Skip to content

Commit

Permalink
Auto Updated
Browse files Browse the repository at this point in the history
  • Loading branch information
test committed Dec 24, 2024
1 parent 006b368 commit e3f255e
Show file tree
Hide file tree
Showing 4,268 changed files with 201,622 additions and 668,240 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
106 changes: 65 additions & 41 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,50 +14,74 @@
| CVE-2011 | 14 |
| CVE-2012 | 28 |
| CVE-2013 | 23 |
| CVE-2014 | 46 |
| CVE-2015 | 47 |
| CVE-2016 | 38 |
| CVE-2014 | 43 |
| CVE-2015 | 44 |
| CVE-2016 | 40 |
| CVE-2017 | 95 |
| CVE-2018 | 247 |
| CVE-2019 | 414 |
| CVE-2020 | 763 |
| CVE-2021 | 852 |
| CVE-2022 | 862 |
| CVE-2023 | 754 |
| CVE-2024 | 361 |
| Other | 14333 |
| wordpress | 31513 |
| CVE-2018 | 251 |
| CVE-2019 | 413 |
| CVE-2020 | 759 |
| CVE-2021 | 847 |
| CVE-2022 | 861 |
| CVE-2023 | 757 |
| CVE-2024 | 363 |
| Other | 14365 |
| wordpress | 31514 |
## 近几天数量变化情况
|2024-12-17 | 2024-12-18 | 2024-12-19 | 2024-12-20 | 2024-12-21 | 2024-12-22 | 2024-12-23|
|2024-12-18 | 2024-12-19 | 2024-12-20 | 2024-12-21 | 2024-12-22 | 2024-12-23 | 2024-12-24|
|--- | ------ | ------ | ------ | ------ | ------ | ---|
|50035 | 50036 | 50099 | 50132 | 50522 | 50559 | 50566|
|50036 | 50099 | 50132 | 50522 | 50559 | 50566 | 50593|
## 最近新增文件
| templates name |
| --- |
| cve-2021-39320-6336.yaml |
| CVE-2024-11852.yaml |
| CVE-2011-4624-2078.yaml |
| cve-2021-21389-5514.yaml |
| CVE-2021-24340-5712.yaml |
| CVE-2021-25063-5794.yaml |
| cve-2017-1000170-2838.yaml |
| 674281011.yaml |
| api-jotform.yaml |
| 1559456844.yaml |
| 3886731892.yaml |
| 3742541433.yaml |
| 4066336974.yaml |
| 793310164.yaml |
| 3118163025.yaml |
| 3757448285.yaml |
| 1310750304.yaml |
| 2389937585.yaml |
| 1204339477.yaml |
| 1529097781.yaml |
| 372323483.yaml |
| 4116145651.yaml |
| 3274768380.yaml |
| 944179109.yaml |
| 2912151193.yaml |
| CVE-2024-55956.yaml |
| CVE-2024-52875.yaml |
| cve-2015-5471-2560.yaml |
| cve-2016-1000135-2685.yaml |
| CVE-2013-2287-2244.yaml |
| cve-2021-24406-5737.yaml |
| CVE-2024-11230.yaml |
| CVE-2012-1835-2171.yaml |
| CVE-2016-1000134-2680.yaml |
| 2201212761.yaml |
| tiki.yaml |
| fortigate-certificate.yaml |
| ack-cluster-network-policies-missing.yaml |
| 1668989849.yaml |
| 2545972775.yaml |
| ricoh-webimagemonitor-panel.yaml |
| 1697450874.yaml |
| ack-cluster-api-public.yaml |
| alibaba-cloud-code-env.yaml |
| oos-bucket-public-access.yaml |
| sse-cmk-disabled.yaml |
| easycvr-arbitrary-file-read.yaml |
| cleo-detect.yaml |
| 1896063946.yaml |
| 1983841135.yaml |
| 1790635368.yaml |
| ack-cluster-network-policies-disable.yaml |
| infinitt-pacs-info-leak.yaml |
| fortiwifi-certificate.yaml |
| fortianalyzer-certificate.yaml |
| 688202040.yaml |
| infinitt-pacs-file-upload.yaml |
| access-logoss-disabled.yaml |
| kubernetes-dashboard-enabled.yaml |
| limit-networkaccess-disabled.yaml |
| onedev.yaml |
| 1973925380.yaml |
| 2360956852.yaml |
| improper-bucket-sse.yaml |
| fortiauthenticator.yaml |
| secure-transfeross-disabled.yaml |
| ack-cluster-auditing-disable.yaml |
| public-actiontrail-bucket.yaml |
| fortimanager-certificate.yaml |
| ack-cluster-cloud-monitor-disable.yaml |
| 1976842637.yaml |
| openobserve-panel.yaml |
| 2022658175.yaml |
| sse-smk-disabled.yaml |
| ack-cluster-health-disable.yaml |
| fortiddos.yaml |
| CVE-2024-11303.yaml |
| CVE-2024-8859.yaml |
3 changes: 2 additions & 1 deletion data.json
Original file line number Diff line number Diff line change
Expand Up @@ -289,5 +289,6 @@
"2024-12-20": 50132,
"2024-12-21": 50522,
"2024-12-22": 50559,
"2024-12-23": 50566
"2024-12-23": 50566,
"2024-12-24": 50593
}
53 changes: 52 additions & 1 deletion data1.json
Original file line number Diff line number Diff line change
Expand Up @@ -61565,5 +61565,56 @@
"944179109.yaml": "2024-12-23 02:32:38",
"2912151193.yaml": "2024-12-23 02:32:38",
"CVE-2024-55956.yaml": "2024-12-23 02:32:38",
"CVE-2024-52875.yaml": "2024-12-23 02:32:38"
"CVE-2024-52875.yaml": "2024-12-23 02:32:38",
"cve-2015-5471-2560.yaml": "2024-12-24 02:32:16",
"cve-2016-1000135-2685.yaml": "2024-12-24 02:32:16",
"CVE-2013-2287-2244.yaml": "2024-12-24 02:32:16",
"cve-2021-24406-5737.yaml": "2024-12-24 02:32:16",
"CVE-2024-11230.yaml": "2024-12-24 02:32:16",
"CVE-2012-1835-2171.yaml": "2024-12-24 02:32:16",
"CVE-2016-1000134-2680.yaml": "2024-12-24 02:32:16",
"2201212761.yaml": "2024-12-24 02:32:16",
"tiki.yaml": "2024-12-24 02:32:16",
"fortigate-certificate.yaml": "2024-12-24 02:32:16",
"ack-cluster-network-policies-missing.yaml": "2024-12-24 02:32:16",
"1668989849.yaml": "2024-12-24 02:32:16",
"2545972775.yaml": "2024-12-24 02:32:16",
"ricoh-webimagemonitor-panel.yaml": "2024-12-24 02:32:16",
"1697450874.yaml": "2024-12-24 02:32:16",
"ack-cluster-api-public.yaml": "2024-12-24 02:32:16",
"alibaba-cloud-code-env.yaml": "2024-12-24 02:32:16",
"oos-bucket-public-access.yaml": "2024-12-24 02:32:16",
"sse-cmk-disabled.yaml": "2024-12-24 02:32:16",
"easycvr-arbitrary-file-read.yaml": "2024-12-24 02:32:16",
"cleo-detect.yaml": "2024-12-24 02:32:16",
"1896063946.yaml": "2024-12-24 02:32:16",
"1983841135.yaml": "2024-12-24 02:32:16",
"1790635368.yaml": "2024-12-24 02:32:16",
"ack-cluster-network-policies-disable.yaml": "2024-12-24 02:32:16",
"infinitt-pacs-info-leak.yaml": "2024-12-24 02:32:16",
"fortiwifi-certificate.yaml": "2024-12-24 02:32:16",
"fortianalyzer-certificate.yaml": "2024-12-24 02:32:16",
"688202040.yaml": "2024-12-24 02:32:16",
"infinitt-pacs-file-upload.yaml": "2024-12-24 02:32:16",
"access-logoss-disabled.yaml": "2024-12-24 02:32:16",
"kubernetes-dashboard-enabled.yaml": "2024-12-24 02:32:16",
"limit-networkaccess-disabled.yaml": "2024-12-24 02:32:16",
"onedev.yaml": "2024-12-24 02:32:16",
"1973925380.yaml": "2024-12-24 02:32:16",
"2360956852.yaml": "2024-12-24 02:32:16",
"improper-bucket-sse.yaml": "2024-12-24 02:32:16",
"fortiauthenticator.yaml": "2024-12-24 02:32:16",
"secure-transfeross-disabled.yaml": "2024-12-24 02:32:16",
"ack-cluster-auditing-disable.yaml": "2024-12-24 02:32:16",
"public-actiontrail-bucket.yaml": "2024-12-24 02:32:16",
"fortimanager-certificate.yaml": "2024-12-24 02:32:16",
"ack-cluster-cloud-monitor-disable.yaml": "2024-12-24 02:32:16",
"1976842637.yaml": "2024-12-24 02:32:16",
"openobserve-panel.yaml": "2024-12-24 02:32:16",
"2022658175.yaml": "2024-12-24 02:32:16",
"sse-smk-disabled.yaml": "2024-12-24 02:32:16",
"ack-cluster-health-disable.yaml": "2024-12-24 02:32:16",
"fortiddos.yaml": "2024-12-24 02:32:16",
"CVE-2024-11303.yaml": "2024-12-24 02:32:16",
"CVE-2024-8859.yaml": "2024-12-24 02:32:16"
}
20 changes: 20 additions & 0 deletions nuclei-templates/CVE-2001/CVE-2001-1473.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
id: deprecated-sshv1-detection

info:
name: Deprecated SSHv1 Protocol Detection
author: iamthefrogy
severity: medium
tags: network,ssh,openssh
description: SSHv1 is a deprecated and have known cryptographic issues.
reference: |
- https://www.kb.cert.org/vuls/id/684820
- https://nvd.nist.gov/vuln/detail/CVE-2001-1473
network:
- host:
- "{{Hostname}}"
- "{{Hostname}}:22"
matchers:
- type: word
words:
- "SSH-1"
29 changes: 0 additions & 29 deletions nuclei-templates/CVE-2001/cve-2001-1473.yaml

This file was deleted.

30 changes: 0 additions & 30 deletions nuclei-templates/CVE-2004/CVE-2004-0519.yaml

This file was deleted.

37 changes: 37 additions & 0 deletions nuclei-templates/CVE-2004/cve-2004-0519.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
id: CVE-2004-0519

info:
name: SquirrelMail 1.4.x - Folder Name Cross-Site Scripting
author: dhiyaneshDk
severity: medium
description: Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.
remediation: Upgrade to the latest version.
reference:
- https://www.exploit-db.com/exploits/24068
- ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc
tags: xss,squirrelmail,cve2004,cve
classification:
cve-id: CVE-2004-0519

requests:
- method: GET
path:
- '{{BaseURL}}/mail/src/compose.php?mailbox=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E'

matchers-condition: and
matchers:
- type: status
status:
- 200

- type: word
part: body
words:
- "</script><script>alert(document.domain)</script>"

- type: word
part: header
words:
- "text/html"

# Enhanced by mp on 2022/01/27
33 changes: 0 additions & 33 deletions nuclei-templates/CVE-2005/CVE-2005-2428.yaml

This file was deleted.

25 changes: 25 additions & 0 deletions nuclei-templates/CVE-2005/cve-2005-2428.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,25 @@
id: CVE-2005-2428
info:
name: CVE-2005-2428
author: CasperGN
severity: medium
tags: cve,cve2005
description: Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696.
reference:
- http://www.cybsec.com/vuln/default_configuration_information_disclosure_lotus_domino.pdf
- https://www.exploit-db.com/exploits/39495

requests:
- method: GET
path:
- "{{BaseURL}}/names.nsf/People?OpenView"
matchers-condition: and
matchers:
- type: status
status:
- 200
- type: regex
name: domino-username
regex:
- '(<a href\=\"/names\.nsf/[0-9a-z\/]+\?OpenDocument)'
part: body
29 changes: 29 additions & 0 deletions nuclei-templates/CVE-2007/CVE-2007-0885.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
id: CVE-2007-0885

info:
name: Rainbow.Zen Jira XSS
description: Cross-site scripting (XSS) vulnerability in jira/secure/BrowseProject.jspa in Rainbow with the Zen (Rainbow.Zen) extension allows remote attackers to inject arbitrary web script or HTML via the id parameter.
reference: https://www.securityfocus.com/archive/1/459590/100/0/threaded
author: geeknik
severity: medium
tags: cve,cve2007,jira,xss

requests:
- method: GET
path:
- '{{BaseURL}}/jira/secure/BrowseProject.jspa?id=%22%3e%3cscript%3ealert(document.domain)%3c%2fscript%3e'

matchers-condition: and
matchers:
- type: word
words:
- '"><script>alert(document.domain)</script>'

- type: status
status:
- 200

- type: word
part: header
words:
- "text/html"
Loading

0 comments on commit e3f255e

Please sign in to comment.