diff --git a/.github/scripts/README.tmpl b/.github/scripts/README.tmpl index 49d24413a8c..5d7e59118dc 100644 --- a/.github/scripts/README.tmpl +++ b/.github/scripts/README.tmpl @@ -36,7 +36,21 @@ An overview of the nuclei template project, including statistics on unique tags, -
+ + +### 🚨 Known Exploited Vulnerabilities (KEV) Coverage + +Nuclei templates provide coverage for vulnerabilities actively exploited in the wild: + +| **KEV Source** | **Templates** | **Description** | +|----------------|---------------|-----------------| +| 🔴 **CISA KEV** | **{kev_stats.get('kev_total', 0)}** | [CISA Known Exploited Vulnerabilities Catalog](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) | +| 🟠 **VulnCheck KEV** | **{kev_stats.get('vkev_total', 0)}** | [VulnCheck KEV](https://vulncheck.com/kev) - Enhanced vulnerability intelligence | +| 🟢 **Both Sources** | **{kev_stats.get('both', 0)}** | Templates covering vulnerabilities in both catalogs | + +> 💡 **Total unique KEV templates: {kev_stats.get('kev_total', 0) + kev_stats.get('vkev_only', 0)}** - Use `nuclei -tags kev,vkev` to scan for actively exploited vulnerabilities + +--- {get_top10()} diff --git a/.github/scripts/README_CN.tmpl b/.github/scripts/README_CN.tmpl index 208745e5b6e..83797062758 100644 --- a/.github/scripts/README_CN.tmpl +++ b/.github/scripts/README_CN.tmpl @@ -42,7 +42,21 @@ Nuclei 模板 -
+ + +### 🚨 已知被利用漏洞 (KEV) 覆盖范围 + +Nuclei 模板为野外被积极利用的漏洞提供覆盖: + +| **KEV 来源** | **模板数量** | **描述** | +|----------------|---------------|-----------------| +| 🔴 **CISA KEV** | **{kev_stats.get('kev_total', 0)}** | [CISA 已知被利用漏洞目录](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) | +| 🟠 **VulnCheck KEV** | **{kev_stats.get('vkev_total', 0)}** | [VulnCheck KEV](https://vulncheck.com/kev) - 增强的漏洞情报 | +| 🟢 **两个来源** | **{kev_stats.get('both', 0)}** | 覆盖两个目录中漏洞的模板 | + +> 💡 **唯一 KEV 模板总数: {kev_stats.get('kev_total', 0) + kev_stats.get('vkev_only', 0)}** - 使用 `nuclei -tags kev,vkev` 扫描被积极利用的漏洞 + +--- {get_top10()} diff --git a/.github/scripts/README_JA.tmpl b/.github/scripts/README_JA.tmpl index c9aca34dbdd..c8df3db2400 100644 --- a/.github/scripts/README_JA.tmpl +++ b/.github/scripts/README_JA.tmpl @@ -37,7 +37,21 @@ Nucleiテンプレートプロジェクトの概要であり、ユニークな -
+ + +### 🚨 既知の悪用される脆弱性 (KEV) カバレッジ + +Nucleiテンプレートは、野生で積極的に悪用されている脆弱性のカバレッジを提供します: + +| **KEV ソース** | **テンプレート数** | **説明** | +|----------------|---------------|-----------------| +| 🔴 **CISA KEV** | **{kev_stats.get('kev_total', 0)}** | [CISA 既知の悪用される脆弱性カタログ](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) | +| 🟠 **VulnCheck KEV** | **{kev_stats.get('vkev_total', 0)}** | [VulnCheck KEV](https://vulncheck.com/kev) - 強化された脆弱性インテリジェンス | +| 🟢 **両方のソース** | **{kev_stats.get('both', 0)}** | 両方のカタログの脆弱性をカバーするテンプレート | + +> 💡 **ユニークKEVテンプレート総数: {kev_stats.get('kev_total', 0) + kev_stats.get('vkev_only', 0)}** - `nuclei -tags kev,vkev` を使用して積極的に悪用されている脆弱性をスキャン + +--- {get_top10()} diff --git a/.github/scripts/README_KR.tmpl b/.github/scripts/README_KR.tmpl index c22e509d96d..037dbfe2bfd 100644 --- a/.github/scripts/README_KR.tmpl +++ b/.github/scripts/README_KR.tmpl @@ -39,7 +39,21 @@ Nuclei 템플릿 -
+ + +### 🚨 알려진 악용되는 취약점 (KEV) 적용 범위 + +Nuclei 템플릿은 실제로 악용되고 있는 취약점에 대한 적용 범위를 제공합니다: + +| **KEV 소스** | **템플릿 수** | **설명** | +|----------------|---------------|-----------------| +| 🔴 **CISA KEV** | **{kev_stats.get('kev_total', 0)}** | [CISA 알려진 악용되는 취약점 카탈로그](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) | +| 🟠 **VulnCheck KEV** | **{kev_stats.get('vkev_total', 0)}** | [VulnCheck KEV](https://vulncheck.com/kev) - 강화된 취약점 인텔리전스 | +| 🟢 **두 소스 모두** | **{kev_stats.get('both', 0)}** | 두 카탈로그의 취약점을 포함하는 템플릿 | + +> 💡 **총 고유 KEV 템플릿: {kev_stats.get('kev_total', 0) + kev_stats.get('vkev_only', 0)}** - `nuclei -tags kev,vkev`를 사용하여 적극적으로 악용되는 취약점 스캔 + +--- {get_top10()} diff --git a/.github/scripts/count-kev-stats.py b/.github/scripts/count-kev-stats.py new file mode 100755 index 00000000000..4aff9287711 --- /dev/null +++ b/.github/scripts/count-kev-stats.py @@ -0,0 +1,119 @@ +#!/usr/bin/env python3 +""" +Count KEV and vKEV templates for README statistics + +This script counts the number of templates with 'kev' and 'vkev' tags +and outputs the statistics in a format suitable for the README. +""" + +import re +import sys +from pathlib import Path +from typing import Dict, Set + + +def has_tag_in_file(file_path: Path, tag: str) -> bool: + """Check if a template file has a specific tag.""" + try: + with open(file_path, 'r', encoding='utf-8') as f: + content = f.read() + + # Look for tags field and check if tag is present + tags_match = re.search(r'tags:\s*([^\n]+)', content) + if tags_match: + tags_str = tags_match.group(1) + # Check for tag as a standalone tag (not part of another word) + if re.search(rf'\b{tag}\b', tags_str, re.IGNORECASE): + return True + except Exception as e: + print(f"Error reading {file_path}: {e}", file=sys.stderr) + + return False + + +def count_kev_templates(root_dir: str) -> Dict[str, int]: + """Count templates with KEV and vKEV tags.""" + root_path = Path(root_dir) + + # Find all YAML template files + patterns = [ + "**/*.yaml", + "**/*.yml" + ] + + all_files = set() + for pattern in patterns: + all_files.update(root_path.glob(pattern)) + + # Filter out non-template files + template_files = [ + f for f in all_files + if '/workflows/' not in str(f) + and '/.github/' not in str(f) + and '/profiles/' not in str(f) + ] + + kev_count = 0 + vkev_count = 0 + both_count = 0 + kev_only_count = 0 + vkev_only_count = 0 + + kev_files = set() + vkev_files = set() + + for template_file in template_files: + has_kev = has_tag_in_file(template_file, 'kev') + has_vkev = has_tag_in_file(template_file, 'vkev') + + if has_kev: + kev_count += 1 + kev_files.add(template_file) + + if has_vkev: + vkev_count += 1 + vkev_files.add(template_file) + + if has_kev and has_vkev: + both_count += 1 + elif has_kev: + kev_only_count += 1 + elif has_vkev: + vkev_only_count += 1 + + return { + 'kev_total': kev_count, + 'vkev_total': vkev_count, + 'both': both_count, + 'kev_only': kev_only_count, + 'vkev_only': vkev_only_count, + 'total_templates': len(template_files) + } + + +def main(): + """Main entry point.""" + root_dir = sys.argv[1] if len(sys.argv) > 1 else '.' + + stats = count_kev_templates(root_dir) + + # Output in a format that can be easily parsed + print(f"KEV_TOTAL={stats['kev_total']}") + print(f"VKEV_TOTAL={stats['vkev_total']}") + print(f"BOTH={stats['both']}") + print(f"KEV_ONLY={stats['kev_only']}") + print(f"VKEV_ONLY={stats['vkev_only']}") + print(f"TOTAL_TEMPLATES={stats['total_templates']}") + + # Also print human-readable summary to stderr for logging + print("\n=== KEV/vKEV Statistics ===", file=sys.stderr) + print(f"CISA KEV templates: {stats['kev_total']}", file=sys.stderr) + print(f"VulnCheck KEV templates: {stats['vkev_total']}", file=sys.stderr) + print(f"Templates in both: {stats['both']}", file=sys.stderr) + print(f"CISA KEV only: {stats['kev_only']}", file=sys.stderr) + print(f"VulnCheck KEV only: {stats['vkev_only']}", file=sys.stderr) + print(f"Total templates scanned: {stats['total_templates']}", file=sys.stderr) + + +if __name__ == "__main__": + main() diff --git a/.github/scripts/update-readme.py b/.github/scripts/update-readme.py index d7725d52581..3efcab3c5b0 100644 --- a/.github/scripts/update-readme.py +++ b/.github/scripts/update-readme.py @@ -1,6 +1,7 @@ #!/usr/bin/env python3 import glob import subprocess +import re def countTpl(path): return len(glob.glob(path + "/*.*")) @@ -13,8 +14,38 @@ def get_top10(): TOP10 = command(["cat", "TOP-10.md"]) return HEADER + TOP10 if len(TOP10) > 0 else "" +def get_kev_stats(): + """Get KEV and vKEV statistics by running the count-kev-stats.py script.""" + try: + result = subprocess.run( + ["python3", ".github/scripts/count-kev-stats.py"], + text=True, + capture_output=True, + timeout=120 + ) + + # Parse the output + stats = {} + for line in result.stdout.strip().split('\n'): + if '=' in line: + key, value = line.split('=') + stats[key.lower()] = int(value) + + return stats + except Exception as e: + print(f"Error getting KEV stats: {e}") + return { + 'kev_total': 0, + 'vkev_total': 0, + 'both': 0, + 'kev_only': 0, + 'vkev_only': 0, + 'total_templates': 0 + } + if __name__ == "__main__": version = command(["git", "describe", "--tags", "--abbrev=0"]) + kev_stats = get_kev_stats() template = eval(open(".github/scripts/README.tmpl", "r").read()) print(template) diff --git a/.github/workflows/readme-update.yml b/.github/workflows/readme-update.yml index a206c1a895b..7a7d37d906c 100644 --- a/.github/workflows/readme-update.yml +++ b/.github/workflows/readme-update.yml @@ -2,7 +2,7 @@ name: 📝 Readme Update on: workflow_run: - workflows: ["🗒 Templates Stats"] + workflows: ["🗒 Templates Stats", "📋 KEV & vKEV Tag Update"] types: - completed workflow_dispatch: diff --git a/README.md b/README.md index b4dd516bc48..d10ffaa92fe 100644 --- a/README.md +++ b/README.md @@ -36,24 +36,38 @@ An overview of the nuclei template project, including statistics on unique tags, - diff --git a/README_CN.md b/README_CN.md index 251f1386a40..af4ccb0a833 100644 --- a/README_CN.md +++ b/README_CN.md @@ -42,24 +42,38 @@ Nuclei 模板
+ + +### 🚨 Known Exploited Vulnerabilities (KEV) Coverage + +Nuclei templates provide coverage for vulnerabilities actively exploited in the wild: + +| **KEV Source** | **Templates** | **Description** | +|----------------|---------------|-----------------| +| 🔴 **CISA KEV** | **454** | [CISA Known Exploited Vulnerabilities Catalog](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) | +| 🟠 **VulnCheck KEV** | **1449** | [VulnCheck KEV](https://vulncheck.com/kev) - Enhanced vulnerability intelligence | +| 🟢 **Both Sources** | **407** | Templates covering vulnerabilities in both catalogs | + +> 💡 **Total unique KEV templates: 1496** - Use `nuclei -tags kev,vkev` to scan for actively exploited vulnerabilities + +--- ## Nuclei Templates Top 10 statistics | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------|-------|----------|-------|------|-------| -| cve | 3288 | dhiyaneshdk | 1882 | http | 8967 | info | 4190 | file | 435 | -| panel | 1342 | daffainfo | 868 | cloud | 657 | high | 2446 | dns | 26 | -| xss | 1257 | princechaddha | 854 | file | 435 | medium | 2379 | | | -| wordpress | 1181 | dwisiswant0 | 806 | dast | 255 | critical | 1425 | | | -| exposure | 1107 | ritikchaddha | 649 | workflows | 202 | low | 318 | | | -| wp-plugin | 1032 | pussycat0x | 532 | code | 198 | unknown | 56 | | | -| osint | 841 | pikpikcu | 352 | network | 145 | | | | | -| tech | 803 | pdteam | 310 | javascript | 71 | | | | | -| rce | 786 | pdresearch | 269 | ssl | 38 | | | | | -| lfi | 777 | iamnoooob | 257 | dns | 23 | | | | | +| vuln | 6468 | dhiyaneshdk | 1894 | http | 9281 | info | 4353 | file | 436 | +| cve | 3587 | daffainfo | 905 | cloud | 659 | high | 2552 | dns | 26 | +| discovery | 3265 | princechaddha | 854 | file | 436 | medium | 2457 | | | +| vkev | 1394 | dwisiswant0 | 805 | network | 259 | critical | 1555 | | | +| panel | 1365 | ritikchaddha | 678 | code | 251 | low | 330 | | | +| xss | 1269 | pussycat0x | 675 | dast | 240 | unknown | 54 | | | +| wordpress | 1261 | pikpikcu | 353 | workflows | 205 | | | | | +| exposure | 1141 | pdteam | 314 | javascript | 92 | | | | | +| wp-plugin | 1103 | pdresearch | 275 | ssl | 38 | | | | | +| osint | 848 | iamnoooob | 263 | dns | 23 | | | | | -**848 directories, 11344 files**. +**873 directories, 11997 files**.
- diff --git a/README_JA.md b/README_JA.md index b0d5375ef35..2855cd207bb 100644 --- a/README_JA.md +++ b/README_JA.md @@ -37,24 +37,38 @@ Nucleiテンプレートプロジェクトの概要であり、ユニークな
+ -## Nuclei模板TOP10统计信息 +### 🚨 已知被利用漏洞 (KEV) 覆盖范围 + +Nuclei 模板为野外被积极利用的漏洞提供覆盖: + +| **KEV 来源** | **模板数量** | **描述** | +|----------------|---------------|-----------------| +| 🔴 **CISA KEV** | **454** | [CISA 已知被利用漏洞目录](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) | +| 🟠 **VulnCheck KEV** | **1449** | [VulnCheck KEV](https://vulncheck.com/kev) - 增强的漏洞情报 | +| 🟢 **两个来源** | **407** | 覆盖两个目录中漏洞的模板 | + +> 💡 **唯一 KEV 模板总数: 1496** - 使用 `nuclei -tags kev,vkev` 扫描被积极利用的漏洞 + +--- + +## Nuclei Templates Top 10 statistics | TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------|-------|----------|-------|------|-------| -| cve | 2877 | dhiyaneshdk | 1477 | http | 8219 | info | 3948 | file | 404 | -| panel | 1246 | daffainfo | 866 | file | 404 | high | 2135 | dns | 25 | -| wordpress | 1072 | dwisiswant0 | 803 | cloud | 370 | medium | 1840 | | | -| exposure | 1006 | princechaddha | 570 | workflows | 192 | critical | 1197 | | | -| xss | 987 | ritikchaddha | 496 | code | 157 | low | 287 | | | -| wp-plugin | 936 | pussycat0x | 453 | network | 138 | unknown | 43 | | | -| osint | 807 | pikpikcu | 353 | javascript | 65 | | | | | -| tech | 745 | pdteam | 302 | ssl | 30 | | | | | -| lfi | 727 | ricardomaia | 245 | dast | 26 | | | | | -| misconfig | 720 | geeknik | 231 | dns | 22 | | | | | +| vuln | 6468 | dhiyaneshdk | 1894 | http | 9281 | info | 4353 | file | 436 | +| cve | 3587 | daffainfo | 905 | cloud | 659 | high | 2552 | dns | 26 | +| discovery | 3265 | princechaddha | 854 | file | 436 | medium | 2457 | | | +| vkev | 1394 | dwisiswant0 | 805 | network | 259 | critical | 1555 | | | +| panel | 1365 | ritikchaddha | 678 | code | 251 | low | 330 | | | +| xss | 1269 | pussycat0x | 675 | dast | 240 | unknown | 54 | | | +| wordpress | 1261 | pikpikcu | 353 | workflows | 205 | | | | | +| exposure | 1141 | pdteam | 314 | javascript | 92 | | | | | +| wp-plugin | 1103 | pdresearch | 275 | ssl | 38 | | | | | +| osint | 848 | iamnoooob | 263 | dns | 23 | | | | | -**743 directories, 9960 files**. +**873 directories, 11997 files**.
- diff --git a/README_KR.md b/README_KR.md index e60e2dc36dc..820e533d589 100644 --- a/README_KR.md +++ b/README_KR.md @@ -31,7 +31,7 @@ Nuclei 템플릿 템플릿은 실제 스캐닝 엔진을 동작하게 하는 [nuclei scanner](https://github.com/projectdiscovery/nuclei)의 핵심입니다. 이 저장소는 우리 팀에서 제공하거나, 커뮤니티에서 기여한 다양한 템플릿들을 저장하고 보관합니다. -**pull requests** 나 [Github issues](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+)를 통해 템플릿을 보내주시는 기여도 환영합니다. +템플릿 목록을 증가시키기 위해서 **pull requests** 나 [Github issues](https://github.com/projectdiscovery/nuclei-templates/issues/new?assignees=&labels=&template=submit-template.md&title=%5Bnuclei-template%5D+) 를 통해 기여해주시기를 부탁드립니다. ## Nuclei 템플릿 개요 @@ -39,24 +39,38 @@ Nuclei 템플릿
+ -## Nuclei テンプレート トップ10統計 +### 🚨 既知の悪用される脆弱性 (KEV) カバレッジ -| タグ | 数 | 著者 | 数 | ディレクトリ | 数 | 重大度 | 数 | 種類 | 数 | -|-----------|-------|---------------|-------|------------------|-------|----------|-------|---------|-------| -| cve | 1325 | daffainfo | 629 | cves | 1306 | info | 1398 | http | 3644 | -| panel | 604 | dhiyaneshdk | 509 | exposed-panels | 613 | high | 955 | file | 76 | -| lfi | 490 | pikpikcu | 322 | vulnerabilities | 506 | medium | 784 | network | 50 | -| xss | 451 | pdteam | 269 | technologies | 273 | critical | 445 | dns | 17 | -| wordpress | 409 | geeknik | 187 | exposures | 254 | low | 211 | | | -| exposure | 360 | dwisiswant0 | 169 | token-spray | 230 | unknown | 7 | | | -| cve2021 | 324 | 0x_akoko | 157 | misconfiguration | 210 | | | | | -| rce | 319 | princechaddha | 149 | workflows | 187 | | | | | -| wp-plugin | 304 | pussycat0x | 130 | default-logins | 102 | | | | | -| tech | 286 | gy741 | 126 | file | 76 | | | | | +Nucleiテンプレートは、野生で積極的に悪用されている脆弱性のカバレッジを提供します: -**286個のディレクトリ、4012個のファイル**。 +| **KEV ソース** | **テンプレート数** | **説明** | +|----------------|---------------|-----------------| +| 🔴 **CISA KEV** | **454** | [CISA 既知の悪用される脆弱性カタログ](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) | +| 🟠 **VulnCheck KEV** | **1449** | [VulnCheck KEV](https://vulncheck.com/kev) - 強化された脆弱性インテリジェンス | +| 🟢 **両方のソース** | **407** | 両方のカタログの脆弱性をカバーするテンプレート | + +> 💡 **ユニークKEVテンプレート総数: 1496** - `nuclei -tags kev,vkev` を使用して積極的に悪用されている脆弱性をスキャン + +--- + +## Nuclei Templates Top 10 statistics + +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | +|-----------|-------|---------------|-------|------------|-------|----------|-------|------|-------| +| vuln | 6468 | dhiyaneshdk | 1894 | http | 9281 | info | 4353 | file | 436 | +| cve | 3587 | daffainfo | 905 | cloud | 659 | high | 2552 | dns | 26 | +| discovery | 3265 | princechaddha | 854 | file | 436 | medium | 2457 | | | +| vkev | 1394 | dwisiswant0 | 805 | network | 259 | critical | 1555 | | | +| panel | 1365 | ritikchaddha | 678 | code | 251 | low | 330 | | | +| xss | 1269 | pussycat0x | 675 | dast | 240 | unknown | 54 | | | +| wordpress | 1261 | pikpikcu | 353 | workflows | 205 | | | | | +| exposure | 1141 | pdteam | 314 | javascript | 92 | | | | | +| wp-plugin | 1103 | pdresearch | 275 | ssl | 38 | | | | | +| osint | 848 | iamnoooob | 263 | dns | 23 | | | | | + +**873 directories, 11997 files**.
-
+ -## Nuclei 템플릿 통계 Top 10 +### 🚨 알려진 악용되는 취약점 (KEV) 적용 범위 -| 태그 | 개수 | 작성자 | 개수 | 디렉토리 | 개수 | 심각도 | 개수 | 종류 | 개수 | +Nuclei 템플릿은 실제로 악용되고 있는 취약점에 대한 적용 범위를 제공합니다: + +| **KEV 소스** | **템플릿 수** | **설명** | +|----------------|---------------|-----------------| +| 🔴 **CISA KEV** | **454** | [CISA 알려진 악용되는 취약점 카탈로그](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) | +| 🟠 **VulnCheck KEV** | **1449** | [VulnCheck KEV](https://vulncheck.com/kev) - 강화된 취약점 인텔리전스 | +| 🟢 **두 소스 모두** | **407** | 두 카탈로그의 취약점을 포함하는 템플릿 | + +> 💡 **총 고유 KEV 템플릿: 1496** - `nuclei -tags kev,vkev`를 사용하여 적극적으로 악용되는 취약점 스캔 + +--- + +## Nuclei Templates Top 10 statistics + +| TAG | COUNT | AUTHOR | COUNT | DIRECTORY | COUNT | SEVERITY | COUNT | TYPE | COUNT | |-----------|-------|---------------|-------|------------|-------|----------|-------|------|-------| -| cve | 3288 | dhiyaneshdk | 1882 | http | 8967 | info | 4190 | file | 435 | -| panel | 1342 | daffainfo | 868 | cloud | 657 | high | 2446 | dns | 26 | -| xss | 1257 | princechaddha | 854 | file | 435 | medium | 2379 | | | -| wordpress | 1181 | dwisiswant0 | 806 | dast | 255 | critical | 1425 | | | -| exposure | 1107 | ritikchaddha | 649 | workflows | 202 | low | 318 | | | -| wp-plugin | 1032 | pussycat0x | 532 | code | 198 | unknown | 56 | | | -| osint | 841 | pikpikcu | 352 | network | 145 | | | | | -| tech | 803 | pdteam | 310 | javascript | 71 | | | | | -| rce | 786 | pdresearch | 269 | ssl | 38 | | | | | -| lfi | 777 | iamnoooob | 257 | dns | 23 | | | | | +| vuln | 6468 | dhiyaneshdk | 1894 | http | 9281 | info | 4353 | file | 436 | +| cve | 3587 | daffainfo | 905 | cloud | 659 | high | 2552 | dns | 26 | +| discovery | 3265 | princechaddha | 854 | file | 436 | medium | 2457 | | | +| vkev | 1394 | dwisiswant0 | 805 | network | 259 | critical | 1555 | | | +| panel | 1365 | ritikchaddha | 678 | code | 251 | low | 330 | | | +| xss | 1269 | pussycat0x | 675 | dast | 240 | unknown | 54 | | | +| wordpress | 1261 | pikpikcu | 353 | workflows | 205 | | | | | +| exposure | 1141 | pdteam | 314 | javascript | 92 | | | | | +| wp-plugin | 1103 | pdresearch | 275 | ssl | 38 | | | | | +| osint | 848 | iamnoooob | 263 | dns | 23 | | | | | -**848개 디렉토리, 11344개 파일**. +**873 directories, 11997 files**.