mirror of
https://github.com/projectdiscovery/nuclei-templates.git
synced 2026-01-31 07:43:27 +08:00
fix: wrong year cves
This commit is contained in:
@@ -38,7 +38,7 @@ info:
|
||||
fofa-query:
|
||||
- body="/remote/login" "xxxxxxxx"
|
||||
- icon_hash="945408572"
|
||||
tags: cve,cve2024,ssl-vpn,vpn,fortios,fortigate,heap-based,bufferoverflow,kev,vkev,vuln
|
||||
tags: cve,cve2022,ssl-vpn,vpn,fortios,fortigate,heap-based,bufferoverflow,kev,vkev,vuln
|
||||
flow: http () && code()
|
||||
|
||||
http:
|
||||
|
||||
@@ -26,7 +26,7 @@ info:
|
||||
vendor: ossrs
|
||||
product: simple_realtime_server
|
||||
shodan-query: http.favicon.hash:1386054408
|
||||
tags: cve,cve2023,srs,dom,xss,vuln
|
||||
tags: cve,cve2024,srs,dom,xss,vuln
|
||||
|
||||
headless:
|
||||
- steps:
|
||||
|
||||
@@ -28,7 +28,7 @@ info:
|
||||
product: securelinx_spider_firmware
|
||||
shodan-query: title:"Lantronix"
|
||||
fofa-query: title="Lantronix"
|
||||
tags: cve,cve2022,lantronix,securelinx,sls,xss,vuln
|
||||
tags: cve,cve2018,lantronix,securelinx,sls,xss,vuln
|
||||
|
||||
flow: http(1) && http(2)
|
||||
|
||||
|
||||
@@ -28,7 +28,7 @@ info:
|
||||
vendor: openmrs
|
||||
product: openmrs
|
||||
shodan-query: html:"OpenMRS"
|
||||
tags: cve,cve20218,openmrs,deserialization,rce,vkev,vuln
|
||||
tags: cve,cve20188,openmrs,deserialization,rce,vkev,vuln
|
||||
|
||||
http:
|
||||
- raw:
|
||||
|
||||
@@ -27,7 +27,7 @@ info:
|
||||
product: spam_protection\,_antispam\,_firewall
|
||||
framework: wordpress
|
||||
fofa-query: body="/plugin/cleantalk-spam-protect/"
|
||||
tags: cve,cve2024,wpscan,wordpress,wp,wp-plugin,cleantalk-spam-protect,sqli,passive,vkev,vuln
|
||||
tags: cve,cve2021,wpscan,wordpress,wp,wp-plugin,cleantalk-spam-protect,sqli,passive,vkev,vuln
|
||||
|
||||
http:
|
||||
- raw:
|
||||
|
||||
@@ -28,7 +28,7 @@ info:
|
||||
product: gtranslate
|
||||
framework: wordpress
|
||||
fofa-query: body="/wp-content/plugins/gtranslate"
|
||||
tags: cve,cve2022,wordpress,wp,wp-plugin,gtranslate,xss,vuln
|
||||
tags: cve,cve2021,wordpress,wp,wp-plugin,gtranslate,xss,vuln
|
||||
|
||||
http:
|
||||
- method: GET
|
||||
|
||||
@@ -25,7 +25,7 @@ info:
|
||||
vendor: wavlink
|
||||
product: wl-wn531g3_firmware
|
||||
fofa-query: body="AC1200" && body="wavlink"
|
||||
tags: cve,cve2022,wavlink,exposure,ac1200,vuln
|
||||
tags: cve,cve2021,wavlink,exposure,ac1200,vuln
|
||||
|
||||
http:
|
||||
- method: GET
|
||||
|
||||
@@ -26,7 +26,7 @@ info:
|
||||
max-request: 1
|
||||
vendor: keysight
|
||||
product: sensor_management_server
|
||||
tags: cve,cve2025,keysight,sensor_management_server,rce,vkev,oast,oob
|
||||
tags: cve,cve2022,keysight,sensor_management_server,rce,vkev,oast,oob
|
||||
|
||||
variables:
|
||||
cmd: '\\\\{{interactsh-url}}\\test'
|
||||
|
||||
@@ -25,7 +25,7 @@ info:
|
||||
max-request: 1
|
||||
shodan-query: title:"Froxlor"
|
||||
product: froxlor
|
||||
tags: cve2023,cve,froxlor,html,vuln
|
||||
tags: cve2022,cve,froxlor,html,vuln
|
||||
|
||||
http:
|
||||
- method: GET
|
||||
|
||||
@@ -26,7 +26,7 @@ info:
|
||||
product: pfblockerng
|
||||
shodan-query: "pfBlockerNG"
|
||||
fofa-query: "pfBlockerNG"
|
||||
tags: cve,cve2024,pfsense,pfblockerng,rce,sqli,netgate,vuln
|
||||
tags: cve,cve2022,pfsense,pfblockerng,rce,sqli,netgate,vuln
|
||||
|
||||
flow: http(1) && http(2)
|
||||
|
||||
|
||||
@@ -29,7 +29,7 @@ info:
|
||||
- title="netscaler aaa"
|
||||
- title="citrix gateway" || title:"netscaler gateway"
|
||||
shodan-query: http.title:"citrix gateway" || title:"netscaler gateway"
|
||||
tags: cve,cve2025,citrix,saml,rce,kev,passive,vkev,vuln
|
||||
tags: cve,cve2023,citrix,saml,rce,kev,passive,vkev,vuln
|
||||
|
||||
http:
|
||||
- raw:
|
||||
|
||||
@@ -29,7 +29,7 @@ info:
|
||||
fofa-query: body="/wp-content/plugins/agile-store-locator"
|
||||
publicwww-query: /wp-content/plugins/agile-store-locator/
|
||||
shodan-query: http.html:"/wp-content/plugins/agile-store-locator/"
|
||||
tags: cve,cve2024,wp,wordpress,wp-plugin,agile-store-locator,xss,vuln
|
||||
tags: cve,cve2023,wp,wordpress,wp-plugin,agile-store-locator,xss,vuln
|
||||
|
||||
flow: http(1) && http(2)
|
||||
|
||||
|
||||
@@ -31,7 +31,7 @@ info:
|
||||
fofa-query: body="/wp-content/plugins/wp-user-avatar/"
|
||||
publicwww-query: "/wp-content/plugins/wp-user-avatar/"
|
||||
shodan-query: http.component:"profilepress"
|
||||
tags: cve,cve2022,wordpress,wp,wp-plugin,properfraction,profilepress,vkev
|
||||
tags: cve,cve2023,wordpress,wp,wp-plugin,properfraction,profilepress,vkev
|
||||
|
||||
flow: http(1) && http(2)
|
||||
|
||||
|
||||
@@ -28,7 +28,7 @@ info:
|
||||
product: xwiki
|
||||
shodan-query: html:"data-xwiki-reference"
|
||||
fofa-query: body="data-xwiki-reference"
|
||||
tags: cve,cve2024,xwiki,xss,vuln
|
||||
tags: cve,cve2023,xwiki,xss,vuln
|
||||
|
||||
http:
|
||||
- method: GET
|
||||
|
||||
@@ -28,7 +28,7 @@ info:
|
||||
product: xwiki
|
||||
shodan-query: html:"data-xwiki-reference"
|
||||
fofa-query: body="data-xwiki-reference"
|
||||
tags: cve,cve2024,xwiki,xss,vkev,vuln
|
||||
tags: cve,cve2023,xwiki,xss,vkev,vuln
|
||||
|
||||
http:
|
||||
- method: GET
|
||||
|
||||
@@ -28,7 +28,7 @@ info:
|
||||
product: xwiki
|
||||
shodan-query: html:"data-xwiki-reference"
|
||||
fofa-query: body="data-xwiki-reference"
|
||||
tags: cve,cve2024,xwiki,exposure,vuln
|
||||
tags: cve,cve2023,xwiki,exposure,vuln
|
||||
|
||||
http:
|
||||
- method: GET
|
||||
|
||||
@@ -24,7 +24,7 @@ info:
|
||||
vendor: kodcloud
|
||||
product: kodexplorer
|
||||
fofa-query: app="powered-by-kodexplorer"
|
||||
tags: cve,cve2024,kodexplorer,xss,vuln
|
||||
tags: cve,cve2023,kodexplorer,xss,vuln
|
||||
|
||||
http:
|
||||
- raw:
|
||||
|
||||
@@ -28,7 +28,7 @@ info:
|
||||
product: xwiki
|
||||
shodan-query: html:"data-xwiki-reference"
|
||||
fofa-query: body="data-xwiki-reference"
|
||||
tags: cve,cve2024,xwiki,password,exposure,vuln
|
||||
tags: cve,cve2023,xwiki,password,exposure,vuln
|
||||
|
||||
http:
|
||||
- method: GET
|
||||
|
||||
@@ -28,7 +28,7 @@ info:
|
||||
product: xwiki
|
||||
shodan-query: html:"data-xwiki-reference"
|
||||
fofa-query: body="data-xwiki-reference"
|
||||
tags: cve,cve2024,xwiki,email,exposure,vuln
|
||||
tags: cve,cve2023,xwiki,email,exposure,vuln
|
||||
|
||||
http:
|
||||
- method: GET
|
||||
|
||||
@@ -30,7 +30,7 @@ info:
|
||||
framework: python
|
||||
shodan-query: html:"__gradio_mode__"
|
||||
fofa-query: body="__gradio_mode__"
|
||||
tags: cve,cve2024,lfi,gradio,unauth,intrusive,vuln
|
||||
tags: cve,cve2023,lfi,gradio,unauth,intrusive,vuln
|
||||
|
||||
variables:
|
||||
str: '{{rand_base(8)}}'
|
||||
|
||||
@@ -30,7 +30,7 @@ info:
|
||||
product: digital_experience_platform,liferay_portal
|
||||
shodan-query: http.favicon.hash:129457226
|
||||
fofa-query: icon_hash=129457226
|
||||
tags: cve,cve2019,liferay,liferay-portal,digital-experience-platform,open-redirect,vkev
|
||||
tags: cve,cve2024,liferay,liferay-portal,digital-experience-platform,open-redirect,vkev
|
||||
|
||||
http:
|
||||
- method: GET
|
||||
|
||||
@@ -36,7 +36,7 @@ info:
|
||||
- app="zimbra-邮件系统"
|
||||
- body="zimbra collaboration suite web client"
|
||||
- icon_hash="475145467"
|
||||
tags: cve,cve2022,zimbra,kev,passive,xss,vkev
|
||||
tags: cve,cve2024,zimbra,kev,passive,xss,vkev
|
||||
|
||||
http:
|
||||
- method: GET
|
||||
|
||||
@@ -26,7 +26,7 @@ info:
|
||||
framework: prestashop
|
||||
shodan-query: html:"/productsalert"
|
||||
fofa-query: body="/productsalert"
|
||||
tags: time-based-sqli,cve,cve2023,prestashop,sqli,productsalert,vuln
|
||||
tags: time-based-sqli,cve,cve2024,prestashop,sqli,productsalert,vuln
|
||||
|
||||
flow: http(1) && http(2)
|
||||
|
||||
|
||||
@@ -27,7 +27,7 @@ info:
|
||||
verified: true
|
||||
vendor: gestioip
|
||||
product: gestioip
|
||||
tags: cve,cve2025,gestioip,xss,reflected,authenticated
|
||||
tags: cve,cve2024,gestioip,xss,reflected,authenticated
|
||||
flow: http(1) && http(2)
|
||||
|
||||
http:
|
||||
|
||||
@@ -26,7 +26,7 @@ info:
|
||||
vendor: santesoft
|
||||
product: sante_pacs_server
|
||||
shodan-query: http.favicon.hash:1185161484
|
||||
tags: cve,cve2024,sante,pacs,lfi,vkev,vuln
|
||||
tags: cve,cve2025,sante,pacs,lfi,vkev,vuln
|
||||
|
||||
http:
|
||||
- raw:
|
||||
|
||||
@@ -25,7 +25,7 @@ info:
|
||||
max-request: 1
|
||||
shodan-query: html:"apriso"
|
||||
fofa-query: body="/Apriso/Portal"
|
||||
tags: cve,cve2024,delmia,apriso,serialization,rce,kev,vkev,vuln
|
||||
tags: cve,cve2025,delmia,apriso,serialization,rce,kev,vkev,vuln
|
||||
|
||||
http:
|
||||
- raw:
|
||||
|
||||
@@ -19,7 +19,7 @@ info:
|
||||
classification:
|
||||
epss-score: 0.93587
|
||||
epss-percentile: 0.99822
|
||||
tags: cve,cve2018,js,network,postgresql,intrusive,vkev,vuln
|
||||
tags: cve,cve2019,js,network,postgresql,intrusive,vkev,vuln
|
||||
|
||||
|
||||
javascript:
|
||||
|
||||
@@ -23,7 +23,7 @@ info:
|
||||
max-request: 1
|
||||
vendor: fortinet
|
||||
product: forticlient_enterprise_management_server
|
||||
tags: cve,cve2024,sqli,fortinet,kev,vkev,vuln
|
||||
tags: cve,cve2023,sqli,fortinet,kev,vkev,vuln
|
||||
|
||||
tcp:
|
||||
- inputs:
|
||||
|
||||
Reference in New Issue
Block a user