74986.yaml +++ b/nuclei-templates/2018/CVE-2018-17140-05b1f0bb86ade4c6c32252e799c74986.yaml @@ -4,7 +4,7 @@ info: name: > Quizlord <= 2.0 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Quizlord plugin through 2.0 for WordPress is prone to Stored XSS via the title parameter in a ql_insert action to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/quizlord/" google-query: inurl:"/wp-content/plugins/quizlord/" shodan-query: 'vuln:CVE-2018-17140' - tags: cve,wordpress,wp-plugin,quizlord,medium + tags: cve,wordpress,wp-plugin,quizlord,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-17583-87d8a616e4f6cf2eb5659e011debac27.yaml b/nuclei-templates/2018/CVE-2018-17583-87d8a616e4f6cf2eb5659e011debac27.yaml index 0c586d87a8..b22fbc6ef8 100644 --- a/nuclei-templates/2018/CVE-2018-17583-87d8a616e4f6cf2eb5659e011debac27.yaml +++ b/nuclei-templates/2018/CVE-2018-17583-87d8a616e4f6cf2eb5659e011debac27.yaml @@ -4,7 +4,7 @@ info: name: > WP Fastest Cache <= 0.8.8.5 - Cross-Site Scripting via the rules[0][content] parameter in a wpfc_save_exclude_pages action author: topscoder - severity: medium + severity: high description: > The WP Fastest Cache plugin 0.8.8.5 for WordPress has XSS via the rules[0][content] parameter in a wpfc_save_exclude_pages action. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-fastest-cache/" google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" shodan-query: 'vuln:CVE-2018-17583' - tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium + tags: cve,wordpress,wp-plugin,wp-fastest-cache,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-17584-c154f039f669a6109ec8e5a85b87164a.yaml b/nuclei-templates/2018/CVE-2018-17584-c154f039f669a6109ec8e5a85b87164a.yaml index bc54070056..e8fc50e0a1 100644 --- a/nuclei-templates/2018/CVE-2018-17584-c154f039f669a6109ec8e5a85b87164a.yaml +++ b/nuclei-templates/2018/CVE-2018-17584-c154f039f669a6109ec8e5a85b87164a.yaml @@ -4,7 +4,7 @@ info: name: > WP Fastest Cache <= 0.8.8.5 - Cross-Site Request Forgery via page to wpfastestcacheoptions author: topscoder - severity: high + severity: medium description: > The WP Fastest Cache plugin 0.8.8.5 for WordPress has CSRF via the wp-admin/admin.php wpfastestcacheoptions page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-fastest-cache/" google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" shodan-query: 'vuln:CVE-2018-17584' - tags: cve,wordpress,wp-plugin,wp-fastest-cache,high + tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-17585-5c10da7a2c723b79d143625ddb915594.yaml b/nuclei-templates/2018/CVE-2018-17585-5c10da7a2c723b79d143625ddb915594.yaml index 9c32688447..df69db7627 100644 --- a/nuclei-templates/2018/CVE-2018-17585-5c10da7a2c723b79d143625ddb915594.yaml +++ b/nuclei-templates/2018/CVE-2018-17585-5c10da7a2c723b79d143625ddb915594.yaml @@ -4,7 +4,7 @@ info: name: > WP Fastest Cache <= 0.8.8.5 - Cross-Site Scripting via wpFastestCachePage options, wpFastestCachePreload_number or wpFastestCacheLanguage parameter author: topscoder - severity: medium + severity: high description: > The WP Fastest Cache plugin 0.8.8.5 for WordPress has XSS via the wpfastestcacheoptions wpFastestCachePreload_number or wpFastestCacheLanguage parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-fastest-cache/" google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" shodan-query: 'vuln:CVE-2018-17585' - tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium + tags: cve,wordpress,wp-plugin,wp-fastest-cache,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-17586-34c60f50f8424840987ed5ec10c2ec3b.yaml b/nuclei-templates/2018/CVE-2018-17586-34c60f50f8424840987ed5ec10c2ec3b.yaml index aa0ba67b77..e14f5989da 100644 --- a/nuclei-templates/2018/CVE-2018-17586-34c60f50f8424840987ed5ec10c2ec3b.yaml +++ b/nuclei-templates/2018/CVE-2018-17586-34c60f50f8424840987ed5ec10c2ec3b.yaml @@ -4,7 +4,7 @@ info: name: > WP Fastest Cache <= 0.8.8.5 - Cross-Site Scripting via rules[0][content] parameter author: topscoder - severity: medium + severity: high description: > The WP Fastest Cache plugin 0.8.8.5 for WordPress has XSS via the rules[0][content] parameter in a wpfc_save_timeout_pages action. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-fastest-cache/" google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" shodan-query: 'vuln:CVE-2018-17586' - tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium + tags: cve,wordpress,wp-plugin,wp-fastest-cache,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-17866-c040e1b7f1d715ec00a05b885aa3bea9.yaml b/nuclei-templates/2018/CVE-2018-17866-c040e1b7f1d715ec00a05b885aa3bea9.yaml index 7577fbe548..4904debfca 100644 --- a/nuclei-templates/2018/CVE-2018-17866-c040e1b7f1d715ec00a05b885aa3bea9.yaml +++ b/nuclei-templates/2018/CVE-2018-17866-c040e1b7f1d715ec00a05b885aa3bea9.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate Member <= 2.0.27 - Multiple Cross-Site Scripting vulnerabilities author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in includes/core/um-actions-login.php in the "Ultimate Member - User Profile & Membership" plugin before 2.0.28 for WordPress allow remote attackers to inject arbitrary web script or HTML via the "Primary button Text" or "Second button text" field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-member/" google-query: inurl:"/wp-content/plugins/ultimate-member/" shodan-query: 'vuln:CVE-2018-17866' - tags: cve,wordpress,wp-plugin,ultimate-member,medium + tags: cve,wordpress,wp-plugin,ultimate-member,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-17884-d1ded0c2f1b1f7a73c6770c120be62b6.yaml b/nuclei-templates/2018/CVE-2018-17884-d1ded0c2f1b1f7a73c6770c120be62b6.yaml index 39f592c03c..a737b84bcb 100644 --- a/nuclei-templates/2018/CVE-2018-17884-d1ded0c2f1b1f7a73c6770c120be62b6.yaml +++ b/nuclei-templates/2018/CVE-2018-17884-d1ded0c2f1b1f7a73c6770c120be62b6.yaml @@ -4,7 +4,7 @@ info: name: > Gwolle Guestbook <= 2.5.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > XSS exists in admin/gb-dashboard-widget.php in the Gwolle Guestbook (gwolle-gb) plugin before 2.5.4 for WordPress via the PATH_INFO to wp-admin/index.php reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gwolle-gb/" google-query: inurl:"/wp-content/plugins/gwolle-gb/" shodan-query: 'vuln:CVE-2018-17884' - tags: cve,wordpress,wp-plugin,gwolle-gb,medium + tags: cve,wordpress,wp-plugin,gwolle-gb,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-17947-2c0772cee08d9dbe384d352f3239ef5e.yaml b/nuclei-templates/2018/CVE-2018-17947-2c0772cee08d9dbe384d352f3239ef5e.yaml index 1a752a6da5..c0d8e29279 100644 --- a/nuclei-templates/2018/CVE-2018-17947-2c0772cee08d9dbe384d352f3239ef5e.yaml +++ b/nuclei-templates/2018/CVE-2018-17947-2c0772cee08d9dbe384d352f3239ef5e.yaml @@ -4,7 +4,7 @@ info: name: > Snazzy Maps <= 1.1.4 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Snazzy Maps plugin before 1.1.5 for WordPress has XSS via the text or tab parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/snazzy-maps/" google-query: inurl:"/wp-content/plugins/snazzy-maps/" shodan-query: 'vuln:CVE-2018-17947' - tags: cve,wordpress,wp-plugin,snazzy-maps,medium + tags: cve,wordpress,wp-plugin,snazzy-maps,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-18017-f81d8e9ecaded3d70e2eeaa0f98dacf3.yaml b/nuclei-templates/2018/CVE-2018-18017-f81d8e9ecaded3d70e2eeaa0f98dacf3.yaml index e5e9024301..03869b84af 100644 --- a/nuclei-templates/2018/CVE-2018-18017-f81d8e9ecaded3d70e2eeaa0f98dacf3.yaml +++ b/nuclei-templates/2018/CVE-2018-18017-f81d8e9ecaded3d70e2eeaa0f98dacf3.yaml @@ -4,7 +4,7 @@ info: name: > Slideshow Gallery <= 1.6.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > XSS exists in the Tribulant Slideshow Gallery plugin 1.6.8 for WordPress via the wp-admin/admin.php?page=slideshow-galleries&method=save Gallery[id] or Gallery[title] parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/slideshow-gallery/" google-query: inurl:"/wp-content/plugins/slideshow-gallery/" shodan-query: 'vuln:CVE-2018-18017' - tags: cve,wordpress,wp-plugin,slideshow-gallery,medium + tags: cve,wordpress,wp-plugin,slideshow-gallery,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-18018-ffb6abfc1462cb6dac9fb7d1f9f94e2a.yaml b/nuclei-templates/2018/CVE-2018-18018-ffb6abfc1462cb6dac9fb7d1f9f94e2a.yaml index 9e73be5d71..72eea9313c 100644 --- a/nuclei-templates/2018/CVE-2018-18018-ffb6abfc1462cb6dac9fb7d1f9f94e2a.yaml +++ b/nuclei-templates/2018/CVE-2018-18018-ffb6abfc1462cb6dac9fb7d1f9f94e2a.yaml @@ -4,7 +4,7 @@ info: name: > Slideshow Gallery <= 1.6.8 - SQL Injection author: topscoder - severity: high + severity: critical description: > SQL Injection exists in the Tribulant Slideshow Gallery plugin 1.6.8 for WordPress via the wp-admin/admin.php?page=slideshow-galleries&method=save Gallery[id] or Gallery[title] parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/slideshow-gallery/" google-query: inurl:"/wp-content/plugins/slideshow-gallery/" shodan-query: 'vuln:CVE-2018-18018' - tags: cve,wordpress,wp-plugin,slideshow-gallery,high + tags: cve,wordpress,wp-plugin,slideshow-gallery,critical http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-18019-c799988a889ed03a659b8598e8dac08b.yaml b/nuclei-templates/2018/CVE-2018-18019-c799988a889ed03a659b8598e8dac08b.yaml index a8f66860bf..dd4890fd7e 100644 --- a/nuclei-templates/2018/CVE-2018-18019-c799988a889ed03a659b8598e8dac08b.yaml +++ b/nuclei-templates/2018/CVE-2018-18019-c799988a889ed03a659b8598e8dac08b.yaml @@ -4,7 +4,7 @@ info: name: > Slideshow Gallery <= 1.6.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > XSS exists in the Tribulant Slideshow Gallery plugin 1.6.8 for WordPress via the wp-admin/admin.php?page=slideshow-slides&method=save Slide[title], Slide[media_file], or Slide[image_url] parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/slideshow-gallery/" google-query: inurl:"/wp-content/plugins/slideshow-gallery/" shodan-query: 'vuln:CVE-2018-18019' - tags: cve,wordpress,wp-plugin,slideshow-gallery,medium + tags: cve,wordpress,wp-plugin,slideshow-gallery,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-18373-df4750e020fd99b1db3b233a3a40020d.yaml b/nuclei-templates/2018/CVE-2018-18373-df4750e020fd99b1db3b233a3a40020d.yaml index a7588b2026..41d1bdffde 100644 --- a/nuclei-templates/2018/CVE-2018-18373-df4750e020fd99b1db3b233a3a40020d.yaml +++ b/nuclei-templates/2018/CVE-2018-18373-df4750e020fd99b1db3b233a3a40020d.yaml @@ -4,7 +4,7 @@ info: name: > Support Board for WordPress <= 1.2.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > In the Schiocco "Support Board - Chat And Help Desk" plugin 1.2.3 for WordPress, a Stored XSS vulnerability has been discovered in file upload areas in the Chat and Help Desk sections via the msg parameter in a /wp-admin/admin-ajax.php sb_ajax_add_message action. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/supportboard/" google-query: inurl:"/wp-content/plugins/supportboard/" shodan-query: 'vuln:CVE-2018-18373' - tags: cve,wordpress,wp-plugin,supportboard,medium + tags: cve,wordpress,wp-plugin,supportboard,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-18379-d8cb62391dd6a20fc4b59fa893c8943a.yaml b/nuclei-templates/2018/CVE-2018-18379-d8cb62391dd6a20fc4b59fa893c8943a.yaml index 7a24a51b59..c9fdfa0921 100644 --- a/nuclei-templates/2018/CVE-2018-18379-d8cb62391dd6a20fc4b59fa893c8943a.yaml +++ b/nuclei-templates/2018/CVE-2018-18379-d8cb62391dd6a20fc4b59fa893c8943a.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Pro <= 2.0.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The elementor-edit-template class in wp-admin/customize.php in the Elementor Pro plugin before 2.0.10 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/elementor-pro/" google-query: inurl:"/wp-content/plugins/elementor-pro/" shodan-query: 'vuln:CVE-2018-18379' - tags: cve,wordpress,wp-plugin,elementor-pro,medium + tags: cve,wordpress,wp-plugin,elementor-pro,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-18460-39656d176cfde17eb173675dd34ae675.yaml b/nuclei-templates/2018/CVE-2018-18460-39656d176cfde17eb173675dd34ae675.yaml index 46f5165e97..012ca85b2a 100644 --- a/nuclei-templates/2018/CVE-2018-18460-39656d176cfde17eb173675dd34ae675.yaml +++ b/nuclei-templates/2018/CVE-2018-18460-39656d176cfde17eb173675dd34ae675.yaml @@ -4,7 +4,7 @@ info: name: > WP Live Chat Support <= 8.0.15 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > XSS exists in the wp-live-chat-support v8.0.15 plugin for WordPress via the modules/gdpr.php term parameter in a wp-admin/admin.php wplivechat-menu-gdpr-page request. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-live-chat-support/" google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" shodan-query: 'vuln:CVE-2018-18460' - tags: cve,wordpress,wp-plugin,wp-live-chat-support,medium + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-18872-8b25a4024805d97b0bbe39b2b083bd09.yaml b/nuclei-templates/2018/CVE-2018-18872-8b25a4024805d97b0bbe39b2b083bd09.yaml index 3f1b5e1796..3bfbb25a73 100644 --- a/nuclei-templates/2018/CVE-2018-18872-8b25a4024805d97b0bbe39b2b083bd09.yaml +++ b/nuclei-templates/2018/CVE-2018-18872-8b25a4024805d97b0bbe39b2b083bd09.yaml @@ -4,7 +4,7 @@ info: name: > Calendar <= 1.3.10 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Kieran O'Shea Calendar plugin before 1.3.11 for WordPress has Stored XSS via the event_title parameter in a wp-admin/admin.php?page=calendar add action, or the category name during category creation at the wp-admin/admin.php?page=calendar-categories URI. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/calendar/" google-query: inurl:"/wp-content/plugins/calendar/" shodan-query: 'vuln:CVE-2018-18872' - tags: cve,wordpress,wp-plugin,calendar,medium + tags: cve,wordpress,wp-plugin,calendar,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-18919-74293ce2d79dd2a7920de3a46ed52f1d.yaml b/nuclei-templates/2018/CVE-2018-18919-74293ce2d79dd2a7920de3a46ed52f1d.yaml index baa3921755..fb5504f7ba 100644 --- a/nuclei-templates/2018/CVE-2018-18919-74293ce2d79dd2a7920de3a46ed52f1d.yaml +++ b/nuclei-templates/2018/CVE-2018-18919-74293ce2d79dd2a7920de3a46ed52f1d.yaml @@ -4,7 +4,7 @@ info: name: > WP Editor.md – The Perfect WordPress Markdown Editor < 10.0.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The WP Editor.md plugin before 10.0.4 for WordPress allows XSS via the comment area. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-editormd/" google-query: inurl:"/wp-content/plugins/wp-editormd/" shodan-query: 'vuln:CVE-2018-18919' - tags: cve,wordpress,wp-plugin,wp-editormd,medium + tags: cve,wordpress,wp-plugin,wp-editormd,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-19287-e6738d3799e5a12b0457c2f4dc805c15.yaml b/nuclei-templates/2018/CVE-2018-19287-e6738d3799e5a12b0457c2f4dc805c15.yaml index a1491bf5eb..61a0a3b935 100644 --- a/nuclei-templates/2018/CVE-2018-19287-e6738d3799e5a12b0457c2f4dc805c15.yaml +++ b/nuclei-templates/2018/CVE-2018-19287-e6738d3799e5a12b0457c2f4dc805c15.yaml @@ -4,7 +4,7 @@ info: name: > Ninja Forms Contact Form <= 3.3.17 - Cross-Site Scripting via begin_date, end_date, or form_id Parameter author: topscoder - severity: medium + severity: high description: > XSS in the Ninja Forms plugin before 3.3.18 for WordPress allows Remote Attackers to execute JavaScript via the includes/Admin/Menus/Submissions.php (aka submissions page) begin_date, end_date, or form_id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ninja-forms/" google-query: inurl:"/wp-content/plugins/ninja-forms/" shodan-query: 'vuln:CVE-2018-19287' - tags: cve,wordpress,wp-plugin,ninja-forms,medium + tags: cve,wordpress,wp-plugin,ninja-forms,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-19370-3ea36d65c6ea5b35072fe01e09307dfa.yaml b/nuclei-templates/2018/CVE-2018-19370-3ea36d65c6ea5b35072fe01e09307dfa.yaml index b14490f4fe..90e1ffc41f 100644 --- a/nuclei-templates/2018/CVE-2018-19370-3ea36d65c6ea5b35072fe01e09307dfa.yaml +++ b/nuclei-templates/2018/CVE-2018-19370-3ea36d65c6ea5b35072fe01e09307dfa.yaml @@ -4,7 +4,7 @@ info: name: > Yoast SEO <= 9.1.0 - Race Condition to Remote Code Execution author: topscoder - severity: medium + severity: critical description: > A Race condition vulnerability in unzip_file in admin/import/class-import-settings.php in the Yoast SEO (wordpress-seo) plugin before 9.2.0 for WordPress allows an SEO Manager to perform command execution on the Operating System via a ZIP import. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wordpress-seo/" google-query: inurl:"/wp-content/plugins/wordpress-seo/" shodan-query: 'vuln:CVE-2018-19370' - tags: cve,wordpress,wp-plugin,wordpress-seo,medium + tags: cve,wordpress,wp-plugin,wordpress-seo,critical http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-19487-8605cf70b09f39b80921d3235eaa5a54.yaml b/nuclei-templates/2018/CVE-2018-19487-8605cf70b09f39b80921d3235eaa5a54.yaml index bd35a854e4..789e7950c6 100644 --- a/nuclei-templates/2018/CVE-2018-19487-8605cf70b09f39b80921d3235eaa5a54.yaml +++ b/nuclei-templates/2018/CVE-2018-19487-8605cf70b09f39b80921d3235eaa5a54.yaml @@ -14,17 +14,17 @@ info: cvss-score: 5.3 cve-id: CVE-2018-19487 metadata: - fofa-query: "wp-content/plugins/jobcareer/" - google-query: inurl:"/wp-content/plugins/jobcareer/" + fofa-query: "wp-content/plugins/wp-jobhunt/" + google-query: inurl:"/wp-content/plugins/wp-jobhunt/" shodan-query: 'vuln:CVE-2018-19487' - tags: cve,wordpress,wp-plugin,jobcareer,medium + tags: cve,wordpress,wp-plugin,wp-jobhunt,medium http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/jobcareer/readme.txt" + - "{{BaseURL}}/wp-content/plugins/wp-jobhunt/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "jobcareer" + - "wp-jobhunt" part: body - type: dsl dsl: - - compare_versions(version, '<= 2.4') \ No newline at end of file + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/2018/CVE-2018-19488-8b266025d0f3695c542ad07de2e9b34c.yaml b/nuclei-templates/2018/CVE-2018-19488-8b266025d0f3695c542ad07de2e9b34c.yaml index f9bcfc8a93..562a6283be 100644 --- a/nuclei-templates/2018/CVE-2018-19488-8b266025d0f3695c542ad07de2e9b34c.yaml +++ b/nuclei-templates/2018/CVE-2018-19488-8b266025d0f3695c542ad07de2e9b34c.yaml @@ -14,17 +14,17 @@ info: cvss-score: 8.8 cve-id: CVE-2018-19488 metadata: - fofa-query: "wp-content/plugins/jobcareer/" - google-query: inurl:"/wp-content/plugins/jobcareer/" + fofa-query: "wp-content/plugins/wp-jobhunt/" + google-query: inurl:"/wp-content/plugins/wp-jobhunt/" shodan-query: 'vuln:CVE-2018-19488' - tags: cve,wordpress,wp-plugin,jobcareer,high + tags: cve,wordpress,wp-plugin,wp-jobhunt,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/jobcareer/readme.txt" + - "{{BaseURL}}/wp-content/plugins/wp-jobhunt/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "jobcareer" + - "wp-jobhunt" part: body - type: dsl dsl: - - compare_versions(version, '< 2.4.1') \ No newline at end of file + - compare_versions(version, '< 2.4') \ No newline at end of file diff --git a/nuclei-templates/2018/CVE-2018-19564-139542bed79cb071600ed5c3c1e9d45c.yaml b/nuclei-templates/2018/CVE-2018-19564-139542bed79cb071600ed5c3c1e9d45c.yaml index 9b184344f5..219d6e8768 100644 --- a/nuclei-templates/2018/CVE-2018-19564-139542bed79cb071600ed5c3c1e9d45c.yaml +++ b/nuclei-templates/2018/CVE-2018-19564-139542bed79cb071600ed5c3c1e9d45c.yaml @@ -4,7 +4,7 @@ info: name: > Easy Testimonials <= 3.5.2 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Stored XSS was discovered in the Easy Testimonials plugin 3.5.2 for WordPress. Three wp-admin/post.php parameters (_ikcf_client and _ikcf_position and _ikcf_other) have Cross-Site Scripting. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-testimonials/" google-query: inurl:"/wp-content/plugins/easy-testimonials/" shodan-query: 'vuln:CVE-2018-19564' - tags: cve,wordpress,wp-plugin,easy-testimonials,medium + tags: cve,wordpress,wp-plugin,easy-testimonials,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-19796-561eff22a0971cf174004fe156be75cb.yaml b/nuclei-templates/2018/CVE-2018-19796-561eff22a0971cf174004fe156be75cb.yaml index 2accd63b2e..c554c66af0 100644 --- a/nuclei-templates/2018/CVE-2018-19796-561eff22a0971cf174004fe156be75cb.yaml +++ b/nuclei-templates/2018/CVE-2018-19796-561eff22a0971cf174004fe156be75cb.yaml @@ -4,7 +4,7 @@ info: name: > Ninja Forms Contact Form <= 3.3.19 - Authenticated Open Redirect author: topscoder - severity: medium + severity: low description: > An open redirect in the Ninja Forms plugin before 3.3.19.1 for WordPress allows Remote Attackers to redirect a user via the lib/StepProcessing/step-processing.php (aka submissions download page) redirect parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ninja-forms/" google-query: inurl:"/wp-content/plugins/ninja-forms/" shodan-query: 'vuln:CVE-2018-19796' - tags: cve,wordpress,wp-plugin,ninja-forms,medium + tags: cve,wordpress,wp-plugin,ninja-forms,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20101-99e4e1e27563f717d9f8c278b33423ac.yaml b/nuclei-templates/2018/CVE-2018-20101-99e4e1e27563f717d9f8c278b33423ac.yaml index 5cd5e983c8..bd27a1ef7b 100644 --- a/nuclei-templates/2018/CVE-2018-20101-99e4e1e27563f717d9f8c278b33423ac.yaml +++ b/nuclei-templates/2018/CVE-2018-20101-99e4e1e27563f717d9f8c278b33423ac.yaml @@ -4,7 +4,7 @@ info: name: > Import users from CSV with meta <= 1.12 - Import Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The codection "Import users from CSV with meta" plugin before 1.12.1 for WordPress allows XSS via the value of a cell. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" shodan-query: 'vuln:CVE-2018-20101' - tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,medium + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20149-da357866cfc2e11d1d8ab076887b6560.yaml b/nuclei-templates/2018/CVE-2018-20149-da357866cfc2e11d1d8ab076887b6560.yaml index faf558a52d..6e4ecec5f2 100644 --- a/nuclei-templates/2018/CVE-2018-20149-da357866cfc2e11d1d8ab076887b6560.yaml +++ b/nuclei-templates/2018/CVE-2018-20149-da357866cfc2e11d1d8ab076887b6560.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.0.1 - Stored Cross-Site Scripting via File Uploads author: topscoder - severity: medium + severity: high description: > In WordPress before 4.9.9 and 5.x before 5.0.1, when the Apache HTTP Server is used, authors could upload crafted files that bypass intended MIME type restrictions, leading to XSS, as demonstrated by a .jpg file without JPEG data. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2018-20149 metadata: shodan-query: 'vuln:CVE-2018-20149' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20152-b56f368057104a536902fcd79d840f4c.yaml b/nuclei-templates/2018/CVE-2018-20152-b56f368057104a536902fcd79d840f4c.yaml index 5ae7f55db5..fb8ee5cfd1 100644 --- a/nuclei-templates/2018/CVE-2018-20152-b56f368057104a536902fcd79d840f4c.yaml +++ b/nuclei-templates/2018/CVE-2018-20152-b56f368057104a536902fcd79d840f4c.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.0.1 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > In WordPress before 4.9.9 and 5.x before 5.0.1, authors could bypass intended restrictions on post types via crafted input. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2018-20152 metadata: shodan-query: 'vuln:CVE-2018-20152' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20153-5a29aa05e41b6793e5d21a4fcf5c84c5.yaml b/nuclei-templates/2018/CVE-2018-20153-5a29aa05e41b6793e5d21a4fcf5c84c5.yaml index c231c49144..100d343630 100644 --- a/nuclei-templates/2018/CVE-2018-20153-5a29aa05e41b6793e5d21a4fcf5c84c5.yaml +++ b/nuclei-templates/2018/CVE-2018-20153-5a29aa05e41b6793e5d21a4fcf5c84c5.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.0.1 - Authenticated Stored Cross-Site Scripting via Comments author: topscoder - severity: medium + severity: low description: > In WordPress before 4.9.9 and 5.x before 5.0.1, contributors could modify new comments made by users with greater privileges, possibly causing XSS. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2018-20153 metadata: shodan-query: 'vuln:CVE-2018-20153' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20154-27c270156b5cf78eb4bb31035b7f5db8.yaml b/nuclei-templates/2018/CVE-2018-20154-27c270156b5cf78eb4bb31035b7f5db8.yaml index 9bed508691..8361fd3d81 100644 --- a/nuclei-templates/2018/CVE-2018-20154-27c270156b5cf78eb4bb31035b7f5db8.yaml +++ b/nuclei-templates/2018/CVE-2018-20154-27c270156b5cf78eb4bb31035b7f5db8.yaml @@ -4,7 +4,7 @@ info: name: > WP Maintenance Mode <= 2.0.6 - Authenticated Information Disclosure author: topscoder - severity: medium + severity: low description: > The WP Maintenance Mode plugin before 2.0.7 for WordPress allows remote authenticated users to discover all subscriber e-mail addresses. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-maintenance-mode/" google-query: inurl:"/wp-content/plugins/wp-maintenance-mode/" shodan-query: 'vuln:CVE-2018-20154' - tags: cve,wordpress,wp-plugin,wp-maintenance-mode,medium + tags: cve,wordpress,wp-plugin,wp-maintenance-mode,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20155-a8309537878561527873c9aaba1b29f6.yaml b/nuclei-templates/2018/CVE-2018-20155-a8309537878561527873c9aaba1b29f6.yaml index 87221c8127..b264158c00 100644 --- a/nuclei-templates/2018/CVE-2018-20155-a8309537878561527873c9aaba1b29f6.yaml +++ b/nuclei-templates/2018/CVE-2018-20155-a8309537878561527873c9aaba1b29f6.yaml @@ -4,7 +4,7 @@ info: name: > WP Maintenance Mode <= 2.0.6 - Missing Authorization author: topscoder - severity: medium + severity: high description: > The WP Maintenance Mode plugin before 2.0.7 for WordPress allows remote authenticated subscriber users to bypass intended access restrictions on changes to plugin settings. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-maintenance-mode/" google-query: inurl:"/wp-content/plugins/wp-maintenance-mode/" shodan-query: 'vuln:CVE-2018-20155' - tags: cve,wordpress,wp-plugin,wp-maintenance-mode,medium + tags: cve,wordpress,wp-plugin,wp-maintenance-mode,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20231-f066ce4a5d628014aa8c478503783258.yaml b/nuclei-templates/2018/CVE-2018-20231-f066ce4a5d628014aa8c478503783258.yaml index c9aa6a4e8e..e905fc8ecf 100644 --- a/nuclei-templates/2018/CVE-2018-20231-f066ce4a5d628014aa8c478503783258.yaml +++ b/nuclei-templates/2018/CVE-2018-20231-f066ce4a5d628014aa8c478503783258.yaml @@ -4,7 +4,7 @@ info: name: > Two Factor Authentication <= 1.3.12 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross Site Request Forgery (CSRF) in the two-factor-authentication plugin before 1.3.13 for WordPress allows remote attackers to disable 2FA via the tfa_enable_tfa parameter due to missing nonce validation. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/two-factor-authentication/" google-query: inurl:"/wp-content/plugins/two-factor-authentication/" shodan-query: 'vuln:CVE-2018-20231' - tags: cve,wordpress,wp-plugin,two-factor-authentication,high + tags: cve,wordpress,wp-plugin,two-factor-authentication,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20368-1f1264fb01a80102a1939e77505f347e.yaml b/nuclei-templates/2018/CVE-2018-20368-1f1264fb01a80102a1939e77505f347e.yaml index 3404320e7e..6630e4e0c3 100644 --- a/nuclei-templates/2018/CVE-2018-20368-1f1264fb01a80102a1939e77505f347e.yaml +++ b/nuclei-templates/2018/CVE-2018-20368-1f1264fb01a80102a1939e77505f347e.yaml @@ -4,7 +4,7 @@ info: name: > Master Slider <= 3.7.0 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Master Slider plugin for WordPress has XSS via the wp-admin/admin-ajax.php Name input field of the MSPanel.Settings value on Callback. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/master-slider/" google-query: inurl:"/wp-content/plugins/master-slider/" shodan-query: 'vuln:CVE-2018-20368' - tags: cve,wordpress,wp-plugin,master-slider,medium + tags: cve,wordpress,wp-plugin,master-slider,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20462-0c697c5c96080eeecc8327290c3e4bbc.yaml b/nuclei-templates/2018/CVE-2018-20462-0c697c5c96080eeecc8327290c3e4bbc.yaml index a1ca425d20..72ab35ddeb 100644 --- a/nuclei-templates/2018/CVE-2018-20462-0c697c5c96080eeecc8327290c3e4bbc.yaml +++ b/nuclei-templates/2018/CVE-2018-20462-0c697c5c96080eeecc8327290c3e4bbc.yaml @@ -4,7 +4,7 @@ info: name: > JSmol2WP <= 1.07 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via the jsmol.php data parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/jsmol2wp/" google-query: inurl:"/wp-content/plugins/jsmol2wp/" shodan-query: 'vuln:CVE-2018-20462' - tags: cve,wordpress,wp-plugin,jsmol2wp,medium + tags: cve,wordpress,wp-plugin,jsmol2wp,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20838-8f9fba5d47d60ee8f1aec9a71b4f7e8a.yaml b/nuclei-templates/2018/CVE-2018-20838-8f9fba5d47d60ee8f1aec9a71b4f7e8a.yaml index de6a8057ae..7ba9e2cd0d 100644 --- a/nuclei-templates/2018/CVE-2018-20838-8f9fba5d47d60ee8f1aec9a71b4f7e8a.yaml +++ b/nuclei-templates/2018/CVE-2018-20838-8f9fba5d47d60ee8f1aec9a71b4f7e8a.yaml @@ -4,7 +4,7 @@ info: name: > AMP for WP <= 0.9.97.20 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > ampforwp_save_steps_data in the AMP for WP plugin before 0.9.97.21 for WordPress allows stored XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/accelerated-mobile-pages/" google-query: inurl:"/wp-content/plugins/accelerated-mobile-pages/" shodan-query: 'vuln:CVE-2018-20838' - tags: cve,wordpress,wp-plugin,accelerated-mobile-pages,medium + tags: cve,wordpress,wp-plugin,accelerated-mobile-pages,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20963-2c888a383975451b85f071f96c07a849.yaml b/nuclei-templates/2018/CVE-2018-20963-2c888a383975451b85f071f96c07a849.yaml index 612edf40c0..26c63c7148 100644 --- a/nuclei-templates/2018/CVE-2018-20963-2c888a383975451b85f071f96c07a849.yaml +++ b/nuclei-templates/2018/CVE-2018-20963-2c888a383975451b85f071f96c07a849.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form Email <= 1.2.65 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The contact-form-to-email plugin before 1.2.66 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-to-email/" google-query: inurl:"/wp-content/plugins/contact-form-to-email/" shodan-query: 'vuln:CVE-2018-20963' - tags: cve,wordpress,wp-plugin,contact-form-to-email,medium + tags: cve,wordpress,wp-plugin,contact-form-to-email,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20964-523f9782716d9d1f6a85039ec487ef5a.yaml b/nuclei-templates/2018/CVE-2018-20964-523f9782716d9d1f6a85039ec487ef5a.yaml index cc1937dc02..ffb1fd8571 100644 --- a/nuclei-templates/2018/CVE-2018-20964-523f9782716d9d1f6a85039ec487ef5a.yaml +++ b/nuclei-templates/2018/CVE-2018-20964-523f9782716d9d1f6a85039ec487ef5a.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form Email <= 1.2.65 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The contact-form-to-email plugin before 1.2.66 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-to-email/" google-query: inurl:"/wp-content/plugins/contact-form-to-email/" shodan-query: 'vuln:CVE-2018-20964' - tags: cve,wordpress,wp-plugin,contact-form-to-email,high + tags: cve,wordpress,wp-plugin,contact-form-to-email,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20966-ae7ec62fe186e1a7a30df795c82f42a1.yaml b/nuclei-templates/2018/CVE-2018-20966-ae7ec62fe186e1a7a30df795c82f42a1.yaml index 29777fdbe8..5027f77f29 100644 --- a/nuclei-templates/2018/CVE-2018-20966-ae7ec62fe186e1a7a30df795c82f42a1.yaml +++ b/nuclei-templates/2018/CVE-2018-20966-ae7ec62fe186e1a7a30df795c82f42a1.yaml @@ -4,7 +4,7 @@ info: name: > Booster for WooCommerce <= 3.7.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The woocommerce-jetpack plugin before 3.8.0 for WordPress has XSS in the Products Per Page feature. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/woocommerce-jetpack/" google-query: inurl:"/wp-content/plugins/woocommerce-jetpack/" shodan-query: 'vuln:CVE-2018-20966' - tags: cve,wordpress,wp-plugin,woocommerce-jetpack,medium + tags: cve,wordpress,wp-plugin,woocommerce-jetpack,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20967-c7addb8e32d754a1c27b6eb5611849e7.yaml b/nuclei-templates/2018/CVE-2018-20967-c7addb8e32d754a1c27b6eb5611849e7.yaml index bc3cb70b51..549fa0496c 100644 --- a/nuclei-templates/2018/CVE-2018-20967-c7addb8e32d754a1c27b6eb5611849e7.yaml +++ b/nuclei-templates/2018/CVE-2018-20967-c7addb8e32d754a1c27b6eb5611849e7.yaml @@ -4,7 +4,7 @@ info: name: > Easy Drag And drop All Import : WP Ultimate CSV Importer <= 5.6 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The wp-ultimate-csv-importer plugin before 5.6.1 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-ultimate-csv-importer/" google-query: inurl:"/wp-content/plugins/wp-ultimate-csv-importer/" shodan-query: 'vuln:CVE-2018-20967' - tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,high + tags: cve,wordpress,wp-plugin,wp-ultimate-csv-importer,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20968-e989541539b3897cd4ab2d9eb3394079.yaml b/nuclei-templates/2018/CVE-2018-20968-e989541539b3897cd4ab2d9eb3394079.yaml index 8318c5fb05..a549e0f491 100644 --- a/nuclei-templates/2018/CVE-2018-20968-e989541539b3897cd4ab2d9eb3394079.yaml +++ b/nuclei-templates/2018/CVE-2018-20968-e989541539b3897cd4ab2d9eb3394079.yaml @@ -4,7 +4,7 @@ info: name: > Export WordPress Data with Advanced Filters <= 1.4.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Export WordPress Data with Advanced Filters plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.4.1. This is due to missing or incorrect nonce validation on the export_module() function. This makes it possible for unauthenticated attackers to export module data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-ultimate-exporter/" google-query: inurl:"/wp-content/plugins/wp-ultimate-exporter/" shodan-query: 'vuln:CVE-2018-20968' - tags: cve,wordpress,wp-plugin,wp-ultimate-exporter,high + tags: cve,wordpress,wp-plugin,wp-ultimate-exporter,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20971-c1356627585be8298fc5154daa83bb1f.yaml b/nuclei-templates/2018/CVE-2018-20971-c1356627585be8298fc5154daa83bb1f.yaml index 9f7f22d94d..ce02780c35 100644 --- a/nuclei-templates/2018/CVE-2018-20971-c1356627585be8298fc5154daa83bb1f.yaml +++ b/nuclei-templates/2018/CVE-2018-20971-c1356627585be8298fc5154daa83bb1f.yaml @@ -4,7 +4,7 @@ info: name: > Church Admin < 1.2550 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The church-admin plugin before 1.2550 for WordPress has CSRF affecting the upload of a bible reading plan. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/church-admin/" google-query: inurl:"/wp-content/plugins/church-admin/" shodan-query: 'vuln:CVE-2018-20971' - tags: cve,wordpress,wp-plugin,church-admin,high + tags: cve,wordpress,wp-plugin,church-admin,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20972-df1246639b8669a251f2bf76a6725ade.yaml b/nuclei-templates/2018/CVE-2018-20972-df1246639b8669a251f2bf76a6725ade.yaml index ac20061b09..1b17e3da35 100644 --- a/nuclei-templates/2018/CVE-2018-20972-df1246639b8669a251f2bf76a6725ade.yaml +++ b/nuclei-templates/2018/CVE-2018-20972-df1246639b8669a251f2bf76a6725ade.yaml @@ -4,7 +4,7 @@ info: name: > Companion Auto Update <= 3.2.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Companion Auto Update plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.2.0. This is due to missing or incorrect nonce validation on the cau_frontend function. This makes it possible for unauthenticated attackers to include local files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/companion-auto-update/" google-query: inurl:"/wp-content/plugins/companion-auto-update/" shodan-query: 'vuln:CVE-2018-20972' - tags: cve,wordpress,wp-plugin,companion-auto-update,high + tags: cve,wordpress,wp-plugin,companion-auto-update,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20974-e2ad97f33f7abd91ea501d6e3cf80275.yaml b/nuclei-templates/2018/CVE-2018-20974-e2ad97f33f7abd91ea501d6e3cf80275.yaml index 9335a7beee..d25f33004b 100644 --- a/nuclei-templates/2018/CVE-2018-20974-e2ad97f33f7abd91ea501d6e3cf80275.yaml +++ b/nuclei-templates/2018/CVE-2018-20974-e2ad97f33f7abd91ea501d6e3cf80275.yaml @@ -4,7 +4,7 @@ info: name: > JS Job Manager <= 1.0.6 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The JS Job Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.6. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to gain otherwise restricted access to administrative actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/js-jobs/" google-query: inurl:"/wp-content/plugins/js-jobs/" shodan-query: 'vuln:CVE-2018-20974' - tags: cve,wordpress,wp-plugin,js-jobs,high + tags: cve,wordpress,wp-plugin,js-jobs,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20977-4e93731af3497ed66d721b94ba1ecb7d.yaml b/nuclei-templates/2018/CVE-2018-20977-4e93731af3497ed66d721b94ba1ecb7d.yaml index 92ea50901e..3bfa1c5c5d 100644 --- a/nuclei-templates/2018/CVE-2018-20977-4e93731af3497ed66d721b94ba1ecb7d.yaml +++ b/nuclei-templates/2018/CVE-2018-20977-4e93731af3497ed66d721b94ba1ecb7d.yaml @@ -4,7 +4,7 @@ info: name: > Schema - All In One Schema Rich Snippets <= 1.4.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The all-in-one-schemaorg-rich-snippets plugin before 1.5.0 for WordPress has XSS on the settings page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/all-in-one-schemaorg-rich-snippets/" google-query: inurl:"/wp-content/plugins/all-in-one-schemaorg-rich-snippets/" shodan-query: 'vuln:CVE-2018-20977' - tags: cve,wordpress,wp-plugin,all-in-one-schemaorg-rich-snippets,medium + tags: cve,wordpress,wp-plugin,all-in-one-schemaorg-rich-snippets,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20978-c459c6390d6920d9836ff6f1ec3a05e1.yaml b/nuclei-templates/2018/CVE-2018-20978-c459c6390d6920d9836ff6f1ec3a05e1.yaml index 9254359055..4023729889 100644 --- a/nuclei-templates/2018/CVE-2018-20978-c459c6390d6920d9836ff6f1ec3a05e1.yaml +++ b/nuclei-templates/2018/CVE-2018-20978-c459c6390d6920d9836ff6f1ec3a05e1.yaml @@ -4,7 +4,7 @@ info: name: > Import any XML or CSV File to WordPress <= 3.4.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-all-import plugin before 3.4.7 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-all-import/" google-query: inurl:"/wp-content/plugins/wp-all-import/" shodan-query: 'vuln:CVE-2018-20978' - tags: cve,wordpress,wp-plugin,wp-all-import,medium + tags: cve,wordpress,wp-plugin,wp-all-import,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20979-6e59234554b04ec8d40e5e3ef21541b6.yaml b/nuclei-templates/2018/CVE-2018-20979-6e59234554b04ec8d40e5e3ef21541b6.yaml index a428981f9b..796e4f18f6 100644 --- a/nuclei-templates/2018/CVE-2018-20979-6e59234554b04ec8d40e5e3ef21541b6.yaml +++ b/nuclei-templates/2018/CVE-2018-20979-6e59234554b04ec8d40e5e3ef21541b6.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form 7 <= 5.0.3 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > The Contact Form 7 plugin for WordPress is vulnerable to authorization bypass due to capability_type mishandling in register_post_type in versions up to, and including, 5.0.3. This makes it possible for authenticated attackers with contributor level privileges and above to modify contact forms and potential supply paths to sensitive files that make sensitive information disclosure possible. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-7/" google-query: inurl:"/wp-content/plugins/contact-form-7/" shodan-query: 'vuln:CVE-2018-20979' - tags: cve,wordpress,wp-plugin,contact-form-7,medium + tags: cve,wordpress,wp-plugin,contact-form-7,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20982-315158d01f8d35cf2208dddc8f7964b3.yaml b/nuclei-templates/2018/CVE-2018-20982-315158d01f8d35cf2208dddc8f7964b3.yaml index a052380cab..6485631656 100644 --- a/nuclei-templates/2018/CVE-2018-20982-315158d01f8d35cf2208dddc8f7964b3.yaml +++ b/nuclei-templates/2018/CVE-2018-20982-315158d01f8d35cf2208dddc8f7964b3.yaml @@ -4,7 +4,7 @@ info: name: > Media Library Assistant <= 2.73 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The media-library-assistant plugin before 2.74 for WordPress has XSS via the Media/Assistant or Settings/Media Library assistant admin submenu screens. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/media-library-assistant/" google-query: inurl:"/wp-content/plugins/media-library-assistant/" shodan-query: 'vuln:CVE-2018-20982' - tags: cve,wordpress,wp-plugin,media-library-assistant,medium + tags: cve,wordpress,wp-plugin,media-library-assistant,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20983-6bed45cc7ffa2c1423965f9f86a13b79.yaml b/nuclei-templates/2018/CVE-2018-20983-6bed45cc7ffa2c1423965f9f86a13b79.yaml index 2ce5e88fbe..68d3ee9d0e 100644 --- a/nuclei-templates/2018/CVE-2018-20983-6bed45cc7ffa2c1423965f9f86a13b79.yaml +++ b/nuclei-templates/2018/CVE-2018-20983-6bed45cc7ffa2c1423965f9f86a13b79.yaml @@ -4,7 +4,7 @@ info: name: > Perfect Images <= 5.2.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-retina-2x plugin before 5.2.3 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-retina-2x/" google-query: inurl:"/wp-content/plugins/wp-retina-2x/" shodan-query: 'vuln:CVE-2018-20983' - tags: cve,wordpress,wp-plugin,wp-retina-2x,medium + tags: cve,wordpress,wp-plugin,wp-retina-2x,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20986-a56a7a539382d6f88ae2afe6cc65c72c.yaml b/nuclei-templates/2018/CVE-2018-20986-a56a7a539382d6f88ae2afe6cc65c72c.yaml index 3a12475813..9e278ac111 100644 --- a/nuclei-templates/2018/CVE-2018-20986-a56a7a539382d6f88ae2afe6cc65c72c.yaml +++ b/nuclei-templates/2018/CVE-2018-20986-a56a7a539382d6f88ae2afe6cc65c72c.yaml @@ -4,7 +4,7 @@ info: name: > Advanced Custom Fields <= 5.7.7 - Author+ Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The advanced-custom-fields (aka Elliot Condon Advanced Custom Fields) plugin before 5.7.8 for WordPress has XSS by authors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/advanced-custom-fields/" google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" shodan-query: 'vuln:CVE-2018-20986' - tags: cve,wordpress,wp-plugin,advanced-custom-fields,medium + tags: cve,wordpress,wp-plugin,advanced-custom-fields,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-20988-82c5164bc77f066c7a8d33b886720225.yaml b/nuclei-templates/2018/CVE-2018-20988-82c5164bc77f066c7a8d33b886720225.yaml index c619fcab67..6f94a5c32b 100644 --- a/nuclei-templates/2018/CVE-2018-20988-82c5164bc77f066c7a8d33b886720225.yaml +++ b/nuclei-templates/2018/CVE-2018-20988-82c5164bc77f066c7a8d33b886720225.yaml @@ -4,7 +4,7 @@ info: name: > Google Forms <= 0.93 - Remote Code Execution author: topscoder - severity: high + severity: critical description: > The wpgform plugin before 0.94 for WordPress has eval injection in the CAPTCHA calculation. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpgform/" google-query: inurl:"/wp-content/plugins/wpgform/" shodan-query: 'vuln:CVE-2018-20988' - tags: cve,wordpress,wp-plugin,wpgform,high + tags: cve,wordpress,wp-plugin,wpgform,critical http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-21001-ee36904a88935929b3b15a0e036819ac.yaml b/nuclei-templates/2018/CVE-2018-21001-ee36904a88935929b3b15a0e036819ac.yaml index e0cc55afe5..3e91b2a9a2 100644 --- a/nuclei-templates/2018/CVE-2018-21001-ee36904a88935929b3b15a0e036819ac.yaml +++ b/nuclei-templates/2018/CVE-2018-21001-ee36904a88935929b3b15a0e036819ac.yaml @@ -4,7 +4,7 @@ info: name: > AnyComment <= 0.0.32 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The AnyComment plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 0.0.32 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/anycomment/" google-query: inurl:"/wp-content/plugins/anycomment/" shodan-query: 'vuln:CVE-2018-21001' - tags: cve,wordpress,wp-plugin,anycomment,medium + tags: cve,wordpress,wp-plugin,anycomment,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-21002-8bc92a63825b5e282b7e5f164f2d0274.yaml b/nuclei-templates/2018/CVE-2018-21002-8bc92a63825b5e282b7e5f164f2d0274.yaml index c50cefe3dc..669fd9cb28 100644 --- a/nuclei-templates/2018/CVE-2018-21002-8bc92a63825b5e282b7e5f164f2d0274.yaml +++ b/nuclei-templates/2018/CVE-2018-21002-8bc92a63825b5e282b7e5f164f2d0274.yaml @@ -4,7 +4,7 @@ info: name: > JS Help Desk – Best Help Desk & Support Plugin <= 2.0.5 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The JS Help Desk plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.5. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to gain otherwise unauthorized access to administrative privileges via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/js-support-ticket/" google-query: inurl:"/wp-content/plugins/js-support-ticket/" shodan-query: 'vuln:CVE-2018-21002' - tags: cve,wordpress,wp-plugin,js-support-ticket,high + tags: cve,wordpress,wp-plugin,js-support-ticket,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-21006-7d2d77fb555165867755ecf651af34c0.yaml b/nuclei-templates/2018/CVE-2018-21006-7d2d77fb555165867755ecf651af34c0.yaml index 9dcf661a63..55cb3ffcce 100644 --- a/nuclei-templates/2018/CVE-2018-21006-7d2d77fb555165867755ecf651af34c0.yaml +++ b/nuclei-templates/2018/CVE-2018-21006-7d2d77fb555165867755ecf651af34c0.yaml @@ -4,7 +4,7 @@ info: name: > bbPress Move Topics <= 1.1.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The bbp-move-topics plugin before 1.1.5 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bbp-move-topics/" google-query: inurl:"/wp-content/plugins/bbp-move-topics/" shodan-query: 'vuln:CVE-2018-21006' - tags: cve,wordpress,wp-plugin,bbp-move-topics,high + tags: cve,wordpress,wp-plugin,bbp-move-topics,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-21012-aed7ae7e4d2ac15e64bf03771c3aeb20.yaml b/nuclei-templates/2018/CVE-2018-21012-aed7ae7e4d2ac15e64bf03771c3aeb20.yaml index 4d953d59fb..b62f9d417d 100644 --- a/nuclei-templates/2018/CVE-2018-21012-aed7ae7e4d2ac15e64bf03771c3aeb20.yaml +++ b/nuclei-templates/2018/CVE-2018-21012-aed7ae7e4d2ac15e64bf03771c3aeb20.yaml @@ -4,7 +4,7 @@ info: name: > CF7 Invisible reCAPTCHA < 1.3.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The CF7 Invisible reCAPTCHA plugin before 1.3.2 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cf7-invisible-recaptcha/" google-query: inurl:"/wp-content/plugins/cf7-invisible-recaptcha/" shodan-query: 'vuln:CVE-2018-21012' - tags: cve,wordpress,wp-plugin,cf7-invisible-recaptcha,medium + tags: cve,wordpress,wp-plugin,cf7-invisible-recaptcha,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-21013-7ec2393a2db75328cb78362c45e273f6.yaml b/nuclei-templates/2018/CVE-2018-21013-7ec2393a2db75328cb78362c45e273f6.yaml index f078b9492e..ab7bc21b7b 100644 --- a/nuclei-templates/2018/CVE-2018-21013-7ec2393a2db75328cb78362c45e273f6.yaml +++ b/nuclei-templates/2018/CVE-2018-21013-7ec2393a2db75328cb78362c45e273f6.yaml @@ -4,7 +4,7 @@ info: name: > Swape - App Showcase & App Store WordPress Theme < 1.2.1 - Missing Authorization to Arbitrary Options Update author: topscoder - severity: critical + severity: high description: > The "Swape - App Showcase & App Store WordPress Theme" theme for WordPress is vulnerable to authorization bypass due to a missing capability check on the 'call_upper_load_settings' AJAX action in versions up to 1.2.1. This makes it possible for unauthenticated attackers to modify arbitrary site options which can be used to create new administrative user accounts and achieve privilege escalation. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/swape/" google-query: inurl:"/wp-content/themes/swape/" shodan-query: 'vuln:CVE-2018-21013' - tags: cve,wordpress,wp-theme,swape,critical + tags: cve,wordpress,wp-theme,swape,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-21014-1cf8853774794c9a185058bff3041a9d.yaml b/nuclei-templates/2018/CVE-2018-21014-1cf8853774794c9a185058bff3041a9d.yaml index 58e462b2b7..7352a8ae02 100644 --- a/nuclei-templates/2018/CVE-2018-21014-1cf8853774794c9a185058bff3041a9d.yaml +++ b/nuclei-templates/2018/CVE-2018-21014-1cf8853774794c9a185058bff3041a9d.yaml @@ -4,7 +4,7 @@ info: name: > BuddyBoss Media <= 3.2.3 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The BuddyBoss Media plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the album description input field in versions up to, and including, 3.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/buddyboss-media/" google-query: inurl:"/wp-content/plugins/buddyboss-media/" shodan-query: 'vuln:CVE-2018-21014' - tags: cve,wordpress,wp-plugin,buddyboss-media,medium + tags: cve,wordpress,wp-plugin,buddyboss-media,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5212-49034c31f1dba0715c18246f4dd38cde.yaml b/nuclei-templates/2018/CVE-2018-5212-49034c31f1dba0715c18246f4dd38cde.yaml index 40c723df39..27571aedd8 100644 --- a/nuclei-templates/2018/CVE-2018-5212-49034c31f1dba0715c18246f4dd38cde.yaml +++ b/nuclei-templates/2018/CVE-2018-5212-49034c31f1dba0715c18246f4dd38cde.yaml @@ -4,7 +4,7 @@ info: name: > Simple Download Monitor < 3.5.4 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Simple Download Monitor plugin before 3.5.4 for WordPress has XSS via the sdm_upload_thumbnail (aka File Thumbnail) parameter in an edit action to wp-admin/post.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/simple-download-monitor/" google-query: inurl:"/wp-content/plugins/simple-download-monitor/" shodan-query: 'vuln:CVE-2018-5212' - tags: cve,wordpress,wp-plugin,simple-download-monitor,medium + tags: cve,wordpress,wp-plugin,simple-download-monitor,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5213-d77dd6f710585ae9ffaedbfddc152d76.yaml b/nuclei-templates/2018/CVE-2018-5213-d77dd6f710585ae9ffaedbfddc152d76.yaml index bb77a96dbd..03b181b1b9 100644 --- a/nuclei-templates/2018/CVE-2018-5213-d77dd6f710585ae9ffaedbfddc152d76.yaml +++ b/nuclei-templates/2018/CVE-2018-5213-d77dd6f710585ae9ffaedbfddc152d76.yaml @@ -4,7 +4,7 @@ info: name: > Simple Download Monitor < 3.5.4 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Simple Download Monitor plugin before 3.5.4 for WordPress has XSS via the sdm_upload (aka Downloadable File) parameter in an edit action to wp-admin/post.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/simple-download-monitor/" google-query: inurl:"/wp-content/plugins/simple-download-monitor/" shodan-query: 'vuln:CVE-2018-5213' - tags: cve,wordpress,wp-plugin,simple-download-monitor,medium + tags: cve,wordpress,wp-plugin,simple-download-monitor,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5214-3bc3a29ed4f22f4e728217981dd51f12.yaml b/nuclei-templates/2018/CVE-2018-5214-3bc3a29ed4f22f4e728217981dd51f12.yaml index 3045987bfb..fa6e18865d 100644 --- a/nuclei-templates/2018/CVE-2018-5214-3bc3a29ed4f22f4e728217981dd51f12.yaml +++ b/nuclei-templates/2018/CVE-2018-5214-3bc3a29ed4f22f4e728217981dd51f12.yaml @@ -4,7 +4,7 @@ info: name: > Add Link to Facebook <= 2.3 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Add Link to Facebook plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘al2fb_facebook_id’ parameter in versions up to, and including, 2.3 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/add-link-to-facebook/" google-query: inurl:"/wp-content/plugins/add-link-to-facebook/" shodan-query: 'vuln:CVE-2018-5214' - tags: cve,wordpress,wp-plugin,add-link-to-facebook,medium + tags: cve,wordpress,wp-plugin,add-link-to-facebook,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5284-eaace189d52939bb1c67d181a1aa5e03.yaml b/nuclei-templates/2018/CVE-2018-5284-eaace189d52939bb1c67d181a1aa5e03.yaml index efadbdfcef..ae2ce7c973 100644 --- a/nuclei-templates/2018/CVE-2018-5284-eaace189d52939bb1c67d181a1aa5e03.yaml +++ b/nuclei-templates/2018/CVE-2018-5284-eaace189d52939bb1c67d181a1aa5e03.yaml @@ -4,7 +4,7 @@ info: name: > ImageInject <= 1.15 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The ImageInject plugin 1.15 for WordPress has XSS via the flickr_appid parameter to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-inject/" google-query: inurl:"/wp-content/plugins/wp-inject/" shodan-query: 'vuln:CVE-2018-5284' - tags: cve,wordpress,wp-plugin,wp-inject,medium + tags: cve,wordpress,wp-plugin,wp-inject,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5285-807cd0a33bfd97782e746e860be1d566.yaml b/nuclei-templates/2018/CVE-2018-5285-807cd0a33bfd97782e746e860be1d566.yaml index 39d48eb218..151d9f1c54 100644 --- a/nuclei-templates/2018/CVE-2018-5285-807cd0a33bfd97782e746e860be1d566.yaml +++ b/nuclei-templates/2018/CVE-2018-5285-807cd0a33bfd97782e746e860be1d566.yaml @@ -4,7 +4,7 @@ info: name: > ImageInject <= 1.15 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The ImageInject plugin 1.15 for WordPress has CSRF via wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-inject/" google-query: inurl:"/wp-content/plugins/wp-inject/" shodan-query: 'vuln:CVE-2018-5285' - tags: cve,wordpress,wp-plugin,wp-inject,high + tags: cve,wordpress,wp-plugin,wp-inject,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5286-363e85a87b5e31a1dda22e9466545bd8.yaml b/nuclei-templates/2018/CVE-2018-5286-363e85a87b5e31a1dda22e9466545bd8.yaml index b0453f3f9a..e702ecb104 100644 --- a/nuclei-templates/2018/CVE-2018-5286-363e85a87b5e31a1dda22e9466545bd8.yaml +++ b/nuclei-templates/2018/CVE-2018-5286-363e85a87b5e31a1dda22e9466545bd8.yaml @@ -4,7 +4,7 @@ info: name: > GD Rating System <= 2.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-about page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gd-rating-system/" google-query: inurl:"/wp-content/plugins/gd-rating-system/" shodan-query: 'vuln:CVE-2018-5286' - tags: cve,wordpress,wp-plugin,gd-rating-system,medium + tags: cve,wordpress,wp-plugin,gd-rating-system,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5288-79116f6e6f3436dd311270ae51db9449.yaml b/nuclei-templates/2018/CVE-2018-5288-79116f6e6f3436dd311270ae51db9449.yaml index 838733a154..2e75945ac9 100644 --- a/nuclei-templates/2018/CVE-2018-5288-79116f6e6f3436dd311270ae51db9449.yaml +++ b/nuclei-templates/2018/CVE-2018-5288-79116f6e6f3436dd311270ae51db9449.yaml @@ -4,7 +4,7 @@ info: name: > GD Rating System <= 2.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-transfer page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gd-rating-system/" google-query: inurl:"/wp-content/plugins/gd-rating-system/" shodan-query: 'vuln:CVE-2018-5288' - tags: cve,wordpress,wp-plugin,gd-rating-system,medium + tags: cve,wordpress,wp-plugin,gd-rating-system,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5292-034ab84e882013699ca86030c39bb7c1.yaml b/nuclei-templates/2018/CVE-2018-5292-034ab84e882013699ca86030c39bb7c1.yaml index 2a4e4209de..5b73306f89 100644 --- a/nuclei-templates/2018/CVE-2018-5292-034ab84e882013699ca86030c39bb7c1.yaml +++ b/nuclei-templates/2018/CVE-2018-5292-034ab84e882013699ca86030c39bb7c1.yaml @@ -4,7 +4,7 @@ info: name: > GD Rating System <= 2.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-information page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gd-rating-system/" google-query: inurl:"/wp-content/plugins/gd-rating-system/" shodan-query: 'vuln:CVE-2018-5292' - tags: cve,wordpress,wp-plugin,gd-rating-system,medium + tags: cve,wordpress,wp-plugin,gd-rating-system,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5293-567c0bab82561630aea9403749f896f8.yaml b/nuclei-templates/2018/CVE-2018-5293-567c0bab82561630aea9403749f896f8.yaml index ddffaf9afb..ee2355f7b3 100644 --- a/nuclei-templates/2018/CVE-2018-5293-567c0bab82561630aea9403749f896f8.yaml +++ b/nuclei-templates/2018/CVE-2018-5293-567c0bab82561630aea9403749f896f8.yaml @@ -4,7 +4,7 @@ info: name: > GD Rating System <= 2.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The GD Rating System plugin 2.3 for WordPress has XSS via the wp-admin/admin.php panel parameter for the gd-rating-system-tools page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gd-rating-system/" google-query: inurl:"/wp-content/plugins/gd-rating-system/" shodan-query: 'vuln:CVE-2018-5293' - tags: cve,wordpress,wp-plugin,gd-rating-system,medium + tags: cve,wordpress,wp-plugin,gd-rating-system,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5311-0574327d2925f2e5b1baa6cdafa54603.yaml b/nuclei-templates/2018/CVE-2018-5311-0574327d2925f2e5b1baa6cdafa54603.yaml index 1af06d9665..37afba00d2 100644 --- a/nuclei-templates/2018/CVE-2018-5311-0574327d2925f2e5b1baa6cdafa54603.yaml +++ b/nuclei-templates/2018/CVE-2018-5311-0574327d2925f2e5b1baa6cdafa54603.yaml @@ -4,7 +4,7 @@ info: name: > Easy Custom Auto Excerpt < 2.4.7 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy Custom Auto Excerpt plugin 2.4.6 for WordPress has XSS via the tonjoo_ecae_options[custom_css] parameter to the wp-admin/admin.php?page=tonjoo_excerpt URI. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-custom-auto-excerpt/" google-query: inurl:"/wp-content/plugins/easy-custom-auto-excerpt/" shodan-query: 'vuln:CVE-2018-5311' - tags: cve,wordpress,wp-plugin,easy-custom-auto-excerpt,medium + tags: cve,wordpress,wp-plugin,easy-custom-auto-excerpt,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5312-92b868ab957b2d6b33921f7b3f3c0643.yaml b/nuclei-templates/2018/CVE-2018-5312-92b868ab957b2d6b33921f7b3f3c0643.yaml index f88c44cfa8..aad9cf7daf 100644 --- a/nuclei-templates/2018/CVE-2018-5312-92b868ab957b2d6b33921f7b3f3c0643.yaml +++ b/nuclei-templates/2018/CVE-2018-5312-92b868ab957b2d6b33921f7b3f3c0643.yaml @@ -4,7 +4,7 @@ info: name: > WP Tabs – Responsive Tabs Plugin for WordPress <= 1.8.0 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Responsive Tabs Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘post_title’ parameter in versions up to, and including, 1.8.0 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-expand-tabs-free/" google-query: inurl:"/wp-content/plugins/wp-expand-tabs-free/" shodan-query: 'vuln:CVE-2018-5312' - tags: cve,wordpress,wp-plugin,wp-expand-tabs-free,medium + tags: cve,wordpress,wp-plugin,wp-expand-tabs-free,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5316-436125bac0484b579189e9f21786e904.yaml b/nuclei-templates/2018/CVE-2018-5316-436125bac0484b579189e9f21786e904.yaml index 065b6e179c..b4d6708412 100644 --- a/nuclei-templates/2018/CVE-2018-5316-436125bac0484b579189e9f21786e904.yaml +++ b/nuclei-templates/2018/CVE-2018-5316-436125bac0484b579189e9f21786e904.yaml @@ -4,7 +4,7 @@ info: name: > SagePay Server Gateway for WooCommerce < 1.0.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The "SagePay Server Gateway for WooCommerce" plugin before 1.0.9 for WordPress has XSS via the includes/pages/redirect.php page parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sagepay-server-gateway-for-woocommerce/" google-query: inurl:"/wp-content/plugins/sagepay-server-gateway-for-woocommerce/" shodan-query: 'vuln:CVE-2018-5316' - tags: cve,wordpress,wp-plugin,sagepay-server-gateway-for-woocommerce,medium + tags: cve,wordpress,wp-plugin,sagepay-server-gateway-for-woocommerce,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5361-e95762dedf29574050fd40fac42c78ac.yaml b/nuclei-templates/2018/CVE-2018-5361-e95762dedf29574050fd40fac42c78ac.yaml index b6c7a4b3de..9f5e4ce85c 100644 --- a/nuclei-templates/2018/CVE-2018-5361-e95762dedf29574050fd40fac42c78ac.yaml +++ b/nuclei-templates/2018/CVE-2018-5361-e95762dedf29574050fd40fac42c78ac.yaml @@ -4,7 +4,7 @@ info: name: > WPGlobus – Multilingual Everything! <= 1.9.6 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The WPGlobus plugin 1.9.6 for WordPress has CSRF via wp-admin/options.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpglobus/" google-query: inurl:"/wp-content/plugins/wpglobus/" shodan-query: 'vuln:CVE-2018-5361' - tags: cve,wordpress,wp-plugin,wpglobus,high + tags: cve,wordpress,wp-plugin,wpglobus,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5362-3ba8578c9b517b602d4e446e82ee6f17.yaml b/nuclei-templates/2018/CVE-2018-5362-3ba8578c9b517b602d4e446e82ee6f17.yaml index e3b46a835a..500c1dfa66 100644 --- a/nuclei-templates/2018/CVE-2018-5362-3ba8578c9b517b602d4e446e82ee6f17.yaml +++ b/nuclei-templates/2018/CVE-2018-5362-3ba8578c9b517b602d4e446e82ee6f17.yaml @@ -4,7 +4,7 @@ info: name: > WPGlobus – Multilingual Everything! <= 1.9.6 - Cross-Site Scripting via wpglobus_option[post_type][page] author: topscoder - severity: medium + severity: high description: > The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[post_type][page] parameter to wp-admin/options.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpglobus/" google-query: inurl:"/wp-content/plugins/wpglobus/" shodan-query: 'vuln:CVE-2018-5362' - tags: cve,wordpress,wp-plugin,wpglobus,medium + tags: cve,wordpress,wp-plugin,wpglobus,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5363-485a36eabec5f4b9943990f0033b308d.yaml b/nuclei-templates/2018/CVE-2018-5363-485a36eabec5f4b9943990f0033b308d.yaml index 8f1a6a2532..47c9affa27 100644 --- a/nuclei-templates/2018/CVE-2018-5363-485a36eabec5f4b9943990f0033b308d.yaml +++ b/nuclei-templates/2018/CVE-2018-5363-485a36eabec5f4b9943990f0033b308d.yaml @@ -4,7 +4,7 @@ info: name: > WPGlobus – Multilingual Everything! <= 1.9.6 - Cross-Site Scripting via wpglobus_option[enabled_languages] author: topscoder - severity: medium + severity: high description: > The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[enabled_languages][en] or wpglobus_option[enabled_languages][fr] (or any other language) parameter to wp-admin/options.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpglobus/" google-query: inurl:"/wp-content/plugins/wpglobus/" shodan-query: 'vuln:CVE-2018-5363' - tags: cve,wordpress,wp-plugin,wpglobus,medium + tags: cve,wordpress,wp-plugin,wpglobus,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5364-ddb8a7f2865d6d7dbea16193f41bd919.yaml b/nuclei-templates/2018/CVE-2018-5364-ddb8a7f2865d6d7dbea16193f41bd919.yaml index e39953011c..5ed64571de 100644 --- a/nuclei-templates/2018/CVE-2018-5364-ddb8a7f2865d6d7dbea16193f41bd919.yaml +++ b/nuclei-templates/2018/CVE-2018-5364-ddb8a7f2865d6d7dbea16193f41bd919.yaml @@ -4,7 +4,7 @@ info: name: > WPGlobus – Multilingual Everything! <= 1.9.6 - Cross-Site Scripting via wpglobus_option[browser_redirect][redirect_by_language] author: topscoder - severity: medium + severity: high description: > The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[browser_redirect][redirect_by_language] parameter to wp-admin/options.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpglobus/" google-query: inurl:"/wp-content/plugins/wpglobus/" shodan-query: 'vuln:CVE-2018-5364' - tags: cve,wordpress,wp-plugin,wpglobus,medium + tags: cve,wordpress,wp-plugin,wpglobus,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5366-c384382f7d3c6321e1b275243f5d2c28.yaml b/nuclei-templates/2018/CVE-2018-5366-c384382f7d3c6321e1b275243f5d2c28.yaml index 8d4ec69c63..35e8380c5f 100644 --- a/nuclei-templates/2018/CVE-2018-5366-c384382f7d3c6321e1b275243f5d2c28.yaml +++ b/nuclei-templates/2018/CVE-2018-5366-c384382f7d3c6321e1b275243f5d2c28.yaml @@ -4,7 +4,7 @@ info: name: > WPGlobus – Multilingual Everything! <= 1.9.6 - Cross-Site Scripting via wpglobus_option[more_languages] author: topscoder - severity: medium + severity: high description: > The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[more_languages] parameter to wp-admin/options.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpglobus/" google-query: inurl:"/wp-content/plugins/wpglobus/" shodan-query: 'vuln:CVE-2018-5366' - tags: cve,wordpress,wp-plugin,wpglobus,medium + tags: cve,wordpress,wp-plugin,wpglobus,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5367-f4fb22207f3c1928cb95d88c1e1f82b7.yaml b/nuclei-templates/2018/CVE-2018-5367-f4fb22207f3c1928cb95d88c1e1f82b7.yaml index 5ea3a678ce..5ce4700681 100644 --- a/nuclei-templates/2018/CVE-2018-5367-f4fb22207f3c1928cb95d88c1e1f82b7.yaml +++ b/nuclei-templates/2018/CVE-2018-5367-f4fb22207f3c1928cb95d88c1e1f82b7.yaml @@ -4,7 +4,7 @@ info: name: > WPGlobus – Multilingual Everything! <= 1.9.6 - Cross-Site Scripting via wpglobus_option[post_type][post] author: topscoder - severity: medium + severity: high description: > The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[post_type][post] parameter to wp-admin/options.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpglobus/" google-query: inurl:"/wp-content/plugins/wpglobus/" shodan-query: 'vuln:CVE-2018-5367' - tags: cve,wordpress,wp-plugin,wpglobus,medium + tags: cve,wordpress,wp-plugin,wpglobus,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5368-e8f7e29f1dbade4dd38e32bd0037d5fe.yaml b/nuclei-templates/2018/CVE-2018-5368-e8f7e29f1dbade4dd38e32bd0037d5fe.yaml index 31892d2a6b..866ef30fbf 100644 --- a/nuclei-templates/2018/CVE-2018-5368-e8f7e29f1dbade4dd38e32bd0037d5fe.yaml +++ b/nuclei-templates/2018/CVE-2018-5368-e8f7e29f1dbade4dd38e32bd0037d5fe.yaml @@ -4,7 +4,7 @@ info: name: > SrbTransLatin <= 1.46 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The SrbTransLatin plugin 1.46 for WordPress has CSRF via an srbtranslatoptions action to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/srbtranslatin/" google-query: inurl:"/wp-content/plugins/srbtranslatin/" shodan-query: 'vuln:CVE-2018-5368' - tags: cve,wordpress,wp-plugin,srbtranslatin,high + tags: cve,wordpress,wp-plugin,srbtranslatin,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5369-acbdf42f0c9734064513cf6368d19553.yaml b/nuclei-templates/2018/CVE-2018-5369-acbdf42f0c9734064513cf6368d19553.yaml index ec1fb6be9e..5d2f56070d 100644 --- a/nuclei-templates/2018/CVE-2018-5369-acbdf42f0c9734064513cf6368d19553.yaml +++ b/nuclei-templates/2018/CVE-2018-5369-acbdf42f0c9734064513cf6368d19553.yaml @@ -4,7 +4,7 @@ info: name: > SrbTransLatin – SrbTransLatin <= 1.46 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The SrbTransLatin plugin 1.46 for WordPress has XSS via an srbtranslatoptions action to wp-admin/options-general.php with a lang_identificator parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/srbtranslatin/" google-query: inurl:"/wp-content/plugins/srbtranslatin/" shodan-query: 'vuln:CVE-2018-5369' - tags: cve,wordpress,wp-plugin,srbtranslatin,medium + tags: cve,wordpress,wp-plugin,srbtranslatin,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5372-0cd68afb7b6d648c1cc92eb32c923eff.yaml b/nuclei-templates/2018/CVE-2018-5372-0cd68afb7b6d648c1cc92eb32c923eff.yaml index e1c2e5d721..f47f53e589 100644 --- a/nuclei-templates/2018/CVE-2018-5372-0cd68afb7b6d648c1cc92eb32c923eff.yaml +++ b/nuclei-templates/2018/CVE-2018-5372-0cd68afb7b6d648c1cc92eb32c923eff.yaml @@ -4,7 +4,7 @@ info: name: > Testimonial Slider < 1.2.5 - SQL Injection author: topscoder - severity: high + severity: critical description: > The Testimonial Slider plugin through 1.2.4 for WordPress has SQL Injection via settings\sliders.php (current_slider_id parameter). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/testimonial-slider/" google-query: inurl:"/wp-content/plugins/testimonial-slider/" shodan-query: 'vuln:CVE-2018-5372' - tags: cve,wordpress,wp-plugin,testimonial-slider,high + tags: cve,wordpress,wp-plugin,testimonial-slider,critical http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5373-5e7c4bc77fb9b2b637c41f55c55733f0.yaml b/nuclei-templates/2018/CVE-2018-5373-5e7c4bc77fb9b2b637c41f55c55733f0.yaml index 0d663c2ef0..71bfc2536b 100644 --- a/nuclei-templates/2018/CVE-2018-5373-5e7c4bc77fb9b2b637c41f55c55733f0.yaml +++ b/nuclei-templates/2018/CVE-2018-5373-5e7c4bc77fb9b2b637c41f55c55733f0.yaml @@ -4,7 +4,7 @@ info: name: > Smooth Slider < 2.8.7 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > The Smooth Slider plugin through 2.8.6 for WordPress has SQL Injection via smooth-slider.php (trid parameter). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/smooth-slider/" google-query: inurl:"/wp-content/plugins/smooth-slider/" shodan-query: 'vuln:CVE-2018-5373' - tags: cve,wordpress,wp-plugin,smooth-slider,high + tags: cve,wordpress,wp-plugin,smooth-slider,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5374-801a0dacfdb031773ac30c73693f41e6.yaml b/nuclei-templates/2018/CVE-2018-5374-801a0dacfdb031773ac30c73693f41e6.yaml index 797899562f..64a3535dcd 100644 --- a/nuclei-templates/2018/CVE-2018-5374-801a0dacfdb031773ac30c73693f41e6.yaml +++ b/nuclei-templates/2018/CVE-2018-5374-801a0dacfdb031773ac30c73693f41e6.yaml @@ -4,7 +4,7 @@ info: name: > Dbox 3D Slider Lite <= 1.2.2 - SQL Injection author: topscoder - severity: high + severity: critical description: > The Dbox 3D Slider Lite plugin through 1.2.2 for WordPress has SQL Injection via settings\sliders.php (current_slider_id parameter). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/dbox-slider-lite/" google-query: inurl:"/wp-content/plugins/dbox-slider-lite/" shodan-query: 'vuln:CVE-2018-5374' - tags: cve,wordpress,wp-plugin,dbox-slider-lite,high + tags: cve,wordpress,wp-plugin,dbox-slider-lite,critical http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5651-1955d2bf9e3369181a1e0d457e568aab.yaml b/nuclei-templates/2018/CVE-2018-5651-1955d2bf9e3369181a1e0d457e568aab.yaml index 9b9f3f8ba4..598d5d020e 100644 --- a/nuclei-templates/2018/CVE-2018-5651-1955d2bf9e3369181a1e0d457e568aab.yaml +++ b/nuclei-templates/2018/CVE-2018-5651-1955d2bf9e3369181a1e0d457e568aab.yaml @@ -4,7 +4,7 @@ info: name: > WP Markdown Editor (Formerly Dark Mode) < 1.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An issue was discovered in the dark-mode plugin 1.6 for WordPress. XSS exists via the wp-admin/profile.php dark_mode_start parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/dark-mode/" google-query: inurl:"/wp-content/plugins/dark-mode/" shodan-query: 'vuln:CVE-2018-5651' - tags: cve,wordpress,wp-plugin,dark-mode,medium + tags: cve,wordpress,wp-plugin,dark-mode,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5652-854c79af36aba0da3346494de4eaf39a.yaml b/nuclei-templates/2018/CVE-2018-5652-854c79af36aba0da3346494de4eaf39a.yaml index d2269ad143..bbee7d3d0b 100644 --- a/nuclei-templates/2018/CVE-2018-5652-854c79af36aba0da3346494de4eaf39a.yaml +++ b/nuclei-templates/2018/CVE-2018-5652-854c79af36aba0da3346494de4eaf39a.yaml @@ -4,7 +4,7 @@ info: name: > WP Markdown Editor (Formerly Dark Mode) < 1.7 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An issue was discovered in the dark-mode plugin 1.6 for WordPress. XSS exists via the wp-admin/profile.php dark_mode_end parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/dark-mode/" google-query: inurl:"/wp-content/plugins/dark-mode/" shodan-query: 'vuln:CVE-2018-5652' - tags: cve,wordpress,wp-plugin,dark-mode,medium + tags: cve,wordpress,wp-plugin,dark-mode,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5654-9052f6be826c55f21c5dca387bdd8f58.yaml b/nuclei-templates/2018/CVE-2018-5654-9052f6be826c55f21c5dca387bdd8f58.yaml index 6bf8dbf086..717b193642 100644 --- a/nuclei-templates/2018/CVE-2018-5654-9052f6be826c55f21c5dca387bdd8f58.yaml +++ b/nuclei-templates/2018/CVE-2018-5654-9052f6be826c55f21c5dca387bdd8f58.yaml @@ -4,7 +4,7 @@ info: name: > Weblizar Pin Feeds < 1.1.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An issue was discovered in the weblizar-pinterest-feeds plugin 1.1.1 for WordPress. XSS exists via the wp-admin/admin-ajax.php PFFREE_Access_Token parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/weblizar-pinterest-feeds/" google-query: inurl:"/wp-content/plugins/weblizar-pinterest-feeds/" shodan-query: 'vuln:CVE-2018-5654' - tags: cve,wordpress,wp-plugin,weblizar-pinterest-feeds,medium + tags: cve,wordpress,wp-plugin,weblizar-pinterest-feeds,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5655-2f71afc8c2d9293f41fbc23cbef8e12e.yaml b/nuclei-templates/2018/CVE-2018-5655-2f71afc8c2d9293f41fbc23cbef8e12e.yaml index 06bc4d6da0..0dab10a027 100644 --- a/nuclei-templates/2018/CVE-2018-5655-2f71afc8c2d9293f41fbc23cbef8e12e.yaml +++ b/nuclei-templates/2018/CVE-2018-5655-2f71afc8c2d9293f41fbc23cbef8e12e.yaml @@ -4,7 +4,7 @@ info: name: > Weblizar Pin Feeds < 1.1.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An issue was discovered in the weblizar-pinterest-feeds plugin 1.1.1 for WordPress. XSS exists via the wp-admin/admin-ajax.php security parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/weblizar-pinterest-feeds/" google-query: inurl:"/wp-content/plugins/weblizar-pinterest-feeds/" shodan-query: 'vuln:CVE-2018-5655' - tags: cve,wordpress,wp-plugin,weblizar-pinterest-feeds,medium + tags: cve,wordpress,wp-plugin,weblizar-pinterest-feeds,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5656-c4fa0744bf528288e2b344cf15e3e525.yaml b/nuclei-templates/2018/CVE-2018-5656-c4fa0744bf528288e2b344cf15e3e525.yaml index 03561c3845..99aa319d91 100644 --- a/nuclei-templates/2018/CVE-2018-5656-c4fa0744bf528288e2b344cf15e3e525.yaml +++ b/nuclei-templates/2018/CVE-2018-5656-c4fa0744bf528288e2b344cf15e3e525.yaml @@ -4,7 +4,7 @@ info: name: > Weblizar Pin Feeds < 1.1.2 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > An issue was discovered in the weblizar-pinterest-feeds plugin 1.1.1 for WordPress. CSRF exists via wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/weblizar-pinterest-feeds/" google-query: inurl:"/wp-content/plugins/weblizar-pinterest-feeds/" shodan-query: 'vuln:CVE-2018-5656' - tags: cve,wordpress,wp-plugin,weblizar-pinterest-feeds,high + tags: cve,wordpress,wp-plugin,weblizar-pinterest-feeds,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5657-ff98de6f26943739c7dc560ade3e2c7d.yaml b/nuclei-templates/2018/CVE-2018-5657-ff98de6f26943739c7dc560ade3e2c7d.yaml index 4ce498192e..710cc805c2 100644 --- a/nuclei-templates/2018/CVE-2018-5657-ff98de6f26943739c7dc560ade3e2c7d.yaml +++ b/nuclei-templates/2018/CVE-2018-5657-ff98de6f26943739c7dc560ade3e2c7d.yaml @@ -4,7 +4,7 @@ info: name: > Coming Soon <= 1.1.18 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php counter_title_icon parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/responsive-coming-soon-page/" google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" shodan-query: 'vuln:CVE-2018-5657' - tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,medium + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5658-c4c0b94844e7f594c58f973ae84c6505.yaml b/nuclei-templates/2018/CVE-2018-5658-c4c0b94844e7f594c58f973ae84c6505.yaml index 9df231ed49..903e48f6f2 100644 --- a/nuclei-templates/2018/CVE-2018-5658-c4c0b94844e7f594c58f973ae84c6505.yaml +++ b/nuclei-templates/2018/CVE-2018-5658-c4c0b94844e7f594c58f973ae84c6505.yaml @@ -4,7 +4,7 @@ info: name: > Coming Soon Page – Responsive Coming Soon & Maintenance Mode <= 1.1.18 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. CSRF exists via wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/responsive-coming-soon-page/" google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" shodan-query: 'vuln:CVE-2018-5658' - tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5659-2fca652bdc1152658ff99e932f826e15.yaml b/nuclei-templates/2018/CVE-2018-5659-2fca652bdc1152658ff99e932f826e15.yaml index 1f12fb9bff..2948c2786e 100644 --- a/nuclei-templates/2018/CVE-2018-5659-2fca652bdc1152658ff99e932f826e15.yaml +++ b/nuclei-templates/2018/CVE-2018-5659-2fca652bdc1152658ff99e932f826e15.yaml @@ -4,7 +4,7 @@ info: name: > Coming Soon < 1.1.19 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php coming-soon_title parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/responsive-coming-soon-page/" google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" shodan-query: 'vuln:CVE-2018-5659' - tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,medium + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5660-aeeb6c4c51959fc6de4f70bfbf031f53.yaml b/nuclei-templates/2018/CVE-2018-5660-aeeb6c4c51959fc6de4f70bfbf031f53.yaml index c22f8f6713..31275fecd9 100644 --- a/nuclei-templates/2018/CVE-2018-5660-aeeb6c4c51959fc6de4f70bfbf031f53.yaml +++ b/nuclei-templates/2018/CVE-2018-5660-aeeb6c4c51959fc6de4f70bfbf031f53.yaml @@ -4,7 +4,7 @@ info: name: > Coming Soon Page – Responsive Coming Soon & Maintenance Mode <= 1.1.18 - Cross-Site Scripting via coming-soon_sub_title parameter author: topscoder - severity: medium + severity: high description: > An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php coming-soon_sub_title parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/responsive-coming-soon-page/" google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" shodan-query: 'vuln:CVE-2018-5660' - tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,medium + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5661-9a185bb7031cc9ee6aedfd50f633a1fb.yaml b/nuclei-templates/2018/CVE-2018-5661-9a185bb7031cc9ee6aedfd50f633a1fb.yaml index b37d3db639..50dba87254 100644 --- a/nuclei-templates/2018/CVE-2018-5661-9a185bb7031cc9ee6aedfd50f633a1fb.yaml +++ b/nuclei-templates/2018/CVE-2018-5661-9a185bb7031cc9ee6aedfd50f633a1fb.yaml @@ -4,7 +4,7 @@ info: name: > Coming Soon Page – Responsive Coming Soon & Maintenance Mode <= 1.1.18 - Cross-Site Scripting via logo_width parameter author: topscoder - severity: medium + severity: high description: > An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php logo_width parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/responsive-coming-soon-page/" google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" shodan-query: 'vuln:CVE-2018-5661' - tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,medium + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5662-40faedf6e59dffdfc7f0e36dcf3aadb5.yaml b/nuclei-templates/2018/CVE-2018-5662-40faedf6e59dffdfc7f0e36dcf3aadb5.yaml index c3fdc7ed3a..2f73fb2ac6 100644 --- a/nuclei-templates/2018/CVE-2018-5662-40faedf6e59dffdfc7f0e36dcf3aadb5.yaml +++ b/nuclei-templates/2018/CVE-2018-5662-40faedf6e59dffdfc7f0e36dcf3aadb5.yaml @@ -4,7 +4,7 @@ info: name: > Coming Soon Page – Responsive Coming Soon & Maintenance Mode <= 1.1.18 - Cross-Site Scripting via counter_title parameter author: topscoder - severity: medium + severity: high description: > An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php counter_title parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/responsive-coming-soon-page/" google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" shodan-query: 'vuln:CVE-2018-5662' - tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,medium + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5663-6e94975f5a72379b4c113015c234f26e.yaml b/nuclei-templates/2018/CVE-2018-5663-6e94975f5a72379b4c113015c234f26e.yaml index f92704f181..ca81943420 100644 --- a/nuclei-templates/2018/CVE-2018-5663-6e94975f5a72379b4c113015c234f26e.yaml +++ b/nuclei-templates/2018/CVE-2018-5663-6e94975f5a72379b4c113015c234f26e.yaml @@ -4,7 +4,7 @@ info: name: > Coming Soon Page – Responsive Coming Soon & Maintenance Mode <= 1.1.18 - Cross-Site Scripting via button_text_link parameter author: topscoder - severity: medium + severity: high description: > An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php button_text_link parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/responsive-coming-soon-page/" google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" shodan-query: 'vuln:CVE-2018-5663' - tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,medium + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5664-3f9a61f980dbe211de3420fd4e108af4.yaml b/nuclei-templates/2018/CVE-2018-5664-3f9a61f980dbe211de3420fd4e108af4.yaml index c5074a5f17..e87dc40a61 100644 --- a/nuclei-templates/2018/CVE-2018-5664-3f9a61f980dbe211de3420fd4e108af4.yaml +++ b/nuclei-templates/2018/CVE-2018-5664-3f9a61f980dbe211de3420fd4e108af4.yaml @@ -4,7 +4,7 @@ info: name: > Coming Soon Page – Responsive Coming Soon & Maintenance Mode <= 1.1.18 - Cross-Site Scripting via social_icon_1 parameter author: topscoder - severity: medium + severity: high description: > An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php social_icon_1 parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/responsive-coming-soon-page/" google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" shodan-query: 'vuln:CVE-2018-5664' - tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,medium + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5665-c26b1839d934a6c01fe10cd6a0d67c39.yaml b/nuclei-templates/2018/CVE-2018-5665-c26b1839d934a6c01fe10cd6a0d67c39.yaml index 1353933b63..2f44e929ff 100644 --- a/nuclei-templates/2018/CVE-2018-5665-c26b1839d934a6c01fe10cd6a0d67c39.yaml +++ b/nuclei-templates/2018/CVE-2018-5665-c26b1839d934a6c01fe10cd6a0d67c39.yaml @@ -4,7 +4,7 @@ info: name: > Coming Soon Page – Responsive Coming Soon & Maintenance Mode <= 1.1.18 - Cross-Site Scripting via logo_height parameter author: topscoder - severity: medium + severity: high description: > An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php logo_height parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/responsive-coming-soon-page/" google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" shodan-query: 'vuln:CVE-2018-5665' - tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,medium + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5666-3e7642452405a4b08d52483d238d4dd9.yaml b/nuclei-templates/2018/CVE-2018-5666-3e7642452405a4b08d52483d238d4dd9.yaml index da3793f10d..f46a838010 100644 --- a/nuclei-templates/2018/CVE-2018-5666-3e7642452405a4b08d52483d238d4dd9.yaml +++ b/nuclei-templates/2018/CVE-2018-5666-3e7642452405a4b08d52483d238d4dd9.yaml @@ -4,7 +4,7 @@ info: name: > Coming Soon Page – Responsive Coming Soon & Maintenance Mode <= 1.1.18 - Cross-Site Scripting via bg_color parameter author: topscoder - severity: medium + severity: high description: > An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php bg_color parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/responsive-coming-soon-page/" google-query: inurl:"/wp-content/plugins/responsive-coming-soon-page/" shodan-query: 'vuln:CVE-2018-5666' - tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,medium + tags: cve,wordpress,wp-plugin,responsive-coming-soon-page,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5667-913904da9b37e5de5dab8db2c48cdd1a.yaml b/nuclei-templates/2018/CVE-2018-5667-913904da9b37e5de5dab8db2c48cdd1a.yaml index d6c0c0f68f..7ed55ddcbe 100644 --- a/nuclei-templates/2018/CVE-2018-5667-913904da9b37e5de5dab8db2c48cdd1a.yaml +++ b/nuclei-templates/2018/CVE-2018-5667-913904da9b37e5de5dab8db2c48cdd1a.yaml @@ -4,7 +4,7 @@ info: name: > Read and Understood <= 2.1 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An issue was discovered in the read-and-understood plugin 2.1 for WordPress. XSS exists via the wp-admin/options-general.php rnu_username_validation_pattern parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/read-and-understood/" google-query: inurl:"/wp-content/plugins/read-and-understood/" shodan-query: 'vuln:CVE-2018-5667' - tags: cve,wordpress,wp-plugin,read-and-understood,medium + tags: cve,wordpress,wp-plugin,read-and-understood,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5668-b32bcea1f07567d61bc53250e86795f7.yaml b/nuclei-templates/2018/CVE-2018-5668-b32bcea1f07567d61bc53250e86795f7.yaml index 4550cfeece..f4fe96f794 100644 --- a/nuclei-templates/2018/CVE-2018-5668-b32bcea1f07567d61bc53250e86795f7.yaml +++ b/nuclei-templates/2018/CVE-2018-5668-b32bcea1f07567d61bc53250e86795f7.yaml @@ -4,7 +4,7 @@ info: name: > Read and Understood < 2.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An issue was discovered in the read-and-understood plugin 2.1 for WordPress. XSS exists via the wp-admin/options-general.php rnu_username_validation_title parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/read-and-understood/" google-query: inurl:"/wp-content/plugins/read-and-understood/" shodan-query: 'vuln:CVE-2018-5668' - tags: cve,wordpress,wp-plugin,read-and-understood,medium + tags: cve,wordpress,wp-plugin,read-and-understood,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5669-9859097987f0e7ca79e11ace81cfa3fa.yaml b/nuclei-templates/2018/CVE-2018-5669-9859097987f0e7ca79e11ace81cfa3fa.yaml index 6c8c5d64c3..ee767a5dbe 100644 --- a/nuclei-templates/2018/CVE-2018-5669-9859097987f0e7ca79e11ace81cfa3fa.yaml +++ b/nuclei-templates/2018/CVE-2018-5669-9859097987f0e7ca79e11ace81cfa3fa.yaml @@ -4,7 +4,7 @@ info: name: > Read and Understood < 2.2 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > An issue was discovered in the read-and-understood plugin 2.1 for WordPress. CSRF exists via wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/read-and-understood/" google-query: inurl:"/wp-content/plugins/read-and-understood/" shodan-query: 'vuln:CVE-2018-5669' - tags: cve,wordpress,wp-plugin,read-and-understood,high + tags: cve,wordpress,wp-plugin,read-and-understood,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5670-c3498fe08662af21fd3da077be763084.yaml b/nuclei-templates/2018/CVE-2018-5670-c3498fe08662af21fd3da077be763084.yaml index bf21daebaa..95961d26e6 100644 --- a/nuclei-templates/2018/CVE-2018-5670-c3498fe08662af21fd3da077be763084.yaml +++ b/nuclei-templates/2018/CVE-2018-5670-c3498fe08662af21fd3da077be763084.yaml @@ -4,7 +4,7 @@ info: name: > Booking calendar, Appointment Booking System <= 2.1.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An issue was discovered in the booking-calendar plugin 2.1.7 for WordPress. XSS exists via the wp-admin/admin.php sale_conditions[count][] parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/booking-calendar/" google-query: inurl:"/wp-content/plugins/booking-calendar/" shodan-query: 'vuln:CVE-2018-5670' - tags: cve,wordpress,wp-plugin,booking-calendar,medium + tags: cve,wordpress,wp-plugin,booking-calendar,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5671-78f758aca2b7adcaf11ee6e697616163.yaml b/nuclei-templates/2018/CVE-2018-5671-78f758aca2b7adcaf11ee6e697616163.yaml index 9f3e9f386f..6b30b461db 100644 --- a/nuclei-templates/2018/CVE-2018-5671-78f758aca2b7adcaf11ee6e697616163.yaml +++ b/nuclei-templates/2018/CVE-2018-5671-78f758aca2b7adcaf11ee6e697616163.yaml @@ -4,7 +4,7 @@ info: name: > Booking calendar, Appointment Booking System <= 2.1.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An issue was discovered in the booking-calendar plugin 2.1.7 for WordPress. XSS exists via the wp-admin/admin.php extra_field1[items][field_item1][price_percent] parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/booking-calendar/" google-query: inurl:"/wp-content/plugins/booking-calendar/" shodan-query: 'vuln:CVE-2018-5671' - tags: cve,wordpress,wp-plugin,booking-calendar,medium + tags: cve,wordpress,wp-plugin,booking-calendar,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5672-6a9d80e8fa30f682db502c67279e3ece.yaml b/nuclei-templates/2018/CVE-2018-5672-6a9d80e8fa30f682db502c67279e3ece.yaml index 46586b6160..1a64221974 100644 --- a/nuclei-templates/2018/CVE-2018-5672-6a9d80e8fa30f682db502c67279e3ece.yaml +++ b/nuclei-templates/2018/CVE-2018-5672-6a9d80e8fa30f682db502c67279e3ece.yaml @@ -4,7 +4,7 @@ info: name: > Booking calendar, Appointment Booking System <= 2.1.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An issue was discovered in the booking-calendar plugin 2.1.7 for WordPress. XSS exists via the wp-admin/admin.php form_field5[label] parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/booking-calendar/" google-query: inurl:"/wp-content/plugins/booking-calendar/" shodan-query: 'vuln:CVE-2018-5672' - tags: cve,wordpress,wp-plugin,booking-calendar,medium + tags: cve,wordpress,wp-plugin,booking-calendar,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5673-0cfb154efea7a6cd97d79b7c9bd11b19.yaml b/nuclei-templates/2018/CVE-2018-5673-0cfb154efea7a6cd97d79b7c9bd11b19.yaml index 4b7e8236b9..96fdc90ad2 100644 --- a/nuclei-templates/2018/CVE-2018-5673-0cfb154efea7a6cd97d79b7c9bd11b19.yaml +++ b/nuclei-templates/2018/CVE-2018-5673-0cfb154efea7a6cd97d79b7c9bd11b19.yaml @@ -4,7 +4,7 @@ info: name: > Booking calendar, Appointment Booking System <= 2.1.7 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > An issue was discovered in the booking-calendar plugin 2.1.7 for WordPress. CSRF exists via wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/booking-calendar/" google-query: inurl:"/wp-content/plugins/booking-calendar/" shodan-query: 'vuln:CVE-2018-5673' - tags: cve,wordpress,wp-plugin,booking-calendar,high + tags: cve,wordpress,wp-plugin,booking-calendar,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5695-15e650b4ee038f777984c647938b664a.yaml b/nuclei-templates/2018/CVE-2018-5695-15e650b4ee038f777984c647938b664a.yaml index d60eb1eb58..e5a962c50d 100644 --- a/nuclei-templates/2018/CVE-2018-5695-15e650b4ee038f777984c647938b664a.yaml +++ b/nuclei-templates/2018/CVE-2018-5695-15e650b4ee038f777984c647938b664a.yaml @@ -4,7 +4,7 @@ info: name: > WP Job Board <= 4.4.4 - SQL Injection author: topscoder - severity: high + severity: critical description: > The WpJobBoard plugin 4.4.4 for WordPress allows SQL injection via the order or sort parameter to the wpjb-job or wpjb-alerts module, with a request to wp-admin/admin.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpjobboard/" google-query: inurl:"/wp-content/plugins/wpjobboard/" shodan-query: 'vuln:CVE-2018-5695' - tags: cve,wordpress,wp-plugin,wpjobboard,high + tags: cve,wordpress,wp-plugin,wpjobboard,critical http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-5776-88414da74c1432faaa821c60e30d70e4.yaml b/nuclei-templates/2018/CVE-2018-5776-88414da74c1432faaa821c60e30d70e4.yaml index ab25ddf90c..b31a3effde 100644 --- a/nuclei-templates/2018/CVE-2018-5776-88414da74c1432faaa821c60e30d70e4.yaml +++ b/nuclei-templates/2018/CVE-2018-5776-88414da74c1432faaa821c60e30d70e4.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 4.9.2 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > WordPress before 4.9.2 has XSS in the Flash fallback files in MediaElement (under wp-includes/js/mediaelement). reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2018-5776 metadata: shodan-query: 'vuln:CVE-2018-5776' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-6001-4c3c497ff4bf73b3f95e774197f4a725.yaml b/nuclei-templates/2018/CVE-2018-6001-4c3c497ff4bf73b3f95e774197f4a725.yaml index 2b64235101..238ee15286 100644 --- a/nuclei-templates/2018/CVE-2018-6001-4c3c497ff4bf73b3f95e774197f4a725.yaml +++ b/nuclei-templates/2018/CVE-2018-6001-4c3c497ff4bf73b3f95e774197f4a725.yaml @@ -4,7 +4,7 @@ info: name: > Soundy Audio Playlist <= 4.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Soundy Audio Playlist plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 4.6. This is due to missing or incorrect nonce validation on the 'soundy-audio-playlist\templates\front-end.php (war_sdy_pl_preview parameter)' function. This makes it possible for unauthenticated attackers to leverage arbitrary script code and execute via forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/soundy-audio-playlist/" google-query: inurl:"/wp-content/plugins/soundy-audio-playlist/" shodan-query: 'vuln:CVE-2018-6001' - tags: cve,wordpress,wp-plugin,soundy-audio-playlist,medium + tags: cve,wordpress,wp-plugin,soundy-audio-playlist,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-6002-aae33717a53aff7e44346754fe498f79.yaml b/nuclei-templates/2018/CVE-2018-6002-aae33717a53aff7e44346754fe498f79.yaml index 01a47ff70e..8c0c4d9193 100644 --- a/nuclei-templates/2018/CVE-2018-6002-aae33717a53aff7e44346754fe498f79.yaml +++ b/nuclei-templates/2018/CVE-2018-6002-aae33717a53aff7e44346754fe498f79.yaml @@ -4,7 +4,7 @@ info: name: > Soundy Background Music <= 3.9 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Soundy Background Music plugin 3.9 and below for WordPress has Cross-Site Scripting via soundy-background-music\templates\front-end.php (war_soundy_preview parameter). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/soundy-background-music/" google-query: inurl:"/wp-content/plugins/soundy-background-music/" shodan-query: 'vuln:CVE-2018-6002' - tags: cve,wordpress,wp-plugin,soundy-background-music,medium + tags: cve,wordpress,wp-plugin,soundy-background-music,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-6194-3ea0e1871dec257bfd7cde582f2ade2e.yaml b/nuclei-templates/2018/CVE-2018-6194-3ea0e1871dec257bfd7cde582f2ade2e.yaml index dedb3ad69d..b92d6154a5 100644 --- a/nuclei-templates/2018/CVE-2018-6194-3ea0e1871dec257bfd7cde582f2ade2e.yaml +++ b/nuclei-templates/2018/CVE-2018-6194-3ea0e1871dec257bfd7cde582f2ade2e.yaml @@ -4,7 +4,7 @@ info: name: > Splashing Images < 2.1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > A cross-site scripting (XSS) vulnerability in admin/partials/wp-splashing-admin-sidebar.php in the Splashing Images plugin (wp-splashing-images) before 2.1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the search parameter to wp-admin/upload.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-splashing-images/" google-query: inurl:"/wp-content/plugins/wp-splashing-images/" shodan-query: 'vuln:CVE-2018-6194' - tags: cve,wordpress,wp-plugin,wp-splashing-images,medium + tags: cve,wordpress,wp-plugin,wp-splashing-images,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-6357-6c3ed40b4545418647bb281d1735150e.yaml b/nuclei-templates/2018/CVE-2018-6357-6c3ed40b4545418647bb281d1735150e.yaml index c68b38fec4..1c6ebcd9f0 100644 --- a/nuclei-templates/2018/CVE-2018-6357-6c3ed40b4545418647bb281d1735150e.yaml +++ b/nuclei-templates/2018/CVE-2018-6357-6c3ed40b4545418647bb281d1735150e.yaml @@ -4,7 +4,7 @@ info: name: > Social Media Widget by Acurax <= 3.2.5 - Cross-Site Request Forgery leading to Cross-Site Scripting via the recordsArray Parameter author: topscoder - severity: high + severity: medium description: > The acx_asmw_saveorder_callback function in function.php in the acurax-social-media-widget plugin before 3.2.6 for WordPress has CSRF via the recordsArray parameter to wp-admin/admin-ajax.php, with resultant social_widget_icon_array_order XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/acurax-social-media-widget/" google-query: inurl:"/wp-content/plugins/acurax-social-media-widget/" shodan-query: 'vuln:CVE-2018-6357' - tags: cve,wordpress,wp-plugin,acurax-social-media-widget,high + tags: cve,wordpress,wp-plugin,acurax-social-media-widget,medium http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-6465-4ba37fc25b6b62478d53951a81386aeb.yaml b/nuclei-templates/2018/CVE-2018-6465-4ba37fc25b6b62478d53951a81386aeb.yaml index 7943da663c..e0100a5833 100644 --- a/nuclei-templates/2018/CVE-2018-6465-4ba37fc25b6b62478d53951a81386aeb.yaml +++ b/nuclei-templates/2018/CVE-2018-6465-4ba37fc25b6b62478d53951a81386aeb.yaml @@ -4,7 +4,7 @@ info: name: > PropertyHive < 1.4.15 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The PropertyHive plugin before 1.4.15 for WordPress has XSS via the body parameter to includes/admin/views/html-preview-applicant-matches-email.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/propertyhive/" google-query: inurl:"/wp-content/plugins/propertyhive/" shodan-query: 'vuln:CVE-2018-6465' - tags: cve,wordpress,wp-plugin,propertyhive,medium + tags: cve,wordpress,wp-plugin,propertyhive,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-6466-4f5e1d138ae43eaa500111874f55d52e.yaml b/nuclei-templates/2018/CVE-2018-6466-4f5e1d138ae43eaa500111874f55d52e.yaml index fd40b9a666..d59045d39b 100644 --- a/nuclei-templates/2018/CVE-2018-6466-4f5e1d138ae43eaa500111874f55d52e.yaml +++ b/nuclei-templates/2018/CVE-2018-6466-4f5e1d138ae43eaa500111874f55d52e.yaml @@ -4,7 +4,7 @@ info: name: > flickrRSS <= 5.3.1 - Cross-Site Scripting via flickrRSS_set author: topscoder - severity: medium + severity: high description: > A cross-site scripting (XSS) vulnerability in flickrRSS.php in the flickrRSS plugin 5.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the flickrRSS_set parameter to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/flickr-rss/" google-query: inurl:"/wp-content/plugins/flickr-rss/" shodan-query: 'vuln:CVE-2018-6466' - tags: cve,wordpress,wp-plugin,flickr-rss,medium + tags: cve,wordpress,wp-plugin,flickr-rss,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-6468-0e4fc74efc949999cf345512b761619e.yaml b/nuclei-templates/2018/CVE-2018-6468-0e4fc74efc949999cf345512b761619e.yaml index e2072f2809..a838697ed5 100644 --- a/nuclei-templates/2018/CVE-2018-6468-0e4fc74efc949999cf345512b761619e.yaml +++ b/nuclei-templates/2018/CVE-2018-6468-0e4fc74efc949999cf345512b761619e.yaml @@ -4,7 +4,7 @@ info: name: > flickrRSS <= 5.3.1 - Cross-Site Scripting via flickrRSS_id author: topscoder - severity: medium + severity: high description: > A cross-site scripting (XSS) vulnerability in flickrRSS.php in the flickrRSS plugin 5.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the flickrRSS_id parameter to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/flickr-rss/" google-query: inurl:"/wp-content/plugins/flickr-rss/" shodan-query: 'vuln:CVE-2018-6468' - tags: cve,wordpress,wp-plugin,flickr-rss,medium + tags: cve,wordpress,wp-plugin,flickr-rss,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-6469-3bc9ed0b3cbfe53ac89e5748fc0bf57c.yaml b/nuclei-templates/2018/CVE-2018-6469-3bc9ed0b3cbfe53ac89e5748fc0bf57c.yaml index a18523497e..86f62c0d01 100644 --- a/nuclei-templates/2018/CVE-2018-6469-3bc9ed0b3cbfe53ac89e5748fc0bf57c.yaml +++ b/nuclei-templates/2018/CVE-2018-6469-3bc9ed0b3cbfe53ac89e5748fc0bf57c.yaml @@ -4,7 +4,7 @@ info: name: > flickrRSS <= 5.3.1 - Cross-Site Scripting via flickrRSS_tags author: topscoder - severity: medium + severity: high description: > A cross-site scripting (XSS) vulnerability in flickrRSS.php in the flickrRSS plugin 5.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the flickrRSS_tags parameter to wp-admin/options-general.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/flickr-rss/" google-query: inurl:"/wp-content/plugins/flickr-rss/" shodan-query: 'vuln:CVE-2018-6469' - tags: cve,wordpress,wp-plugin,flickr-rss,medium + tags: cve,wordpress,wp-plugin,flickr-rss,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-6943-dac7bdda4e28b985a7da6425e9bc4314.yaml b/nuclei-templates/2018/CVE-2018-6943-dac7bdda4e28b985a7da6425e9bc4314.yaml index 8f0308ff03..64dafc793a 100644 --- a/nuclei-templates/2018/CVE-2018-6943-dac7bdda4e28b985a7da6425e9bc4314.yaml +++ b/nuclei-templates/2018/CVE-2018-6943-dac7bdda4e28b985a7da6425e9bc4314.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate Member <= 2.0.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > core/lib/upload/um-image-upload.php in the UltimateMember plugin 2.0 for WordPress has a cross-site scripting vulnerability because it fails to properly sanitize user input passed to the $temp variable. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-member/" google-query: inurl:"/wp-content/plugins/ultimate-member/" shodan-query: 'vuln:CVE-2018-6943' - tags: cve,wordpress,wp-plugin,ultimate-member,medium + tags: cve,wordpress,wp-plugin,ultimate-member,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-6944-e00b98ac8c54622a944850cb2d386b43.yaml b/nuclei-templates/2018/CVE-2018-6944-e00b98ac8c54622a944850cb2d386b43.yaml index ef2b0a2d4c..1b6598e8ca 100644 --- a/nuclei-templates/2018/CVE-2018-6944-e00b98ac8c54622a944850cb2d386b43.yaml +++ b/nuclei-templates/2018/CVE-2018-6944-e00b98ac8c54622a944850cb2d386b43.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate Member <= 2.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > core/lib/upload/um-file-upload.php in the UltimateMember plugin 2.0 for WordPress has a cross-site scripting vulnerability because it fails to properly sanitize user input passed to the $temp variable. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-member/" google-query: inurl:"/wp-content/plugins/ultimate-member/" shodan-query: 'vuln:CVE-2018-6944' - tags: cve,wordpress,wp-plugin,ultimate-member,medium + tags: cve,wordpress,wp-plugin,ultimate-member,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-7280-ea56b6fc3599b19cc9355c178eadf7c8.yaml b/nuclei-templates/2018/CVE-2018-7280-ea56b6fc3599b19cc9355c178eadf7c8.yaml index 3503fa2e48..5136d21ff2 100644 --- a/nuclei-templates/2018/CVE-2018-7280-ea56b6fc3599b19cc9355c178eadf7c8.yaml +++ b/nuclei-templates/2018/CVE-2018-7280-ea56b6fc3599b19cc9355c178eadf7c8.yaml @@ -4,7 +4,7 @@ info: name: > Ninja Forms Contact Form <= 3.2.13 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Ninja Forms plugin before 3.2.14 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ninja-forms/" google-query: inurl:"/wp-content/plugins/ninja-forms/" shodan-query: 'vuln:CVE-2018-7280' - tags: cve,wordpress,wp-plugin,ninja-forms,medium + tags: cve,wordpress,wp-plugin,ninja-forms,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-7543-2e6e6e36243681b3cf144f17aaebf064.yaml b/nuclei-templates/2018/CVE-2018-7543-2e6e6e36243681b3cf144f17aaebf064.yaml index 671162fd9a..618d6b04a1 100644 --- a/nuclei-templates/2018/CVE-2018-7543-2e6e6e36243681b3cf144f17aaebf064.yaml +++ b/nuclei-templates/2018/CVE-2018-7543-2e6e6e36243681b3cf144f17aaebf064.yaml @@ -4,7 +4,7 @@ info: name: > Duplicator <= 1.2.32 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in installer/build/view.step4.php of the SnapCreek Duplicator plugin 1.2.32 for WordPress allows remote attackers to inject arbitrary JavaScript or HTML via the json parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/duplicator/" google-query: inurl:"/wp-content/plugins/duplicator/" shodan-query: 'vuln:CVE-2018-7543' - tags: cve,wordpress,wp-plugin,duplicator,medium + tags: cve,wordpress,wp-plugin,duplicator,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-8729-55d5b1ab7109cbfd7cdac31ba9a767d2.yaml b/nuclei-templates/2018/CVE-2018-8729-55d5b1ab7109cbfd7cdac31ba9a767d2.yaml index 569e4e443f..f1f7e16d00 100644 --- a/nuclei-templates/2018/CVE-2018-8729-55d5b1ab7109cbfd7cdac31ba9a767d2.yaml +++ b/nuclei-templates/2018/CVE-2018-8729-55d5b1ab7109cbfd7cdac31ba9a767d2.yaml @@ -4,7 +4,7 @@ info: name: > Activity Log <= 2.4.0 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple cross-site scripting (XSS) vulnerabilities in the Activity Log plugin before 2.4.1 for WordPress allow remote attackers to inject arbitrary JavaScript or HTML via a title that is not escaped. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/aryo-activity-log/" google-query: inurl:"/wp-content/plugins/aryo-activity-log/" shodan-query: 'vuln:CVE-2018-8729' - tags: cve,wordpress,wp-plugin,aryo-activity-log,medium + tags: cve,wordpress,wp-plugin,aryo-activity-log,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-9020-fb28659ef74c6816e9ff94aaba73e076.yaml b/nuclei-templates/2018/CVE-2018-9020-fb28659ef74c6816e9ff94aaba73e076.yaml index 3ca95c646c..ab9c41b66d 100644 --- a/nuclei-templates/2018/CVE-2018-9020-fb28659ef74c6816e9ff94aaba73e076.yaml +++ b/nuclei-templates/2018/CVE-2018-9020-fb28659ef74c6816e9ff94aaba73e076.yaml @@ -4,7 +4,7 @@ info: name: > Events Manager <= 5.8.1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Events Manager plugin before 5.8.1.2 for WordPress allows XSS via the events-manager.js mapTitle parameter in the Google Maps miniature. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/events-manager/" google-query: inurl:"/wp-content/plugins/events-manager/" shodan-query: 'vuln:CVE-2018-9020' - tags: cve,wordpress,wp-plugin,events-manager,medium + tags: cve,wordpress,wp-plugin,events-manager,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-9034-88fcfbe0235fbfcf5894d075044bc4db.yaml b/nuclei-templates/2018/CVE-2018-9034-88fcfbe0235fbfcf5894d075044bc4db.yaml index acbd773efc..3461ad7d59 100644 --- a/nuclei-templates/2018/CVE-2018-9034-88fcfbe0235fbfcf5894d075044bc4db.yaml +++ b/nuclei-templates/2018/CVE-2018-9034-88fcfbe0235fbfcf5894d075044bc4db.yaml @@ -4,7 +4,7 @@ info: name: > Relevanssi <= 4.0.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in lib/interface.php of the Relevanssi plugin 4.0.4 for WordPress allows remote attackers to inject arbitrary JavaScript or HTML via the tab GET parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/relevanssi/" google-query: inurl:"/wp-content/plugins/relevanssi/" shodan-query: 'vuln:CVE-2018-9034' - tags: cve,wordpress,wp-plugin,relevanssi,medium + tags: cve,wordpress,wp-plugin,relevanssi,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-9172-95115eb6cd7773daea0c3290d4bc4306.yaml b/nuclei-templates/2018/CVE-2018-9172-95115eb6cd7773daea0c3290d4bc4306.yaml index d14d392c45..ef4bf18967 100644 --- a/nuclei-templates/2018/CVE-2018-9172-95115eb6cd7773daea0c3290d4bc4306.yaml +++ b/nuclei-templates/2018/CVE-2018-9172-95115eb6cd7773daea0c3290d4bc4306.yaml @@ -4,7 +4,7 @@ info: name: > WordPress File Upload <= 4.3.2 - Cross-Site Scripting via Shortcodes author: topscoder - severity: medium + severity: high description: > The Iptanus WordPress File Upload plugin before 4.3.3 for WordPress mishandles shortcode attributes. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-file-upload/" google-query: inurl:"/wp-content/plugins/wp-file-upload/" shodan-query: 'vuln:CVE-2018-9172' - tags: cve,wordpress,wp-plugin,wp-file-upload,medium + tags: cve,wordpress,wp-plugin,wp-file-upload,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-9844-90d37fd2fba0470460729c814dc702e8.yaml b/nuclei-templates/2018/CVE-2018-9844-90d37fd2fba0470460729c814dc702e8.yaml index 0a7462dea0..abe683377e 100644 --- a/nuclei-templates/2018/CVE-2018-9844-90d37fd2fba0470460729c814dc702e8.yaml +++ b/nuclei-templates/2018/CVE-2018-9844-90d37fd2fba0470460729c814dc702e8.yaml @@ -4,7 +4,7 @@ info: name: > WordPress File Upload <= 4.3.3 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The WordPress File Upload plugin before 4.3.4 for WordPress mishandles Settings attributes, leading to XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-file-upload/" google-query: inurl:"/wp-content/plugins/wp-file-upload/" shodan-query: 'vuln:CVE-2018-9844' - tags: cve,wordpress,wp-plugin,wp-file-upload,medium + tags: cve,wordpress,wp-plugin,wp-file-upload,high http: - method: GET diff --git a/nuclei-templates/2018/CVE-2018-9864-875e2588a6c7f11db1b0d18dfa5a3b24.yaml b/nuclei-templates/2018/CVE-2018-9864-875e2588a6c7f11db1b0d18dfa5a3b24.yaml index af0a7509d4..555535c497 100644 --- a/nuclei-templates/2018/CVE-2018-9864-875e2588a6c7f11db1b0d18dfa5a3b24.yaml +++ b/nuclei-templates/2018/CVE-2018-9864-875e2588a6c7f11db1b0d18dfa5a3b24.yaml @@ -4,7 +4,7 @@ info: name: > WP Live Chat Support <= 8.0.05 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The WP Live Chat Support plugin before 8.0.06 for WordPress has stored XSS via the Name field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-live-chat-support/" google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" shodan-query: 'vuln:CVE-2018-9864' - tags: cve,wordpress,wp-plugin,wp-live-chat-support,medium + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-1010034-19dc9eaf0f82c574889586e002e668f6.yaml b/nuclei-templates/2019/CVE-2019-1010034-19dc9eaf0f82c574889586e002e668f6.yaml index cdcf77536b..b9848bd58d 100644 --- a/nuclei-templates/2019/CVE-2019-1010034-19dc9eaf0f82c574889586e002e668f6.yaml +++ b/nuclei-templates/2019/CVE-2019-1010034-19dc9eaf0f82c574889586e002e668f6.yaml @@ -4,7 +4,7 @@ info: name: > Web Librarian <= 3.5.4 - SQL Injection author: topscoder - severity: high + severity: critical description: > Deepwoods Software WebLibrarian 3.5.4 and earlier is affected by: SQL Injection. The impact is: Exposing the entire database. The component is: Function "AllBarCodes" (defined at database_code.php line 1018) is vulnerable to a boolean-based blind sql injection. This function call can be triggered by any user logged-in with at least Volunteer role or manage_circulation capabilities. PoC : /wordpress/wp-admin/admin.php?page=weblib-circulation-desk&orderby=title&order=DESC. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/weblibrarian/" google-query: inurl:"/wp-content/plugins/weblibrarian/" shodan-query: 'vuln:CVE-2019-1010034' - tags: cve,wordpress,wp-plugin,weblibrarian,high + tags: cve,wordpress,wp-plugin,weblibrarian,critical http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-1010104-0dc6cfa3fba0c385fc2da9ea78090e2f.yaml b/nuclei-templates/2019/CVE-2019-1010104-0dc6cfa3fba0c385fc2da9ea78090e2f.yaml index 8be50656ce..f7b7473bf8 100644 --- a/nuclei-templates/2019/CVE-2019-1010104-0dc6cfa3fba0c385fc2da9ea78090e2f.yaml +++ b/nuclei-templates/2019/CVE-2019-1010104-0dc6cfa3fba0c385fc2da9ea78090e2f.yaml @@ -4,7 +4,7 @@ info: name: > Quick Chat <= 4.14 - SQL Injection author: topscoder - severity: high + severity: critical description: > TechyTalk Quick Chat WordPress Plugin All up to the latest is affected by: SQL Injection. The impact is: Access to the database. The component is: like_escape is used in Quick-chat.php line 399. The attack vector is: Crafted ajax request. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/quick-chat/" google-query: inurl:"/wp-content/plugins/quick-chat/" shodan-query: 'vuln:CVE-2019-1010104' - tags: cve,wordpress,wp-plugin,quick-chat,high + tags: cve,wordpress,wp-plugin,quick-chat,critical http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-10673-913680c7cc113c5e372d717a86269c4e.yaml b/nuclei-templates/2019/CVE-2019-10673-913680c7cc113c5e372d717a86269c4e.yaml index 015c886920..d1c4d18aaf 100644 --- a/nuclei-templates/2019/CVE-2019-10673-913680c7cc113c5e372d717a86269c4e.yaml +++ b/nuclei-templates/2019/CVE-2019-10673-913680c7cc113c5e372d717a86269c4e.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate Member <= 2.0.39 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > A CSRF vulnerability in a logged-in user's profile edit form in the Ultimate Member plugin before 2.0.40 for WordPress allows attackers to become admin and subsequently extract sensitive information and execute arbitrary code. This occurs because the attacker can change the e-mail address in the administrator profile, and then the attacker is able to reset the administrator password using the WordPress "password forget" form. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-member/" google-query: inurl:"/wp-content/plugins/ultimate-member/" shodan-query: 'vuln:CVE-2019-10673' - tags: cve,wordpress,wp-plugin,ultimate-member,high + tags: cve,wordpress,wp-plugin,ultimate-member,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-10864-4c0f6a08d37bb188811061a17ff42cfa.yaml b/nuclei-templates/2019/CVE-2019-10864-4c0f6a08d37bb188811061a17ff42cfa.yaml index 28fa1c0744..58a116ff32 100644 --- a/nuclei-templates/2019/CVE-2019-10864-4c0f6a08d37bb188811061a17ff42cfa.yaml +++ b/nuclei-templates/2019/CVE-2019-10864-4c0f6a08d37bb188811061a17ff42cfa.yaml @@ -4,7 +4,7 @@ info: name: > WP Statistics <= 12.6.3 - Referer Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The WP Statistics plugin through 12.6.2 for WordPress has XSS, allowing a remote attacker to inject arbitrary web script or HTML via the Referer header of a GET request. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-statistics/" google-query: inurl:"/wp-content/plugins/wp-statistics/" shodan-query: 'vuln:CVE-2019-10864' - tags: cve,wordpress,wp-plugin,wp-statistics,medium + tags: cve,wordpress,wp-plugin,wp-statistics,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-10866-b584bc3add37b438ea9f7d52a53c499d.yaml b/nuclei-templates/2019/CVE-2019-10866-b584bc3add37b438ea9f7d52a53c499d.yaml index 9d7ecf0aa6..e0036aad92 100644 --- a/nuclei-templates/2019/CVE-2019-10866-b584bc3add37b438ea9f7d52a53c499d.yaml +++ b/nuclei-templates/2019/CVE-2019-10866-b584bc3add37b438ea9f7d52a53c499d.yaml @@ -4,7 +4,7 @@ info: name: > Form Maker by 10Web <= 1.13.2 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > In the Form Maker plugin before 1.13.3 for WordPress, it's possible to achieve SQL injection in the function get_labels_parameters in the file form-maker/admin/models/Submissions_fm.php with a crafted value of the /models/Submissioc parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/form-maker/" google-query: inurl:"/wp-content/plugins/form-maker/" shodan-query: 'vuln:CVE-2019-10866' - tags: cve,wordpress,wp-plugin,form-maker,high + tags: cve,wordpress,wp-plugin,form-maker,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-10869-4bc78371b9a6176130f5ed1b3336f728.yaml b/nuclei-templates/2019/CVE-2019-10869-4bc78371b9a6176130f5ed1b3336f728.yaml index 69352137f1..295a474413 100644 --- a/nuclei-templates/2019/CVE-2019-10869-4bc78371b9a6176130f5ed1b3336f728.yaml +++ b/nuclei-templates/2019/CVE-2019-10869-4bc78371b9a6176130f5ed1b3336f728.yaml @@ -4,7 +4,7 @@ info: name: > Ninja Forms - File Uploads <= 3.0.22 - Unauthenticated Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > Path Traversal and Unrestricted File Upload exists in the Ninja Forms plugin before 3.0.23 for WordPress (when the Uploads add-on is activated). This allows an attacker to traverse the file system to access files and execute code via the includes/fields/upload.php (aka upload/submit page) name and tmp_name parameters. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ninja-forms-uploads/" google-query: inurl:"/wp-content/plugins/ninja-forms-uploads/" shodan-query: 'vuln:CVE-2019-10869' - tags: cve,wordpress,wp-plugin,ninja-forms-uploads,high + tags: cve,wordpress,wp-plugin,ninja-forms-uploads,critical http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-11557-0dd2df3f5b8d5d1265b1558506e0a48b.yaml b/nuclei-templates/2019/CVE-2019-11557-0dd2df3f5b8d5d1265b1558506e0a48b.yaml index ef98b2cf35..b4e968886a 100644 --- a/nuclei-templates/2019/CVE-2019-11557-0dd2df3f5b8d5d1265b1558506e0a48b.yaml +++ b/nuclei-templates/2019/CVE-2019-11557-0dd2df3f5b8d5d1265b1558506e0a48b.yaml @@ -4,7 +4,7 @@ info: name: > WDContactFormBuilder <= 1.0.68 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The WebDorado Contact Form Builder plugin before 1.0.69 for WordPress allows CSRF via the wp-admin/admin-ajax.php action parameter, with resultant local file inclusion via directory traversal, because there can be a discrepancy between the $_POST['action'] value and the $_GET['action'] value, and the latter is unsanitized. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-builder/" google-query: inurl:"/wp-content/plugins/contact-form-builder/" shodan-query: 'vuln:CVE-2019-11557' - tags: cve,wordpress,wp-plugin,contact-form-builder,high + tags: cve,wordpress,wp-plugin,contact-form-builder,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-11590-bc7687f3a38eb76862d41bf156e272e2.yaml b/nuclei-templates/2019/CVE-2019-11590-bc7687f3a38eb76862d41bf156e272e2.yaml index cc63d96439..6fd4fe55f4 100644 --- a/nuclei-templates/2019/CVE-2019-11590-bc7687f3a38eb76862d41bf156e272e2.yaml +++ b/nuclei-templates/2019/CVE-2019-11590-bc7687f3a38eb76862d41bf156e272e2.yaml @@ -4,7 +4,7 @@ info: name: > Form Maker by 10Web <= 1.13.4 - Cross-Site Request Forgery to Local File Inclusion author: topscoder - severity: high + severity: medium description: > The 10Web Form Maker plugin before 1.13.5 for WordPress allows CSRF via the wp-admin/admin-ajax.php action parameter, with resultant local file inclusion via directory traversal, because there can be a discrepancy between the $_POST['action'] value and the $_GET['action'] value, and the latter is unsanitized. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/form-maker/" google-query: inurl:"/wp-content/plugins/form-maker/" shodan-query: 'vuln:CVE-2019-11590' - tags: cve,wordpress,wp-plugin,form-maker,high + tags: cve,wordpress,wp-plugin,form-maker,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-11591-b9705619b7c26905bbb7df74ccb4fdad.yaml b/nuclei-templates/2019/CVE-2019-11591-b9705619b7c26905bbb7df74ccb4fdad.yaml index 914f004f7c..5aaa140351 100644 --- a/nuclei-templates/2019/CVE-2019-11591-b9705619b7c26905bbb7df74ccb4fdad.yaml +++ b/nuclei-templates/2019/CVE-2019-11591-b9705619b7c26905bbb7df74ccb4fdad.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form by WD <= 1.13.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The WebDorado Contact Form plugin before 1.13.5 for WordPress allows CSRF via the wp-admin/admin-ajax.php action parameter, with resultant local file inclusion via directory traversal, because there can be a discrepancy between the $_POST['action'] value and the $_GET['action'] value, and the latter is unsanitized. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-maker/" google-query: inurl:"/wp-content/plugins/contact-form-maker/" shodan-query: 'vuln:CVE-2019-11591' - tags: cve,wordpress,wp-plugin,contact-form-maker,high + tags: cve,wordpress,wp-plugin,contact-form-maker,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-11871-aeb1af030c75596a2eb738838b5e8bf8.yaml b/nuclei-templates/2019/CVE-2019-11871-aeb1af030c75596a2eb738838b5e8bf8.yaml index cf7c233b36..f446c31aca 100644 --- a/nuclei-templates/2019/CVE-2019-11871-aeb1af030c75596a2eb738838b5e8bf8.yaml +++ b/nuclei-templates/2019/CVE-2019-11871-aeb1af030c75596a2eb738838b5e8bf8.yaml @@ -4,7 +4,7 @@ info: name: > Custom Field Suite <= 2.5.14 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Custom Field Suite plugin before 2.5.15 for WordPress has XSS for editors or admins. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/custom-field-suite/" google-query: inurl:"/wp-content/plugins/custom-field-suite/" shodan-query: 'vuln:CVE-2019-11871' - tags: cve,wordpress,wp-plugin,custom-field-suite,medium + tags: cve,wordpress,wp-plugin,custom-field-suite,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-12239-96e25e69c7f878ae73c7f29f99c97760.yaml b/nuclei-templates/2019/CVE-2019-12239-96e25e69c7f878ae73c7f29f99c97760.yaml index 7d56051cf2..78493e1495 100644 --- a/nuclei-templates/2019/CVE-2019-12239-96e25e69c7f878ae73c7f29f99c97760.yaml +++ b/nuclei-templates/2019/CVE-2019-12239-96e25e69c7f878ae73c7f29f99c97760.yaml @@ -4,7 +4,7 @@ info: name: > WP Booking System Free version < 1.5.2 - Cross-Site Request Forgery author: topscoder - severity: critical + severity: medium description: > The WP Booking System plugin 1.5.1 for WordPress has no CSRF protection, which allows attackers to reach certain SQL injection issues that require administrative access. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-booking-system/" google-query: inurl:"/wp-content/plugins/wp-booking-system/" shodan-query: 'vuln:CVE-2019-12239' - tags: cve,wordpress,wp-plugin,wp-booking-system,critical + tags: cve,wordpress,wp-plugin,wp-booking-system,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-12346-27f647997621b679fa1b99cbf345bdbe.yaml b/nuclei-templates/2019/CVE-2019-12346-27f647997621b679fa1b99cbf345bdbe.yaml index 750b24b76c..fd202cf1b1 100644 --- a/nuclei-templates/2019/CVE-2019-12346-27f647997621b679fa1b99cbf345bdbe.yaml +++ b/nuclei-templates/2019/CVE-2019-12346-27f647997621b679fa1b99cbf345bdbe.yaml @@ -4,7 +4,7 @@ info: name: > SAML Single Sign On – SAML SSO Login < 4.8.73 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > In the miniOrange SAML SP Single Sign On plugin before 4.8.73 for WordPress, the SAML Login Endpoint is vulnerable to XSS via a specially crafted SAMLResponse XML post. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/miniorange-saml-20-single-sign-on/" google-query: inurl:"/wp-content/plugins/miniorange-saml-20-single-sign-on/" shodan-query: 'vuln:CVE-2019-12346' - tags: cve,wordpress,wp-plugin,miniorange-saml-20-single-sign-on,medium + tags: cve,wordpress,wp-plugin,miniorange-saml-20-single-sign-on,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-12516-3395165ceb6b70322e35bead04697388.yaml b/nuclei-templates/2019/CVE-2019-12516-3395165ceb6b70322e35bead04697388.yaml index bcdcbf4942..21642f4629 100644 --- a/nuclei-templates/2019/CVE-2019-12516-3395165ceb6b70322e35bead04697388.yaml +++ b/nuclei-templates/2019/CVE-2019-12516-3395165ceb6b70322e35bead04697388.yaml @@ -4,7 +4,7 @@ info: name: > SlickQuiz <= 1.3.7.1 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > The slickquiz plugin through 1.3.7.1 for WordPress allows SQL Injection by Subscriber users, as demonstrated by a /wp-admin/admin.php?page=slickquiz-scores&id= or /wp-admin/admin.php?page=slickquiz-edit&id= or /wp-admin/admin.php?page=slickquiz-preview&id= URI. This makes it possible for Subscriber-level attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/slickquiz/" google-query: inurl:"/wp-content/plugins/slickquiz/" shodan-query: 'vuln:CVE-2019-12516' - tags: cve,wordpress,wp-plugin,slickquiz,high + tags: cve,wordpress,wp-plugin,slickquiz,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-12517-53a30d941da402857e0ee8cdb2011b69.yaml b/nuclei-templates/2019/CVE-2019-12517-53a30d941da402857e0ee8cdb2011b69.yaml index 501f0e9501..879ed54231 100644 --- a/nuclei-templates/2019/CVE-2019-12517-53a30d941da402857e0ee8cdb2011b69.yaml +++ b/nuclei-templates/2019/CVE-2019-12517-53a30d941da402857e0ee8cdb2011b69.yaml @@ -4,7 +4,7 @@ info: name: > SlickQuiz <= 1.3.7.1 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An XSS issue was discovered in the slickquiz plugin through 1.3.7.1 for WordPress. The save_quiz_score functionality available via the /wp-admin/admin-ajax.php endpoint allows unauthenticated users to submit quiz solutions/answers, which are stored in the database and later shown in the WordPress backend for all users with at least Subscriber rights. Because the plugin does not properly validate and sanitize this data, a malicious payload in either the name or email field is executed directly within the backend at /wp-admin/admin.php?page=slickquiz across all users with the privileges of at least Subscriber. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/slickquiz/" google-query: inurl:"/wp-content/plugins/slickquiz/" shodan-query: 'vuln:CVE-2019-12517' - tags: cve,wordpress,wp-plugin,slickquiz,medium + tags: cve,wordpress,wp-plugin,slickquiz,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-12566-fe0f4f4fb6e560c8f83991dc7a6212ad.yaml b/nuclei-templates/2019/CVE-2019-12566-fe0f4f4fb6e560c8f83991dc7a6212ad.yaml index 11b8ad3b9f..5f2cbe5add 100644 --- a/nuclei-templates/2019/CVE-2019-12566-fe0f4f4fb6e560c8f83991dc7a6212ad.yaml +++ b/nuclei-templates/2019/CVE-2019-12566-fe0f4f4fb6e560c8f83991dc7a6212ad.yaml @@ -4,7 +4,7 @@ info: name: > WP Statistics <= 12.6.5 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The WP Statistics plugin through 12.6.5 for Wordpress has stored XSS in includes/class-wp-statistics-pages.php. This is related to an account with the Editor role creating a post with a title that contains JavaScript, to attack an admin user. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-statistics/" google-query: inurl:"/wp-content/plugins/wp-statistics/" shodan-query: 'vuln:CVE-2019-12566' - tags: cve,wordpress,wp-plugin,wp-statistics,medium + tags: cve,wordpress,wp-plugin,wp-statistics,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-12570-70cdf6a74f267301ff9a7a0c0a03da5b.yaml b/nuclei-templates/2019/CVE-2019-12570-70cdf6a74f267301ff9a7a0c0a03da5b.yaml index c662bd04c8..d0565b6b02 100644 --- a/nuclei-templates/2019/CVE-2019-12570-70cdf6a74f267301ff9a7a0c0a03da5b.yaml +++ b/nuclei-templates/2019/CVE-2019-12570-70cdf6a74f267301ff9a7a0c0a03da5b.yaml @@ -4,7 +4,7 @@ info: name: > Server Status by Hostname/IP <= 4.6 - SQL Injection author: topscoder - severity: high + severity: critical description: > A SQL injection vulnerability in the Xpert Solution "Server Status by Hostname/IP" plugin 4.6 for WordPress allows an authenticated user to execute arbitrary SQL commands via GET parameters. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/server-status-by-hostnameip/" google-query: inurl:"/wp-content/plugins/server-status-by-hostnameip/" shodan-query: 'vuln:CVE-2019-12570' - tags: cve,wordpress,wp-plugin,server-status-by-hostnameip,high + tags: cve,wordpress,wp-plugin,server-status-by-hostnameip,critical http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-12826-068331b2d9acf141050172c5e67910ff.yaml b/nuclei-templates/2019/CVE-2019-12826-068331b2d9acf141050172c5e67910ff.yaml index 48ac62e0a5..e3bd58548e 100644 --- a/nuclei-templates/2019/CVE-2019-12826-068331b2d9acf141050172c5e67910ff.yaml +++ b/nuclei-templates/2019/CVE-2019-12826-068331b2d9acf141050172c5e67910ff.yaml @@ -4,7 +4,7 @@ info: name: > Widget Logic < 5.10.2 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > A Cross-Site-Request-Forgery (CSRF) vulnerability in widget_logic.php in the 2by2host Widget Logic plugin before 5.10.2 for WordPress allows remote attackers to execute PHP code via snippets (that are attached to widgets and then eval'd to dynamically determine their visibility) by crafting a malicious POST request that tricks administrators into adding the code. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/widget-logic/" google-query: inurl:"/wp-content/plugins/widget-logic/" shodan-query: 'vuln:CVE-2019-12826' - tags: cve,wordpress,wp-plugin,widget-logic,high + tags: cve,wordpress,wp-plugin,widget-logic,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-12934-ca875a69734817c022d2b5742d18b09a.yaml b/nuclei-templates/2019/CVE-2019-12934-ca875a69734817c022d2b5742d18b09a.yaml index 4e0a3315fd..08cb623375 100644 --- a/nuclei-templates/2019/CVE-2019-12934-ca875a69734817c022d2b5742d18b09a.yaml +++ b/nuclei-templates/2019/CVE-2019-12934-ca875a69734817c022d2b5742d18b09a.yaml @@ -4,7 +4,7 @@ info: name: > WP Code Highlight.js <= 0.6.2 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > The WP Code Highlight.js plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 0.6.2. This is due to missing or incorrect nonce validation on the hljs_settings_page() function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-code-highlightjs/" google-query: inurl:"/wp-content/plugins/wp-code-highlightjs/" shodan-query: 'vuln:CVE-2019-12934' - tags: cve,wordpress,wp-plugin,wp-code-highlightjs,high + tags: cve,wordpress,wp-plugin,wp-code-highlightjs,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-13344-d25b2870a2ba1a71b2f08074d958c754.yaml b/nuclei-templates/2019/CVE-2019-13344-d25b2870a2ba1a71b2f08074d958c754.yaml index 0acec8ca86..08c76855ce 100644 --- a/nuclei-templates/2019/CVE-2019-13344-d25b2870a2ba1a71b2f08074d958c754.yaml +++ b/nuclei-templates/2019/CVE-2019-13344-d25b2870a2ba1a71b2f08074d958c754.yaml @@ -4,7 +4,7 @@ info: name: > WP Like Button <= 1.6.0 - Missing Authorization author: topscoder - severity: medium + severity: high description: > An authentication bypass vulnerability in the CRUDLab WP Like Button plugin through 1.6.0 for WordPress allows unauthenticated attackers to change settings. The contains() function in wp_like_button.php did not check if the current request is made by an authorized user, thus allowing any unauthenticated user to successfully update settings, as demonstrated by the wp-admin/admin.php?page=facebook-like-button each_page_url or code_snippet parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-like-button/" google-query: inurl:"/wp-content/plugins/wp-like-button/" shodan-query: 'vuln:CVE-2019-13344' - tags: cve,wordpress,wp-plugin,wp-like-button,medium + tags: cve,wordpress,wp-plugin,wp-like-button,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-13413-5164636d32af20648741053f5b9caab7.yaml b/nuclei-templates/2019/CVE-2019-13413-5164636d32af20648741053f5b9caab7.yaml index babf0c6933..3eaac432ca 100644 --- a/nuclei-templates/2019/CVE-2019-13413-5164636d32af20648741053f5b9caab7.yaml +++ b/nuclei-templates/2019/CVE-2019-13413-5164636d32af20648741053f5b9caab7.yaml @@ -4,7 +4,7 @@ info: name: > Rencontre – Dating Site <= 3.1.2 - SQL Injection author: topscoder - severity: high + severity: critical description: > The Rencontre – Dating Site plugin for WordPress is vulnerable to SQL Injection via a few parameters found in the inc/rencontre_widget.php file, such as the 'region' parameter, in versions up to, and including, 3.1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/rencontre/" google-query: inurl:"/wp-content/plugins/rencontre/" shodan-query: 'vuln:CVE-2019-13413' - tags: cve,wordpress,wp-plugin,rencontre,high + tags: cve,wordpress,wp-plugin,rencontre,critical http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-13414-7116f21024cd4d3ec70934c93595bec9.yaml b/nuclei-templates/2019/CVE-2019-13414-7116f21024cd4d3ec70934c93595bec9.yaml index 1b0890da3a..4d7307add2 100644 --- a/nuclei-templates/2019/CVE-2019-13414-7116f21024cd4d3ec70934c93595bec9.yaml +++ b/nuclei-templates/2019/CVE-2019-13414-7116f21024cd4d3ec70934c93595bec9.yaml @@ -4,7 +4,7 @@ info: name: > Rencontre – Dating Site <= 3.1.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Rencontre – Dating Site plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters found in the inc/rencontre_widget.php file such as 'pays' in versions up to, and including, 3.1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/rencontre/" google-query: inurl:"/wp-content/plugins/rencontre/" shodan-query: 'vuln:CVE-2019-13414' - tags: cve,wordpress,wp-plugin,rencontre,medium + tags: cve,wordpress,wp-plugin,rencontre,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-13478-faaf1948155c5f302388ba2e8f465a89.yaml b/nuclei-templates/2019/CVE-2019-13478-faaf1948155c5f302388ba2e8f465a89.yaml index df4d9ae37a..ff3bc38906 100644 --- a/nuclei-templates/2019/CVE-2019-13478-faaf1948155c5f302388ba2e8f465a89.yaml +++ b/nuclei-templates/2019/CVE-2019-13478-faaf1948155c5f302388ba2e8f465a89.yaml @@ -4,7 +4,7 @@ info: name: > Yoast SEO <= 11.5 - Authenticated Stored Cross Site Scripting author: topscoder - severity: medium + severity: low description: > The Yoast SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via term descriptions in versions up to, and including, 11.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with post editor access to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wordpress-seo/" google-query: inurl:"/wp-content/plugins/wordpress-seo/" shodan-query: 'vuln:CVE-2019-13478' - tags: cve,wordpress,wp-plugin,wordpress-seo,medium + tags: cve,wordpress,wp-plugin,wordpress-seo,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-13505-e18c42540e73da21df0e80ed6910311c.yaml b/nuclei-templates/2019/CVE-2019-13505-e18c42540e73da21df0e80ed6910311c.yaml index e44d2c0a29..dd190a823e 100644 --- a/nuclei-templates/2019/CVE-2019-13505-e18c42540e73da21df0e80ed6910311c.yaml +++ b/nuclei-templates/2019/CVE-2019-13505-e18c42540e73da21df0e80ed6910311c.yaml @@ -4,7 +4,7 @@ info: name: > Appointment Hour Booking – WordPress Booking Plugin <= 1.1.45 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Appointment Hour Booking plugin 1.1.44 for WordPress allows XSS via the E-mail field, as demonstrated by email_1. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/appointment-hour-booking/" google-query: inurl:"/wp-content/plugins/appointment-hour-booking/" shodan-query: 'vuln:CVE-2019-13505' - tags: cve,wordpress,wp-plugin,appointment-hour-booking,medium + tags: cve,wordpress,wp-plugin,appointment-hour-booking,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-13570-b24e50f88d059b7df802d8ab2740b6f0.yaml b/nuclei-templates/2019/CVE-2019-13570-b24e50f88d059b7df802d8ab2740b6f0.yaml index 3b56535086..8bec58ca93 100644 --- a/nuclei-templates/2019/CVE-2019-13570-b24e50f88d059b7df802d8ab2740b6f0.yaml +++ b/nuclei-templates/2019/CVE-2019-13570-b24e50f88d059b7df802d8ab2740b6f0.yaml @@ -4,7 +4,7 @@ info: name: > AdRotate – Ad manager & AdSense Ads <= 5.2 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > The AJdG AdRotate plugin before 5.3 for WordPress allows SQL Injection. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/adrotate/" google-query: inurl:"/wp-content/plugins/adrotate/" shodan-query: 'vuln:CVE-2019-13570' - tags: cve,wordpress,wp-plugin,adrotate,high + tags: cve,wordpress,wp-plugin,adrotate,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14205-092d91aed0440af0f2ea67a8f6a61ea3.yaml b/nuclei-templates/2019/CVE-2019-14205-092d91aed0440af0f2ea67a8f6a61ea3.yaml index 9597a5745e..3c8002b181 100644 --- a/nuclei-templates/2019/CVE-2019-14205-092d91aed0440af0f2ea67a8f6a61ea3.yaml +++ b/nuclei-templates/2019/CVE-2019-14205-092d91aed0440af0f2ea67a8f6a61ea3.yaml @@ -4,7 +4,7 @@ info: name: > Adaptive Images for WordPress <= 0.6.66 - Local File Inclusion author: topscoder - severity: high + severity: critical description: > A Local File Inclusion vulnerability in the Nevma Adaptive Images plugin before 0.6.67 for WordPress allows remote attackers to retrieve arbitrary files via the $REQUEST['adaptive-images-settings']['source_file'] parameter in adaptive-images-script.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/adaptive-images/" google-query: inurl:"/wp-content/plugins/adaptive-images/" shodan-query: 'vuln:CVE-2019-14205' - tags: cve,wordpress,wp-plugin,adaptive-images,high + tags: cve,wordpress,wp-plugin,adaptive-images,critical http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14216-03cfd10aef3dc88159ec608d4ac8800f.yaml b/nuclei-templates/2019/CVE-2019-14216-03cfd10aef3dc88159ec608d4ac8800f.yaml index 105e0d0a78..e0882a7b7b 100644 --- a/nuclei-templates/2019/CVE-2019-14216-03cfd10aef3dc88159ec608d4ac8800f.yaml +++ b/nuclei-templates/2019/CVE-2019-14216-03cfd10aef3dc88159ec608d4ac8800f.yaml @@ -4,7 +4,7 @@ info: name: > WP SVG Icons <= 3.2.2 - Cross-Site Request Forgery to Remote Code Execution author: topscoder - severity: high + severity: medium description: > An issue was discovered in the svg-vector-icon-plugin (aka WP SVG Icons) plugin through 3.2.2 for WordPress. wp-admin/admin.php?page=wp-svg-icons-custom-set mishandles Custom Icon uploads. CSRF leads to upload of a ZIP archive containing a .php file. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/svg-vector-icon-plugin/" google-query: inurl:"/wp-content/plugins/svg-vector-icon-plugin/" shodan-query: 'vuln:CVE-2019-14216' - tags: cve,wordpress,wp-plugin,svg-vector-icon-plugin,high + tags: cve,wordpress,wp-plugin,svg-vector-icon-plugin,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14328-4ad519606c4e4a0ac9ad3558c99fc1da.yaml b/nuclei-templates/2019/CVE-2019-14328-4ad519606c4e4a0ac9ad3558c99fc1da.yaml index c6b01f9e5a..fe355accdd 100644 --- a/nuclei-templates/2019/CVE-2019-14328-4ad519606c4e4a0ac9ad3558c99fc1da.yaml +++ b/nuclei-templates/2019/CVE-2019-14328-4ad519606c4e4a0ac9ad3558c99fc1da.yaml @@ -4,7 +4,7 @@ info: name: > Simple Membership <= 3.8.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Simple Membership plugin before 3.8.5 for WordPress has CSRF affecting the Bulk Operation section. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/simple-membership/" google-query: inurl:"/wp-content/plugins/simple-membership/" shodan-query: 'vuln:CVE-2019-14328' - tags: cve,wordpress,wp-plugin,simple-membership,high + tags: cve,wordpress,wp-plugin,simple-membership,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14364-827bc1bb21b15b99a01d332b7037ec11.yaml b/nuclei-templates/2019/CVE-2019-14364-827bc1bb21b15b99a01d332b7037ec11.yaml index 9553064951..ef9265d3d5 100644 --- a/nuclei-templates/2019/CVE-2019-14364-827bc1bb21b15b99a01d332b7037ec11.yaml +++ b/nuclei-templates/2019/CVE-2019-14364-827bc1bb21b15b99a01d332b7037ec11.yaml @@ -4,7 +4,7 @@ info: name: > Email Subscribers & Newsletters <= 4.1.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An XSS vulnerability in the "Email Subscribers & Newsletters" plugin 4.1.6 for WordPress allows an attacker to inject malicious JavaScript code through a publicly available subscription form using the esfpx_name wp-admin/admin-ajax.php POST parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/email-subscribers/" google-query: inurl:"/wp-content/plugins/email-subscribers/" shodan-query: 'vuln:CVE-2019-14364' - tags: cve,wordpress,wp-plugin,email-subscribers,medium + tags: cve,wordpress,wp-plugin,email-subscribers,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14467-d26dfd7d1dd47d6fd5993a9ac9d20c15.yaml b/nuclei-templates/2019/CVE-2019-14467-d26dfd7d1dd47d6fd5993a9ac9d20c15.yaml index 3a52bacbc7..6afdff976c 100644 --- a/nuclei-templates/2019/CVE-2019-14467-d26dfd7d1dd47d6fd5993a9ac9d20c15.yaml +++ b/nuclei-templates/2019/CVE-2019-14467-d26dfd7d1dd47d6fd5993a9ac9d20c15.yaml @@ -4,7 +4,7 @@ info: name: > Social Photo Gallery <= 1.0 - Remote Code Execution author: topscoder - severity: high + severity: critical description: > The Social Photo Gallery plugin 1.0 for WordPress allows Remote Code Execution by creating an album and attaching a malicious PHP file in the cover photo album, because the file extension is not checked. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/social-photo-gallery/" google-query: inurl:"/wp-content/plugins/social-photo-gallery/" shodan-query: 'vuln:CVE-2019-14467' - tags: cve,wordpress,wp-plugin,social-photo-gallery,high + tags: cve,wordpress,wp-plugin,social-photo-gallery,critical http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14679-a7def05240ca9e7abb72b7c9c9771694.yaml b/nuclei-templates/2019/CVE-2019-14679-a7def05240ca9e7abb72b7c9c9771694.yaml index e4532769e0..1282d52dc9 100644 --- a/nuclei-templates/2019/CVE-2019-14679-a7def05240ca9e7abb72b7c9c9771694.yaml +++ b/nuclei-templates/2019/CVE-2019-14679-a7def05240ca9e7abb72b7c9c9771694.yaml @@ -4,7 +4,7 @@ info: name: > Pricing Table Plugin - < 2.3 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > WordPress Pricing Table Plugin Plugin 2.2 has a Cross-Site Request Forgery vulnerability via in the core/views/arprice_import_export.php in the plugin's Import/Export admin page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/arprice-responsive-pricing-table/" google-query: inurl:"/wp-content/plugins/arprice-responsive-pricing-table/" shodan-query: 'vuln:CVE-2019-14679' - tags: cve,wordpress,wp-plugin,arprice-responsive-pricing-table,high + tags: cve,wordpress,wp-plugin,arprice-responsive-pricing-table,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14681-b61c46947c98daf3d7e5aee079c69c53.yaml b/nuclei-templates/2019/CVE-2019-14681-b61c46947c98daf3d7e5aee079c69c53.yaml index 5b4f553a03..d2e29de5bb 100644 --- a/nuclei-templates/2019/CVE-2019-14681-b61c46947c98daf3d7e5aee079c69c53.yaml +++ b/nuclei-templates/2019/CVE-2019-14681-b61c46947c98daf3d7e5aee079c69c53.yaml @@ -4,7 +4,7 @@ info: name: > Deny All Firewall <= 1.1.6 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Deny All Firewall plugin before 1.1.7 for WordPress allows wp-admin/options-general.php?page=daf_settings&daf_remove=true CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/deny-all-firewall/" google-query: inurl:"/wp-content/plugins/deny-all-firewall/" shodan-query: 'vuln:CVE-2019-14681' - tags: cve,wordpress,wp-plugin,deny-all-firewall,high + tags: cve,wordpress,wp-plugin,deny-all-firewall,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14682-a4fd26323192935dbbcbf3b0527f2fd4.yaml b/nuclei-templates/2019/CVE-2019-14682-a4fd26323192935dbbcbf3b0527f2fd4.yaml index 1dbc35469f..051590bae7 100644 --- a/nuclei-templates/2019/CVE-2019-14682-a4fd26323192935dbbcbf3b0527f2fd4.yaml +++ b/nuclei-templates/2019/CVE-2019-14682-a4fd26323192935dbbcbf3b0527f2fd4.yaml @@ -4,7 +4,7 @@ info: name: > ACF Better Search <= 3.3.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The acf-better-search (aka ACF: Better Search) plugin before 3.3.1 for WordPress allows wp-admin/options-general.php?page=acfbs_admin_page CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/acf-better-search/" google-query: inurl:"/wp-content/plugins/acf-better-search/" shodan-query: 'vuln:CVE-2019-14682' - tags: cve,wordpress,wp-plugin,acf-better-search,high + tags: cve,wordpress,wp-plugin,acf-better-search,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14784-beee0c1304e0da531df84f8029d7259b.yaml b/nuclei-templates/2019/CVE-2019-14784-beee0c1304e0da531df84f8029d7259b.yaml index b6ba769e04..83f458f756 100644 --- a/nuclei-templates/2019/CVE-2019-14784-beee0c1304e0da531df84f8029d7259b.yaml +++ b/nuclei-templates/2019/CVE-2019-14784-beee0c1304e0da531df84f8029d7259b.yaml @@ -4,7 +4,7 @@ info: name: > CP Contact Form with PayPal <= 1.3.01 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The "CP Contact Form with PayPal" plugin before 1.3.02 for WordPress has XSS in CSS edition. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cp-contact-form-with-paypal/" google-query: inurl:"/wp-content/plugins/cp-contact-form-with-paypal/" shodan-query: 'vuln:CVE-2019-14784' - tags: cve,wordpress,wp-plugin,cp-contact-form-with-paypal,medium + tags: cve,wordpress,wp-plugin,cp-contact-form-with-paypal,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14785-c94ec523ba103bad6a372ee7e463bd4f.yaml b/nuclei-templates/2019/CVE-2019-14785-c94ec523ba103bad6a372ee7e463bd4f.yaml index c7f8cf44c8..c9969cea78 100644 --- a/nuclei-templates/2019/CVE-2019-14785-c94ec523ba103bad6a372ee7e463bd4f.yaml +++ b/nuclei-templates/2019/CVE-2019-14785-c94ec523ba103bad6a372ee7e463bd4f.yaml @@ -4,7 +4,7 @@ info: name: > CP Contact Form with PayPal <= 1.3.01 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The "CP Contact Form with PayPal" plugin before 1.2.99 for WordPress has XSS in the publishing wizard via the wp-admin/admin.php?page=cp_contact_form_paypal.php&pwizard=1 cp_contactformpp_id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cp-contact-form-with-paypal/" google-query: inurl:"/wp-content/plugins/cp-contact-form-with-paypal/" shodan-query: 'vuln:CVE-2019-14785' - tags: cve,wordpress,wp-plugin,cp-contact-form-with-paypal,medium + tags: cve,wordpress,wp-plugin,cp-contact-form-with-paypal,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14786-424aba97fb32ef1aa4a45220d2d79ae0.yaml b/nuclei-templates/2019/CVE-2019-14786-424aba97fb32ef1aa4a45220d2d79ae0.yaml index 671281efca..2bd0e3e229 100644 --- a/nuclei-templates/2019/CVE-2019-14786-424aba97fb32ef1aa4a45220d2d79ae0.yaml +++ b/nuclei-templates/2019/CVE-2019-14786-424aba97fb32ef1aa4a45220d2d79ae0.yaml @@ -4,7 +4,7 @@ info: name: > Rank Math SEO <= 1.0.27 - Authenticated Settings Reset via reset-cmb Parameter author: topscoder - severity: medium + severity: low description: > The Rank Math SEO plugin 1.0.27 for WordPress allows non-admin users to reset the settings via the wp-admin/admin-post.php reset-cmb parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/seo-by-rank-math/" google-query: inurl:"/wp-content/plugins/seo-by-rank-math/" shodan-query: 'vuln:CVE-2019-14786' - tags: cve,wordpress,wp-plugin,seo-by-rank-math,medium + tags: cve,wordpress,wp-plugin,seo-by-rank-math,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14787-63a6ae12fc77467bfccad91ea4a943d2.yaml b/nuclei-templates/2019/CVE-2019-14787-63a6ae12fc77467bfccad91ea4a943d2.yaml index 7dc55a1cdf..f30c6d4339 100644 --- a/nuclei-templates/2019/CVE-2019-14787-63a6ae12fc77467bfccad91ea4a943d2.yaml +++ b/nuclei-templates/2019/CVE-2019-14787-63a6ae12fc77467bfccad91ea4a943d2.yaml @@ -4,7 +4,7 @@ info: name: > Newsletters <= 4.6.18 - Cross-Site Scripting via contentarea Parameter author: topscoder - severity: medium + severity: high description: > The Tribulant Newsletters plugin before 4.6.19 for WordPress allows XSS via the wp-admin/admin-ajax.php?action=newsletters_load_new_editor contentarea parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/newsletters-lite/" google-query: inurl:"/wp-content/plugins/newsletters-lite/" shodan-query: 'vuln:CVE-2019-14787' - tags: cve,wordpress,wp-plugin,newsletters-lite,medium + tags: cve,wordpress,wp-plugin,newsletters-lite,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14790-ba4f93258decf77226fa4331245d3364.yaml b/nuclei-templates/2019/CVE-2019-14790-ba4f93258decf77226fa4331245d3364.yaml index fde99e78b4..789f652f03 100644 --- a/nuclei-templates/2019/CVE-2019-14790-ba4f93258decf77226fa4331245d3364.yaml +++ b/nuclei-templates/2019/CVE-2019-14790-ba4f93258decf77226fa4331245d3364.yaml @@ -4,7 +4,7 @@ info: name: > Limb Gallery – Create Beautiful Image & Video Galleries <= 1.3.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The limb-gallery (aka Limb Gallery) plugin < 1.4.0 for WordPress has XSS via the wp-admin/admin-ajax.php?action=grsGalleryAjax&grsAction=shortcode task parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/limb-gallery/" google-query: inurl:"/wp-content/plugins/limb-gallery/" shodan-query: 'vuln:CVE-2019-14790' - tags: cve,wordpress,wp-plugin,limb-gallery,medium + tags: cve,wordpress,wp-plugin,limb-gallery,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14791-6dd0e2469be8342859a9ccb068065a86.yaml b/nuclei-templates/2019/CVE-2019-14791-6dd0e2469be8342859a9ccb068065a86.yaml index 7267a1f636..a987c0c5cc 100644 --- a/nuclei-templates/2019/CVE-2019-14791-6dd0e2469be8342859a9ccb068065a86.yaml +++ b/nuclei-templates/2019/CVE-2019-14791-6dd0e2469be8342859a9ccb068065a86.yaml @@ -4,7 +4,7 @@ info: name: > Appointment Booking Calendar < 1.3.19 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Appointment Booking Calendar plugin 1.3.18 for WordPress allows XSS via the wp-admin/admin-post.php editionarea parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/appointment-booking-calendar/" google-query: inurl:"/wp-content/plugins/appointment-booking-calendar/" shodan-query: 'vuln:CVE-2019-14791' - tags: cve,wordpress,wp-plugin,appointment-booking-calendar,medium + tags: cve,wordpress,wp-plugin,appointment-booking-calendar,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14795-d02abc95243fe34c87855a6ca2a95d58.yaml b/nuclei-templates/2019/CVE-2019-14795-d02abc95243fe34c87855a6ca2a95d58.yaml index 1a2e5e10c5..66d6822c2f 100644 --- a/nuclei-templates/2019/CVE-2019-14795-d02abc95243fe34c87855a6ca2a95d58.yaml +++ b/nuclei-templates/2019/CVE-2019-14795-d02abc95243fe34c87855a6ca2a95d58.yaml @@ -4,7 +4,7 @@ info: name: > Toggle The Title <= 1.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The toggle-the-title (aka Toggle The Title) plugin 1.4 for WordPress has XSS via the wp-admin/admin-ajax.php?action=update_title_options isAutoSaveValveChecked or isDisableAllPagesValveChecked parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/toggle-the-title/" google-query: inurl:"/wp-content/plugins/toggle-the-title/" shodan-query: 'vuln:CVE-2019-14795' - tags: cve,wordpress,wp-plugin,toggle-the-title,medium + tags: cve,wordpress,wp-plugin,toggle-the-title,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14796-f255a0d01d888b1ab68c9fee4e439ae8.yaml b/nuclei-templates/2019/CVE-2019-14796-f255a0d01d888b1ab68c9fee4e439ae8.yaml index b6eae59079..089262d430 100644 --- a/nuclei-templates/2019/CVE-2019-14796-f255a0d01d888b1ab68c9fee4e439ae8.yaml +++ b/nuclei-templates/2019/CVE-2019-14796-f255a0d01d888b1ab68c9fee4e439ae8.yaml @@ -4,7 +4,7 @@ info: name: > Woocommerce Products Price Bulk Edit <= 2.0 - Cross-Site Scripting via show_products_page_limit parameter author: topscoder - severity: medium + severity: high description: > The Woocommerce Products Price Bulk Edit plugin for WordPress is vulnerable to Cross-Site Scripting via the wp-admin/admin-ajax.php?action=update_options show_products_page_limit parameter in versions up to, and including, 2.0 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mq-woocommerce-products-price-bulk-edit/" google-query: inurl:"/wp-content/plugins/mq-woocommerce-products-price-bulk-edit/" shodan-query: 'vuln:CVE-2019-14796' - tags: cve,wordpress,wp-plugin,mq-woocommerce-products-price-bulk-edit,medium + tags: cve,wordpress,wp-plugin,mq-woocommerce-products-price-bulk-edit,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14797-93b42b89f073fbc75b7062f5d47b5b66.yaml b/nuclei-templates/2019/CVE-2019-14797-93b42b89f073fbc75b7062f5d47b5b66.yaml index 327b8a5484..f421ce041a 100644 --- a/nuclei-templates/2019/CVE-2019-14797-93b42b89f073fbc75b7062f5d47b5b66.yaml +++ b/nuclei-templates/2019/CVE-2019-14797-93b42b89f073fbc75b7062f5d47b5b66.yaml @@ -4,7 +4,7 @@ info: name: > Photo Gallery by 10Web <= 1.5.22 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The 10Web Photo Gallery plugin before 1.5.23 for WordPress has authenticated stored XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/photo-gallery/" google-query: inurl:"/wp-content/plugins/photo-gallery/" shodan-query: 'vuln:CVE-2019-14797' - tags: cve,wordpress,wp-plugin,photo-gallery,medium + tags: cve,wordpress,wp-plugin,photo-gallery,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14798-9568a93cf21f83223317ab5745dc29b8.yaml b/nuclei-templates/2019/CVE-2019-14798-9568a93cf21f83223317ab5745dc29b8.yaml index cdcd7d7749..ad9e91becc 100644 --- a/nuclei-templates/2019/CVE-2019-14798-9568a93cf21f83223317ab5745dc29b8.yaml +++ b/nuclei-templates/2019/CVE-2019-14798-9568a93cf21f83223317ab5745dc29b8.yaml @@ -4,7 +4,7 @@ info: name: > Photo Gallery by 10Web <= 1.5.24 - Authenticated Local File Inclusion author: topscoder - severity: medium + severity: low description: > The 10Web Photo Gallery plugin before 1.5.25 for WordPress has Authenticated Local File Inclusion via directory traversal in the wp-admin/admin-ajax.php?action=shortcode_bwg tagtext parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/photo-gallery/" google-query: inurl:"/wp-content/plugins/photo-gallery/" shodan-query: 'vuln:CVE-2019-14798' - tags: cve,wordpress,wp-plugin,photo-gallery,medium + tags: cve,wordpress,wp-plugin,photo-gallery,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14799-86d0c991bc6dd85c8051863807fe1299.yaml b/nuclei-templates/2019/CVE-2019-14799-86d0c991bc6dd85c8051863807fe1299.yaml index 816f1d4a84..10844bfcb0 100644 --- a/nuclei-templates/2019/CVE-2019-14799-86d0c991bc6dd85c8051863807fe1299.yaml +++ b/nuclei-templates/2019/CVE-2019-14799-86d0c991bc6dd85c8051863807fe1299.yaml @@ -4,7 +4,7 @@ info: name: > FV Flowplayer Video Player <= 7.3.13.727 - Unauthenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The FV Flowplayer Video Player plugin before 7.3.14.727 for WordPress allows email subscription XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" shodan-query: 'vuln:CVE-2019-14799' - tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,medium + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14945-00490e9d02fc53f4fe0fd6d4af30aaaa.yaml b/nuclei-templates/2019/CVE-2019-14945-00490e9d02fc53f4fe0fd6d4af30aaaa.yaml index 6aae05a8e0..8460d5a688 100644 --- a/nuclei-templates/2019/CVE-2019-14945-00490e9d02fc53f4fe0fd6d4af30aaaa.yaml +++ b/nuclei-templates/2019/CVE-2019-14945-00490e9d02fc53f4fe0fd6d4af30aaaa.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate Member <= 2.0.53 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The ultimate-member plugin before 2.0.54 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-member/" google-query: inurl:"/wp-content/plugins/ultimate-member/" shodan-query: 'vuln:CVE-2019-14945' - tags: cve,wordpress,wp-plugin,ultimate-member,medium + tags: cve,wordpress,wp-plugin,ultimate-member,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14948-3385cb8b008c9eac317535d656ebf7b2.yaml b/nuclei-templates/2019/CVE-2019-14948-3385cb8b008c9eac317535d656ebf7b2.yaml index 8e3ace34a2..d8abd93122 100644 --- a/nuclei-templates/2019/CVE-2019-14948-3385cb8b008c9eac317535d656ebf7b2.yaml +++ b/nuclei-templates/2019/CVE-2019-14948-3385cb8b008c9eac317535d656ebf7b2.yaml @@ -4,7 +4,7 @@ info: name: > PPOM for WooCommerce <= 18.3 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The woocommerce-product-addon plugin before 18.4 for WordPress has XSS via an import of a new meta data structure. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/woocommerce-product-addon/" google-query: inurl:"/wp-content/plugins/woocommerce-product-addon/" shodan-query: 'vuln:CVE-2019-14948' - tags: cve,wordpress,wp-plugin,woocommerce-product-addon,medium + tags: cve,wordpress,wp-plugin,woocommerce-product-addon,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14949-71e8880d940289fc5d83f840f7f72d23.yaml b/nuclei-templates/2019/CVE-2019-14949-71e8880d940289fc5d83f840f7f72d23.yaml index fd0b356148..9f12548af8 100644 --- a/nuclei-templates/2019/CVE-2019-14949-71e8880d940289fc5d83f840f7f72d23.yaml +++ b/nuclei-templates/2019/CVE-2019-14949-71e8880d940289fc5d83f840f7f72d23.yaml @@ -4,7 +4,7 @@ info: name: > WP Database Backup <= 5.1.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-database-backup plugin before 5.1.2 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-database-backup/" google-query: inurl:"/wp-content/plugins/wp-database-backup/" shodan-query: 'vuln:CVE-2019-14949' - tags: cve,wordpress,wp-plugin,wp-database-backup,medium + tags: cve,wordpress,wp-plugin,wp-database-backup,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-14950-18d01dbad64386da194504c3f5ffe26e.yaml b/nuclei-templates/2019/CVE-2019-14950-18d01dbad64386da194504c3f5ffe26e.yaml index 6c3048b90f..c3d51e41bf 100644 --- a/nuclei-templates/2019/CVE-2019-14950-18d01dbad64386da194504c3f5ffe26e.yaml +++ b/nuclei-templates/2019/CVE-2019-14950-18d01dbad64386da194504c3f5ffe26e.yaml @@ -4,7 +4,7 @@ info: name: > WP Live Chat Support <= 8.0.27 - Unauthenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-live-chat-support plugin before 8.0.27 for WordPress has XSS via the GDPR page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-live-chat-support/" google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" shodan-query: 'vuln:CVE-2019-14950' - tags: cve,wordpress,wp-plugin,wp-live-chat-support,medium + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15109-15adc07dcc170bd663dc3c1e94fa94e1.yaml b/nuclei-templates/2019/CVE-2019-15109-15adc07dcc170bd663dc3c1e94fa94e1.yaml index 6c75fbbca5..79da8d04c1 100644 --- a/nuclei-templates/2019/CVE-2019-15109-15adc07dcc170bd663dc3c1e94fa94e1.yaml +++ b/nuclei-templates/2019/CVE-2019-15109-15adc07dcc170bd663dc3c1e94fa94e1.yaml @@ -4,7 +4,7 @@ info: name: > The Events Calendar <= 4.8.1 - Cross-Site Scripting via tribe_paged Parameter author: topscoder - severity: medium + severity: high description: > The Events Calendar plugin before 4.8.2 for WordPress has XSS via the tribe_paged URL parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/the-events-calendar/" google-query: inurl:"/wp-content/plugins/the-events-calendar/" shodan-query: 'vuln:CVE-2019-15109' - tags: cve,wordpress,wp-plugin,the-events-calendar,medium + tags: cve,wordpress,wp-plugin,the-events-calendar,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15110-0ed606409f522ba3351ac7659014c32c.yaml b/nuclei-templates/2019/CVE-2019-15110-0ed606409f522ba3351ac7659014c32c.yaml index 5302d5c420..1c47da4b00 100644 --- a/nuclei-templates/2019/CVE-2019-15110-0ed606409f522ba3351ac7659014c32c.yaml +++ b/nuclei-templates/2019/CVE-2019-15110-0ed606409f522ba3351ac7659014c32c.yaml @@ -4,7 +4,7 @@ info: name: > WP Front End Profile <= 0.2.1 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The WP Front End Profile plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘save-fields.php’ file in versions up to, and including, 0.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-front-end-profile/" google-query: inurl:"/wp-content/plugins/wp-front-end-profile/" shodan-query: 'vuln:CVE-2019-15110' - tags: cve,wordpress,wp-plugin,wp-front-end-profile,medium + tags: cve,wordpress,wp-plugin,wp-front-end-profile,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15112-9024f709636fd6877d65d2f3b4c1635e.yaml b/nuclei-templates/2019/CVE-2019-15112-9024f709636fd6877d65d2f3b4c1635e.yaml index f448d59876..ffa88f0c17 100644 --- a/nuclei-templates/2019/CVE-2019-15112-9024f709636fd6877d65d2f3b4c1635e.yaml +++ b/nuclei-templates/2019/CVE-2019-15112-9024f709636fd6877d65d2f3b4c1635e.yaml @@ -4,7 +4,7 @@ info: name: > WP Slimstat <= 4.8 - Unauthenticated Stored Cross-Site Scripting from Visitors author: topscoder - severity: medium + severity: high description: > The wp-slimstat plugin before 4.8.1 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-slimstat/" google-query: inurl:"/wp-content/plugins/wp-slimstat/" shodan-query: 'vuln:CVE-2019-15112' - tags: cve,wordpress,wp-plugin,wp-slimstat,medium + tags: cve,wordpress,wp-plugin,wp-slimstat,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15113-3b5f66bc28ba8ff54368e43564c0ea04.yaml b/nuclei-templates/2019/CVE-2019-15113-3b5f66bc28ba8ff54368e43564c0ea04.yaml index a4f80cf334..d24e878ac4 100644 --- a/nuclei-templates/2019/CVE-2019-15113-3b5f66bc28ba8ff54368e43564c0ea04.yaml +++ b/nuclei-templates/2019/CVE-2019-15113-3b5f66bc28ba8ff54368e43564c0ea04.yaml @@ -4,7 +4,7 @@ info: name: > Companion Sitemap Generator – HTML & XML <= 3.6.6 - Cross-Site Request Forgery and Local File Inclusion author: topscoder - severity: high + severity: medium description: > The Companion Sitemap Generator plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.6.6. This makes it possible for unauthenticated attackers to modify the plugin settings or include any local file with a PHP extension via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/companion-sitemap-generator/" google-query: inurl:"/wp-content/plugins/companion-sitemap-generator/" shodan-query: 'vuln:CVE-2019-15113' - tags: cve,wordpress,wp-plugin,companion-sitemap-generator,high + tags: cve,wordpress,wp-plugin,companion-sitemap-generator,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15114-5fa24ba82d6b7dec5ee5fc8a5b73d9f8.yaml b/nuclei-templates/2019/CVE-2019-15114-5fa24ba82d6b7dec5ee5fc8a5b73d9f8.yaml index a15076f099..986e0b3038 100644 --- a/nuclei-templates/2019/CVE-2019-15114-5fa24ba82d6b7dec5ee5fc8a5b73d9f8.yaml +++ b/nuclei-templates/2019/CVE-2019-15114-5fa24ba82d6b7dec5ee5fc8a5b73d9f8.yaml @@ -4,7 +4,7 @@ info: name: > FormCraft <= 1.2.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The formcraft-form-builder plugin before 1.2.2 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/formcraft-form-builder/" google-query: inurl:"/wp-content/plugins/formcraft-form-builder/" shodan-query: 'vuln:CVE-2019-15114' - tags: cve,wordpress,wp-plugin,formcraft-form-builder,high + tags: cve,wordpress,wp-plugin,formcraft-form-builder,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15115-55f3de8c0899443e80983275ca038b9f.yaml b/nuclei-templates/2019/CVE-2019-15115-55f3de8c0899443e80983275ca038b9f.yaml index 4f6d053674..bc5f700b74 100644 --- a/nuclei-templates/2019/CVE-2019-15115-55f3de8c0899443e80983275ca038b9f.yaml +++ b/nuclei-templates/2019/CVE-2019-15115-55f3de8c0899443e80983275ca038b9f.yaml @@ -4,7 +4,7 @@ info: name: > LoginWP <= 2.9.1 - Multiple Cross-Site Request Forgery vulnerabilities author: topscoder - severity: high + severity: medium description: > The peters-login-redirect plugin before 2.9.2 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/peters-login-redirect/" google-query: inurl:"/wp-content/plugins/peters-login-redirect/" shodan-query: 'vuln:CVE-2019-15115' - tags: cve,wordpress,wp-plugin,peters-login-redirect,high + tags: cve,wordpress,wp-plugin,peters-login-redirect,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15116-58ad5ca81c9faa1c9bf4e8d6a87f5f2f.yaml b/nuclei-templates/2019/CVE-2019-15116-58ad5ca81c9faa1c9bf4e8d6a87f5f2f.yaml index a2766d4a95..48ac5b16bf 100644 --- a/nuclei-templates/2019/CVE-2019-15116-58ad5ca81c9faa1c9bf4e8d6a87f5f2f.yaml +++ b/nuclei-templates/2019/CVE-2019-15116-58ad5ca81c9faa1c9bf4e8d6a87f5f2f.yaml @@ -4,7 +4,7 @@ info: name: > Easy Digital Downloads – Simple eCommerce for Selling Digital Files <= 2.9.15 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The easy-digital-downloads plugin before 2.9.16 for WordPress has XSS related to IP address logging. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-digital-downloads/" google-query: inurl:"/wp-content/plugins/easy-digital-downloads/" shodan-query: 'vuln:CVE-2019-15116' - tags: cve,wordpress,wp-plugin,easy-digital-downloads,medium + tags: cve,wordpress,wp-plugin,easy-digital-downloads,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15238-b4c6a4aeabe2851a3af8facd90e9e06e.yaml b/nuclei-templates/2019/CVE-2019-15238-b4c6a4aeabe2851a3af8facd90e9e06e.yaml index bdc3efafe1..45f06c6605 100644 --- a/nuclei-templates/2019/CVE-2019-15238-b4c6a4aeabe2851a3af8facd90e9e06e.yaml +++ b/nuclei-templates/2019/CVE-2019-15238-b4c6a4aeabe2851a3af8facd90e9e06e.yaml @@ -4,7 +4,7 @@ info: name: > CformsII <= 15.0.1 - Unauthenticated HTML Injection & Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The cforms2 plugin before 15.0.2 for WordPress has CSRF related to the IP address field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cforms2/" google-query: inurl:"/wp-content/plugins/cforms2/" shodan-query: 'vuln:CVE-2019-15238' - tags: cve,wordpress,wp-plugin,cforms2,high + tags: cve,wordpress,wp-plugin,cforms2,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15317-d69efeae16b0ba8318e8a9d732208aec.yaml b/nuclei-templates/2019/CVE-2019-15317-d69efeae16b0ba8318e8a9d732208aec.yaml index 0d472a4092..40ca62fd27 100644 --- a/nuclei-templates/2019/CVE-2019-15317-d69efeae16b0ba8318e8a9d732208aec.yaml +++ b/nuclei-templates/2019/CVE-2019-15317-d69efeae16b0ba8318e8a9d732208aec.yaml @@ -4,7 +4,7 @@ info: name: > GiveWP <= 2.4.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The give plugin before 2.4.7 for WordPress has XSS via a donor name. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/give/" google-query: inurl:"/wp-content/plugins/give/" shodan-query: 'vuln:CVE-2019-15317' - tags: cve,wordpress,wp-plugin,give,medium + tags: cve,wordpress,wp-plugin,give,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15323-05dc7f00a65d6d066b60c74e22d18787.yaml b/nuclei-templates/2019/CVE-2019-15323-05dc7f00a65d6d066b60c74e22d18787.yaml index 0534c32255..fccc6eb1d4 100644 --- a/nuclei-templates/2019/CVE-2019-15323-05dc7f00a65d6d066b60c74e22d18787.yaml +++ b/nuclei-templates/2019/CVE-2019-15323-05dc7f00a65d6d066b60c74e22d18787.yaml @@ -4,7 +4,7 @@ info: name: > Ad Inserter <= 2.4.19 - Authenticated Path Traversal author: topscoder - severity: high + severity: low description: > The ad-inserter plugin before 2.4.20 for WordPress has path traversal. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ad-inserter/" google-query: inurl:"/wp-content/plugins/ad-inserter/" shodan-query: 'vuln:CVE-2019-15323' - tags: cve,wordpress,wp-plugin,ad-inserter,high + tags: cve,wordpress,wp-plugin,ad-inserter,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15324-c5d0a251b677b3b951be5050c3700b32.yaml b/nuclei-templates/2019/CVE-2019-15324-c5d0a251b677b3b951be5050c3700b32.yaml index b2412eae2a..c8fd41c302 100644 --- a/nuclei-templates/2019/CVE-2019-15324-c5d0a251b677b3b951be5050c3700b32.yaml +++ b/nuclei-templates/2019/CVE-2019-15324-c5d0a251b677b3b951be5050c3700b32.yaml @@ -4,7 +4,7 @@ info: name: > Ad Inserter <= 2.4.21 - Authenticated Remote Code Execution author: topscoder - severity: high + severity: low description: > The ad-inserter plugin before 2.4.22 for WordPress has remote code execution. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ad-inserter/" google-query: inurl:"/wp-content/plugins/ad-inserter/" shodan-query: 'vuln:CVE-2019-15324' - tags: cve,wordpress,wp-plugin,ad-inserter,high + tags: cve,wordpress,wp-plugin,ad-inserter,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15327-342fee676d86d87109d08378d8dcd0b0.yaml b/nuclei-templates/2019/CVE-2019-15327-342fee676d86d87109d08378d8dcd0b0.yaml index 77ac9192d9..80a03bf311 100644 --- a/nuclei-templates/2019/CVE-2019-15327-342fee676d86d87109d08378d8dcd0b0.yaml +++ b/nuclei-templates/2019/CVE-2019-15327-342fee676d86d87109d08378d8dcd0b0.yaml @@ -4,7 +4,7 @@ info: name: > Import and export users and customers <= 1.14.1.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The import-users-from-csv-with-meta plugin before 1.14.1.3 for WordPress has XSS via imported data. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" shodan-query: 'vuln:CVE-2019-15327' - tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,medium + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15328-af8e3b1753f58bd7e46c4cccec8f000f.yaml b/nuclei-templates/2019/CVE-2019-15328-af8e3b1753f58bd7e46c4cccec8f000f.yaml index de6b845777..fd1bc4ef0a 100644 --- a/nuclei-templates/2019/CVE-2019-15328-af8e3b1753f58bd7e46c4cccec8f000f.yaml +++ b/nuclei-templates/2019/CVE-2019-15328-af8e3b1753f58bd7e46c4cccec8f000f.yaml @@ -4,7 +4,7 @@ info: name: > Import and export users and customers <= 1.14.0.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The import-users-from-csv-with-meta plugin before 1.14.0.3 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" shodan-query: 'vuln:CVE-2019-15328' - tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,medium + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15329-5bda221acefc04e8d84a3c6e2be5c30e.yaml b/nuclei-templates/2019/CVE-2019-15329-5bda221acefc04e8d84a3c6e2be5c30e.yaml index 7280656da6..35d67abae5 100644 --- a/nuclei-templates/2019/CVE-2019-15329-5bda221acefc04e8d84a3c6e2be5c30e.yaml +++ b/nuclei-templates/2019/CVE-2019-15329-5bda221acefc04e8d84a3c6e2be5c30e.yaml @@ -4,7 +4,7 @@ info: name: > Import and export users and customers <= 1.14.0.2 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The import-users-from-csv-with-meta plugin before 1.14.0.3 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/import-users-from-csv-with-meta/" google-query: inurl:"/wp-content/plugins/import-users-from-csv-with-meta/" shodan-query: 'vuln:CVE-2019-15329' - tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,high + tags: cve,wordpress,wp-plugin,import-users-from-csv-with-meta,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15643-01d841cc481bc716c0f7b858b4f11c39.yaml b/nuclei-templates/2019/CVE-2019-15643-01d841cc481bc716c0f7b858b4f11c39.yaml index b6735c8c9d..e6180fb0bf 100644 --- a/nuclei-templates/2019/CVE-2019-15643-01d841cc481bc716c0f7b858b4f11c39.yaml +++ b/nuclei-templates/2019/CVE-2019-15643-01d841cc481bc716c0f7b858b4f11c39.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate Faqs <= 1.8.21 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The ultimate-faqs plugin before 1.8.22 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-faqs/" google-query: inurl:"/wp-content/plugins/ultimate-faqs/" shodan-query: 'vuln:CVE-2019-15643' - tags: cve,wordpress,wp-plugin,ultimate-faqs,medium + tags: cve,wordpress,wp-plugin,ultimate-faqs,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15645-379056d331237206cad69e45d8d3007e.yaml b/nuclei-templates/2019/CVE-2019-15645-379056d331237206cad69e45d8d3007e.yaml index 6adf4e23e4..c75d8cb0e0 100644 --- a/nuclei-templates/2019/CVE-2019-15645-379056d331237206cad69e45d8d3007e.yaml +++ b/nuclei-templates/2019/CVE-2019-15645-379056d331237206cad69e45d8d3007e.yaml @@ -4,7 +4,7 @@ info: name: > Zoho SalesIQ <= 1.0.8 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The zoho-salesiq plugin before 1.0.9 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/zoho-salesiq/" google-query: inurl:"/wp-content/plugins/zoho-salesiq/" shodan-query: 'vuln:CVE-2019-15645' - tags: cve,wordpress,wp-plugin,zoho-salesiq,high + tags: cve,wordpress,wp-plugin,zoho-salesiq,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15647-01e6da1e967018241a8f36efe6fd50ba.yaml b/nuclei-templates/2019/CVE-2019-15647-01e6da1e967018241a8f36efe6fd50ba.yaml index b9aee38f47..a9812175c4 100644 --- a/nuclei-templates/2019/CVE-2019-15647-01e6da1e967018241a8f36efe6fd50ba.yaml +++ b/nuclei-templates/2019/CVE-2019-15647-01e6da1e967018241a8f36efe6fd50ba.yaml @@ -4,7 +4,7 @@ info: name: > WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg < 1.3.5 - Remote Code Execution author: topscoder - severity: high + severity: critical description: > The groundhogg plugin before 1.3.5 for WordPress has wp-admin/admin-ajax.php?action=bulk_action_listener remote code execution. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/groundhogg/" google-query: inurl:"/wp-content/plugins/groundhogg/" shodan-query: 'vuln:CVE-2019-15647' - tags: cve,wordpress,wp-plugin,groundhogg,high + tags: cve,wordpress,wp-plugin,groundhogg,critical http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15649-243ee6cead272cdb6dc2ad831bc4986e.yaml b/nuclei-templates/2019/CVE-2019-15649-243ee6cead272cdb6dc2ad831bc4986e.yaml index 6abc1275af..ff31d4ca37 100644 --- a/nuclei-templates/2019/CVE-2019-15649-243ee6cead272cdb6dc2ad831bc4986e.yaml +++ b/nuclei-templates/2019/CVE-2019-15649-243ee6cead272cdb6dc2ad831bc4986e.yaml @@ -4,7 +4,7 @@ info: name: > Insert or Embed Articulate Content into WordPress < 4.2999 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > The insert-or-embed-articulate-content-into-wordpress plugin before 4.2999 for WordPress has insufficient restrictions on file upload. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/insert-or-embed-articulate-content-into-wordpress/" google-query: inurl:"/wp-content/plugins/insert-or-embed-articulate-content-into-wordpress/" shodan-query: 'vuln:CVE-2019-15649' - tags: cve,wordpress,wp-plugin,insert-or-embed-articulate-content-into-wordpress,high + tags: cve,wordpress,wp-plugin,insert-or-embed-articulate-content-into-wordpress,critical http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15660-7700c6b035beec7a0abef5d3cdd6b1cf.yaml b/nuclei-templates/2019/CVE-2019-15660-7700c6b035beec7a0abef5d3cdd6b1cf.yaml index 942cd95261..1ba5f12cd3 100644 --- a/nuclei-templates/2019/CVE-2019-15660-7700c6b035beec7a0abef5d3cdd6b1cf.yaml +++ b/nuclei-templates/2019/CVE-2019-15660-7700c6b035beec7a0abef5d3cdd6b1cf.yaml @@ -4,7 +4,7 @@ info: name: > WP-Members <= 3.2.7 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The wp-members plugin before 3.2.8.1 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-members/" google-query: inurl:"/wp-content/plugins/wp-members/" shodan-query: 'vuln:CVE-2019-15660' - tags: cve,wordpress,wp-plugin,wp-members,high + tags: cve,wordpress,wp-plugin,wp-members,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15713-b87197a613662b55350c2f2781a87102.yaml b/nuclei-templates/2019/CVE-2019-15713-b87197a613662b55350c2f2781a87102.yaml index ab28ec6063..dbea5fd3a8 100644 --- a/nuclei-templates/2019/CVE-2019-15713-b87197a613662b55350c2f2781a87102.yaml +++ b/nuclei-templates/2019/CVE-2019-15713-b87197a613662b55350c2f2781a87102.yaml @@ -4,7 +4,7 @@ info: name: > My Calendar <= 3.1.9 - Unauthenticated Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The my-calendar plugin before 3.1.10 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/my-calendar/" google-query: inurl:"/wp-content/plugins/my-calendar/" shodan-query: 'vuln:CVE-2019-15713' - tags: cve,wordpress,wp-plugin,my-calendar,medium + tags: cve,wordpress,wp-plugin,my-calendar,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15769-8f10a7f44536cd7d542d4c451e6c6b46.yaml b/nuclei-templates/2019/CVE-2019-15769-8f10a7f44536cd7d542d4c451e6c6b46.yaml index a24fbc6b5a..64a5faf4c3 100644 --- a/nuclei-templates/2019/CVE-2019-15769-8f10a7f44536cd7d542d4c451e6c6b46.yaml +++ b/nuclei-templates/2019/CVE-2019-15769-8f10a7f44536cd7d542d4c451e6c6b46.yaml @@ -4,7 +4,7 @@ info: name: > HandL UTM Grabber / Tracker <= 2.6.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The handl-utm-grabber plugin before 2.6.5 for WordPress has CSRF via add_option and update_option. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/handl-utm-grabber/" google-query: inurl:"/wp-content/plugins/handl-utm-grabber/" shodan-query: 'vuln:CVE-2019-15769' - tags: cve,wordpress,wp-plugin,handl-utm-grabber,high + tags: cve,wordpress,wp-plugin,handl-utm-grabber,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15770-35ff0530e249316fdf7a2ba6a6ea24d8.yaml b/nuclei-templates/2019/CVE-2019-15770-35ff0530e249316fdf7a2ba6a6ea24d8.yaml index 621d5b0fcc..622360cb94 100644 --- a/nuclei-templates/2019/CVE-2019-15770-35ff0530e249316fdf7a2ba6a6ea24d8.yaml +++ b/nuclei-templates/2019/CVE-2019-15770-35ff0530e249316fdf7a2ba6a6ea24d8.yaml @@ -4,7 +4,7 @@ info: name: > WooCommerce Address Book < 1.6.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The woo-address-book plugin before 1.6.0 for WordPress has save calls without nonce verification checks. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/woo-address-book/" google-query: inurl:"/wp-content/plugins/woo-address-book/" shodan-query: 'vuln:CVE-2019-15770' - tags: cve,wordpress,wp-plugin,woo-address-book,high + tags: cve,wordpress,wp-plugin,woo-address-book,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15777-65fb11931177bab0fee70a7467cb7286.yaml b/nuclei-templates/2019/CVE-2019-15777-65fb11931177bab0fee70a7467cb7286.yaml index 90fbf55bcd..903feb00fd 100644 --- a/nuclei-templates/2019/CVE-2019-15777-65fb11931177bab0fee70a7467cb7286.yaml +++ b/nuclei-templates/2019/CVE-2019-15777-65fb11931177bab0fee70a7467cb7286.yaml @@ -4,7 +4,7 @@ info: name: > WP DSGVO Tools (GDPR) <= 2.2.18 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The shapepress-dsgvo plugin before 2.2.19 for WordPress has wp-admin/admin-ajax.php?action=admin-common-settings&admin_email= XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/shapepress-dsgvo/" google-query: inurl:"/wp-content/plugins/shapepress-dsgvo/" shodan-query: 'vuln:CVE-2019-15777' - tags: cve,wordpress,wp-plugin,shapepress-dsgvo,medium + tags: cve,wordpress,wp-plugin,shapepress-dsgvo,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15778-9404e968e946456749ff0111b0225ba5.yaml b/nuclei-templates/2019/CVE-2019-15778-9404e968e946456749ff0111b0225ba5.yaml index d9e02cc536..3d9f21980a 100644 --- a/nuclei-templates/2019/CVE-2019-15778-9404e968e946456749ff0111b0225ba5.yaml +++ b/nuclei-templates/2019/CVE-2019-15778-9404e968e946456749ff0111b0225ba5.yaml @@ -4,7 +4,7 @@ info: name: > Additional Variation Images Gallery for WooCommerce <= 1.1.28 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The woo-variation-gallery plugin before 1.1.29 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/woo-variation-gallery/" google-query: inurl:"/wp-content/plugins/woo-variation-gallery/" shodan-query: 'vuln:CVE-2019-15778' - tags: cve,wordpress,wp-plugin,woo-variation-gallery,medium + tags: cve,wordpress,wp-plugin,woo-variation-gallery,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15779-a977aa9a4c9e6ea956efab1274f3c128.yaml b/nuclei-templates/2019/CVE-2019-15779-a977aa9a4c9e6ea956efab1274f3c128.yaml index 6975718045..2eb62deac3 100644 --- a/nuclei-templates/2019/CVE-2019-15779-a977aa9a4c9e6ea956efab1274f3c128.yaml +++ b/nuclei-templates/2019/CVE-2019-15779-a977aa9a4c9e6ea956efab1274f3c128.yaml @@ -4,7 +4,7 @@ info: name: > Social Feed Gallery <= 2.4.7 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The insta-gallery plugin before 2.4.8 for WordPress has no nonce validation for qligg_dismiss_notice or qligg_form_item_delete. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/insta-gallery/" google-query: inurl:"/wp-content/plugins/insta-gallery/" shodan-query: 'vuln:CVE-2019-15779' - tags: cve,wordpress,wp-plugin,insta-gallery,high + tags: cve,wordpress,wp-plugin,insta-gallery,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15781-281277016a09cf7dcda0f71c2e15f07f.yaml b/nuclei-templates/2019/CVE-2019-15781-281277016a09cf7dcda0f71c2e15f07f.yaml index 2423e93cc6..29fb6eaafb 100644 --- a/nuclei-templates/2019/CVE-2019-15781-281277016a09cf7dcda0f71c2e15f07f.yaml +++ b/nuclei-templates/2019/CVE-2019-15781-281277016a09cf7dcda0f71c2e15f07f.yaml @@ -4,7 +4,7 @@ info: name: > Social LikeBox & Feed <= 2.8.4 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > The facebook-by-weblizar plugin before 2.8.5 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/facebook-by-weblizar/" google-query: inurl:"/wp-content/plugins/facebook-by-weblizar/" shodan-query: 'vuln:CVE-2019-15781' - tags: cve,wordpress,wp-plugin,facebook-by-weblizar,high + tags: cve,wordpress,wp-plugin,facebook-by-weblizar,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15817-19a8a46d3531a17a737d3cfe8d4f708e.yaml b/nuclei-templates/2019/CVE-2019-15817-19a8a46d3531a17a737d3cfe8d4f708e.yaml index 816c9cf8ff..9d797eb4f1 100644 --- a/nuclei-templates/2019/CVE-2019-15817-19a8a46d3531a17a737d3cfe8d4f708e.yaml +++ b/nuclei-templates/2019/CVE-2019-15817-19a8a46d3531a17a737d3cfe8d4f708e.yaml @@ -4,7 +4,7 @@ info: name: > Easy Property Listings <= 3.3.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The easy-property-listings plugin before 3.4 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-property-listings/" google-query: inurl:"/wp-content/plugins/easy-property-listings/" shodan-query: 'vuln:CVE-2019-15817' - tags: cve,wordpress,wp-plugin,easy-property-listings,medium + tags: cve,wordpress,wp-plugin,easy-property-listings,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15827-697b3f7f41c78660c9aef82a5b73a231.yaml b/nuclei-templates/2019/CVE-2019-15827-697b3f7f41c78660c9aef82a5b73a231.yaml index 31f1f67a52..aee749670d 100644 --- a/nuclei-templates/2019/CVE-2019-15827-697b3f7f41c78660c9aef82a5b73a231.yaml +++ b/nuclei-templates/2019/CVE-2019-15827-697b3f7f41c78660c9aef82a5b73a231.yaml @@ -4,7 +4,7 @@ info: name: > OneSignal Web Push Notifications <=1.17.7 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The onesignal-free-web-push-notifications plugin before 1.17.8 for WordPress has XSS via the subdomain parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/onesignal-free-web-push-notifications/" google-query: inurl:"/wp-content/plugins/onesignal-free-web-push-notifications/" shodan-query: 'vuln:CVE-2019-15827' - tags: cve,wordpress,wp-plugin,onesignal-free-web-push-notifications,medium + tags: cve,wordpress,wp-plugin,onesignal-free-web-push-notifications,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15828-a5333a81df962bfc4dc1ef98d3ece12b.yaml b/nuclei-templates/2019/CVE-2019-15828-a5333a81df962bfc4dc1ef98d3ece12b.yaml index 4fdde61378..21a01f31ee 100644 --- a/nuclei-templates/2019/CVE-2019-15828-a5333a81df962bfc4dc1ef98d3ece12b.yaml +++ b/nuclei-templates/2019/CVE-2019-15828-a5333a81df962bfc4dc1ef98d3ece12b.yaml @@ -4,7 +4,7 @@ info: name: > One Click SSL <= 1.4.6 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The one-click-ssl plugin before 1.4.7 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/one-click-ssl/" google-query: inurl:"/wp-content/plugins/one-click-ssl/" shodan-query: 'vuln:CVE-2019-15828' - tags: cve,wordpress,wp-plugin,one-click-ssl,high + tags: cve,wordpress,wp-plugin,one-click-ssl,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15830-1189677e87fccd5ba86b3b7c8e3828fd.yaml b/nuclei-templates/2019/CVE-2019-15830-1189677e87fccd5ba86b3b7c8e3828fd.yaml index 78d2f83e54..e209fc24f1 100644 --- a/nuclei-templates/2019/CVE-2019-15830-1189677e87fccd5ba86b3b7c8e3828fd.yaml +++ b/nuclei-templates/2019/CVE-2019-15830-1189677e87fccd5ba86b3b7c8e3828fd.yaml @@ -4,7 +4,7 @@ info: name: > Icegram <= 1.10.28.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The icegram plugin before 1.10.29 for WordPress has ig_cat_list XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/icegram/" google-query: inurl:"/wp-content/plugins/icegram/" shodan-query: 'vuln:CVE-2019-15830' - tags: cve,wordpress,wp-plugin,icegram,medium + tags: cve,wordpress,wp-plugin,icegram,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15831-95fcd32657de195d1ff10c3dd6c72f1b.yaml b/nuclei-templates/2019/CVE-2019-15831-95fcd32657de195d1ff10c3dd6c72f1b.yaml index c2a1f4bcde..4219dbe02c 100644 --- a/nuclei-templates/2019/CVE-2019-15831-95fcd32657de195d1ff10c3dd6c72f1b.yaml +++ b/nuclei-templates/2019/CVE-2019-15831-95fcd32657de195d1ff10c3dd6c72f1b.yaml @@ -4,7 +4,7 @@ info: name: > Visitor Traffic Real Time Statistics <= 1.12 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The visitors-traffic-real-time-statistics plugin before 1.12 for WordPress has CSRF in the settings page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/visitors-traffic-real-time-statistics/" google-query: inurl:"/wp-content/plugins/visitors-traffic-real-time-statistics/" shodan-query: 'vuln:CVE-2019-15831' - tags: cve,wordpress,wp-plugin,visitors-traffic-real-time-statistics,high + tags: cve,wordpress,wp-plugin,visitors-traffic-real-time-statistics,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15832-354f6d128f8dd6bd63a76dae47bd8628.yaml b/nuclei-templates/2019/CVE-2019-15832-354f6d128f8dd6bd63a76dae47bd8628.yaml index b1536e9678..197dba8bdc 100644 --- a/nuclei-templates/2019/CVE-2019-15832-354f6d128f8dd6bd63a76dae47bd8628.yaml +++ b/nuclei-templates/2019/CVE-2019-15832-354f6d128f8dd6bd63a76dae47bd8628.yaml @@ -4,7 +4,7 @@ info: name: > Visitor Traffic Real Time Statistics <= 1.13 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The visitors-traffic-real-time-statistics plugin before 1.13 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/visitors-traffic-real-time-statistics/" google-query: inurl:"/wp-content/plugins/visitors-traffic-real-time-statistics/" shodan-query: 'vuln:CVE-2019-15832' - tags: cve,wordpress,wp-plugin,visitors-traffic-real-time-statistics,high + tags: cve,wordpress,wp-plugin,visitors-traffic-real-time-statistics,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15834-52ad3a4045cbc52c94981ea4e45a3cca.yaml b/nuclei-templates/2019/CVE-2019-15834-52ad3a4045cbc52c94981ea4e45a3cca.yaml index ef553f5d53..74a13fb5ec 100644 --- a/nuclei-templates/2019/CVE-2019-15834-52ad3a4045cbc52c94981ea4e45a3cca.yaml +++ b/nuclei-templates/2019/CVE-2019-15834-52ad3a4045cbc52c94981ea4e45a3cca.yaml @@ -4,7 +4,7 @@ info: name: > WebP Converter for Media – Convert WebP and AVIF & Optimize Images <= 1.0.2 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The WebP Converter for Media – Convert WebP and AVIF & Optimize Images plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.2. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to gain otherwise restricted access to administrative actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/webp-converter-for-media/" google-query: inurl:"/wp-content/plugins/webp-converter-for-media/" shodan-query: 'vuln:CVE-2019-15834' - tags: cve,wordpress,wp-plugin,webp-converter-for-media,high + tags: cve,wordpress,wp-plugin,webp-converter-for-media,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15835-1fb46247dc51fca766c3b6cc15fb0753.yaml b/nuclei-templates/2019/CVE-2019-15835-1fb46247dc51fca766c3b6cc15fb0753.yaml index 3486e17a80..7474945dfb 100644 --- a/nuclei-templates/2019/CVE-2019-15835-1fb46247dc51fca766c3b6cc15fb0753.yaml +++ b/nuclei-templates/2019/CVE-2019-15835-1fb46247dc51fca766c3b6cc15fb0753.yaml @@ -4,7 +4,7 @@ info: name: > WP Better Permalinks < 3.0.5 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The wp-better-permalinks plugin before 3.0.5 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-better-permalinks/" google-query: inurl:"/wp-content/plugins/wp-better-permalinks/" shodan-query: 'vuln:CVE-2019-15835' - tags: cve,wordpress,wp-plugin,wp-better-permalinks,high + tags: cve,wordpress,wp-plugin,wp-better-permalinks,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15836-1e6683ba97d940c27fa31053738ff471.yaml b/nuclei-templates/2019/CVE-2019-15836-1e6683ba97d940c27fa31053738ff471.yaml index 5c8afa2daf..8a37345043 100644 --- a/nuclei-templates/2019/CVE-2019-15836-1e6683ba97d940c27fa31053738ff471.yaml +++ b/nuclei-templates/2019/CVE-2019-15836-1e6683ba97d940c27fa31053738ff471.yaml @@ -4,7 +4,7 @@ info: name: > WP Ultimate Recipe < 3.12.7 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-ultimate-recipe plugin before 3.12.7 for WordPress has stored XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-ultimate-recipe/" google-query: inurl:"/wp-content/plugins/wp-ultimate-recipe/" shodan-query: 'vuln:CVE-2019-15836' - tags: cve,wordpress,wp-plugin,wp-ultimate-recipe,medium + tags: cve,wordpress,wp-plugin,wp-ultimate-recipe,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15837-3d333cad26fc8b3d5422c9b862bc540d.yaml b/nuclei-templates/2019/CVE-2019-15837-3d333cad26fc8b3d5422c9b862bc540d.yaml index f6871a2853..13e8514881 100644 --- a/nuclei-templates/2019/CVE-2019-15837-3d333cad26fc8b3d5422c9b862bc540d.yaml +++ b/nuclei-templates/2019/CVE-2019-15837-3d333cad26fc8b3d5422c9b862bc540d.yaml @@ -4,7 +4,7 @@ info: name: > WebP Express <= 0.14.10 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The webp-express plugin before 0.14.8 for WordPress has stored XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/webp-express/" google-query: inurl:"/wp-content/plugins/webp-express/" shodan-query: 'vuln:CVE-2019-15837' - tags: cve,wordpress,wp-plugin,webp-express,medium + tags: cve,wordpress,wp-plugin,webp-express,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15840-d27b9b5016915435f37e3d3e6a022f76.yaml b/nuclei-templates/2019/CVE-2019-15840-d27b9b5016915435f37e3d3e6a022f76.yaml index a9483b091a..3532c88bbd 100644 --- a/nuclei-templates/2019/CVE-2019-15840-d27b9b5016915435f37e3d3e6a022f76.yaml +++ b/nuclei-templates/2019/CVE-2019-15840-d27b9b5016915435f37e3d3e6a022f76.yaml @@ -4,7 +4,7 @@ info: name: > Facebook for WooCommerce <= 1.9.12 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The facebook-for-woocommerce plugin before 1.9.14 for WordPress has CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/facebook-for-woocommerce/" google-query: inurl:"/wp-content/plugins/facebook-for-woocommerce/" shodan-query: 'vuln:CVE-2019-15840' - tags: cve,wordpress,wp-plugin,facebook-for-woocommerce,high + tags: cve,wordpress,wp-plugin,facebook-for-woocommerce,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15841-9534faef8d85288ee99452de6c7c430a.yaml b/nuclei-templates/2019/CVE-2019-15841-9534faef8d85288ee99452de6c7c430a.yaml index 4583cb8874..92df8be34f 100644 --- a/nuclei-templates/2019/CVE-2019-15841-9534faef8d85288ee99452de6c7c430a.yaml +++ b/nuclei-templates/2019/CVE-2019-15841-9534faef8d85288ee99452de6c7c430a.yaml @@ -4,7 +4,7 @@ info: name: > Facebook for WooCommerce <= 1.9.12 - Cross-Site Request Forgery allowing Option Update author: topscoder - severity: high + severity: medium description: > The facebook-for-woocommerce plugin before 1.9.15 for WordPress has CSRF via ajax_woo_infobanner_post_click, ajax_woo_infobanner_post_xout, or ajax_fb_toggle_visibility. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/facebook-for-woocommerce/" google-query: inurl:"/wp-content/plugins/facebook-for-woocommerce/" shodan-query: 'vuln:CVE-2019-15841' - tags: cve,wordpress,wp-plugin,facebook-for-woocommerce,high + tags: cve,wordpress,wp-plugin,facebook-for-woocommerce,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15842-40be5fedd5539e32999075c425fecfed.yaml b/nuclei-templates/2019/CVE-2019-15842-40be5fedd5539e32999075c425fecfed.yaml index 20d797881f..919014ec09 100644 --- a/nuclei-templates/2019/CVE-2019-15842-40be5fedd5539e32999075c425fecfed.yaml +++ b/nuclei-templates/2019/CVE-2019-15842-40be5fedd5539e32999075c425fecfed.yaml @@ -4,7 +4,7 @@ info: name: > Easy restaurant menu manager <= 1.1.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Easy restaurant menu manager plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-pdf-restaurant-menu-upload/" google-query: inurl:"/wp-content/plugins/easy-pdf-restaurant-menu-upload/" shodan-query: 'vuln:CVE-2019-15842' - tags: cve,wordpress,wp-plugin,easy-pdf-restaurant-menu-upload,medium + tags: cve,wordpress,wp-plugin,easy-pdf-restaurant-menu-upload,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15864-d4f39f41edde6809c1e3f1995c35c774.yaml b/nuclei-templates/2019/CVE-2019-15864-d4f39f41edde6809c1e3f1995c35c774.yaml index cea7fc47d0..8e7029a9aa 100644 --- a/nuclei-templates/2019/CVE-2019-15864-d4f39f41edde6809c1e3f1995c35c774.yaml +++ b/nuclei-templates/2019/CVE-2019-15864-d4f39f41edde6809c1e3f1995c35c774.yaml @@ -4,7 +4,7 @@ info: name: > Breadcrumbs by menu < 1.0.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The breadcrumbs-by-menu plugin before 1.0.3 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/breadcrumbs-by-menu/" google-query: inurl:"/wp-content/plugins/breadcrumbs-by-menu/" shodan-query: 'vuln:CVE-2019-15864' - tags: cve,wordpress,wp-plugin,breadcrumbs-by-menu,medium + tags: cve,wordpress,wp-plugin,breadcrumbs-by-menu,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15865-49ba2e496df198082592a83af2dd4d61.yaml b/nuclei-templates/2019/CVE-2019-15865-49ba2e496df198082592a83af2dd4d61.yaml index acf4b780ff..75902a1f34 100644 --- a/nuclei-templates/2019/CVE-2019-15865-49ba2e496df198082592a83af2dd4d61.yaml +++ b/nuclei-templates/2019/CVE-2019-15865-49ba2e496df198082592a83af2dd4d61.yaml @@ -4,7 +4,7 @@ info: name: > Breadcrumbs by menu <= 1.0.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Breadcrumbs by menu plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.1. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to gain otherwise restricted access to administrative actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/breadcrumbs-by-menu/" google-query: inurl:"/wp-content/plugins/breadcrumbs-by-menu/" shodan-query: 'vuln:CVE-2019-15865' - tags: cve,wordpress,wp-plugin,breadcrumbs-by-menu,high + tags: cve,wordpress,wp-plugin,breadcrumbs-by-menu,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15866-11611891705bb620b2fbc93feb153c11.yaml b/nuclei-templates/2019/CVE-2019-15866-11611891705bb620b2fbc93feb153c11.yaml index d4a0c611cd..038f7ffae8 100644 --- a/nuclei-templates/2019/CVE-2019-15866-11611891705bb620b2fbc93feb153c11.yaml +++ b/nuclei-templates/2019/CVE-2019-15866-11611891705bb620b2fbc93feb153c11.yaml @@ -4,7 +4,7 @@ info: name: > Crelly Slider <= 1.3.4 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > The crelly-slider plugin before 1.3.5 for WordPress has arbitrary file upload via a PHP file inside a ZIP archive to wp_ajax_crellyslider_importSlider. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/crelly-slider/" google-query: inurl:"/wp-content/plugins/crelly-slider/" shodan-query: 'vuln:CVE-2019-15866' - tags: cve,wordpress,wp-plugin,crelly-slider,high + tags: cve,wordpress,wp-plugin,crelly-slider,critical http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15868-5c818a45f2a9dcd466f195a8752dd840.yaml b/nuclei-templates/2019/CVE-2019-15868-5c818a45f2a9dcd466f195a8752dd840.yaml index 9cdc59f748..b9f00a131b 100644 --- a/nuclei-templates/2019/CVE-2019-15868-5c818a45f2a9dcd466f195a8752dd840.yaml +++ b/nuclei-templates/2019/CVE-2019-15868-5c818a45f2a9dcd466f195a8752dd840.yaml @@ -4,7 +4,7 @@ info: name: > Affiliates Manager <= 2.6.5 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Affiliates Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions before 2.6.6. This makes it possible for unauthenticated attackers to perform unspecified modifications to the plugin settings granted they can trick a site administrator into performing an action such as clicking on a link. The impact of this vulnerability is unknown. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/affiliates-manager/" google-query: inurl:"/wp-content/plugins/affiliates-manager/" shodan-query: 'vuln:CVE-2019-15868' - tags: cve,wordpress,wp-plugin,affiliates-manager,high + tags: cve,wordpress,wp-plugin,affiliates-manager,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15869-b9eb31c713b27c04fd47230e22de33c0.yaml b/nuclei-templates/2019/CVE-2019-15869-b9eb31c713b27c04fd47230e22de33c0.yaml index c6351d8984..b303ebacab 100644 --- a/nuclei-templates/2019/CVE-2019-15869-b9eb31c713b27c04fd47230e22de33c0.yaml +++ b/nuclei-templates/2019/CVE-2019-15869-b9eb31c713b27c04fd47230e22de33c0.yaml @@ -4,7 +4,7 @@ info: name: > JobCareer | Job Board Responsive WordPress Theme <= 2.5.1 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The JobCareer theme before 2.5.1 for WordPress has stored XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/jobcareer/" google-query: inurl:"/wp-content/plugins/jobcareer/" shodan-query: 'vuln:CVE-2019-15869' - tags: cve,wordpress,wp-plugin,jobcareer,medium + tags: cve,wordpress,wp-plugin,jobcareer,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15870-67f647f4edf0dc956943ef2a579b4258.yaml b/nuclei-templates/2019/CVE-2019-15870-67f647f4edf0dc956943ef2a579b4258.yaml index 1c2c3aa23d..9fd838aa95 100644 --- a/nuclei-templates/2019/CVE-2019-15870-67f647f4edf0dc956943ef2a579b4258.yaml +++ b/nuclei-templates/2019/CVE-2019-15870-67f647f4edf0dc956943ef2a579b4258.yaml @@ -4,7 +4,7 @@ info: name: > CarSpot – Dealership Wordpress Classified Theme < 2.1.7 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The CarSpot theme before 2.1.7 for WordPress has stored XSS via the Phone Number field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/carspot/" google-query: inurl:"/wp-content/themes/carspot/" shodan-query: 'vuln:CVE-2019-15870' - tags: cve,wordpress,wp-theme,carspot,medium + tags: cve,wordpress,wp-theme,carspot,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15872-9e304c0c2d27a9a5e4112a85cbe97828.yaml b/nuclei-templates/2019/CVE-2019-15872-9e304c0c2d27a9a5e4112a85cbe97828.yaml index 272ab5a182..dbb56136dd 100644 --- a/nuclei-templates/2019/CVE-2019-15872-9e304c0c2d27a9a5e4112a85cbe97828.yaml +++ b/nuclei-templates/2019/CVE-2019-15872-9e304c0c2d27a9a5e4112a85cbe97828.yaml @@ -4,7 +4,7 @@ info: name: > LoginPress <= 1.1.15 - Authenticated SQL Injection via Settings Import author: topscoder - severity: high + severity: low description: > The LoginPress plugin for WordPress is vulnerable to blind SQL Injection via Settings Import in versions up to, and including, 1.1.15 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/loginpress/" google-query: inurl:"/wp-content/plugins/loginpress/" shodan-query: 'vuln:CVE-2019-15872' - tags: cve,wordpress,wp-plugin,loginpress,high + tags: cve,wordpress,wp-plugin,loginpress,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15873-7bf1226ebc8c449ae85cc65e327ee63d.yaml b/nuclei-templates/2019/CVE-2019-15873-7bf1226ebc8c449ae85cc65e327ee63d.yaml index 4ffd7ddb68..f9d7d8ceec 100644 --- a/nuclei-templates/2019/CVE-2019-15873-7bf1226ebc8c449ae85cc65e327ee63d.yaml +++ b/nuclei-templates/2019/CVE-2019-15873-7bf1226ebc8c449ae85cc65e327ee63d.yaml @@ -4,7 +4,7 @@ info: name: > ProfileGrid – User Profiles, Memberships, Groups and Communities < 2.8.6 - Remote Code Execution author: topscoder - severity: high + severity: critical description: > The profilegrid-user-profiles-groups-and-communities plugin before 2.8.6 for WordPress has remote code execution via an wp-admin/admin-ajax.php request with the action=pm_template_preview&html= WordPress Download Manager <= 2.9.93 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The WordPress Download Manager plugin before 2.9.94 for WordPress has XSS via the category shortcode feature, as demonstrated by the orderby or search[publish_date] parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/download-manager/" google-query: inurl:"/wp-content/plugins/download-manager/" shodan-query: 'vuln:CVE-2019-15889' - tags: cve,wordpress,wp-plugin,download-manager,medium + tags: cve,wordpress,wp-plugin,download-manager,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-15896-164e2c0c315709a0cb3bf1d13c08e3b1.yaml b/nuclei-templates/2019/CVE-2019-15896-164e2c0c315709a0cb3bf1d13c08e3b1.yaml index 644da67616..d84eb44d3e 100644 --- a/nuclei-templates/2019/CVE-2019-15896-164e2c0c315709a0cb3bf1d13c08e3b1.yaml +++ b/nuclei-templates/2019/CVE-2019-15896-164e2c0c315709a0cb3bf1d13c08e3b1.yaml @@ -4,7 +4,7 @@ info: name: > LMS by LifterLMS <= 3.35.0 - Stored Cross-Site Scripting via Import author: topscoder - severity: critical + severity: high description: > An issue was discovered in the LifterLMS plugin through 3.34.5 for WordPress. The upload_import function in the class.llms.admin.import.php script is prone to an unauthenticated options import vulnerability that could lead to privilege escalation (administrator account creation), website redirection, and stored XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/lifterlms/" google-query: inurl:"/wp-content/plugins/lifterlms/" shodan-query: 'vuln:CVE-2019-15896' - tags: cve,wordpress,wp-plugin,lifterlms,critical + tags: cve,wordpress,wp-plugin,lifterlms,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-16117-1cfd262b55edc365cf2f57c5e6d1da2e.yaml b/nuclei-templates/2019/CVE-2019-16117-1cfd262b55edc365cf2f57c5e6d1da2e.yaml index ad425bdd02..2284ab6584 100644 --- a/nuclei-templates/2019/CVE-2019-16117-1cfd262b55edc365cf2f57c5e6d1da2e.yaml +++ b/nuclei-templates/2019/CVE-2019-16117-1cfd262b55edc365cf2f57c5e6d1da2e.yaml @@ -4,7 +4,7 @@ info: name: > Photo Gallery by 10Web <= 1.5.34 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross site scripting (XSS) in the photo-gallery (10Web Photo Gallery) plugin before 1.5.35 for WordPress exists via admin/models/Galleries.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/photo-gallery/" google-query: inurl:"/wp-content/plugins/photo-gallery/" shodan-query: 'vuln:CVE-2019-16117' - tags: cve,wordpress,wp-plugin,photo-gallery,medium + tags: cve,wordpress,wp-plugin,photo-gallery,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-16118-4ee123ab64de9526a768d6e54f2c4b2d.yaml b/nuclei-templates/2019/CVE-2019-16118-4ee123ab64de9526a768d6e54f2c4b2d.yaml index fc84469533..30fa7252b7 100644 --- a/nuclei-templates/2019/CVE-2019-16118-4ee123ab64de9526a768d6e54f2c4b2d.yaml +++ b/nuclei-templates/2019/CVE-2019-16118-4ee123ab64de9526a768d6e54f2c4b2d.yaml @@ -4,7 +4,7 @@ info: name: > Photo Gallery by 10Web <= 1.5.34 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross site scripting (XSS) in the photo-gallery (10Web Photo Gallery) plugin before 1.5.35 for WordPress exists via admin/controllers/Options.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/photo-gallery/" google-query: inurl:"/wp-content/plugins/photo-gallery/" shodan-query: 'vuln:CVE-2019-16118' - tags: cve,wordpress,wp-plugin,photo-gallery,medium + tags: cve,wordpress,wp-plugin,photo-gallery,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-16217-46c3b494b5cc3ea133b4b6c9ec9dce06.yaml b/nuclei-templates/2019/CVE-2019-16217-46c3b494b5cc3ea133b4b6c9ec9dce06.yaml index 94a8738643..9d94c7c8d5 100644 --- a/nuclei-templates/2019/CVE-2019-16217-46c3b494b5cc3ea133b4b6c9ec9dce06.yaml +++ b/nuclei-templates/2019/CVE-2019-16217-46c3b494b5cc3ea133b4b6c9ec9dce06.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.2.3 - Cross-Site Scripting via Media Uploads author: topscoder - severity: medium + severity: high description: > WordPress before 5.2.3 allows XSS in media uploads because wp_ajax_upload_attachment is mishandled. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2019-16217 metadata: shodan-query: 'vuln:CVE-2019-16217' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-16222-77ce3568929dc53b56e0c4f8840c178b.yaml b/nuclei-templates/2019/CVE-2019-16222-77ce3568929dc53b56e0c4f8840c178b.yaml index bae578a3e6..e5e8d57d59 100644 --- a/nuclei-templates/2019/CVE-2019-16222-77ce3568929dc53b56e0c4f8840c178b.yaml +++ b/nuclei-templates/2019/CVE-2019-16222-77ce3568929dc53b56e0c4f8840c178b.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.2.3 - Stored Cross-Site Scripting via Comments via URLs author: topscoder - severity: medium + severity: high description: > WordPress before 5.2.3 has an issue with URL sanitization in wp_kses_bad_protocol_once in wp-includes/kses.php that can lead to cross-site scripting (XSS) attacks. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2019-16222 metadata: shodan-query: 'vuln:CVE-2019-16222' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-16223-85dfbc95d4932a9f83bfee5a6b2585d0.yaml b/nuclei-templates/2019/CVE-2019-16223-85dfbc95d4932a9f83bfee5a6b2585d0.yaml index b6b566571d..700f42a561 100644 --- a/nuclei-templates/2019/CVE-2019-16223-85dfbc95d4932a9f83bfee5a6b2585d0.yaml +++ b/nuclei-templates/2019/CVE-2019-16223-85dfbc95d4932a9f83bfee5a6b2585d0.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.2.3 - Authenticated Cross-Site Scripting via Post Previews author: topscoder - severity: medium + severity: low description: > WordPress before 5.2.3 allows XSS in post previews by authenticated users. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2019-16223 metadata: shodan-query: 'vuln:CVE-2019-16223' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-16251-e1335c6f9c71ba603c44dff8a99e9a32.yaml b/nuclei-templates/2019/CVE-2019-16251-e1335c6f9c71ba603c44dff8a99e9a32.yaml index be20aca7e8..94125c6600 100644 --- a/nuclei-templates/2019/CVE-2019-16251-e1335c6f9c71ba603c44dff8a99e9a32.yaml +++ b/nuclei-templates/2019/CVE-2019-16251-e1335c6f9c71ba603c44dff8a99e9a32.yaml @@ -4,7 +4,7 @@ info: name: > YIT Plugin Framework <= 3.3.8 - Authenticated Settings Change author: topscoder - severity: medium + severity: low description: > Various versions of a various YITH WooCommerce plugins that use the YIT Plugin Framework through 3.3.8 are vulnerable to authorization bypass due to a missing capability check in the the 'save_toggle_element_options' function in .plugin-fw/lib/yit-plugin-panel-wc.php. This allows authenticated users with subscriber-level permissions or above to change arbitrary plugin settings. reference: @@ -14,17 +14,17 @@ info: cvss-score: 4.3 cve-id: CVE-2019-16251 metadata: - fofa-query: "wp-content/plugins/yith-woocommerce-bulk-product-editing/" - google-query: inurl:"/wp-content/plugins/yith-woocommerce-bulk-product-editing/" + fofa-query: "wp-content/plugins/yith-woocommerce-social-login/" + google-query: inurl:"/wp-content/plugins/yith-woocommerce-social-login/" shodan-query: 'vuln:CVE-2019-16251' - tags: cve,wordpress,wp-plugin,yith-woocommerce-bulk-product-editing,medium + tags: cve,wordpress,wp-plugin,yith-woocommerce-social-login,low http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-bulk-product-editing/readme.txt" + - "{{BaseURL}}/wp-content/plugins/yith-woocommerce-social-login/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "yith-woocommerce-bulk-product-editing" + - "yith-woocommerce-social-login" part: body - type: dsl dsl: - - compare_versions(version, '<= 1.2.13') \ No newline at end of file + - compare_versions(version, '<= 1.3.4') \ No newline at end of file diff --git a/nuclei-templates/2019/CVE-2019-16289-c3c6968289de386f0f53996017935a1d.yaml b/nuclei-templates/2019/CVE-2019-16289-c3c6968289de386f0f53996017935a1d.yaml index 3088c9b34e..b41389f5c4 100644 --- a/nuclei-templates/2019/CVE-2019-16289-c3c6968289de386f0f53996017935a1d.yaml +++ b/nuclei-templates/2019/CVE-2019-16289-c3c6968289de386f0f53996017935a1d.yaml @@ -4,7 +4,7 @@ info: name: > Woody Ad Snippets <= 2.2.8 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The insert-php (aka Woody ad snippets) plugin before 2.2.9 for WordPress allows authenticated XSS via the winp_item parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/insert-php/" google-query: inurl:"/wp-content/plugins/insert-php/" shodan-query: 'vuln:CVE-2019-16289' - tags: cve,wordpress,wp-plugin,insert-php,medium + tags: cve,wordpress,wp-plugin,insert-php,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-16332-fee563db4bd1e05c4270644fa9c809a1.yaml b/nuclei-templates/2019/CVE-2019-16332-fee563db4bd1e05c4270644fa9c809a1.yaml index 858ccfcaf4..f38b6a7da4 100644 --- a/nuclei-templates/2019/CVE-2019-16332-fee563db4bd1e05c4270644fa9c809a1.yaml +++ b/nuclei-templates/2019/CVE-2019-16332-fee563db4bd1e05c4270644fa9c809a1.yaml @@ -4,7 +4,7 @@ info: name: > API Bearer Auth < 20190907 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > In the api-bearer-auth plugin before 20190907 for WordPress, the server parameter is not correctly filtered in the swagger-config.yaml.php file, and it is possible to inject JavaScript code, aka XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/api-bearer-auth/" google-query: inurl:"/wp-content/plugins/api-bearer-auth/" shodan-query: 'vuln:CVE-2019-16332' - tags: cve,wordpress,wp-plugin,api-bearer-auth,medium + tags: cve,wordpress,wp-plugin,api-bearer-auth,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-16520-d9419931966f7a4ced3c49a3cc9a6932.yaml b/nuclei-templates/2019/CVE-2019-16520-d9419931966f7a4ced3c49a3cc9a6932.yaml index 164ec1ea96..2741ab4eba 100644 --- a/nuclei-templates/2019/CVE-2019-16520-d9419931966f7a4ced3c49a3cc9a6932.yaml +++ b/nuclei-templates/2019/CVE-2019-16520-d9419931966f7a4ced3c49a3cc9a6932.yaml @@ -4,7 +4,7 @@ info: name: > All In One SEO Pack <= 3.2.6 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The all-in-one-seo-pack plugin before 3.2.7 for WordPress (aka All in One SEO Pack) is susceptible to Stored XSS due to improper encoding of the SEO-specific description for posts provided by the plugin via unsafe placeholder replacement. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/all-in-one-seo-pack/" google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" shodan-query: 'vuln:CVE-2019-16520' - tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,medium + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-16522-0598f02cdb42ad5878825a4305d0cd60.yaml b/nuclei-templates/2019/CVE-2019-16522-0598f02cdb42ad5878825a4305d0cd60.yaml index ea2eac13f7..661f4e4216 100644 --- a/nuclei-templates/2019/CVE-2019-16522-0598f02cdb42ad5878825a4305d0cd60.yaml +++ b/nuclei-templates/2019/CVE-2019-16522-0598f02cdb42ad5878825a4305d0cd60.yaml @@ -4,7 +4,7 @@ info: name: > EU Cookie Law <= 3.1.2 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The eu-cookie-law plugin through 3.0.6 for WordPress (aka EU Cookie Law (GDPR)) is susceptible to Stored XSS due to improper encoding of several configuration options in the admin area and the displayed cookie consent message. This affects Font Color, Background Color, and the Disable Cookie text. An attacker with high privileges can attack other users. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/eu-cookie-law/" google-query: inurl:"/wp-content/plugins/eu-cookie-law/" shodan-query: 'vuln:CVE-2019-16522' - tags: cve,wordpress,wp-plugin,eu-cookie-law,medium + tags: cve,wordpress,wp-plugin,eu-cookie-law,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-16523-9691566897b1cf3f102fa4ca66fa2b90.yaml b/nuclei-templates/2019/CVE-2019-16523-9691566897b1cf3f102fa4ca66fa2b90.yaml index 487eaca256..8a65c44e3c 100644 --- a/nuclei-templates/2019/CVE-2019-16523-9691566897b1cf3f102fa4ca66fa2b90.yaml +++ b/nuclei-templates/2019/CVE-2019-16523-9691566897b1cf3f102fa4ca66fa2b90.yaml @@ -4,7 +4,7 @@ info: name: > Events Manager <= 5.9.5 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The events-manager plugin through 5.9.5 for WordPress (aka Events Manager) is susceptible to Stored XSS due to improper encoding and insertion of data provided to the attribute map_style of shortcodes (locations_map and events_map) provided by the plugin. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/events-manager/" google-query: inurl:"/wp-content/plugins/events-manager/" shodan-query: 'vuln:CVE-2019-16523' - tags: cve,wordpress,wp-plugin,events-manager,medium + tags: cve,wordpress,wp-plugin,events-manager,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-16524-192f3751511f8b242f0945f1aac116aa.yaml b/nuclei-templates/2019/CVE-2019-16524-192f3751511f8b242f0945f1aac116aa.yaml index 8ac6701053..9b5f0d512d 100644 --- a/nuclei-templates/2019/CVE-2019-16524-192f3751511f8b242f0945f1aac116aa.yaml +++ b/nuclei-templates/2019/CVE-2019-16524-192f3751511f8b242f0945f1aac116aa.yaml @@ -4,7 +4,7 @@ info: name: > Easy Fancybox <= 1.8.17 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The easy-fancybox plugin before 1.8.18 for WordPress (aka Easy FancyBox) is susceptible to Stored XSS in the Settings Menu inc/class-easyfancybox.php due to improper encoding of arbitrarily submitted settings parameters. This occurs because there is no inline styles output filter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-fancybox/" google-query: inurl:"/wp-content/plugins/easy-fancybox/" shodan-query: 'vuln:CVE-2019-16524' - tags: cve,wordpress,wp-plugin,easy-fancybox,medium + tags: cve,wordpress,wp-plugin,easy-fancybox,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-16525-d4f973711f83e484b1ab150d8a07fcda.yaml b/nuclei-templates/2019/CVE-2019-16525-d4f973711f83e484b1ab150d8a07fcda.yaml index 11207f49f4..e93eb30882 100644 --- a/nuclei-templates/2019/CVE-2019-16525-d4f973711f83e484b1ab150d8a07fcda.yaml +++ b/nuclei-templates/2019/CVE-2019-16525-d4f973711f83e484b1ab150d8a07fcda.yaml @@ -4,7 +4,7 @@ info: name: > Checklist <= 1.1.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An XSS issue was discovered in the checklist plugin before 1.1.9 for WordPress. The fill parameter is not correctly filtered in the checklist-icon.php file, and it is possible to inject JavaScript code. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/checklist/" google-query: inurl:"/wp-content/plugins/checklist/" shodan-query: 'vuln:CVE-2019-16525' - tags: cve,wordpress,wp-plugin,checklist,medium + tags: cve,wordpress,wp-plugin,checklist,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-16780-628434356b9e4de217bb4ae54139a78f.yaml b/nuclei-templates/2019/CVE-2019-16780-628434356b9e4de217bb4ae54139a78f.yaml index b86fe96d16..7a283231d3 100644 --- a/nuclei-templates/2019/CVE-2019-16780-628434356b9e4de217bb4ae54139a78f.yaml +++ b/nuclei-templates/2019/CVE-2019-16780-628434356b9e4de217bb4ae54139a78f.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.3.1 - Stored Cross-Site Scripting via Block Editor author: topscoder - severity: medium + severity: high description: > WordPress users with lower privileges (like contributors) can inject JavaScript code in the block editor using a specific payload, which is executed within the dashboard. This can lead to XSS if an admin opens the post in the editor. Execution of this attack does require an authenticated user. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release. Automatic updates are enabled by default for minor releases and we strongly recommend that you keep them enabled. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2019-16780 metadata: shodan-query: 'vuln:CVE-2019-16780' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-16781-ff109dde1d54495dd369e80dd2dbfb9f.yaml b/nuclei-templates/2019/CVE-2019-16781-ff109dde1d54495dd369e80dd2dbfb9f.yaml index 24fec89b11..5ed0fef17a 100644 --- a/nuclei-templates/2019/CVE-2019-16781-ff109dde1d54495dd369e80dd2dbfb9f.yaml +++ b/nuclei-templates/2019/CVE-2019-16781-ff109dde1d54495dd369e80dd2dbfb9f.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.3.1 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > In WordPress before 5.3.1, authenticated users with lower privileges (like contributors) can inject JavaScript code in the block editor, which is executed within the dashboard. It can lead to an admin opening the affected post in the editor leading to XSS. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2019-16781 metadata: shodan-query: 'vuln:CVE-2019-16781' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-16931-9153236cbe43b83fd86d1f43d04bc623.yaml b/nuclei-templates/2019/CVE-2019-16931-9153236cbe43b83fd86d1f43d04bc623.yaml index 64dd76d3db..5a1dde1838 100644 --- a/nuclei-templates/2019/CVE-2019-16931-9153236cbe43b83fd86d1f43d04bc623.yaml +++ b/nuclei-templates/2019/CVE-2019-16931-9153236cbe43b83fd86d1f43d04bc623.yaml @@ -4,7 +4,7 @@ info: name: > Visualizer: Tables and Charts Manager for WordPress <= 3.3.0 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > A stored XSS vulnerability in the Visualizer plugin 3.3.0 for WordPress allows an unauthenticated attacker to execute arbitrary JavaScript when an admin or other privileged user edits the chart via the admin dashboard. This occurs because classes/Visualizer/Gutenberg/Block.php registers wp-json/visualizer/v1/update-chart with no access control, and classes/Visualizer/Render/Page/Data.php lacks output sanitization. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/visualizer/" google-query: inurl:"/wp-content/plugins/visualizer/" shodan-query: 'vuln:CVE-2019-16931' - tags: cve,wordpress,wp-plugin,visualizer,medium + tags: cve,wordpress,wp-plugin,visualizer,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-17070-2fc40f0eebe24b9548355cb63270c890.yaml b/nuclei-templates/2019/CVE-2019-17070-2fc40f0eebe24b9548355cb63270c890.yaml index cf9404a1c1..20ab563d61 100644 --- a/nuclei-templates/2019/CVE-2019-17070-2fc40f0eebe24b9548355cb63270c890.yaml +++ b/nuclei-templates/2019/CVE-2019-17070-2fc40f0eebe24b9548355cb63270c890.yaml @@ -4,7 +4,7 @@ info: name: > LIQUID SPEECH BALLOON < 1.0.7 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The liquid-speech-balloon (aka LIQUID SPEECH BALLOON) plugin before 1.0.7 for WordPress allows XSS with Internet Explorer. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/liquid-speech-balloon/" google-query: inurl:"/wp-content/plugins/liquid-speech-balloon/" shodan-query: 'vuln:CVE-2019-17070' - tags: cve,wordpress,wp-plugin,liquid-speech-balloon,medium + tags: cve,wordpress,wp-plugin,liquid-speech-balloon,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-17071-1ed96ac73f1ecde8fe792ec7cdde085c.yaml b/nuclei-templates/2019/CVE-2019-17071-1ed96ac73f1ecde8fe792ec7cdde085c.yaml index 2c8e4cc010..410d06e353 100644 --- a/nuclei-templates/2019/CVE-2019-17071-1ed96ac73f1ecde8fe792ec7cdde085c.yaml +++ b/nuclei-templates/2019/CVE-2019-17071-1ed96ac73f1ecde8fe792ec7cdde085c.yaml @@ -4,7 +4,7 @@ info: name: > Client Dash <= 2.2.0 - Authenticated (Admin+) Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Client Dash plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 2.2.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrator permissions to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/client-dash/" google-query: inurl:"/wp-content/plugins/client-dash/" shodan-query: 'vuln:CVE-2019-17071' - tags: cve,wordpress,wp-plugin,client-dash,medium + tags: cve,wordpress,wp-plugin,client-dash,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-17213-01553cdc4d088a5ffa18c2b6b9ad5640.yaml b/nuclei-templates/2019/CVE-2019-17213-01553cdc4d088a5ffa18c2b6b9ad5640.yaml index c055f0824b..cce7e92ef8 100644 --- a/nuclei-templates/2019/CVE-2019-17213-01553cdc4d088a5ffa18c2b6b9ad5640.yaml +++ b/nuclei-templates/2019/CVE-2019-17213-01553cdc4d088a5ffa18c2b6b9ad5640.yaml @@ -4,7 +4,7 @@ info: name: > WebARX <= 1.3.0 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The WebARX plugin 1.3.0 for WordPress has unauthenticated stored XSS via the URI or the X-Forwarded-For HTTP header. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/webarx/" google-query: inurl:"/wp-content/plugins/webarx/" shodan-query: 'vuln:CVE-2019-17213' - tags: cve,wordpress,wp-plugin,webarx,medium + tags: cve,wordpress,wp-plugin,webarx,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-17229-8395989e9f463aede02be6293faac97f.yaml b/nuclei-templates/2019/CVE-2019-17229-8395989e9f463aede02be6293faac97f.yaml index a22ab40451..8029fe701c 100644 --- a/nuclei-templates/2019/CVE-2019-17229-8395989e9f463aede02be6293faac97f.yaml +++ b/nuclei-templates/2019/CVE-2019-17229-8395989e9f463aede02be6293faac97f.yaml @@ -4,7 +4,7 @@ info: name: > Motors – Car Dealer, Classifieds & Listing <= 1.4.0 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > includes/options.php in the motors-car-dealership-classified-listings (aka Motors - Car Dealer & Classified Ads) plugin through 1.4.0 for WordPress has multiple stored XSS issues. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/motors-car-dealership-classified-listings/" google-query: inurl:"/wp-content/plugins/motors-car-dealership-classified-listings/" shodan-query: 'vuln:CVE-2019-17229' - tags: cve,wordpress,wp-plugin,motors-car-dealership-classified-listings,medium + tags: cve,wordpress,wp-plugin,motors-car-dealership-classified-listings,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-17230-95f9bc03677a083bf89832ea0c794033.yaml b/nuclei-templates/2019/CVE-2019-17230-95f9bc03677a083bf89832ea0c794033.yaml index 15158b4ed1..f8e6b25c4c 100644 --- a/nuclei-templates/2019/CVE-2019-17230-95f9bc03677a083bf89832ea0c794033.yaml +++ b/nuclei-templates/2019/CVE-2019-17230-95f9bc03677a083bf89832ea0c794033.yaml @@ -14,17 +14,17 @@ info: cvss-score: 9.8 cve-id: CVE-2019-17230 metadata: - fofa-query: "wp-content/themes/onetone/" - google-query: inurl:"/wp-content/themes/onetone/" + fofa-query: "wp-content/plugins/onetone-companion/" + google-query: inurl:"/wp-content/plugins/onetone-companion/" shodan-query: 'vuln:CVE-2019-17230' - tags: cve,wordpress,wp-theme,onetone,critical + tags: cve,wordpress,wp-plugin,onetone-companion,critical http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/themes/onetone/style.css" + - "{{BaseURL}}/wp-content/plugins/onetone-companion/readme.txt" extractors: - type: regex @@ -33,14 +33,14 @@ http: group: 1 internal: true regex: - - "(?mi)Version: ([0-9.]+)" + - "(?mi)Stable tag: ([0-9.]+)" - type: regex name: version part: body group: 1 regex: - - "(?mi)Version: ([0-9.]+)" + - "(?mi)Stable tag: ([0-9.]+)" matchers-condition: and matchers: @@ -50,9 +50,9 @@ http: - type: word words: - - "onetone" + - "onetone-companion" part: body - type: dsl dsl: - - compare_versions(version, '<= 3.0.6') \ No newline at end of file + - compare_versions(version, '<= 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/2019/CVE-2019-17231-161c93480bad1a6fddf7935d08286cca.yaml b/nuclei-templates/2019/CVE-2019-17231-161c93480bad1a6fddf7935d08286cca.yaml index f147192bde..3e61d6f4e5 100644 --- a/nuclei-templates/2019/CVE-2019-17231-161c93480bad1a6fddf7935d08286cca.yaml +++ b/nuclei-templates/2019/CVE-2019-17231-161c93480bad1a6fddf7935d08286cca.yaml @@ -14,17 +14,17 @@ info: cvss-score: 7.2 cve-id: CVE-2019-17231 metadata: - fofa-query: "wp-content/themes/onetone/" - google-query: inurl:"/wp-content/themes/onetone/" + fofa-query: "wp-content/plugins/onetone-companion/" + google-query: inurl:"/wp-content/plugins/onetone-companion/" shodan-query: 'vuln:CVE-2019-17231' - tags: cve,wordpress,wp-theme,onetone,high + tags: cve,wordpress,wp-plugin,onetone-companion,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/themes/onetone/style.css" + - "{{BaseURL}}/wp-content/plugins/onetone-companion/readme.txt" extractors: - type: regex @@ -33,14 +33,14 @@ http: group: 1 internal: true regex: - - "(?mi)Version: ([0-9.]+)" + - "(?mi)Stable tag: ([0-9.]+)" - type: regex name: version part: body group: 1 regex: - - "(?mi)Version: ([0-9.]+)" + - "(?mi)Stable tag: ([0-9.]+)" matchers-condition: and matchers: @@ -50,9 +50,9 @@ http: - type: word words: - - "onetone" + - "onetone-companion" part: body - type: dsl dsl: - - compare_versions(version, '<= 3.0.6') \ No newline at end of file + - compare_versions(version, '<= 1.1.1') \ No newline at end of file diff --git a/nuclei-templates/2019/CVE-2019-17233-91fd3dac9c4d5ede970602c4fc325980.yaml b/nuclei-templates/2019/CVE-2019-17233-91fd3dac9c4d5ede970602c4fc325980.yaml index bfb0ab73bb..ac08ce770a 100644 --- a/nuclei-templates/2019/CVE-2019-17233-91fd3dac9c4d5ede970602c4fc325980.yaml +++ b/nuclei-templates/2019/CVE-2019-17233-91fd3dac9c4d5ede970602c4fc325980.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate FAQ <= 1.8.24 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Functions/EWD_UFAQ_Import.php in the ultimate-faqs plugin through 1.8.24 for WordPress allows HTML content injection. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-faqs/" google-query: inurl:"/wp-content/plugins/ultimate-faqs/" shodan-query: 'vuln:CVE-2019-17233' - tags: cve,wordpress,wp-plugin,ultimate-faqs,medium + tags: cve,wordpress,wp-plugin,ultimate-faqs,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-17236-2d2ac3176c43972722599e2c20bf65f9.yaml b/nuclei-templates/2019/CVE-2019-17236-2d2ac3176c43972722599e2c20bf65f9.yaml index 19c67d32ca..66eeb8381b 100644 --- a/nuclei-templates/2019/CVE-2019-17236-2d2ac3176c43972722599e2c20bf65f9.yaml +++ b/nuclei-templates/2019/CVE-2019-17236-2d2ac3176c43972722599e2c20bf65f9.yaml @@ -4,7 +4,7 @@ info: name: > IgniteUp – Coming Soon and Maintenance Mode <= 3.4 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > includes/class-coming-soon-creator.php in the igniteup plugin through 3.4 for WordPress is vulnerable to stored XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/igniteup/" google-query: inurl:"/wp-content/plugins/igniteup/" shodan-query: 'vuln:CVE-2019-17236' - tags: cve,wordpress,wp-plugin,igniteup,medium + tags: cve,wordpress,wp-plugin,igniteup,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-17237-97d25b3e88007081f13d8a53fc8698cf.yaml b/nuclei-templates/2019/CVE-2019-17237-97d25b3e88007081f13d8a53fc8698cf.yaml index a4082c8338..4c9f1adc14 100644 --- a/nuclei-templates/2019/CVE-2019-17237-97d25b3e88007081f13d8a53fc8698cf.yaml +++ b/nuclei-templates/2019/CVE-2019-17237-97d25b3e88007081f13d8a53fc8698cf.yaml @@ -4,7 +4,7 @@ info: name: > IgniteUp – Coming Soon and Maintenance Mode <= 3.4.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > includes/class-coming-soon-creator.php in the igniteup plugin through 3.4 for WordPress allows CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/igniteup/" google-query: inurl:"/wp-content/plugins/igniteup/" shodan-query: 'vuln:CVE-2019-17237' - tags: cve,wordpress,wp-plugin,igniteup,high + tags: cve,wordpress,wp-plugin,igniteup,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-17239-5c3c1a4d657c9a945c9b03f1e7ed6d15.yaml b/nuclei-templates/2019/CVE-2019-17239-5c3c1a4d657c9a945c9b03f1e7ed6d15.yaml index c6897a4f8b..be793e2d23 100644 --- a/nuclei-templates/2019/CVE-2019-17239-5c3c1a4d657c9a945c9b03f1e7ed6d15.yaml +++ b/nuclei-templates/2019/CVE-2019-17239-5c3c1a4d657c9a945c9b03f1e7ed6d15.yaml @@ -4,7 +4,7 @@ info: name: > Download Plugins and Themes from Dashboard <= 1.5.0 - Unauthenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > includes/settings/class-alg-download-plugins-settings.php in the download-plugins-dashboard plugin through 1.5.0 for WordPress has multiple unauthenticated stored XSS issues. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/download-plugins-dashboard/" google-query: inurl:"/wp-content/plugins/download-plugins-dashboard/" shodan-query: 'vuln:CVE-2019-17239' - tags: cve,wordpress,wp-plugin,download-plugins-dashboard,medium + tags: cve,wordpress,wp-plugin,download-plugins-dashboard,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-17384-6786cc650f667a015a2cad75459e0a89.yaml b/nuclei-templates/2019/CVE-2019-17384-6786cc650f667a015a2cad75459e0a89.yaml index e928002e62..8334b0edec 100644 --- a/nuclei-templates/2019/CVE-2019-17384-6786cc650f667a015a2cad75459e0a89.yaml +++ b/nuclei-templates/2019/CVE-2019-17384-6786cc650f667a015a2cad75459e0a89.yaml @@ -4,7 +4,7 @@ info: name: > Animate It <= 2.3.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The animate-it plugin before 2.3.6 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/animate-it/" google-query: inurl:"/wp-content/plugins/animate-it/" shodan-query: 'vuln:CVE-2019-17384' - tags: cve,wordpress,wp-plugin,animate-it,medium + tags: cve,wordpress,wp-plugin,animate-it,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-17385-61c977fb1adb33ac70d098207834a351.yaml b/nuclei-templates/2019/CVE-2019-17385-61c977fb1adb33ac70d098207834a351.yaml index 7919acba44..9534b337e9 100644 --- a/nuclei-templates/2019/CVE-2019-17385-61c977fb1adb33ac70d098207834a351.yaml +++ b/nuclei-templates/2019/CVE-2019-17385-61c977fb1adb33ac70d098207834a351.yaml @@ -4,7 +4,7 @@ info: name: > Animate It <= 2.3.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The animate-it plugin before 2.3.6 for WordPress has XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/animate-it/" google-query: inurl:"/wp-content/plugins/animate-it/" shodan-query: 'vuln:CVE-2019-17385' - tags: cve,wordpress,wp-plugin,animate-it,medium + tags: cve,wordpress,wp-plugin,animate-it,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-17386-5cb88706cc3e4d4bdffd38343a9f038a.yaml b/nuclei-templates/2019/CVE-2019-17386-5cb88706cc3e4d4bdffd38343a9f038a.yaml index e71b04ac27..814a481e1f 100644 --- a/nuclei-templates/2019/CVE-2019-17386-5cb88706cc3e4d4bdffd38343a9f038a.yaml +++ b/nuclei-templates/2019/CVE-2019-17386-5cb88706cc3e4d4bdffd38343a9f038a.yaml @@ -4,7 +4,7 @@ info: name: > Animate It <= 2.3.5 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The animate-it plugin before 2.3.6 for WordPress has CSRF in edsanimate.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/animate-it/" google-query: inurl:"/wp-content/plugins/animate-it/" shodan-query: 'vuln:CVE-2019-17386' - tags: cve,wordpress,wp-plugin,animate-it,high + tags: cve,wordpress,wp-plugin,animate-it,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-17671-f48a9fb689f8698b971abbab7d25b506.yaml b/nuclei-templates/2019/CVE-2019-17671-f48a9fb689f8698b971abbab7d25b506.yaml index 7c6f5f480f..6229960cae 100644 --- a/nuclei-templates/2019/CVE-2019-17671-f48a9fb689f8698b971abbab7d25b506.yaml +++ b/nuclei-templates/2019/CVE-2019-17671-f48a9fb689f8698b971abbab7d25b506.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.2.4 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > In WordPress before 5.2.4, unauthenticated viewing of certain content is possible because the static query property is mishandled. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2019-17671 metadata: shodan-query: 'vuln:CVE-2019-17671' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-17672-12b542c9c6e5694670c0b26901250872.yaml b/nuclei-templates/2019/CVE-2019-17672-12b542c9c6e5694670c0b26901250872.yaml index a09c4872f4..f3f50ab958 100644 --- a/nuclei-templates/2019/CVE-2019-17672-12b542c9c6e5694670c0b26901250872.yaml +++ b/nuclei-templates/2019/CVE-2019-17672-12b542c9c6e5694670c0b26901250872.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.2.4 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > WordPress before 5.2.4 is vulnerable to a stored XSS attack to inject JavaScript into STYLE elements. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2019-17672 metadata: shodan-query: 'vuln:CVE-2019-17672' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-17674-7aa910c9023680190c934154781b69ae.yaml b/nuclei-templates/2019/CVE-2019-17674-7aa910c9023680190c934154781b69ae.yaml index 15f0509d05..5a0167df7c 100644 --- a/nuclei-templates/2019/CVE-2019-17674-7aa910c9023680190c934154781b69ae.yaml +++ b/nuclei-templates/2019/CVE-2019-17674-7aa910c9023680190c934154781b69ae.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.2.4 - Authenticated Stored Cross-Site Scripting via Customizer author: topscoder - severity: medium + severity: low description: > WordPress before 5.2.4 is vulnerable to stored XSS (cross-site scripting) via the Customizer. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2019-17674 metadata: shodan-query: 'vuln:CVE-2019-17674' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-18668-57f78642fa9cede94bd35b0316b99b78.yaml b/nuclei-templates/2019/CVE-2019-18668-57f78642fa9cede94bd35b0316b99b78.yaml index 47a8eb340c..432ff04750 100644 --- a/nuclei-templates/2019/CVE-2019-18668-57f78642fa9cede94bd35b0316b99b78.yaml +++ b/nuclei-templates/2019/CVE-2019-18668-57f78642fa9cede94bd35b0316b99b78.yaml @@ -4,7 +4,7 @@ info: name: > Currency Switcher <= 2.11.1 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > An issue was discovered in the Currency Switcher addon before 2.11.2 for WooCommerce if a user provides a currency that was not added by the administrator. In this case, even though the currency does not exist, it will be selected, but a price amount will fall back to the default currency. This means that if an attacker provides a currency that does not exist and is worth less than this default, the attacker can eventually purchase an item for a significantly cheaper price. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/currency-switcher-woocommerce/" google-query: inurl:"/wp-content/plugins/currency-switcher-woocommerce/" shodan-query: 'vuln:CVE-2019-18668' - tags: cve,wordpress,wp-plugin,currency-switcher-woocommerce,medium + tags: cve,wordpress,wp-plugin,currency-switcher-woocommerce,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-18834-f9c4b5a4e9087a30d794272cce966354.yaml b/nuclei-templates/2019/CVE-2019-18834-f9c4b5a4e9087a30d794272cce966354.yaml index cc9455d5e8..bef78001bb 100644 --- a/nuclei-templates/2019/CVE-2019-18834-f9c4b5a4e9087a30d794272cce966354.yaml +++ b/nuclei-templates/2019/CVE-2019-18834-f9c4b5a4e9087a30d794272cce966354.yaml @@ -4,7 +4,7 @@ info: name: > WooCommerce Subscriptions < 2.6.3 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Persistent XSS in the WooCommerce Subscriptions plugin before 2.6.3 for WordPress allows remote attackers to execute arbitrary JavaScript because Billing Details are mishandled in WCS_Admin_Post_Types in class-wcs-admin-post-types.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/woocommerce-subscriptions/" google-query: inurl:"/wp-content/plugins/woocommerce-subscriptions/" shodan-query: 'vuln:CVE-2019-18834' - tags: cve,wordpress,wp-plugin,woocommerce-subscriptions,medium + tags: cve,wordpress,wp-plugin,woocommerce-subscriptions,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-19109-dcbc26c1e59709ba0a55cede543653d5.yaml b/nuclei-templates/2019/CVE-2019-19109-dcbc26c1e59709ba0a55cede543653d5.yaml index d522af0c8c..a939a47590 100644 --- a/nuclei-templates/2019/CVE-2019-19109-dcbc26c1e59709ba0a55cede543653d5.yaml +++ b/nuclei-templates/2019/CVE-2019-19109-dcbc26c1e59709ba0a55cede543653d5.yaml @@ -4,7 +4,7 @@ info: name: > wpForo Forum <= 1.6.5 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The wpForo plugin 1.6.5 for WordPress allows wp-admin/admin.php?page=wpforo-usergroups CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpforo/" google-query: inurl:"/wp-content/plugins/wpforo/" shodan-query: 'vuln:CVE-2019-19109' - tags: cve,wordpress,wp-plugin,wpforo,high + tags: cve,wordpress,wp-plugin,wpforo,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-19110-e5552ad191b551e3319c3d216b7466cf.yaml b/nuclei-templates/2019/CVE-2019-19110-e5552ad191b551e3319c3d216b7466cf.yaml index 5151f94ad1..683722da96 100644 --- a/nuclei-templates/2019/CVE-2019-19110-e5552ad191b551e3319c3d216b7466cf.yaml +++ b/nuclei-templates/2019/CVE-2019-19110-e5552ad191b551e3319c3d216b7466cf.yaml @@ -4,7 +4,7 @@ info: name: > wpForo Forum <= 1.6.5 - Cross-Site Scripting via s parameter author: topscoder - severity: medium + severity: high description: > The wpForo plugin 1.6.5 for WordPress allows XSS via the wp-admin/admin.php?page=wpforo-phrases s parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpforo/" google-query: inurl:"/wp-content/plugins/wpforo/" shodan-query: 'vuln:CVE-2019-19110' - tags: cve,wordpress,wp-plugin,wpforo,medium + tags: cve,wordpress,wp-plugin,wpforo,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-19111-c9f41d227d49a467420a82298376145f.yaml b/nuclei-templates/2019/CVE-2019-19111-c9f41d227d49a467420a82298376145f.yaml index 290cbccbd3..968eb8703f 100644 --- a/nuclei-templates/2019/CVE-2019-19111-c9f41d227d49a467420a82298376145f.yaml +++ b/nuclei-templates/2019/CVE-2019-19111-c9f41d227d49a467420a82298376145f.yaml @@ -4,7 +4,7 @@ info: name: > wpForo Forum <= 1.6.5 - Cross-Site Scripting via langid parameter author: topscoder - severity: medium + severity: high description: > The wpForo plugin 1.6.5 for WordPress allows XSS via the wp-admin/admin.php?page=wpforo-phrases langid parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpforo/" google-query: inurl:"/wp-content/plugins/wpforo/" shodan-query: 'vuln:CVE-2019-19111' - tags: cve,wordpress,wp-plugin,wpforo,medium + tags: cve,wordpress,wp-plugin,wpforo,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-19112-0974ad31ae0ff4ed4780871fa5a19327.yaml b/nuclei-templates/2019/CVE-2019-19112-0974ad31ae0ff4ed4780871fa5a19327.yaml index 40980faa58..1e0f313932 100644 --- a/nuclei-templates/2019/CVE-2019-19112-0974ad31ae0ff4ed4780871fa5a19327.yaml +++ b/nuclei-templates/2019/CVE-2019-19112-0974ad31ae0ff4ed4780871fa5a19327.yaml @@ -4,7 +4,7 @@ info: name: > wpForo Forum <= 1.6.5 - Cross-Site Scripting via wpf-dw-td-value class author: topscoder - severity: medium + severity: high description: > The wpForo plugin 1.6.5 for WordPress allows XSS involving the wpf-dw-td-value class of dashboard.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpforo/" google-query: inurl:"/wp-content/plugins/wpforo/" shodan-query: 'vuln:CVE-2019-19112' - tags: cve,wordpress,wp-plugin,wpforo,medium + tags: cve,wordpress,wp-plugin,wpforo,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-19198-1e95de3e52134f8f88956ec119bc2d88.yaml b/nuclei-templates/2019/CVE-2019-19198-1e95de3e52134f8f88956ec119bc2d88.yaml index 6cdb2f559d..aaf58bdeb0 100644 --- a/nuclei-templates/2019/CVE-2019-19198-1e95de3e52134f8f88956ec119bc2d88.yaml +++ b/nuclei-templates/2019/CVE-2019-19198-1e95de3e52134f8f88956ec119bc2d88.yaml @@ -4,7 +4,7 @@ info: name: > Scoutnet Kalender <= 1.1.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Scoutnet Kalender plugin 1.1.0 and before for WordPress allows XSS via 'info' field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/scoutnet-kalender/" google-query: inurl:"/wp-content/plugins/scoutnet-kalender/" shodan-query: 'vuln:CVE-2019-19198' - tags: cve,wordpress,wp-plugin,scoutnet-kalender,medium + tags: cve,wordpress,wp-plugin,scoutnet-kalender,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-19541-5ff88083e32bfbabf7c17c2a2829921d.yaml b/nuclei-templates/2019/CVE-2019-19541-5ff88083e32bfbabf7c17c2a2829921d.yaml index bfb146654e..19e9860aba 100644 --- a/nuclei-templates/2019/CVE-2019-19541-5ff88083e32bfbabf7c17c2a2829921d.yaml +++ b/nuclei-templates/2019/CVE-2019-19541-5ff88083e32bfbabf7c17c2a2829921d.yaml @@ -4,7 +4,7 @@ info: name: > ListingPro - WordPress Directory & Listing Theme < 2.0.14.5 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The ListingPro theme before v2.0.14.5 for WordPress has Persistent XSS via the Best Day/Night field on the new listing submit page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/listingpro/" google-query: inurl:"/wp-content/themes/listingpro/" shodan-query: 'vuln:CVE-2019-19541' - tags: cve,wordpress,wp-theme,listingpro,medium + tags: cve,wordpress,wp-theme,listingpro,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-19542-e612ae5fb8c05a8c56c1d21cf4568559.yaml b/nuclei-templates/2019/CVE-2019-19542-e612ae5fb8c05a8c56c1d21cf4568559.yaml index 112ab37618..142f9476a9 100644 --- a/nuclei-templates/2019/CVE-2019-19542-e612ae5fb8c05a8c56c1d21cf4568559.yaml +++ b/nuclei-templates/2019/CVE-2019-19542-e612ae5fb8c05a8c56c1d21cf4568559.yaml @@ -4,7 +4,7 @@ info: name: > ListingPro - WordPress Directory & Listing Theme < 2.0.14.5 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The ListingPro theme before v2.0.14.5 for WordPress has Persistent XSS via the Good For field on the new listing submit page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/listingpro/" google-query: inurl:"/wp-content/themes/listingpro/" shodan-query: 'vuln:CVE-2019-19542' - tags: cve,wordpress,wp-theme,listingpro,medium + tags: cve,wordpress,wp-theme,listingpro,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-19915-65fec51a84e4dae8b6ac8a6f543cb922.yaml b/nuclei-templates/2019/CVE-2019-19915-65fec51a84e4dae8b6ac8a6f543cb922.yaml index 4b05b1f8cc..44e66fbab8 100644 --- a/nuclei-templates/2019/CVE-2019-19915-65fec51a84e4dae8b6ac8a6f543cb922.yaml +++ b/nuclei-templates/2019/CVE-2019-19915-65fec51a84e4dae8b6ac8a6f543cb922.yaml @@ -4,7 +4,7 @@ info: name: > 301 Redirects - Easy Redirect Manager <= 2.40 - Missing Authorization author: topscoder - severity: medium + severity: high description: > The "301 Redirects - Easy Redirect Manager" plugin before 2.45 for WordPress allows users (with subscriber or greater access) to modify, delete, or inject redirect rules, and exploit XSS, with the /admin-ajax.php?action=eps_redirect_save and /admin-ajax.php?action=eps_redirect_delete actions. This could result in a loss of site availability, malicious redirects, and user infections. This could also be exploited via CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/eps-301-redirects/" google-query: inurl:"/wp-content/plugins/eps-301-redirects/" shodan-query: 'vuln:CVE-2019-19915' - tags: cve,wordpress,wp-plugin,eps-301-redirects,medium + tags: cve,wordpress,wp-plugin,eps-301-redirects,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-19979-6dc10d5c3a8a61c313df3cbcf576a1b8.yaml b/nuclei-templates/2019/CVE-2019-19979-6dc10d5c3a8a61c313df3cbcf576a1b8.yaml index f9534672d4..908995f8b7 100644 --- a/nuclei-templates/2019/CVE-2019-19979-6dc10d5c3a8a61c313df3cbcf576a1b8.yaml +++ b/nuclei-templates/2019/CVE-2019-19979-6dc10d5c3a8a61c313df3cbcf576a1b8.yaml @@ -4,7 +4,7 @@ info: name: > WP Maintenance <= 5.0.5 - Cross-Site Request Forgery to Stored Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > A flaw in the WordPress plugin, WP Maintenance before 5.0.6, allowed attackers to enable a vulnerable site's maintenance mode and inject malicious code affecting site visitors. There was CSRF with resultant XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-maintenance/" google-query: inurl:"/wp-content/plugins/wp-maintenance/" shodan-query: 'vuln:CVE-2019-19979' - tags: cve,wordpress,wp-plugin,wp-maintenance,high + tags: cve,wordpress,wp-plugin,wp-maintenance,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-19980-3042e18a6deb29dac6c8bd45ef1b1544.yaml b/nuclei-templates/2019/CVE-2019-19980-3042e18a6deb29dac6c8bd45ef1b1544.yaml index f1d67e92b4..b09525184f 100644 --- a/nuclei-templates/2019/CVE-2019-19980-3042e18a6deb29dac6c8bd45ef1b1544.yaml +++ b/nuclei-templates/2019/CVE-2019-19980-3042e18a6deb29dac6c8bd45ef1b1544.yaml @@ -4,7 +4,7 @@ info: name: > Email Subscribers & Newsletters <= 4.2.2 - Missing Authorization to Test Email author: topscoder - severity: medium + severity: high description: > The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a privilege bypass flaw that allowed authenticated users (Subscriber or greater access) to send test emails from the administrative dashboard on behalf of an administrator. This occurs because the plugin registers a wp_ajax function to send_test_email. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/email-subscribers/" google-query: inurl:"/wp-content/plugins/email-subscribers/" shodan-query: 'vuln:CVE-2019-19980' - tags: cve,wordpress,wp-plugin,email-subscribers,medium + tags: cve,wordpress,wp-plugin,email-subscribers,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-19984-f324ead36f3eeb3ed11630cd0ba7e8ed.yaml b/nuclei-templates/2019/CVE-2019-19984-f324ead36f3eeb3ed11630cd0ba7e8ed.yaml index 42af331f32..4b56d0a1ad 100644 --- a/nuclei-templates/2019/CVE-2019-19984-f324ead36f3eeb3ed11630cd0ba7e8ed.yaml +++ b/nuclei-templates/2019/CVE-2019-19984-f324ead36f3eeb3ed11630cd0ba7e8ed.yaml @@ -4,7 +4,7 @@ info: name: > Email Subscribers & Newsletters <= 4.2.2 - Missing Authorization author: topscoder - severity: medium + severity: high description: > The WordPress plugin, Email Subscribers & Newsletters, before 4.2.3 had a flaw that allowed users with edit_post capabilities to manage plugin settings and email campaigns. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/email-subscribers/" google-query: inurl:"/wp-content/plugins/email-subscribers/" shodan-query: 'vuln:CVE-2019-19984' - tags: cve,wordpress,wp-plugin,email-subscribers,medium + tags: cve,wordpress,wp-plugin,email-subscribers,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-20041-3ea050ab19cdfec8097a097615a833a6.yaml b/nuclei-templates/2019/CVE-2019-20041-3ea050ab19cdfec8097a097615a833a6.yaml index a92e1de5b9..cf7d4a97d7 100644 --- a/nuclei-templates/2019/CVE-2019-20041-3ea050ab19cdfec8097a097615a833a6.yaml +++ b/nuclei-templates/2019/CVE-2019-20041-3ea050ab19cdfec8097a097615a833a6.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.3.1 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > wp_kses_bad_protocol in wp-includes/kses.php in WordPress before 5.3.1 mishandles the HTML5 colon named entity, allowing attackers to bypass input sanitization, as demonstrated by the javascript: substring. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2019-20041 metadata: shodan-query: 'vuln:CVE-2019-20041' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-20042-4975b9673fe108360602d6969c234af1.yaml b/nuclei-templates/2019/CVE-2019-20042-4975b9673fe108360602d6969c234af1.yaml index 1883705796..6f488158ab 100644 --- a/nuclei-templates/2019/CVE-2019-20042-4975b9673fe108360602d6969c234af1.yaml +++ b/nuclei-templates/2019/CVE-2019-20042-4975b9673fe108360602d6969c234af1.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.3.1 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > In wp-includes/formatting.php in WordPress 3.7 to 5.3.0, the function wp_targeted_link_rel() can be used in a particular way to result in a stored cross-site scripting (XSS) vulnerability. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2019-20042 metadata: shodan-query: 'vuln:CVE-2019-20042' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-20043-38e1681925de50501e0141995c16e341.yaml b/nuclei-templates/2019/CVE-2019-20043-38e1681925de50501e0141995c16e341.yaml index 3b86abe8fb..8a8510aa67 100644 --- a/nuclei-templates/2019/CVE-2019-20043-38e1681925de50501e0141995c16e341.yaml +++ b/nuclei-templates/2019/CVE-2019-20043-38e1681925de50501e0141995c16e341.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.3.1 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > In in wp-includes/rest-api/endpoints/class-wp-rest-posts-controller.php in WordPress 3.7 to 5.3.0, authenticated users who do not have the rights to publish a post are able to mark posts as sticky or unsticky via the REST API. For example, the contributor role does not have such rights, but this allowed them to bypass that. This has been patched in WordPress 5.3.1, along with all the previous WordPress versions from 3.7 to 5.3 via a minor release. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2019-20043 metadata: shodan-query: 'vuln:CVE-2019-20043' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-20141-ce8dd1af11ff660941fa17a3827331a2.yaml b/nuclei-templates/2019/CVE-2019-20141-ce8dd1af11ff660941fa17a3827331a2.yaml index 461b124009..e464a81c91 100644 --- a/nuclei-templates/2019/CVE-2019-20141-ce8dd1af11ff660941fa17a3827331a2.yaml +++ b/nuclei-templates/2019/CVE-2019-20141-ce8dd1af11ff660941fa17a3827331a2.yaml @@ -4,7 +4,7 @@ info: name: > Neon - Bootstrap Admin Theme <= 2.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An XSS issue was discovered in the Laborator Neon theme 2.0 for WordPress via the data/autosuggest-remote.php q parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/neon/" google-query: inurl:"/wp-content/themes/neon/" shodan-query: 'vuln:CVE-2019-20141' - tags: cve,wordpress,wp-theme,neon,medium + tags: cve,wordpress,wp-theme,neon,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-20173-6bd4ae57c5ef629c5bc1d004189d96b3.yaml b/nuclei-templates/2019/CVE-2019-20173-6bd4ae57c5ef629c5bc1d004189d96b3.yaml index cef428ec43..8599206e3f 100644 --- a/nuclei-templates/2019/CVE-2019-20173-6bd4ae57c5ef629c5bc1d004189d96b3.yaml +++ b/nuclei-templates/2019/CVE-2019-20173-6bd4ae57c5ef629c5bc1d004189d96b3.yaml @@ -4,7 +4,7 @@ info: name: > Login by Auth0 3.11.0 - 3.11.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Auth0 wp-auth0 plugin 3.11.x before 3.11.3 for WordPress allows XSS via a wle parameter associated with wp-login.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/auth0/" google-query: inurl:"/wp-content/plugins/auth0/" shodan-query: 'vuln:CVE-2019-20173' - tags: cve,wordpress,wp-plugin,auth0,medium + tags: cve,wordpress,wp-plugin,auth0,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-20180-3fb1358d568dc8245a52a721b92fb318.yaml b/nuclei-templates/2019/CVE-2019-20180-3fb1358d568dc8245a52a721b92fb318.yaml index 14227d2900..4903654510 100644 --- a/nuclei-templates/2019/CVE-2019-20180-3fb1358d568dc8245a52a721b92fb318.yaml +++ b/nuclei-templates/2019/CVE-2019-20180-3fb1358d568dc8245a52a721b92fb318.yaml @@ -4,7 +4,7 @@ info: name: > TablePress <= 1.14 - Authenticated (Author+) CSV Injection author: topscoder - severity: high + severity: low description: > The TablePress plugin for WordPress is vulnerable to CSV Injection in versions up to and including 1.14 via the tablepress[data] value. This makes it possible for attackers with author level access and above to embed untrusted input into exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration. This vulnerability is not likely to be exploited in the wild due to its high complexity and many modern day protections, however, it could have a significant impact if exploited successfully at it's worst impact. Please note that while the CVE record says this issue was patched in 1.10, our team confirmed it was still exploitable in 1.14. The has been patched in version 2.0 of TablePress. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/tablepress/" google-query: inurl:"/wp-content/plugins/tablepress/" shodan-query: 'vuln:CVE-2019-20180' - tags: cve,wordpress,wp-plugin,tablepress,high + tags: cve,wordpress,wp-plugin,tablepress,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-20181-e5141ff592bd9997e23b1aad269872cc.yaml b/nuclei-templates/2019/CVE-2019-20181-e5141ff592bd9997e23b1aad269872cc.yaml index 04ec1addd0..2b19beff1d 100644 --- a/nuclei-templates/2019/CVE-2019-20181-e5141ff592bd9997e23b1aad269872cc.yaml +++ b/nuclei-templates/2019/CVE-2019-20181-e5141ff592bd9997e23b1aad269872cc.yaml @@ -4,7 +4,7 @@ info: name: > Awesome Support – WordPress HelpDesk & Support Plugin <= 6.0.13 - Cross-Site Scripting via post_title author: topscoder - severity: medium + severity: high description: > The awesome-support plugin 6.0.13 and below for WordPress allows XSS via the post_title parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/awesome-support/" google-query: inurl:"/wp-content/plugins/awesome-support/" shodan-query: 'vuln:CVE-2019-20181' - tags: cve,wordpress,wp-plugin,awesome-support,medium + tags: cve,wordpress,wp-plugin,awesome-support,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-20182-7acb842ebb36fed3d48b7a27908aad70.yaml b/nuclei-templates/2019/CVE-2019-20182-7acb842ebb36fed3d48b7a27908aad70.yaml index 0fae05959e..e5378eb6e3 100644 --- a/nuclei-templates/2019/CVE-2019-20182-7acb842ebb36fed3d48b7a27908aad70.yaml +++ b/nuclei-templates/2019/CVE-2019-20182-7acb842ebb36fed3d48b7a27908aad70.yaml @@ -4,7 +4,7 @@ info: name: > FooGallery <= 1.8.12 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The FooGallery plugin 1.8.12 for WordPress allow XSS via the post_title parameter. Please note this requires administrative privileges to exploit. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/foogallery/" google-query: inurl:"/wp-content/plugins/foogallery/" shodan-query: 'vuln:CVE-2019-20182' - tags: cve,wordpress,wp-plugin,foogallery,medium + tags: cve,wordpress,wp-plugin,foogallery,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-20203-727d4fbf362548e62940ac117a3d3c3a.yaml b/nuclei-templates/2019/CVE-2019-20203-727d4fbf362548e62940ac117a3d3c3a.yaml index ebf1d9416d..a34f3ce3a6 100644 --- a/nuclei-templates/2019/CVE-2019-20203-727d4fbf362548e62940ac117a3d3c3a.yaml +++ b/nuclei-templates/2019/CVE-2019-20203-727d4fbf362548e62940ac117a3d3c3a.yaml @@ -4,7 +4,7 @@ info: name: > Postie <= 1.9.40 - Post Submission Spoofing & Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Authorized Addresses feature in the Postie plugin 1.9.40 for WordPress allows remote attackers to publish posts by spoofing the From information of an email message. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/postie/" google-query: inurl:"/wp-content/plugins/postie/" shodan-query: 'vuln:CVE-2019-20203' - tags: cve,wordpress,wp-plugin,postie,medium + tags: cve,wordpress,wp-plugin,postie,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-20204-6f78bc0495c69824a3ef08a95ff8b518.yaml b/nuclei-templates/2019/CVE-2019-20204-6f78bc0495c69824a3ef08a95ff8b518.yaml index 72213f9039..d0e936706d 100644 --- a/nuclei-templates/2019/CVE-2019-20204-6f78bc0495c69824a3ef08a95ff8b518.yaml +++ b/nuclei-templates/2019/CVE-2019-20204-6f78bc0495c69824a3ef08a95ff8b518.yaml @@ -4,7 +4,7 @@ info: name: > Postie <= 1.9.40 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Postie plugin 1.9.40 for WordPress allows XSS, as demonstrated by a certain payload with jaVasCript:/* at the beginning and a crafted SVG element. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/postie/" google-query: inurl:"/wp-content/plugins/postie/" shodan-query: 'vuln:CVE-2019-20204' - tags: cve,wordpress,wp-plugin,postie,medium + tags: cve,wordpress,wp-plugin,postie,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-20209-17f6998fdf35be8a6349776a3309aedc.yaml b/nuclei-templates/2019/CVE-2019-20209-17f6998fdf35be8a6349776a3309aedc.yaml index b10bea605e..5eb47c366d 100644 --- a/nuclei-templates/2019/CVE-2019-20209-17f6998fdf35be8a6349776a3309aedc.yaml +++ b/nuclei-templates/2019/CVE-2019-20209-17f6998fdf35be8a6349776a3309aedc.yaml @@ -4,7 +4,7 @@ info: name: > CTHthemes CityBook < 2.3.4, TownHub < 1.0.6, EasyBook < 1.2.2 Themes - Authenticated Post Deleition via IDOR author: topscoder - severity: high + severity: low description: > The CTHthemes CityBook before 2.3.4, TownHub before 1.0.6, and EasyBook before 1.2.2 themes for WordPress allow unspecified authenticated users to delete any page/post/listing via insecure Direct Object Reference (IDOR) reference: @@ -14,17 +14,17 @@ info: cvss-score: 7.5 cve-id: CVE-2019-20209 metadata: - fofa-query: "wp-content/themes/easybook/" - google-query: inurl:"/wp-content/themes/easybook/" + fofa-query: "wp-content/themes/citybook/" + google-query: inurl:"/wp-content/themes/citybook/" shodan-query: 'vuln:CVE-2019-20209' - tags: cve,wordpress,wp-theme,easybook,high + tags: cve,wordpress,wp-theme,citybook,low http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/themes/easybook/style.css" + - "{{BaseURL}}/wp-content/themes/citybook/style.css" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "easybook" + - "citybook" part: body - type: dsl dsl: - - compare_versions(version, '< 1.2.2') \ No newline at end of file + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/2019/CVE-2019-20210-f5204789b3d63c1e5dd223fef5d1ac5d.yaml b/nuclei-templates/2019/CVE-2019-20210-f5204789b3d63c1e5dd223fef5d1ac5d.yaml index 007ee764bf..b5adb62611 100644 --- a/nuclei-templates/2019/CVE-2019-20210-f5204789b3d63c1e5dd223fef5d1ac5d.yaml +++ b/nuclei-templates/2019/CVE-2019-20210-f5204789b3d63c1e5dd223fef5d1ac5d.yaml @@ -4,7 +4,7 @@ info: name: > CTHthemes CityBook Theme < 2.3.4, TownHub Theme < 1.0.6, EasyBook Theme < 1.2.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The CTHthemes CityBook before 2.3.4, TownHub before 1.0.6, and EasyBook before 1.2.2 themes for WordPress allow Reflected XSS via a search query. reference: @@ -14,17 +14,17 @@ info: cvss-score: 6.1 cve-id: CVE-2019-20210 metadata: - fofa-query: "wp-content/themes/easybook/" - google-query: inurl:"/wp-content/themes/easybook/" + fofa-query: "wp-content/themes/citybook/" + google-query: inurl:"/wp-content/themes/citybook/" shodan-query: 'vuln:CVE-2019-20210' - tags: cve,wordpress,wp-theme,easybook,medium + tags: cve,wordpress,wp-theme,citybook,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/themes/easybook/style.css" + - "{{BaseURL}}/wp-content/themes/citybook/style.css" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "easybook" + - "citybook" part: body - type: dsl dsl: - - compare_versions(version, '< 1.2.2') \ No newline at end of file + - compare_versions(version, '< 2.3.4') \ No newline at end of file diff --git a/nuclei-templates/2019/CVE-2019-20211-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml b/nuclei-templates/2019/CVE-2019-20211-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml index ef0fe47042..b331258451 100644 --- a/nuclei-templates/2019/CVE-2019-20211-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml +++ b/nuclei-templates/2019/CVE-2019-20211-8b6ac4c7233f8f6a37118bbf7ac73ad8.yaml @@ -14,17 +14,17 @@ info: cvss-score: 7.2 cve-id: CVE-2019-20211 metadata: - fofa-query: "wp-content/themes/easybook/" - google-query: inurl:"/wp-content/themes/easybook/" + fofa-query: "wp-content/themes/citybook/" + google-query: inurl:"/wp-content/themes/citybook/" shodan-query: 'vuln:CVE-2019-20211' - tags: cve,wordpress,wp-theme,easybook,high + tags: cve,wordpress,wp-theme,citybook,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/themes/easybook/style.css" + - "{{BaseURL}}/wp-content/themes/citybook/style.css" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "easybook" + - "citybook" part: body - type: dsl dsl: - - compare_versions(version, '<= 1.2.1') \ No newline at end of file + - compare_versions(version, '<= 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/2019/CVE-2019-20212-be3f332add5d9ce678efc86e37a29e03.yaml b/nuclei-templates/2019/CVE-2019-20212-be3f332add5d9ce678efc86e37a29e03.yaml index 36d182ba65..f988c3626e 100644 --- a/nuclei-templates/2019/CVE-2019-20212-be3f332add5d9ce678efc86e37a29e03.yaml +++ b/nuclei-templates/2019/CVE-2019-20212-be3f332add5d9ce678efc86e37a29e03.yaml @@ -14,17 +14,17 @@ info: cvss-score: 7.2 cve-id: CVE-2019-20212 metadata: - fofa-query: "wp-content/themes/easybook/" - google-query: inurl:"/wp-content/themes/easybook/" + fofa-query: "wp-content/themes/citybook/" + google-query: inurl:"/wp-content/themes/citybook/" shodan-query: 'vuln:CVE-2019-20212' - tags: cve,wordpress,wp-theme,easybook,high + tags: cve,wordpress,wp-theme,citybook,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/themes/easybook/style.css" + - "{{BaseURL}}/wp-content/themes/citybook/style.css" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "easybook" + - "citybook" part: body - type: dsl dsl: - - compare_versions(version, '<= 1.2.1') \ No newline at end of file + - compare_versions(version, '<= 2.3.3') \ No newline at end of file diff --git a/nuclei-templates/2019/CVE-2019-20361-6d5548494ee66c8a74f29f22d03a7935.yaml b/nuclei-templates/2019/CVE-2019-20361-6d5548494ee66c8a74f29f22d03a7935.yaml index 63e2b2bf12..5e9def9c13 100644 --- a/nuclei-templates/2019/CVE-2019-20361-6d5548494ee66c8a74f29f22d03a7935.yaml +++ b/nuclei-templates/2019/CVE-2019-20361-6d5548494ee66c8a74f29f22d03a7935.yaml @@ -4,7 +4,7 @@ info: name: > Email Subscribers & Newsletters < 4.3.1 - Unauthenticated Blind SQL Injection author: topscoder - severity: high + severity: critical description: > There was a flaw in the WordPress plugin, Email Subscribers & Newsletters before 4.3.1, that allowed SQL statements to be passed to the database in the hash parameter (a blind SQL injection vulnerability). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/email-subscribers/" google-query: inurl:"/wp-content/plugins/email-subscribers/" shodan-query: 'vuln:CVE-2019-20361' - tags: cve,wordpress,wp-plugin,email-subscribers,high + tags: cve,wordpress,wp-plugin,email-subscribers,critical http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-25141-3c68c1399fad8442e05257bec4405849.yaml b/nuclei-templates/2019/CVE-2019-25141-3c68c1399fad8442e05257bec4405849.yaml index cf9885e6cd..890e9a6524 100644 --- a/nuclei-templates/2019/CVE-2019-25141-3c68c1399fad8442e05257bec4405849.yaml +++ b/nuclei-templates/2019/CVE-2019-25141-3c68c1399fad8442e05257bec4405849.yaml @@ -4,7 +4,7 @@ info: name: > Easy WP SMTP <= 1.3.9 - Missing Authorization to Arbitrary Options Update author: topscoder - severity: critical + severity: high description: > The Easy WP SMTP plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 1.3.9. This is due to missing capability checks on the admin_init() function, in addition to insufficient input validation. This makes it possible for unauthenticated attackers to modify the plugins settings and arbitrary options on the site that can be used to inject new administrative user accounts. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-wp-smtp/" google-query: inurl:"/wp-content/plugins/easy-wp-smtp/" shodan-query: 'vuln:CVE-2019-25141' - tags: cve,wordpress,wp-plugin,easy-wp-smtp,critical + tags: cve,wordpress,wp-plugin,easy-wp-smtp,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-25142-30dc0670053ac012aae9f0b808f32600.yaml b/nuclei-templates/2019/CVE-2019-25142-30dc0670053ac012aae9f0b808f32600.yaml index 5cd16917fa..399a0c5168 100644 --- a/nuclei-templates/2019/CVE-2019-25142-30dc0670053ac012aae9f0b808f32600.yaml +++ b/nuclei-templates/2019/CVE-2019-25142-30dc0670053ac012aae9f0b808f32600.yaml @@ -4,7 +4,7 @@ info: name: > Mesmerize <= 1.6.89 & Materialis <= 1.0.172 - Authenticated Arbitrary Options Update author: topscoder - severity: high + severity: low description: > The Mesmerize & Materialis themes for WordPress are vulnerable to authenticated options change in versions up to, and including,1.6.89 (Mesmerize) and 1.0.172 (Materialis). This is due to 'companion_disable_popup' function only checking the nonce while sending user input to the 'update_option' function. This makes it possible for authenticated attackers to change otherwise restricted options. reference: @@ -14,17 +14,17 @@ info: cvss-score: 8.8 cve-id: CVE-2019-25142 metadata: - fofa-query: "wp-content/themes/mesmerize/" - google-query: inurl:"/wp-content/themes/mesmerize/" + fofa-query: "wp-content/themes/materialis/" + google-query: inurl:"/wp-content/themes/materialis/" shodan-query: 'vuln:CVE-2019-25142' - tags: cve,wordpress,wp-theme,mesmerize,high + tags: cve,wordpress,wp-theme,materialis,low http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/themes/mesmerize/style.css" + - "{{BaseURL}}/wp-content/themes/materialis/style.css" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "mesmerize" + - "materialis" part: body - type: dsl dsl: - - compare_versions(version, '<= 1.6.89') \ No newline at end of file + - compare_versions(version, '<= 1.0.172') \ No newline at end of file diff --git a/nuclei-templates/2019/CVE-2019-25143-42ff6519960f311906ae3110cd3f6c64.yaml b/nuclei-templates/2019/CVE-2019-25143-42ff6519960f311906ae3110cd3f6c64.yaml index 6dd6a3c1ea..b173859a93 100644 --- a/nuclei-templates/2019/CVE-2019-25143-42ff6519960f311906ae3110cd3f6c64.yaml +++ b/nuclei-templates/2019/CVE-2019-25143-42ff6519960f311906ae3110cd3f6c64.yaml @@ -4,7 +4,7 @@ info: name: > GDPR Cookie Compliance <= 4.0.2 - Missing Authorization author: topscoder - severity: medium + severity: high description: > The GDPR Cookie Compliance plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the gdpr_cookie_compliance_reset_settings AJAX action in versions up to, and including, 4.0.2. This makes it possible for authenticated attackers to reset all of the settings. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gdpr-cookie-compliance/" google-query: inurl:"/wp-content/plugins/gdpr-cookie-compliance/" shodan-query: 'vuln:CVE-2019-25143' - tags: cve,wordpress,wp-plugin,gdpr-cookie-compliance,medium + tags: cve,wordpress,wp-plugin,gdpr-cookie-compliance,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-25149-8f53c25a7439725994fa29007a578b4d.yaml b/nuclei-templates/2019/CVE-2019-25149-8f53c25a7439725994fa29007a578b4d.yaml index 5fc518bea5..c6661b1b9e 100644 --- a/nuclei-templates/2019/CVE-2019-25149-8f53c25a7439725994fa29007a578b4d.yaml +++ b/nuclei-templates/2019/CVE-2019-25149-8f53c25a7439725994fa29007a578b4d.yaml @@ -4,7 +4,7 @@ info: name: > Gallery Images Ape <= 2.0.6 - Authenticated Plugin Deactivation author: topscoder - severity: high + severity: low description: > The Gallery Images Ape plugin for WordPress is vulnerable to Arbitrary Plugin Deactivation in versions up to, and including, 2.0.6. This allows authenticated attackers with any capability level to deactivate any plugin on the site, including plugins necessary to site functionality or security. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gallery-images-ape/" google-query: inurl:"/wp-content/plugins/gallery-images-ape/" shodan-query: 'vuln:CVE-2019-25149' - tags: cve,wordpress,wp-plugin,gallery-images-ape,high + tags: cve,wordpress,wp-plugin,gallery-images-ape,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-25152-a3fbd1fe770668e38f708933d8dad89a.yaml b/nuclei-templates/2019/CVE-2019-25152-a3fbd1fe770668e38f708933d8dad89a.yaml index 8c8db70417..2d91a9ccd6 100644 --- a/nuclei-templates/2019/CVE-2019-25152-a3fbd1fe770668e38f708933d8dad89a.yaml +++ b/nuclei-templates/2019/CVE-2019-25152-a3fbd1fe770668e38f708933d8dad89a.yaml @@ -14,17 +14,17 @@ info: cvss-score: 7.2 cve-id: CVE-2019-25152 metadata: - fofa-query: "wp-content/plugins/woocommerce-abandoned-cart-pro/" - google-query: inurl:"/wp-content/plugins/woocommerce-abandoned-cart-pro/" + fofa-query: "wp-content/plugins/woocommerce-abandoned-cart/" + google-query: inurl:"/wp-content/plugins/woocommerce-abandoned-cart/" shodan-query: 'vuln:CVE-2019-25152' - tags: cve,wordpress,wp-plugin,woocommerce-abandoned-cart-pro,high + tags: cve,wordpress,wp-plugin,woocommerce-abandoned-cart,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/woocommerce-abandoned-cart-pro/readme.txt" + - "{{BaseURL}}/wp-content/plugins/woocommerce-abandoned-cart/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "woocommerce-abandoned-cart-pro" + - "woocommerce-abandoned-cart" part: body - type: dsl dsl: - - compare_versions(version, '<= 7.12.0') \ No newline at end of file + - compare_versions(version, '< 5.2.0') \ No newline at end of file diff --git a/nuclei-templates/2019/CVE-2019-5920-8ab11785066028af40a069df806e2ad0.yaml b/nuclei-templates/2019/CVE-2019-5920-8ab11785066028af40a069df806e2ad0.yaml index 863de121e1..6a70229093 100644 --- a/nuclei-templates/2019/CVE-2019-5920-8ab11785066028af40a069df806e2ad0.yaml +++ b/nuclei-templates/2019/CVE-2019-5920-8ab11785066028af40a069df806e2ad0.yaml @@ -4,7 +4,7 @@ info: name: > FormCraft <= 1.2.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in FormCraft 1.2.1 and earlier allows remote attackers to hijack the authentication of administrators via a specially crafted page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/formcraft-form-builder/" google-query: inurl:"/wp-content/plugins/formcraft-form-builder/" shodan-query: 'vuln:CVE-2019-5920' - tags: cve,wordpress,wp-plugin,formcraft-form-builder,high + tags: cve,wordpress,wp-plugin,formcraft-form-builder,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-5924-a78ee203ec03252165376f049d05071b.yaml b/nuclei-templates/2019/CVE-2019-5924-a78ee203ec03252165376f049d05071b.yaml index 8d388b133e..58e143de0c 100644 --- a/nuclei-templates/2019/CVE-2019-5924-a78ee203ec03252165376f049d05071b.yaml +++ b/nuclei-templates/2019/CVE-2019-5924-a78ee203ec03252165376f049d05071b.yaml @@ -4,7 +4,7 @@ info: name: > Smart Forms < 2.6.26 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in Smart Forms 2.6.15 and earlier allows remote attackers to hijack the authentication of administrators via a specially crafted page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/smart-forms/" google-query: inurl:"/wp-content/plugins/smart-forms/" shodan-query: 'vuln:CVE-2019-5924' - tags: cve,wordpress,wp-plugin,smart-forms,high + tags: cve,wordpress,wp-plugin,smart-forms,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-5962-808251beac3177b1d028049231c161e6.yaml b/nuclei-templates/2019/CVE-2019-5962-808251beac3177b1d028049231c161e6.yaml index 3156a2731a..2063e536ad 100644 --- a/nuclei-templates/2019/CVE-2019-5962-808251beac3177b1d028049231c161e6.yaml +++ b/nuclei-templates/2019/CVE-2019-5962-808251beac3177b1d028049231c161e6.yaml @@ -4,7 +4,7 @@ info: name: > Zoho SalesIQ <= 1.0.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in Zoho SalesIQ 1.0.8 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/zoho-salesiq/" google-query: inurl:"/wp-content/plugins/zoho-salesiq/" shodan-query: 'vuln:CVE-2019-5962' - tags: cve,wordpress,wp-plugin,zoho-salesiq,medium + tags: cve,wordpress,wp-plugin,zoho-salesiq,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-5963-4ecc6299ecfad3b8f439662203eb02a8.yaml b/nuclei-templates/2019/CVE-2019-5963-4ecc6299ecfad3b8f439662203eb02a8.yaml index e6ef62ecbe..8402d3374f 100644 --- a/nuclei-templates/2019/CVE-2019-5963-4ecc6299ecfad3b8f439662203eb02a8.yaml +++ b/nuclei-templates/2019/CVE-2019-5963-4ecc6299ecfad3b8f439662203eb02a8.yaml @@ -4,7 +4,7 @@ info: name: > Zoho SalesIQ <= 1.0.8 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in Zoho SalesIQ 1.0.8 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/zoho-salesiq/" google-query: inurl:"/wp-content/plugins/zoho-salesiq/" shodan-query: 'vuln:CVE-2019-5963' - tags: cve,wordpress,wp-plugin,zoho-salesiq,high + tags: cve,wordpress,wp-plugin,zoho-salesiq,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-5970-c52de35daf5b13bbf0e8777d574ea5fc.yaml b/nuclei-templates/2019/CVE-2019-5970-c52de35daf5b13bbf0e8777d574ea5fc.yaml index 8fe856ed85..8918df519e 100644 --- a/nuclei-templates/2019/CVE-2019-5970-c52de35daf5b13bbf0e8777d574ea5fc.yaml +++ b/nuclei-templates/2019/CVE-2019-5970-c52de35daf5b13bbf0e8777d574ea5fc.yaml @@ -4,7 +4,7 @@ info: name: > Attendance Manager <= 0.5.6 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in Attendance Manager 0.5.6 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/attendance-manager/" google-query: inurl:"/wp-content/plugins/attendance-manager/" shodan-query: 'vuln:CVE-2019-5970' - tags: cve,wordpress,wp-plugin,attendance-manager,medium + tags: cve,wordpress,wp-plugin,attendance-manager,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-5972-c1ecb14191a04d9e43d6e6f80f13e749.yaml b/nuclei-templates/2019/CVE-2019-5972-c1ecb14191a04d9e43d6e6f80f13e749.yaml index e727a25e3e..c97201e476 100644 --- a/nuclei-templates/2019/CVE-2019-5972-c1ecb14191a04d9e43d6e6f80f13e749.yaml +++ b/nuclei-templates/2019/CVE-2019-5972-c1ecb14191a04d9e43d6e6f80f13e749.yaml @@ -4,7 +4,7 @@ info: name: > Online Lesson Booking <= 0.8.6 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in Online Lesson Booking 0.8.6 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/online-lesson-booking-system/" google-query: inurl:"/wp-content/plugins/online-lesson-booking-system/" shodan-query: 'vuln:CVE-2019-5972' - tags: cve,wordpress,wp-plugin,online-lesson-booking-system,medium + tags: cve,wordpress,wp-plugin,online-lesson-booking-system,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-5973-236e1bbcc1e74385f1fd59662dd67917.yaml b/nuclei-templates/2019/CVE-2019-5973-236e1bbcc1e74385f1fd59662dd67917.yaml index e2107782e1..69d803df60 100644 --- a/nuclei-templates/2019/CVE-2019-5973-236e1bbcc1e74385f1fd59662dd67917.yaml +++ b/nuclei-templates/2019/CVE-2019-5973-236e1bbcc1e74385f1fd59662dd67917.yaml @@ -4,7 +4,7 @@ info: name: > Online Lesson Booking <= 0.8.6 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in Online Lesson Booking 0.8.6 and earlier allows remote attackers to hijack the authentication of administrators via several vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/online-lesson-booking-system/" google-query: inurl:"/wp-content/plugins/online-lesson-booking-system/" shodan-query: 'vuln:CVE-2019-5973' - tags: cve,wordpress,wp-plugin,online-lesson-booking-system,high + tags: cve,wordpress,wp-plugin,online-lesson-booking-system,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-5974-89931846724982da840bead82e16369b.yaml b/nuclei-templates/2019/CVE-2019-5974-89931846724982da840bead82e16369b.yaml index 68edc45400..53e9a42814 100644 --- a/nuclei-templates/2019/CVE-2019-5974-89931846724982da840bead82e16369b.yaml +++ b/nuclei-templates/2019/CVE-2019-5974-89931846724982da840bead82e16369b.yaml @@ -4,7 +4,7 @@ info: name: > Contest Gallery – Photo Contest Plugin for WordPress <= 10.4.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in Contest Gallery versions prior to 10.4.5 allows remote attackers to hijack the authentication of administrators via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contest-gallery/" google-query: inurl:"/wp-content/plugins/contest-gallery/" shodan-query: 'vuln:CVE-2019-5974' - tags: cve,wordpress,wp-plugin,contest-gallery,high + tags: cve,wordpress,wp-plugin,contest-gallery,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-5979-7e5b3599be6904a958ea6b2b094ad05a.yaml b/nuclei-templates/2019/CVE-2019-5979-7e5b3599be6904a958ea6b2b094ad05a.yaml index 504b382369..f681360ee0 100644 --- a/nuclei-templates/2019/CVE-2019-5979-7e5b3599be6904a958ea6b2b094ad05a.yaml +++ b/nuclei-templates/2019/CVE-2019-5979-7e5b3599be6904a958ea6b2b094ad05a.yaml @@ -4,7 +4,7 @@ info: name: > Personalized WooCommerce Cart Page <= 2.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in Personalized WooCommerce Cart Page 2.4 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/personalize-woocommerce-cart-page/" google-query: inurl:"/wp-content/plugins/personalize-woocommerce-cart-page/" shodan-query: 'vuln:CVE-2019-5979' - tags: cve,wordpress,wp-plugin,personalize-woocommerce-cart-page,high + tags: cve,wordpress,wp-plugin,personalize-woocommerce-cart-page,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-5983-891ca23ffb08d94e6434e60528a16c74.yaml b/nuclei-templates/2019/CVE-2019-5983-891ca23ffb08d94e6434e60528a16c74.yaml index feee34c841..274fa28860 100644 --- a/nuclei-templates/2019/CVE-2019-5983-891ca23ffb08d94e6434e60528a16c74.yaml +++ b/nuclei-templates/2019/CVE-2019-5983-891ca23ffb08d94e6434e60528a16c74.yaml @@ -4,7 +4,7 @@ info: name: > HTML5 Maps <= 1.6.5.6 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in HTML5 Maps 1.6.5.6 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/html5-maps/" google-query: inurl:"/wp-content/plugins/html5-maps/" shodan-query: 'vuln:CVE-2019-5983' - tags: cve,wordpress,wp-plugin,html5-maps,high + tags: cve,wordpress,wp-plugin,html5-maps,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-5992-6ee5c39e29212bcfe2590b9e64dd32ec.yaml b/nuclei-templates/2019/CVE-2019-5992-6ee5c39e29212bcfe2590b9e64dd32ec.yaml index a075d0fed1..e362e7b578 100644 --- a/nuclei-templates/2019/CVE-2019-5992-6ee5c39e29212bcfe2590b9e64dd32ec.yaml +++ b/nuclei-templates/2019/CVE-2019-5992-6ee5c39e29212bcfe2590b9e64dd32ec.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Ultra Simple Paypal Shopping Cart <= 4.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in WordPress Ultra Simple Paypal Shopping Cart v4.4 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-ultra-simple-paypal-shopping-cart/" google-query: inurl:"/wp-content/plugins/wp-ultra-simple-paypal-shopping-cart/" shodan-query: 'vuln:CVE-2019-5992' - tags: cve,wordpress,wp-plugin,wp-ultra-simple-paypal-shopping-cart,high + tags: cve,wordpress,wp-plugin,wp-ultra-simple-paypal-shopping-cart,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-5993-299c560ce9cc99513d88a13d89852030.yaml b/nuclei-templates/2019/CVE-2019-5993-299c560ce9cc99513d88a13d89852030.yaml index 57e6a602bc..e8bacfc2a3 100644 --- a/nuclei-templates/2019/CVE-2019-5993-299c560ce9cc99513d88a13d89852030.yaml +++ b/nuclei-templates/2019/CVE-2019-5993-299c560ce9cc99513d88a13d89852030.yaml @@ -4,7 +4,7 @@ info: name: > Category Specific RSS Feed Subscription <= 2.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in Category Specific RSS feed Subscription version v2.0 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/category-specific-rss-feed-menu/" google-query: inurl:"/wp-content/plugins/category-specific-rss-feed-menu/" shodan-query: 'vuln:CVE-2019-5993' - tags: cve,wordpress,wp-plugin,category-specific-rss-feed-menu,high + tags: cve,wordpress,wp-plugin,category-specific-rss-feed-menu,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-6011-597ddaaf7d3e092f9fab20618eafe4bf.yaml b/nuclei-templates/2019/CVE-2019-6011-597ddaaf7d3e092f9fab20618eafe4bf.yaml index 3145895d79..57a6c5abf2 100644 --- a/nuclei-templates/2019/CVE-2019-6011-597ddaaf7d3e092f9fab20618eafe4bf.yaml +++ b/nuclei-templates/2019/CVE-2019-6011-597ddaaf7d3e092f9fab20618eafe4bf.yaml @@ -4,7 +4,7 @@ info: name: > wpDataTables Lite plugin <= 2.0.11 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in wpDataTables Lite Version 2.0.11 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpdatatables/" google-query: inurl:"/wp-content/plugins/wpdatatables/" shodan-query: 'vuln:CVE-2019-6011' - tags: cve,wordpress,wp-plugin,wpdatatables,medium + tags: cve,wordpress,wp-plugin,wpdatatables,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-6027-fc588495329f4334ef4deb847bcc6bbe.yaml b/nuclei-templates/2019/CVE-2019-6027-fc588495329f4334ef4deb847bcc6bbe.yaml index 0d9ada9dc7..7687a96ccf 100644 --- a/nuclei-templates/2019/CVE-2019-6027-fc588495329f4334ef4deb847bcc6bbe.yaml +++ b/nuclei-templates/2019/CVE-2019-6027-fc588495329f4334ef4deb847bcc6bbe.yaml @@ -4,7 +4,7 @@ info: name: > WP Spell Check <= 7.1.9 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in WP Spell Check 7.1.9 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-spell-check/" google-query: inurl:"/wp-content/plugins/wp-spell-check/" shodan-query: 'vuln:CVE-2019-6027' - tags: cve,wordpress,wp-plugin,wp-spell-check,high + tags: cve,wordpress,wp-plugin,wp-spell-check,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-6029-d03a7182da2d0e0b179ec3d956910e32.yaml b/nuclei-templates/2019/CVE-2019-6029-d03a7182da2d0e0b179ec3d956910e32.yaml index 1ee199a9bd..20bafb6959 100644 --- a/nuclei-templates/2019/CVE-2019-6029-d03a7182da2d0e0b179ec3d956910e32.yaml +++ b/nuclei-templates/2019/CVE-2019-6029-d03a7182da2d0e0b179ec3d956910e32.yaml @@ -4,7 +4,7 @@ info: name: > Custom Body Class <= 0.6.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in Custom Body Class 0.6.0 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-custom-body-class/" google-query: inurl:"/wp-content/plugins/wp-custom-body-class/" shodan-query: 'vuln:CVE-2019-6029' - tags: cve,wordpress,wp-plugin,wp-custom-body-class,medium + tags: cve,wordpress,wp-plugin,wp-custom-body-class,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-6030-64d4110e0f9003166c73a24b6fad0a3d.yaml b/nuclei-templates/2019/CVE-2019-6030-64d4110e0f9003166c73a24b6fad0a3d.yaml index 962ca77b45..624d80394b 100644 --- a/nuclei-templates/2019/CVE-2019-6030-64d4110e0f9003166c73a24b6fad0a3d.yaml +++ b/nuclei-templates/2019/CVE-2019-6030-64d4110e0f9003166c73a24b6fad0a3d.yaml @@ -4,7 +4,7 @@ info: name: > Custom Body Class <= 0.6.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in Custom Body Class 0.6.0 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-custom-body-class/" google-query: inurl:"/wp-content/plugins/wp-custom-body-class/" shodan-query: 'vuln:CVE-2019-6030' - tags: cve,wordpress,wp-plugin,wp-custom-body-class,high + tags: cve,wordpress,wp-plugin,wp-custom-body-class,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-6112-d6132019cfaa7b420b3260f07bd086fb.yaml b/nuclei-templates/2019/CVE-2019-6112-d6132019cfaa7b420b3260f07bd086fb.yaml index 8bd36143d2..b5a100233f 100644 --- a/nuclei-templates/2019/CVE-2019-6112-d6132019cfaa7b420b3260f07bd086fb.yaml +++ b/nuclei-templates/2019/CVE-2019-6112-d6132019cfaa7b420b3260f07bd086fb.yaml @@ -4,7 +4,7 @@ info: name: > Sell Media <= 2.4.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > A Cross-site scripting (XSS) vulnerability in /inc/class-search.php in the Sell Media plugin v2.4.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the keyword parameter (aka $search_term or the Search field). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sell-media/" google-query: inurl:"/wp-content/plugins/sell-media/" shodan-query: 'vuln:CVE-2019-6112' - tags: cve,wordpress,wp-plugin,sell-media,medium + tags: cve,wordpress,wp-plugin,sell-media,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-6117-8f81c40c56a58242ce344610c4f30138.yaml b/nuclei-templates/2019/CVE-2019-6117-8f81c40c56a58242ce344610c4f30138.yaml index c0872a9834..d440bbbf2f 100644 --- a/nuclei-templates/2019/CVE-2019-6117-8f81c40c56a58242ce344610c4f30138.yaml +++ b/nuclei-templates/2019/CVE-2019-6117-8f81c40c56a58242ce344610c4f30138.yaml @@ -4,7 +4,7 @@ info: name: > Gallery Images Ape <= 1.6.14 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wpape APE GALLERY plugin 1.6.14 for WordPress has stored XSS via the classGallery.php getCategories function. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gallery-images-ape/" google-query: inurl:"/wp-content/plugins/gallery-images-ape/" shodan-query: 'vuln:CVE-2019-6117' - tags: cve,wordpress,wp-plugin,gallery-images-ape,medium + tags: cve,wordpress,wp-plugin,gallery-images-ape,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-6267-ced2dcf72a4e26ecb3f884cfc4438e2f.yaml b/nuclei-templates/2019/CVE-2019-6267-ced2dcf72a4e26ecb3f884cfc4438e2f.yaml index 0233b1edaa..ae22626555 100644 --- a/nuclei-templates/2019/CVE-2019-6267-ced2dcf72a4e26ecb3f884cfc4438e2f.yaml +++ b/nuclei-templates/2019/CVE-2019-6267-ced2dcf72a4e26ecb3f884cfc4438e2f.yaml @@ -4,7 +4,7 @@ info: name: > Easy Redirect Manager <= 2.18.18 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Premium WP Suite Easy Redirect Manager plugin 2.18.18 for WordPress has XSS via a crafted GET request that is mishandled during log viewing at the templates/admin/redirect-log.php URI. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-redirect-manager/" google-query: inurl:"/wp-content/plugins/easy-redirect-manager/" shodan-query: 'vuln:CVE-2019-6267' - tags: cve,wordpress,wp-plugin,easy-redirect-manager,medium + tags: cve,wordpress,wp-plugin,easy-redirect-manager,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-6703-618ad32a66dd6a63ff6bcc4f51e7ca7b.yaml b/nuclei-templates/2019/CVE-2019-6703-618ad32a66dd6a63ff6bcc4f51e7ca7b.yaml index ffcc124bc3..5d07fcc32c 100644 --- a/nuclei-templates/2019/CVE-2019-6703-618ad32a66dd6a63ff6bcc4f51e7ca7b.yaml +++ b/nuclei-templates/2019/CVE-2019-6703-618ad32a66dd6a63ff6bcc4f51e7ca7b.yaml @@ -4,7 +4,7 @@ info: name: > Total Donations <= 2.0.5 - Missing Authorization to Arbitrary Options Update author: topscoder - severity: critical + severity: high description: > Incorrect access control in migla_ajax_functions.php in the Calmar Webmedia Total Donations plugin through 2.0.5 for WordPress allows unauthenticated attackers to update arbitrary WordPress option values, leading to site takeover. These attackers can send requests to wp-admin/admin-ajax.php to call the miglaA_update_me action to change arbitrary options on affected sites. This can be used to enable new user registration and set the default role for new users to Administrator. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/total-donations/" google-query: inurl:"/wp-content/plugins/total-donations/" shodan-query: 'vuln:CVE-2019-6703' - tags: cve,wordpress,wp-plugin,total-donations,critical + tags: cve,wordpress,wp-plugin,total-donations,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-7299-497a0a1ea8afe0e920601e57f5c6ccaa.yaml b/nuclei-templates/2019/CVE-2019-7299-497a0a1ea8afe0e920601e57f5c6ccaa.yaml index aed62ad05c..75a38eef7f 100644 --- a/nuclei-templates/2019/CVE-2019-7299-497a0a1ea8afe0e920601e57f5c6ccaa.yaml +++ b/nuclei-templates/2019/CVE-2019-7299-497a0a1ea8afe0e920601e57f5c6ccaa.yaml @@ -4,7 +4,7 @@ info: name: > WP Support Plus Responsive Ticket System <= 9.1.1 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > A stored cross-site scripting (XSS) vulnerability in the submit_ticket.php module in the WP Support Plus Responsive Ticket System plugin 9.1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the subject parameter in wp-content/plugins/wp-support-plus-responsive-ticket-system/includes/ajax/submit_ticket.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-support-plus-responsive-ticket-system/" google-query: inurl:"/wp-content/plugins/wp-support-plus-responsive-ticket-system/" shodan-query: 'vuln:CVE-2019-7299' - tags: cve,wordpress,wp-plugin,wp-support-plus-responsive-ticket-system,medium + tags: cve,wordpress,wp-plugin,wp-support-plus-responsive-ticket-system,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-7411-fe2d4839032c7d1700f5ad488d4dc88f.yaml b/nuclei-templates/2019/CVE-2019-7411-fe2d4839032c7d1700f5ad488d4dc88f.yaml index 343e7056c4..dd3364520d 100644 --- a/nuclei-templates/2019/CVE-2019-7411-fe2d4839032c7d1700f5ad488d4dc88f.yaml +++ b/nuclei-templates/2019/CVE-2019-7411-fe2d4839032c7d1700f5ad488d4dc88f.yaml @@ -4,7 +4,7 @@ info: name: > Launcher: Coming Soon & Maintenance Mode < 1.0.11 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Multiple stored cross-site scripting (XSS) in the MyThemeShop Launcher plugin before 1.0.11 for WordPress allow remote authenticated users to inject arbitrary web script or HTML via fields as follows: (1) Title, (2) Favicon, (3) Meta Description, (4) Subscribe Form (Name field label, Last name field label, Email field label), (5) Contact Form (Name field label and Email field label), and (6) Social Links (Facebook Page URL, Twitter Page URL, Instagram Page URL, YouTube Page URL, Linkedin Page URL, Google+ Page URL, RSS URL). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/launcher/" google-query: inurl:"/wp-content/plugins/launcher/" shodan-query: 'vuln:CVE-2019-7411' - tags: cve,wordpress,wp-plugin,launcher,medium + tags: cve,wordpress,wp-plugin,launcher,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-7412-e1c57fbc348dfda4a7e2fa9073819ee6.yaml b/nuclei-templates/2019/CVE-2019-7412-e1c57fbc348dfda4a7e2fa9073819ee6.yaml index d596283ae8..a9bd8ed49d 100644 --- a/nuclei-templates/2019/CVE-2019-7412-e1c57fbc348dfda4a7e2fa9073819ee6.yaml +++ b/nuclei-templates/2019/CVE-2019-7412-e1c57fbc348dfda4a7e2fa9073819ee6.yaml @@ -4,7 +4,7 @@ info: name: > PS PHPCaptcha <= 1.1.0 - Authenticated Denial of Service author: topscoder - severity: medium + severity: low description: > The PS PHPCaptcha pluginfor WordPress is vulnerable to Denial of Service in versions up to, and including, 1.1.0. This is due to improper sanitization of user inputted values. This makes it possible for authenticated attackers to slow and or completely freeze the vulnerable service. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ps-phpcaptcha/" google-query: inurl:"/wp-content/plugins/ps-phpcaptcha/" shodan-query: 'vuln:CVE-2019-7412' - tags: cve,wordpress,wp-plugin,ps-phpcaptcha,medium + tags: cve,wordpress,wp-plugin,ps-phpcaptcha,low http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-7413-0e52d08abcfaa24832dc556c46587054.yaml b/nuclei-templates/2019/CVE-2019-7413-0e52d08abcfaa24832dc556c46587054.yaml index ef202736c8..3babf9301e 100644 --- a/nuclei-templates/2019/CVE-2019-7413-0e52d08abcfaa24832dc556c46587054.yaml +++ b/nuclei-templates/2019/CVE-2019-7413-0e52d08abcfaa24832dc556c46587054.yaml @@ -4,7 +4,7 @@ info: name: > Parallax Scroll <= 2.0.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > In the Parallax Scroll (aka adamrob-parallax-scroll) plugin before 2.1 for WordPress, includes/adamrob-parralax-shortcode.php allows XSS via the title text. ("parallax" has a spelling change within the PHP filename.) reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/adamrob-parallax-scroll/" google-query: inurl:"/wp-content/plugins/adamrob-parallax-scroll/" shodan-query: 'vuln:CVE-2019-7413' - tags: cve,wordpress,wp-plugin,adamrob-parallax-scroll,medium + tags: cve,wordpress,wp-plugin,adamrob-parallax-scroll,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-8942-b2845f73d8f9f13ca71ed2d0d53cc21a.yaml b/nuclei-templates/2019/CVE-2019-8942-b2845f73d8f9f13ca71ed2d0d53cc21a.yaml index c8e5602d87..55f1119366 100644 --- a/nuclei-templates/2019/CVE-2019-8942-b2845f73d8f9f13ca71ed2d0d53cc21a.yaml +++ b/nuclei-templates/2019/CVE-2019-8942-b2845f73d8f9f13ca71ed2d0d53cc21a.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.0.1 - Remote Code Execution author: topscoder - severity: high + severity: critical description: > WordPress before 4.9.9 and 5.x before 5.0.1 allows remote code execution because an _wp_attached_file Post Meta entry can be changed to an arbitrary string, such as one ending with a .jpg?file.php substring. An attacker with author privileges can execute arbitrary code by uploading a crafted image containing PHP code in the Exif metadata. Exploitation can leverage CVE-2019-8943. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2019-8942 metadata: shodan-query: 'vuln:CVE-2019-8942' - tags: cve,wordpress,wp-core,high + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-8943-29c63f4f8f43d522bbc3e34ee2af25b8.yaml b/nuclei-templates/2019/CVE-2019-8943-29c63f4f8f43d522bbc3e34ee2af25b8.yaml index 631254a14e..9b523216e2 100644 --- a/nuclei-templates/2019/CVE-2019-8943-29c63f4f8f43d522bbc3e34ee2af25b8.yaml +++ b/nuclei-templates/2019/CVE-2019-8943-29c63f4f8f43d522bbc3e34ee2af25b8.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core <= 5.0.3 - Path Traversal and Local File Inclusion author: topscoder - severity: medium + severity: critical description: > WordPress through 5.0.3 allows Path Traversal in wp_crop_image(). An attacker (who has privileges to crop an image) can write the output image to an arbitrary directory via a filename containing two image extensions and ../ sequences, such as a filename ending with the .jpg?/../../file.jpg substring. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2019-8943 metadata: shodan-query: 'vuln:CVE-2019-8943' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,critical http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-9168-42f5857c1a1a9fe3bd07b32288faed9d.yaml b/nuclei-templates/2019/CVE-2019-9168-42f5857c1a1a9fe3bd07b32288faed9d.yaml index 6c08f63a31..117e831161 100644 --- a/nuclei-templates/2019/CVE-2019-9168-42f5857c1a1a9fe3bd07b32288faed9d.yaml +++ b/nuclei-templates/2019/CVE-2019-9168-42f5857c1a1a9fe3bd07b32288faed9d.yaml @@ -4,7 +4,7 @@ info: name: > WooCommerce <= 3.5.4 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > WooCommerce before 3.5.5 allows XSS via a Photoswipe caption. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/woocommerce/" google-query: inurl:"/wp-content/plugins/woocommerce/" shodan-query: 'vuln:CVE-2019-9168' - tags: cve,wordpress,wp-plugin,woocommerce,medium + tags: cve,wordpress,wp-plugin,woocommerce,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-9567-26f35acb3c0f14eb0fe591953d190a10.yaml b/nuclei-templates/2019/CVE-2019-9567-26f35acb3c0f14eb0fe591953d190a10.yaml index 344f6bb7d3..65ef56a0b5 100644 --- a/nuclei-templates/2019/CVE-2019-9567-26f35acb3c0f14eb0fe591953d190a10.yaml +++ b/nuclei-templates/2019/CVE-2019-9567-26f35acb3c0f14eb0fe591953d190a10.yaml @@ -4,7 +4,7 @@ info: name: > Forminator Plugin <= 1.5.4 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The "Forminator Contact Form, Poll & Quiz Builder" plugin before 1.6 for WordPress has XSS via a custom input field of a poll. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/forminator/" google-query: inurl:"/wp-content/plugins/forminator/" shodan-query: 'vuln:CVE-2019-9567' - tags: cve,wordpress,wp-plugin,forminator,medium + tags: cve,wordpress,wp-plugin,forminator,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-9568-64248c162e0a07dde805cd870763a3a0.yaml b/nuclei-templates/2019/CVE-2019-9568-64248c162e0a07dde805cd870763a3a0.yaml index 6802a3a492..6b477e2192 100644 --- a/nuclei-templates/2019/CVE-2019-9568-64248c162e0a07dde805cd870763a3a0.yaml +++ b/nuclei-templates/2019/CVE-2019-9568-64248c162e0a07dde805cd870763a3a0.yaml @@ -4,7 +4,7 @@ info: name: > Forminator Plugin <= 1.5.3.1 - SQL Injection author: topscoder - severity: medium + severity: critical description: > The "Forminator Contact Form, Poll & Quiz Builder" plugin before 1.6 for WordPress has SQL Injection via the wp-admin/admin.php?page=forminator-entries entry[] parameter if the attacker has the delete permission. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/forminator/" google-query: inurl:"/wp-content/plugins/forminator/" shodan-query: 'vuln:CVE-2019-9568' - tags: cve,wordpress,wp-plugin,forminator,medium + tags: cve,wordpress,wp-plugin,forminator,critical http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-9575-899f848126483b240dc44a4870e7bfef.yaml b/nuclei-templates/2019/CVE-2019-9575-899f848126483b240dc44a4870e7bfef.yaml index 95e6449911..f8158e12ac 100644 --- a/nuclei-templates/2019/CVE-2019-9575-899f848126483b240dc44a4870e7bfef.yaml +++ b/nuclei-templates/2019/CVE-2019-9575-899f848126483b240dc44a4870e7bfef.yaml @@ -4,7 +4,7 @@ info: name: > Quiz And Survey Master <= 6.2.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Quiz And Survey Master plugin 6.2.1 for WordPress allows wp-admin/admin.php?page=mlw_quiz_results quiz_id XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/quiz-master-next/" google-query: inurl:"/wp-content/plugins/quiz-master-next/" shodan-query: 'vuln:CVE-2019-9575' - tags: cve,wordpress,wp-plugin,quiz-master-next,medium + tags: cve,wordpress,wp-plugin,quiz-master-next,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-9787-21896796785dd6864271e535041a630e.yaml b/nuclei-templates/2019/CVE-2019-9787-21896796785dd6864271e535041a630e.yaml index 6cb02e3176..9846c25b52 100644 --- a/nuclei-templates/2019/CVE-2019-9787-21896796785dd6864271e535041a630e.yaml +++ b/nuclei-templates/2019/CVE-2019-9787-21896796785dd6864271e535041a630e.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.1.1 - Cross-Site Request Forgery to Cross-Site Scripting via Comments author: topscoder - severity: critical + severity: medium description: > WordPress before 5.1.1 does not properly filter comment content, leading to Remote Code Execution by unauthenticated users in a default configuration. This occurs because CSRF protection is mishandled, and because Search Engine Optimization of A elements is performed incorrectly, leading to XSS. The XSS results in administrative access, which allows arbitrary changes to .php files. This is related to wp-admin/includes/ajax-actions.php and wp-includes/comment.php. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2019-9787 metadata: shodan-query: 'vuln:CVE-2019-9787' - tags: cve,wordpress,wp-core,critical + tags: cve,wordpress,wp-core,medium http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-9909-a0dbcf6f52eae1325b0e855594e29c09.yaml b/nuclei-templates/2019/CVE-2019-9909-a0dbcf6f52eae1325b0e855594e29c09.yaml index 44e56280bc..b964d6377a 100644 --- a/nuclei-templates/2019/CVE-2019-9909-a0dbcf6f52eae1325b0e855594e29c09.yaml +++ b/nuclei-templates/2019/CVE-2019-9909-a0dbcf6f52eae1325b0e855594e29c09.yaml @@ -4,7 +4,7 @@ info: name: > GiveWP <= 2.3.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The "Donation Plugin and Fundraising Platform" plugin before 2.3.1 for WordPress has wp-admin/edit.php csv XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/give/" google-query: inurl:"/wp-content/plugins/give/" shodan-query: 'vuln:CVE-2019-9909' - tags: cve,wordpress,wp-plugin,give,medium + tags: cve,wordpress,wp-plugin,give,high http: - method: GET diff --git a/nuclei-templates/2019/CVE-2019-9913-84da1bcb85beb132b593a5fff336db83.yaml b/nuclei-templates/2019/CVE-2019-9913-84da1bcb85beb132b593a5fff336db83.yaml index 18badadbd2..e4d7083788 100644 --- a/nuclei-templates/2019/CVE-2019-9913-84da1bcb85beb132b593a5fff336db83.yaml +++ b/nuclei-templates/2019/CVE-2019-9913-84da1bcb85beb132b593a5fff336db83.yaml @@ -4,7 +4,7 @@ info: name: > WP Live Chat Support <= 8.0.17 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The wp-live-chat-support plugin before 8.0.18 for WordPress has wp-admin/admin.php?page=wplivechat-menu-gdpr-page term XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-live-chat-support/" google-query: inurl:"/wp-content/plugins/wp-live-chat-support/" shodan-query: 'vuln:CVE-2019-9913' - tags: cve,wordpress,wp-plugin,wp-live-chat-support,medium + tags: cve,wordpress,wp-plugin,wp-live-chat-support,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-10195-ac28c6a1f49fbad1719d7e09c0190565.yaml b/nuclei-templates/2020/CVE-2020-10195-ac28c6a1f49fbad1719d7e09c0190565.yaml index 709c9c4202..3b7f2fecf7 100644 --- a/nuclei-templates/2020/CVE-2020-10195-ac28c6a1f49fbad1719d7e09c0190565.yaml +++ b/nuclei-templates/2020/CVE-2020-10195-ac28c6a1f49fbad1719d7e09c0190565.yaml @@ -4,7 +4,7 @@ info: name: > Popup Builder <= 3.63 - Authenticated Settings Modification, Configuration Disclosure, and User Data Export author: topscoder - severity: medium + severity: low description: > The Popup Builder plugin before 3.64.1 for WordPress allows information disclosure and settings modification, leading to in-scope privilege escalation via admin-post actions to com/classes/Actions.php. By sending a POST request to wp-admin/admin-post.php, an authenticated attacker with minimal (subscriber-level) permissions can modify the plugin's settings to allow arbitrary roles (including subscribers) access to plugin functionality by setting the action parameter to sgpbSaveSettings, export a list of current newsletter subscribers by setting the action parameter to csv_file, or obtain system configuration information including webserver configuration and a list of installed plugins by setting the action parameter to sgpb_system_info. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/popup-builder/" google-query: inurl:"/wp-content/plugins/popup-builder/" shodan-query: 'vuln:CVE-2020-10195' - tags: cve,wordpress,wp-plugin,popup-builder,medium + tags: cve,wordpress,wp-plugin,popup-builder,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-10257-69db74f4852004f23d22f9fcc0555117.yaml b/nuclei-templates/2020/CVE-2020-10257-69db74f4852004f23d22f9fcc0555117.yaml index da94100cb4..45be86ec62 100644 --- a/nuclei-templates/2020/CVE-2020-10257-69db74f4852004f23d22f9fcc0555117.yaml +++ b/nuclei-templates/2020/CVE-2020-10257-69db74f4852004f23d22f9fcc0555117.yaml @@ -4,7 +4,7 @@ info: name: > ThemeREX Addons (Various Versions) - Missing Authorization author: topscoder - severity: critical + severity: high description: > The ThemeREX Addons plugin for WordPress is vulnerable to Improper Access Control in various versions. This is due to the /trx_addons/v2/get/sc_layout REST API endpoint, allowing for PHP functions to be executed by any users, because includes/plugin.rest-api.php calls trx_addons_rest_get_sc_layout with an unsafe sc parameter. This makes it possible for unauthenticated attackers to execute functions like wp_insert_user, allowing attackers the ability to inject administrative user accounts and take over sites. @@ -19,7 +19,7 @@ info: fofa-query: "wp-content/plugins/trx_addons/" google-query: inurl:"/wp-content/plugins/trx_addons/" shodan-query: 'vuln:CVE-2020-10257' - tags: cve,wordpress,wp-plugin,trx_addons,critical + tags: cve,wordpress,wp-plugin,trx_addons,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-10385-3833fde53c02f881d8b11d577a449782.yaml b/nuclei-templates/2020/CVE-2020-10385-3833fde53c02f881d8b11d577a449782.yaml index e809d17fae..71339735ad 100644 --- a/nuclei-templates/2020/CVE-2020-10385-3833fde53c02f881d8b11d577a449782.yaml +++ b/nuclei-templates/2020/CVE-2020-10385-3833fde53c02f881d8b11d577a449782.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form by WPForms <= 1.5.8.2 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > A stored cross-site scripting (XSS) vulnerability exists in the WPForms Contact Form (aka wpforms-lite) plugin before 1.5.9 for WordPress. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpforms-lite/" google-query: inurl:"/wp-content/plugins/wpforms-lite/" shodan-query: 'vuln:CVE-2020-10385' - tags: cve,wordpress,wp-plugin,wpforms-lite,medium + tags: cve,wordpress,wp-plugin,wpforms-lite,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-10568-15159729e5663620758ffbfa0eee6068.yaml b/nuclei-templates/2020/CVE-2020-10568-15159729e5663620758ffbfa0eee6068.yaml index ce23fe6d9e..4bfe7fa709 100644 --- a/nuclei-templates/2020/CVE-2020-10568-15159729e5663620758ffbfa0eee6068.yaml +++ b/nuclei-templates/2020/CVE-2020-10568-15159729e5663620758ffbfa0eee6068.yaml @@ -4,7 +4,7 @@ info: name: > WPML < 4.3.7 - Cross-Site Request Forgery Bypass author: topscoder - severity: high + severity: medium description: > The sitepress-multilingual-cms (WPML) plugin before 4.3.7 for WordPress has CSRF due to a loose comparison. This leads to remote code execution in includes/class-wp-installer.php via a series of requests that leverage unintended comparisons of integers to strings. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sitepress-multilingual-cms/" google-query: inurl:"/wp-content/plugins/sitepress-multilingual-cms/" shodan-query: 'vuln:CVE-2020-10568' - tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,high + tags: cve,wordpress,wp-plugin,sitepress-multilingual-cms,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-11025-67be7dda8922a0b90c62a801231990f1.yaml b/nuclei-templates/2020/CVE-2020-11025-67be7dda8922a0b90c62a801231990f1.yaml index 81cccabe56..8c2eee1911 100644 --- a/nuclei-templates/2020/CVE-2020-11025-67be7dda8922a0b90c62a801231990f1.yaml +++ b/nuclei-templates/2020/CVE-2020-11025-67be7dda8922a0b90c62a801231990f1.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.4.1 - Authenticated Cross-Site Scripting via Customizer author: topscoder - severity: medium + severity: low description: > In affected versions of WordPress, a cross-site scripting (XSS) vulnerability in the navigation section of Customizer allows JavaScript code to be executed. Exploitation requires an authenticated user. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33). reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2020-11025 metadata: shodan-query: 'vuln:CVE-2020-11025' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-11026-f3aa50bf420b4235c2de996ef5d37967.yaml b/nuclei-templates/2020/CVE-2020-11026-f3aa50bf420b4235c2de996ef5d37967.yaml index b78869349d..952db936ce 100644 --- a/nuclei-templates/2020/CVE-2020-11026-f3aa50bf420b4235c2de996ef5d37967.yaml +++ b/nuclei-templates/2020/CVE-2020-11026-f3aa50bf420b4235c2de996ef5d37967.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.4.1 - Authenticated (Author+) Cross-Site Scripting via File Uploads author: topscoder - severity: medium + severity: low description: > In affected versions of WordPress, files with a specially crafted name when uploaded to the Media section can lead to script execution upon accessing the file. This requires an authenticated user with privileges to upload files. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33). reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2020-11026 metadata: shodan-query: 'vuln:CVE-2020-11026' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-11030-773aca706a31e2409dfb4bd8f1fa9e33.yaml b/nuclei-templates/2020/CVE-2020-11030-773aca706a31e2409dfb4bd8f1fa9e33.yaml index 06b9740ede..49742921c4 100644 --- a/nuclei-templates/2020/CVE-2020-11030-773aca706a31e2409dfb4bd8f1fa9e33.yaml +++ b/nuclei-templates/2020/CVE-2020-11030-773aca706a31e2409dfb4bd8f1fa9e33.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.4.1 - Cross-Site Scripting in the Block Editor author: topscoder - severity: medium + severity: high description: > In affected versions of WordPress, a special payload can be crafted that can lead to scripts getting executed within the search block of the block editor. This requires an authenticated user with the ability to add content. This has been patched in version 5.4.1, along with all the previously affected versions via a minor release (5.3.3, 5.2.6, 5.1.5, 5.0.9, 4.9.14, 4.8.13, 4.7.17, 4.6.18, 4.5.21, 4.4.22, 4.3.23, 4.2.27, 4.1.30, 4.0.30, 3.9.31, 3.8.33, 3.7.33). reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2020-11030 metadata: shodan-query: 'vuln:CVE-2020-11030' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-11508-5b689436673a442f720046bb44c5bd16.yaml b/nuclei-templates/2020/CVE-2020-11508-5b689436673a442f720046bb44c5bd16.yaml index 7329af8bef..9da5d93d07 100644 --- a/nuclei-templates/2020/CVE-2020-11508-5b689436673a442f720046bb44c5bd16.yaml +++ b/nuclei-templates/2020/CVE-2020-11508-5b689436673a442f720046bb44c5bd16.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Landing Page – Squeeze Page – Responsive Landing Page Builder Free – WP Lead Plus X <= 0.98 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > An XSS vulnerability in the WP Lead Plus X plugin through 0.98 for WordPress allows logged-in users with minimal permissions to create or replace existing pages with a malicious page containing arbitrary JavaScript via the wp_ajax_core37_lp_save_page (aka core37_lp_save_page) AJAX action. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make/" google-query: inurl:"/wp-content/plugins/free-sales-funnel-squeeze-pages-landing-page-builder-templates-make/" shodan-query: 'vuln:CVE-2020-11508' - tags: cve,wordpress,wp-plugin,free-sales-funnel-squeeze-pages-landing-page-builder-templates-make,medium + tags: cve,wordpress,wp-plugin,free-sales-funnel-squeeze-pages-landing-page-builder-templates-make,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-11510-1090bbe0593e4ecda3fb75c3e6d7bf93.yaml b/nuclei-templates/2020/CVE-2020-11510-1090bbe0593e4ecda3fb75c3e6d7bf93.yaml index fa442fee21..2df74a35a9 100644 --- a/nuclei-templates/2020/CVE-2020-11510-1090bbe0593e4ecda3fb75c3e6d7bf93.yaml +++ b/nuclei-templates/2020/CVE-2020-11510-1090bbe0593e4ecda3fb75c3e6d7bf93.yaml @@ -4,7 +4,7 @@ info: name: > LearnPress <= 3.2.6.8 - Authenticated Page Creation and Status Modification author: topscoder - severity: high + severity: low description: > Versions below 3.2.6.9 allow an attacker to publish or trash any existing post or page, or even set it to a nonexistent status, at which point it would no longer appear on the site or be accessible from wp-admin, and could only be recovered by modifying its status in the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/learnpress/" google-query: inurl:"/wp-content/plugins/learnpress/" shodan-query: 'vuln:CVE-2020-11510' - tags: cve,wordpress,wp-plugin,learnpress,high + tags: cve,wordpress,wp-plugin,learnpress,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-11512-74e3a5823f9cf5e58e6b984ee0054047.yaml b/nuclei-templates/2020/CVE-2020-11512-74e3a5823f9cf5e58e6b984ee0054047.yaml index 98ede6a501..670af95900 100644 --- a/nuclei-templates/2020/CVE-2020-11512-74e3a5823f9cf5e58e6b984ee0054047.yaml +++ b/nuclei-templates/2020/CVE-2020-11512-74e3a5823f9cf5e58e6b984ee0054047.yaml @@ -4,7 +4,7 @@ info: name: > IMPress for IDX Broker <= 2.6.1 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Stored XSS in the IMPress for IDX Broker WordPress plugin before 2.6.2 allows authenticated attackers with minimal (subscriber-level) permissions to save arbitrary JavaScript in the plugin's settings panel via the idx_update_recaptcha_key AJAX action and a crafted idx_recaptcha_site_key parameter, which would then be executed in the browser of any administrator visiting the panel. This could be used to create new administrator-level accounts. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/idx-broker-platinum/" google-query: inurl:"/wp-content/plugins/idx-broker-platinum/" shodan-query: 'vuln:CVE-2020-11512' - tags: cve,wordpress,wp-plugin,idx-broker-platinum,medium + tags: cve,wordpress,wp-plugin,idx-broker-platinum,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-11516-dd80fd1aa8e8ecdfc56af18872d295e2.yaml b/nuclei-templates/2020/CVE-2020-11516-dd80fd1aa8e8ecdfc56af18872d295e2.yaml index 2460376796..7932bbd87b 100644 --- a/nuclei-templates/2020/CVE-2020-11516-dd80fd1aa8e8ecdfc56af18872d295e2.yaml +++ b/nuclei-templates/2020/CVE-2020-11516-dd80fd1aa8e8ecdfc56af18872d295e2.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form 7 Datepicker <= 2.6.0 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Stored XSS in the Contact Form 7 Datepicker plugin through 2.6.0 for WordPress allows authenticated attackers with minimal permissions to save arbitrary JavaScript to the plugin's settings via the unprotected wp_ajax_cf7dp_save_settings AJAX action and the ui_theme parameter. If an administrator creates or modifies a contact form, the JavaScript will be executed in their browser, which can then be used to create new administrative users or perform other actions using the administrator's session. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-7-datepicker/" google-query: inurl:"/wp-content/plugins/contact-form-7-datepicker/" shodan-query: 'vuln:CVE-2020-11516' - tags: cve,wordpress,wp-plugin,contact-form-7-datepicker,medium + tags: cve,wordpress,wp-plugin,contact-form-7-datepicker,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-11673-a7b9bf475d14b8ef039f5657643818f1.yaml b/nuclei-templates/2020/CVE-2020-11673-a7b9bf475d14b8ef039f5657643818f1.yaml index fc33b4c395..6a7cacbd6d 100644 --- a/nuclei-templates/2020/CVE-2020-11673-a7b9bf475d14b8ef039f5657643818f1.yaml +++ b/nuclei-templates/2020/CVE-2020-11673-a7b9bf475d14b8ef039f5657643818f1.yaml @@ -4,7 +4,7 @@ info: name: > TS Poll – Best Poll Plugin for WordPress <1.3.4 - Missing Authorization author: topscoder - severity: critical + severity: high description: > The TS Poll – Best Poll Plugin for WordPress plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the 'wp_ajax_nopriv' function in versions up to, and including, 1.3.4. This makes it possible for unauthenticated attackers to to manipulate polls, e.g., delete, clone, or view a hidden poll. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/poll-wp/" google-query: inurl:"/wp-content/plugins/poll-wp/" shodan-query: 'vuln:CVE-2020-11673' - tags: cve,wordpress,wp-plugin,poll-wp,critical + tags: cve,wordpress,wp-plugin,poll-wp,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-11727-8cd31768dc61f0033829ab9bfd911338.yaml b/nuclei-templates/2020/CVE-2020-11727-8cd31768dc61f0033829ab9bfd911338.yaml index 38d0401897..be1c514d0e 100644 --- a/nuclei-templates/2020/CVE-2020-11727-8cd31768dc61f0033829ab9bfd911338.yaml +++ b/nuclei-templates/2020/CVE-2020-11727-8cd31768dc61f0033829ab9bfd911338.yaml @@ -4,7 +4,7 @@ info: name: > Advanced Order Export for WooCommerce <= 3.1.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > A cross-site scripting (XSS) vulnerability in the AlgolPlus Advanced Order Export For WooCommerce plugin 3.1.3 for WordPress allows remote attackers to inject arbitrary web script or HTML via the view/settings-form.php woe_post_type parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/woo-order-export-lite/" google-query: inurl:"/wp-content/plugins/woo-order-export-lite/" shodan-query: 'vuln:CVE-2020-11727' - tags: cve,wordpress,wp-plugin,woo-order-export-lite,medium + tags: cve,wordpress,wp-plugin,woo-order-export-lite,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-11731-2e52fc4f7a8504883023eba2284cc957.yaml b/nuclei-templates/2020/CVE-2020-11731-2e52fc4f7a8504883023eba2284cc957.yaml index c36976e9e7..4969fb0a28 100644 --- a/nuclei-templates/2020/CVE-2020-11731-2e52fc4f7a8504883023eba2284cc957.yaml +++ b/nuclei-templates/2020/CVE-2020-11731-2e52fc4f7a8504883023eba2284cc957.yaml @@ -4,7 +4,7 @@ info: name: > Media Library Assistant <= 2.81 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Media Library Assistant plugin before 2.82 for Wordpress suffers from multiple XSS vulnerabilities in all Settings/Media Library Assistant tabs, which allow remote authenticated users to execute arbitrary JavaScript. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/media-library-assistant/" google-query: inurl:"/wp-content/plugins/media-library-assistant/" shodan-query: 'vuln:CVE-2020-11731' - tags: cve,wordpress,wp-plugin,media-library-assistant,medium + tags: cve,wordpress,wp-plugin,media-library-assistant,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-11732-c35f9ed6b93a44d06dd09e34e66b7586.yaml b/nuclei-templates/2020/CVE-2020-11732-c35f9ed6b93a44d06dd09e34e66b7586.yaml index 511e7fe926..96b651c154 100644 --- a/nuclei-templates/2020/CVE-2020-11732-c35f9ed6b93a44d06dd09e34e66b7586.yaml +++ b/nuclei-templates/2020/CVE-2020-11732-c35f9ed6b93a44d06dd09e34e66b7586.yaml @@ -4,7 +4,7 @@ info: name: > Media Library Assistant <= 2.81 - Local File Inclusion author: topscoder - severity: high + severity: critical description: > The Media Library Assistant plugin before 2.82 for Wordpress suffers from a Local File Inclusion vulnerability in mla_gallery link=download. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/media-library-assistant/" google-query: inurl:"/wp-content/plugins/media-library-assistant/" shodan-query: 'vuln:CVE-2020-11732' - tags: cve,wordpress,wp-plugin,media-library-assistant,high + tags: cve,wordpress,wp-plugin,media-library-assistant,critical http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-11738-84e8025814ede80f77a1696e5326822b.yaml b/nuclei-templates/2020/CVE-2020-11738-84e8025814ede80f77a1696e5326822b.yaml index 6fb194315b..a334f42271 100644 --- a/nuclei-templates/2020/CVE-2020-11738-84e8025814ede80f77a1696e5326822b.yaml +++ b/nuclei-templates/2020/CVE-2020-11738-84e8025814ede80f77a1696e5326822b.yaml @@ -14,17 +14,17 @@ info: cvss-score: 7.5 cve-id: CVE-2020-11738 metadata: - fofa-query: "wp-content/plugins/duplicator-pro/" - google-query: inurl:"/wp-content/plugins/duplicator-pro/" + fofa-query: "wp-content/plugins/duplicator/" + google-query: inurl:"/wp-content/plugins/duplicator/" shodan-query: 'vuln:CVE-2020-11738' - tags: cve,wordpress,wp-plugin,duplicator-pro,high + tags: cve,wordpress,wp-plugin,duplicator,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/duplicator-pro/readme.txt" + - "{{BaseURL}}/wp-content/plugins/duplicator/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "duplicator-pro" + - "duplicator" part: body - type: dsl dsl: - - compare_versions(version, '< 3.8.7.1') \ No newline at end of file + - compare_versions(version, '< 1.3.28') \ No newline at end of file diff --git a/nuclei-templates/2020/CVE-2020-12074-0088814ed74fd156e9ee132de51ef1d2.yaml b/nuclei-templates/2020/CVE-2020-12074-0088814ed74fd156e9ee132de51ef1d2.yaml index 0261a14957..a5d7e4ec61 100644 --- a/nuclei-templates/2020/CVE-2020-12074-0088814ed74fd156e9ee132de51ef1d2.yaml +++ b/nuclei-templates/2020/CVE-2020-12074-0088814ed74fd156e9ee132de51ef1d2.yaml @@ -14,17 +14,17 @@ info: cvss-score: 8.8 cve-id: CVE-2020-12074 metadata: - fofa-query: "wp-content/plugins/product-reviews-import-export-for-woocommerce/" - google-query: inurl:"/wp-content/plugins/product-reviews-import-export-for-woocommerce/" + fofa-query: "wp-content/plugins/order-import-export-for-woocommerce/" + google-query: inurl:"/wp-content/plugins/order-import-export-for-woocommerce/" shodan-query: 'vuln:CVE-2020-12074' - tags: cve,wordpress,wp-plugin,product-reviews-import-export-for-woocommerce,high + tags: cve,wordpress,wp-plugin,order-import-export-for-woocommerce,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/product-reviews-import-export-for-woocommerce/readme.txt" + - "{{BaseURL}}/wp-content/plugins/order-import-export-for-woocommerce/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "product-reviews-import-export-for-woocommerce" + - "order-import-export-for-woocommerce" part: body - type: dsl dsl: - - compare_versions(version, '< 1.3.3') \ No newline at end of file + - compare_versions(version, '< 1.6.1') \ No newline at end of file diff --git a/nuclei-templates/2020/CVE-2020-12074-1ebbd9b3a9a4deb3ba553d086f3295e1.yaml b/nuclei-templates/2020/CVE-2020-12074-1ebbd9b3a9a4deb3ba553d086f3295e1.yaml index cae14f7f9f..79cbfa4f7b 100644 --- a/nuclei-templates/2020/CVE-2020-12074-1ebbd9b3a9a4deb3ba553d086f3295e1.yaml +++ b/nuclei-templates/2020/CVE-2020-12074-1ebbd9b3a9a4deb3ba553d086f3295e1.yaml @@ -4,7 +4,7 @@ info: name: > Product Import Export for WooCommerce <= 1.7.4 - Missing Authorization to CSV Import author: topscoder - severity: medium + severity: high description: > The Product Import Export for WooCommerce plugin for WordPress is vulnerable to authorization bypass in versions up to, and including 1.7.4 due to missing capability checks on the woocommerce_csv_import_request AJAX action. This makes it possible for authenticated attackers with minimal permissions, such as subscribers, to import products for WooCommerce. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/product-import-export-for-woo/" google-query: inurl:"/wp-content/plugins/product-import-export-for-woo/" shodan-query: 'vuln:CVE-2020-12074' - tags: cve,wordpress,wp-plugin,product-import-export-for-woo,medium + tags: cve,wordpress,wp-plugin,product-import-export-for-woo,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-12075-3ca2d0288841fb102eec504b49f4dc79.yaml b/nuclei-templates/2020/CVE-2020-12075-3ca2d0288841fb102eec504b49f4dc79.yaml index 80fc78d71e..8a0ea47642 100644 --- a/nuclei-templates/2020/CVE-2020-12075-3ca2d0288841fb102eec504b49f4dc79.yaml +++ b/nuclei-templates/2020/CVE-2020-12075-3ca2d0288841fb102eec504b49f4dc79.yaml @@ -4,7 +4,7 @@ info: name: > Data Tables Generator by Supsystic <= 1.9.91 - Missing Authorization on AJAX Actions author: topscoder - severity: medium + severity: high description: > The data-tables-generator-by-supsystic plugin before 1.9.92 for WordPress lacks capability checks for AJAX actions. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/data-tables-generator-by-supsystic/" google-query: inurl:"/wp-content/plugins/data-tables-generator-by-supsystic/" shodan-query: 'vuln:CVE-2020-12075' - tags: cve,wordpress,wp-plugin,data-tables-generator-by-supsystic,medium + tags: cve,wordpress,wp-plugin,data-tables-generator-by-supsystic,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-12076-384cfba7d4e3422564ffd94f08c53230.yaml b/nuclei-templates/2020/CVE-2020-12076-384cfba7d4e3422564ffd94f08c53230.yaml index a0d9ada892..596f90f5c6 100644 --- a/nuclei-templates/2020/CVE-2020-12076-384cfba7d4e3422564ffd94f08c53230.yaml +++ b/nuclei-templates/2020/CVE-2020-12076-384cfba7d4e3422564ffd94f08c53230.yaml @@ -4,7 +4,7 @@ info: name: > Data Tables Generator by Supsystic <= 1.9.91 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Data Tables Generator by Supsystic plugin before 1.9.92 for WordPress lacks CSRF nonce checks for AJAX actions. One consequence of this is stored XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/data-tables-generator-by-supsystic/" google-query: inurl:"/wp-content/plugins/data-tables-generator-by-supsystic/" shodan-query: 'vuln:CVE-2020-12076' - tags: cve,wordpress,wp-plugin,data-tables-generator-by-supsystic,high + tags: cve,wordpress,wp-plugin,data-tables-generator-by-supsystic,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-12077-6bf1979859a94fbe33542b88abb0e15d.yaml b/nuclei-templates/2020/CVE-2020-12077-6bf1979859a94fbe33542b88abb0e15d.yaml index bf64b37ea8..b1e97861f9 100644 --- a/nuclei-templates/2020/CVE-2020-12077-6bf1979859a94fbe33542b88abb0e15d.yaml +++ b/nuclei-templates/2020/CVE-2020-12077-6bf1979859a94fbe33542b88abb0e15d.yaml @@ -4,7 +4,7 @@ info: name: > MapPress Maps for WordPress <=2.53.8 - Authenticated Map Creation/Deletion to Stored Cross-Site Scripting & Remote Code Execution author: topscoder - severity: medium + severity: low description: > The mappress-google-maps-for-wordpress plugin before 2.53.9 for WordPress does not correctly implement AJAX functions with nonces (or capability checks), leading to remote code execution. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mappress-google-maps-for-wordpress/" google-query: inurl:"/wp-content/plugins/mappress-google-maps-for-wordpress/" shodan-query: 'vuln:CVE-2020-12077' - tags: cve,wordpress,wp-plugin,mappress-google-maps-for-wordpress,medium + tags: cve,wordpress,wp-plugin,mappress-google-maps-for-wordpress,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-12104-84ddf5342f72d908358cc5325eb7e319.yaml b/nuclei-templates/2020/CVE-2020-12104-84ddf5342f72d908358cc5325eb7e319.yaml index 482cb08953..eeb1f23ac7 100644 --- a/nuclei-templates/2020/CVE-2020-12104-84ddf5342f72d908358cc5325eb7e319.yaml +++ b/nuclei-templates/2020/CVE-2020-12104-84ddf5342f72d908358cc5325eb7e319.yaml @@ -4,7 +4,7 @@ info: name: > WordPress WP-Advanced-Search <= 3.3.6 - SQL Injection author: topscoder - severity: high + severity: critical description: > The Import feature in the wp-advanced-search plugin 3.3.6 for WordPress is vulnerable to authenticated SQL injection via an uploaded .sql file. An attacker can use this to execute SQL commands without any validation. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-advanced-search/" google-query: inurl:"/wp-content/plugins/wp-advanced-search/" shodan-query: 'vuln:CVE-2020-12104' - tags: cve,wordpress,wp-plugin,wp-advanced-search,high + tags: cve,wordpress,wp-plugin,wp-advanced-search,critical http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-12675-a32c5004dd8e3051476b1d2ace4665f9.yaml b/nuclei-templates/2020/CVE-2020-12675-a32c5004dd8e3051476b1d2ace4665f9.yaml index 270f7d7a08..3af8a2d76e 100644 --- a/nuclei-templates/2020/CVE-2020-12675-a32c5004dd8e3051476b1d2ace4665f9.yaml +++ b/nuclei-templates/2020/CVE-2020-12675-a32c5004dd8e3051476b1d2ace4665f9.yaml @@ -4,7 +4,7 @@ info: name: > MapPress Maps <= 2.54.5 - Remote Code Execution via Improper Capability Checks in AJAX Calls author: topscoder - severity: high + severity: critical description: > The mappress-google-maps-for-wordpress plugin before 2.54.6 for WordPress does not correctly implement capability checks for AJAX functions related to creation/retrieval/deletion of PHP template files, leading to Remote Code Execution. NOTE: this issue exists because of an incomplete fix for CVE-2020-12077. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/mappress-google-maps-for-wordpress/" google-query: inurl:"/wp-content/plugins/mappress-google-maps-for-wordpress/" shodan-query: 'vuln:CVE-2020-12675' - tags: cve,wordpress,wp-plugin,mappress-google-maps-for-wordpress,high + tags: cve,wordpress,wp-plugin,mappress-google-maps-for-wordpress,critical http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-12696-731244d7e48d469d8250ca7d6169422e.yaml b/nuclei-templates/2020/CVE-2020-12696-731244d7e48d469d8250ca7d6169422e.yaml index 3cab62b23b..c0dad45da9 100644 --- a/nuclei-templates/2020/CVE-2020-12696-731244d7e48d469d8250ca7d6169422e.yaml +++ b/nuclei-templates/2020/CVE-2020-12696-731244d7e48d469d8250ca7d6169422e.yaml @@ -4,7 +4,7 @@ info: name: > iframe <= 4.4 - Authenticated Stored Cross Site Scripting author: topscoder - severity: medium + severity: low description: > The iframe plugin before 4.5 for WordPress does not sanitize a URL. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/iframe/" google-query: inurl:"/wp-content/plugins/iframe/" shodan-query: 'vuln:CVE-2020-12696' - tags: cve,wordpress,wp-plugin,iframe,medium + tags: cve,wordpress,wp-plugin,iframe,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-13126-68b5f15989ca60b284d4dce6601af76b.yaml b/nuclei-templates/2020/CVE-2020-13126-68b5f15989ca60b284d4dce6601af76b.yaml index 5040e3552a..8bfd193886 100644 --- a/nuclei-templates/2020/CVE-2020-13126-68b5f15989ca60b284d4dce6601af76b.yaml +++ b/nuclei-templates/2020/CVE-2020-13126-68b5f15989ca60b284d4dce6601af76b.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Pro <= 2.9.3 - Authenticated (Subscriber+) Arbitrary File Upload author: topscoder - severity: critical + severity: low description: > An issue was discovered in the Elementor Pro plugin before 2.9.4 for WordPress, as exploited in the wild in May 2020 in conjunction with CVE-2020-13125. An attacker with the Subscriber role can upload arbitrary executable files to achieve remote code execution. NOTE: the free Elementor plugin is unaffected. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/elementor-pro/" google-query: inurl:"/wp-content/plugins/elementor-pro/" shodan-query: 'vuln:CVE-2020-13126' - tags: cve,wordpress,wp-plugin,elementor-pro,critical + tags: cve,wordpress,wp-plugin,elementor-pro,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-13487-a08c651ad045a182d61e4a734b04e24d.yaml b/nuclei-templates/2020/CVE-2020-13487-a08c651ad045a182d61e4a734b04e24d.yaml index 761f3f7c3e..1235ae1158 100644 --- a/nuclei-templates/2020/CVE-2020-13487-a08c651ad045a182d61e4a734b04e24d.yaml +++ b/nuclei-templates/2020/CVE-2020-13487-a08c651ad045a182d61e4a734b04e24d.yaml @@ -4,7 +4,7 @@ info: name: > bbPress <= 2.6.4 - Authenticated (Admin+) Stored Cross-Site Scripting via the forums list table author: topscoder - severity: medium + severity: low description: > The bbPress plugin through 2.6.4 for WordPress has stored XSS in the Forum creation section, resulting in JavaScript execution at wp-admin/edit.php?post_type=forum (aka the Forum listing page) for all users. An administrator can exploit this at the wp-admin/post.php?action=edit URI. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/bbpress/" google-query: inurl:"/wp-content/plugins/bbpress/" shodan-query: 'vuln:CVE-2020-13487' - tags: cve,wordpress,wp-plugin,bbpress,medium + tags: cve,wordpress,wp-plugin,bbpress,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-13641-8de354ee8a09f1e40abb305d774cf1ed.yaml b/nuclei-templates/2020/CVE-2020-13641-8de354ee8a09f1e40abb305d774cf1ed.yaml index 964f29608d..cc6db545fd 100644 --- a/nuclei-templates/2020/CVE-2020-13641-8de354ee8a09f1e40abb305d774cf1ed.yaml +++ b/nuclei-templates/2020/CVE-2020-13641-8de354ee8a09f1e40abb305d774cf1ed.yaml @@ -4,7 +4,7 @@ info: name: > Real-Time Find and Replace <= 3.9 - Cross-Site Request Forgery to Stored Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > An issue was discovered in the Real-Time Find and Replace plugin before 4.0.2 for WordPress. The far_options_page function did not do any nonce verification, allowing for requests to be forged on behalf of an administrator. The find and replace rules could be updated with malicious JavaScript, allowing for that be executed later in the victims browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/real-time-find-and-replace/" google-query: inurl:"/wp-content/plugins/real-time-find-and-replace/" shodan-query: 'vuln:CVE-2020-13641' - tags: cve,wordpress,wp-plugin,real-time-find-and-replace,high + tags: cve,wordpress,wp-plugin,real-time-find-and-replace,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-13642-7df5e5754fb5a3c3ef39f58481635571.yaml b/nuclei-templates/2020/CVE-2020-13642-7df5e5754fb5a3c3ef39f58481635571.yaml index 9de402298c..f57d35600e 100644 --- a/nuclei-templates/2020/CVE-2020-13642-7df5e5754fb5a3c3ef39f58481635571.yaml +++ b/nuclei-templates/2020/CVE-2020-13642-7df5e5754fb5a3c3ef39f58481635571.yaml @@ -4,7 +4,7 @@ info: name: > Page Builder by SiteOrigin <= 2.10.15 - Cross-Site Request Forgery to Reflected Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > An issue was discovered in the SiteOrigin Page Builder plugin before 2.10.16 for WordPress. The action_builder_content function did not do any nonce verification, allowing for requests to be forged on behalf of an administrator. The panels_data $_POST variable allows for malicious JavaScript to be executed in the victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/siteorigin-panels/" google-query: inurl:"/wp-content/plugins/siteorigin-panels/" shodan-query: 'vuln:CVE-2020-13642' - tags: cve,wordpress,wp-plugin,siteorigin-panels,high + tags: cve,wordpress,wp-plugin,siteorigin-panels,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-13643-86d73827337d8244a557bb98a9e7b2f5.yaml b/nuclei-templates/2020/CVE-2020-13643-86d73827337d8244a557bb98a9e7b2f5.yaml index f56349c112..88b236031a 100644 --- a/nuclei-templates/2020/CVE-2020-13643-86d73827337d8244a557bb98a9e7b2f5.yaml +++ b/nuclei-templates/2020/CVE-2020-13643-86d73827337d8244a557bb98a9e7b2f5.yaml @@ -4,7 +4,7 @@ info: name: > Page Builder by SiteOrigin <= 2.10.15 - Cross-Site Request Forgery to Reflected Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > An issue was discovered in the SiteOrigin Page Builder plugin before 2.10.16 for WordPress. The live editor feature did not do any nonce verification, allowing for requests to be forged on behalf of an administrator. The live_editor_panels_data $_POST variable allows for malicious JavaScript to be executed in the victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/siteorigin-panels/" google-query: inurl:"/wp-content/plugins/siteorigin-panels/" shodan-query: 'vuln:CVE-2020-13643' - tags: cve,wordpress,wp-plugin,siteorigin-panels,high + tags: cve,wordpress,wp-plugin,siteorigin-panels,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-13864-5f7ca58c2ad3d25f19da443baa193352.yaml b/nuclei-templates/2020/CVE-2020-13864-5f7ca58c2ad3d25f19da443baa193352.yaml index 91eaa18e80..e7a56c77b6 100644 --- a/nuclei-templates/2020/CVE-2020-13864-5f7ca58c2ad3d25f19da443baa193352.yaml +++ b/nuclei-templates/2020/CVE-2020-13864-5f7ca58c2ad3d25f19da443baa193352.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Website Builder <= 2.9.8 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Elementor Website Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/elementor/" google-query: inurl:"/wp-content/plugins/elementor/" shodan-query: 'vuln:CVE-2020-13864' - tags: cve,wordpress,wp-plugin,elementor,medium + tags: cve,wordpress,wp-plugin,elementor,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-13865-c04510d8ae6604902066b55cfed338f7.yaml b/nuclei-templates/2020/CVE-2020-13865-c04510d8ae6604902066b55cfed338f7.yaml index 30107b095f..bddb598b76 100644 --- a/nuclei-templates/2020/CVE-2020-13865-c04510d8ae6604902066b55cfed338f7.yaml +++ b/nuclei-templates/2020/CVE-2020-13865-c04510d8ae6604902066b55cfed338f7.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Website Builder <= 2.9.8 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Elementor Website Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/elementor/" google-query: inurl:"/wp-content/plugins/elementor/" shodan-query: 'vuln:CVE-2020-13865' - tags: cve,wordpress,wp-plugin,elementor,medium + tags: cve,wordpress,wp-plugin,elementor,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-13892-6844db7940c370d06922bd9c5958a18b.yaml b/nuclei-templates/2020/CVE-2020-13892-6844db7940c370d06922bd9c5958a18b.yaml index 92368dfe1a..566401fcb2 100644 --- a/nuclei-templates/2020/CVE-2020-13892-6844db7940c370d06922bd9c5958a18b.yaml +++ b/nuclei-templates/2020/CVE-2020-13892-6844db7940c370d06922bd9c5958a18b.yaml @@ -4,7 +4,7 @@ info: name: > SportsPress <= 2.7.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The SportsPress plugin before 2.7.2 for WordPress allows XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sportspress/" google-query: inurl:"/wp-content/plugins/sportspress/" shodan-query: 'vuln:CVE-2020-13892' - tags: cve,wordpress,wp-plugin,sportspress,medium + tags: cve,wordpress,wp-plugin,sportspress,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-14959-63f488767eed871fd699454a474174aa.yaml b/nuclei-templates/2020/CVE-2020-14959-63f488767eed871fd699454a474174aa.yaml index 55abf99d44..3306bec5b5 100644 --- a/nuclei-templates/2020/CVE-2020-14959-63f488767eed871fd699454a474174aa.yaml +++ b/nuclei-templates/2020/CVE-2020-14959-63f488767eed871fd699454a474174aa.yaml @@ -4,7 +4,7 @@ info: name: > Easy Testimonials <= 3.5.2 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Multiple XSS vulnerabilities in the Easy Testimonials plugin before 3.6 for WordPress allow remote attackers to inject arbitrary web script or HTML via the wp-admin/post.php Client Name, Position, Web Address, Other, Location Reviewed, Product Reviewed, Item Reviewed, or Rating parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-testimonials/" google-query: inurl:"/wp-content/plugins/easy-testimonials/" shodan-query: 'vuln:CVE-2020-14959' - tags: cve,wordpress,wp-plugin,easy-testimonials,medium + tags: cve,wordpress,wp-plugin,easy-testimonials,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-14962-45a46be6bf0ef23f92774359273b99be.yaml b/nuclei-templates/2020/CVE-2020-14962-45a46be6bf0ef23f92774359273b99be.yaml index 0a429dd859..9be9e0dd12 100644 --- a/nuclei-templates/2020/CVE-2020-14962-45a46be6bf0ef23f92774359273b99be.yaml +++ b/nuclei-templates/2020/CVE-2020-14962-45a46be6bf0ef23f92774359273b99be.yaml @@ -4,7 +4,7 @@ info: name: > Final Tiles Gallery <= 3.4.18 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Multiple XSS vulnerabilities in the Final Tiles Gallery plugin before 3.4.19 for WordPress allow remote attackers to inject arbitrary web script or HTML via the Title (aka imageTitle) or Caption (aka description) field of an image to wp-admin/admin-ajax.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/final-tiles-grid-gallery-lite/" google-query: inurl:"/wp-content/plugins/final-tiles-grid-gallery-lite/" shodan-query: 'vuln:CVE-2020-14962' - tags: cve,wordpress,wp-plugin,final-tiles-grid-gallery-lite,medium + tags: cve,wordpress,wp-plugin,final-tiles-grid-gallery-lite,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-15020-151a3d01fba73eb2e03af896af5366b4.yaml b/nuclei-templates/2020/CVE-2020-15020-151a3d01fba73eb2e03af896af5366b4.yaml index a2887457b7..8269dcc9e3 100644 --- a/nuclei-templates/2020/CVE-2020-15020-151a3d01fba73eb2e03af896af5366b4.yaml +++ b/nuclei-templates/2020/CVE-2020-15020-151a3d01fba73eb2e03af896af5366b4.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Website Builder <= 2.9.13 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > An issue was discovered in the Elementor plugin through 2.9.13 for WordPress. An authenticated attacker can achieve stored XSS via the Name Your Template field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/elementor/" google-query: inurl:"/wp-content/plugins/elementor/" shodan-query: 'vuln:CVE-2020-15020' - tags: cve,wordpress,wp-plugin,elementor,medium + tags: cve,wordpress,wp-plugin,elementor,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-15038-fbe96ae280b99abe5e90ec130aefb23d.yaml b/nuclei-templates/2020/CVE-2020-15038-fbe96ae280b99abe5e90ec130aefb23d.yaml index 20131c8d45..b2a49a1e9f 100644 --- a/nuclei-templates/2020/CVE-2020-15038-fbe96ae280b99abe5e90ec130aefb23d.yaml +++ b/nuclei-templates/2020/CVE-2020-15038-fbe96ae280b99abe5e90ec130aefb23d.yaml @@ -4,7 +4,7 @@ info: name: > Coming Soon Page by SeedProd <= 5.1.1 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The SeedProd Coming Soon plugin before 5.1.2 for WordPress allows XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/coming-soon/" google-query: inurl:"/wp-content/plugins/coming-soon/" shodan-query: 'vuln:CVE-2020-15038' - tags: cve,wordpress,wp-plugin,coming-soon,medium + tags: cve,wordpress,wp-plugin,coming-soon,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-15364-a1ee8803b42d3b197599b6095f91fefd.yaml b/nuclei-templates/2020/CVE-2020-15364-a1ee8803b42d3b197599b6095f91fefd.yaml index b62b8782c5..342fac4ff9 100644 --- a/nuclei-templates/2020/CVE-2020-15364-a1ee8803b42d3b197599b6095f91fefd.yaml +++ b/nuclei-templates/2020/CVE-2020-15364-a1ee8803b42d3b197599b6095f91fefd.yaml @@ -4,7 +4,7 @@ info: name: > Nexos - Real Estate WordPress Theme < 1.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Nexos theme through 1.7 for WordPress allows top-map/?search_location= reflected XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/nexos/" google-query: inurl:"/wp-content/themes/nexos/" shodan-query: 'vuln:CVE-2020-15364' - tags: cve,wordpress,wp-theme,nexos,medium + tags: cve,wordpress,wp-theme,nexos,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-15535-e6c806cffb708ac14203b6a177746aad.yaml b/nuclei-templates/2020/CVE-2020-15535-e6c806cffb708ac14203b6a177746aad.yaml index b4cbd455b6..8468468c3a 100644 --- a/nuclei-templates/2020/CVE-2020-15535-e6c806cffb708ac14203b6a177746aad.yaml +++ b/nuclei-templates/2020/CVE-2020-15535-e6c806cffb708ac14203b6a177746aad.yaml @@ -4,7 +4,7 @@ info: name: > Car Rental System <= 1.3 - Unauthenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An issue was discovered in the bestsoftinc Car Rental System plugin through 1.3 for WordPress. Persistent XSS can occur via any of the registration fields. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/car/" google-query: inurl:"/wp-content/plugins/car/" shodan-query: 'vuln:CVE-2020-15535' - tags: cve,wordpress,wp-plugin,car,medium + tags: cve,wordpress,wp-plugin,car,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-15537-eef4fef4e9f3255888f8b403eb0a1916.yaml b/nuclei-templates/2020/CVE-2020-15537-eef4fef4e9f3255888f8b403eb0a1916.yaml index c883554ba1..184eb9572a 100644 --- a/nuclei-templates/2020/CVE-2020-15537-eef4fef4e9f3255888f8b403eb0a1916.yaml +++ b/nuclei-templates/2020/CVE-2020-15537-eef4fef4e9f3255888f8b403eb0a1916.yaml @@ -4,7 +4,7 @@ info: name: > Vanguard - Marketplace Digital Products PHP7 <= 2.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An issue was discovered in the Vanguard plugin 2.1 for WordPress. XSS can occur via the mails/new title field, a product field to the p/ URI, or the Products Search box. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/vanguard/" google-query: inurl:"/wp-content/plugins/vanguard/" shodan-query: 'vuln:CVE-2020-15537' - tags: cve,wordpress,wp-plugin,vanguard,medium + tags: cve,wordpress,wp-plugin,vanguard,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-20406-8f2ebff96481ee5356699783e44b68ea.yaml b/nuclei-templates/2020/CVE-2020-20406-8f2ebff96481ee5356699783e44b68ea.yaml index 0e13102a08..4663baae0e 100644 --- a/nuclei-templates/2020/CVE-2020-20406-8f2ebff96481ee5356699783e44b68ea.yaml +++ b/nuclei-templates/2020/CVE-2020-20406-8f2ebff96481ee5356699783e44b68ea.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Website Builder <= 2.9.2 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > A stored XSS vulnerability exists in the Custom Link Attributes control Affect function in Elementor Page Builder 2.9.2 and earlier versions. It is caused by inadequate filtering on the link custom attributes. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/elementor/" google-query: inurl:"/wp-content/plugins/elementor/" shodan-query: 'vuln:CVE-2020-20406' - tags: cve,wordpress,wp-plugin,elementor,medium + tags: cve,wordpress,wp-plugin,elementor,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-20625-3f2e88483cb032a762f3e5f925264d0f.yaml b/nuclei-templates/2020/CVE-2020-20625-3f2e88483cb032a762f3e5f925264d0f.yaml index f21518c53d..dc48c01482 100644 --- a/nuclei-templates/2020/CVE-2020-20625-3f2e88483cb032a762f3e5f925264d0f.yaml +++ b/nuclei-templates/2020/CVE-2020-20625-3f2e88483cb032a762f3e5f925264d0f.yaml @@ -4,7 +4,7 @@ info: name: > Sliced Invoices < 3.8.4 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > Sliced Invoices plugin for WordPress 3.8.3 and earlier allows unauthenticated information disclosure and authenticated SQL injection via core/class-sliced.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sliced-invoices/" google-query: inurl:"/wp-content/plugins/sliced-invoices/" shodan-query: 'vuln:CVE-2020-20625' - tags: cve,wordpress,wp-plugin,sliced-invoices,high + tags: cve,wordpress,wp-plugin,sliced-invoices,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-20626-fbfa55f46b34cda37b3af16eb142622e.yaml b/nuclei-templates/2020/CVE-2020-20626-fbfa55f46b34cda37b3af16eb142622e.yaml index 94cb4e1dfc..fe44078866 100644 --- a/nuclei-templates/2020/CVE-2020-20626-fbfa55f46b34cda37b3af16eb142622e.yaml +++ b/nuclei-templates/2020/CVE-2020-20626-fbfa55f46b34cda37b3af16eb142622e.yaml @@ -4,7 +4,7 @@ info: name: > Lara Google Analytics <= 2.0.4 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > lara-google-analytics.php in Lara Google Analytics plugin through 2.0.4 for WordPress allows authenticated stored XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/lara-google-analytics/" google-query: inurl:"/wp-content/plugins/lara-google-analytics/" shodan-query: 'vuln:CVE-2020-20626' - tags: cve,wordpress,wp-plugin,lara-google-analytics,medium + tags: cve,wordpress,wp-plugin,lara-google-analytics,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-20627-57de8ad14c220bdfc73bc2840b43e6e3.yaml b/nuclei-templates/2020/CVE-2020-20627-57de8ad14c220bdfc73bc2840b43e6e3.yaml index 6f5d1fef3b..6cdaf22660 100644 --- a/nuclei-templates/2020/CVE-2020-20627-57de8ad14c220bdfc73bc2840b43e6e3.yaml +++ b/nuclei-templates/2020/CVE-2020-20627-57de8ad14c220bdfc73bc2840b43e6e3.yaml @@ -4,7 +4,7 @@ info: name: > GiveWP <= 2.5.9 - Missing Authorization to Settings Update author: topscoder - severity: medium + severity: high description: > The includes/gateways/stripe/includes/admin/admin-actions.php in GiveWP plugin through 2.5.9 for WordPress allows unauthenticated settings change. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/give/" google-query: inurl:"/wp-content/plugins/give/" shodan-query: 'vuln:CVE-2020-20627' - tags: cve,wordpress,wp-plugin,give,medium + tags: cve,wordpress,wp-plugin,give,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-20628-97711fb53683ab26635f9b3f2754784c.yaml b/nuclei-templates/2020/CVE-2020-20628-97711fb53683ab26635f9b3f2754784c.yaml index 02247a5fe2..506b59a37f 100644 --- a/nuclei-templates/2020/CVE-2020-20628-97711fb53683ab26635f9b3f2754784c.yaml +++ b/nuclei-templates/2020/CVE-2020-20628-97711fb53683ab26635f9b3f2754784c.yaml @@ -4,7 +4,7 @@ info: name: > WP GDPR <= 2.1.1 - Unauthenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Controller/controller-comments.php in WP GDPR plugin through 2.1.1 has unauthenticated stored XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-gdpr-core/" google-query: inurl:"/wp-content/plugins/wp-gdpr-core/" shodan-query: 'vuln:CVE-2020-20628' - tags: cve,wordpress,wp-plugin,wp-gdpr-core,medium + tags: cve,wordpress,wp-plugin,wp-gdpr-core,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-20633-c794524768b79fbeacb43dc638d96e23.yaml b/nuclei-templates/2020/CVE-2020-20633-c794524768b79fbeacb43dc638d96e23.yaml index f16d3156b2..7d0eecb2b0 100644 --- a/nuclei-templates/2020/CVE-2020-20633-c794524768b79fbeacb43dc638d96e23.yaml +++ b/nuclei-templates/2020/CVE-2020-20633-c794524768b79fbeacb43dc638d96e23.yaml @@ -4,7 +4,7 @@ info: name: > GDPR Cookie Consent & Compliance Notice <= 1.8.2 - Authenticated Stored Cross-Site Scripting and Authorization Bypass author: topscoder - severity: medium + severity: low description: > ajax_policy_generator in admin/modules/cli-policy-generator/classes/class-policy-generator-ajax.php in GDPR Cookie Consent (cookie-law-info) 1.8.2 and below plugin for WordPress, allows authenticated stored XSS and privilege escalation. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cookie-law-info/" google-query: inurl:"/wp-content/plugins/cookie-law-info/" shodan-query: 'vuln:CVE-2020-20633' - tags: cve,wordpress,wp-plugin,cookie-law-info,medium + tags: cve,wordpress,wp-plugin,cookie-law-info,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-20634-b165aaaa725c1983b238dd197ed1a7e5.yaml b/nuclei-templates/2020/CVE-2020-20634-b165aaaa725c1983b238dd197ed1a7e5.yaml index 54f0687701..ce0e0d91c6 100644 --- a/nuclei-templates/2020/CVE-2020-20634-b165aaaa725c1983b238dd197ed1a7e5.yaml +++ b/nuclei-templates/2020/CVE-2020-20634-b165aaaa725c1983b238dd197ed1a7e5.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Website Builder <= 2.9.5 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > Elementor 2.9.5 and below WordPress plugin allows authenticated users to activate its safe mode feature. This can be exploited to disable all security plugins on the blog. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/elementor/" google-query: inurl:"/wp-content/plugins/elementor/" shodan-query: 'vuln:CVE-2020-20634' - tags: cve,wordpress,wp-plugin,elementor,medium + tags: cve,wordpress,wp-plugin,elementor,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-23762-c2ba29e0e5ecaebf723467e306a8b7e0.yaml b/nuclei-templates/2020/CVE-2020-23762-c2ba29e0e5ecaebf723467e306a8b7e0.yaml index be3d8e0747..900079d56a 100644 --- a/nuclei-templates/2020/CVE-2020-23762-c2ba29e0e5ecaebf723467e306a8b7e0.yaml +++ b/nuclei-templates/2020/CVE-2020-23762-c2ba29e0e5ecaebf723467e306a8b7e0.yaml @@ -4,7 +4,7 @@ info: name: > Larsens Calender <= 1.2 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Cross Site Scripting (XSS) vulnerability in the Larsens Calender plugin Version <= 1.2 for WordPress allows remote attackers to execute arbitrary web script via the "tite" column on the "Eintrage hinzufugen" tab. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/larsens-calender/" google-query: inurl:"/wp-content/plugins/larsens-calender/" shodan-query: 'vuln:CVE-2020-23762' - tags: cve,wordpress,wp-plugin,larsens-calender,medium + tags: cve,wordpress,wp-plugin,larsens-calender,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-24145-846117b538ab9ba30f69a12efe0f9e57.yaml b/nuclei-templates/2020/CVE-2020-24145-846117b538ab9ba30f69a12efe0f9e57.yaml index 7c08e1f409..41186f7b52 100644 --- a/nuclei-templates/2020/CVE-2020-24145-846117b538ab9ba30f69a12efe0f9e57.yaml +++ b/nuclei-templates/2020/CVE-2020-24145-846117b538ab9ba30f69a12efe0f9e57.yaml @@ -4,7 +4,7 @@ info: name: > CM Download Manager <= 2.7.0 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The CM Download Manager plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 2.7.0 via a crafted deletescreenshot action due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cm-download-manager/" google-query: inurl:"/wp-content/plugins/cm-download-manager/" shodan-query: 'vuln:CVE-2020-24145' - tags: cve,wordpress,wp-plugin,cm-download-manager,medium + tags: cve,wordpress,wp-plugin,cm-download-manager,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-24315-94d04ee1ef58708b41d6145bfcae5eba.yaml b/nuclei-templates/2020/CVE-2020-24315-94d04ee1ef58708b41d6145bfcae5eba.yaml index efff60e52e..619b5037f8 100644 --- a/nuclei-templates/2020/CVE-2020-24315-94d04ee1ef58708b41d6145bfcae5eba.yaml +++ b/nuclei-templates/2020/CVE-2020-24315-94d04ee1ef58708b41d6145bfcae5eba.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Poll <= 36 - SQL Injection author: topscoder - severity: high + severity: critical description: > The Poll Plugin for WordPress is vulnerable to blind SQL Injection via the 'pollid' parameter in versions up to, and including, 36 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cardoza-wordpress-poll/" google-query: inurl:"/wp-content/plugins/cardoza-wordpress-poll/" shodan-query: 'vuln:CVE-2020-24315' - tags: cve,wordpress,wp-plugin,cardoza-wordpress-poll,high + tags: cve,wordpress,wp-plugin,cardoza-wordpress-poll,critical http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-24699-285685ddf3c4cea5af33e325a30ef210.yaml b/nuclei-templates/2020/CVE-2020-24699-285685ddf3c4cea5af33e325a30ef210.yaml index bef24e85ec..ee2a70936d 100644 --- a/nuclei-templates/2020/CVE-2020-24699-285685ddf3c4cea5af33e325a30ef210.yaml +++ b/nuclei-templates/2020/CVE-2020-24699-285685ddf3c4cea5af33e325a30ef210.yaml @@ -4,7 +4,7 @@ info: name: > Chamber Dashboard Business Directory < 3.3.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Chamber Dashboard Business Directory plugin for WordPress is vulnerable to Cross-Site Scripting in versions before 3.3.1 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/chamber-dashboard-business-directory/" google-query: inurl:"/wp-content/plugins/chamber-dashboard-business-directory/" shodan-query: 'vuln:CVE-2020-24699' - tags: cve,wordpress,wp-plugin,chamber-dashboard-business-directory,medium + tags: cve,wordpress,wp-plugin,chamber-dashboard-business-directory,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-24948-6be16d4dc7a3396a4e2044185bf46f84.yaml b/nuclei-templates/2020/CVE-2020-24948-6be16d4dc7a3396a4e2044185bf46f84.yaml index c205c2ffda..0792aec116 100644 --- a/nuclei-templates/2020/CVE-2020-24948-6be16d4dc7a3396a4e2044185bf46f84.yaml +++ b/nuclei-templates/2020/CVE-2020-24948-6be16d4dc7a3396a4e2044185bf46f84.yaml @@ -4,7 +4,7 @@ info: name: > Autoptimize <= 2.7.6 - Authenticated Arbitrary File Upload author: topscoder - severity: high + severity: low description: > The ao_ccss_import AJAX call in Autoptimize Wordpress Plugin 2.7.6 does not ensure that the file provided is a legitimate Zip file, allowing high privilege users to upload arbitrary files, such as PHP, leading to remote command execution. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/autoptimize/" google-query: inurl:"/wp-content/plugins/autoptimize/" shodan-query: 'vuln:CVE-2020-24948' - tags: cve,wordpress,wp-plugin,autoptimize,high + tags: cve,wordpress,wp-plugin,autoptimize,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-25375-ee95b664445938e62cfbf4d8ed5ffe44.yaml b/nuclei-templates/2020/CVE-2020-25375-ee95b664445938e62cfbf4d8ed5ffe44.yaml index 1c6c9c8ce0..6df222284d 100644 --- a/nuclei-templates/2020/CVE-2020-25375-ee95b664445938e62cfbf4d8ed5ffe44.yaml +++ b/nuclei-templates/2020/CVE-2020-25375-ee95b664445938e62cfbf4d8ed5ffe44.yaml @@ -4,7 +4,7 @@ info: name: > WP smart CRM & Invoices FREE <= 1.8.7 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Wordpress Plugin Store / SoftradeWeb SNC WP SMART CRM V1.8.7 is affected by: Cross Site Scripting via the Business Name field, Tax Code field, First Name field, Address field, Town field, Phone field, Mobile field, Place of Birth field, Web Site field, VAT Number field, Last Name field, Fax field, Email field, and Skype field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-smart-crm-invoices-free/" google-query: inurl:"/wp-content/plugins/wp-smart-crm-invoices-free/" shodan-query: 'vuln:CVE-2020-25375' - tags: cve,wordpress,wp-plugin,wp-smart-crm-invoices-free,medium + tags: cve,wordpress,wp-plugin,wp-smart-crm-invoices-free,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-25378-4aff32f6f1228de170ce7ff458bf1831.yaml b/nuclei-templates/2020/CVE-2020-25378-4aff32f6f1228de170ce7ff458bf1831.yaml index 5067581d8b..fd49389910 100644 --- a/nuclei-templates/2020/CVE-2020-25378-4aff32f6f1228de170ce7ff458bf1831.yaml +++ b/nuclei-templates/2020/CVE-2020-25378-4aff32f6f1228de170ce7ff458bf1831.yaml @@ -4,7 +4,7 @@ info: name: > WP Floating Menu <= 1.4.0 - Cross-Site Scripting via id Parameter author: topscoder - severity: medium + severity: high description: > Wordpress Plugin Store / AccessPress Themes WP Floating Menu V1.3.0 is affected by: Cross Site Scripting (XSS) via the id GET parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-floating-menu/" google-query: inurl:"/wp-content/plugins/wp-floating-menu/" shodan-query: 'vuln:CVE-2020-25378' - tags: cve,wordpress,wp-plugin,wp-floating-menu,medium + tags: cve,wordpress,wp-plugin,wp-floating-menu,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-25379-f904152cc56225725583f8016fc8d925.yaml b/nuclei-templates/2020/CVE-2020-25379-f904152cc56225725583f8016fc8d925.yaml index 1ff0bc10e6..2552ef9bc5 100644 --- a/nuclei-templates/2020/CVE-2020-25379-f904152cc56225725583f8016fc8d925.yaml +++ b/nuclei-templates/2020/CVE-2020-25379-f904152cc56225725583f8016fc8d925.yaml @@ -4,7 +4,7 @@ info: name: > Recall Products <= 0.8 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > Wordpress Plugin Store / Mike Rooijackers Recall Products V0.8 fails to sanitize input from the 'Manufacturer[]' parameter which allows an authenticated attacker to inject a malicious SQL query. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/recall-products/" google-query: inurl:"/wp-content/plugins/recall-products/" shodan-query: 'vuln:CVE-2020-25379' - tags: cve,wordpress,wp-plugin,recall-products,high + tags: cve,wordpress,wp-plugin,recall-products,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-25380-75c0e8fcf83cb7fcc7b1f70f65a50a8b.yaml b/nuclei-templates/2020/CVE-2020-25380-75c0e8fcf83cb7fcc7b1f70f65a50a8b.yaml index 5027ab4b02..bc5bc760e8 100644 --- a/nuclei-templates/2020/CVE-2020-25380-75c0e8fcf83cb7fcc7b1f70f65a50a8b.yaml +++ b/nuclei-templates/2020/CVE-2020-25380-75c0e8fcf83cb7fcc7b1f70f65a50a8b.yaml @@ -4,7 +4,7 @@ info: name: > Recall Products <= 0.8 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Wordpress Plugin Store / Mike Rooijackers Recall Products V0.8 is affected by: Cross Site Scripting (XSS) via the 'Recall Settings' field in admin.php. An attacker can inject JavaScript code that will be stored and executed. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/recall-products/" google-query: inurl:"/wp-content/plugins/recall-products/" shodan-query: 'vuln:CVE-2020-25380' - tags: cve,wordpress,wp-plugin,recall-products,medium + tags: cve,wordpress,wp-plugin,recall-products,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-26596-f9bf203df336a8e0915eb488a89feed1.yaml b/nuclei-templates/2020/CVE-2020-26596-f9bf203df336a8e0915eb488a89feed1.yaml index 9c1981aec2..15f1153030 100644 --- a/nuclei-templates/2020/CVE-2020-26596-f9bf203df336a8e0915eb488a89feed1.yaml +++ b/nuclei-templates/2020/CVE-2020-26596-f9bf203df336a8e0915eb488a89feed1.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Pro <= 3.0.5 - Authenticated Remote Code Execution in Dynamic OOO Widget author: topscoder - severity: high + severity: low description: > The Dynamic OOO widget for the Elementor Pro plugin through 3.0.5 for WordPress allows remote authenticated users to execute arbitrary code because only the Editor role is needed to upload executable PHP code via the PHP Raw snippet. NOTE: this issue can be mitigated by removing the Dynamic OOO widget or by restricting availability of the Editor role. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/elementor-pro/" google-query: inurl:"/wp-content/plugins/elementor-pro/" shodan-query: 'vuln:CVE-2020-26596' - tags: cve,wordpress,wp-plugin,elementor-pro,high + tags: cve,wordpress,wp-plugin,elementor-pro,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-26672-a98e82a7c384a33ad5d0d42365168f67.yaml b/nuclei-templates/2020/CVE-2020-26672-a98e82a7c384a33ad5d0d42365168f67.yaml index 2917bad1f3..df04aee3db 100644 --- a/nuclei-templates/2020/CVE-2020-26672-a98e82a7c384a33ad5d0d42365168f67.yaml +++ b/nuclei-templates/2020/CVE-2020-26672-a98e82a7c384a33ad5d0d42365168f67.yaml @@ -4,7 +4,7 @@ info: name: > Testimonial Rotator <= 3.0.2 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Testimonial Rotator Wordpress Plugin 3.0.2 is affected by Cross Site Scripting (XSS) in /wp-admin/post.php. If a user intercepts a request and inserts a payload in "cite" parameter, the payload will be stored in the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/testimonial-rotator/" google-query: inurl:"/wp-content/plugins/testimonial-rotator/" shodan-query: 'vuln:CVE-2020-26672' - tags: cve,wordpress,wp-plugin,testimonial-rotator,medium + tags: cve,wordpress,wp-plugin,testimonial-rotator,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-27344-16f2bcb5cfa3d079c1a300d23d7f7166.yaml b/nuclei-templates/2020/CVE-2020-27344-16f2bcb5cfa3d079c1a300d23d7f7166.yaml index 908c5fb666..db10729103 100644 --- a/nuclei-templates/2020/CVE-2020-27344-16f2bcb5cfa3d079c1a300d23d7f7166.yaml +++ b/nuclei-templates/2020/CVE-2020-27344-16f2bcb5cfa3d079c1a300d23d7f7166.yaml @@ -4,7 +4,7 @@ info: name: > CM Download Manager <= 2.7.0 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The CM Download Manager plugin for WordPress is vulnerable to Authenticated Stored Cross-Site Scripting via the ‘filename’ parameter in versions up to, and including, 2.7.0 due to insufficient input sanitization and output escaping. This makes it possible for highly privileged attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cm-download-manager/" google-query: inurl:"/wp-content/plugins/cm-download-manager/" shodan-query: 'vuln:CVE-2020-27344' - tags: cve,wordpress,wp-plugin,cm-download-manager,medium + tags: cve,wordpress,wp-plugin,cm-download-manager,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-27356-6ecc3e1b29dcd6c7c18d4d37331ca11a.yaml b/nuclei-templates/2020/CVE-2020-27356-6ecc3e1b29dcd6c7c18d4d37331ca11a.yaml index 730c0e21cf..e916c7097a 100644 --- a/nuclei-templates/2020/CVE-2020-27356-6ecc3e1b29dcd6c7c18d4d37331ca11a.yaml +++ b/nuclei-templates/2020/CVE-2020-27356-6ecc3e1b29dcd6c7c18d4d37331ca11a.yaml @@ -4,7 +4,7 @@ info: name: > Debug Meta Data <= 1.1.2 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Debug Meta Data plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.1.2 due to insufficient input sanitization and output escaping on the a user's user-agent HTTP header value. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/debug-meta-data/" google-query: inurl:"/wp-content/plugins/debug-meta-data/" shodan-query: 'vuln:CVE-2020-27356' - tags: cve,wordpress,wp-plugin,debug-meta-data,medium + tags: cve,wordpress,wp-plugin,debug-meta-data,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-28038-8d7f0213118d2e7594c423ff47139a2f.yaml b/nuclei-templates/2020/CVE-2020-28038-8d7f0213118d2e7594c423ff47139a2f.yaml index 50c5825f24..f5ec3308b4 100644 --- a/nuclei-templates/2020/CVE-2020-28038-8d7f0213118d2e7594c423ff47139a2f.yaml +++ b/nuclei-templates/2020/CVE-2020-28038-8d7f0213118d2e7594c423ff47139a2f.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.5.2 - Stored Cross-Site Scripting via post slugs author: topscoder - severity: medium + severity: high description: > WordPress before 5.5.2 allows stored XSS via post slugs. reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2020-28038 metadata: shodan-query: 'vuln:CVE-2020-28038' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-28649-a2161b786ba8d84bdb2a3d032cd3b972.yaml b/nuclei-templates/2020/CVE-2020-28649-a2161b786ba8d84bdb2a3d032cd3b972.yaml index c4641433bd..ca60ef4ee9 100644 --- a/nuclei-templates/2020/CVE-2020-28649-a2161b786ba8d84bdb2a3d032cd3b972.yaml +++ b/nuclei-templates/2020/CVE-2020-28649-a2161b786ba8d84bdb2a3d032cd3b972.yaml @@ -4,7 +4,7 @@ info: name: > Child Theme Creator by Orbisius <= 1.5.1 - Cross-Site Request Forgery to Arbitrary File Modification and Creation author: topscoder - severity: high + severity: medium description: > The orbisius-child-theme-creator plugin before 1.5.2 for WordPress allows CSRF via orbisius_ctc_theme_editor_manage_file that makes it possible for attackers to modify arbitrary files and create new files to achieve remote code execution. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/orbisius-child-theme-creator/" google-query: inurl:"/wp-content/plugins/orbisius-child-theme-creator/" shodan-query: 'vuln:CVE-2020-28649' - tags: cve,wordpress,wp-plugin,orbisius-child-theme-creator,high + tags: cve,wordpress,wp-plugin,orbisius-child-theme-creator,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-28650-ad1820dedb4cef27ae24befa1b1daeac.yaml b/nuclei-templates/2020/CVE-2020-28650-ad1820dedb4cef27ae24befa1b1daeac.yaml index 5705ffb481..96ddffc7e4 100644 --- a/nuclei-templates/2020/CVE-2020-28650-ad1820dedb4cef27ae24befa1b1daeac.yaml +++ b/nuclei-templates/2020/CVE-2020-28650-ad1820dedb4cef27ae24befa1b1daeac.yaml @@ -4,7 +4,7 @@ info: name: > WPBakery Page Builder for WordPress <= 6.4 - Authenticated (Contributor+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The WPBakery plugin for WordPress, in versions 6.4 and below, was designed with a flaw that could give users with contributor and author level roles the ability to inject malicious JavaScript into pages and posts. This flaw also gave these users the ability to edit other users’ posts. The plugin explicitly disabled any default post HTML filtering checks in the saveAjaxFe function using kses_remove_filters();. This meant that any user with access to the WPBakery builder could inject HTML and JavaScript anywhere in a post using the page builder. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/js_composer/" google-query: inurl:"/wp-content/plugins/js_composer/" shodan-query: 'vuln:CVE-2020-28650' - tags: cve,wordpress,wp-plugin,js_composer,medium + tags: cve,wordpress,wp-plugin,js_composer,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-29171-d66601db34445c53f772431589140096.yaml b/nuclei-templates/2020/CVE-2020-29171-d66601db34445c53f772431589140096.yaml index f3f8cc9df8..f37e22005f 100644 --- a/nuclei-templates/2020/CVE-2020-29171-d66601db34445c53f772431589140096.yaml +++ b/nuclei-templates/2020/CVE-2020-29171-d66601db34445c53f772431589140096.yaml @@ -4,7 +4,7 @@ info: name: > All In One WP Security & Firewall <= 4.4.5 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting (XSS) vulnerability in admin/wp-security-blacklist-menu.php in the Tips and Tricks HQ All In One WP Security & Firewall (all-in-one-wp-security-and-firewall) plugin before 4.4.6 for WordPress. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/all-in-one-wp-security-and-firewall/" google-query: inurl:"/wp-content/plugins/all-in-one-wp-security-and-firewall/" shodan-query: 'vuln:CVE-2020-29171' - tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,medium + tags: cve,wordpress,wp-plugin,all-in-one-wp-security-and-firewall,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-29172-303b76a4a36e60deb08e9b0d0435d79c.yaml b/nuclei-templates/2020/CVE-2020-29172-303b76a4a36e60deb08e9b0d0435d79c.yaml index dcc1955c5f..3e0ed7aacc 100644 --- a/nuclei-templates/2020/CVE-2020-29172-303b76a4a36e60deb08e9b0d0435d79c.yaml +++ b/nuclei-templates/2020/CVE-2020-29172-303b76a4a36e60deb08e9b0d0435d79c.yaml @@ -4,7 +4,7 @@ info: name: > LiteSpeed Cache <= 3.6 - Authenticated Stored Cross-Site Scripting via IP setting author: topscoder - severity: medium + severity: low description: > A cross-site scripting (XSS) vulnerability in the LiteSpeed Cache plugin before 3.6.1 for WordPress can be exploited via the Server IP setting. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/litespeed-cache/" google-query: inurl:"/wp-content/plugins/litespeed-cache/" shodan-query: 'vuln:CVE-2020-29172' - tags: cve,wordpress,wp-plugin,litespeed-cache,medium + tags: cve,wordpress,wp-plugin,litespeed-cache,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-29303-f9f8b8101f4a39f1a6ed5a0936c6104f.yaml b/nuclei-templates/2020/CVE-2020-29303-f9f8b8101f4a39f1a6ed5a0936c6104f.yaml index 2da4462bab..020366e3b0 100644 --- a/nuclei-templates/2020/CVE-2020-29303-f9f8b8101f4a39f1a6ed5a0936c6104f.yaml +++ b/nuclei-templates/2020/CVE-2020-29303-f9f8b8101f4a39f1a6ed5a0936c6104f.yaml @@ -4,7 +4,7 @@ info: name: > DirectoriesPro Plugin by SabaiApps <= 1.3.45 - Cross-Site Scripting via _drts_form_build_id, _t_ Parameters author: topscoder - severity: medium + severity: high description: > A cross-site scripting (XSS) vulnerability in the SabaiApp Directories Pro plugin 1.3.45 for WordPress allows remote attackers to inject arbitrary web script or HTML via a POST to /wp-admin/admin.php?page=drts/directories&q=%2F with _drts_form_build_id parameter containing the XSS payload and _t_ parameter set to an invalid or non-existent CSRF token. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/directories/" google-query: inurl:"/wp-content/plugins/directories/" shodan-query: 'vuln:CVE-2020-29303' - tags: cve,wordpress,wp-plugin,directories,medium + tags: cve,wordpress,wp-plugin,directories,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-35012-83ef28839c75055ae7537f111049194c.yaml b/nuclei-templates/2020/CVE-2020-35012-83ef28839c75055ae7537f111049194c.yaml index 57bb8086ac..19f65cfd4c 100644 --- a/nuclei-templates/2020/CVE-2020-35012-83ef28839c75055ae7537f111049194c.yaml +++ b/nuclei-templates/2020/CVE-2020-35012-83ef28839c75055ae7537f111049194c.yaml @@ -4,7 +4,7 @@ info: name: > Events Manager <= 5.9.7.3 - Admin+ SQL Injection author: topscoder - severity: high + severity: critical description: > The Events Manager WordPress plugin before 5.9.8 does not sanitise and escape a parameter before using it in a SQL statement, leading to an SQL Injection reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/events-manager/" google-query: inurl:"/wp-content/plugins/events-manager/" shodan-query: 'vuln:CVE-2020-35012' - tags: cve,wordpress,wp-plugin,events-manager,high + tags: cve,wordpress,wp-plugin,events-manager,critical http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-35037-7961a00c8fec25ebf767309437be3781.yaml b/nuclei-templates/2020/CVE-2020-35037-7961a00c8fec25ebf767309437be3781.yaml index db6767f567..eb2fdfe2a2 100644 --- a/nuclei-templates/2020/CVE-2020-35037-7961a00c8fec25ebf767309437be3781.yaml +++ b/nuclei-templates/2020/CVE-2020-35037-7961a00c8fec25ebf767309437be3781.yaml @@ -4,7 +4,7 @@ info: name: > Events Manager <= 5.9.7.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Events Manager WordPress plugin before 5.9.8 does not sanitise and escape some search parameter before outputing them in pages, which could lead to Cross-Site Scripting issues reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/events-manager/" google-query: inurl:"/wp-content/plugins/events-manager/" shodan-query: 'vuln:CVE-2020-35037' - tags: cve,wordpress,wp-plugin,events-manager,medium + tags: cve,wordpress,wp-plugin,events-manager,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-35135-47b41bc2712a70e4aff6fb8649c1924a.yaml b/nuclei-templates/2020/CVE-2020-35135-47b41bc2712a70e4aff6fb8649c1924a.yaml index fb3dddeb93..9cf5feac74 100644 --- a/nuclei-templates/2020/CVE-2020-35135-47b41bc2712a70e4aff6fb8649c1924a.yaml +++ b/nuclei-templates/2020/CVE-2020-35135-47b41bc2712a70e4aff6fb8649c1924a.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate Category Excluder <= 1.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Ultimate Category Excluder plugin before 1.2 for WordPress allows ultimate-category-excluder.php CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-category-excluder/" google-query: inurl:"/wp-content/plugins/ultimate-category-excluder/" shodan-query: 'vuln:CVE-2020-35135' - tags: cve,wordpress,wp-plugin,ultimate-category-excluder,high + tags: cve,wordpress,wp-plugin,ultimate-category-excluder,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-35235-d557c696333289ec8d8f662866e89376.yaml b/nuclei-templates/2020/CVE-2020-35235-d557c696333289ec8d8f662866e89376.yaml index 2ce5c5d603..e1365dfb67 100644 --- a/nuclei-templates/2020/CVE-2020-35235-d557c696333289ec8d8f662866e89376.yaml +++ b/nuclei-templates/2020/CVE-2020-35235-d557c696333289ec8d8f662866e89376.yaml @@ -4,7 +4,7 @@ info: name: > Secure File Manager < 2.8.2 - Remote Code Execution author: topscoder - severity: high + severity: critical description: > vendor/elfinder/php/connector.minimal.php in the secure-file-manager plugin through 2.5 for WordPress loads elFinder code without proper access control. Thus, any authenticated user can run the elFinder upload command to achieve remote code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/secure-file-manager/" google-query: inurl:"/wp-content/plugins/secure-file-manager/" shodan-query: 'vuln:CVE-2020-35235' - tags: cve,wordpress,wp-plugin,secure-file-manager,high + tags: cve,wordpress,wp-plugin,secure-file-manager,critical http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-35489-7f88047eb913450e01c938cb65d8b8a9.yaml b/nuclei-templates/2020/CVE-2020-35489-7f88047eb913450e01c938cb65d8b8a9.yaml index 9c541d8daf..a0fe630063 100644 --- a/nuclei-templates/2020/CVE-2020-35489-7f88047eb913450e01c938cb65d8b8a9.yaml +++ b/nuclei-templates/2020/CVE-2020-35489-7f88047eb913450e01c938cb65d8b8a9.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form 7 <= 5.3.1 - Arbitrary File Upload via Bypass author: topscoder - severity: high + severity: critical description: > The Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads in versions up to 5.3.2. This is due to the fact that the plugin allows filenames to contain special characters which may make extension filter evasion possible on certain configurations. Our team was not able to reproduce this issue which leads us to believe there is a high attack complexity or special configuration requirement. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-7/" google-query: inurl:"/wp-content/plugins/contact-form-7/" shodan-query: 'vuln:CVE-2020-35489' - tags: cve,wordpress,wp-plugin,contact-form-7,high + tags: cve,wordpress,wp-plugin,contact-form-7,critical http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-35748-8269712f8aa3f2f54a5b3b611a3288b4.yaml b/nuclei-templates/2020/CVE-2020-35748-8269712f8aa3f2f54a5b3b611a3288b4.yaml index 72197c8971..47e2d68087 100644 --- a/nuclei-templates/2020/CVE-2020-35748-8269712f8aa3f2f54a5b3b611a3288b4.yaml +++ b/nuclei-templates/2020/CVE-2020-35748-8269712f8aa3f2f54a5b3b611a3288b4.yaml @@ -4,7 +4,7 @@ info: name: > FV Flowplayer Video Player <= 7.4.37.727 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Cross-site scripting (XSS) vulnerability in models/list-table.php in the FV Flowplayer Video Player plugin before 7.4.37.727 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the fv_wp_fvvideoplayer_src JSON field in the data parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/fv-wordpress-flowplayer/" google-query: inurl:"/wp-content/plugins/fv-wordpress-flowplayer/" shodan-query: 'vuln:CVE-2020-35748' - tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,medium + tags: cve,wordpress,wp-plugin,fv-wordpress-flowplayer,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-35749-0fc41c225cd6f2ddbf5e247314d75c25.yaml b/nuclei-templates/2020/CVE-2020-35749-0fc41c225cd6f2ddbf5e247314d75c25.yaml index ae1a4f33ac..a49cc0c065 100644 --- a/nuclei-templates/2020/CVE-2020-35749-0fc41c225cd6f2ddbf5e247314d75c25.yaml +++ b/nuclei-templates/2020/CVE-2020-35749-0fc41c225cd6f2ddbf5e247314d75c25.yaml @@ -4,7 +4,7 @@ info: name: > Simple Job Board <= 2.9.3 - Local File Inclusion author: topscoder - severity: high + severity: critical description: > Directory traversal vulnerability in class-simple_job_board_resume_download_handler.php in the Simple Board Job plugin 2.9.3 and earlier for WordPress allows remote attackers to read arbitrary files via the sjb_file parameter to wp-admin/post.php. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/simple-job-board/" google-query: inurl:"/wp-content/plugins/simple-job-board/" shodan-query: 'vuln:CVE-2020-35749' - tags: cve,wordpress,wp-plugin,simple-job-board,high + tags: cve,wordpress,wp-plugin,simple-job-board,critical http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-35773-4160c9c4da480f4b3c030b1d1b582ea6.yaml b/nuclei-templates/2020/CVE-2020-35773-4160c9c4da480f4b3c030b1d1b582ea6.yaml index 6a93cdc66e..42c3068d93 100644 --- a/nuclei-templates/2020/CVE-2020-35773-4160c9c4da480f4b3c030b1d1b582ea6.yaml +++ b/nuclei-templates/2020/CVE-2020-35773-4160c9c4da480f4b3c030b1d1b582ea6.yaml @@ -4,7 +4,7 @@ info: name: > Site Offline Or Coming Soon Or Maintenance Mode <= 1.4.2 - Cross-Site Request Forgery and Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > The Site Offline Or Coming Soon Or Maintenance Mode plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.4.2. This is due to missing or incorrect nonce validation on an unknown function. This makes it possible for unauthenticated attackers to perform an unknown action granted they can trick a site administrator into performing an action such as clicking on a link. The impact of this vulnerability is unknown. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/site-offline/" google-query: inurl:"/wp-content/plugins/site-offline/" shodan-query: 'vuln:CVE-2020-35773' - tags: cve,wordpress,wp-plugin,site-offline,high + tags: cve,wordpress,wp-plugin,site-offline,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-35932-a0918f22ac918ae4fe62db47bcca205c.yaml b/nuclei-templates/2020/CVE-2020-35932-a0918f22ac918ae4fe62db47bcca205c.yaml index 2ebab18053..53ccdc76f6 100644 --- a/nuclei-templates/2020/CVE-2020-35932-a0918f22ac918ae4fe62db47bcca205c.yaml +++ b/nuclei-templates/2020/CVE-2020-35932-a0918f22ac918ae4fe62db47bcca205c.yaml @@ -4,7 +4,7 @@ info: name: > Newsletter <= 6.8.1 - Authenticated PHP Object Injection author: topscoder - severity: high + severity: low description: > Insecure Deserialization in the Newsletter plugin before 6.8.2 for WordPress allows authenticated remote attackers with minimal privileges (such as subscribers) to use the tpnc_render AJAX action to inject arbitrary PHP objects via the options[inline_edits] parameter. NOTE: exploitability depends on PHP objects that might be present with certain other plugins or themes. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/newsletter/" google-query: inurl:"/wp-content/plugins/newsletter/" shodan-query: 'vuln:CVE-2020-35932' - tags: cve,wordpress,wp-plugin,newsletter,high + tags: cve,wordpress,wp-plugin,newsletter,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-35934-7d84c9a9ee6bf717c602d3a38e459b86.yaml b/nuclei-templates/2020/CVE-2020-35934-7d84c9a9ee6bf717c602d3a38e459b86.yaml index 1edb44b078..5e96b69117 100644 --- a/nuclei-templates/2020/CVE-2020-35934-7d84c9a9ee6bf717c602d3a38e459b86.yaml +++ b/nuclei-templates/2020/CVE-2020-35934-7d84c9a9ee6bf717c602d3a38e459b86.yaml @@ -4,7 +4,7 @@ info: name: > Advanced Access Manager <= 6.6.1 - Authenticated Information Disclosure author: topscoder - severity: medium + severity: low description: > The Advanced Access Manager plugin before 6.6.2 for WordPress displays the unfiltered user object (including all metadata) upon login via the REST API (aam/v1/authenticate or aam/v2/authenticate). This is a security problem if this object stores information that the user is not supposed to have (e.g., custom metadata added by a different plugin). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/advanced-access-manager/" google-query: inurl:"/wp-content/plugins/advanced-access-manager/" shodan-query: 'vuln:CVE-2020-35934' - tags: cve,wordpress,wp-plugin,advanced-access-manager,medium + tags: cve,wordpress,wp-plugin,advanced-access-manager,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-35935-2239ca03e49ffeb792ff8f7c625fd4da.yaml b/nuclei-templates/2020/CVE-2020-35935-2239ca03e49ffeb792ff8f7c625fd4da.yaml index 9c4344063a..e03c2b617e 100644 --- a/nuclei-templates/2020/CVE-2020-35935-2239ca03e49ffeb792ff8f7c625fd4da.yaml +++ b/nuclei-templates/2020/CVE-2020-35935-2239ca03e49ffeb792ff8f7c625fd4da.yaml @@ -4,7 +4,7 @@ info: name: > Advanced Access Manager <= 6.6.1 - Authenticated Authorization Bypass and Privilege Escalation author: topscoder - severity: high + severity: low description: > The Advanced Access Manager plugin before 6.6.2 for WordPress allows privilege escalation on profile updates via the aam_user_roles POST parameter if Multiple Role support is enabled. (The mechanism for deciding whether a user was entitled to add a role did not work in various custom-role scenarios.) reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/advanced-access-manager/" google-query: inurl:"/wp-content/plugins/advanced-access-manager/" shodan-query: 'vuln:CVE-2020-35935' - tags: cve,wordpress,wp-plugin,advanced-access-manager,high + tags: cve,wordpress,wp-plugin,advanced-access-manager,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-35942-c41810e93c0c7c558cec6a9a4900b3a7.yaml b/nuclei-templates/2020/CVE-2020-35942-c41810e93c0c7c558cec6a9a4900b3a7.yaml index ee0c74b290..f971368084 100644 --- a/nuclei-templates/2020/CVE-2020-35942-c41810e93c0c7c558cec6a9a4900b3a7.yaml +++ b/nuclei-templates/2020/CVE-2020-35942-c41810e93c0c7c558cec6a9a4900b3a7.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Gallery Plugin – NextGEN Gallery <= 3.4.7 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > A Cross-Site Request Forgery (CSRF) issue in the NextGEN Gallery plugin before 3.5.0 for WordPress allows File Upload and Local File Inclusion via settings modification, leading to Remote Code Execution and XSS. (It is possible to bypass CSRF protection by simply not including a nonce parameter.) reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nextgen-gallery/" google-query: inurl:"/wp-content/plugins/nextgen-gallery/" shodan-query: 'vuln:CVE-2020-35942' - tags: cve,wordpress,wp-plugin,nextgen-gallery,high + tags: cve,wordpress,wp-plugin,nextgen-gallery,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-35943-1c54e12a9145a5f1f1d234c85ecbc8fc.yaml b/nuclei-templates/2020/CVE-2020-35943-1c54e12a9145a5f1f1d234c85ecbc8fc.yaml index 9b6c9d53ca..df2269da1e 100644 --- a/nuclei-templates/2020/CVE-2020-35943-1c54e12a9145a5f1f1d234c85ecbc8fc.yaml +++ b/nuclei-templates/2020/CVE-2020-35943-1c54e12a9145a5f1f1d234c85ecbc8fc.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Gallery Plugin – NextGEN Gallery <= 3.4.7 - Cross-Site Request Forgery to Arbitrary File Upload author: topscoder - severity: high + severity: medium description: > A Cross-Site Request Forgery (CSRF) issue in the NextGEN Gallery plugin before 3.5.0 for WordPress allows File Upload. (It is possible to bypass CSRF protection by simply not including a nonce parameter.) reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nextgen-gallery/" google-query: inurl:"/wp-content/plugins/nextgen-gallery/" shodan-query: 'vuln:CVE-2020-35943' - tags: cve,wordpress,wp-plugin,nextgen-gallery,high + tags: cve,wordpress,wp-plugin,nextgen-gallery,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-35944-03e434d9ea9a280060b3548276610903.yaml b/nuclei-templates/2020/CVE-2020-35944-03e434d9ea9a280060b3548276610903.yaml index 8795591f74..2061bca78a 100644 --- a/nuclei-templates/2020/CVE-2020-35944-03e434d9ea9a280060b3548276610903.yaml +++ b/nuclei-templates/2020/CVE-2020-35944-03e434d9ea9a280060b3548276610903.yaml @@ -4,7 +4,7 @@ info: name: > Page Builder: Pagelayer – Drag and Drop website builder <= 1.1.1 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > An issue was discovered in the PageLayer plugin before 1.1.2 for WordPress. The pagelayer_settings_page function is vulnerable to CSRF, which can lead to XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pagelayer/" google-query: inurl:"/wp-content/plugins/pagelayer/" shodan-query: 'vuln:CVE-2020-35944' - tags: cve,wordpress,wp-plugin,pagelayer,high + tags: cve,wordpress,wp-plugin,pagelayer,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-35945-ec458e7be91893393a96a7bb4f01d557.yaml b/nuclei-templates/2020/CVE-2020-35945-ec458e7be91893393a96a7bb4f01d557.yaml index fde99b7182..46c0bf6959 100644 --- a/nuclei-templates/2020/CVE-2020-35945-ec458e7be91893393a96a7bb4f01d557.yaml +++ b/nuclei-templates/2020/CVE-2020-35945-ec458e7be91893393a96a7bb4f01d557.yaml @@ -4,7 +4,7 @@ info: name: > Elegant Themes (Multiple Versions) - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > An issue was discovered in the Divi Builder plugin, Divi theme, and Divi Extra theme before 4.5.3 for WordPress. Authenticated attackers, with contributor-level or above capabilities, can upload arbitrary files, including .php files. This occurs because the check for file extensions is on the client side rather than server side. reference: @@ -14,17 +14,17 @@ info: cvss-score: 8.8 cve-id: CVE-2020-35945 metadata: - fofa-query: "wp-content/plugins/divi-builder/" - google-query: inurl:"/wp-content/plugins/divi-builder/" + fofa-query: "wp-content/themes/extra/" + google-query: inurl:"/wp-content/themes/extra/" shodan-query: 'vuln:CVE-2020-35945' - tags: cve,wordpress,wp-plugin,divi-builder,high + tags: cve,wordpress,wp-theme,extra,critical http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/divi-builder/readme.txt" + - "{{BaseURL}}/wp-content/themes/extra/style.css" extractors: - type: regex @@ -33,14 +33,14 @@ http: group: 1 internal: true regex: - - "(?mi)Stable tag: ([0-9.]+)" + - "(?mi)Version: ([0-9.]+)" - type: regex name: version part: body group: 1 regex: - - "(?mi)Stable tag: ([0-9.]+)" + - "(?mi)Version: ([0-9.]+)" matchers-condition: and matchers: @@ -50,7 +50,7 @@ http: - type: word words: - - "divi-builder" + - "extra" part: body - type: dsl diff --git a/nuclei-templates/2020/CVE-2020-35946-a64ce08453bed39084d8a2cea93a9117.yaml b/nuclei-templates/2020/CVE-2020-35946-a64ce08453bed39084d8a2cea93a9117.yaml index b662a7ddf3..9ee7b323a7 100644 --- a/nuclei-templates/2020/CVE-2020-35946-a64ce08453bed39084d8a2cea93a9117.yaml +++ b/nuclei-templates/2020/CVE-2020-35946-a64ce08453bed39084d8a2cea93a9117.yaml @@ -4,7 +4,7 @@ info: name: > All in One SEO Pack <= 3.6.1 - Authenticated (Contributor+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > An issue was discovered in the All in One SEO Pack plugin before 3.6.2 for WordPress. The SEO Description and Title fields are vulnerable to unsanitized input from a Contributor, leading to stored XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/all-in-one-seo-pack/" google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" shodan-query: 'vuln:CVE-2020-35946' - tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,medium + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-35950-10a6f997b77b37003eabf2a216fdeced.yaml b/nuclei-templates/2020/CVE-2020-35950-10a6f997b77b37003eabf2a216fdeced.yaml index 89533938c9..9d8baa50f3 100644 --- a/nuclei-templates/2020/CVE-2020-35950-10a6f997b77b37003eabf2a216fdeced.yaml +++ b/nuclei-templates/2020/CVE-2020-35950-10a6f997b77b37003eabf2a216fdeced.yaml @@ -4,7 +4,7 @@ info: name: > Backup, Restore and Migrate WordPress Sites With the XCloner Plugin <= 4.2.152 - Cross-Site Request Forgery author: topscoder - severity: critical + severity: medium description: > An issue was discovered in the XCloner Backup and Restore plugin before 4.2.153 for WordPress. It allows CSRF (via almost any endpoint). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/xcloner-backup-and-restore/" google-query: inurl:"/wp-content/plugins/xcloner-backup-and-restore/" shodan-query: 'vuln:CVE-2020-35950' - tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,critical + tags: cve,wordpress,wp-plugin,xcloner-backup-and-restore,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36156-7e2ae7bf2efb6bc23e281ebe6c72a235.yaml b/nuclei-templates/2020/CVE-2020-36156-7e2ae7bf2efb6bc23e281ebe6c72a235.yaml index 5ab163c30a..a9ed809e21 100644 --- a/nuclei-templates/2020/CVE-2020-36156-7e2ae7bf2efb6bc23e281ebe6c72a235.yaml +++ b/nuclei-templates/2020/CVE-2020-36156-7e2ae7bf2efb6bc23e281ebe6c72a235.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate Member <= 2.1.11 - Authenticated Privilege Escalation via Profile Update author: topscoder - severity: critical + severity: low description: > An issue was discovered in the Ultimate Member plugin before 2.1.12 for WordPress, aka Authenticated Privilege Escalation via Profile Update. Any user with wp-admin access to the profile.php page could supply the parameter um-role with a value set to any role (e.g., Administrator) during a profile update, and effectively escalate their privileges. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-member/" google-query: inurl:"/wp-content/plugins/ultimate-member/" shodan-query: 'vuln:CVE-2020-36156' - tags: cve,wordpress,wp-plugin,ultimate-member,critical + tags: cve,wordpress,wp-plugin,ultimate-member,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36170-bcd9ca517989975e14b7cf4813bc0e1b.yaml b/nuclei-templates/2020/CVE-2020-36170-bcd9ca517989975e14b7cf4813bc0e1b.yaml index 05e8ae09cb..8e5dc5155a 100644 --- a/nuclei-templates/2020/CVE-2020-36170-bcd9ca517989975e14b7cf4813bc0e1b.yaml +++ b/nuclei-templates/2020/CVE-2020-36170-bcd9ca517989975e14b7cf4813bc0e1b.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate Member <= 2.1.12 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Ultimate Member plugin before 2.1.13 for WordPress mishandles hidden name="timestamp" fields in forms. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-member/" google-query: inurl:"/wp-content/plugins/ultimate-member/" shodan-query: 'vuln:CVE-2020-36170' - tags: cve,wordpress,wp-plugin,ultimate-member,medium + tags: cve,wordpress,wp-plugin,ultimate-member,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36172-72b80dd4bc94210ab9dd3b1876e438ee.yaml b/nuclei-templates/2020/CVE-2020-36172-72b80dd4bc94210ab9dd3b1876e438ee.yaml index 166992bcb2..4c39f9139d 100644 --- a/nuclei-templates/2020/CVE-2020-36172-72b80dd4bc94210ab9dd3b1876e438ee.yaml +++ b/nuclei-templates/2020/CVE-2020-36172-72b80dd4bc94210ab9dd3b1876e438ee.yaml @@ -4,7 +4,7 @@ info: name: > Advanced Custom Fields <= 5.8.11 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Advanced Custom Fields plugin before 5.8.12 for WordPress mishandles the escaping of strings in Select2 dropdowns, potentially leading to XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/advanced-custom-fields/" google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" shodan-query: 'vuln:CVE-2020-36172' - tags: cve,wordpress,wp-plugin,advanced-custom-fields,medium + tags: cve,wordpress,wp-plugin,advanced-custom-fields,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36173-7a3eb0e4a2da32f4626463054bad7fe1.yaml b/nuclei-templates/2020/CVE-2020-36173-7a3eb0e4a2da32f4626463054bad7fe1.yaml index 0c6d08ea20..820de64fd7 100644 --- a/nuclei-templates/2020/CVE-2020-36173-7a3eb0e4a2da32f4626463054bad7fe1.yaml +++ b/nuclei-templates/2020/CVE-2020-36173-7a3eb0e4a2da32f4626463054bad7fe1.yaml @@ -4,7 +4,7 @@ info: name: > Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress <= 3.4.27.1 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Ninja Forms plugin before 3.4.28 for WordPress lacks escaping for submissions-table fields. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ninja-forms/" google-query: inurl:"/wp-content/plugins/ninja-forms/" shodan-query: 'vuln:CVE-2020-36173' - tags: cve,wordpress,wp-plugin,ninja-forms,medium + tags: cve,wordpress,wp-plugin,ninja-forms,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36174-5f51f32d184bdb8a5475d2d0cf4a68e5.yaml b/nuclei-templates/2020/CVE-2020-36174-5f51f32d184bdb8a5475d2d0cf4a68e5.yaml index aabcd61a7f..11ed4d6843 100644 --- a/nuclei-templates/2020/CVE-2020-36174-5f51f32d184bdb8a5475d2d0cf4a68e5.yaml +++ b/nuclei-templates/2020/CVE-2020-36174-5f51f32d184bdb8a5475d2d0cf4a68e5.yaml @@ -4,7 +4,7 @@ info: name: > Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress <= 3.4.27 - Cross-Site Request Forgery to Plugin Installation author: topscoder - severity: high + severity: medium description: > The Ninja Forms plugin before 3.4.27.1 for WordPress allows CSRF via services integration. This makes it possible for attackers to install arbitrary plugins. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ninja-forms/" google-query: inurl:"/wp-content/plugins/ninja-forms/" shodan-query: 'vuln:CVE-2020-36174' - tags: cve,wordpress,wp-plugin,ninja-forms,high + tags: cve,wordpress,wp-plugin,ninja-forms,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36503-b0b49bce1c15ad148a5058e1154b417c.yaml b/nuclei-templates/2020/CVE-2020-36503-b0b49bce1c15ad148a5058e1154b417c.yaml index 895064ce70..91bcd1e736 100644 --- a/nuclei-templates/2020/CVE-2020-36503-b0b49bce1c15ad148a5058e1154b417c.yaml +++ b/nuclei-templates/2020/CVE-2020-36503-b0b49bce1c15ad148a5058e1154b417c.yaml @@ -4,7 +4,7 @@ info: name: > Connections Business Directory <= 9.6 - Authenticated CSV Injection author: topscoder - severity: high + severity: low description: > The Connections Business Directory WordPress plugin before 9.7 does not validate or sanitise some connections' fields, which could lead to a CSV injection issue reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/connections/" google-query: inurl:"/wp-content/plugins/connections/" shodan-query: 'vuln:CVE-2020-36503' - tags: cve,wordpress,wp-plugin,connections,high + tags: cve,wordpress,wp-plugin,connections,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36656-74062d3bc6524d681fbfe5faf76c4ab5.yaml b/nuclei-templates/2020/CVE-2020-36656-74062d3bc6524d681fbfe5faf76c4ab5.yaml index 9ffb239b14..f8c7a7f3f5 100644 --- a/nuclei-templates/2020/CVE-2020-36656-74062d3bc6524d681fbfe5faf76c4ab5.yaml +++ b/nuclei-templates/2020/CVE-2020-36656-74062d3bc6524d681fbfe5faf76c4ab5.yaml @@ -4,7 +4,7 @@ info: name: > Spectra – WordPress Gutenberg Blocks <= 1.14.11 - Authenticated (Contributor+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.14.11 due to insufficient sanitizing of input in Gutenberg blocks. This makes it possible for contributors, or higher privileged users, to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-addons-for-gutenberg/" google-query: inurl:"/wp-content/plugins/ultimate-addons-for-gutenberg/" shodan-query: 'vuln:CVE-2020-36656' - tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,medium + tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36666-c1fc6421a52e6ac7d9b0f476667cd29a.yaml b/nuclei-templates/2020/CVE-2020-36666-c1fc6421a52e6ac7d9b0f476667cd29a.yaml index b394c2b816..44a338c5e0 100644 --- a/nuclei-templates/2020/CVE-2020-36666-c1fc6421a52e6ac7d9b0f476667cd29a.yaml +++ b/nuclei-templates/2020/CVE-2020-36666-c1fc6421a52e6ac7d9b0f476667cd29a.yaml @@ -4,7 +4,7 @@ info: name: > Multiple E-plugins (Various Versions) - Authenticated (Subscriber+) Privilege Escalation author: topscoder - severity: high + severity: low description: > Multiple plugins by the vendor E-plugins are vulnerable to privilege escalation due to insufficient restriction on several functions called via AJAX actions that set a user's role based on supplied role information. This makes it possible authenticated, subscriber-level and above attackers to elevate their privileges to that of an administrator. reference: @@ -14,17 +14,17 @@ info: cvss-score: 8.8 cve-id: CVE-2020-36666 metadata: - fofa-query: "wp-content/plugins/hotel-listing/" - google-query: inurl:"/wp-content/plugins/hotel-listing/" + fofa-query: "wp-content/plugins/final-user-wp-frontend-user-profiles/" + google-query: inurl:"/wp-content/plugins/final-user-wp-frontend-user-profiles/" shodan-query: 'vuln:CVE-2020-36666' - tags: cve,wordpress,wp-plugin,hotel-listing,high + tags: cve,wordpress,wp-plugin,final-user-wp-frontend-user-profiles,low http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/hotel-listing/readme.txt" + - "{{BaseURL}}/wp-content/plugins/final-user-wp-frontend-user-profiles/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "hotel-listing" + - "final-user-wp-frontend-user-profiles" part: body - type: dsl dsl: - - compare_versions(version, '< 1.3.7') \ No newline at end of file + - compare_versions(version, '< 1.2.2') \ No newline at end of file diff --git a/nuclei-templates/2020/CVE-2020-36667-506d872307a475af76e6ae5402a1e474.yaml b/nuclei-templates/2020/CVE-2020-36667-506d872307a475af76e6ae5402a1e474.yaml index 0b75123543..8269ce9199 100644 --- a/nuclei-templates/2020/CVE-2020-36667-506d872307a475af76e6ae5402a1e474.yaml +++ b/nuclei-templates/2020/CVE-2020-36667-506d872307a475af76e6ae5402a1e474.yaml @@ -4,7 +4,7 @@ info: name: > JetBackup – WP Backup, Migrate & Restore <= 1.4.1 - Missing Authorization to Unauthorized Backup Location Change author: topscoder - severity: medium + severity: high description: > The JetBackup – WP Backup, Migrate & Restore plugin for WordPress is vulnerable to unauthorized back-up location changes in versions up to, and including 1.4.1 due to a lack of proper capability checking on the backup_guard_cloud_dropbox, backup_guard_cloud_gdrive, and backup_guard_cloud_oneDrive functions. This makes it possible for authenticated attackers, with minimal permissions, such as a subscriber to change to location of back-ups and potentially steal sensitive information from them. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/backup/" google-query: inurl:"/wp-content/plugins/backup/" shodan-query: 'vuln:CVE-2020-36667' - tags: cve,wordpress,wp-plugin,backup,medium + tags: cve,wordpress,wp-plugin,backup,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36669-8bb122c471113121afc3ab2c199c2c7d.yaml b/nuclei-templates/2020/CVE-2020-36669-8bb122c471113121afc3ab2c199c2c7d.yaml index fdf0f80379..b1097c51be 100644 --- a/nuclei-templates/2020/CVE-2020-36669-8bb122c471113121afc3ab2c199c2c7d.yaml +++ b/nuclei-templates/2020/CVE-2020-36669-8bb122c471113121afc3ab2c199c2c7d.yaml @@ -4,7 +4,7 @@ info: name: > JetBackup – WP Backup, Migrate & Restore <= 1.3.9 - Cross-Site Request Forgery to Arbitrary File Upload author: topscoder - severity: high + severity: medium description: > The JetBackup – WP Backup, Migrate & Restore plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including 1.3.9. This is due to missing nonce validation on the backup_guard_get_import_backup() function. This makes it possible for unauthenticated attackers to upload arbitrary files to the vulnerable site's server via a forged request, granted they can trick a site's administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/backup/" google-query: inurl:"/wp-content/plugins/backup/" shodan-query: 'vuln:CVE-2020-36669' - tags: cve,wordpress,wp-plugin,backup,high + tags: cve,wordpress,wp-plugin,backup,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36670-ff2527cc6b81652aecd5a77ac2a8b673.yaml b/nuclei-templates/2020/CVE-2020-36670-ff2527cc6b81652aecd5a77ac2a8b673.yaml index 678aecc4d2..34273e9258 100644 --- a/nuclei-templates/2020/CVE-2020-36670-ff2527cc6b81652aecd5a77ac2a8b673.yaml +++ b/nuclei-templates/2020/CVE-2020-36670-ff2527cc6b81652aecd5a77ac2a8b673.yaml @@ -4,7 +4,7 @@ info: name: > NEX-Forms <= 7.7.1 - Missing Authorization on Various AJAX Actions author: topscoder - severity: medium + severity: high description: > The NEX-Forms. plugin for WordPress is vulnerable to unauthorized disclosure and modification of data in versions up to, and including 7.7.1 due to missing capability checks on several AJAX actions. This makes it possible for authenticated attackers with subscriber level permissions and above to invoke these functions which can be used to perform actions like modify form submission records, deleting files, sending test emails, modifying plugin settings, and more. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nex-forms-express-wp-form-builder/" google-query: inurl:"/wp-content/plugins/nex-forms-express-wp-form-builder/" shodan-query: 'vuln:CVE-2020-36670' - tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,medium + tags: cve,wordpress,wp-plugin,nex-forms-express-wp-form-builder,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36701-28f8218d0cd81907d78e413554e9b440.yaml b/nuclei-templates/2020/CVE-2020-36701-28f8218d0cd81907d78e413554e9b440.yaml index 8b5b448430..2b1c5a77a7 100644 --- a/nuclei-templates/2020/CVE-2020-36701-28f8218d0cd81907d78e413554e9b440.yaml +++ b/nuclei-templates/2020/CVE-2020-36701-28f8218d0cd81907d78e413554e9b440.yaml @@ -4,7 +4,7 @@ info: name: > Page Builder: KingComposer < 2.9.4 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > The Page Builder: KingComposer plugin for WordPress is vulnerable to Arbitrary File Uploads in versions up to, and including, 2.9.3 via the 'process_bulk_action' function in the 'kingcomposer/includes/kc.extensions.php' file. This makes it possible for authenticated users with author level permissions and above to upload arbitrary files onto the server which can be used to execute code on the server. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/kingcomposer/" google-query: inurl:"/wp-content/plugins/kingcomposer/" shodan-query: 'vuln:CVE-2020-36701' - tags: cve,wordpress,wp-plugin,kingcomposer,high + tags: cve,wordpress,wp-plugin,kingcomposer,critical http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36702-c5f769a2ad53c678c35d169acd9dd76e.yaml b/nuclei-templates/2020/CVE-2020-36702-c5f769a2ad53c678c35d169acd9dd76e.yaml index 0d01283234..340c23843d 100644 --- a/nuclei-templates/2020/CVE-2020-36702-c5f769a2ad53c678c35d169acd9dd76e.yaml +++ b/nuclei-templates/2020/CVE-2020-36702-c5f769a2ad53c678c35d169acd9dd76e.yaml @@ -4,7 +4,7 @@ info: name: > Spectra – WordPress Gutenberg Blocks <= 1.14.7 - Missing Authorization author: topscoder - severity: medium + severity: high description: > The Ultimate Addons for Gutenberg plugin for WordPress is vulnerable to Authenticated Settings Change in versions up to, and including, 1.14.7. This is due to missing capability checks on several AJAX actions. This makes it possible for authenticated attackers with subscriber+ roles to update the plugin's settings. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-addons-for-gutenberg/" google-query: inurl:"/wp-content/plugins/ultimate-addons-for-gutenberg/" shodan-query: 'vuln:CVE-2020-36702' - tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,medium + tags: cve,wordpress,wp-plugin,ultimate-addons-for-gutenberg,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36703-727d2f92da48e178eefceef10fd279f0.yaml b/nuclei-templates/2020/CVE-2020-36703-727d2f92da48e178eefceef10fd279f0.yaml index 66f441aed5..b8d2651217 100644 --- a/nuclei-templates/2020/CVE-2020-36703-727d2f92da48e178eefceef10fd279f0.yaml +++ b/nuclei-templates/2020/CVE-2020-36703-727d2f92da48e178eefceef10fd279f0.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Website Builder <= 2.9.7 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Elementor Website Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG image uploads in versions up to, and including 2.9.7 This makes it possible for authenticated attackers with the upload_files capability to inject arbitrary web scripts in pages that will execute whenever a user accesses the page with the stored web scripts. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/elementor/" google-query: inurl:"/wp-content/plugins/elementor/" shodan-query: 'vuln:CVE-2020-36703' - tags: cve,wordpress,wp-plugin,elementor,medium + tags: cve,wordpress,wp-plugin,elementor,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36704-547ae69e23e79945ee41118869bf3151.yaml b/nuclei-templates/2020/CVE-2020-36704-547ae69e23e79945ee41118869bf3151.yaml index 89cc078bf4..9d6827e2e9 100644 --- a/nuclei-templates/2020/CVE-2020-36704-547ae69e23e79945ee41118869bf3151.yaml +++ b/nuclei-templates/2020/CVE-2020-36704-547ae69e23e79945ee41118869bf3151.yaml @@ -4,7 +4,7 @@ info: name: > Fruitful < 3.8.2 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Fruitful Theme for WordPress is vulnerable to Stored Cross-Site Scripting via several parameters stored via the fruitful_theme_options_action AJAX action in versions up to, and including, 3.8.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/fruitful/" google-query: inurl:"/wp-content/themes/fruitful/" shodan-query: 'vuln:CVE-2020-36704' - tags: cve,wordpress,wp-theme,fruitful,medium + tags: cve,wordpress,wp-theme,fruitful,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36707-473adc971897213907d43bcafc37522c.yaml b/nuclei-templates/2020/CVE-2020-36707-473adc971897213907d43bcafc37522c.yaml index 99f59dd1f6..71a11fe7ac 100644 --- a/nuclei-templates/2020/CVE-2020-36707-473adc971897213907d43bcafc37522c.yaml +++ b/nuclei-templates/2020/CVE-2020-36707-473adc971897213907d43bcafc37522c.yaml @@ -4,7 +4,7 @@ info: name: > Coming Soon & Maintenance Mode Page <= 1.57 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Coming Soon & Maintenance Mode Page plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.57. This is due to confusing logic functions missing or having incorrect nonce validation. This makes it possible for unauthenticated attackers to gain and perform otherwise unauthorized access and actions via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/nifty-coming-soon-and-under-construction-page/" google-query: inurl:"/wp-content/plugins/nifty-coming-soon-and-under-construction-page/" shodan-query: 'vuln:CVE-2020-36707' - tags: cve,wordpress,wp-plugin,nifty-coming-soon-and-under-construction-page,high + tags: cve,wordpress,wp-plugin,nifty-coming-soon-and-under-construction-page,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36708-a746469ba08e7ad3eaafd923d2717c92.yaml b/nuclei-templates/2020/CVE-2020-36708-a746469ba08e7ad3eaafd923d2717c92.yaml index 257288de50..0be4ba7966 100644 --- a/nuclei-templates/2020/CVE-2020-36708-a746469ba08e7ad3eaafd923d2717c92.yaml +++ b/nuclei-templates/2020/CVE-2020-36708-a746469ba08e7ad3eaafd923d2717c92.yaml @@ -14,17 +14,17 @@ info: cvss-score: 9.8 cve-id: CVE-2020-36708 metadata: - fofa-query: "wp-content/themes/allegiant/" - google-query: inurl:"/wp-content/themes/allegiant/" + fofa-query: "wp-content/themes/pixova-lite/" + google-query: inurl:"/wp-content/themes/pixova-lite/" shodan-query: 'vuln:CVE-2020-36708' - tags: cve,wordpress,wp-theme,allegiant,critical + tags: cve,wordpress,wp-theme,pixova-lite,critical http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/themes/allegiant/style.css" + - "{{BaseURL}}/wp-content/themes/pixova-lite/style.css" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "allegiant" + - "pixova-lite" part: body - type: dsl dsl: - - compare_versions(version, '<= 1.2.2') \ No newline at end of file + - compare_versions(version, '<= 2.0.5') \ No newline at end of file diff --git a/nuclei-templates/2020/CVE-2020-36709-f10892c912aef9cf076885d5c4fde1a7.yaml b/nuclei-templates/2020/CVE-2020-36709-f10892c912aef9cf076885d5c4fde1a7.yaml index be5cab68a3..90b0c0191a 100644 --- a/nuclei-templates/2020/CVE-2020-36709-f10892c912aef9cf076885d5c4fde1a7.yaml +++ b/nuclei-templates/2020/CVE-2020-36709-f10892c912aef9cf076885d5c4fde1a7.yaml @@ -4,7 +4,7 @@ info: name: > Page Builder: KingComposer < 2.9.4 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Page Builder: KingComposer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via via shortcode in versions before 2.9.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/kingcomposer/" google-query: inurl:"/wp-content/plugins/kingcomposer/" shodan-query: 'vuln:CVE-2020-36709' - tags: cve,wordpress,wp-plugin,kingcomposer,medium + tags: cve,wordpress,wp-plugin,kingcomposer,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36711-51e019b787984ebb59dc9257a3fe25a4.yaml b/nuclei-templates/2020/CVE-2020-36711-51e019b787984ebb59dc9257a3fe25a4.yaml index ac8591577d..ceec23709c 100644 --- a/nuclei-templates/2020/CVE-2020-36711-51e019b787984ebb59dc9257a3fe25a4.yaml +++ b/nuclei-templates/2020/CVE-2020-36711-51e019b787984ebb59dc9257a3fe25a4.yaml @@ -4,7 +4,7 @@ info: name: > Avada <= 6.2.2 - Authenticated (Contributor+) Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Avada theme for WordPress is vulnerable to Stored Cross-Site Scripting via the update_layout function in versions up to, and including, 6.2.3 due to insufficient input sanitization and output escaping. This makes it possible for contributor-level attackers, and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/themes/Avada/" google-query: inurl:"/wp-content/themes/Avada/" shodan-query: 'vuln:CVE-2020-36711' - tags: cve,wordpress,wp-theme,Avada,medium + tags: cve,wordpress,wp-theme,Avada,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36717-171d068f6ec1f7c5f7f36a222d7d8329.yaml b/nuclei-templates/2020/CVE-2020-36717-171d068f6ec1f7c5f7f36a222d7d8329.yaml index 9752805a65..03005451f7 100644 --- a/nuclei-templates/2020/CVE-2020-36717-171d068f6ec1f7c5f7f36a222d7d8329.yaml +++ b/nuclei-templates/2020/CVE-2020-36717-171d068f6ec1f7c5f7f36a222d7d8329.yaml @@ -4,7 +4,7 @@ info: name: > Kali Forms <= 2.1.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Kali Forms plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.1.1. This is due to incorrect nonce handling throughout the plugin's function. This makes it possible for unauthenticated attackers to access the plugin's administrative functions via forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/kali-forms/" google-query: inurl:"/wp-content/plugins/kali-forms/" shodan-query: 'vuln:CVE-2020-36717' - tags: cve,wordpress,wp-plugin,kali-forms,high + tags: cve,wordpress,wp-plugin,kali-forms,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36721-72ccbc519dc7d87cb6145ad667cfc553.yaml b/nuclei-templates/2020/CVE-2020-36721-72ccbc519dc7d87cb6145ad667cfc553.yaml index 6f0c38f6c7..f0aeaca5cd 100644 --- a/nuclei-templates/2020/CVE-2020-36721-72ccbc519dc7d87cb6145ad667cfc553.yaml +++ b/nuclei-templates/2020/CVE-2020-36721-72ccbc519dc7d87cb6145ad667cfc553.yaml @@ -14,17 +14,17 @@ info: cvss-score: 6.5 cve-id: CVE-2020-36721 metadata: - fofa-query: "wp-content/themes/newspaper-x/" - google-query: inurl:"/wp-content/themes/newspaper-x/" + fofa-query: "wp-content/themes/activello/" + google-query: inurl:"/wp-content/themes/activello/" shodan-query: 'vuln:CVE-2020-36721' - tags: cve,wordpress,wp-theme,newspaper-x,medium + tags: cve,wordpress,wp-theme,activello,medium http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/themes/newspaper-x/style.css" + - "{{BaseURL}}/wp-content/themes/activello/style.css" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "newspaper-x" + - "activello" part: body - type: dsl dsl: - - compare_versions(version, '<= 1.3.1') \ No newline at end of file + - compare_versions(version, '<= 1.4.0') \ No newline at end of file diff --git a/nuclei-templates/2020/CVE-2020-36722-b1162d19127bf06b82fd09bfd50f373f.yaml b/nuclei-templates/2020/CVE-2020-36722-b1162d19127bf06b82fd09bfd50f373f.yaml index d0cac20ec0..07dbcc0cf0 100644 --- a/nuclei-templates/2020/CVE-2020-36722-b1162d19127bf06b82fd09bfd50f373f.yaml +++ b/nuclei-templates/2020/CVE-2020-36722-b1162d19127bf06b82fd09bfd50f373f.yaml @@ -4,7 +4,7 @@ info: name: > Visual Composer <= 26.0 - Multiple Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Visual Composer plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 26.0 due to insufficient input sanitization and output escaping. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/visualcomposer/" google-query: inurl:"/wp-content/plugins/visualcomposer/" shodan-query: 'vuln:CVE-2020-36722' - tags: cve,wordpress,wp-plugin,visualcomposer,medium + tags: cve,wordpress,wp-plugin,visualcomposer,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-36725-728e240a198c7c451039858fc71e171c.yaml b/nuclei-templates/2020/CVE-2020-36725-728e240a198c7c451039858fc71e171c.yaml index 582cd8ad4c..e2f54ff6a7 100644 --- a/nuclei-templates/2020/CVE-2020-36725-728e240a198c7c451039858fc71e171c.yaml +++ b/nuclei-templates/2020/CVE-2020-36725-728e240a198c7c451039858fc71e171c.yaml @@ -14,17 +14,17 @@ info: cvss-score: 8.8 cve-id: CVE-2020-36725 metadata: - fofa-query: "wp-content/plugins/ti-woocommerce-wishlist/" - google-query: inurl:"/wp-content/plugins/ti-woocommerce-wishlist/" + fofa-query: "wp-content/plugins/ti-woocommerce-wishlist-premium/" + google-query: inurl:"/wp-content/plugins/ti-woocommerce-wishlist-premium/" shodan-query: 'vuln:CVE-2020-36725' - tags: cve,wordpress,wp-plugin,ti-woocommerce-wishlist,high + tags: cve,wordpress,wp-plugin,ti-woocommerce-wishlist-premium,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/ti-woocommerce-wishlist/readme.txt" + - "{{BaseURL}}/wp-content/plugins/ti-woocommerce-wishlist-premium/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "ti-woocommerce-wishlist" + - "ti-woocommerce-wishlist-premium" part: body - type: dsl dsl: - - compare_versions(version, '<= 1.21.11') \ No newline at end of file + - compare_versions(version, '<= 1.21.4') \ No newline at end of file diff --git a/nuclei-templates/2020/CVE-2020-36729-6009aafd4759ca9a9de1f0b928158a27.yaml b/nuclei-templates/2020/CVE-2020-36729-6009aafd4759ca9a9de1f0b928158a27.yaml index 8b8059f3d9..d8217d5c8a 100644 --- a/nuclei-templates/2020/CVE-2020-36729-6009aafd4759ca9a9de1f0b928158a27.yaml +++ b/nuclei-templates/2020/CVE-2020-36729-6009aafd4759ca9a9de1f0b928158a27.yaml @@ -4,7 +4,7 @@ info: name: > Slideshow, Image Slider by 2J <= 1.3.31 - Authorization Bypass author: topscoder - severity: medium + severity: high description: > The 2J-SlideShow Plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the 'twoj_slideshow_setup' function called via the wp_ajax_twoj_slideshow_setup AJAX action in versions up to, and including, 1.3.31. This makes it possible for authenticated attackers (Subscriber, or above level access) to allow attackers to perform otherwise restricted actions and subsequently deactivate any plugins on the blog. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/2j-slideshow/" google-query: inurl:"/wp-content/plugins/2j-slideshow/" shodan-query: 'vuln:CVE-2020-36729' - tags: cve,wordpress,wp-plugin,2j-slideshow,medium + tags: cve,wordpress,wp-plugin,2j-slideshow,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-4046-3c2c8b06162030c304a3d8608d66a5c9.yaml b/nuclei-templates/2020/CVE-2020-4046-3c2c8b06162030c304a3d8608d66a5c9.yaml index 3b54fca808..8f3aeb42f6 100644 --- a/nuclei-templates/2020/CVE-2020-4046-3c2c8b06162030c304a3d8608d66a5c9.yaml +++ b/nuclei-templates/2020/CVE-2020-4046-3c2c8b06162030c304a3d8608d66a5c9.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.4.2 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > In affected versions of WordPress, users with low privileges (like contributors and authors) can use the embed block in a certain way to inject unfiltered HTML in the block editor. When affected posts are viewed by a higher privileged user, this could lead to script execution in the editor/wp-admin. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34). reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2020-4046 metadata: shodan-query: 'vuln:CVE-2020-4046' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-4047-bb9587c8922bec5591eb7af4043b1550.yaml b/nuclei-templates/2020/CVE-2020-4047-bb9587c8922bec5591eb7af4043b1550.yaml index 3c0680b112..94859bc947 100644 --- a/nuclei-templates/2020/CVE-2020-4047-bb9587c8922bec5591eb7af4043b1550.yaml +++ b/nuclei-templates/2020/CVE-2020-4047-bb9587c8922bec5591eb7af4043b1550.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Core < 5.4.2 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > In affected versions of WordPress, authenticated users with upload permissions (like authors) are able to inject JavaScript into some media file attachment pages in a certain way. This can lead to script execution in the context of a higher privileged user when the file is viewed by them. This has been patched in version 5.4.2, along with all the previously affected versions via a minor release (5.3.4, 5.2.7, 5.1.6, 5.0.10, 4.9.15, 4.8.14, 4.7.18, 4.6.19, 4.5.22, 4.4.23, 4.3.24, 4.2.28, 4.1.31, 4.0.31, 3.9.32, 3.8.34, 3.7.34). reference: @@ -15,7 +15,7 @@ info: cve-id: CVE-2020-4047 metadata: shodan-query: 'vuln:CVE-2020-4047' - tags: cve,wordpress,wp-core,medium + tags: cve,wordpress,wp-core,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-5391-2b0533cd6930889b564dac0001232de1.yaml b/nuclei-templates/2020/CVE-2020-5391-2b0533cd6930889b564dac0001232de1.yaml index 949d051525..9296c70d74 100644 --- a/nuclei-templates/2020/CVE-2020-5391-2b0533cd6930889b564dac0001232de1.yaml +++ b/nuclei-templates/2020/CVE-2020-5391-2b0533cd6930889b564dac0001232de1.yaml @@ -4,7 +4,7 @@ info: name: > Login by Auth0 <= 3.11.3 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerabilities exist in the Auth0 plugin before 4.0.0 for WordPress via the domain field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/auth0/" google-query: inurl:"/wp-content/plugins/auth0/" shodan-query: 'vuln:CVE-2020-5391' - tags: cve,wordpress,wp-plugin,auth0,high + tags: cve,wordpress,wp-plugin,auth0,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-5392-74d2043a574ab69cbbb11dda595211e3.yaml b/nuclei-templates/2020/CVE-2020-5392-74d2043a574ab69cbbb11dda595211e3.yaml index 1f62e8479f..10ff2a36b9 100644 --- a/nuclei-templates/2020/CVE-2020-5392-74d2043a574ab69cbbb11dda595211e3.yaml +++ b/nuclei-templates/2020/CVE-2020-5392-74d2043a574ab69cbbb11dda595211e3.yaml @@ -4,7 +4,7 @@ info: name: > Login by Auth0 Plugin <= 3.11.3 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Login by Auth0 Plugin for WordPress is vulnerable to Stored Cross-Site Scripting via an unknown parameter in versions up to, and including, 4.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/auth0/" google-query: inurl:"/wp-content/plugins/auth0/" shodan-query: 'vuln:CVE-2020-5392' - tags: cve,wordpress,wp-plugin,auth0,medium + tags: cve,wordpress,wp-plugin,auth0,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-5530-e049cf9cff2a64ed7bf022044d018fad.yaml b/nuclei-templates/2020/CVE-2020-5530-e049cf9cff2a64ed7bf022044d018fad.yaml index d180da0221..116aaed4d1 100644 --- a/nuclei-templates/2020/CVE-2020-5530-e049cf9cff2a64ed7bf022044d018fad.yaml +++ b/nuclei-templates/2020/CVE-2020-5530-e049cf9cff2a64ed7bf022044d018fad.yaml @@ -4,7 +4,7 @@ info: name: > Easy Property Listings < 3.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in Easy Property Listings versions prior to 3.4 allows remote attackers to hijack the authentication of administrators via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-property-listings/" google-query: inurl:"/wp-content/plugins/easy-property-listings/" shodan-query: 'vuln:CVE-2020-5530' - tags: cve,wordpress,wp-plugin,easy-property-listings,high + tags: cve,wordpress,wp-plugin,easy-property-listings,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-5579-d6f22dc7688630789d302268152d865d.yaml b/nuclei-templates/2020/CVE-2020-5579-d6f22dc7688630789d302268152d865d.yaml index e5e66f767a..99bed3a21a 100644 --- a/nuclei-templates/2020/CVE-2020-5579-d6f22dc7688630789d302268152d865d.yaml +++ b/nuclei-templates/2020/CVE-2020-5579-d6f22dc7688630789d302268152d865d.yaml @@ -4,7 +4,7 @@ info: name: > Paid Memberships Pro < 2.3.3 - Authenticated SQL Injection author: topscoder - severity: medium + severity: low description: > SQL injection vulnerability in the Paid Memberships versions prior to 2.3.3 allows attacker with administrator rights to execute arbitrary SQL commands via unspecified vectors. @@ -19,7 +19,7 @@ info: fofa-query: "wp-content/plugins/paid-memberships-pro/" google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" shodan-query: 'vuln:CVE-2020-5579' - tags: cve,wordpress,wp-plugin,paid-memberships-pro,medium + tags: cve,wordpress,wp-plugin,paid-memberships-pro,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-5611-a0f089d6e873fbb7be028eaafb4cd0fc.yaml b/nuclei-templates/2020/CVE-2020-5611-a0f089d6e873fbb7be028eaafb4cd0fc.yaml index c45d08285d..708c938503 100644 --- a/nuclei-templates/2020/CVE-2020-5611-a0f089d6e873fbb7be028eaafb4cd0fc.yaml +++ b/nuclei-templates/2020/CVE-2020-5611-a0f089d6e873fbb7be028eaafb4cd0fc.yaml @@ -4,7 +4,7 @@ info: name: > Social Rocket – Social Sharing Plugin < 1.2.10 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in Social Sharing Plugin versions prior to 1.2.10 allows remote attackers to hijack the authentication of administrators via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/UNKNOWN-CVE-2020-5611/" google-query: inurl:"/wp-content/plugins/UNKNOWN-CVE-2020-5611/" shodan-query: 'vuln:CVE-2020-5611' - tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2020-5611,high + tags: cve,wordpress,wp-plugin,UNKNOWN-CVE-2020-5611,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-5642-802c4864b87b89e6df06fc16568188de.yaml b/nuclei-templates/2020/CVE-2020-5642-802c4864b87b89e6df06fc16568188de.yaml index 7d0ee84362..9a7bf0b617 100644 --- a/nuclei-templates/2020/CVE-2020-5642-802c4864b87b89e6df06fc16568188de.yaml +++ b/nuclei-templates/2020/CVE-2020-5642-802c4864b87b89e6df06fc16568188de.yaml @@ -4,7 +4,7 @@ info: name: > Live Chat – Live support <= 3.1.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in Live Chat - Live support version 3.1.0 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/onwebchat/" google-query: inurl:"/wp-content/plugins/onwebchat/" shodan-query: 'vuln:CVE-2020-5642' - tags: cve,wordpress,wp-plugin,onwebchat,high + tags: cve,wordpress,wp-plugin,onwebchat,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-5650-5d5eee8781ce2674b2c2c40cb2fcc273.yaml b/nuclei-templates/2020/CVE-2020-5650-5d5eee8781ce2674b2c2c40cb2fcc273.yaml index ede6d0488a..541ee837b9 100644 --- a/nuclei-templates/2020/CVE-2020-5650-5d5eee8781ce2674b2c2c40cb2fcc273.yaml +++ b/nuclei-templates/2020/CVE-2020-5650-5d5eee8781ce2674b2c2c40cb2fcc273.yaml @@ -4,7 +4,7 @@ info: name: > Simple Download Monitor <= 3.8.8 - Unauthenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Simple Download Monitor plugin for WordPress is vulnerable to Cross-Site Scripting in versions up to, and including, 3.8.8 due to insufficient input sanitization and output escaping on the User-Agent header. This makes it possible for attackers to inject arbitrary web scripts that execute in a victim's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/simple-download-monitor/" google-query: inurl:"/wp-content/plugins/simple-download-monitor/" shodan-query: 'vuln:CVE-2020-5650' - tags: cve,wordpress,wp-plugin,simple-download-monitor,medium + tags: cve,wordpress,wp-plugin,simple-download-monitor,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-5651-94d6413af5bdd7c5410cee1dbb9ba3ce.yaml b/nuclei-templates/2020/CVE-2020-5651-94d6413af5bdd7c5410cee1dbb9ba3ce.yaml index f0dfea3135..3b7863a774 100644 --- a/nuclei-templates/2020/CVE-2020-5651-94d6413af5bdd7c5410cee1dbb9ba3ce.yaml +++ b/nuclei-templates/2020/CVE-2020-5651-94d6413af5bdd7c5410cee1dbb9ba3ce.yaml @@ -4,7 +4,7 @@ info: name: > Simple Download Monitor <= 3.8.8 - SQL Injection author: topscoder - severity: high + severity: critical description: > The Simple Download Monitor plugin for WordPress is vulnerable to generic SQL Injection in versions up to, and including, 3.8.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database if an authenticated user clicks on a malicious URL. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/simple-download-monitor/" google-query: inurl:"/wp-content/plugins/simple-download-monitor/" shodan-query: 'vuln:CVE-2020-5651' - tags: cve,wordpress,wp-plugin,simple-download-monitor,high + tags: cve,wordpress,wp-plugin,simple-download-monitor,critical http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-5766-44e9876427663f96d92e4c3c678955d5.yaml b/nuclei-templates/2020/CVE-2020-5766-44e9876427663f96d92e4c3c678955d5.yaml index c58e53894d..5352c12675 100644 --- a/nuclei-templates/2020/CVE-2020-5766-44e9876427663f96d92e4c3c678955d5.yaml +++ b/nuclei-templates/2020/CVE-2020-5766-44e9876427663f96d92e4c3c678955d5.yaml @@ -4,7 +4,7 @@ info: name: > SRS Simple Hits Counter Plugin for WordPress 1.03 - 1.04 - Unauthenticated SQL Injection author: topscoder - severity: high + severity: critical description: > Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in SRS Simple Hits Counter Plugin for WordPress 1.0.3 and 1.0.4 allows a remote, unauthenticated attacker to determine the value of database fields. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/srs-simple-hits-counter/" google-query: inurl:"/wp-content/plugins/srs-simple-hits-counter/" shodan-query: 'vuln:CVE-2020-5766' - tags: cve,wordpress,wp-plugin,srs-simple-hits-counter,high + tags: cve,wordpress,wp-plugin,srs-simple-hits-counter,critical http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-5767-880b88155b22c7b6bb28fecc96be5e0e.yaml b/nuclei-templates/2020/CVE-2020-5767-880b88155b22c7b6bb28fecc96be5e0e.yaml index 681a0efb78..09bfd6e060 100644 --- a/nuclei-templates/2020/CVE-2020-5767-880b88155b22c7b6bb28fecc96be5e0e.yaml +++ b/nuclei-templates/2020/CVE-2020-5767-880b88155b22c7b6bb28fecc96be5e0e.yaml @@ -4,7 +4,7 @@ info: name: > Icegram Email Subscribers & Newsletters Plugin for WordPress <= 4.5.0 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery in Icegram Email Subscribers & Newsletters Plugin for WordPress v4.5.0 allows a remote attacker to send forged emails by tricking legitimate users into clicking a crafted link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/email-subscribers/" google-query: inurl:"/wp-content/plugins/email-subscribers/" shodan-query: 'vuln:CVE-2020-5767' - tags: cve,wordpress,wp-plugin,email-subscribers,high + tags: cve,wordpress,wp-plugin,email-subscribers,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-5768-52ad0bdca5afebb4c884c4a9d304e243.yaml b/nuclei-templates/2020/CVE-2020-5768-52ad0bdca5afebb4c884c4a9d304e243.yaml index 69eff7dbca..d58006e558 100644 --- a/nuclei-templates/2020/CVE-2020-5768-52ad0bdca5afebb4c884c4a9d304e243.yaml +++ b/nuclei-templates/2020/CVE-2020-5768-52ad0bdca5afebb4c884c4a9d304e243.yaml @@ -4,7 +4,7 @@ info: name: > Icegram Email Subscribers & Newsletters <= 4.5.0 - Authenticated SQL Injection author: topscoder - severity: medium + severity: low description: > Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Icegram Email Subscribers & Newsletters Plugin for WordPress v4.4.8 allows a remote, authenticated attacker to determine the value of database fields. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/email-subscribers/" google-query: inurl:"/wp-content/plugins/email-subscribers/" shodan-query: 'vuln:CVE-2020-5768' - tags: cve,wordpress,wp-plugin,email-subscribers,medium + tags: cve,wordpress,wp-plugin,email-subscribers,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-6010-79a6d64a3a134f3b86c4ab9063f7bbeb.yaml b/nuclei-templates/2020/CVE-2020-6010-79a6d64a3a134f3b86c4ab9063f7bbeb.yaml index 985a9d2ebe..b270136da5 100644 --- a/nuclei-templates/2020/CVE-2020-6010-79a6d64a3a134f3b86c4ab9063f7bbeb.yaml +++ b/nuclei-templates/2020/CVE-2020-6010-79a6d64a3a134f3b86c4ab9063f7bbeb.yaml @@ -4,7 +4,7 @@ info: name: > LearnPress <= 3.2.6.7 - SQL Injection author: topscoder - severity: high + severity: critical description: > LearnPress Wordpress plugin version prior and including 3.2.6.7 is vulnerable to SQL Injection reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/learnpress/" google-query: inurl:"/wp-content/plugins/learnpress/" shodan-query: 'vuln:CVE-2020-6010' - tags: cve,wordpress,wp-plugin,learnpress,high + tags: cve,wordpress,wp-plugin,learnpress,critical http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-6166-6ff8db6967b717d0cf958b73dfda5c1c.yaml b/nuclei-templates/2020/CVE-2020-6166-6ff8db6967b717d0cf958b73dfda5c1c.yaml index fe6699269a..bd0abc1312 100644 --- a/nuclei-templates/2020/CVE-2020-6166-6ff8db6967b717d0cf958b73dfda5c1c.yaml +++ b/nuclei-templates/2020/CVE-2020-6166-6ff8db6967b717d0cf958b73dfda5c1c.yaml @@ -4,7 +4,7 @@ info: name: > Minimal Coming Soon & Maintenance Mode <= 2.16 - Missing Authorization to Export Settings/Theme Change author: topscoder - severity: medium + severity: high description: > A flaw in the WordPress plugin, Minimal Coming Soon & Maintenance Mode through 2.15, allows authenticated users with basic access to export settings and change maintenance-mode themes. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/minimal-coming-soon-maintenance-mode/" google-query: inurl:"/wp-content/plugins/minimal-coming-soon-maintenance-mode/" shodan-query: 'vuln:CVE-2020-6166' - tags: cve,wordpress,wp-plugin,minimal-coming-soon-maintenance-mode,medium + tags: cve,wordpress,wp-plugin,minimal-coming-soon-maintenance-mode,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-6167-843fe9a3debf8db188ba99413c342e16.yaml b/nuclei-templates/2020/CVE-2020-6167-843fe9a3debf8db188ba99413c342e16.yaml index 9b7b14d916..6c964863dc 100644 --- a/nuclei-templates/2020/CVE-2020-6167-843fe9a3debf8db188ba99413c342e16.yaml +++ b/nuclei-templates/2020/CVE-2020-6167-843fe9a3debf8db188ba99413c342e16.yaml @@ -4,7 +4,7 @@ info: name: > Minimal Coming Soon & Maintenance Mode <= 2.10 - Cross-Site Request Forgery to Stored Cross-Site Scripting and Setting Changes author: topscoder - severity: high + severity: medium description: > A flaw in the WordPress plugin, Minimal Coming Soon & Maintenance Mode through 2.10, allows a CSRF attack to enable maintenance mode, inject XSS, modify several important settings, or include remote files as a logo. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/minimal-coming-soon-maintenance-mode/" google-query: inurl:"/wp-content/plugins/minimal-coming-soon-maintenance-mode/" shodan-query: 'vuln:CVE-2020-6167' - tags: cve,wordpress,wp-plugin,minimal-coming-soon-maintenance-mode,high + tags: cve,wordpress,wp-plugin,minimal-coming-soon-maintenance-mode,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-6849-8d38cd4f2bf680c2b1b244824fc691f8.yaml b/nuclei-templates/2020/CVE-2020-6849-8d38cd4f2bf680c2b1b244824fc691f8.yaml index 2b4b339038..f4a2c4f38e 100644 --- a/nuclei-templates/2020/CVE-2020-6849-8d38cd4f2bf680c2b1b244824fc691f8.yaml +++ b/nuclei-templates/2020/CVE-2020-6849-8d38cd4f2bf680c2b1b244824fc691f8.yaml @@ -4,7 +4,7 @@ info: name: > Marketo Forms and Tracking <= 1.0.2 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The marketo-forms-and-tracking plugin through 1.0.2 for WordPress allows wp-admin/admin.php?page=marketo_fat CSRF with resultant XSS. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/marketo-forms-and-tracking/" google-query: inurl:"/wp-content/plugins/marketo-forms-and-tracking/" shodan-query: 'vuln:CVE-2020-6849' - tags: cve,wordpress,wp-plugin,marketo-forms-and-tracking,high + tags: cve,wordpress,wp-plugin,marketo-forms-and-tracking,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-6850-6125bda092f086c6d166ad135d42c4ef.yaml b/nuclei-templates/2020/CVE-2020-6850-6125bda092f086c6d166ad135d42c4ef.yaml index b4d967d97c..f98c895b32 100644 --- a/nuclei-templates/2020/CVE-2020-6850-6125bda092f086c6d166ad135d42c4ef.yaml +++ b/nuclei-templates/2020/CVE-2020-6850-6125bda092f086c6d166ad135d42c4ef.yaml @@ -4,7 +4,7 @@ info: name: > SAML Single Sign On – SAML SSO Login <= 4.8.83 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Utilities.php in the miniorange-saml-20-single-sign-on plugin before 4.8.84 for WordPress allows XSS via a crafted SAML XML Response to wp-login.php. This is related to the SAMLResponse and RelayState variables, and the Destination parameter of the samlp:Response XML element. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/miniorange-saml-20-single-sign-on/" google-query: inurl:"/wp-content/plugins/miniorange-saml-20-single-sign-on/" shodan-query: 'vuln:CVE-2020-6850' - tags: cve,wordpress,wp-plugin,miniorange-saml-20-single-sign-on,medium + tags: cve,wordpress,wp-plugin,miniorange-saml-20-single-sign-on,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-7055-d16f5d5a117e59e23a5a604664dfe044.yaml b/nuclei-templates/2020/CVE-2020-7055-d16f5d5a117e59e23a5a604664dfe044.yaml index 8b0e7a161b..cc96e9c9be 100644 --- a/nuclei-templates/2020/CVE-2020-7055-d16f5d5a117e59e23a5a604664dfe044.yaml +++ b/nuclei-templates/2020/CVE-2020-7055-d16f5d5a117e59e23a5a604664dfe044.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Website Builder <= 2.7.4 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > The Elementor Website Builder plugin for WordPress is vulnerable to arbitrary file upload by subscriber level users and above due to missing authorization on the Import Templates function, which makes it possible for attackers to gain remote code execution. This affects versions up to 2.7.5. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/elementor/" google-query: inurl:"/wp-content/plugins/elementor/" shodan-query: 'vuln:CVE-2020-7055' - tags: cve,wordpress,wp-plugin,elementor,high + tags: cve,wordpress,wp-plugin,elementor,critical http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-7228-83141551066454cfa3570b7b645030aa.yaml b/nuclei-templates/2020/CVE-2020-7228-83141551066454cfa3570b7b645030aa.yaml index 0c93713c67..e503601056 100644 --- a/nuclei-templates/2020/CVE-2020-7228-83141551066454cfa3570b7b645030aa.yaml +++ b/nuclei-templates/2020/CVE-2020-7228-83141551066454cfa3570b7b645030aa.yaml @@ -4,7 +4,7 @@ info: name: > Calculated Fields Form <= 1.0.353 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Calculated Fields Form plugin through 1.0.353 for WordPress suffers from multiple Stored XSS vulnerabilities present in the input forms. These can be exploited by an authenticated user. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/calculated-fields-form/" google-query: inurl:"/wp-content/plugins/calculated-fields-form/" shodan-query: 'vuln:CVE-2020-7228' - tags: cve,wordpress,wp-plugin,calculated-fields-form,medium + tags: cve,wordpress,wp-plugin,calculated-fields-form,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-7239-a48a527c714ec711ca739eed07091779.yaml b/nuclei-templates/2020/CVE-2020-7239-a48a527c714ec711ca739eed07091779.yaml index 715c456653..a60ba0ec76 100644 --- a/nuclei-templates/2020/CVE-2020-7239-a48a527c714ec711ca739eed07091779.yaml +++ b/nuclei-templates/2020/CVE-2020-7239-a48a527c714ec711ca739eed07091779.yaml @@ -4,7 +4,7 @@ info: name: > Chatbot with IBM Watson < 0.8.21 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Chatbot with IBM Watson plugin before 0.8.21 for WordPress has a DOM-based XSS vulnerability that is executed when a chat message containing JavaScript is sent. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/conversation-watson/" google-query: inurl:"/wp-content/plugins/conversation-watson/" shodan-query: 'vuln:CVE-2020-7239' - tags: cve,wordpress,wp-plugin,conversation-watson,medium + tags: cve,wordpress,wp-plugin,conversation-watson,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-8417-39bc2edd346e28405d70531e51a8164a.yaml b/nuclei-templates/2020/CVE-2020-8417-39bc2edd346e28405d70531e51a8164a.yaml index 71ed559c1b..cd9a752fb2 100644 --- a/nuclei-templates/2020/CVE-2020-8417-39bc2edd346e28405d70531e51a8164a.yaml +++ b/nuclei-templates/2020/CVE-2020-8417-39bc2edd346e28405d70531e51a8164a.yaml @@ -4,7 +4,7 @@ info: name: > Code Snippets <= 2.13.3 - Cross-Site Request Forgery to Remote Code Execution author: topscoder - severity: high + severity: medium description: > The Code Snippets plugin before 2.14.0 for WordPress allows CSRF because of the lack of a Referer check on the import menu. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/code-snippets/" google-query: inurl:"/wp-content/plugins/code-snippets/" shodan-query: 'vuln:CVE-2020-8417' - tags: cve,wordpress,wp-plugin,code-snippets,high + tags: cve,wordpress,wp-plugin,code-snippets,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-8435-5d65a7992972ebe63734d1fdf7ce6dcd.yaml b/nuclei-templates/2020/CVE-2020-8435-5d65a7992972ebe63734d1fdf7ce6dcd.yaml index 2d3d9d79ab..c4a6213f5d 100644 --- a/nuclei-templates/2020/CVE-2020-8435-5d65a7992972ebe63734d1fdf7ce6dcd.yaml +++ b/nuclei-templates/2020/CVE-2020-8435-5d65a7992972ebe63734d1fdf7ce6dcd.yaml @@ -4,7 +4,7 @@ info: name: > RegistrationMagic - Custom Registration Forms, User Registration and User Login Plugin <= 4.6.0.2 - SQL Injection author: topscoder - severity: high + severity: critical description: > An issue was discovered in the RegistrationMagic plugin 4.6.0.2 for WordPress. There is SQL injection via the rm_analytics_show_form rm_form_id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" shodan-query: 'vuln:CVE-2020-8435' - tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,high + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,critical http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-8436-f7a999ea17927c5e9ebebc775b43318c.yaml b/nuclei-templates/2020/CVE-2020-8436-f7a999ea17927c5e9ebebc775b43318c.yaml index 0ab215e72a..5290882dc4 100644 --- a/nuclei-templates/2020/CVE-2020-8436-f7a999ea17927c5e9ebebc775b43318c.yaml +++ b/nuclei-templates/2020/CVE-2020-8436-f7a999ea17927c5e9ebebc775b43318c.yaml @@ -4,7 +4,7 @@ info: name: > RegistrationMagic – Custom Registration Forms, User Registration and User Login Plugin <= 4.6.0.1 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > XSS was discovered in the RegistrationMagic plugin 4.6.0.1 for WordPress via the rm_form_id, rm_tr, or form_name parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" shodan-query: 'vuln:CVE-2020-8436' - tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,medium + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-8498-4e01c0b287f81a38f8a747fdacd53194.yaml b/nuclei-templates/2020/CVE-2020-8498-4e01c0b287f81a38f8a747fdacd53194.yaml index a7799efa1c..fc41316a8c 100644 --- a/nuclei-templates/2020/CVE-2020-8498-4e01c0b287f81a38f8a747fdacd53194.yaml +++ b/nuclei-templates/2020/CVE-2020-8498-4e01c0b287f81a38f8a747fdacd53194.yaml @@ -4,7 +4,7 @@ info: name: > GistPress < 3.0.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > XSS exists in the shortcode functionality of the GistPress plugin before 3.0.2 for WordPress via the includes/class-gistpress.php id parameter. This allows an attacker with the WordPress Contributor role to execute arbitrary JavaScript code with the privileges of other users (e.g., ones who have the publish_posts capability). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/gistpress/" google-query: inurl:"/wp-content/plugins/gistpress/" shodan-query: 'vuln:CVE-2020-8498' - tags: cve,wordpress,wp-plugin,gistpress,medium + tags: cve,wordpress,wp-plugin,gistpress,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-8594-0b4ef9eb693a7e87ce6cfca4623c180a.yaml b/nuclei-templates/2020/CVE-2020-8594-0b4ef9eb693a7e87ce6cfca4623c180a.yaml index e2aeb9dd5f..13fdbb09be 100644 --- a/nuclei-templates/2020/CVE-2020-8594-0b4ef9eb693a7e87ce6cfca4623c180a.yaml +++ b/nuclei-templates/2020/CVE-2020-8594-0b4ef9eb693a7e87ce6cfca4623c180a.yaml @@ -4,7 +4,7 @@ info: name: > Ninja Forms Contact Form <= 3.4.22 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Ninja Forms plugin 3.4.22 for WordPress has Multiple Stored XSS vulnerabilities via ninja_forms[recaptcha_site_key], ninja_forms[recaptcha_secret_key], ninja_forms[recaptcha_lang], or ninja_forms[date_format]. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ninja-forms/" google-query: inurl:"/wp-content/plugins/ninja-forms/" shodan-query: 'vuln:CVE-2020-8594' - tags: cve,wordpress,wp-plugin,ninja-forms,medium + tags: cve,wordpress,wp-plugin,ninja-forms,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-8596-07270c625770ea55406700bd4faf8963.yaml b/nuclei-templates/2020/CVE-2020-8596-07270c625770ea55406700bd4faf8963.yaml index 0ed0f4266b..c56f33298b 100644 --- a/nuclei-templates/2020/CVE-2020-8596-07270c625770ea55406700bd4faf8963.yaml +++ b/nuclei-templates/2020/CVE-2020-8596-07270c625770ea55406700bd4faf8963.yaml @@ -4,7 +4,7 @@ info: name: > Participants Database <= 1.9.5.5 - SQL Injection author: topscoder - severity: high + severity: critical description: > participants-database.php in the Participants Database plugin 1.9.5.5 and previous versions for WordPress has a time-based SQL injection vulnerability via the ascdesc, list_filter_count, or sortBy parameters. It is possible to exfiltrate data and potentially execute code (if certain conditions are met). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/participants-database/" google-query: inurl:"/wp-content/plugins/participants-database/" shodan-query: 'vuln:CVE-2020-8596' - tags: cve,wordpress,wp-plugin,participants-database,high + tags: cve,wordpress,wp-plugin,participants-database,critical http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-8615-b4ca6e1dc02a9ba7306fb5b7361185cc.yaml b/nuclei-templates/2020/CVE-2020-8615-b4ca6e1dc02a9ba7306fb5b7361185cc.yaml index 436f89c380..6fbb2b92ac 100644 --- a/nuclei-templates/2020/CVE-2020-8615-b4ca6e1dc02a9ba7306fb5b7361185cc.yaml +++ b/nuclei-templates/2020/CVE-2020-8615-b4ca6e1dc02a9ba7306fb5b7361185cc.yaml @@ -4,7 +4,7 @@ info: name: > Tutor LMS < 1.5.3 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > A CSRF vulnerability in the Tutor LMS plugin before 1.5.3 for WordPress can result in an attacker approving themselves as an instructor and performing other malicious actions (such as blocking legitimate instructors). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/tutor/" google-query: inurl:"/wp-content/plugins/tutor/" shodan-query: 'vuln:CVE-2020-8615' - tags: cve,wordpress,wp-plugin,tutor,high + tags: cve,wordpress,wp-plugin,tutor,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-8658-edec211af3b7dbc24681331832d822e4.yaml b/nuclei-templates/2020/CVE-2020-8658-edec211af3b7dbc24681331832d822e4.yaml index d3a06a375a..976ba5a272 100644 --- a/nuclei-templates/2020/CVE-2020-8658-edec211af3b7dbc24681331832d822e4.yaml +++ b/nuclei-templates/2020/CVE-2020-8658-edec211af3b7dbc24681331832d822e4.yaml @@ -4,7 +4,7 @@ info: name: > Htaccess <= 1.8.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The BestWebSoft Htaccess plugin through 1.8.1 for WordPress allows wp-admin/admin.php?page=htaccess.php&action=htaccess_editor CSRF. The flag htccss_nonce_name passes the nonce to WordPress but the plugin does not validate it correctly, resulting in a wrong implementation of anti-CSRF protection. In this way, an attacker is able to direct the victim to a malicious web page that modifies the .htaccess file, and takes control of the website. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/htaccess/" google-query: inurl:"/wp-content/plugins/htaccess/" shodan-query: 'vuln:CVE-2020-8658' - tags: cve,wordpress,wp-plugin,htaccess,high + tags: cve,wordpress,wp-plugin,htaccess,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-8799-bea1167e010c002491bae397468a7fde.yaml b/nuclei-templates/2020/CVE-2020-8799-bea1167e010c002491bae397468a7fde.yaml index 2828fe8a08..7a4ef0372d 100644 --- a/nuclei-templates/2020/CVE-2020-8799-bea1167e010c002491bae397468a7fde.yaml +++ b/nuclei-templates/2020/CVE-2020-8799-bea1167e010c002491bae397468a7fde.yaml @@ -4,7 +4,7 @@ info: name: > WTI Like Post <= 1.4.5 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > A Stored XSS vulnerability has been found in the administration page of the WTI Like Post plugin through 1.4.5 for WordPress. Once the administrator has submitted the data, the script stored is executed for all the users visiting the website. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wti-like-post/" google-query: inurl:"/wp-content/plugins/wti-like-post/" shodan-query: 'vuln:CVE-2020-8799' - tags: cve,wordpress,wp-plugin,wti-like-post,medium + tags: cve,wordpress,wp-plugin,wti-like-post,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-9003-010a08c8c856a2f4fe4e778e18ce7576.yaml b/nuclei-templates/2020/CVE-2020-9003-010a08c8c856a2f4fe4e778e18ce7576.yaml index b7efdcb0fa..3940d1e779 100644 --- a/nuclei-templates/2020/CVE-2020-9003-010a08c8c856a2f4fe4e778e18ce7576.yaml +++ b/nuclei-templates/2020/CVE-2020-9003-010a08c8c856a2f4fe4e778e18ce7576.yaml @@ -4,7 +4,7 @@ info: name: > Modula Image Gallery <= 2.2.4 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > A stored XSS vulnerability exists in the Modula Image Gallery plugin before 2.2.5 for WordPress. Successful exploitation of this vulnerability would allow an authenticated low-privileged user to inject arbitrary JavaScript code that is viewed by other users. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/modula-best-grid-gallery/" google-query: inurl:"/wp-content/plugins/modula-best-grid-gallery/" shodan-query: 'vuln:CVE-2020-9003' - tags: cve,wordpress,wp-plugin,modula-best-grid-gallery,medium + tags: cve,wordpress,wp-plugin,modula-best-grid-gallery,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-9019-52e9c784ee926500b6a7a44692c6aef8.yaml b/nuclei-templates/2020/CVE-2020-9019-52e9c784ee926500b6a7a44692c6aef8.yaml index b516dc27ed..39267d86b0 100644 --- a/nuclei-templates/2020/CVE-2020-9019-52e9c784ee926500b6a7a44692c6aef8.yaml +++ b/nuclei-templates/2020/CVE-2020-9019-52e9c784ee926500b6a7a44692c6aef8.yaml @@ -4,7 +4,7 @@ info: name: > WPJobBoard <= 5.5.3 - Unauthenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The WPJobBoard plugin 5.5.3 for WordPress allows Persistent XSS via the Add Job form, as demonstrated by title and Description. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpjobboard/" google-query: inurl:"/wp-content/plugins/wpjobboard/" shodan-query: 'vuln:CVE-2020-9019' - tags: cve,wordpress,wp-plugin,wpjobboard,medium + tags: cve,wordpress,wp-plugin,wpjobboard,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-9334-493dd00fbad457efffd98380feee37ad.yaml b/nuclei-templates/2020/CVE-2020-9334-493dd00fbad457efffd98380feee37ad.yaml index 9c99e3a96c..7eb47772d0 100644 --- a/nuclei-templates/2020/CVE-2020-9334-493dd00fbad457efffd98380feee37ad.yaml +++ b/nuclei-templates/2020/CVE-2020-9334-493dd00fbad457efffd98380feee37ad.yaml @@ -4,7 +4,7 @@ info: name: > Envira Photo Gallery <= 1.7.6 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > A stored XSS vulnerability exists in the Envira Photo Gallery plugin through 1.7.6 for WordPress. Successful exploitation of this vulnerability would allow a authenticated low-privileged user to inject arbitrary JavaScript code that is viewed by other users. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/envira-gallery-lite/" google-query: inurl:"/wp-content/plugins/envira-gallery-lite/" shodan-query: 'vuln:CVE-2020-9334' - tags: cve,wordpress,wp-plugin,envira-gallery-lite,medium + tags: cve,wordpress,wp-plugin,envira-gallery-lite,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-9335-9f00578ac1259c4fd1c8b9de9165324f.yaml b/nuclei-templates/2020/CVE-2020-9335-9f00578ac1259c4fd1c8b9de9165324f.yaml index 000cd682bb..726e3261f8 100644 --- a/nuclei-templates/2020/CVE-2020-9335-9f00578ac1259c4fd1c8b9de9165324f.yaml +++ b/nuclei-templates/2020/CVE-2020-9335-9f00578ac1259c4fd1c8b9de9165324f.yaml @@ -4,7 +4,7 @@ info: name: > Photo Gallery by 10Web <= 1.5.45 - Multiple Cross-Site Scripting Issues author: topscoder - severity: medium + severity: high description: > Multiple stored XSS vulnerabilities exist in the 10Web Photo Gallery plugin before 1.5.46 WordPress. Successful exploitation of this vulnerability would allow a authenticated admin user to inject arbitrary JavaScript code that is viewed by other users. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/photo-gallery/" google-query: inurl:"/wp-content/plugins/photo-gallery/" shodan-query: 'vuln:CVE-2020-9335' - tags: cve,wordpress,wp-plugin,photo-gallery,medium + tags: cve,wordpress,wp-plugin,photo-gallery,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-9371-297cb3aa5bbfd9cc7b8af82349a82915.yaml b/nuclei-templates/2020/CVE-2020-9371-297cb3aa5bbfd9cc7b8af82349a82915.yaml index 086f99a31b..0b9587791f 100644 --- a/nuclei-templates/2020/CVE-2020-9371-297cb3aa5bbfd9cc7b8af82349a82915.yaml +++ b/nuclei-templates/2020/CVE-2020-9371-297cb3aa5bbfd9cc7b8af82349a82915.yaml @@ -4,7 +4,7 @@ info: name: > Appointment Booking Calendar <= 1.3.34 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Stored XSS exists in the Appointment Booking Calendar plugin before 1.3.35 for WordPress. In the cpabc_appointments.php file, the Calendar Name input could allow attackers to inject arbitrary JavaScript or HTML. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/appointment-booking-calendar/" google-query: inurl:"/wp-content/plugins/appointment-booking-calendar/" shodan-query: 'vuln:CVE-2020-9371' - tags: cve,wordpress,wp-plugin,appointment-booking-calendar,medium + tags: cve,wordpress,wp-plugin,appointment-booking-calendar,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-9394-a0cf0c70320b9077a478823de4b5e05c.yaml b/nuclei-templates/2020/CVE-2020-9394-a0cf0c70320b9077a478823de4b5e05c.yaml index c14a3eb190..04081ced93 100644 --- a/nuclei-templates/2020/CVE-2020-9394-a0cf0c70320b9077a478823de4b5e05c.yaml +++ b/nuclei-templates/2020/CVE-2020-9394-a0cf0c70320b9077a478823de4b5e05c.yaml @@ -4,7 +4,7 @@ info: name: > Pricing Table by Supsystic <= 1.8.1 - Cross-Site Request Forgery to Cross-Site Scripting and Setting Changes author: topscoder - severity: high + severity: medium description: > An issue was discovered in the pricing-table-by-supsystic plugin before 1.8.2 for WordPress. It allows CSRF. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/pricing-table-by-supsystic/" google-query: inurl:"/wp-content/plugins/pricing-table-by-supsystic/" shodan-query: 'vuln:CVE-2020-9394' - tags: cve,wordpress,wp-plugin,pricing-table-by-supsystic,high + tags: cve,wordpress,wp-plugin,pricing-table-by-supsystic,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-9454-eab40a7edf5f2e1a98131d79813fdf48.yaml b/nuclei-templates/2020/CVE-2020-9454-eab40a7edf5f2e1a98131d79813fdf48.yaml index 4aacbc8630..4515ac489c 100644 --- a/nuclei-templates/2020/CVE-2020-9454-eab40a7edf5f2e1a98131d79813fdf48.yaml +++ b/nuclei-templates/2020/CVE-2020-9454-eab40a7edf5f2e1a98131d79813fdf48.yaml @@ -4,7 +4,7 @@ info: name: > RegistrationMagic – Custom Registration Forms and User Login <= 4.6.0.3 - Cross-Site Request Forgery to Settings Modification author: topscoder - severity: high + severity: medium description: > A CSRF vulnerability in the RegistrationMagic plugin through 4.6.0.3 for WordPress allows remote attackers to forge requests on behalf of a site administrator to change all settings for the plugin, including deleting users, creating new roles with escalated privileges, and allowing PHP file uploads via forms. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" shodan-query: 'vuln:CVE-2020-9454' - tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,high + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,medium http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-9455-8f8b97c7d5c0b9ba282a6dfa6a5c0131.yaml b/nuclei-templates/2020/CVE-2020-9455-8f8b97c7d5c0b9ba282a6dfa6a5c0131.yaml index d710d7898c..90e1f31f8a 100644 --- a/nuclei-templates/2020/CVE-2020-9455-8f8b97c7d5c0b9ba282a6dfa6a5c0131.yaml +++ b/nuclei-templates/2020/CVE-2020-9455-8f8b97c7d5c0b9ba282a6dfa6a5c0131.yaml @@ -4,7 +4,7 @@ info: name: > RegistrationMagic – Custom Registration Forms and User Login <= 4.6.0.3 - Authenticated Email Injection author: topscoder - severity: medium + severity: low description: > The RegistrationMagic plugin through 4.6.0.3 for WordPress allows remote authenticated users (with minimal privileges) to send arbitrary emails on behalf of the site via class_rm_user_services.php send_email_user_view. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" shodan-query: 'vuln:CVE-2020-9455' - tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,medium + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-9456-1d190b0241a92bf4c0712f3b939e7393.yaml b/nuclei-templates/2020/CVE-2020-9456-1d190b0241a92bf4c0712f3b939e7393.yaml index b3ac8bcc04..5f968fbcce 100644 --- a/nuclei-templates/2020/CVE-2020-9456-1d190b0241a92bf4c0712f3b939e7393.yaml +++ b/nuclei-templates/2020/CVE-2020-9456-1d190b0241a92bf4c0712f3b939e7393.yaml @@ -4,7 +4,7 @@ info: name: > RegistrationMagic – Custom Registration Forms and User Login <= 4.6.0.3 - Authenticated Privilege Escalation author: topscoder - severity: critical + severity: low description: > In the RegistrationMagic plugin through 4.6.0.3 for WordPress, the user controller allows remote authenticated users (with minimal privileges) to elevate their privileges to administrator via class_rm_user_controller.php rm_user_edit. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" shodan-query: 'vuln:CVE-2020-9456' - tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,critical + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-9457-750b74705bdff8d7fe8b29d226f6a7fb.yaml b/nuclei-templates/2020/CVE-2020-9457-750b74705bdff8d7fe8b29d226f6a7fb.yaml index 1f64c84821..0616501228 100644 --- a/nuclei-templates/2020/CVE-2020-9457-750b74705bdff8d7fe8b29d226f6a7fb.yaml +++ b/nuclei-templates/2020/CVE-2020-9457-750b74705bdff8d7fe8b29d226f6a7fb.yaml @@ -4,7 +4,7 @@ info: name: > RegistrationMagic – Custom Registration Forms and User Login <= 4.6.0.3 - Authenticated Settings Import to Privilege Escalation author: topscoder - severity: critical + severity: low description: > The RegistrationMagic plugin through 4.6.0.3 for WordPress allows remote authenticated users (with minimal privileges) to import custom vulnerable forms and change form settings via class_rm_form_settings_controller.php, resulting in privilege escalation. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" shodan-query: 'vuln:CVE-2020-9457' - tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,critical + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-9458-4ebf8466ab7647227779ddf8d6ac3494.yaml b/nuclei-templates/2020/CVE-2020-9458-4ebf8466ab7647227779ddf8d6ac3494.yaml index 12cd5c127c..7e8e6ccb82 100644 --- a/nuclei-templates/2020/CVE-2020-9458-4ebf8466ab7647227779ddf8d6ac3494.yaml +++ b/nuclei-templates/2020/CVE-2020-9458-4ebf8466ab7647227779ddf8d6ac3494.yaml @@ -4,7 +4,7 @@ info: name: > RegistrationMagic – Custom Registration Forms and User Login <= 4.6.0.3 - Authenticated Settings and User Data Export author: topscoder - severity: medium + severity: low description: > In the RegistrationMagic plugin through 4.6.0.3 for WordPress, the export function allows remote authenticated users (with minimal privileges) to export submitted form data and settings via class_rm_form_controller.php rm_form_export. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/custom-registration-form-builder-with-submission-manager/" google-query: inurl:"/wp-content/plugins/custom-registration-form-builder-with-submission-manager/" shodan-query: 'vuln:CVE-2020-9458' - tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,medium + tags: cve,wordpress,wp-plugin,custom-registration-form-builder-with-submission-manager,low http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-9459-7ec9f64a1c57f6403dfdbff51a32f9cb.yaml b/nuclei-templates/2020/CVE-2020-9459-7ec9f64a1c57f6403dfdbff51a32f9cb.yaml index 9caf170961..3607edf4b2 100644 --- a/nuclei-templates/2020/CVE-2020-9459-7ec9f64a1c57f6403dfdbff51a32f9cb.yaml +++ b/nuclei-templates/2020/CVE-2020-9459-7ec9f64a1c57f6403dfdbff51a32f9cb.yaml @@ -4,7 +4,7 @@ info: name: > Modern Events Calendar Lite <= 5.1.6 - Missing Authorization to Stored Cross-Site Scripting and Settings Update author: topscoder - severity: medium + severity: high description: > Multiple Stored Cross-site scripting (XSS) vulnerabilities in the Webnus Modern Events Calendar Lite plugin through 5.1.6 for WordPress allows remote authenticated users (with minimal permissions) to inject arbitrary JavaScript, HTML, or CSS via Ajax actions. This affects mec_save_notifications and import_settings. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/modern-events-calendar-lite/" google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" shodan-query: 'vuln:CVE-2020-9459' - tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,medium + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,high http: - method: GET diff --git a/nuclei-templates/2020/CVE-2020-9514-ce70b843af38d7c69c95be8ff1b26205.yaml b/nuclei-templates/2020/CVE-2020-9514-ce70b843af38d7c69c95be8ff1b26205.yaml index 2675577f78..d1ac29c403 100644 --- a/nuclei-templates/2020/CVE-2020-9514-ce70b843af38d7c69c95be8ff1b26205.yaml +++ b/nuclei-templates/2020/CVE-2020-9514-ce70b843af38d7c69c95be8ff1b26205.yaml @@ -4,7 +4,7 @@ info: name: > IMPress for IDX Broker <= 2.6.1 - Authenticated Arbitrary Post Creation, Modification, and Deletion author: topscoder - severity: high + severity: low description: > An issue was discovered in the IMPress for IDX Broker plugin before 2.6.2 for WordPress. wrappers.php allows a logged-in user (with the Subscriber role) to permanently delete arbitrary posts and pages, create new posts with arbitrary subjects, and modify the subjects of existing posts and pages (via create_dynamic_page and delete_dynamic_page). This is due to missing capability and nonce checks on two of its Ajax actions. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/idx-broker-platinum/" google-query: inurl:"/wp-content/plugins/idx-broker-platinum/" shodan-query: 'vuln:CVE-2020-9514' - tags: cve,wordpress,wp-plugin,idx-broker-platinum,high + tags: cve,wordpress,wp-plugin,idx-broker-platinum,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-20652-e5ace19f8910dfb41dd382bdef641807.yaml b/nuclei-templates/2021/CVE-2021-20652-e5ace19f8910dfb41dd382bdef641807.yaml index 98d4590a50..7486f0305a 100644 --- a/nuclei-templates/2021/CVE-2021-20652-e5ace19f8910dfb41dd382bdef641807.yaml +++ b/nuclei-templates/2021/CVE-2021-20652-e5ace19f8910dfb41dd382bdef641807.yaml @@ -4,7 +4,7 @@ info: name: > Name Directory <= 1.17.4 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery vulnerability in Name Directory 1.17.4 and earlier allows remote attackers to hijack the authentication of administrators via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/name-directory/" google-query: inurl:"/wp-content/plugins/name-directory/" shodan-query: 'vuln:CVE-2021-20652' - tags: cve,wordpress,wp-plugin,name-directory,high + tags: cve,wordpress,wp-plugin,name-directory,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-20678-9d10b05b216e9b3725f77f2e756c3bb4.yaml b/nuclei-templates/2021/CVE-2021-20678-9d10b05b216e9b3725f77f2e756c3bb4.yaml index d82bb03dc0..2dbf995fca 100644 --- a/nuclei-templates/2021/CVE-2021-20678-9d10b05b216e9b3725f77f2e756c3bb4.yaml +++ b/nuclei-templates/2021/CVE-2021-20678-9d10b05b216e9b3725f77f2e756c3bb4.yaml @@ -4,7 +4,7 @@ info: name: > Paid Memberships Pro <= 2.5.5 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > SQL injection vulnerability in the Paid Memberships Pro versions prior to 2.5.6 allows remote authenticated attackers to execute arbitrary SQL commands via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/paid-memberships-pro/" google-query: inurl:"/wp-content/plugins/paid-memberships-pro/" shodan-query: 'vuln:CVE-2021-20678' - tags: cve,wordpress,wp-plugin,paid-memberships-pro,high + tags: cve,wordpress,wp-plugin,paid-memberships-pro,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-20714-5159dc207c489f95e16ee89d4e708b82.yaml b/nuclei-templates/2021/CVE-2021-20714-5159dc207c489f95e16ee89d4e708b82.yaml index 553a0377bf..cd0cf7583a 100644 --- a/nuclei-templates/2021/CVE-2021-20714-5159dc207c489f95e16ee89d4e708b82.yaml +++ b/nuclei-templates/2021/CVE-2021-20714-5159dc207c489f95e16ee89d4e708b82.yaml @@ -4,7 +4,7 @@ info: name: > WP Fastest Cache <= 0.9.1.6 - Authenticated (Admin+) Directory Traversal to Arbitrary File Deletion author: topscoder - severity: medium + severity: low description: > Directory traversal vulnerability in WP Fastest Cache versions prior to 0.9.1.7 allows a remote attacker with administrator privileges to delete arbitrary files on the server via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-fastest-cache/" google-query: inurl:"/wp-content/plugins/wp-fastest-cache/" shodan-query: 'vuln:CVE-2021-20714' - tags: cve,wordpress,wp-plugin,wp-fastest-cache,medium + tags: cve,wordpress,wp-plugin,wp-fastest-cache,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-20746-178d99b6f6579f15b7e84dce26c43816.yaml b/nuclei-templates/2021/CVE-2021-20746-178d99b6f6579f15b7e84dce26c43816.yaml index 965c218a7c..d8b4f65904 100644 --- a/nuclei-templates/2021/CVE-2021-20746-178d99b6f6579f15b7e84dce26c43816.yaml +++ b/nuclei-templates/2021/CVE-2021-20746-178d99b6f6579f15b7e84dce26c43816.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Popular Posts <= 5.3.2 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Cross-site scripting vulnerability in WordPress Popular Posts 5.3.2 and earlier allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wordpress-popular-posts/" google-query: inurl:"/wp-content/plugins/wordpress-popular-posts/" shodan-query: 'vuln:CVE-2021-20746' - tags: cve,wordpress,wp-plugin,wordpress-popular-posts,medium + tags: cve,wordpress,wp-plugin,wordpress-popular-posts,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-20779-a97999937eba2822f909f308d3c02136.yaml b/nuclei-templates/2021/CVE-2021-20779-a97999937eba2822f909f308d3c02136.yaml index 1e859e5598..890777a344 100644 --- a/nuclei-templates/2021/CVE-2021-20779-a97999937eba2822f909f308d3c02136.yaml +++ b/nuclei-templates/2021/CVE-2021-20779-a97999937eba2822f909f308d3c02136.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Email Template Designer < 3.0.8 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in WordPress Email Template Designer - WP HTML Mail versions prior to 3.0.8 allows remote attackers to hijack the authentication of administrators via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-html-mail/" google-query: inurl:"/wp-content/plugins/wp-html-mail/" shodan-query: 'vuln:CVE-2021-20779' - tags: cve,wordpress,wp-plugin,wp-html-mail,high + tags: cve,wordpress,wp-plugin,wp-html-mail,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-20781-388ffda3d201191cb375824a74d92ffc.yaml b/nuclei-templates/2021/CVE-2021-20781-388ffda3d201191cb375824a74d92ffc.yaml index b8665c6142..ef6b368a51 100644 --- a/nuclei-templates/2021/CVE-2021-20781-388ffda3d201191cb375824a74d92ffc.yaml +++ b/nuclei-templates/2021/CVE-2021-20781-388ffda3d201191cb375824a74d92ffc.yaml @@ -4,7 +4,7 @@ info: name: > Meta Data Filter & Taxonomies Filter <= 1.2.7.2 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Meta Data Filter & Taxonomies Filter plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions versions prior to v.2.2.8. This is due to missing or incorrect nonce validation on the draw_settings_page() function. This makes it possible for unauthenticated attackers to inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" google-query: inurl:"/wp-content/plugins/wp-meta-data-filter-and-taxonomy-filter/" shodan-query: 'vuln:CVE-2021-20781' - tags: cve,wordpress,wp-plugin,wp-meta-data-filter-and-taxonomy-filter,high + tags: cve,wordpress,wp-plugin,wp-meta-data-filter-and-taxonomy-filter,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-20782-b0e0ed74ea2c963635231dd123335584.yaml b/nuclei-templates/2021/CVE-2021-20782-b0e0ed74ea2c963635231dd123335584.yaml index 23aec7e82d..d4da8fe301 100644 --- a/nuclei-templates/2021/CVE-2021-20782-b0e0ed74ea2c963635231dd123335584.yaml +++ b/nuclei-templates/2021/CVE-2021-20782-b0e0ed74ea2c963635231dd123335584.yaml @@ -4,7 +4,7 @@ info: name: > Software License Manager < 4.4.6 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in Software License Manager versions prior to 4.4.6 allows remote attackers to hijack the authentication of administrators via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/software-license-manager/" google-query: inurl:"/wp-content/plugins/software-license-manager/" shodan-query: 'vuln:CVE-2021-20782' - tags: cve,wordpress,wp-plugin,software-license-manager,high + tags: cve,wordpress,wp-plugin,software-license-manager,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-20792-20fec9c706022c27227f812437225b4b.yaml b/nuclei-templates/2021/CVE-2021-20792-20fec9c706022c27227f812437225b4b.yaml index 8cd839402b..a60f7a2c96 100644 --- a/nuclei-templates/2021/CVE-2021-20792-20fec9c706022c27227f812437225b4b.yaml +++ b/nuclei-templates/2021/CVE-2021-20792-20fec9c706022c27227f812437225b4b.yaml @@ -4,7 +4,7 @@ info: name: > Quiz and Survey Master <= 7.1.13 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Cross-site scripting vulnerability in Quiz And Survey Master versions prior to 7.1.14 allows a remote attacker to inject arbitrary script via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/quiz-master-next/" google-query: inurl:"/wp-content/plugins/quiz-master-next/" shodan-query: 'vuln:CVE-2021-20792' - tags: cve,wordpress,wp-plugin,quiz-master-next,medium + tags: cve,wordpress,wp-plugin,quiz-master-next,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-20831-d6eff878d5e751e7448431e370bd1e18.yaml b/nuclei-templates/2021/CVE-2021-20831-d6eff878d5e751e7448431e370bd1e18.yaml index 222f4fd6c6..febd5ff71f 100644 --- a/nuclei-templates/2021/CVE-2021-20831-d6eff878d5e751e7448431e370bd1e18.yaml +++ b/nuclei-templates/2021/CVE-2021-20831-d6eff878d5e751e7448431e370bd1e18.yaml @@ -4,7 +4,7 @@ info: name: > OG Tags <= 2.0.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in OG Tags versions prior to 2.0.2 allows a remote attacker to hijack the authentication of administrators and unintended operation may be performed via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/og-tags/" google-query: inurl:"/wp-content/plugins/og-tags/" shodan-query: 'vuln:CVE-2021-20831' - tags: cve,wordpress,wp-plugin,og-tags,high + tags: cve,wordpress,wp-plugin,og-tags,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-20846-1aa0482b62398dab21c7b36e9908a28d.yaml b/nuclei-templates/2021/CVE-2021-20846-1aa0482b62398dab21c7b36e9908a28d.yaml index 9dbd9430ef..4f547476aa 100644 --- a/nuclei-templates/2021/CVE-2021-20846-1aa0482b62398dab21c7b36e9908a28d.yaml +++ b/nuclei-templates/2021/CVE-2021-20846-1aa0482b62398dab21c7b36e9908a28d.yaml @@ -4,7 +4,7 @@ info: name: > Push Notifications for WordPress (Lite) < 6.0.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in Push Notifications for WordPress (Lite) versions prior to 6.0.1 allows a remote attacker to hijack the authentication of an administrator and conduct an arbitrary operation via a specially crafted web page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/push-notifications-for-wp/" google-query: inurl:"/wp-content/plugins/push-notifications-for-wp/" shodan-query: 'vuln:CVE-2021-20846' - tags: cve,wordpress,wp-plugin,push-notifications-for-wp,high + tags: cve,wordpress,wp-plugin,push-notifications-for-wp,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-20851-99e41ed657ab27362dc617dd94edb65f.yaml b/nuclei-templates/2021/CVE-2021-20851-99e41ed657ab27362dc617dd94edb65f.yaml index be0c1d6c50..5225d12f4c 100644 --- a/nuclei-templates/2021/CVE-2021-20851-99e41ed657ab27362dc617dd94edb65f.yaml +++ b/nuclei-templates/2021/CVE-2021-20851-99e41ed657ab27362dc617dd94edb65f.yaml @@ -4,7 +4,7 @@ info: name: > Browser and Operating System Finder <= 1.1 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Cross-site request forgery (CSRF) vulnerability in Browser and Operating System Finder versions prior to 1.2 allows a remote unauthenticated attacker to hijack the authentication of an administrator via unspecified vectors. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/browser-and-operating-system-finder/" google-query: inurl:"/wp-content/plugins/browser-and-operating-system-finder/" shodan-query: 'vuln:CVE-2021-20851' - tags: cve,wordpress,wp-plugin,browser-and-operating-system-finder,high + tags: cve,wordpress,wp-plugin,browser-and-operating-system-finder,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-20865-3a746fc902e2b6559213043452550064.yaml b/nuclei-templates/2021/CVE-2021-20865-3a746fc902e2b6559213043452550064.yaml index f3b1402911..59ce5c4ca2 100644 --- a/nuclei-templates/2021/CVE-2021-20865-3a746fc902e2b6559213043452550064.yaml +++ b/nuclei-templates/2021/CVE-2021-20865-3a746fc902e2b6559213043452550064.yaml @@ -14,17 +14,17 @@ info: cvss-score: 7.5 cve-id: CVE-2021-20865 metadata: - fofa-query: "wp-content/plugins/advanced-custom-fields/" - google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" + fofa-query: "wp-content/plugins/advanced-custom-fields-pro/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields-pro/" shodan-query: 'vuln:CVE-2021-20865' - tags: cve,wordpress,wp-plugin,advanced-custom-fields,high + tags: cve,wordpress,wp-plugin,advanced-custom-fields-pro,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields/readme.txt" + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields-pro/readme.txt" extractors: - type: regex @@ -50,7 +50,7 @@ http: - type: word words: - - "advanced-custom-fields" + - "advanced-custom-fields-pro" part: body - type: dsl diff --git a/nuclei-templates/2021/CVE-2021-20866-d907690c5c767a972864a779d8ced723.yaml b/nuclei-templates/2021/CVE-2021-20866-d907690c5c767a972864a779d8ced723.yaml index c460345f4c..1c96f00608 100644 --- a/nuclei-templates/2021/CVE-2021-20866-d907690c5c767a972864a779d8ced723.yaml +++ b/nuclei-templates/2021/CVE-2021-20866-d907690c5c767a972864a779d8ced723.yaml @@ -4,7 +4,7 @@ info: name: > Advanced Custom Fields <= 5.10 - Missing Authorization to Information Disclosure author: topscoder - severity: medium + severity: high description: > Advanced Custom Fields versions prior to 5.11 and Advanced Custom Fields Pro versions prior to 5.11 contain a missing authorization vulnerability in obtaining the user list which may allow a user to obtain the unauthorized information via unspecified vectors. reference: @@ -14,17 +14,17 @@ info: cvss-score: 6.5 cve-id: CVE-2021-20866 metadata: - fofa-query: "wp-content/plugins/advanced-custom-fields/" - google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" + fofa-query: "wp-content/plugins/advanced-custom-fields-pro/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields-pro/" shodan-query: 'vuln:CVE-2021-20866' - tags: cve,wordpress,wp-plugin,advanced-custom-fields,medium + tags: cve,wordpress,wp-plugin,advanced-custom-fields-pro,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields/readme.txt" + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields-pro/readme.txt" extractors: - type: regex @@ -50,7 +50,7 @@ http: - type: word words: - - "advanced-custom-fields" + - "advanced-custom-fields-pro" part: body - type: dsl diff --git a/nuclei-templates/2021/CVE-2021-20867-db2d8a1251fb5f78024e34146e92e4d0.yaml b/nuclei-templates/2021/CVE-2021-20867-db2d8a1251fb5f78024e34146e92e4d0.yaml index 51f0903205..2e990d1713 100644 --- a/nuclei-templates/2021/CVE-2021-20867-db2d8a1251fb5f78024e34146e92e4d0.yaml +++ b/nuclei-templates/2021/CVE-2021-20867-db2d8a1251fb5f78024e34146e92e4d0.yaml @@ -4,7 +4,7 @@ info: name: > Advanced Custom Fields <= 5.10 - Missing Authorization on Option Changes author: topscoder - severity: medium + severity: high description: > Advanced Custom Fields versions prior to 5.11 and Advanced Custom Fields Pro versions prior to 5.11 contain a missing authorization vulnerability in moving the field group which may allow a user to move the unauthorized field group via unspecified vectors. reference: @@ -14,17 +14,17 @@ info: cvss-score: 4.3 cve-id: CVE-2021-20867 metadata: - fofa-query: "wp-content/plugins/advanced-custom-fields/" - google-query: inurl:"/wp-content/plugins/advanced-custom-fields/" + fofa-query: "wp-content/plugins/advanced-custom-fields-pro/" + google-query: inurl:"/wp-content/plugins/advanced-custom-fields-pro/" shodan-query: 'vuln:CVE-2021-20867' - tags: cve,wordpress,wp-plugin,advanced-custom-fields,medium + tags: cve,wordpress,wp-plugin,advanced-custom-fields-pro,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields/readme.txt" + - "{{BaseURL}}/wp-content/plugins/advanced-custom-fields-pro/readme.txt" extractors: - type: regex @@ -50,7 +50,7 @@ http: - type: word words: - - "advanced-custom-fields" + - "advanced-custom-fields-pro" part: body - type: dsl diff --git a/nuclei-templates/2021/CVE-2021-23150-c05da70d5ed77ea30636d59ab804aaa2.yaml b/nuclei-templates/2021/CVE-2021-23150-c05da70d5ed77ea30636d59ab804aaa2.yaml index 68616335fd..d756c02ec5 100644 --- a/nuclei-templates/2021/CVE-2021-23150-c05da70d5ed77ea30636d59ab804aaa2.yaml +++ b/nuclei-templates/2021/CVE-2021-23150-c05da70d5ed77ea30636d59ab804aaa2.yaml @@ -4,7 +4,7 @@ info: name: > AMP for WP – Accelerated Mobile Pages <= 1.0.77.31 - Authenticated (Admin+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Authenticated (admin or higher user role) Stored Cross-Site Scripting (XSS) vulnerability discovered in AMP for WP – Accelerated Mobile Pages WordPress plugin (versions <= 1.0.77.31). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/accelerated-mobile-pages/" google-query: inurl:"/wp-content/plugins/accelerated-mobile-pages/" shodan-query: 'vuln:CVE-2021-23150' - tags: cve,wordpress,wp-plugin,accelerated-mobile-pages,medium + tags: cve,wordpress,wp-plugin,accelerated-mobile-pages,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-23174-9156a008e8a44bce922b7f9ab6484346.yaml b/nuclei-templates/2021/CVE-2021-23174-9156a008e8a44bce922b7f9ab6484346.yaml index a68a00fccd..f52b8a1b96 100644 --- a/nuclei-templates/2021/CVE-2021-23174-9156a008e8a44bce922b7f9ab6484346.yaml +++ b/nuclei-templates/2021/CVE-2021-23174-9156a008e8a44bce922b7f9ab6484346.yaml @@ -4,7 +4,7 @@ info: name: > Download Monitor <= 4.4.6 - Authenticated (Admin+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Authenticated (admin+) Persistent Cross-Site Scripting (XSS) vulnerability discovered in Download Monitor WordPress plugin (versions <= 4.4.6) Vulnerable parameters: &post_title, &downloadable_file_version[0]. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/download-monitor/" google-query: inurl:"/wp-content/plugins/download-monitor/" shodan-query: 'vuln:CVE-2021-23174' - tags: cve,wordpress,wp-plugin,download-monitor,medium + tags: cve,wordpress,wp-plugin,download-monitor,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-23209-c7b7a15003ffbb80a100eb159e64a8bf.yaml b/nuclei-templates/2021/CVE-2021-23209-c7b7a15003ffbb80a100eb159e64a8bf.yaml index 0f7d070d14..4d19b5162e 100644 --- a/nuclei-templates/2021/CVE-2021-23209-c7b7a15003ffbb80a100eb159e64a8bf.yaml +++ b/nuclei-templates/2021/CVE-2021-23209-c7b7a15003ffbb80a100eb159e64a8bf.yaml @@ -4,7 +4,7 @@ info: name: > AMP for WP <= 1.0.77.32 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Multiple Authenticated (admin user role) Persistent Cross-Site Scripting (XSS) vulnerabilities discovered in AMP for WP – Accelerated Mobile Pages WordPress plugin (versions <= 1.0.77.32). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/accelerated-mobile-pages/" google-query: inurl:"/wp-content/plugins/accelerated-mobile-pages/" shodan-query: 'vuln:CVE-2021-23209' - tags: cve,wordpress,wp-plugin,accelerated-mobile-pages,medium + tags: cve,wordpress,wp-plugin,accelerated-mobile-pages,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-23227-f8e9e8a25542e313c19a4d2c9a30bf10.yaml b/nuclei-templates/2021/CVE-2021-23227-f8e9e8a25542e313c19a4d2c9a30bf10.yaml index e32707a3b0..9873b4c633 100644 --- a/nuclei-templates/2021/CVE-2021-23227-f8e9e8a25542e313c19a4d2c9a30bf10.yaml +++ b/nuclei-templates/2021/CVE-2021-23227-f8e9e8a25542e313c19a4d2c9a30bf10.yaml @@ -4,7 +4,7 @@ info: name: > PHP Everywhere <= 2.0.2 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The PHP Everywhere plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.0.2. This makes it possible for unauthenticated attackers to conduct unspecified potential attacks via forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/php-everywhere/" google-query: inurl:"/wp-content/plugins/php-everywhere/" shodan-query: 'vuln:CVE-2021-23227' - tags: cve,wordpress,wp-plugin,php-everywhere,high + tags: cve,wordpress,wp-plugin,php-everywhere,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24123-2a2fe738939a9e67d5cb46ca54ca2af9.yaml b/nuclei-templates/2021/CVE-2021-24123-2a2fe738939a9e67d5cb46ca54ca2af9.yaml index fdb554ed28..39ade3f1a8 100644 --- a/nuclei-templates/2021/CVE-2021-24123-2a2fe738939a9e67d5cb46ca54ca2af9.yaml +++ b/nuclei-templates/2021/CVE-2021-24123-2a2fe738939a9e67d5cb46ca54ca2af9.yaml @@ -4,7 +4,7 @@ info: name: > PowerPress <= 8.3.7 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > Arbitrary file upload in the PowerPress WordPress plugin, versions before 8.3.7, did not verify some of the uploaded feed images (such as the ones from Podcast Artwork section), allowing high privilege accounts (admin+) being able to upload arbitrary files, such as php, leading to RCE. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/powerpress/" google-query: inurl:"/wp-content/plugins/powerpress/" shodan-query: 'vuln:CVE-2021-24123' - tags: cve,wordpress,wp-plugin,powerpress,high + tags: cve,wordpress,wp-plugin,powerpress,critical http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24125-fa320a52a4bd2b6a6f52aad5ce1ea74d.yaml b/nuclei-templates/2021/CVE-2021-24125-fa320a52a4bd2b6a6f52aad5ce1ea74d.yaml index 24da37cb74..4688bad3e3 100644 --- a/nuclei-templates/2021/CVE-2021-24125-fa320a52a4bd2b6a6f52aad5ce1ea74d.yaml +++ b/nuclei-templates/2021/CVE-2021-24125-fa320a52a4bd2b6a6f52aad5ce1ea74d.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form Submissions <= 1.7 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > Unvalidated input in the Contact Form Submissions WordPress plugin before 1.7.1, could lead to SQL injection in the wpcf7_contact_form GET parameter when submitting a filter request as a high privilege user (admin+) reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-submissions/" google-query: inurl:"/wp-content/plugins/contact-form-submissions/" shodan-query: 'vuln:CVE-2021-24125' - tags: cve,wordpress,wp-plugin,contact-form-submissions,high + tags: cve,wordpress,wp-plugin,contact-form-submissions,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24126-cc4dabd01e1338fc09aa2ef444904587.yaml b/nuclei-templates/2021/CVE-2021-24126-cc4dabd01e1338fc09aa2ef444904587.yaml index c4b73a3c38..e4f5b7f494 100644 --- a/nuclei-templates/2021/CVE-2021-24126-cc4dabd01e1338fc09aa2ef444904587.yaml +++ b/nuclei-templates/2021/CVE-2021-24126-cc4dabd01e1338fc09aa2ef444904587.yaml @@ -4,7 +4,7 @@ info: name: > Envira Gallery Lite <= 1.8.3.2 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Unvalidated input and lack of output encoding in the Envira Gallery Lite WordPress plugin, versions before 1.8.3.3, did not properly sanitise the images metadata (namely title) before outputting them in the generated gallery, which could lead to privilege escalation. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/envira-gallery-lite/" google-query: inurl:"/wp-content/plugins/envira-gallery-lite/" shodan-query: 'vuln:CVE-2021-24126' - tags: cve,wordpress,wp-plugin,envira-gallery-lite,medium + tags: cve,wordpress,wp-plugin,envira-gallery-lite,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24127-7f32d3ac2f0177d9329a7490c025ed06.yaml b/nuclei-templates/2021/CVE-2021-24127-7f32d3ac2f0177d9329a7490c025ed06.yaml index eb081b185e..eee77baf0f 100644 --- a/nuclei-templates/2021/CVE-2021-24127-7f32d3ac2f0177d9329a7490c025ed06.yaml +++ b/nuclei-templates/2021/CVE-2021-24127-7f32d3ac2f0177d9329a7490c025ed06.yaml @@ -4,7 +4,7 @@ info: name: > ThirstyAffiliates Affiliate Link Manager <= 3.9.2 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Unvalidated input and lack of output encoding in the ThirstyAffiliates Affiliate Link Manager WordPress plugin, versions before 3.9.3, was vulnerable to authenticated Stored Cross-Site Scripting (XSS), which could lead to privilege escalation. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/thirstyaffiliates/" google-query: inurl:"/wp-content/plugins/thirstyaffiliates/" shodan-query: 'vuln:CVE-2021-24127' - tags: cve,wordpress,wp-plugin,thirstyaffiliates,medium + tags: cve,wordpress,wp-plugin,thirstyaffiliates,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24128-7cd66621baa98ee6c1094c3629ee5b9c.yaml b/nuclei-templates/2021/CVE-2021-24128-7cd66621baa98ee6c1094c3629ee5b9c.yaml index 1cd4bfa226..5ac1433dc7 100644 --- a/nuclei-templates/2021/CVE-2021-24128-7cd66621baa98ee6c1094c3629ee5b9c.yaml +++ b/nuclei-templates/2021/CVE-2021-24128-7cd66621baa98ee6c1094c3629ee5b9c.yaml @@ -4,7 +4,7 @@ info: name: > Team Members <= 5.0.3 - Authenticated Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Unvalidated input and lack of output encoding in the Team Members WordPress plugin, versions before 5.0.4, lead to Cross-site scripting vulnerabilities allowing medium-privileged authenticated attacker (contributor+) to inject arbitrary web script or HTML via the 'Description/biography' of a member. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/tc-team-members/" google-query: inurl:"/wp-content/plugins/tc-team-members/" shodan-query: 'vuln:CVE-2021-24128' - tags: cve,wordpress,wp-plugin,tc-team-members,medium + tags: cve,wordpress,wp-plugin,tc-team-members,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24129-293ee203790c9494dd9271c2d0887ade.yaml b/nuclei-templates/2021/CVE-2021-24129-293ee203790c9494dd9271c2d0887ade.yaml index 6b6950cd13..f0ce1bcb16 100644 --- a/nuclei-templates/2021/CVE-2021-24129-293ee203790c9494dd9271c2d0887ade.yaml +++ b/nuclei-templates/2021/CVE-2021-24129-293ee203790c9494dd9271c2d0887ade.yaml @@ -4,7 +4,7 @@ info: name: > Themify Portfolio Post <= 1.1.5 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Unvalidated input and lack of output encoding in the Themify Portfolio Post WordPress plugin, versions before 1.1.6, lead to Stored Cross-Site Scripting (XSS) vulnerabilities allowing low-privileged users (Contributor+) to inject arbitrary JavaScript code or HTML in posts where the Themify Custom Panel is embedded, which could lead to privilege escalation. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/themify-portfolio-post/" google-query: inurl:"/wp-content/plugins/themify-portfolio-post/" shodan-query: 'vuln:CVE-2021-24129' - tags: cve,wordpress,wp-plugin,themify-portfolio-post,medium + tags: cve,wordpress,wp-plugin,themify-portfolio-post,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24130-0680dcfefb929cf836c59db202cd40da.yaml b/nuclei-templates/2021/CVE-2021-24130-0680dcfefb929cf836c59db202cd40da.yaml index 62c3f3908b..60d755aac7 100644 --- a/nuclei-templates/2021/CVE-2021-24130-0680dcfefb929cf836c59db202cd40da.yaml +++ b/nuclei-templates/2021/CVE-2021-24130-0680dcfefb929cf836c59db202cd40da.yaml @@ -4,7 +4,7 @@ info: name: > WP Google Map Plugin <= 4.1.4 - Authenticated SQL Injection via Orderby author: topscoder - severity: high + severity: low description: > Unvalidated input in the WP Google Map Plugin WordPress plugin, versions before 4.1.5, in the Manage Locations page within the plugin settings was vulnerable to SQL Injection through a high privileged user (admin+). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-google-map-plugin/" google-query: inurl:"/wp-content/plugins/wp-google-map-plugin/" shodan-query: 'vuln:CVE-2021-24130' - tags: cve,wordpress,wp-plugin,wp-google-map-plugin,high + tags: cve,wordpress,wp-plugin,wp-google-map-plugin,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24131-4459115a144ee37cdfb4079325938d4b.yaml b/nuclei-templates/2021/CVE-2021-24131-4459115a144ee37cdfb4079325938d4b.yaml index 14b916266b..39377daff9 100644 --- a/nuclei-templates/2021/CVE-2021-24131-4459115a144ee37cdfb4079325938d4b.yaml +++ b/nuclei-templates/2021/CVE-2021-24131-4459115a144ee37cdfb4079325938d4b.yaml @@ -4,7 +4,7 @@ info: name: > Anti-Spam by CleanTalk < 5.149 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > Unvalidated input in the Anti-Spam by CleanTalk WordPress plugin, versions before 5.149, lead to multiple authenticated SQL injection vulnerabilities, however, it requires high privilege user (admin+). reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cleantalk-spam-protect/" google-query: inurl:"/wp-content/plugins/cleantalk-spam-protect/" shodan-query: 'vuln:CVE-2021-24131' - tags: cve,wordpress,wp-plugin,cleantalk-spam-protect,high + tags: cve,wordpress,wp-plugin,cleantalk-spam-protect,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24132-0f314421e3eb6001edc6ef983cf272a2.yaml b/nuclei-templates/2021/CVE-2021-24132-0f314421e3eb6001edc6ef983cf272a2.yaml index 8ae256e42c..43b7935c89 100644 --- a/nuclei-templates/2021/CVE-2021-24132-0f314421e3eb6001edc6ef983cf272a2.yaml +++ b/nuclei-templates/2021/CVE-2021-24132-0f314421e3eb6001edc6ef983cf272a2.yaml @@ -4,7 +4,7 @@ info: name: > Slider by 10Web <= 1.2.35 - SQL Injection author: topscoder - severity: high + severity: critical description: > The Slider by 10Web WordPress plugin, versions before 1.2.36, in the bulk_action, export_full and save_slider_db functionalities of the plugin were vulnerable, allowing a high privileged user (Admin), or medium one such as Contributor+ (if "Role Options" is turn on for other users) to perform a SQL Injection attacks. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/slider-wd/" google-query: inurl:"/wp-content/plugins/slider-wd/" shodan-query: 'vuln:CVE-2021-24132' - tags: cve,wordpress,wp-plugin,slider-wd,high + tags: cve,wordpress,wp-plugin,slider-wd,critical http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24134-b14574939a93e002a63be522534dc429.yaml b/nuclei-templates/2021/CVE-2021-24134-b14574939a93e002a63be522534dc429.yaml index f799b56674..f24ac1d569 100644 --- a/nuclei-templates/2021/CVE-2021-24134-b14574939a93e002a63be522534dc429.yaml +++ b/nuclei-templates/2021/CVE-2021-24134-b14574939a93e002a63be522534dc429.yaml @@ -4,7 +4,7 @@ info: name: > Constant Contact Forms <= 1.8.7 Editor+ Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Unvalidated input and lack of output encoding in the Constant Contact Forms WordPress plugin, versions before 1.8.8, lead to multiple Stored Cross-Site Scripting vulnerabilities, which allowed high-privileged user (Editor+) to inject arbitrary JavaScript code or HTML in posts where the malicious form is embed. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/constant-contact-forms/" google-query: inurl:"/wp-content/plugins/constant-contact-forms/" shodan-query: 'vuln:CVE-2021-24134' - tags: cve,wordpress,wp-plugin,constant-contact-forms,medium + tags: cve,wordpress,wp-plugin,constant-contact-forms,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24135-b3f06bebea4c15ec9085029db00fb9fa.yaml b/nuclei-templates/2021/CVE-2021-24135-b3f06bebea4c15ec9085029db00fb9fa.yaml index 31fa8cb005..c2d15f2012 100644 --- a/nuclei-templates/2021/CVE-2021-24135-b3f06bebea4c15ec9085029db00fb9fa.yaml +++ b/nuclei-templates/2021/CVE-2021-24135-b3f06bebea4c15ec9085029db00fb9fa.yaml @@ -4,7 +4,7 @@ info: name: > WP Customer Reviews <= 3.4.2 - Multiple Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > Unvalidated input and lack of output encoding in the WP Customer Reviews WordPress plugin, versions before 3.4.3, lead to multiple Stored Cross-Site Scripting vulnerabilities allowing remote attackers to inject arbitrary JavaScript code or HTML. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-customer-reviews/" google-query: inurl:"/wp-content/plugins/wp-customer-reviews/" shodan-query: 'vuln:CVE-2021-24135' - tags: cve,wordpress,wp-plugin,wp-customer-reviews,medium + tags: cve,wordpress,wp-plugin,wp-customer-reviews,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24136-f08697abe75fa6ac28d5ec1f1d0bb149.yaml b/nuclei-templates/2021/CVE-2021-24136-f08697abe75fa6ac28d5ec1f1d0bb149.yaml index 6ee61de533..1ade1611d1 100644 --- a/nuclei-templates/2021/CVE-2021-24136-f08697abe75fa6ac28d5ec1f1d0bb149.yaml +++ b/nuclei-templates/2021/CVE-2021-24136-f08697abe75fa6ac28d5ec1f1d0bb149.yaml @@ -4,7 +4,7 @@ info: name: > Testimonials Widget <= 3.5.1 - Multiple Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Unvalidated input and lack of output encoding in the Testimonials Widget WordPress plugin, versions before 4.0.0, lead to multiple Cross-Site Scripting vulnerabilities, allowing remote attackers to inject arbitrary JavaScript code or HTML via the below parameters: - Author - Job Title - Location - Company - Email - URL reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/testimonials-widget/" google-query: inurl:"/wp-content/plugins/testimonials-widget/" shodan-query: 'vuln:CVE-2021-24136' - tags: cve,wordpress,wp-plugin,testimonials-widget,medium + tags: cve,wordpress,wp-plugin,testimonials-widget,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24137-73117910b29a1c368fce71745504290c.yaml b/nuclei-templates/2021/CVE-2021-24137-73117910b29a1c368fce71745504290c.yaml index dd6a40edf8..4dd339bc53 100644 --- a/nuclei-templates/2021/CVE-2021-24137-73117910b29a1c368fce71745504290c.yaml +++ b/nuclei-templates/2021/CVE-2021-24137-73117910b29a1c368fce71745504290c.yaml @@ -4,7 +4,7 @@ info: name: > Blog2Social: Social Media Auto Post & Scheduler <= 6.3.0 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > Unvalidated input in the Blog2Social WordPress plugin, versions before 6.3.1, lead to SQL Injection in the Re-Share Posts feature, allowing authenticated users to inject arbitrary SQL commands. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/blog2social/" google-query: inurl:"/wp-content/plugins/blog2social/" shodan-query: 'vuln:CVE-2021-24137' - tags: cve,wordpress,wp-plugin,blog2social,high + tags: cve,wordpress,wp-plugin,blog2social,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24138-f5d87ece59db37936b3fb9bdb05376cd.yaml b/nuclei-templates/2021/CVE-2021-24138-f5d87ece59db37936b3fb9bdb05376cd.yaml index 7203308d7b..7034191925 100644 --- a/nuclei-templates/2021/CVE-2021-24138-f5d87ece59db37936b3fb9bdb05376cd.yaml +++ b/nuclei-templates/2021/CVE-2021-24138-f5d87ece59db37936b3fb9bdb05376cd.yaml @@ -4,7 +4,7 @@ info: name: > AdRotate < 5.8.4 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > Unvalidated input in the AdRotate WordPress plugin, versions before 5.8.4, leads to Authenticated SQL injection via param "id". This requires an admin privileged user. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/adrotate/" google-query: inurl:"/wp-content/plugins/adrotate/" shodan-query: 'vuln:CVE-2021-24138' - tags: cve,wordpress,wp-plugin,adrotate,high + tags: cve,wordpress,wp-plugin,adrotate,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24140-492664286a6eb9d8fced88f47715604a.yaml b/nuclei-templates/2021/CVE-2021-24140-492664286a6eb9d8fced88f47715604a.yaml index 1d26f1d252..c1489e49c6 100644 --- a/nuclei-templates/2021/CVE-2021-24140-492664286a6eb9d8fced88f47715604a.yaml +++ b/nuclei-templates/2021/CVE-2021-24140-492664286a6eb9d8fced88f47715604a.yaml @@ -4,7 +4,7 @@ info: name: > Ajax Load More plugin < 5.3.2 - SQL Injection author: topscoder - severity: high + severity: critical description: > Unvalidated input in the Ajax Load More WordPress plugin, versions before 5.3.2, lead to SQL Injection in POST /wp-admin/admin-ajax.php with param repeater=' or sleep(5)#&type=test. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ajax-load-more/" google-query: inurl:"/wp-content/plugins/ajax-load-more/" shodan-query: 'vuln:CVE-2021-24140' - tags: cve,wordpress,wp-plugin,ajax-load-more,high + tags: cve,wordpress,wp-plugin,ajax-load-more,critical http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24142-60796296d5bd5b2c076a796a73e81fc7.yaml b/nuclei-templates/2021/CVE-2021-24142-60796296d5bd5b2c076a796a73e81fc7.yaml index 0bed396684..2dbf2b71ac 100644 --- a/nuclei-templates/2021/CVE-2021-24142-60796296d5bd5b2c076a796a73e81fc7.yaml +++ b/nuclei-templates/2021/CVE-2021-24142-60796296d5bd5b2c076a796a73e81fc7.yaml @@ -4,7 +4,7 @@ info: name: > 301 Redirects - Easy Redirect Manager < 2.51 - SQL Injection author: topscoder - severity: high + severity: critical description: > Unvaludated input in the 301 Redirects - Easy Redirect Manager WordPress plugin, versions before 2.51, did not sanitise its "Redirect From" column when importing a CSV file, allowing high privilege users to perform SQL injections. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/eps-301-redirects/" google-query: inurl:"/wp-content/plugins/eps-301-redirects/" shodan-query: 'vuln:CVE-2021-24142' - tags: cve,wordpress,wp-plugin,eps-301-redirects,high + tags: cve,wordpress,wp-plugin,eps-301-redirects,critical http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24143-3129a6f1429e82e60a76e088cdf26794.yaml b/nuclei-templates/2021/CVE-2021-24143-3129a6f1429e82e60a76e088cdf26794.yaml index 41e90c9f81..c7bb026e9b 100644 --- a/nuclei-templates/2021/CVE-2021-24143-3129a6f1429e82e60a76e088cdf26794.yaml +++ b/nuclei-templates/2021/CVE-2021-24143-3129a6f1429e82e60a76e088cdf26794.yaml @@ -4,7 +4,7 @@ info: name: > AccessPress Social Icons <= 1.8.0 - Author+ SQL Injection author: topscoder - severity: high + severity: critical description: > Unvalidated input in the AccessPress Social Icons plugin, versions before 1.8.1, did not sanitise its widget attribute, allowing accounts with post permission, such as author, to perform SQL injections. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/accesspress-social-icons/" google-query: inurl:"/wp-content/plugins/accesspress-social-icons/" shodan-query: 'vuln:CVE-2021-24143' - tags: cve,wordpress,wp-plugin,accesspress-social-icons,high + tags: cve,wordpress,wp-plugin,accesspress-social-icons,critical http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24145-07fde43240c3cfe047c463512be535e6.yaml b/nuclei-templates/2021/CVE-2021-24145-07fde43240c3cfe047c463512be535e6.yaml index 60a72cde45..89c72b3b5c 100644 --- a/nuclei-templates/2021/CVE-2021-24145-07fde43240c3cfe047c463512be535e6.yaml +++ b/nuclei-templates/2021/CVE-2021-24145-07fde43240c3cfe047c463512be535e6.yaml @@ -4,7 +4,7 @@ info: name: > Modern Events Calendar Lite <= 5.16.4 - Authenticated Arbitrary File Upload leading to Remote Code Execution author: topscoder - severity: high + severity: low description: > Arbitrary file upload in the Modern Events Calendar Lite WordPress plugin, versions before 5.16.5, did not properly check the imported file, allowing PHP ones to be uploaded by administrator by using the 'text/csv' content-type in the request. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/modern-events-calendar-lite/" google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" shodan-query: 'vuln:CVE-2021-24145' - tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,high + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24147-c1b0a376f2ef6bdd72b49e73751ed117.yaml b/nuclei-templates/2021/CVE-2021-24147-c1b0a376f2ef6bdd72b49e73751ed117.yaml index bb0d5482e5..0d15782f2a 100644 --- a/nuclei-templates/2021/CVE-2021-24147-c1b0a376f2ef6bdd72b49e73751ed117.yaml +++ b/nuclei-templates/2021/CVE-2021-24147-c1b0a376f2ef6bdd72b49e73751ed117.yaml @@ -4,7 +4,7 @@ info: name: > Modern Events Calendar Lite <= 5.16.4 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Unvalidated input and lack of output encoding in the Modern Events Calendar Lite WordPress plugin, versions before 5.16.5, did not sanitise the mic_comment field (Notes on time) when adding/editing an event, allowing users with privilege as low as author to add events with a Cross-Site Scripting payload in them, which will be triggered in the frontend when viewing the event. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/modern-events-calendar-lite/" google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" shodan-query: 'vuln:CVE-2021-24147' - tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,medium + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24149-4dd145dc4bcaa7b143713cd5ced149a0.yaml b/nuclei-templates/2021/CVE-2021-24149-4dd145dc4bcaa7b143713cd5ced149a0.yaml index e89f26c9c1..d29cff745f 100644 --- a/nuclei-templates/2021/CVE-2021-24149-4dd145dc4bcaa7b143713cd5ced149a0.yaml +++ b/nuclei-templates/2021/CVE-2021-24149-4dd145dc4bcaa7b143713cd5ced149a0.yaml @@ -4,7 +4,7 @@ info: name: > Modern Events Calendar Lite <= 5.16.5 - Authenticated SQL Injection author: topscoder - severity: high + severity: low description: > Unvalidated input in the Modern Events Calendar Lite WordPress plugin, versions before 5.16.6, did not sanitise the mec[post_id] POST parameter in the mec_fes_form AJAX action when logged in as an author+, leading to an authenticated SQL Injection issue. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/modern-events-calendar-lite/" google-query: inurl:"/wp-content/plugins/modern-events-calendar-lite/" shodan-query: 'vuln:CVE-2021-24149' - tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,high + tags: cve,wordpress,wp-plugin,modern-events-calendar-lite,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24151-1184e292a35a8344c32cddb99a8fcb99.yaml b/nuclei-templates/2021/CVE-2021-24151-1184e292a35a8344c32cddb99a8fcb99.yaml index ea80fd60c6..e4d2dffa85 100644 --- a/nuclei-templates/2021/CVE-2021-24151-1184e292a35a8344c32cddb99a8fcb99.yaml +++ b/nuclei-templates/2021/CVE-2021-24151-1184e292a35a8344c32cddb99a8fcb99.yaml @@ -4,7 +4,7 @@ info: name: > WP Editor <= 1.2.6.3 - Authenticated (Admin+) SQL injection author: topscoder - severity: high + severity: low description: > The WP Editor plugin for WordPress is vulnerable to blind SQL Injection via the setting fields in versions up to, and including, 1.2.6.3 due to insufficient escaping on the user-supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated admin+ attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-editor/" google-query: inurl:"/wp-content/plugins/wp-editor/" shodan-query: 'vuln:CVE-2021-24151' - tags: cve,wordpress,wp-plugin,wp-editor,high + tags: cve,wordpress,wp-plugin,wp-editor,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24153-5e0b93fe3a022a24343b38fe5a2f7283.yaml b/nuclei-templates/2021/CVE-2021-24153-5e0b93fe3a022a24343b38fe5a2f7283.yaml index 408930a14e..8da264a32a 100644 --- a/nuclei-templates/2021/CVE-2021-24153-5e0b93fe3a022a24343b38fe5a2f7283.yaml +++ b/nuclei-templates/2021/CVE-2021-24153-5e0b93fe3a022a24343b38fe5a2f7283.yaml @@ -4,7 +4,7 @@ info: name: > Yoast SEO <= 3.4.0 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > A Stored Cross-Site Scripting vulnerability was discovered in the Yoast SEO WordPress plugin before 3.4.1, which had built-in blacklist filters which were blacklisting parentheses as well as several functions such as alert, but bypasses were found. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wordpress-seo/" google-query: inurl:"/wp-content/plugins/wordpress-seo/" shodan-query: 'vuln:CVE-2021-24153' - tags: cve,wordpress,wp-plugin,wordpress-seo,medium + tags: cve,wordpress,wp-plugin,wordpress-seo,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24154-2dfa0b8f134cf415442ecf4c309e85d2.yaml b/nuclei-templates/2021/CVE-2021-24154-2dfa0b8f134cf415442ecf4c309e85d2.yaml index 1ceb285c23..dce049233b 100644 --- a/nuclei-templates/2021/CVE-2021-24154-2dfa0b8f134cf415442ecf4c309e85d2.yaml +++ b/nuclei-templates/2021/CVE-2021-24154-2dfa0b8f134cf415442ecf4c309e85d2.yaml @@ -4,7 +4,7 @@ info: name: > Theme Editor <= 2.5 - Authenticated Arbitrary File Download author: topscoder - severity: medium + severity: low description: > The Theme Editor WordPress plugin before 2.6 did not validate the GET file parameter before passing it to the download_file() function, allowing administrators to download arbitrary files on the web server, such as /etc/passwd reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/theme-editor/" google-query: inurl:"/wp-content/plugins/theme-editor/" shodan-query: 'vuln:CVE-2021-24154' - tags: cve,wordpress,wp-plugin,theme-editor,medium + tags: cve,wordpress,wp-plugin,theme-editor,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24155-892437eb68b329dd17b3be2557272f56.yaml b/nuclei-templates/2021/CVE-2021-24155-892437eb68b329dd17b3be2557272f56.yaml index 09bf302cd4..20c11b3d4f 100644 --- a/nuclei-templates/2021/CVE-2021-24155-892437eb68b329dd17b3be2557272f56.yaml +++ b/nuclei-templates/2021/CVE-2021-24155-892437eb68b329dd17b3be2557272f56.yaml @@ -4,7 +4,7 @@ info: name: > Backup Guard <= 1.5.9 - Authenticated Arbitrary File Upload author: topscoder - severity: high + severity: low description: > The WordPress Backup and Migrate Plugin – Backup Guard WordPress plugin before 1.6.0 did not ensure that the imported files are of the SGBP format and extension, allowing high privilege users (admin+) to upload arbitrary files, including PHP ones, leading to RCE. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/backup/" google-query: inurl:"/wp-content/plugins/backup/" shodan-query: 'vuln:CVE-2021-24155' - tags: cve,wordpress,wp-plugin,backup,high + tags: cve,wordpress,wp-plugin,backup,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24156-ef09ee87048a20a553f4804a48eb6952.yaml b/nuclei-templates/2021/CVE-2021-24156-ef09ee87048a20a553f4804a48eb6952.yaml index e96f895d2c..c7dd7a6b24 100644 --- a/nuclei-templates/2021/CVE-2021-24156-ef09ee87048a20a553f4804a48eb6952.yaml +++ b/nuclei-templates/2021/CVE-2021-24156-ef09ee87048a20a553f4804a48eb6952.yaml @@ -4,7 +4,7 @@ info: name: > Testimonial Rotator <= 3.0.3 - Authenticated (Contributor+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > Stored Cross-Site Scripting vulnerabilities in Testimonial Rotator 3.0.3 allow low privileged users (Contributor) to inject arbitrary JavaScript code or HTML without approval. This could lead to privilege escalation reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/testimonial-rotator/" google-query: inurl:"/wp-content/plugins/testimonial-rotator/" shodan-query: 'vuln:CVE-2021-24156' - tags: cve,wordpress,wp-plugin,testimonial-rotator,medium + tags: cve,wordpress,wp-plugin,testimonial-rotator,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24157-79fb0bcc374a70f9a1181c9553d664f5.yaml b/nuclei-templates/2021/CVE-2021-24157-79fb0bcc374a70f9a1181c9553d664f5.yaml index 9d96d9aadb..2e87f12603 100644 --- a/nuclei-templates/2021/CVE-2021-24157-79fb0bcc374a70f9a1181c9553d664f5.yaml +++ b/nuclei-templates/2021/CVE-2021-24157-79fb0bcc374a70f9a1181c9553d664f5.yaml @@ -4,7 +4,7 @@ info: name: > Orbit Fox by ThemeIsle <= 2.10.2 - Authenticated (Contributor+) Stored Cross Site Scripting author: topscoder - severity: medium + severity: low description: > Orbit Fox by ThemeIsle has a feature to add custom scripts to the header and footer of a page or post. There were no checks to verify that a user had the unfiltered_html capability prior to saving the script tags, thus allowing lower-level users to inject scripts that could potentially be malicious in versions up to, and including 2.10.2. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/themeisle-companion/" google-query: inurl:"/wp-content/plugins/themeisle-companion/" shodan-query: 'vuln:CVE-2021-24157' - tags: cve,wordpress,wp-plugin,themeisle-companion,medium + tags: cve,wordpress,wp-plugin,themeisle-companion,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24158-175f5f197d39e1751001f35acbaf01df.yaml b/nuclei-templates/2021/CVE-2021-24158-175f5f197d39e1751001f35acbaf01df.yaml index 76d935bbee..360d63a412 100644 --- a/nuclei-templates/2021/CVE-2021-24158-175f5f197d39e1751001f35acbaf01df.yaml +++ b/nuclei-templates/2021/CVE-2021-24158-175f5f197d39e1751001f35acbaf01df.yaml @@ -4,7 +4,7 @@ info: name: > Orbit Fox by ThemeIsle <= 2.10.2 - Authenticated Privilege Escalation author: topscoder - severity: critical + severity: low description: > Orbit Fox by ThemeIsle has a feature to add a registration form to both the Elementor and Beaver Builder page builders functionality. As part of the registration form, administrators can choose which role to set as the default for users upon registration. This field is hidden from view for lower-level users, however, they can still supply the user_role parameter to update the default role for registration. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/themeisle-companion/" google-query: inurl:"/wp-content/plugins/themeisle-companion/" shodan-query: 'vuln:CVE-2021-24158' - tags: cve,wordpress,wp-plugin,themeisle-companion,critical + tags: cve,wordpress,wp-plugin,themeisle-companion,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24159-a1fcf6f91e16b2992432e60b1b4c9234.yaml b/nuclei-templates/2021/CVE-2021-24159-a1fcf6f91e16b2992432e60b1b4c9234.yaml index 5922d19ed1..199eeb5f17 100644 --- a/nuclei-templates/2021/CVE-2021-24159-a1fcf6f91e16b2992432e60b1b4c9234.yaml +++ b/nuclei-templates/2021/CVE-2021-24159-a1fcf6f91e16b2992432e60b1b4c9234.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form 7 Style <= 3.1.9 Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > Due to the lack of sanitization and lack of nonce protection on the custom CSS feature, an attacker could craft a request to inject malicious JavaScript on a site using the Contact Form 7 Style WordPress plugin through 3.1.9. If an attacker successfully tricked a site’s administrator into clicking a link or attachment, then the request could be sent and the CSS settings would be successfully updated to include malicious JavaScript. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-7-style/" google-query: inurl:"/wp-content/plugins/contact-form-7-style/" shodan-query: 'vuln:CVE-2021-24159' - tags: cve,wordpress,wp-plugin,contact-form-7-style,high + tags: cve,wordpress,wp-plugin,contact-form-7-style,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24160-dfaadc66129d4ea285875cfb5037ccde.yaml b/nuclei-templates/2021/CVE-2021-24160-dfaadc66129d4ea285875cfb5037ccde.yaml index 6000ca00b1..3542ba35f7 100644 --- a/nuclei-templates/2021/CVE-2021-24160-dfaadc66129d4ea285875cfb5037ccde.yaml +++ b/nuclei-templates/2021/CVE-2021-24160-dfaadc66129d4ea285875cfb5037ccde.yaml @@ -4,7 +4,7 @@ info: name: > Responsive Menu 4.0 - 4.0.3 - Authenticated Arbitrary File Upload author: topscoder - severity: high + severity: low description: > In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, subscribers could upload zip archives containing malicious PHP files that would get extracted to the /rmp-menu/ directory. These files could then be accessed via the front end of the site to trigger remote code execution and ultimately allow an attacker to execute commands to further infect a WordPress site. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/responsive-menu/" google-query: inurl:"/wp-content/plugins/responsive-menu/" shodan-query: 'vuln:CVE-2021-24160' - tags: cve,wordpress,wp-plugin,responsive-menu,high + tags: cve,wordpress,wp-plugin,responsive-menu,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24161-7361a0798b6e7d91e3483a810ae46200.yaml b/nuclei-templates/2021/CVE-2021-24161-7361a0798b6e7d91e3483a810ae46200.yaml index f02e4d614f..e7b39393a6 100644 --- a/nuclei-templates/2021/CVE-2021-24161-7361a0798b6e7d91e3483a810ae46200.yaml +++ b/nuclei-templates/2021/CVE-2021-24161-7361a0798b6e7d91e3483a810ae46200.yaml @@ -4,7 +4,7 @@ info: name: > Responsive Menu <= 4.0.3 - Cross-Site Request Forgery to Arbitrary File Upload author: topscoder - severity: high + severity: medium description: > In the Responsive Menu (free and Pro) WordPress plugins before 4.0.4, attackers could craft a request and trick an administrator into uploading a zip archive containing malicious PHP files. The attacker could then access those files to achieve remote code execution and further infect the targeted site. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/responsive-menu/" google-query: inurl:"/wp-content/plugins/responsive-menu/" shodan-query: 'vuln:CVE-2021-24161' - tags: cve,wordpress,wp-plugin,responsive-menu,high + tags: cve,wordpress,wp-plugin,responsive-menu,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24162-35d0076e41c66587aa55b1dff00355a9.yaml b/nuclei-templates/2021/CVE-2021-24162-35d0076e41c66587aa55b1dff00355a9.yaml index e0f429631f..722320f98f 100644 --- a/nuclei-templates/2021/CVE-2021-24162-35d0076e41c66587aa55b1dff00355a9.yaml +++ b/nuclei-templates/2021/CVE-2021-24162-35d0076e41c66587aa55b1dff00355a9.yaml @@ -4,7 +4,7 @@ info: name: > Responsive Menu <= 4.0.3 - Cross-Site Request Forgery to Setting Modification author: topscoder - severity: high + severity: medium description: > In the Reponsive Menu (free and Pro) WordPress plugins before 4.0.4, attackers could craft a request and trick an administrator into importing all new settings. These settings could be modified to include malicious JavaScript, therefore allowing an attacker to inject payloads that could aid in further infection of the site. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/responsive-menu/" google-query: inurl:"/wp-content/plugins/responsive-menu/" shodan-query: 'vuln:CVE-2021-24162' - tags: cve,wordpress,wp-plugin,responsive-menu,high + tags: cve,wordpress,wp-plugin,responsive-menu,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24163-d52a1b2d96a87813163020667b1d0ea9.yaml b/nuclei-templates/2021/CVE-2021-24163-d52a1b2d96a87813163020667b1d0ea9.yaml index 07e08246df..216361cbf5 100644 --- a/nuclei-templates/2021/CVE-2021-24163-d52a1b2d96a87813163020667b1d0ea9.yaml +++ b/nuclei-templates/2021/CVE-2021-24163-d52a1b2d96a87813163020667b1d0ea9.yaml @@ -4,7 +4,7 @@ info: name: > Ninja Forms Contact Form <= 3.4.33 - Authenticated SendWP Plugin Installation and Client Secret Key Disclosure author: topscoder - severity: high + severity: low description: > The AJAX action, wp_ajax_ninja_forms_sendwp_remote_install_handler, did not have a capability check on it, nor did it have any nonce protection, therefore making it possible for low-level users, such as subscribers, to install and activate the SendWP Ninja Forms Contact Form – The Drag and Drop Form Builder for WordPress WordPress plugin before 3.4.34 and retrieve the client_secret key needed to establish the SendWP connection while also installing the SendWP plugin. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ninja-forms/" google-query: inurl:"/wp-content/plugins/ninja-forms/" shodan-query: 'vuln:CVE-2021-24163' - tags: cve,wordpress,wp-plugin,ninja-forms,high + tags: cve,wordpress,wp-plugin,ninja-forms,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24164-c1844c535b6764f33ccae986eaa4a431.yaml b/nuclei-templates/2021/CVE-2021-24164-c1844c535b6764f33ccae986eaa4a431.yaml index 86839d48ef..a1a449adb8 100644 --- a/nuclei-templates/2021/CVE-2021-24164-c1844c535b6764f33ccae986eaa4a431.yaml +++ b/nuclei-templates/2021/CVE-2021-24164-c1844c535b6764f33ccae986eaa4a431.yaml @@ -4,7 +4,7 @@ info: name: > Ninja Forms <= 3.4.34 - Authenticated OAuth Connection Key Disclosure author: topscoder - severity: medium + severity: low description: > In the Ninja Forms Contact Form WordPress plugin before 3.4.34.1, low-level users, such as subscribers, were able to trigger the action, wp_ajax_nf_oauth, and retrieve the connection url needed to establish a connection. They could also retrieve the client_id for an already established OAuth connection. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ninja-forms/" google-query: inurl:"/wp-content/plugins/ninja-forms/" shodan-query: 'vuln:CVE-2021-24164' - tags: cve,wordpress,wp-plugin,ninja-forms,medium + tags: cve,wordpress,wp-plugin,ninja-forms,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24168-7ddd7913775f2842bdb03b5dd83ed7fe.yaml b/nuclei-templates/2021/CVE-2021-24168-7ddd7913775f2842bdb03b5dd83ed7fe.yaml index aee51c5f10..a843abeb21 100644 --- a/nuclei-templates/2021/CVE-2021-24168-7ddd7913775f2842bdb03b5dd83ed7fe.yaml +++ b/nuclei-templates/2021/CVE-2021-24168-7ddd7913775f2842bdb03b5dd83ed7fe.yaml @@ -4,7 +4,7 @@ info: name: > Easy Contact Form Pro < 1.1.1.9 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Easy Contact Form Pro plugin for WordPress is vulnerable to Stored Cross-Site Scripting did not properly sanitise the text fields (such as Email Subject, Email Recipient, etc) when creating or editing a form in versions before 1.1.1.9. This makes it possible for Author-level attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-contact-form-pro/" google-query: inurl:"/wp-content/plugins/easy-contact-form-pro/" shodan-query: 'vuln:CVE-2021-24168' - tags: cve,wordpress,wp-plugin,easy-contact-form-pro,medium + tags: cve,wordpress,wp-plugin,easy-contact-form-pro,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24173-a4378f0df660425c1f67e7a182915736.yaml b/nuclei-templates/2021/CVE-2021-24173-a4378f0df660425c1f67e7a182915736.yaml index 79c0813742..3567888dde 100644 --- a/nuclei-templates/2021/CVE-2021-24173-a4378f0df660425c1f67e7a182915736.yaml +++ b/nuclei-templates/2021/CVE-2021-24173-a4378f0df660425c1f67e7a182915736.yaml @@ -4,7 +4,7 @@ info: name: > VM Backups <= 1.0 - Cross-Site Request Forgery to Cross-Site Scripting author: topscoder - severity: high + severity: medium description: > The VM Backups WordPress plugin through 1.0 does not have CSRF checks, allowing attackers to make a logged in user unwanted actions, such as update the plugin's options, leading to a Stored Cross-Site Scripting issue. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/vm-backups/" google-query: inurl:"/wp-content/plugins/vm-backups/" shodan-query: 'vuln:CVE-2021-24173' - tags: cve,wordpress,wp-plugin,vm-backups,high + tags: cve,wordpress,wp-plugin,vm-backups,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24174-e75e8a53a3e5f421e8dff4ebc1472f1b.yaml b/nuclei-templates/2021/CVE-2021-24174-e75e8a53a3e5f421e8dff4ebc1472f1b.yaml index 11eb30fcc6..47be611bc0 100644 --- a/nuclei-templates/2021/CVE-2021-24174-e75e8a53a3e5f421e8dff4ebc1472f1b.yaml +++ b/nuclei-templates/2021/CVE-2021-24174-e75e8a53a3e5f421e8dff4ebc1472f1b.yaml @@ -4,7 +4,7 @@ info: name: > Database Backups <= 1.2.2.6 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Database Backups WordPress plugin through 1.2.2.6 does not have CSRF checks, allowing attackers to make a logged in user unwanted actions, such as generate backups of the database, change the plugin's settings and delete backups. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/database-backups/" google-query: inurl:"/wp-content/plugins/database-backups/" shodan-query: 'vuln:CVE-2021-24174' - tags: cve,wordpress,wp-plugin,database-backups,high + tags: cve,wordpress,wp-plugin,database-backups,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24176-df91ebe73a45ac966511f7792447be75.yaml b/nuclei-templates/2021/CVE-2021-24176-df91ebe73a45ac966511f7792447be75.yaml index afa0d4c6d7..56b78746fd 100644 --- a/nuclei-templates/2021/CVE-2021-24176-df91ebe73a45ac966511f7792447be75.yaml +++ b/nuclei-templates/2021/CVE-2021-24176-df91ebe73a45ac966511f7792447be75.yaml @@ -4,7 +4,7 @@ info: name: > JH 404 Logger <= 1.1 - Unauthenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The JH 404 Logger WordPress plugin through 1.1 doesn't sanitise the referer and path of 404 pages, when they are output in the dashboard, which leads to executing arbitrary JavaScript code in the WordPress dashboard. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/jh-404-logger/" google-query: inurl:"/wp-content/plugins/jh-404-logger/" shodan-query: 'vuln:CVE-2021-24176' - tags: cve,wordpress,wp-plugin,jh-404-logger,medium + tags: cve,wordpress,wp-plugin,jh-404-logger,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24178-167e61af371a8f35ae376105d3215900.yaml b/nuclei-templates/2021/CVE-2021-24178-167e61af371a8f35ae376105d3215900.yaml index 6e983c0e49..6334f52200 100644 --- a/nuclei-templates/2021/CVE-2021-24178-167e61af371a8f35ae376105d3215900.yaml +++ b/nuclei-templates/2021/CVE-2021-24178-167e61af371a8f35ae376105d3215900.yaml @@ -4,7 +4,7 @@ info: name: > Business Directory Plugin < 5.11 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Business Directory Plugin – Easy Listing Directories for WordPress WordPress plugin before 5.11.1 suffered from Cross-Site Request Forgery issues, allowing an attacker to make a logged in administrator add, edit or delete form fields, which could also lead to Stored Cross-Site Scripting issues. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/business-directory-plugin/" google-query: inurl:"/wp-content/plugins/business-directory-plugin/" shodan-query: 'vuln:CVE-2021-24178' - tags: cve,wordpress,wp-plugin,business-directory-plugin,high + tags: cve,wordpress,wp-plugin,business-directory-plugin,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24179-f1a649593702eb632f6f553b9ae25e5a.yaml b/nuclei-templates/2021/CVE-2021-24179-f1a649593702eb632f6f553b9ae25e5a.yaml index b69d09e0ee..415e39f769 100644 --- a/nuclei-templates/2021/CVE-2021-24179-f1a649593702eb632f6f553b9ae25e5a.yaml +++ b/nuclei-templates/2021/CVE-2021-24179-f1a649593702eb632f6f553b9ae25e5a.yaml @@ -4,7 +4,7 @@ info: name: > Business Directory Plugin <= 5.10.1 - Cross-Site Request Forgery to Arbitrary File Upload author: topscoder - severity: high + severity: medium description: > The Business Directory Plugin – Easy Listing Directories for WordPress WordPress plugin before 5.11 suffered from a Cross-Site Request Forgery issue, allowing an attacker to make a logged in administrator import files. As the plugin also did not validate uploaded files, it could lead to RCE. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/business-directory-plugin/" google-query: inurl:"/wp-content/plugins/business-directory-plugin/" shodan-query: 'vuln:CVE-2021-24179' - tags: cve,wordpress,wp-plugin,business-directory-plugin,high + tags: cve,wordpress,wp-plugin,business-directory-plugin,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24181-982f78919d6ffdbae69689e67e460d30.yaml b/nuclei-templates/2021/CVE-2021-24181-982f78919d6ffdbae69689e67e460d30.yaml index 65e162bbfa..7e4baefc34 100644 --- a/nuclei-templates/2021/CVE-2021-24181-982f78919d6ffdbae69689e67e460d30.yaml +++ b/nuclei-templates/2021/CVE-2021-24181-982f78919d6ffdbae69689e67e460d30.yaml @@ -4,7 +4,7 @@ info: name: > Tutor LMS – eLearning and online course solution <= 1.7.6 - SQL Injection author: topscoder - severity: medium + severity: critical description: > The tutor_mark_answer_as_correct AJAX action from the Tutor LMS – eLearning and online course solution WordPress plugin before 1.7.7 was vulnerable to blind and time based SQL injections that could be exploited by students. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/tutor/" google-query: inurl:"/wp-content/plugins/tutor/" shodan-query: 'vuln:CVE-2021-24181' - tags: cve,wordpress,wp-plugin,tutor,medium + tags: cve,wordpress,wp-plugin,tutor,critical http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24182-d8208bd4e60d421585f9ef9118f52dc1.yaml b/nuclei-templates/2021/CVE-2021-24182-d8208bd4e60d421585f9ef9118f52dc1.yaml index c47b59a001..49040fff5d 100644 --- a/nuclei-templates/2021/CVE-2021-24182-d8208bd4e60d421585f9ef9118f52dc1.yaml +++ b/nuclei-templates/2021/CVE-2021-24182-d8208bd4e60d421585f9ef9118f52dc1.yaml @@ -4,7 +4,7 @@ info: name: > Tutor LMS <=1.8.2 - SQL Injection via tutor_quiz_builder_get_answers_by_question author: topscoder - severity: high + severity: critical description: > The tutor_quiz_builder_get_answers_by_question AJAX action from the Tutor LMS – eLearning and online course solution WordPress plugin before 1.8.3 was vulnerable to UNION based SQL injection that could be exploited by students. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/tutor/" google-query: inurl:"/wp-content/plugins/tutor/" shodan-query: 'vuln:CVE-2021-24182' - tags: cve,wordpress,wp-plugin,tutor,high + tags: cve,wordpress,wp-plugin,tutor,critical http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24183-0f7d324b49374ff1264595834ad272cb.yaml b/nuclei-templates/2021/CVE-2021-24183-0f7d324b49374ff1264595834ad272cb.yaml index 9eb29797fe..576d01975a 100644 --- a/nuclei-templates/2021/CVE-2021-24183-0f7d324b49374ff1264595834ad272cb.yaml +++ b/nuclei-templates/2021/CVE-2021-24183-0f7d324b49374ff1264595834ad272cb.yaml @@ -4,7 +4,7 @@ info: name: > Tutor LMS <= 1.8.2 - SQL Injection via tutor_quiz_builder_get_question_form author: topscoder - severity: medium + severity: critical description: > The tutor_quiz_builder_get_question_form AJAX action from the Tutor LMS – eLearning and online course solution WordPress plugin before 1.8.3 was vulnerable to UNION based SQL injection that could be exploited by students. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/tutor/" google-query: inurl:"/wp-content/plugins/tutor/" shodan-query: 'vuln:CVE-2021-24183' - tags: cve,wordpress,wp-plugin,tutor,medium + tags: cve,wordpress,wp-plugin,tutor,critical http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24185-b9268ddd3338fe184d978d9f6b4b6b66.yaml b/nuclei-templates/2021/CVE-2021-24185-b9268ddd3338fe184d978d9f6b4b6b66.yaml index d9f7493e93..1f46e7b154 100644 --- a/nuclei-templates/2021/CVE-2021-24185-b9268ddd3338fe184d978d9f6b4b6b66.yaml +++ b/nuclei-templates/2021/CVE-2021-24185-b9268ddd3338fe184d978d9f6b4b6b66.yaml @@ -4,7 +4,7 @@ info: name: > Tutor LMS – eLearning and online course solution <=1.7.6 - SQL Injection author: topscoder - severity: medium + severity: critical description: > The tutor_place_rating AJAX action from the Tutor LMS – eLearning and online course solution WordPress plugin before 1.7.7 was vulnerable to blind and time based SQL injections that could be exploited by students. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/tutor/" google-query: inurl:"/wp-content/plugins/tutor/" shodan-query: 'vuln:CVE-2021-24185' - tags: cve,wordpress,wp-plugin,tutor,medium + tags: cve,wordpress,wp-plugin,tutor,critical http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24186-1a3c55b78621c5a0f1132cb6e90ef267.yaml b/nuclei-templates/2021/CVE-2021-24186-1a3c55b78621c5a0f1132cb6e90ef267.yaml index 35ca267767..529ae66c70 100644 --- a/nuclei-templates/2021/CVE-2021-24186-1a3c55b78621c5a0f1132cb6e90ef267.yaml +++ b/nuclei-templates/2021/CVE-2021-24186-1a3c55b78621c5a0f1132cb6e90ef267.yaml @@ -4,7 +4,7 @@ info: name: > Tutor LMS <=1.8.2 - SQL Injection via tutor_answering_quiz_question/get_answer_by_id author: topscoder - severity: high + severity: critical description: > The tutor_answering_quiz_question/get_answer_by_id function pair from the Tutor LMS – eLearning and online course solution WordPress plugin before 1.8.3 was vulnerable to UNION based SQL injection that could be exploited by students. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/tutor/" google-query: inurl:"/wp-content/plugins/tutor/" shodan-query: 'vuln:CVE-2021-24186' - tags: cve,wordpress,wp-plugin,tutor,high + tags: cve,wordpress,wp-plugin,tutor,critical http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24199-46151945d00d6bf25de490ff58da7c2c.yaml b/nuclei-templates/2021/CVE-2021-24199-46151945d00d6bf25de490ff58da7c2c.yaml index 7ea03ec00e..bf07fac706 100644 --- a/nuclei-templates/2021/CVE-2021-24199-46151945d00d6bf25de490ff58da7c2c.yaml +++ b/nuclei-templates/2021/CVE-2021-24199-46151945d00d6bf25de490ff58da7c2c.yaml @@ -4,7 +4,7 @@ info: name: > wpDataTables (Premium) <= 3.4.1 - Blind SQL Injection via start Parameter author: topscoder - severity: medium + severity: critical description: > The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table_id=1, on the 'start' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application. Please note that this only affects the premium version of the plugin which shares the same slug as the free version. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpdatatables/" google-query: inurl:"/wp-content/plugins/wpdatatables/" shodan-query: 'vuln:CVE-2021-24199' - tags: cve,wordpress,wp-plugin,wpdatatables,medium + tags: cve,wordpress,wp-plugin,wpdatatables,critical http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24200-19cf3f1ecae01908df4ff2c886d4fa04.yaml b/nuclei-templates/2021/CVE-2021-24200-19cf3f1ecae01908df4ff2c886d4fa04.yaml index 3d5ae6fb24..b657ab37ea 100644 --- a/nuclei-templates/2021/CVE-2021-24200-19cf3f1ecae01908df4ff2c886d4fa04.yaml +++ b/nuclei-templates/2021/CVE-2021-24200-19cf3f1ecae01908df4ff2c886d4fa04.yaml @@ -4,7 +4,7 @@ info: name: > wpDataTables (Premium) <= 3.4.1 - Blind SQL Injection via length Parameter author: topscoder - severity: medium + severity: critical description: > The wpDataTables – Tables & Table Charts premium WordPress plugin before 3.4.2 allows a low privilege authenticated user to perform Boolean-based blind SQL Injection in the table list page on the endpoint /wp-admin/admin-ajax.php?action=get_wdtable&table_id=1, on the 'length' HTTP POST parameter. This allows an attacker to access all the data in the database and obtain access to the WordPress application. Please note that this only affects the premium version of the plugin which shares the same slug as the free version. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpdatatables/" google-query: inurl:"/wp-content/plugins/wpdatatables/" shodan-query: 'vuln:CVE-2021-24200' - tags: cve,wordpress,wp-plugin,wpdatatables,medium + tags: cve,wordpress,wp-plugin,wpdatatables,critical http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24201-98c8e6a6d80acb851afcee0bde588eea.yaml b/nuclei-templates/2021/CVE-2021-24201-98c8e6a6d80acb851afcee0bde588eea.yaml index a9378260a9..a35a349d69 100644 --- a/nuclei-templates/2021/CVE-2021-24201-98c8e6a6d80acb851afcee0bde588eea.yaml +++ b/nuclei-templates/2021/CVE-2021-24201-98c8e6a6d80acb851afcee0bde588eea.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Website Builder <= 3.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via html_tag author: topscoder - severity: medium + severity: low description: > In the Elementor Website Builder WordPress plugin before 3.1.4, the column element (includes/elements/column.php) accepts an ‘html_tag’ parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified ‘save_builder’ request containing JavaScript in the ‘html_tag’ parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/elementor/" google-query: inurl:"/wp-content/plugins/elementor/" shodan-query: 'vuln:CVE-2021-24201' - tags: cve,wordpress,wp-plugin,elementor,medium + tags: cve,wordpress,wp-plugin,elementor,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24202-5721e5b5b859df336ecc013b38726f93.yaml b/nuclei-templates/2021/CVE-2021-24202-5721e5b5b859df336ecc013b38726f93.yaml index bcddb37257..a05848671f 100644 --- a/nuclei-templates/2021/CVE-2021-24202-5721e5b5b859df336ecc013b38726f93.yaml +++ b/nuclei-templates/2021/CVE-2021-24202-5721e5b5b859df336ecc013b38726f93.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Website Builder <= 3.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via header_size author: topscoder - severity: medium + severity: low description: > In the Elementor Website Builder WordPress plugin before 3.1.4, the heading widget (includes/widgets/heading.php) accepts a ‘header_size’ parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified ‘save_builder’ request with this parameter set to ‘script’ and combined with a ‘title’ parameter containing JavaScript, which will then be executed when the saved page is viewed or previewed. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/elementor/" google-query: inurl:"/wp-content/plugins/elementor/" shodan-query: 'vuln:CVE-2021-24202' - tags: cve,wordpress,wp-plugin,elementor,medium + tags: cve,wordpress,wp-plugin,elementor,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24203-5e6768e991caa45e72cc5f93d69cc8a5.yaml b/nuclei-templates/2021/CVE-2021-24203-5e6768e991caa45e72cc5f93d69cc8a5.yaml index cc03ad5b3d..7a98c68eb4 100644 --- a/nuclei-templates/2021/CVE-2021-24203-5e6768e991caa45e72cc5f93d69cc8a5.yaml +++ b/nuclei-templates/2021/CVE-2021-24203-5e6768e991caa45e72cc5f93d69cc8a5.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Website Builder <= 3.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via html_tag author: topscoder - severity: medium + severity: low description: > In the Elementor Website Builder WordPress plugin before 3.1.4, the divider widget (includes/widgets/divider.php) accepts an ‘html_tag’ parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified ‘save_builder’ request with this parameter set to ‘script’ and combined with a ‘text’ parameter containing JavaScript, which will then be executed when the saved page is viewed or previewed. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/elementor/" google-query: inurl:"/wp-content/plugins/elementor/" shodan-query: 'vuln:CVE-2021-24203' - tags: cve,wordpress,wp-plugin,elementor,medium + tags: cve,wordpress,wp-plugin,elementor,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24204-2f027571e136822dc3132e7a5b6f47eb.yaml b/nuclei-templates/2021/CVE-2021-24204-2f027571e136822dc3132e7a5b6f47eb.yaml index 8c18f29125..dee5234110 100644 --- a/nuclei-templates/2021/CVE-2021-24204-2f027571e136822dc3132e7a5b6f47eb.yaml +++ b/nuclei-templates/2021/CVE-2021-24204-2f027571e136822dc3132e7a5b6f47eb.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Website Builder <= 3.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via title_html_tag author: topscoder - severity: medium + severity: low description: > In the Elementor Website Builder WordPress plugin before 3.1.4, the accordion widget (includes/widgets/accordion.php) accepts a ‘title_html_tag’ parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified ‘save_builder’ request containing JavaScript in the ‘title_html_tag’ parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/elementor/" google-query: inurl:"/wp-content/plugins/elementor/" shodan-query: 'vuln:CVE-2021-24204' - tags: cve,wordpress,wp-plugin,elementor,medium + tags: cve,wordpress,wp-plugin,elementor,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24205-88f2e8b62006d8f70eead27b7d5c23f7.yaml b/nuclei-templates/2021/CVE-2021-24205-88f2e8b62006d8f70eead27b7d5c23f7.yaml index 0a8e1e2dc9..0a1d2e25ed 100644 --- a/nuclei-templates/2021/CVE-2021-24205-88f2e8b62006d8f70eead27b7d5c23f7.yaml +++ b/nuclei-templates/2021/CVE-2021-24205-88f2e8b62006d8f70eead27b7d5c23f7.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Website Builder <= 3.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via title_size Parameter author: topscoder - severity: medium + severity: low description: > In the Elementor Website Builder WordPress plugin before 3.1.4, the icon box widget (includes/widgets/icon-box.php) accepts a ‘title_size’ parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified ‘save_builder’ request containing JavaScript in the ‘title_size’ parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/elementor/" google-query: inurl:"/wp-content/plugins/elementor/" shodan-query: 'vuln:CVE-2021-24205' - tags: cve,wordpress,wp-plugin,elementor,medium + tags: cve,wordpress,wp-plugin,elementor,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24206-95ed8c023906e2f70f01592d99282d0b.yaml b/nuclei-templates/2021/CVE-2021-24206-95ed8c023906e2f70f01592d99282d0b.yaml index dc20d70146..db17fd9b68 100644 --- a/nuclei-templates/2021/CVE-2021-24206-95ed8c023906e2f70f01592d99282d0b.yaml +++ b/nuclei-templates/2021/CVE-2021-24206-95ed8c023906e2f70f01592d99282d0b.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Website Builder <= 3.1.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via title_size author: topscoder - severity: medium + severity: low description: > In the Elementor Website Builder WordPress plugin before 3.1.4, the image box widget (includes/widgets/image-box.php) accepts a ‘title_size’ parameter. Although the element control lists a fixed set of possible html tags, it is possible for a user with Contributor or above permissions to send a modified ‘save_builder’ request containing JavaScript in the ‘title_size’ parameter, which is not filtered and is output without escaping. This JavaScript will then be executed when the saved page is viewed or previewed. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/elementor/" google-query: inurl:"/wp-content/plugins/elementor/" shodan-query: 'vuln:CVE-2021-24206' - tags: cve,wordpress,wp-plugin,elementor,medium + tags: cve,wordpress,wp-plugin,elementor,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24209-fce354233cc8042e718d5365b3a58e08.yaml b/nuclei-templates/2021/CVE-2021-24209-fce354233cc8042e718d5365b3a58e08.yaml index 842567b66e..00c20a26e1 100644 --- a/nuclei-templates/2021/CVE-2021-24209-fce354233cc8042e718d5365b3a58e08.yaml +++ b/nuclei-templates/2021/CVE-2021-24209-fce354233cc8042e718d5365b3a58e08.yaml @@ -4,7 +4,7 @@ info: name: > WP Super Cache <= 1.7.1 - Authenticated (Admin+) Remote Code Execution author: topscoder - severity: high + severity: low description: > The WP Super Cache WordPress plugin before 1.7.2 was affected by an authenticated (admin+) RCE in the settings page due to input validation failure and weak $cache_path check in the WP Super Cache Settings -> Cache Location option. Direct access to the wp-cache-config.php file is not prohibited, so this vulnerability can be exploited for a web shell injection. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-super-cache/" google-query: inurl:"/wp-content/plugins/wp-super-cache/" shodan-query: 'vuln:CVE-2021-24209' - tags: cve,wordpress,wp-plugin,wp-super-cache,high + tags: cve,wordpress,wp-plugin,wp-super-cache,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24211-c52e6603b19e1ddbfb9c023a9a70f51b.yaml b/nuclei-templates/2021/CVE-2021-24211-c52e6603b19e1ddbfb9c023a9a70f51b.yaml index b5878ef445..7860e68df1 100644 --- a/nuclei-templates/2021/CVE-2021-24211-c52e6603b19e1ddbfb9c023a9a70f51b.yaml +++ b/nuclei-templates/2021/CVE-2021-24211-c52e6603b19e1ddbfb9c023a9a70f51b.yaml @@ -4,7 +4,7 @@ info: name: > WordPress Related Posts <= 3.6.4 - Authenticated (Admin+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The WordPress Related Posts plugin through 3.6.4 contains an authenticated (admin+) stored XSS vulnerability in the title field on the settings page. By exploiting that an attacker will be able to execute JavaScript code in the user's browser. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wordpress-23-related-posts-plugin/" google-query: inurl:"/wp-content/plugins/wordpress-23-related-posts-plugin/" shodan-query: 'vuln:CVE-2021-24211' - tags: cve,wordpress,wp-plugin,wordpress-23-related-posts-plugin,medium + tags: cve,wordpress,wp-plugin,wordpress-23-related-posts-plugin,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24216-e4cd9a4bbacdbb2aa88bdc0cb49786e1.yaml b/nuclei-templates/2021/CVE-2021-24216-e4cd9a4bbacdbb2aa88bdc0cb49786e1.yaml index 2f202465d1..9e9182376e 100644 --- a/nuclei-templates/2021/CVE-2021-24216-e4cd9a4bbacdbb2aa88bdc0cb49786e1.yaml +++ b/nuclei-templates/2021/CVE-2021-24216-e4cd9a4bbacdbb2aa88bdc0cb49786e1.yaml @@ -4,7 +4,7 @@ info: name: > All-in-One WP Migration <= 7.40 - Authenticated (Admin+) Arbitrary File Upload author: topscoder - severity: high + severity: low description: > The All-in-One WP Migration plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation on file upload in versions up to, and including, 7.40. This makes it possible for authenticated attackers with administrative privileges to upload arbitrary files on the affected sites server which may make remote code execution possible. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/all-in-one-wp-migration/" google-query: inurl:"/wp-content/plugins/all-in-one-wp-migration/" shodan-query: 'vuln:CVE-2021-24216' - tags: cve,wordpress,wp-plugin,all-in-one-wp-migration,high + tags: cve,wordpress,wp-plugin,all-in-one-wp-migration,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24219-bceae5f53d1ac07f2efbd28988c0d5d9.yaml b/nuclei-templates/2021/CVE-2021-24219-bceae5f53d1ac07f2efbd28988c0d5d9.yaml index 7951f764c5..c66f413782 100644 --- a/nuclei-templates/2021/CVE-2021-24219-bceae5f53d1ac07f2efbd28988c0d5d9.yaml +++ b/nuclei-templates/2021/CVE-2021-24219-bceae5f53d1ac07f2efbd28988c0d5d9.yaml @@ -14,17 +14,17 @@ info: cvss-score: 5.3 cve-id: CVE-2021-24219 metadata: - fofa-query: "wp-content/plugins/thrive-ab-page-testing/" - google-query: inurl:"/wp-content/plugins/thrive-ab-page-testing/" + fofa-query: "wp-content/plugins/thrive-headline-optimizer/" + google-query: inurl:"/wp-content/plugins/thrive-headline-optimizer/" shodan-query: 'vuln:CVE-2021-24219' - tags: cve,wordpress,wp-plugin,thrive-ab-page-testing,medium + tags: cve,wordpress,wp-plugin,thrive-headline-optimizer,medium http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/thrive-ab-page-testing/readme.txt" + - "{{BaseURL}}/wp-content/plugins/thrive-headline-optimizer/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "thrive-ab-page-testing" + - "thrive-headline-optimizer" part: body - type: dsl dsl: - - compare_versions(version, '< 1.4.13.3') \ No newline at end of file + - compare_versions(version, '< 1.3.7.3') \ No newline at end of file diff --git a/nuclei-templates/2021/CVE-2021-24220-09bb804f266b350634cb031ea62ca641.yaml b/nuclei-templates/2021/CVE-2021-24220-09bb804f266b350634cb031ea62ca641.yaml index e90ed2c907..2774388946 100644 --- a/nuclei-templates/2021/CVE-2021-24220-09bb804f266b350634cb031ea62ca641.yaml +++ b/nuclei-templates/2021/CVE-2021-24220-09bb804f266b350634cb031ea62ca641.yaml @@ -14,17 +14,17 @@ info: cvss-score: 9.1 cve-id: CVE-2021-24220 metadata: - fofa-query: "wp-content/themes/ignition/" - google-query: inurl:"/wp-content/themes/ignition/" + fofa-query: "wp-content/themes/focusblog/" + google-query: inurl:"/wp-content/themes/focusblog/" shodan-query: 'vuln:CVE-2021-24220' - tags: cve,wordpress,wp-theme,ignition,critical + tags: cve,wordpress,wp-theme,focusblog,critical http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/themes/ignition/style.css" + - "{{BaseURL}}/wp-content/themes/focusblog/style.css" extractors: - type: regex @@ -50,7 +50,7 @@ http: - type: word words: - - "ignition" + - "focusblog" part: body - type: dsl diff --git a/nuclei-templates/2021/CVE-2021-24221-9fbb2aba0f1c281c62bcad50b683f582.yaml b/nuclei-templates/2021/CVE-2021-24221-9fbb2aba0f1c281c62bcad50b683f582.yaml index 79c0ab4316..3573df6e98 100644 --- a/nuclei-templates/2021/CVE-2021-24221-9fbb2aba0f1c281c62bcad50b683f582.yaml +++ b/nuclei-templates/2021/CVE-2021-24221-9fbb2aba0f1c281c62bcad50b683f582.yaml @@ -4,7 +4,7 @@ info: name: > Quiz And Survey Master <= 7.1.11 - Authenticated SQL injection via shortcode author: topscoder - severity: high + severity: low description: > The Quiz And Survey Master – Best Quiz, Exam and Survey Plugin for WordPress plugin before 7.1.12 did not sanitise the result_id GET parameter on pages with the [qsm_result] shortcode without id attribute, concatenating it in a SQL statement and leading to an SQL injection. The lowest role allowed to use this shortcode in post or pages being author, such user could gain unauthorised access to the DBMS. If the shortcode (without the id attribute) is embed on a public page or post, then unauthenticated users could exploit the injection. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/quiz-master-next/" google-query: inurl:"/wp-content/plugins/quiz-master-next/" shodan-query: 'vuln:CVE-2021-24221' - tags: cve,wordpress,wp-plugin,quiz-master-next,high + tags: cve,wordpress,wp-plugin,quiz-master-next,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24224-1cdb0a1c4888e43e483d5ba8e84b6d9c.yaml b/nuclei-templates/2021/CVE-2021-24224-1cdb0a1c4888e43e483d5ba8e84b6d9c.yaml index 238f34d95b..df31b8d13d 100644 --- a/nuclei-templates/2021/CVE-2021-24224-1cdb0a1c4888e43e483d5ba8e84b6d9c.yaml +++ b/nuclei-templates/2021/CVE-2021-24224-1cdb0a1c4888e43e483d5ba8e84b6d9c.yaml @@ -4,7 +4,7 @@ info: name: > Easy Form Builder <= 1.0 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > The EFBP_verify_upload_file AJAX action of the Easy Form Builder WordPress plugin through 1.0, available to authenticated users, does not have any security in place to verify uploaded files, allowing low privilege users to upload arbitrary files, leading to RCE. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/easy-form-builder-by-bitware/" google-query: inurl:"/wp-content/plugins/easy-form-builder-by-bitware/" shodan-query: 'vuln:CVE-2021-24224' - tags: cve,wordpress,wp-plugin,easy-form-builder-by-bitware,high + tags: cve,wordpress,wp-plugin,easy-form-builder-by-bitware,critical http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24228-d2e2b4003ef24e75b8d453ad2f0582ba.yaml b/nuclei-templates/2021/CVE-2021-24228-d2e2b4003ef24e75b8d453ad2f0582ba.yaml index c2d9983ea0..97db689dc9 100644 --- a/nuclei-templates/2021/CVE-2021-24228-d2e2b4003ef24e75b8d453ad2f0582ba.yaml +++ b/nuclei-templates/2021/CVE-2021-24228-d2e2b4003ef24e75b8d453ad2f0582ba.yaml @@ -4,7 +4,7 @@ info: name: > Patreon WordPress <= 1.7.0 - Reflected Cross-Site Scripting author: topscoder - severity: critical + severity: medium description: > The Jetpack Scan team identified a Reflected Cross-Site Scripting in the Login Form of the Patreon WordPress plugin before 1.7.2. The WordPress login form (wp-login.php) is hooked by the plugin and offers to allow users to authenticate on the site using their Patreon account. Unfortunately, some of the error logging logic behind the scene allowed user-controlled input to be reflected on the login page, unsanitized. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/patreon-connect/" google-query: inurl:"/wp-content/plugins/patreon-connect/" shodan-query: 'vuln:CVE-2021-24228' - tags: cve,wordpress,wp-plugin,patreon-connect,critical + tags: cve,wordpress,wp-plugin,patreon-connect,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24229-1e16eec4b6ae009a904a8e7f17b7b28d.yaml b/nuclei-templates/2021/CVE-2021-24229-1e16eec4b6ae009a904a8e7f17b7b28d.yaml index 31fa922861..516e38d86b 100644 --- a/nuclei-templates/2021/CVE-2021-24229-1e16eec4b6ae009a904a8e7f17b7b28d.yaml +++ b/nuclei-templates/2021/CVE-2021-24229-1e16eec4b6ae009a904a8e7f17b7b28d.yaml @@ -4,7 +4,7 @@ info: name: > Patreon WordPress <= 1.7.0 - Reflected Cross-Site Scripting author: topscoder - severity: critical + severity: medium description: > The Jetpack Scan team identified a Reflected Cross-Site Scripting via the patreon_save_attachment_patreon_level AJAX action of the Patreon WordPress plugin before 1.7.2. This AJAX hook is used to update the pledge level required by Patreon subscribers to access a given attachment. This action is accessible for user accounts with the ‘manage_options’ privilege (i.e.., only administrators). Unfortunately, one of the parameters used in this AJAX endpoint is not sanitized before being printed back to the user, so the risk it represents is the same as the previous XSS vulnerability. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/patreon-connect/" google-query: inurl:"/wp-content/plugins/patreon-connect/" shodan-query: 'vuln:CVE-2021-24229' - tags: cve,wordpress,wp-plugin,patreon-connect,critical + tags: cve,wordpress,wp-plugin,patreon-connect,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24230-1d56115c5756336039596f3db2afcf11.yaml b/nuclei-templates/2021/CVE-2021-24230-1d56115c5756336039596f3db2afcf11.yaml index c0ffc09e85..effb41f3a9 100644 --- a/nuclei-templates/2021/CVE-2021-24230-1d56115c5756336039596f3db2afcf11.yaml +++ b/nuclei-templates/2021/CVE-2021-24230-1d56115c5756336039596f3db2afcf11.yaml @@ -4,7 +4,7 @@ info: name: > Patreon WordPress <= 1.6.9 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Patreon WordPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.6.9. If exploited, this bug can be used to overwrite the “wp_capabilities” meta, which contains the affected user account’s roles and privileges. Doing this would essentially lock them out of the site, blocking them from accessing paid content. This makes it possible for unauthenticated attackers to make a logged in user overwrite or create arbitrary user metadata on the victim’s account once visited via forged request granted they can trick a site administrator into performing an action such as clicking on a link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/patreon-connect/" google-query: inurl:"/wp-content/plugins/patreon-connect/" shodan-query: 'vuln:CVE-2021-24230' - tags: cve,wordpress,wp-plugin,patreon-connect,high + tags: cve,wordpress,wp-plugin,patreon-connect,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24231-3ea0fac767d2ae2ce8f2f4784f535988.yaml b/nuclei-templates/2021/CVE-2021-24231-3ea0fac767d2ae2ce8f2f4784f535988.yaml index 3201c7938f..a69fff12aa 100644 --- a/nuclei-templates/2021/CVE-2021-24231-3ea0fac767d2ae2ce8f2f4784f535988.yaml +++ b/nuclei-templates/2021/CVE-2021-24231-3ea0fac767d2ae2ce8f2f4784f535988.yaml @@ -4,7 +4,7 @@ info: name: > Patreon WordPress <= 1.6.9 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Jetpack Scan team identified a Cross-Site Request Forgery vulnerability in the Patreon WordPress plugin before 1.7.0, allowing attackers to make a logged administrator disconnect the site from Patreon by visiting a specially crafted link. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/patreon-connect/" google-query: inurl:"/wp-content/plugins/patreon-connect/" shodan-query: 'vuln:CVE-2021-24231' - tags: cve,wordpress,wp-plugin,patreon-connect,high + tags: cve,wordpress,wp-plugin,patreon-connect,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24238-d1bbc50d843df9b465aead854697cdc8.yaml b/nuclei-templates/2021/CVE-2021-24238-d1bbc50d843df9b465aead854697cdc8.yaml index eb54d3f764..3d5e4efecc 100644 --- a/nuclei-templates/2021/CVE-2021-24238-d1bbc50d843df9b465aead854697cdc8.yaml +++ b/nuclei-templates/2021/CVE-2021-24238-d1bbc50d843df9b465aead854697cdc8.yaml @@ -4,7 +4,7 @@ info: name: > Realteo < 1.2.4 - Missing Authorization author: topscoder - severity: medium + severity: high description: > The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not ensure that the requested property to be deleted belong to the user making the request, allowing any authenticated users to delete arbitrary properties by tampering with the property_id parameter. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/findeo/" google-query: inurl:"/wp-content/plugins/findeo/" shodan-query: 'vuln:CVE-2021-24238' - tags: cve,wordpress,wp-plugin,findeo,medium + tags: cve,wordpress,wp-plugin,findeo,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24242-78ff72d9346255abccb5396c4cac06cb.yaml b/nuclei-templates/2021/CVE-2021-24242-78ff72d9346255abccb5396c4cac06cb.yaml index 831625beae..c1a9fad8d0 100644 --- a/nuclei-templates/2021/CVE-2021-24242-78ff72d9346255abccb5396c4cac06cb.yaml +++ b/nuclei-templates/2021/CVE-2021-24242-78ff72d9346255abccb5396c4cac06cb.yaml @@ -4,7 +4,7 @@ info: name: > Tutor LMS <= 1.8.7 - Authenticated Local File Inclusion author: topscoder - severity: medium + severity: low description: > The Tutor LMS – eLearning and online course solution WordPress plugin before 1.8.8 is affected by a local file inclusion vulnerability through the maliciously constructed sub_page parameter of the plugin's Tools, allowing high privilege users to include any local php file reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/tutor/" google-query: inurl:"/wp-content/plugins/tutor/" shodan-query: 'vuln:CVE-2021-24242' - tags: cve,wordpress,wp-plugin,tutor,medium + tags: cve,wordpress,wp-plugin,tutor,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24243-3ff23277c9ba98ae052e3b9f7bce2ce5.yaml b/nuclei-templates/2021/CVE-2021-24243-3ff23277c9ba98ae052e3b9f7bce2ce5.yaml index 3557def5a6..b24762dde4 100644 --- a/nuclei-templates/2021/CVE-2021-24243-3ff23277c9ba98ae052e3b9f7bce2ce5.yaml +++ b/nuclei-templates/2021/CVE-2021-24243-3ff23277c9ba98ae052e3b9f7bce2ce5.yaml @@ -4,7 +4,7 @@ info: name: > WPBakery Page Builder Clipboard <= 4.5.5 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > An AJAX action registered by the WPBakery Page Builder (Visual Composer) Clipboard WordPress plugin before 4.5.6 did not have capability checks nor sanitization, allowing low privilege users (subscriber+) to call it and set XSS payloads, which will be triggered in all backend pages. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/vc_clipboard/" google-query: inurl:"/wp-content/plugins/vc_clipboard/" shodan-query: 'vuln:CVE-2021-24243' - tags: cve,wordpress,wp-plugin,vc_clipboard,medium + tags: cve,wordpress,wp-plugin,vc_clipboard,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24246-295565d6c00c49b75df12a1f75ae3147.yaml b/nuclei-templates/2021/CVE-2021-24246-295565d6c00c49b75df12a1f75ae3147.yaml index 1fef89b9ab..8489226ce1 100644 --- a/nuclei-templates/2021/CVE-2021-24246-295565d6c00c49b75df12a1f75ae3147.yaml +++ b/nuclei-templates/2021/CVE-2021-24246-295565d6c00c49b75df12a1f75ae3147.yaml @@ -4,7 +4,7 @@ info: name: > WorkScout - Job Board WordPress Theme <= 2.0.31 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Workscout Core WordPress plugin before 1.3.4, used by the WorkScout Theme did not sanitise the chat messages sent via the workscout_send_message_chat AJAX action, leading to Stored Cross-Site Scripting and Cross-Frame Scripting issues reference: @@ -14,17 +14,17 @@ info: cvss-score: 6.4 cve-id: CVE-2021-24246 metadata: - fofa-query: "wp-content/plugins/workscout-core/" - google-query: inurl:"/wp-content/plugins/workscout-core/" + fofa-query: "wp-content/themes/workscout/" + google-query: inurl:"/wp-content/themes/workscout/" shodan-query: 'vuln:CVE-2021-24246' - tags: cve,wordpress,wp-plugin,workscout-core,medium + tags: cve,wordpress,wp-theme,workscout,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/workscout-core/readme.txt" + - "{{BaseURL}}/wp-content/themes/workscout/style.css" extractors: - type: regex @@ -33,14 +33,14 @@ http: group: 1 internal: true regex: - - "(?mi)Stable tag: ([0-9.]+)" + - "(?mi)Version: ([0-9.]+)" - type: regex name: version part: body group: 1 regex: - - "(?mi)Stable tag: ([0-9.]+)" + - "(?mi)Version: ([0-9.]+)" matchers-condition: and matchers: @@ -50,9 +50,9 @@ http: - type: word words: - - "workscout-core" + - "workscout" part: body - type: dsl dsl: - - compare_versions(version, '< 1.3.4') \ No newline at end of file + - compare_versions(version, '<= 2.0.31') \ No newline at end of file diff --git a/nuclei-templates/2021/CVE-2021-24247-8399de040479bedb6b313106c99e1459.yaml b/nuclei-templates/2021/CVE-2021-24247-8399de040479bedb6b313106c99e1459.yaml index e919a722dd..daaab1f45b 100644 --- a/nuclei-templates/2021/CVE-2021-24247-8399de040479bedb6b313106c99e1459.yaml +++ b/nuclei-templates/2021/CVE-2021-24247-8399de040479bedb6b313106c99e1459.yaml @@ -4,7 +4,7 @@ info: name: > Contact Form Check Tester <= 1.0.2 - Authenticated (Subscriber+) Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Contact Form Check Tester WordPress plugin through 1.0.2 settings are visible to all registered users in the dashboard and are lacking any sanitisation. As a result, any registered user, such as subscriber, can leave an XSS payload in the plugin settings, which will be triggered by any user visiting them, and could allow for privilege escalation. The vendor decided to close the plugin. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/contact-form-check-tester/" google-query: inurl:"/wp-content/plugins/contact-form-check-tester/" shodan-query: 'vuln:CVE-2021-24247' - tags: cve,wordpress,wp-plugin,contact-form-check-tester,medium + tags: cve,wordpress,wp-plugin,contact-form-check-tester,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24248-70e9f9d703b7871b412f99e0b65bc826.yaml b/nuclei-templates/2021/CVE-2021-24248-70e9f9d703b7871b412f99e0b65bc826.yaml index f8005bd83b..96865276f7 100644 --- a/nuclei-templates/2021/CVE-2021-24248-70e9f9d703b7871b412f99e0b65bc826.yaml +++ b/nuclei-templates/2021/CVE-2021-24248-70e9f9d703b7871b412f99e0b65bc826.yaml @@ -4,7 +4,7 @@ info: name: > Business Directory Plugin <= 5.11 - Authenticated PHP4 Upload author: topscoder - severity: high + severity: low description: > The Business Directory Plugin – Easy Listing Directories for WordPress WordPress plugin before 5.11.1 did not properly check for imported files, forbidding certain extension via a blacklist approach, allowing administrator to import an archive with a .php4 inside for example, leading to RCE reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/business-directory-plugin/" google-query: inurl:"/wp-content/plugins/business-directory-plugin/" shodan-query: 'vuln:CVE-2021-24248' - tags: cve,wordpress,wp-plugin,business-directory-plugin,high + tags: cve,wordpress,wp-plugin,business-directory-plugin,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24249-3640b3daf83d6cd1e2aa52d4c7a270ac.yaml b/nuclei-templates/2021/CVE-2021-24249-3640b3daf83d6cd1e2aa52d4c7a270ac.yaml index 3292851a10..e08114150d 100644 --- a/nuclei-templates/2021/CVE-2021-24249-3640b3daf83d6cd1e2aa52d4c7a270ac.yaml +++ b/nuclei-templates/2021/CVE-2021-24249-3640b3daf83d6cd1e2aa52d4c7a270ac.yaml @@ -4,7 +4,7 @@ info: name: > Business Directory Plugin – Easy Listing Directories for WordPress <= 5.11.1 - Cross-Site Request Forgery to Arbitrary Listing Export author: topscoder - severity: high + severity: medium description: > The Business Directory Plugin – Easy Listing Directories for WordPress WordPress plugin before 5.11.2 suffered from a Cross-Site Request Forgery issue, allowing an attacker to make a logged in administrator export files, which could then be downloaded by the attacker to get access to PII, such as email, home addresses etc reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/business-directory-plugin/" google-query: inurl:"/wp-content/plugins/business-directory-plugin/" shodan-query: 'vuln:CVE-2021-24249' - tags: cve,wordpress,wp-plugin,business-directory-plugin,high + tags: cve,wordpress,wp-plugin,business-directory-plugin,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24250-3950561f5b69ad2aadeaa54bf293ca85.yaml b/nuclei-templates/2021/CVE-2021-24250-3950561f5b69ad2aadeaa54bf293ca85.yaml index df94731f9c..53b9d2a50e 100644 --- a/nuclei-templates/2021/CVE-2021-24250-3950561f5b69ad2aadeaa54bf293ca85.yaml +++ b/nuclei-templates/2021/CVE-2021-24250-3950561f5b69ad2aadeaa54bf293ca85.yaml @@ -4,7 +4,7 @@ info: name: > Business Directory Plugin <= 5.11.1 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Business Directory Plugin – Easy Listing Directories for WordPress WordPress plugin before 5.11.2 suffered from lack of sanitisation in the label of the Form Fields, leading to Authenticated Stored Cross-Site Scripting issues across various pages of the plugin. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/business-directory-plugin/" google-query: inurl:"/wp-content/plugins/business-directory-plugin/" shodan-query: 'vuln:CVE-2021-24250' - tags: cve,wordpress,wp-plugin,business-directory-plugin,medium + tags: cve,wordpress,wp-plugin,business-directory-plugin,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24252-47d3ad7250426f9e950984c71ba1d1f7.yaml b/nuclei-templates/2021/CVE-2021-24252-47d3ad7250426f9e950984c71ba1d1f7.yaml index 31307e2306..83eef1b16a 100644 --- a/nuclei-templates/2021/CVE-2021-24252-47d3ad7250426f9e950984c71ba1d1f7.yaml +++ b/nuclei-templates/2021/CVE-2021-24252-47d3ad7250426f9e950984c71ba1d1f7.yaml @@ -4,7 +4,7 @@ info: name: > Event Banner <= 1.3 - Cross-Site Request Forgery author: topscoder - severity: high + severity: medium description: > The Event Banner WordPress plugin through 1.3 does not verify the uploaded image file, allowing admin accounts to upload arbitrary files, such as .exe, .php, or others executable, leading to RCE. Due to the lack of CSRF check, the issue can also be used via such vector to achieve the same result, or via a LFI as authorisation checks are missing (but would require WP to be loaded) reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/free-event-banner/" google-query: inurl:"/wp-content/plugins/free-event-banner/" shodan-query: 'vuln:CVE-2021-24252' - tags: cve,wordpress,wp-plugin,free-event-banner,high + tags: cve,wordpress,wp-plugin,free-event-banner,medium http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24253-f47e6eae64c804173012f23d96ac47f1.yaml b/nuclei-templates/2021/CVE-2021-24253-f47e6eae64c804173012f23d96ac47f1.yaml index 26ef8d6998..2507feb6bb 100644 --- a/nuclei-templates/2021/CVE-2021-24253-f47e6eae64c804173012f23d96ac47f1.yaml +++ b/nuclei-templates/2021/CVE-2021-24253-f47e6eae64c804173012f23d96ac47f1.yaml @@ -4,7 +4,7 @@ info: name: > classyfrieds <= 3.8 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > The classyfrieds WordPress plugin through 3.8 does not properly check the uploaded file when an authenticated user adds a listing, only checking the content-type in the request. This allows any authenticated user to upload arbitrary PHP files via the Add Listing feature of the plugin, leading to RCE. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/classyfrieds/" google-query: inurl:"/wp-content/plugins/classyfrieds/" shodan-query: 'vuln:CVE-2021-24253' - tags: cve,wordpress,wp-plugin,classyfrieds,high + tags: cve,wordpress,wp-plugin,classyfrieds,critical http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24254-c719c1fa9d94cb4a4d6e24f4ded47412.yaml b/nuclei-templates/2021/CVE-2021-24254-c719c1fa9d94cb4a4d6e24f4ded47412.yaml index 11370c4616..ad6654e4c1 100644 --- a/nuclei-templates/2021/CVE-2021-24254-c719c1fa9d94cb4a4d6e24f4ded47412.yaml +++ b/nuclei-templates/2021/CVE-2021-24254-c719c1fa9d94cb4a4d6e24f4ded47412.yaml @@ -4,7 +4,7 @@ info: name: > College publisher Import <= 0.1 - Arbitrary File Upload author: topscoder - severity: high + severity: critical description: > The College publisher Import WordPress plugin through 0.1 does not check for the uploaded CSV file to import, allowing high privilege users to upload arbitrary files, such as PHP, leading to RCE. Due to the lack of CSRF check, the issue could also be exploited via a CSRF attack. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/college-publisher-import/" google-query: inurl:"/wp-content/plugins/college-publisher-import/" shodan-query: 'vuln:CVE-2021-24254' - tags: cve,wordpress,wp-plugin,college-publisher-import,high + tags: cve,wordpress,wp-plugin,college-publisher-import,critical http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24255-73185f41beb88e54f54a80787c1d789a.yaml b/nuclei-templates/2021/CVE-2021-24255-73185f41beb88e54f54a80787c1d789a.yaml index d6f459a9cd..0d3f1a0535 100644 --- a/nuclei-templates/2021/CVE-2021-24255-73185f41beb88e54f54a80787c1d789a.yaml +++ b/nuclei-templates/2021/CVE-2021-24255-73185f41beb88e54f54a80787c1d789a.yaml @@ -4,7 +4,7 @@ info: name: > Essential Addons for Elementor Lite <= 4.5.3 - Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Essential Addons for Elementor Lite WordPress Plugin before 4.5.4 has two widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, both via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/essential-addons-for-elementor-lite/" google-query: inurl:"/wp-content/plugins/essential-addons-for-elementor-lite/" shodan-query: 'vuln:CVE-2021-24255' - tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,medium + tags: cve,wordpress,wp-plugin,essential-addons-for-elementor-lite,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24256-76b99567dc5d8693687703220a992b79.yaml b/nuclei-templates/2021/CVE-2021-24256-76b99567dc5d8693687703220a992b79.yaml index 9305c32569..15139d82e6 100644 --- a/nuclei-templates/2021/CVE-2021-24256-76b99567dc5d8693687703220a992b79.yaml +++ b/nuclei-templates/2021/CVE-2021-24256-76b99567dc5d8693687703220a992b79.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Header & Footer Builder <= 1.5.7 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The “Elementor – Header, Footer & Blocks Template” WordPress Plugin before 1.5.8 has two widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/header-footer-elementor/" google-query: inurl:"/wp-content/plugins/header-footer-elementor/" shodan-query: 'vuln:CVE-2021-24256' - tags: cve,wordpress,wp-plugin,header-footer-elementor,medium + tags: cve,wordpress,wp-plugin,header-footer-elementor,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24257-ca0593eecf48a43d195a057ed533a1b4.yaml b/nuclei-templates/2021/CVE-2021-24257-ca0593eecf48a43d195a057ed533a1b4.yaml index 002b7b953e..aa31380b02 100644 --- a/nuclei-templates/2021/CVE-2021-24257-ca0593eecf48a43d195a057ed533a1b4.yaml +++ b/nuclei-templates/2021/CVE-2021-24257-ca0593eecf48a43d195a057ed533a1b4.yaml @@ -4,7 +4,7 @@ info: name: > Premium Addons for Elementor <=4.2.7 Contributor+ Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The “Premium Addons for Elementor” WordPress Plugin before 4.2.8 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/premium-addons-for-elementor/" google-query: inurl:"/wp-content/plugins/premium-addons-for-elementor/" shodan-query: 'vuln:CVE-2021-24257' - tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,medium + tags: cve,wordpress,wp-plugin,premium-addons-for-elementor,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24258-b5aa1e2113ade8542174b19f6a7b50fe.yaml b/nuclei-templates/2021/CVE-2021-24258-b5aa1e2113ade8542174b19f6a7b50fe.yaml index b7b7779d6b..eb70aef6c5 100644 --- a/nuclei-templates/2021/CVE-2021-24258-b5aa1e2113ade8542174b19f6a7b50fe.yaml +++ b/nuclei-templates/2021/CVE-2021-24258-b5aa1e2113ade8542174b19f6a7b50fe.yaml @@ -4,7 +4,7 @@ info: name: > Elements Kit Lite/Pro <= 2.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Elements Kit Lite and Elements Kit Pro WordPress Plugins before 2.2.0 have a number of widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/elementskit-lite/" google-query: inurl:"/wp-content/plugins/elementskit-lite/" shodan-query: 'vuln:CVE-2021-24258' - tags: cve,wordpress,wp-plugin,elementskit-lite,medium + tags: cve,wordpress,wp-plugin,elementskit-lite,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24259-f95a6103756f27e103bcf366ca12c670.yaml b/nuclei-templates/2021/CVE-2021-24259-f95a6103756f27e103bcf366ca12c670.yaml index 297219430f..fe25cce003 100644 --- a/nuclei-templates/2021/CVE-2021-24259-f95a6103756f27e103bcf366ca12c670.yaml +++ b/nuclei-templates/2021/CVE-2021-24259-f95a6103756f27e103bcf366ca12c670.yaml @@ -4,7 +4,7 @@ info: name: > Elementor Addon Elements <= 1.11.1 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The “Elementor Addon Elements” WordPress Plugin before 1.11.2 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/addon-elements-for-elementor-page-builder/" google-query: inurl:"/wp-content/plugins/addon-elements-for-elementor-page-builder/" shodan-query: 'vuln:CVE-2021-24259' - tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,medium + tags: cve,wordpress,wp-plugin,addon-elements-for-elementor-page-builder,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24260-f08da3e42125c87db99ab45bab5c3734.yaml b/nuclei-templates/2021/CVE-2021-24260-f08da3e42125c87db99ab45bab5c3734.yaml index 9b5ad42ee1..9b8362723a 100644 --- a/nuclei-templates/2021/CVE-2021-24260-f08da3e42125c87db99ab45bab5c3734.yaml +++ b/nuclei-templates/2021/CVE-2021-24260-f08da3e42125c87db99ab45bab5c3734.yaml @@ -4,7 +4,7 @@ info: name: > Livemesh Addons for Elementor <= 6.7.1- Contributor+ Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The “Livemesh Addons for Elementor” WordPress Plugin before 6.8 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/addons-for-elementor/" google-query: inurl:"/wp-content/plugins/addons-for-elementor/" shodan-query: 'vuln:CVE-2021-24260' - tags: cve,wordpress,wp-plugin,addons-for-elementor,medium + tags: cve,wordpress,wp-plugin,addons-for-elementor,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24261-70fc895faebcf1fe7c1137deedd632a4.yaml b/nuclei-templates/2021/CVE-2021-24261-70fc895faebcf1fe7c1137deedd632a4.yaml index 1412d023f2..04a4d58f79 100644 --- a/nuclei-templates/2021/CVE-2021-24261-70fc895faebcf1fe7c1137deedd632a4.yaml +++ b/nuclei-templates/2021/CVE-2021-24261-70fc895faebcf1fe7c1137deedd632a4.yaml @@ -4,7 +4,7 @@ info: name: > HT Mega - Absolute Addons for Elementor Page Builder <= 1.5.5 - Contributor+ Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The “HT Mega – Absolute Addons for Elementor Page Builder” WordPress Plugin before 1.5.7 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ht-mega-for-elementor/" google-query: inurl:"/wp-content/plugins/ht-mega-for-elementor/" shodan-query: 'vuln:CVE-2021-24261' - tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,medium + tags: cve,wordpress,wp-plugin,ht-mega-for-elementor,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24262-bd64f1f16c4920e8819a833f00007e5e.yaml b/nuclei-templates/2021/CVE-2021-24262-bd64f1f16c4920e8819a833f00007e5e.yaml index d3a8158b32..2b3f93ca89 100644 --- a/nuclei-templates/2021/CVE-2021-24262-bd64f1f16c4920e8819a833f00007e5e.yaml +++ b/nuclei-templates/2021/CVE-2021-24262-bd64f1f16c4920e8819a833f00007e5e.yaml @@ -4,7 +4,7 @@ info: name: > WooLentor – WooCommerce Elementor Addons + Builder <= 1.8.5 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The “WooLentor – WooCommerce Elementor Addons + Builder” WordPress Plugin before 1.8.6 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/woolentor-addons/" google-query: inurl:"/wp-content/plugins/woolentor-addons/" shodan-query: 'vuln:CVE-2021-24262' - tags: cve,wordpress,wp-plugin,woolentor-addons,medium + tags: cve,wordpress,wp-plugin,woolentor-addons,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24263-e94aceaf63920aa3eb4b9932eb00b35a.yaml b/nuclei-templates/2021/CVE-2021-24263-e94aceaf63920aa3eb4b9932eb00b35a.yaml index c1541ed089..9af6865a7b 100644 --- a/nuclei-templates/2021/CVE-2021-24263-e94aceaf63920aa3eb4b9932eb00b35a.yaml +++ b/nuclei-templates/2021/CVE-2021-24263-e94aceaf63920aa3eb4b9932eb00b35a.yaml @@ -4,7 +4,7 @@ info: name: > PowerPack Addons for Elementor <= 2.3.1 - Contributor+ Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The “Elementor Addons – PowerPack Addons for Elementor” WordPress Plugin before 2.3.2 for WordPress has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/powerpack-lite-for-elementor/" google-query: inurl:"/wp-content/plugins/powerpack-lite-for-elementor/" shodan-query: 'vuln:CVE-2021-24263' - tags: cve,wordpress,wp-plugin,powerpack-lite-for-elementor,medium + tags: cve,wordpress,wp-plugin,powerpack-lite-for-elementor,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24264-257c0e2f02ca2973a1b0fbc7bb05b9d9.yaml b/nuclei-templates/2021/CVE-2021-24264-257c0e2f02ca2973a1b0fbc7bb05b9d9.yaml index e7ebe16ccc..03a92dbd76 100644 --- a/nuclei-templates/2021/CVE-2021-24264-257c0e2f02ca2973a1b0fbc7bb05b9d9.yaml +++ b/nuclei-templates/2021/CVE-2021-24264-257c0e2f02ca2973a1b0fbc7bb05b9d9.yaml @@ -4,7 +4,7 @@ info: name: > Image Hover Effects – Elementor Addon <= 1.3.3 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The “Image Hover Effects – Elementor Addon” WordPress Plugin before 1.3.4 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/image-hover-effects-addon-for-elementor/" google-query: inurl:"/wp-content/plugins/image-hover-effects-addon-for-elementor/" shodan-query: 'vuln:CVE-2021-24264' - tags: cve,wordpress,wp-plugin,image-hover-effects-addon-for-elementor,medium + tags: cve,wordpress,wp-plugin,image-hover-effects-addon-for-elementor,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24265-b6405ae9eaca03d55059021293cdb417.yaml b/nuclei-templates/2021/CVE-2021-24265-b6405ae9eaca03d55059021293cdb417.yaml index 86787b14e1..9abfe3917e 100644 --- a/nuclei-templates/2021/CVE-2021-24265-b6405ae9eaca03d55059021293cdb417.yaml +++ b/nuclei-templates/2021/CVE-2021-24265-b6405ae9eaca03d55059021293cdb417.yaml @@ -4,7 +4,7 @@ info: name: > Rife Elementor Extensions & Templates <= 1.1.5 - Authenticated (Contributor+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The “Rife Elementor Extensions & Templates” WordPress Plugin before 1.1.6 has a widget that is vulnerable to stored Cross-Site Scripting(XSS) by lower-privileged users such as contributors, all via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/rife-elementor-extensions/" google-query: inurl:"/wp-content/plugins/rife-elementor-extensions/" shodan-query: 'vuln:CVE-2021-24265' - tags: cve,wordpress,wp-plugin,rife-elementor-extensions,medium + tags: cve,wordpress,wp-plugin,rife-elementor-extensions,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24266-3835c81a3b054f8f577b5a29958ca111.yaml b/nuclei-templates/2021/CVE-2021-24266-3835c81a3b054f8f577b5a29958ca111.yaml index 870ef83841..7742bbd631 100644 --- a/nuclei-templates/2021/CVE-2021-24266-3835c81a3b054f8f577b5a29958ca111.yaml +++ b/nuclei-templates/2021/CVE-2021-24266-3835c81a3b054f8f577b5a29958ca111.yaml @@ -4,7 +4,7 @@ info: name: > The Plus Addons for Elementor Page Builder Lite < 2.0.6 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The “The Plus Addons for Elementor Page Builder Lite” WordPress Plugin before 2.0.6 has four widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/the-plus-addons-for-elementor-page-builder/" google-query: inurl:"/wp-content/plugins/the-plus-addons-for-elementor-page-builder/" shodan-query: 'vuln:CVE-2021-24266' - tags: cve,wordpress,wp-plugin,the-plus-addons-for-elementor-page-builder,medium + tags: cve,wordpress,wp-plugin,the-plus-addons-for-elementor-page-builder,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24267-85a1c6e007a9a1b0879129219d595f5f.yaml b/nuclei-templates/2021/CVE-2021-24267-85a1c6e007a9a1b0879129219d595f5f.yaml index fce1e2da23..1bdd18ed24 100644 --- a/nuclei-templates/2021/CVE-2021-24267-85a1c6e007a9a1b0879129219d595f5f.yaml +++ b/nuclei-templates/2021/CVE-2021-24267-85a1c6e007a9a1b0879129219d595f5f.yaml @@ -4,7 +4,7 @@ info: name: > All-in-One Addons for Elementor - WidgetKit <= 2.3.9 - Contributor+ Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The “All-in-One Addons for Elementor – WidgetKit” WordPress Plugin before 2.3.10 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/widgetkit-for-elementor/" google-query: inurl:"/wp-content/plugins/widgetkit-for-elementor/" shodan-query: 'vuln:CVE-2021-24267' - tags: cve,wordpress,wp-plugin,widgetkit-for-elementor,medium + tags: cve,wordpress,wp-plugin,widgetkit-for-elementor,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24268-c3fb6f2c99d4c5f13096c4775a849201.yaml b/nuclei-templates/2021/CVE-2021-24268-c3fb6f2c99d4c5f13096c4775a849201.yaml index 33257b8929..b6b6dba616 100644 --- a/nuclei-templates/2021/CVE-2021-24268-c3fb6f2c99d4c5f13096c4775a849201.yaml +++ b/nuclei-templates/2021/CVE-2021-24268-c3fb6f2c99d4c5f13096c4775a849201.yaml @@ -4,7 +4,7 @@ info: name: > JetWidgets For Elementor <= 1.0.8 - Contributor+ Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The “JetWidgets For Elementor” WordPress Plugin before 1.0.9 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/jetwidgets-for-elementor/" google-query: inurl:"/wp-content/plugins/jetwidgets-for-elementor/" shodan-query: 'vuln:CVE-2021-24268' - tags: cve,wordpress,wp-plugin,jetwidgets-for-elementor,medium + tags: cve,wordpress,wp-plugin,jetwidgets-for-elementor,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24269-85fafc88eba7f097874b28a387304352.yaml b/nuclei-templates/2021/CVE-2021-24269-85fafc88eba7f097874b28a387304352.yaml index 4e8718447f..8678728f26 100644 --- a/nuclei-templates/2021/CVE-2021-24269-85fafc88eba7f097874b28a387304352.yaml +++ b/nuclei-templates/2021/CVE-2021-24269-85fafc88eba7f097874b28a387304352.yaml @@ -4,7 +4,7 @@ info: name: > Sina Extension for Elementor <= 3.3.11 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The “Sina Extension for Elementor” WordPress Plugin before 3.3.12 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/sina-extension-for-elementor/" google-query: inurl:"/wp-content/plugins/sina-extension-for-elementor/" shodan-query: 'vuln:CVE-2021-24269' - tags: cve,wordpress,wp-plugin,sina-extension-for-elementor,medium + tags: cve,wordpress,wp-plugin,sina-extension-for-elementor,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24270-9e56ce0a564cde270ffad1e5997baa50.yaml b/nuclei-templates/2021/CVE-2021-24270-9e56ce0a564cde270ffad1e5997baa50.yaml index 166ede4f45..9c9205a8eb 100644 --- a/nuclei-templates/2021/CVE-2021-24270-9e56ce0a564cde270ffad1e5997baa50.yaml +++ b/nuclei-templates/2021/CVE-2021-24270-9e56ce0a564cde270ffad1e5997baa50.yaml @@ -4,7 +4,7 @@ info: name: > DethemeKit For Elementor <= 1.5.5.4 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The “DeTheme Kit for Elementor” WordPress Plugin before 1.5.5.5 has a widget that is vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/dethemekit-for-elementor/" google-query: inurl:"/wp-content/plugins/dethemekit-for-elementor/" shodan-query: 'vuln:CVE-2021-24270' - tags: cve,wordpress,wp-plugin,dethemekit-for-elementor,medium + tags: cve,wordpress,wp-plugin,dethemekit-for-elementor,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24271-b3de31ba898622222026a1275ef3dc05.yaml b/nuclei-templates/2021/CVE-2021-24271-b3de31ba898622222026a1275ef3dc05.yaml index b4deb4c240..bc6382845e 100644 --- a/nuclei-templates/2021/CVE-2021-24271-b3de31ba898622222026a1275ef3dc05.yaml +++ b/nuclei-templates/2021/CVE-2021-24271-b3de31ba898622222026a1275ef3dc05.yaml @@ -4,7 +4,7 @@ info: name: > Ultimate Addons for Elementor < 1.30.0 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Ultimate Addons for Elementor WordPress Plugin before 1.30.0 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/ultimate-elementor/" google-query: inurl:"/wp-content/plugins/ultimate-elementor/" shodan-query: 'vuln:CVE-2021-24271' - tags: cve,wordpress,wp-plugin,ultimate-elementor,medium + tags: cve,wordpress,wp-plugin,ultimate-elementor,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24273-dddec61512fe66c6bc2775d423f59680.yaml b/nuclei-templates/2021/CVE-2021-24273-dddec61512fe66c6bc2775d423f59680.yaml index 6255917191..1d1ca6fcd4 100644 --- a/nuclei-templates/2021/CVE-2021-24273-dddec61512fe66c6bc2775d423f59680.yaml +++ b/nuclei-templates/2021/CVE-2021-24273-dddec61512fe66c6bc2775d423f59680.yaml @@ -4,7 +4,7 @@ info: name: > Clever Addons for Elementor <=2.0.15 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The “Clever Addons for Elementor” WordPress Plugin before 2.1.0 has several widgets that are vulnerable to stored Cross-Site Scripting (XSS) by lower-privileged users such as contributors, all via a similar method. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cafe-lite/" google-query: inurl:"/wp-content/plugins/cafe-lite/" shodan-query: 'vuln:CVE-2021-24273' - tags: cve,wordpress,wp-plugin,cafe-lite,medium + tags: cve,wordpress,wp-plugin,cafe-lite,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24277-509b534cfaeb00eddb901be35d0a9812.yaml b/nuclei-templates/2021/CVE-2021-24277-509b534cfaeb00eddb901be35d0a9812.yaml index 5bec1bde5e..88e27aa859 100644 --- a/nuclei-templates/2021/CVE-2021-24277-509b534cfaeb00eddb901be35d0a9812.yaml +++ b/nuclei-templates/2021/CVE-2021-24277-509b534cfaeb00eddb901be35d0a9812.yaml @@ -4,7 +4,7 @@ info: name: > RSS for Yandex Turbo <= 1.29 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The RSS for Yandex Turbo WordPress plugin before 1.30 did not properly sanitise the user inputs from its Счетчики settings tab before outputting them back in the page, leading to authenticated stored Cross-Site Scripting issues reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/rss-for-yandex-turbo/" google-query: inurl:"/wp-content/plugins/rss-for-yandex-turbo/" shodan-query: 'vuln:CVE-2021-24277' - tags: cve,wordpress,wp-plugin,rss-for-yandex-turbo,medium + tags: cve,wordpress,wp-plugin,rss-for-yandex-turbo,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24279-981460190387e68d2f348e5da885ce72.yaml b/nuclei-templates/2021/CVE-2021-24279-981460190387e68d2f348e5da885ce72.yaml index 0dc406eb1e..8d46ca4986 100644 --- a/nuclei-templates/2021/CVE-2021-24279-981460190387e68d2f348e5da885ce72.yaml +++ b/nuclei-templates/2021/CVE-2021-24279-981460190387e68d2f348e5da885ce72.yaml @@ -4,7 +4,7 @@ info: name: > Redirection for Contact Form 7 <= 2.3.3 - Authenticated Arbitrary Plugin Installation author: topscoder - severity: medium + severity: low description: > In the Redirection for Contact Form 7 WordPress plugin before 2.3.4, low level users, such as subscribers, could use the import_from_debug AJAX action to install any plugin from the WordPress repository. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpcf7-redirect/" google-query: inurl:"/wp-content/plugins/wpcf7-redirect/" shodan-query: 'vuln:CVE-2021-24279' - tags: cve,wordpress,wp-plugin,wpcf7-redirect,medium + tags: cve,wordpress,wp-plugin,wpcf7-redirect,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24280-0446faf7e8a09fe554612052c4885eba.yaml b/nuclei-templates/2021/CVE-2021-24280-0446faf7e8a09fe554612052c4885eba.yaml index f2d7d1af64..d567684308 100644 --- a/nuclei-templates/2021/CVE-2021-24280-0446faf7e8a09fe554612052c4885eba.yaml +++ b/nuclei-templates/2021/CVE-2021-24280-0446faf7e8a09fe554612052c4885eba.yaml @@ -4,7 +4,7 @@ info: name: > Redirection for Contact Form 7 <= 2.3.3 - Authenticated PHP Object Injection author: topscoder - severity: high + severity: low description: > In the Redirection for Contact Form 7 WordPress plugin before 2.3.4, any authenticated user, such as a subscriber, could use the import_from_debug AJAX action to inject PHP objects. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpcf7-redirect/" google-query: inurl:"/wp-content/plugins/wpcf7-redirect/" shodan-query: 'vuln:CVE-2021-24280' - tags: cve,wordpress,wp-plugin,wpcf7-redirect,high + tags: cve,wordpress,wp-plugin,wpcf7-redirect,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24281-7cb2e46e237585083f0f410d32da724a.yaml b/nuclei-templates/2021/CVE-2021-24281-7cb2e46e237585083f0f410d32da724a.yaml index 4d05371ae3..b1a3567864 100644 --- a/nuclei-templates/2021/CVE-2021-24281-7cb2e46e237585083f0f410d32da724a.yaml +++ b/nuclei-templates/2021/CVE-2021-24281-7cb2e46e237585083f0f410d32da724a.yaml @@ -4,7 +4,7 @@ info: name: > Redirection for Contact Form 7 <= 2.3.3 - Authenticated Arbitrary Post Deletion author: topscoder - severity: medium + severity: low description: > In the Redirection for Contact Form 7 WordPress plugin before 2.3.4, any authenticated user, such as a subscriber, could use the delete_action_post AJAX action to delete any post on a target site. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wpcf7-redirect/" google-query: inurl:"/wp-content/plugins/wpcf7-redirect/" shodan-query: 'vuln:CVE-2021-24281' - tags: cve,wordpress,wp-plugin,wpcf7-redirect,medium + tags: cve,wordpress,wp-plugin,wpcf7-redirect,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24289-e2053d18b4d79ba0e416f265a7be2f35.yaml b/nuclei-templates/2021/CVE-2021-24289-e2053d18b4d79ba0e416f265a7be2f35.yaml index 6bb4ba6e59..a9062b88ac 100644 --- a/nuclei-templates/2021/CVE-2021-24289-e2053d18b4d79ba0e416f265a7be2f35.yaml +++ b/nuclei-templates/2021/CVE-2021-24289-e2053d18b4d79ba0e416f265a7be2f35.yaml @@ -4,7 +4,7 @@ info: name: > Store Locator Plus <= 5.5.15 - Authenticated Privilege Escalation author: topscoder - severity: high + severity: low description: > There is functionality in the Store Locator Plus for WordPress plugin through 5.5.15 that made it possible for authenticated users to update their user meta data to become an administrator on any site using the plugin. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/store-locator-le/" google-query: inurl:"/wp-content/plugins/store-locator-le/" shodan-query: 'vuln:CVE-2021-24289' - tags: cve,wordpress,wp-plugin,store-locator-le,high + tags: cve,wordpress,wp-plugin,store-locator-le,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24290-41bea91ce3336d6adb86e1ea410b9aef.yaml b/nuclei-templates/2021/CVE-2021-24290-41bea91ce3336d6adb86e1ea410b9aef.yaml index ee54dbf401..5d540bc8ac 100644 --- a/nuclei-templates/2021/CVE-2021-24290-41bea91ce3336d6adb86e1ea410b9aef.yaml +++ b/nuclei-templates/2021/CVE-2021-24290-41bea91ce3336d6adb86e1ea410b9aef.yaml @@ -4,7 +4,7 @@ info: name: > Store Locator Plus <= 5.12.3 - Unauthenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > There are several endpoints in the Store Locator Plus for WordPress plugin through 5.12.3 that could allow unauthenticated attackers the ability to inject malicious JavaScript into pages. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/store-locator-le/" google-query: inurl:"/wp-content/plugins/store-locator-le/" shodan-query: 'vuln:CVE-2021-24290' - tags: cve,wordpress,wp-plugin,store-locator-le,medium + tags: cve,wordpress,wp-plugin,store-locator-le,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24292-bc1bf66d22152db23406f67a4e5cfee9.yaml b/nuclei-templates/2021/CVE-2021-24292-bc1bf66d22152db23406f67a4e5cfee9.yaml index 8a218d697a..9bad2bc2f3 100644 --- a/nuclei-templates/2021/CVE-2021-24292-bc1bf66d22152db23406f67a4e5cfee9.yaml +++ b/nuclei-templates/2021/CVE-2021-24292-bc1bf66d22152db23406f67a4e5cfee9.yaml @@ -4,7 +4,7 @@ info: name: > Happy Addons for Elementor <= 2.23.0 & Pro Version < 1.17.0 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Happy Addons for Elementor WordPress plugin before 2.24.0, Happy Addons Pro for Elementor WordPress plugin before 1.17.0 have a number of widgets that are vulnerable to stored Cross-Site Scripting(XSS) by lower-privileged users such as contributors, all via a similar method: The “Card” widget accepts a “title_tag” parameter. Although the element control lists a fixed set of possible html tags, it is possible to send a ‘save_builder’ request with the “heading_tag” set to “script”, and the actual “title” parameter set to JavaScript to be executed within the script tags added by the “heading_tag” parameter. reference: @@ -14,17 +14,17 @@ info: cvss-score: 6.4 cve-id: CVE-2021-24292 metadata: - fofa-query: "wp-content/plugins/happy-elementor-addons-pro/" - google-query: inurl:"/wp-content/plugins/happy-elementor-addons-pro/" + fofa-query: "wp-content/plugins/happy-elementor-addons/" + google-query: inurl:"/wp-content/plugins/happy-elementor-addons/" shodan-query: 'vuln:CVE-2021-24292' - tags: cve,wordpress,wp-plugin,happy-elementor-addons-pro,medium + tags: cve,wordpress,wp-plugin,happy-elementor-addons,high http: - method: GET redirects: true max-redirects: 3 path: - - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons-pro/readme.txt" + - "{{BaseURL}}/wp-content/plugins/happy-elementor-addons/readme.txt" extractors: - type: regex @@ -50,9 +50,9 @@ http: - type: word words: - - "happy-elementor-addons-pro" + - "happy-elementor-addons" part: body - type: dsl dsl: - - compare_versions(version, '< 1.17.0') \ No newline at end of file + - compare_versions(version, '< 2.24.0') \ No newline at end of file diff --git a/nuclei-templates/2021/CVE-2021-24294-295363837d1454c8802423d79b02460d.yaml b/nuclei-templates/2021/CVE-2021-24294-295363837d1454c8802423d79b02460d.yaml index 44047ef37e..bddd4dd0ba 100644 --- a/nuclei-templates/2021/CVE-2021-24294-295363837d1454c8802423d79b02460d.yaml +++ b/nuclei-templates/2021/CVE-2021-24294-295363837d1454c8802423d79b02460d.yaml @@ -4,7 +4,7 @@ info: name: > DSGVO All in one for WP <= 3.9 - Unauthenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The dsgvoaio_write_log AJAX action of the DSGVO All in one for WP WordPress plugin before 4.0 did not sanitise or escape some POST parameter submitted before outputting them in the Log page in the administrator dashboard (wp-admin/admin.php?page=dsgvoaiofree-show-log). This could allow unauthenticated attackers to gain unauthorised access by using an XSS payload to create a rogue administrator account, which will be trigged when an administrator will view the logs. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/dsgvo-all-in-one-for-wp/" google-query: inurl:"/wp-content/plugins/dsgvo-all-in-one-for-wp/" shodan-query: 'vuln:CVE-2021-24294' - tags: cve,wordpress,wp-plugin,dsgvo-all-in-one-for-wp,medium + tags: cve,wordpress,wp-plugin,dsgvo-all-in-one-for-wp,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24295-212daaad6857839ca091cc2dcc90e7c8.yaml b/nuclei-templates/2021/CVE-2021-24295-212daaad6857839ca091cc2dcc90e7c8.yaml index 9dbd8932cb..8d32986932 100644 --- a/nuclei-templates/2021/CVE-2021-24295-212daaad6857839ca091cc2dcc90e7c8.yaml +++ b/nuclei-templates/2021/CVE-2021-24295-212daaad6857839ca091cc2dcc90e7c8.yaml @@ -4,7 +4,7 @@ info: name: > Spam protection, AntiSpam, FireWall by CleanTalk <= 5.153.3 - Unauthenticated Blind SQL Injection author: topscoder - severity: high + severity: critical description: > It was possible to exploit an Unauthenticated Time-Based Blind SQL Injection vulnerability in the Spam protection, AntiSpam, FireWall by CleanTalk WordPress Plugin before 5.153.4. The update_log function in lib/Cleantalk/ApbctWP/Firewall/SFW.php included a vulnerable query that could be injected via the User-Agent Header by manipulating the cookies set by the Spam protection, AntiSpam, FireWall by CleanTalk WordPress plugin before 5.153.4, sending an initial request to obtain a ct_sfw_pass_key cookie and then manually setting a separate ct_sfw_passed cookie and disallowing it from being reset. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/cleantalk-spam-protect/" google-query: inurl:"/wp-content/plugins/cleantalk-spam-protect/" shodan-query: 'vuln:CVE-2021-24295' - tags: cve,wordpress,wp-plugin,cleantalk-spam-protect,high + tags: cve,wordpress,wp-plugin,cleantalk-spam-protect,critical http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24296-6ed86de0b04577fc056eab4066eb09a3.yaml b/nuclei-templates/2021/CVE-2021-24296-6ed86de0b04577fc056eab4066eb09a3.yaml index fc297c9f3c..4d656b5231 100644 --- a/nuclei-templates/2021/CVE-2021-24296-6ed86de0b04577fc056eab4066eb09a3.yaml +++ b/nuclei-templates/2021/CVE-2021-24296-6ed86de0b04577fc056eab4066eb09a3.yaml @@ -4,7 +4,7 @@ info: name: > WP Customer Reviews <= 3.5.5 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The WP Customer Reviews WordPress plugin before 3.5.6 did not sanitise some of its settings, allowing high privilege users such as administrators to set XSS payloads in them which will then be triggered in pages where reviews are enabled reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/wp-customer-reviews/" google-query: inurl:"/wp-content/plugins/wp-customer-reviews/" shodan-query: 'vuln:CVE-2021-24296' - tags: cve,wordpress,wp-plugin,wp-customer-reviews,medium + tags: cve,wordpress,wp-plugin,wp-customer-reviews,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24301-106707c65ee1208d448d3a7f0350d84b.yaml b/nuclei-templates/2021/CVE-2021-24301-106707c65ee1208d448d3a7f0350d84b.yaml index cfd21ab132..3458877f50 100644 --- a/nuclei-templates/2021/CVE-2021-24301-106707c65ee1208d448d3a7f0350d84b.yaml +++ b/nuclei-templates/2021/CVE-2021-24301-106707c65ee1208d448d3a7f0350d84b.yaml @@ -4,7 +4,7 @@ info: name: > Hotjar Connecticator <= 1.1.1 - Authenticated (Admin+) Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Hotjar Connecticator WordPress plugin through 1.1.1 is vulnerable to Stored Cross-Site Scripting (XSS) in the 'hotjar script' textarea. The request did include a CSRF nonce that was properly verified by the server and this vulnerability could only be exploited by administrator users. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/hotjar-connecticator/" google-query: inurl:"/wp-content/plugins/hotjar-connecticator/" shodan-query: 'vuln:CVE-2021-24301' - tags: cve,wordpress,wp-plugin,hotjar-connecticator,medium + tags: cve,wordpress,wp-plugin,hotjar-connecticator,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24302-dc95c582cdcd23384ad1f3f9c0a3bd57.yaml b/nuclei-templates/2021/CVE-2021-24302-dc95c582cdcd23384ad1f3f9c0a3bd57.yaml index f064583380..487f500768 100644 --- a/nuclei-templates/2021/CVE-2021-24302-dc95c582cdcd23384ad1f3f9c0a3bd57.yaml +++ b/nuclei-templates/2021/CVE-2021-24302-dc95c582cdcd23384ad1f3f9c0a3bd57.yaml @@ -4,7 +4,7 @@ info: name: > Hana Flv Player <= 3.1.3 - Authenticated Stored Cross-Site Scripting author: topscoder - severity: medium + severity: low description: > The Hana Flv Player WordPress plugin through 3.1.3 is vulnerable to an Authenticated Stored Cross-Site Scripting (XSS) vulnerability within the 'Default Skin' field. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/hana-flv-player/" google-query: inurl:"/wp-content/plugins/hana-flv-player/" shodan-query: 'vuln:CVE-2021-24302' - tags: cve,wordpress,wp-plugin,hana-flv-player,medium + tags: cve,wordpress,wp-plugin,hana-flv-player,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24303-f73561aa7a756a9f3e5287e2a9bf11ee.yaml b/nuclei-templates/2021/CVE-2021-24303-f73561aa7a756a9f3e5287e2a9bf11ee.yaml index 64dc29275f..c8683de655 100644 --- a/nuclei-templates/2021/CVE-2021-24303-f73561aa7a756a9f3e5287e2a9bf11ee.yaml +++ b/nuclei-templates/2021/CVE-2021-24303-f73561aa7a756a9f3e5287e2a9bf11ee.yaml @@ -4,7 +4,7 @@ info: name: > JiangQie Official Website Mini Program < 1.1.1 - SQL Injection author: topscoder - severity: high + severity: critical description: > The JiangQie Official Website Mini Program WordPress plugin before 1.1.1 does not escape or validate the id GET parameter before using it in SQL statements, leading to SQL injection issues reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/jiangqie-official-website-mini-program/" google-query: inurl:"/wp-content/plugins/jiangqie-official-website-mini-program/" shodan-query: 'vuln:CVE-2021-24303' - tags: cve,wordpress,wp-plugin,jiangqie-official-website-mini-program,high + tags: cve,wordpress,wp-plugin,jiangqie-official-website-mini-program,critical http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24305-798f3fd97aa989f25f329926174d2a78.yaml b/nuclei-templates/2021/CVE-2021-24305-798f3fd97aa989f25f329926174d2a78.yaml index 2bb17cd188..ab8a148bc0 100644 --- a/nuclei-templates/2021/CVE-2021-24305-798f3fd97aa989f25f329926174d2a78.yaml +++ b/nuclei-templates/2021/CVE-2021-24305-798f3fd97aa989f25f329926174d2a78.yaml @@ -4,7 +4,7 @@ info: name: > Watcheezy Live chat plugin for WordPress <= 2.0 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The Target First WordPress Plugin v2.0, also previously known as Watcheezy, suffers from a critical unauthenticated stored XSS vulnerability. An attacker could change the licence key value through a POST on any URL with the 'weeWzKey' parameter that will be save as the 'weeID' option and is not sanitized. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/watcheezy/" google-query: inurl:"/wp-content/plugins/watcheezy/" shodan-query: 'vuln:CVE-2021-24305' - tags: cve,wordpress,wp-plugin,watcheezy,medium + tags: cve,wordpress,wp-plugin,watcheezy,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24307-9c814d5a9ddaae393720aa3fbf301f85.yaml b/nuclei-templates/2021/CVE-2021-24307-9c814d5a9ddaae393720aa3fbf301f85.yaml index 813a5d633e..c1f241d62f 100644 --- a/nuclei-templates/2021/CVE-2021-24307-9c814d5a9ddaae393720aa3fbf301f85.yaml +++ b/nuclei-templates/2021/CVE-2021-24307-9c814d5a9ddaae393720aa3fbf301f85.yaml @@ -4,7 +4,7 @@ info: name: > All in One SEO <= 4.1.0.1 - Authenticated Code Injection author: topscoder - severity: high + severity: low description: > The All in One SEO – Best WordPress SEO Plugin – Easily Improve Your SEO Rankings before 4.1.0.2 enables authenticated users with "aioseo_tools_settings" privilege (most of the time admin) to execute arbitrary code on the underlying host. Users can restore plugin's configuration by uploading a backup .ini file in the section "Tool > Import/Export". However, the plugin attempts to unserialize values of the .ini file. Moreover, the plugin embeds Monolog library which can be used to craft a gadget chain and thus trigger system command execution. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/all-in-one-seo-pack/" google-query: inurl:"/wp-content/plugins/all-in-one-seo-pack/" shodan-query: 'vuln:CVE-2021-24307' - tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,high + tags: cve,wordpress,wp-plugin,all-in-one-seo-pack,low http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24308-93461439abae08e1620c6e9fa8825bb9.yaml b/nuclei-templates/2021/CVE-2021-24308-93461439abae08e1620c6e9fa8825bb9.yaml index 1bcbe08d69..eb56e653b0 100644 --- a/nuclei-templates/2021/CVE-2021-24308-93461439abae08e1620c6e9fa8825bb9.yaml +++ b/nuclei-templates/2021/CVE-2021-24308-93461439abae08e1620c6e9fa8825bb9.yaml @@ -4,7 +4,7 @@ info: name: > LMS by LifterLMS – Online Course, Membership & Learning Management System Plugin <= 4.21.0 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The 'State' field of the Edit profile page of the LMS by LifterLMS – Online Course, Membership & Learning Management System Plugin for WordPress plugin before 4.21.1 is not properly sanitised when output in the About section of the profile page, leading to a stored Cross-Site Scripting issue. This could allow low privilege users (such as students) to elevate their privilege via an XSS attack when an admin will view their profile. reference: @@ -17,7 +17,7 @@ info: fofa-query: "wp-content/plugins/lifterlms/" google-query: inurl:"/wp-content/plugins/lifterlms/" shodan-query: 'vuln:CVE-2021-24308' - tags: cve,wordpress,wp-plugin,lifterlms,medium + tags: cve,wordpress,wp-plugin,lifterlms,high http: - method: GET diff --git a/nuclei-templates/2021/CVE-2021-24309-a7639c71f3241814b9c95f17c5919356.yaml b/nuclei-templates/2021/CVE-2021-24309-a7639c71f3241814b9c95f17c5919356.yaml index da009307b4..60b3397c87 100644 --- a/nuclei-templates/2021/CVE-2021-24309-a7639c71f3241814b9c95f17c5919356.yaml +++ b/nuclei-templates/2021/CVE-2021-24309-a7639c71f3241814b9c95f17c5919356.yaml @@ -4,7 +4,7 @@ info: name: > Weekly Schedule <= 3.4.2 - Stored Cross-Site Scripting author: topscoder - severity: medium + severity: high description: > The "Schedule Name" input in the Weekly Schedule WordPress plugin before 3.4.3 general options did not properly sanitize input, allowing a user to inject javascript code using the , and