Update cves.yml
parent
1c11018f3e
commit
702ebcf4bb
|
@ -1,9 +1,20 @@
|
||||||
# This is a configuration file for the cves template profile.
|
# Nuclei Configuration Profile for CVEs Detection
|
||||||
# Additional configuration profiles can be created for different types of nuclei scans.
|
#
|
||||||
# They should be placed under the 'config' directory at:
|
# This configuration file is specifically tailored for detecting Common Vulnerabilities and Exposures (CVEs) using Nuclei.
|
||||||
# https://github.com/projectdiscovery/nuclei-templates
|
#
|
||||||
# Here is an example of how to use a config profile:
|
# Purpose:
|
||||||
# nuclei -config config/osint.yml -list target_list_to_scan.txt
|
# This profile is focused on identifying vulnerabilities listed in the Common Vulnerabilities and Exposures (CVE) database. Detecting CVEs is essential for mitigating risks associated with known security flaws in software and systems.
|
||||||
|
#
|
||||||
|
# Included Templates:
|
||||||
|
# This configuration references specific templates designed to detect CVEs:
|
||||||
|
# - http/cves/: This directory contains templates for detecting CVEs in HTTP-based services.
|
||||||
|
# - http/cnvd/: This directory contains templates for detecting vulnerabilities listed in the Chinese National Vulnerability Database (CNVD).
|
||||||
|
# - network/cves/: This directory contains templates for detecting CVEs in network services.
|
||||||
|
# - javascript/cves/: This directory contains templates for detecting CVEs in JavaScript-based applications.
|
||||||
|
#
|
||||||
|
# Running this profile
|
||||||
|
# You can run this profile using the following command:
|
||||||
|
# nuclei -profile cves -u https://example.com
|
||||||
|
|
||||||
templates:
|
templates:
|
||||||
- http/cves/
|
- http/cves/
|
||||||
|
|
Loading…
Reference in New Issue