From bdeef5f154e9232746b68181579e712c64cc1eb5 Mon Sep 17 00:00:00 2001 From: topscoder <86197446+topscoder@users.noreply.github.com> Date: Mon, 10 Feb 2025 09:23:10 +0100 Subject: [PATCH] Remove old invalid templates --- ....php-a76b0dd93ba78feabb5abcd8a3634e03.yaml | 59 ------------------- ...v1.1-45ac458cb27fa77cb00c1e35f16d1aed.yaml | 59 ------------------- 2 files changed, 118 deletions(-) delete mode 100644 nuclei-templates/cve-less/plugins/wp-db-backup.php-a76b0dd93ba78feabb5abcd8a3634e03.yaml delete mode 100644 nuclei-templates/cve-less/themes/blooog-v1.1-45ac458cb27fa77cb00c1e35f16d1aed.yaml diff --git a/nuclei-templates/cve-less/plugins/wp-db-backup.php-a76b0dd93ba78feabb5abcd8a3634e03.yaml b/nuclei-templates/cve-less/plugins/wp-db-backup.php-a76b0dd93ba78feabb5abcd8a3634e03.yaml deleted file mode 100644 index a58916b67a..0000000000 --- a/nuclei-templates/cve-less/plugins/wp-db-backup.php-a76b0dd93ba78feabb5abcd8a3634e03.yaml +++ /dev/null @@ -1,59 +0,0 @@ -id: wp-db-backup.php-a76b0dd93ba78feabb5abcd8a3634e03 - -info: - name: > - Skippy WP-DB Backup (Legacy Plugin) <= 1.7 - Authenticated (Admin+) Directory Traversal - author: topscoder - severity: low - description: > - - reference: - - https://github.com/topscoder/nuclei-wordfence-cve - - https://www.wordfence.com/threat-intel/vulnerabilities/id/0e38b567-9567-4b08-8fab-3971547394b0?source=api-scan - classification: - cvss-metrics: - cvss-score: - cve-id: - metadata: - fofa-query: "wp-content/plugins/wp-db-backup.php/" - google-query: inurl:"/wp-content/plugins/wp-db-backup.php/" - shodan-query: 'vuln:' - tags: cve,wordpress,wp-plugin,wp-db-backup.php,low - -http: - - method: GET - redirects: true - max-redirects: 3 - path: - - "{{BaseURL}}/wp-content/plugins/wp-db-backup.php/readme.txt" - - extractors: - - type: regex - name: version - part: body - group: 1 - internal: true - regex: - - "(?mi)Stable tag: ([0-9.]+)" - - - type: regex - name: version - part: body - group: 1 - regex: - - "(?mi)Stable tag: ([0-9.]+)" - - matchers-condition: and - matchers: - - type: status - status: - - 200 - - - type: word - words: - - "wp-db-backup.php" - part: body - - - type: dsl - dsl: - - compare_versions(version, '<= 1.7') \ No newline at end of file diff --git a/nuclei-templates/cve-less/themes/blooog-v1.1-45ac458cb27fa77cb00c1e35f16d1aed.yaml b/nuclei-templates/cve-less/themes/blooog-v1.1-45ac458cb27fa77cb00c1e35f16d1aed.yaml deleted file mode 100644 index 809708cb76..0000000000 --- a/nuclei-templates/cve-less/themes/blooog-v1.1-45ac458cb27fa77cb00c1e35f16d1aed.yaml +++ /dev/null @@ -1,59 +0,0 @@ -id: blooog-v1.1-45ac458cb27fa77cb00c1e35f16d1aed - -info: - name: > - Bloog <= 1.1 - Cross-Site Scripting - author: topscoder - severity: high - description: > - - reference: - - https://github.com/topscoder/nuclei-wordfence-cve - - https://www.wordfence.com/threat-intel/vulnerabilities/id/c49dcb39-7d03-4d7e-9a07-7ac8a6506e7f?source=api-scan - classification: - cvss-metrics: - cvss-score: - cve-id: - metadata: - fofa-query: "wp-content/themes/Blooog-v1.1/" - google-query: inurl:"/wp-content/themes/Blooog-v1.1/" - shodan-query: 'vuln:' - tags: cve,wordpress,wp-theme,Blooog-v1.1,high - -http: - - method: GET - redirects: true - max-redirects: 3 - path: - - "{{BaseURL}}/wp-content/themes/Blooog-v1.1/style.css" - - extractors: - - type: regex - name: version - part: body - group: 1 - internal: true - regex: - - "(?mi)Version: ([0-9.]+)" - - - type: regex - name: version - part: body - group: 1 - regex: - - "(?mi)Version: ([0-9.]+)" - - matchers-condition: and - matchers: - - type: status - status: - - 200 - - - type: word - words: - - "Blooog-v1.1" - part: body - - - type: dsl - dsl: - - compare_versions(version, '<= 1.1') \ No newline at end of file