MyGit

edoardottt/missing-cve-nuclei-templates

Fork: 39 Star: 338 (更新于 2024-11-27 11:41:52)

license: MIT

Language: Shell .

Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration tests and vulnerability assessments too.

最后发布版本: 2024-09-09 ( 2024-09-09 16:39:52)

官方网址 GitHub网址

Weekly updated list of missing CVEs in nuclei templates official repository


Note This repository is 100% automated so there can be errors, but in general is pretty accurate. Go to section "How it works" to understand how data is collected.

Stats 📊

CVEs analyzed: 109879

CVEs missing: 30458

Dropdown by vuln type:

Type Count Data
XSS 13602 xss.txt
RCE 4795 rce.txt
SQL Injection 7818 sqli.txt
Local File Inclusion 200 lfi.txt
Server Side Request Forgery 239 ssrf.txt
Prototype Pollution 225 proto-pollution.txt
Request Smuggling 79 req-smuggling.txt
Open Redirect 304 open-redirect.txt
XML External Entity 366 xxe.txt
Path Traversal 2780 path-traversal.txt
Server Side Template Injection 50 ssti.txt

Dropdown by year:

Year Count Data
1999 1 1999.txt
2000 2 2000.txt
2001 9 2001.txt
2002 25 2002.txt
2003 30 2003.txt
2004 102 2004.txt
2005 346 2005.txt
2006 1029 2006.txt
2007 1027 2007.txt
2008 1939 2008.txt
2009 753 2009.txt
2010 652 2010.txt
2011 246 2011.txt
2012 464 2012.txt
2013 385 2013.txt
2014 802 2014.txt
2015 816 2015.txt
2016 543 2016.txt
2017 1347 2017.txt
2018 1950 2018.txt
2019 1552 2019.txt
2020 2253 2020.txt
2021 2591 2021.txt
2022 3216 2022.txt
2023 2914 2023.txt
2024 5464 2024.txt

Why 🤔

  • Bug bounty: the CVE templates in the official nuclei-templates repo are completely useless for bug bounty. This because everyone is using those templates looking for low hanging fruit. Build your own templates for new (and old!) CVEs, scan all the possible targets and don't forget to share them in the official nuclei-templates repo.
  • General Security: Security people can write their own templates for missing CVEs and use them to secure products during pentests, vuln assessments, red team ops and so on... every user will benefit from these actions. If they are very good security people they'll share the templates in official nuclei-templates repo helping the whole infosec community.
  • Stats & Data lover: I love data and statistics and I hope people like me will enjoy.

How it works 🖥️

Automated Logic:

for each cve in trickest/cve:
    if this cve not present in nuclei-templates:
        if it contains one of the words we are looking for:
            if it is a CVE suitable for nuclei:
                print it
  • Which are the "words we are looking for"? reflected, rce, local file inclusion, server side request forgery, ssrf, remote code execution, remote command execution, command injection, code injection, ssti, template injection, lfi, xss, Cross-Site Scripting, Cross Site Scripting, SQL injection, Prototype pollution, XML External Entity, Request Smuggling, XXE, Open redirect, Path Traversal and Directory Traversal.

  • This means the tracked vulnerability types are: XSS, RCE, SQL injection, Local File Inclusion, Server Side Request Forgery, Prototype Pollution, Request Smuggling, Open Redirect, XML Enternal Entity, Path Traversal and Server Side Template Injection; but new vuln types will be supported.

  • Why there can be errors in categorizing CVEs? Because when grepping for these words there can be false positives, meaning that an XXE vulnerability can be categorized as RCE because e.g. it says "in certain situations can be escalated to rce".

  • Why if I subtract the "CVEs missing" from the "CVEs analyzed" I don't get the exact official nuclei templates count? Because as said before the tracked vuln types are just 10 (the most famous ones), but a lot of other types are reported as well (and they will be supported).

  • What does it mean a CVE is suitable for Nuclei? Basically a remote web or network vulnerability (e.g. a CVE on Android is not suitable).

Contributing 🛠

Just open an issue / pull request.

Thanks 💝

License 📝

This repository is under MIT License.
edoardottt.com to contact me.

最近版本更新:(数据更新于 2024-09-11 21:25:47)

2024-09-09 16:39:52 2024-09-09

2024-09-02 16:08:58 2024-09-02

2024-08-26 15:02:05 2024-08-26

2024-08-19 14:14:08 2024-08-19

2024-08-12 15:37:28 2024-08-12

2024-08-05 14:19:44 2024-08-05

2024-07-29 15:58:39 2024-07-29

2024-07-15 14:31:36 2024-07-15

2024-07-08 14:04:31 2024-07-08

2024-07-01 15:08:22 2024-07-01

主题(topics):

automation, bug-bounty, bug-hunting, bugbounty, bugbounty-tool, bugbountytips, cve, cve-scanning, hacking, nuclei, nuclei-engine, nuclei-templates, penetration-testing, pentesting, projectdiscovery, security, security-tools, vulnerability-detection, vulnerability-scanners

edoardottt/missing-cve-nuclei-templates同语言 Shell最近更新仓库

2024-12-22 00:23:35 j-hc/revanced-magisk-module

2024-12-19 20:39:10 chenzyadb/CuprumTurbo-Scheduler

2024-12-17 15:17:35 morytyann/OpenWrt-mihomo

2024-12-11 20:57:35 RROrg/rr

2024-12-09 01:05:08 rustdesk/rustdesk-server-pro

2024-12-03 19:14:14 dockur/windows