Skip to content

Commit 456c1c5

Browse files
committed
Daily update of Nuclei Templates
1 parent 7db9e03 commit 456c1c5

File tree

25,731 files changed

+937803
-837956
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

25,731 files changed

+937803
-837956
lines changed

README.md

+16-29
Original file line numberDiff line numberDiff line change
@@ -18,41 +18,28 @@
1818
| CVE-2014 | 436 |
1919
| CVE-2015 | 535 |
2020
| CVE-2016 | 257 |
21-
| CVE-2017 | 413 |
21+
| CVE-2017 | 412 |
2222
| CVE-2018 | 535 |
23-
| CVE-2019 | 770 |
23+
| CVE-2019 | 771 |
2424
| CVE-2020 | 1129 |
2525
| CVE-2021 | 2235 |
2626
| CVE-2022 | 2985 |
27-
| CVE-2023 | 5165 |
28-
| CVE-2024 | 9046 |
29-
| CVE-2025 | 1115 |
30-
| Other | 65777 |
27+
| CVE-2023 | 5166 |
28+
| CVE-2024 | 9045 |
29+
| CVE-2025 | 1117 |
30+
| Other | 65600 |
3131
## Quantity changes in recent days
32-
|2025-02-19 | 2025-02-20 | 2025-02-21 | 2025-02-22 | 2025-02-23 | 2025-02-24 | 2025-02-25|
32+
|2025-02-20 | 2025-02-21 | 2025-02-22 | 2025-02-23 | 2025-02-24 | 2025-02-25 | 2025-02-26|
3333
|--- | ------ | ------ | ------ | ------ | ------ | ---|
34-
|76919 | 89660 | 89590 | 89913 | 89699 | 91021 | 91211|
34+
|89660 | 89590 | 89913 | 89699 | 91021 | 91211 | 91036|
3535
## Recently added files
3636
| templates name |
3737
| --- |
38-
| CVE-2025-25062.yaml |
39-
| CVE-2024-13161.yaml |
40-
| CVE-2024-13159.yaml |
41-
| CVE-2024-12356.yaml |
42-
| CVE-2024-13160.yaml |
43-
| smarty-ssti.yaml |
44-
| codepen-oob.yaml |
45-
| pebble-oob.yaml |
46-
| python-code-injection.yaml |
47-
| razor-ssti.yaml |
48-
| ssh-unrestricted-nonwhitelist.yaml |
49-
| android-hijacking.yaml |
50-
| limit-max-auth-attempts.yaml |
51-
| jinjava-oob.yaml |
52-
| spring-expression-oob.yaml |
53-
| klog-server-default-login.yaml |
54-
| thymeleaf-oob.yaml |
55-
| ssh-key-auth-disabled.yaml |
56-
| twig-ssti.yaml |
57-
| freemarker-sandbox-bypass-ssti.yaml |
58-
| roundcube-detection.yaml |
38+
| CVE-2025-24893.yaml |
39+
| CVE-2025-0868.yaml |
40+
| CVE-2023-45826.yaml |
41+
| peoplesoft-xxe-1.yaml |
42+
| kerion-control-panel.yaml |
43+
| leantime-stored-xss.yaml |
44+
| shibboleth-detect.yaml |
45+
| squidex-panel.yaml |

data.json

+2-1
Original file line numberDiff line numberDiff line change
@@ -336,5 +336,6 @@
336336
"2025-02-22": 89913,
337337
"2025-02-23": 89699,
338338
"2025-02-24": 91021,
339-
"2025-02-25": 91211
339+
"2025-02-25": 91211,
340+
"2025-02-26": 91036
340341
}

data1.json

+9-1
Original file line numberDiff line numberDiff line change
@@ -93051,5 +93051,13 @@
9305193051
"ssh-key-auth-disabled.yaml": "2025-02-25 02:16:47",
9305293052
"twig-ssti.yaml": "2025-02-25 02:16:47",
9305393053
"freemarker-sandbox-bypass-ssti.yaml": "2025-02-25 02:16:47",
93054-
"roundcube-detection.yaml": "2025-02-25 02:16:47"
93054+
"roundcube-detection.yaml": "2025-02-25 02:16:47",
93055+
"CVE-2025-24893.yaml": "2025-02-26 02:16:40",
93056+
"CVE-2025-0868.yaml": "2025-02-26 02:16:40",
93057+
"CVE-2023-45826.yaml": "2025-02-26 02:16:40",
93058+
"peoplesoft-xxe-1.yaml": "2025-02-26 02:16:40",
93059+
"kerion-control-panel.yaml": "2025-02-26 02:16:40",
93060+
"leantime-stored-xss.yaml": "2025-02-26 02:16:40",
93061+
"shibboleth-detect.yaml": "2025-02-26 02:16:40",
93062+
"squidex-panel.yaml": "2025-02-26 02:16:40"
9305593063
}

nuclei-templates/CVE-2004/CVE-2004-2687.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -40,4 +40,4 @@ tcp:
4040
part: raw
4141
regex:
4242
- "uid=[0-9]+.*gid=[0-9]+.*"
43-
# digest: 4a0a004730450220137c308c895a2d8531b28b053e1e480cceba792fc5d7000ce51b6f422417b8c5022100c996a9313234317f1e7c0e355b361163cbf09fcb9d7180260d59a98f0f36a195:922c64590222798bb761d5b6d8e72950
43+
# digest: 4b0a00483046022100b45186a7e92c5e3e180db442d003fe428573fe4630b6cf6391a20d7ccf17a93d022100f779f2f93c2389060483b2da27e867762fa80aa55615d1169ddab65ed40ff6c5:922c64590222798bb761d5b6d8e72950
+57-57
Original file line numberDiff line numberDiff line change
@@ -1,58 +1,58 @@
1-
id: CVE-2005-10002
2-
3-
info:
4-
name: >
5-
secure-files <= 1.1 - Directory Traversal
6-
author: topscoder
7-
severity: medium
8-
description: >
9-
The secure-files plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.1 via the downloadfile variable. This makes it possible for attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
10-
reference:
11-
- https://www.wordfence.com/threat-intel/vulnerabilities/id/2fd7d6af-a938-4106-aed2-12b9a5454da9?source=api-prod
12-
classification:
13-
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
14-
cvss-score: 5.3
15-
cve-id: CVE-2005-10002
16-
metadata:
17-
fofa-query: "wp-content/plugins/secure-files/"
18-
google-query: inurl:"/wp-content/plugins/secure-files/"
19-
shodan-query: 'vuln:CVE-2005-10002'
20-
tags: cve,wordpress,wp-plugin,secure-files,medium
21-
22-
http:
23-
- method: GET
24-
redirects: true
25-
max-redirects: 3
26-
path:
27-
- "{{BaseURL}}/wp-content/plugins/secure-files/readme.txt"
28-
29-
extractors:
30-
- type: regex
31-
name: version
32-
part: body
33-
group: 1
34-
internal: true
35-
regex:
36-
- "(?mi)Stable tag: ([0-9.]+)"
37-
38-
- type: regex
39-
name: version
40-
part: body
41-
group: 1
42-
regex:
43-
- "(?mi)Stable tag: ([0-9.]+)"
44-
45-
matchers-condition: and
46-
matchers:
47-
- type: status
48-
status:
49-
- 200
50-
51-
- type: word
52-
words:
53-
- "secure-files"
54-
part: body
55-
56-
- type: dsl
57-
dsl:
1+
id: CVE-2005-10002
2+
3+
info:
4+
name: >
5+
secure-files <= 1.1 - Directory Traversal
6+
author: topscoder
7+
severity: medium
8+
description: >
9+
The secure-files plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.1 via the downloadfile variable. This makes it possible for attackers to read the contents of arbitrary files on the server, which can contain sensitive information.
10+
reference:
11+
- https://www.wordfence.com/threat-intel/vulnerabilities/id/2fd7d6af-a938-4106-aed2-12b9a5454da9?source=api-prod
12+
classification:
13+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
14+
cvss-score: 5.3
15+
cve-id: CVE-2005-10002
16+
metadata:
17+
fofa-query: "wp-content/plugins/secure-files/"
18+
google-query: inurl:"/wp-content/plugins/secure-files/"
19+
shodan-query: 'vuln:CVE-2005-10002'
20+
tags: cve,wordpress,wp-plugin,secure-files,medium
21+
22+
http:
23+
- method: GET
24+
redirects: true
25+
max-redirects: 3
26+
path:
27+
- "{{BaseURL}}/wp-content/plugins/secure-files/readme.txt"
28+
29+
extractors:
30+
- type: regex
31+
name: version
32+
part: body
33+
group: 1
34+
internal: true
35+
regex:
36+
- "(?mi)Stable tag: ([0-9.]+)"
37+
38+
- type: regex
39+
name: version
40+
part: body
41+
group: 1
42+
regex:
43+
- "(?mi)Stable tag: ([0-9.]+)"
44+
45+
matchers-condition: and
46+
matchers:
47+
- type: status
48+
status:
49+
- 200
50+
51+
- type: word
52+
words:
53+
- "secure-files"
54+
part: body
55+
56+
- type: dsl
57+
dsl:
5858
- compare_versions(version, '< 1.1')
+57-57
Original file line numberDiff line numberDiff line change
@@ -1,58 +1,58 @@
1-
id: CVE-2006-10001
2-
3-
info:
4-
name: >
5-
Subscribe to Comments <= 2.0.7 - Reflected Cross-Site Scripting
6-
author: topscoder
7-
severity: medium
8-
description: >
9-
The Subscribe to Comments plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via REQUEST_URI in all versions up to, and including, 2.0.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
10-
reference:
11-
- https://www.wordfence.com/threat-intel/vulnerabilities/id/81b76824-8099-433d-88e3-c05df9434fd6?source=api-prod
12-
classification:
13-
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
14-
cvss-score: 6.1
15-
cve-id: CVE-2006-10001
16-
metadata:
17-
fofa-query: "wp-content/plugins/subscribe-to-comments/"
18-
google-query: inurl:"/wp-content/plugins/subscribe-to-comments/"
19-
shodan-query: 'vuln:CVE-2006-10001'
20-
tags: cve,wordpress,wp-plugin,subscribe-to-comments,medium
21-
22-
http:
23-
- method: GET
24-
redirects: true
25-
max-redirects: 3
26-
path:
27-
- "{{BaseURL}}/wp-content/plugins/subscribe-to-comments/readme.txt"
28-
29-
extractors:
30-
- type: regex
31-
name: version
32-
part: body
33-
group: 1
34-
internal: true
35-
regex:
36-
- "(?mi)Stable tag: ([0-9.]+)"
37-
38-
- type: regex
39-
name: version
40-
part: body
41-
group: 1
42-
regex:
43-
- "(?mi)Stable tag: ([0-9.]+)"
44-
45-
matchers-condition: and
46-
matchers:
47-
- type: status
48-
status:
49-
- 200
50-
51-
- type: word
52-
words:
53-
- "subscribe-to-comments"
54-
part: body
55-
56-
- type: dsl
57-
dsl:
1+
id: CVE-2006-10001
2+
3+
info:
4+
name: >
5+
Subscribe to Comments <= 2.0.7 - Reflected Cross-Site Scripting
6+
author: topscoder
7+
severity: medium
8+
description: >
9+
The Subscribe to Comments plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via REQUEST_URI in all versions up to, and including, 2.0.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
10+
reference:
11+
- https://www.wordfence.com/threat-intel/vulnerabilities/id/81b76824-8099-433d-88e3-c05df9434fd6?source=api-prod
12+
classification:
13+
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
14+
cvss-score: 6.1
15+
cve-id: CVE-2006-10001
16+
metadata:
17+
fofa-query: "wp-content/plugins/subscribe-to-comments/"
18+
google-query: inurl:"/wp-content/plugins/subscribe-to-comments/"
19+
shodan-query: 'vuln:CVE-2006-10001'
20+
tags: cve,wordpress,wp-plugin,subscribe-to-comments,medium
21+
22+
http:
23+
- method: GET
24+
redirects: true
25+
max-redirects: 3
26+
path:
27+
- "{{BaseURL}}/wp-content/plugins/subscribe-to-comments/readme.txt"
28+
29+
extractors:
30+
- type: regex
31+
name: version
32+
part: body
33+
group: 1
34+
internal: true
35+
regex:
36+
- "(?mi)Stable tag: ([0-9.]+)"
37+
38+
- type: regex
39+
name: version
40+
part: body
41+
group: 1
42+
regex:
43+
- "(?mi)Stable tag: ([0-9.]+)"
44+
45+
matchers-condition: and
46+
matchers:
47+
- type: status
48+
status:
49+
- 200
50+
51+
- type: word
52+
words:
53+
- "subscribe-to-comments"
54+
part: body
55+
56+
- type: dsl
57+
dsl:
5858
- compare_versions(version, '< 2.0.7')

0 commit comments

Comments
 (0)