Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration tests and vulnerability assessments too.
MIT License
Note This repository is 100% automated so there can be errors, but in general is pretty accurate. Go to section "How it works" to understand how data is collected.
CVEs analyzed: 108035
CVEs missing: 29915
Dropdown by vuln type:
Type | Count | Data |
---|---|---|
XSS | 13300 | xss.txt |
RCE | 4712 | rce.txt |
SQL Injection | 7725 | sqli.txt |
Local File Inclusion | 186 | lfi.txt |
Server Side Request Forgery | 236 | ssrf.txt |
Prototype Pollution | 224 | proto-pollution.txt |
Request Smuggling | 78 | req-smuggling.txt |
Open Redirect | 299 | open-redirect.txt |
XML External Entity | 356 | xxe.txt |
Path Traversal | 2749 | path-traversal.txt |
Server Side Template Injection | 50 | ssti.txt |
Dropdown by year:
Year | Count | Data |
---|---|---|
1999 | 1 | 1999.txt |
2000 | 2 | 2000.txt |
2001 | 8 | 2001.txt |
2002 | 23 | 2002.txt |
2003 | 29 | 2003.txt |
2004 | 98 | 2004.txt |
2005 | 336 | 2005.txt |
2006 | 1014 | 2006.txt |
2007 | 1024 | 2007.txt |
2008 | 1936 | 2008.txt |
2009 | 751 | 2009.txt |
2010 | 649 | 2010.txt |
2011 | 242 | 2011.txt |
2012 | 454 | 2012.txt |
2013 | 382 | 2013.txt |
2014 | 797 | 2014.txt |
2015 | 813 | 2015.txt |
2016 | 541 | 2016.txt |
2017 | 1339 | 2017.txt |
2018 | 1945 | 2018.txt |
2019 | 1536 | 2019.txt |
2020 | 2243 | 2020.txt |
2021 | 2576 | 2021.txt |
2022 | 3188 | 2022.txt |
2023 | 2931 | 2023.txt |
2024 | 5057 | 2024.txt |
Automated Logic:
for each cve in trickest/cve:
if this cve not present in nuclei-templates:
if it contains one of the words we are looking for:
if it is a CVE suitable for nuclei:
print it
Which are the "words we are looking for"? reflected
, rce
, local file inclusion
, server side request forgery
, ssrf
, remote code execution
, remote command execution
, command injection
, code injection
, ssti
, template injection
, lfi
, xss
, Cross-Site Scripting
, Cross Site Scripting
, SQL injection
, Prototype pollution
, XML External Entity
, Request Smuggling
, XXE
, Open redirect
, Path Traversal
and Directory Traversal
.
This means the tracked vulnerability types are: XSS, RCE, SQL injection, Local File Inclusion, Server Side Request Forgery, Prototype Pollution, Request Smuggling, Open Redirect, XML Enternal Entity, Path Traversal and Server Side Template Injection; but new vuln types will be supported.
Why there can be errors in categorizing CVEs? Because when grepping for these words there can be false positives, meaning that an XXE vulnerability can be categorized as RCE because e.g. it says "in certain situations can be escalated to rce".
Why if I subtract the "CVEs missing" from the "CVEs analyzed" I don't get the exact official nuclei templates count? Because as said before the tracked vuln types are just 10 (the most famous ones), but a lot of other types are reported as well (and they will be supported).
What does it mean a CVE is suitable for Nuclei? Basically a remote web or network vulnerability (e.g. a CVE on Android is not suitable).
Just open an issue / pull request.
This repository is under MIT License. edoardoottavianelli.it to contact me.