instruction
stringlengths 41
188
| input
stringlengths 165
3.12k
| output
stringlengths 256
2.26M
| category
stringclasses 3
values | severity
stringclasses 5
values | id
stringlengths 5
54
|
|---|---|---|---|---|---|
Generate a Nuclei template for CVE-2013-1965
|
Title: Code Injection in apache struts and others
Summary: Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.
Vulnerability Type: Code Injection
Severity: high
Affected Products: apache struts, apache struts2-showcase
Indicators: error, vulnerability detected
|
id: CVE-2013-1965
info:
name: Apache Struts2 S2-012 RCE
author: pikpikcu
severity: critical
description: Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.
tags: cve2013,cve,apache,rce,struts,ognl,vuln
http:
- method: POST
path:
- "{{BaseURL}}/user.action"
matchers:
- type: regex
- type: status
status:
- 200
|
cve
|
high
|
CVE-2013-1965
|
Generate a Nuclei template for: Imsanity Detection
|
Title: Imsanity Detection
Summary: Imsanity Detection. Tags: tech, wordpress, wp-plugin
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: wordpress-imsanity
info:
name: Imsanity Detection
author: ricardomaia
severity: info
description: Imsanity Detection
tags: tech,wordpress,wp-plugin,top-200,discovery
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/imsanity/readme.txt"
matchers:
- type: dsl
- type: regex
part: body
|
generic
|
info
|
wordpress-imsanity
|
Generate a Nuclei template for: vBulletin Security Checks
|
Title: vBulletin Security Checks
Summary: vBulletin Security Checks. A simple workflow that runs all vBulletin related nuclei templates on a given target.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: vbulletin-workflow
info:
name: vBulletin Security Checks
author: pdteam
severity: info
description: A simple workflow that runs all vBulletin related nuclei templates on a given target.
tags: unknown
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
vbulletin-workflow
|
Generate a Nuclei template for CVE-2020-9425
|
Title: Vulnerability (CWE-670) in rconfig rconfig
Summary: An issue was discovered in includes/head.inc.php in rConfig before 3.9.4. An unauthenticated attacker can retrieve saved cleartext credentials via a GET request to settings.php. Because the application was not exiting after a redirect is applied, the rest of the page still executed, resulting in the disclosure of cleartext credentials in the response.
Vulnerability Type: Vulnerability (CWE-670)
Severity: high
Affected Products: rconfig rconfig
Indicators: error, vulnerability detected
|
id: CVE-2020-9425
info:
name: rConfig <3.9.4 - Sensitive Information Disclosure
author: madrobot
severity: high
description: rConfig prior to version 3.9.4 is susceptible to sensitive information disclosure. An unauthenticated attacker can retrieve saved cleartext credentials via a GET request to settings.php. Because the application does not exit after a redirect is applied, the rest of the page still executes, resulting in the disclosure of cleartext credentials in the response.
tags: cve,cve2020,rconfig.exposure,rconfig,vuln
http:
- method: GET
path:
- "{{BaseURL}}/settings.php"
matchers:
- type: word
words:
- "defaultNodeUsername"
- "defaultNodePassword"
part: body
condition: and
- type: status
status:
- 200
|
cve
|
high
|
CVE-2020-9425
|
Generate a Nuclei template for CVE-2024-0692
|
Title: Deserialization of Untrusted Data in solarwinds security_event_manager
Summary: The SolarWinds Security Event Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse SolarWinds’ service, resulting in remote code execution.
Vulnerability Type: Deserialization of Untrusted Data
Severity: high
Affected Products: solarwinds security_event_manager
Indicators: error, vulnerability detected
|
id: CVE-2024-0692
info:
name: SolarWinds Security Event Manager - Unauthenticated RCE
author: DhiyaneshDK
severity: high
description: The SolarWinds Security Event Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse SolarWinds’ service, resulting in remote code execution.
tags: cve,cve2024,solarwinds,event-manager,cisa,vkev,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "SolarWinds Security Event Manager"
part: body
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
high
|
CVE-2024-0692
|
Generate a Nuclei template to detect Path Traversal
|
Title: Path Traversal (CWE-22)
Summary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as ".." and "/" separators, attackers can escap
Vulnerability Type: Path Traversal
Severity: high
Indicators: unexpected
|
id: sl-studio-lfi
info:
name: Webbdesign SL-Studio - Local File Inclusion
author: 0x_Akoko
severity: high
description: Webbdesign SL-Studio is vulnerable to local file inclusion.
tags: slstudio,lfi,vuln
http:
- method: GET
path:
- "{{BaseURL}}/index.php?page=../../../../../../../../../../etc/passwd"
matchers:
- type: regex
- type: status
status:
- 200
|
cwe
|
high
|
CWE-22
|
Generate a Nuclei template for: AWS S3 Buckets - Cloud Enumeration
|
Title: AWS S3 Buckets - Cloud Enumeration
Summary: AWS S3 Buckets - Cloud Enumeration. Searches for open and protected buckets in AWS S3
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: aws-s3-bucket-enum
info:
name: AWS S3 Buckets - Cloud Enumeration
author: initstring
severity: info
description: Searches for open and protected buckets in AWS S3
tags: cloud,enum,cloud-enum,aws,discovery
http:
- method: GET
path:
matchers:
- type: status
status:
- 200
- type: status
status:
- 403
|
generic
|
info
|
aws-s3-bucket-enum
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: nutanix-web-console-login
info:
name: Nutanix Web Console Login Panel - Detect
author: gy741
severity: info
description: Nutanix Web Console login panel was detected.
tags: panel,nutanix,login,discovery
http:
- method: GET
path:
- "{{BaseURL}}/console/"
matchers:
- type: word
words:
- "<title>Nutanix Web Console</title>"
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: Workerman Websocket Detection
|
Title: Workerman Websocket Detection
Summary: Workerman Websocket Detection. Tags: tech, workerman, websocket
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: workerman-websocket-detect
info:
name: Workerman Websocket Detection
author: geeknik
severity: info
description: Workerman Websocket Detection
tags: tech,workerman,websocket,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "workerman/"
part: header
|
generic
|
info
|
workerman-websocket-detect
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: hadoop-exposure
info:
name: Apache Hadoop Panel - Detect
author: pdteam
severity: info
description: Apache Hadoop panel was detected.
tags: panel,apache,hadoop,discovery
http:
- method: GET
path:
- "{{BaseURL}}/dfshealth.html"
matchers:
- type: word
words:
- "<div class="navbar-brand">Hadoop</div>"
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: Get Access Token Json
|
Title: Get Access Token Json
Summary: Get Access Token Json. Internal file is exposed in Constant Contact Forms wordpress plugin.
Vulnerability Type: Security Check
Severity: low
Indicators: vulnerability detected
|
id: get-access-token-json
info:
name: Get Access Token Json
author: DhiyaneshDK
severity: low
description: Internal file is exposed in Constant Contact Forms wordpress plugin.
tags: exposure,files,vuln
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/constant-contact-forms/vendor/constantcontact/constantcontact/test/Json/Auth/get_access_token.json"
- "{{BaseURL}}/wp-content/plugins/constant-contact-api-old/vendor/constantcontact/constantcontact/test/Json/Auth/get_access_token.json"
matchers:
- type: word
words:
- ""access_token":"
- ""token_type":"
condition: and
- type: status
status:
- 200
|
generic
|
low
|
get-access-token-json
|
Generate a Nuclei template for CVE-2023-4284
|
Title: Unknown Vulnerability in agilelogix post_timeline
Summary: The Post Timeline WordPress plugin before 2.2.6 does not sanitise and escape an invalid nonce before outputting it back in an AJAX response, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Vulnerability Type: Unknown Vulnerability
Severity: medium
Affected Products: agilelogix post_timeline
Indicators: error, vulnerability detected
|
id: CVE-2023-4284
info:
name: WordPress Post Timeline Plugin < 2.2.6 - Cross-Site Scripting
author: ritikchaddha
severity: high
description: The Post Timeline WordPress plugin before version 2.2.6 contains a reflected cross-site scripting vulnerability. The plugin does not properly sanitize and escape an invalid nonce before outputting it back in an AJAX response, which could allow attackers to execute arbitrary JavaScript code in an administrator's browser context.
tags: cve,cve2023,wordpress,wp,wp-plugin,xss,post-timeline,authenticated,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "post-timeline"
part: body
- method: GET
path:
matchers:
- type: word
words:
- "<img src onerror=alert(document.domain)"
part: body
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2023-4284
|
Generate a Nuclei template for: Deadbolt Ransomware Detection
|
Title: Deadbolt Ransomware Detection
Summary: Deadbolt Ransomware Detection. Tags: ransomware, deadbolt, vuln
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: deadbolt-ransomware
info:
name: Deadbolt Ransomware Detection
author: pdteam
severity: info
description: Deadbolt Ransomware Detection
tags: ransomware,deadbolt,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "<title>ALL YOUR FILES HAVE BEEN LOCKED BY DEADBOLT.</title>"
|
generic
|
info
|
deadbolt-ransomware
|
Generate a Nuclei template for: FileGator Panel - Detect
|
Title: FileGator Panel - Detect
Summary: FileGator Panel - Detect. Tags: filegator, panel, login
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: filegator-panel
info:
name: FileGator Panel - Detect
author: ritikchaddha
severity: info
description: FileGator Panel - Detect
tags: filegator,panel,login,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "<title>FileGator"
part: body
- type: status
status:
- 200
|
generic
|
info
|
filegator-panel
|
Generate a Nuclei template to detect SQL Injection
|
Title: SQL Injection (CWE-89)
Summary: The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Vulnerability Type: SQL Injection
Severity: critical
Indicators: vulnerability detected, error
|
id: ems-sqli
info:
name: Employee Management System 1.0 - SQL Injection
author: arafatansari
severity: critical
description: Employee Management System 1.0 contains a SQL injection vulnerability via the username parameter. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site.
tags: ems,sqli,cms,auth-bypass,edb,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "Admin Panel"
- "Log Out"
- "Employee Management System"
part: body
condition: and
- type: status
status:
- 200
|
cwe
|
critical
|
CWE-89
|
Generate a Nuclei template for: Samsung SmartTV Debug Config
|
Title: Samsung SmartTV Debug Config
Summary: Samsung SmartTV Debug Config. Tags: samsung, tech, iot
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: samsung-smarttv-debug
info:
name: Samsung SmartTV Debug Config
author: pussycat0x
severity: info
description: Samsung SmartTV Debug Config
tags: samsung,tech,iot,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "<title>Debug Config</title>"
- "MultiScreen Service"
condition: and
- type: status
status:
- 200
|
generic
|
info
|
samsung-smarttv-debug
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: hp-ilo-5
info:
name: Hewlett Packard Integrated Lights Out 5 Login Panel - Detect
author: geeknik
severity: info
description: Hewlett Packard Integrated Lights Out 5 login panel was detected.
tags: hp,ilo,panel,hpe,discovery
http:
- method: GET
path:
- "{{BaseURL}}/html/login.html"
matchers:
- type: status
status:
- 200
- type: word
words:
- "titleHeading>iLO 5"
- "titleFwver>Firmware"
- "2002-2018 Hewlett Packard Enterprise Development LP"
part: body
condition: and
- type: word
words:
- "text/html"
part: header
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: Changjietong Remote Communication GNRemote.dll - SQL Injection
|
Title: Changjietong Remote Communication GNRemote.dll - SQL Injection
Summary: Changjietong Remote Communication GNRemote.dll - SQL Injection. Chanjetong has a SQL injection vulnerability, which can be used by attackers to obtain sensitive information in the database.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: chanjet-gnremote-sqli
info:
name: Changjietong Remote Communication GNRemote.dll - SQL Injection
author: SleepingBag945
severity: high
description: Chanjetong has a SQL injection vulnerability, which can be used by attackers to obtain sensitive information in the database.
tags: yonyou,chanjet,sqli,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "{"RetCode":0}"
part: body_1
- type: word
words:
- "{"RetCode":2}"
part: body_2
|
generic
|
high
|
chanjet-gnremote-sqli
|
Generate a Nuclei template for CVE-2022-0949
|
Title: SQL Injection in stopbadbots block_and_stop_bad_bots
Summary: The Block Bad Bots and Stop Bad Bots Crawlers and Spiders and Anti Spam Protection WordPress plugin before 6.930 does not properly sanitise and escape the fingerprint parameter before using it in a SQL statement via the stopbadbots_grava_fingerprint AJAX action, available to unauthenticated users, leading to a SQL injection
Vulnerability Type: SQL Injection
Severity: critical
Affected Products: stopbadbots block_and_stop_bad_bots
Indicators: error, vulnerability detected
|
id: CVE-2022-0949
info:
name: WordPress Stop Bad Bots <6.930 - SQL Injection
author: theamanrawat
severity: critical
description: WordPress Stop Bad Bots plugin before 6.930 contains a SQL injection vulnerability. The plugin does not properly sanitise and escape the fingerprint parameter before using it in a SQL statement via the stopbadbots_grava_fingerprint AJAX action, available to unauthenticated users. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
tags: time-based-sqli,cve,cve2022,stopbadbots,wp-plugin,wp,unauth,wpscan,sqli,wordpress,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
critical
|
CVE-2022-0949
|
Generate a Nuclei template for: BeyondTrust Remote Support Version - Detect
|
Title: BeyondTrust Remote Support Version - Detect
Summary: BeyondTrust Remote Support Version - Detect. Detects and extracts version information from BeyondTrust Remote Support installations by querying the /get_rdf endpoint.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: beyondtrust-remotesupport-version
info:
name: BeyondTrust Remote Support Version - Detect
author: missing0x00
severity: info
description: Detects and extracts version information from BeyondTrust Remote Support installations by querying the /get_rdf endpoint.
tags: tech,beyondtrust,version,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}/get_rdf?comp=sdcust&locale_code=en-us"
matchers:
- type: status
status:
- 200
- type: word
words:
- "BeyondTrust"
part: response
|
generic
|
info
|
beyondtrust-remotesupport-version
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: np-data-cache
info:
name: NP Data Cache Panel - Detect
author: tess
severity: info
description: NP Data Cache panel was detected.
tags: np,panel,cache,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "NP Data Cache"
- "Server logs (if subscribed)"
part: body
condition: and
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: Kedacom Network Keyboard Console - Arbitrary File Read
|
Title: Kedacom Network Keyboard Console - Arbitrary File Read
Summary: Kedacom Network Keyboard Console - Arbitrary File Read. There is an arbitrary file reading vulnerability in the KEDACOM network keyboard console. Attacking this vulnerability can read arbitrary information from the server
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: kedacom-network-lfi
info:
name: Kedacom Network Keyboard Console - Arbitrary File Read
author: DhiyaneshDk
severity: high
description: There is an arbitrary file reading vulnerability in the KEDACOM network keyboard console. Attacking this vulnerability can read arbitrary information from the server
tags: lfi,kedacom,network,vuln
http:
- method: GET
path:
- "{{BaseURL}}/../../../../../../../../etc/passwd"
matchers:
- type: regex
part: body
- type: word
words:
- "text/html"
- "Server: kedacom-hs"
part: header
condition: and
- type: status
status:
- 200
|
generic
|
high
|
kedacom-network-lfi
|
Generate a Nuclei template for: SPIP - Detect
|
Title: SPIP - Detect
Summary: SPIP - Detect. Detects a SPIP and SPIP version.
. Tags: spip, tech, detect
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: spip-detect
info:
name: SPIP - Detect
author: s4e-io
severity: info
description: Detects a SPIP and SPIP version.
tags: spip,tech,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: regex
part: header
condition: or
- type: status
status:
- 200
|
generic
|
info
|
spip-detect
|
Generate a Nuclei template for CVE-2020-28208
|
Title: Vulnerability (CWE-203) in rocket.chat rocket.chat
Summary: An email address enumeration vulnerability exists in the password reset function of Rocket.Chat through 3.9.1.
Vulnerability Type: Vulnerability (CWE-203)
Severity: medium
Affected Products: rocket.chat rocket.chat
Indicators: error, vulnerability detected
|
id: CVE-2020-28208
info:
name: Rocket.Chat <3.9.1 - Information Disclosure
author: pdteam
severity: medium
description: Rocket.Chat through 3.9.1 is susceptible to information disclosure. An attacker can enumerate email addresses via the password reset function and thus potentially access sensitive information, modify data, and/or execute unauthorized operations.
tags: cve,cve2020,packetstorm,rocketchat,rocket.chat,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- ""result\":false"
- ""success":true"
part: body
condition: and
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2020-28208
|
Generate a Nuclei template for CVE-2021-44848
|
Title: Vulnerability (CWE-203) in cybelesoft thinfinity_virtualui
Summary: In Cibele Thinfinity VirtualUI before 3.0, /changePassword returns different responses for invalid authentication requests depending on whether the username exists.
Vulnerability Type: Vulnerability (CWE-203)
Severity: medium
Affected Products: cybelesoft thinfinity_virtualui
Indicators: error, vulnerability detected
|
id: CVE-2021-44848
info:
name: Thinfinity VirtualUI User Enumeration
author: danielmofer
severity: medium
description: Thinfinity VirtualUI (before v3.0), /changePassword returns different responses for requests depending on whether the username exists. It may enumerate OS users (Administrator, Guest, etc.)
tags: cve2021,cve,exposure,thinfinity,packetstorm,virtualui,tenable,cybelesoft,vuln
http:
- method: GET
path:
matchers:
- type: regex
part: body
condition: and
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2021-44848
|
Generate a Nuclei template for: Microsoft Internet Information Services 8
|
Title: Microsoft Internet Information Services 8
Summary: Microsoft Internet Information Services 8. Tags: tech, iis, microsoft
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: microsoft-iis-8
info:
name: Microsoft Internet Information Services 8
author: dhiyaneshDK
severity: info
description: Microsoft Internet Information Services 8
tags: tech,iis,microsoft,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: status
status:
- 200
- type: word
words:
- "<title>Microsoft Internet Information Services 8</title>"
|
generic
|
info
|
microsoft-iis-8
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: mastoai
info:
name: Masto.ai User Name Information - Detect
author: dwisiswant0
severity: info
description: Masto.ai user name information check was conducted.
tags: osint,osint-social,mastoai,discovery
http:
- method: GET
path:
- "https://masto.ai/@{{user}}"
matchers:
- type: status
status:
- 200
- type: word
words:
- "@masto.ai) - Mastodon</title>"
part: body
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: openemr-detect
info:
name: OpenEMR Product Registration Panel - Detect
author: pussycat0x
severity: info
description: OpenEMR Product Registration panel was detected.
tags: panel,openemr,open-emr,discovery
http:
- method: GET
path:
- "{{BaseURL}}/interface/login/login.php?site=default"
matchers:
- type: word
words:
- ""title":"OpenEMR Product Registration""
part: body
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: firefox phishing Detection
|
Title: firefox phishing Detection
Summary: firefox phishing Detection. A firefox phishing website was detected
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: firefox-phish
info:
name: firefox phishing Detection
author: rxerium
severity: info
description: A firefox phishing website was detected
tags: phishing,firefox,osint,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "Download Firefox for Desktop — Mozilla"
- type: status
status:
- 200
- type: dsl
|
generic
|
info
|
firefox-phish
|
Generate a Nuclei template for: rpmverify - Privilege Escalation
|
Title: rpmverify - Privilege Escalation
Summary: rpmverify - Privilege Escalation. The rpmverify command is used to verify the integrity and authenticity of installed RPM packages on a Linux system. It checks the files in the installed packages against the information stored in the RPM database to detect any modifications or discrepancies. This helps ensure the security and stability of the system by identifying any unauthorized changes to the installed packages.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: privesc-rpmverify
info:
name: rpmverify - Privilege Escalation
author: daffainfo
severity: high
description: The rpmverify command is used to verify the integrity and authenticity of installed RPM packages on a Linux system. It checks the files in the installed packages against the information stored in the RPM database to detect any modifications or discrepancies. This helps ensure the security and stability of the system by identifying any unauthorized changes to the installed packages.
tags: code,linux,rpmverify,privesc,local
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
high
|
privesc-rpmverify
|
Generate a Nuclei template for: Log Min Messages Flag Not Configured Properly for PostgreSQL Instances
|
Title: Log Min Messages Flag Not Configured Properly for PostgreSQL Instances
Summary: Log Min Messages Flag Not Configured Properly for PostgreSQL Instances. Ensure that the "log_min_messages" database flag configured for your Google Cloud PostgreSQL database instances has the appropriate severity level in accordance with your organization's logging policy. The "log_min_messages" flag defines the minimum severity level for messages to be logged. Valid levels include DEBUG5, DEBUG4, DEBUG3, DEBUG2, DEBUG1, INFO, NOTICE, WARNING, ERROR, LOG, FATAL, and PANIC.
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: gcloud-pg-log-min-messages-flag-not-configured
info:
name: Log Min Messages Flag Not Configured Properly for PostgreSQL Instances
author: princechaddha
severity: medium
description: Ensure that the "log_min_messages" database flag configured for your Google Cloud PostgreSQL database instances has the appropriate severity level in accordance with your organization's logging policy. The "log_min_messages" flag defines the minimum severity level for messages to be logged. Valid levels include DEBUG5, DEBUG4, DEBUG3, DEBUG2, DEBUG1, INFO, NOTICE, WARNING, ERROR, LOG, FATAL, and PANIC.
tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,logging,gcp-cloud-config
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
medium
|
gcloud-pg-log-min-messages-flag-not-configured
|
Generate a Nuclei template for: Wordpress sym404 directory
|
Title: Wordpress sym404 directory
Summary: Wordpress sym404 directory. Searches for sensitive directories present in the sym404.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: wp-sym404
info:
name: Wordpress sym404 directory
author: pussycat0x
severity: high
description: Searches for sensitive directories present in the sym404.
tags: wordpress,listing,wp,exposure,vuln
http:
- method: GET
path:
- "{{BaseURL}}/wp-includes/sym404/root/etc/passwd"
matchers:
- type: regex
part: body
- type: status
status:
- 200
|
generic
|
high
|
wp-sym404
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: bitbucket
info:
name: Bitbucket User Name Information - Detect
author: dwisiswant0
severity: info
description: Bitbucket user name information check was conducted.
tags: osint,osint-coding,bitbucket,discovery
http:
- method: GET
path:
- "https://bitbucket.org/{{user}}/"
matchers:
- type: status
status:
- 200
- type: word
words:
- "Repositories"
part: body
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: Hongjing HCM - Local File Inclusion
|
Title: Hongjing HCM - Local File Inclusion
Summary: Hongjing HCM - Local File Inclusion. There is an arbitrary file read vulnerability in the Hongjing eHR /DownLoadCourseware interface. Unauthenticated attackers can use this vulnerability to read important system files (such as database configuration files, system configuration files), database configuration files, etc., causing the website to be extremely unsafe.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: hjsoft-hcm-lfi
info:
name: Hongjing HCM - Local File Inclusion
author: s4e-io
severity: high
description: There is an arbitrary file read vulnerability in the Hongjing eHR /DownLoadCourseware interface. Unauthenticated attackers can use this vulnerability to read important system files (such as database configuration files, system configuration files), database configuration files, etc., causing the website to be extremely unsafe.
tags: lfi,hjsoft,management-system,file-read,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "bit app support"
- "fonts"
- "extensions"
part: body
condition: and
- type: word
words:
- "multipart/form-data"
part: content_type
- type: status
status:
- 200
|
generic
|
high
|
hjsoft-hcm-lfi
|
Generate a Nuclei template for CVE-2023-27922
|
Title: Cross-Site Scripting (XSS) in thenewsletterplugin newsletter
Summary: Cross-site scripting vulnerability in Newsletter versions prior to 7.6.9 allows a remote unauthenticated attacker to inject an arbitrary script.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: thenewsletterplugin newsletter
Indicators: error, vulnerability detected
|
id: CVE-2023-27922
info:
name: Newsletter < 7.6.9 - Cross-Site Scripting
author: r3Y3r53
severity: medium
description: The plugin does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as administrators
tags: cve2023,cve,wpscan,wordpress,wp,wp-plugin,xss,newsletter,authenticated,thenewsletterplugin,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
medium
|
CVE-2023-27922
|
Generate a Nuclei template for: Express Stack Trace
|
Title: Express Stack Trace
Summary: Express Stack Trace. Express Stack trace is exposed.
Vulnerability Type: Security Check
Severity: low
Indicators: vulnerability detected
|
id: express-stack-trace
info:
name: Express Stack Trace
author: DhiyaneshDk
severity: low
description: Express Stack trace is exposed.
tags: misconfig,express,intrusive,vuln
http:
- method: GET
path:
- "{{BaseURL}}/{{randstr}}"
matchers:
- type: word
words:
- "NotFoundError: Not Found"
- "at Function.handle"
part: body
condition: and
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 404
|
generic
|
low
|
express-stack-trace
|
Generate a Nuclei template for: SphinxOnline Panel - Detect
|
Title: SphinxOnline Panel - Detect
Summary: SphinxOnline Panel - Detect. SphinxOnline Login Panel was detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: sphinxonline-panel
info:
name: SphinxOnline Panel - Detect
author: righettod
severity: info
description: SphinxOnline Login Panel was detected.
tags: panel,sphinxonline,login,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}/SphinxAuth/Account/Login"
matchers:
- type: word
words:
- "<title>Connection - SphinxOnline</title>"
- "SphinxOnline</span>"
part: body
condition: or
- type: status
status:
- 200
|
generic
|
info
|
sphinxonline-panel
|
Generate a Nuclei template for: Apache Shiro Default Page
|
Title: Apache Shiro Default Page
Summary: Apache Shiro Default Page. Tags: tech, apache, shiro
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: default-apache-shiro
info:
name: Apache Shiro Default Page
author: DhiyaneshDK
severity: info
description: Apache Shiro Default Page
tags: tech,apache,shiro,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "<title>Apache Shiro Quickstart</title>"
part: body
- type: status
status:
- 200
|
generic
|
info
|
default-apache-shiro
|
Generate a Nuclei template for CVE-2024-6159
|
Title: SQL Injection in pnfpb push_notification_for_post_and_buddypress
Summary: The Push Notification for Post and BuddyPress WordPress plugin before 1.9.4 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
Vulnerability Type: SQL Injection
Severity: critical
Affected Products: pnfpb push_notification_for_post_and_buddypress
Indicators: error, vulnerability detected
|
id: CVE-2024-6159
info:
name: Push Notification for Post and BuddyPress <= 1.93 - SQL Injection
author: s4e-io
severity: critical
description: Push Notification for Post and BuddyPress plugin for WordPress is vulnerable to SQL Injection via the 'onesignal_externalid' and 'onesignal_get_subscriptionoptions_id' paramters in all versions up to, and including, 1.93 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
tags: time-based-sqli,cve,cve2024,wpscan,wp-plugin,wordpress,push-notification,vuln
http:
- method: GET
path:
matchers:
- type: dsl
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
critical
|
CVE-2024-6159
|
Generate a Nuclei template for CVE-2021-24644
|
Title: Path Traversal in imagestowebp_project images_to_webp
Summary: The Images to WebP WordPress plugin before 1.9 does not validate or sanitise the tab parameter before passing it to the include() function, which could lead to a Local File Inclusion issue
Vulnerability Type: Path Traversal
Severity: high
Affected Products: imagestowebp_project images_to_webp
Indicators: error, vulnerability detected
|
id: CVE-2021-24644
info:
name: Images to WebP < 1.9 - Authenticated Local File Inclusion
author: Sourabh-Sahu
severity: high
description: The Images to WebP WordPress plugin before version 1.9 did not validate or sanitize the tab parameter before using it in the include() function.
tags: wpscan,cve,cve2021,wordpress,wp-plugin,images-to-webp,lfi,authenticated,intrusive,vkev,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
high
|
CVE-2021-24644
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: myspace
info:
name: MySpace User Name Information - Detect
author: dwisiswant0
severity: info
description: MySpace user name information check was conducted.
tags: osint,osint-social,myspace,discovery
http:
- method: GET
path:
- "https://myspace.com/{{user}}"
matchers:
- type: status
status:
- 200
- type: word
words:
- "<!-- Profile -->"
part: body
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: NocoDB Panel - Detect
|
Title: NocoDB Panel - Detect
Summary: NocoDB Panel - Detect. NocoDB Login panel was discovered.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: nocodb-panel
info:
name: NocoDB Panel - Detect
author: userdehghani
severity: info
description: NocoDB Login panel was discovered.
tags: panel,nocodb,login,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}/dashboard/#/signin"
- "{{BaseURL}}/dashboard/favicon.ico"
matchers:
- type: word
words:
- "content="NocoDB"
part: body
- type: dsl
|
generic
|
info
|
nocodb-panel
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: qnap-photostation-panel
info:
name: QNAP Photo Station Panel - Detect
author: idealphase
severity: info
description: QNAP Photo Station panel was detected.
tags: panel,photostation,qnap,discovery
http:
- method: GET
path:
- "{{BaseURL}}/photo/"
matchers:
- type: regex
part: body
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: Splash Render - SSRF
|
Title: Splash Render - SSRF
Summary: Splash Render - SSRF. Splash Render is vulnerable to Server-Side Request Forgery (SSRF) Vulnerability.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: splash-render-ssrf
info:
name: Splash Render - SSRF
author: pwnhxl
severity: high
description: Splash Render is vulnerable to Server-Side Request Forgery (SSRF) Vulnerability.
tags: splash,ssrf,oast,oss,vuln
http:
- method: GET
path:
- "{{BaseURL}}/render.html?url=https://oast.live"
matchers:
- type: word
words:
- "Interactsh Server"
part: body
- type: status
status:
- 200
|
generic
|
high
|
splash-render-ssrf
|
Generate a Nuclei template for CVE-2025-3515
|
Title: Unrestricted File Upload in codedropz drag_and_drop_multiple_file_upload_-_contact_form_7
Summary: The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in all versions up to, and including, 1.3.8.9. This makes it possible for unauthenticated attackers to bypass the plugin's blacklist and upload .phar or other dangerous file types on the affected site's server, which may make remote code execution possible on the servers that are configured to handle .phar files as executable PHP scripts, particularly in default Apache+mod_php configurations where the file extension is not strictly validated before being passed to the PHP interpreter.
Vulnerability Type: Unrestricted File Upload
Severity: high
Affected Products: codedropz drag_and_drop_multiple_file_upload_-_contact_form_7
Indicators: error, vulnerability detected
|
id: CVE-2025-3515
info:
name: Contact Form 7 Drag and Drop Multiple File Upload - Arbitrary File Upload
author: hnd3884
severity: high
description: The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in all versions up to, and including, 1.3.8.9. This makes it possible for unauthenticated attackers to bypass the plugin's blacklist and upload .phar or other dangerous file types on the affected site's server, which may make remote code execution possible on the servers that are configured to handle .phar files as executable PHP scripts, particularly in default Apache+mod_php configurations where the file extension is not strictly validated before being passed to the PHP interpreter.
tags: cve,cve2025,wordpress,wp,contact-form-7,file-upload,intrusive,vkev,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/contact/"
- "{{BaseURL}}/contact-us/"
- "{{BaseURL}}/submit/"
- "{{BaseURL}}/support/"
- "{{BaseURL}}/form/"
- "{{BaseURL}}/get-in-touch/"
matchers:
- type: word
words:
- "wpcf7-drag-n-drop-file"
part: body
- method: POST
path:
- "{{BaseURL}}/wp-admin/admin-ajax.php"
matchers:
- type: word
words:
- ""success":true"
part: body
- method: GET
path:
- "{{RootURL}}/wp-content/uploads/wp_dndcf7_uploads/wpcf7-files/{{uploaded_file}}"
matchers:
- type: word
words:
- "{{phar_marker}}"
part: body
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/readme.txt"
matchers:
- type: word
words:
- "Drag and Drop Multiple File Upload"
- "Stable tag:"
condition: and
- type: dsl
|
cve
|
high
|
CVE-2025-3515
|
Generate a Nuclei template for: Ambassador Edge Stack - Detect
|
Title: Ambassador Edge Stack - Detect
Summary: Ambassador Edge Stack - Detect. Ambassador Edge Stack is a Kubernetes-native API Gateway that delivers the scalability, security, and simplicity for some of the world's largest Kubernetes installations.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: ambassador-edgestack-detect
info:
name: Ambassador Edge Stack - Detect
author: ja1sh
severity: info
description: Ambassador Edge Stack is a Kubernetes-native API Gateway that delivers the scalability, security, and simplicity for some of the world's largest Kubernetes installations.
tags: tech,ambassador,gateway,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "Ambassador Edge Stack</p>"
part: body
- type: status
status:
- 200
condition: or
|
generic
|
info
|
ambassador-edgestack-detect
|
Generate a Nuclei template for: Unrestricted CIFS Access in Azure NSGs
|
Title: Unrestricted CIFS Access in Azure NSGs
Summary: Unrestricted CIFS Access in Azure NSGs. Ensure that Microsoft Azure network security groups (NSGs) do not allow unrestricted access on TCP port 445, used by Common Internet File System (CIFS), to prevent unauthorized access.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: azure-nsg-cifs-unrestricted
info:
name: Unrestricted CIFS Access in Azure NSGs
author: princechaddha
severity: high
description: Ensure that Microsoft Azure network security groups (NSGs) do not allow unrestricted access on TCP port 445, used by Common Internet File System (CIFS), to prevent unauthorized access.
tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
high
|
azure-nsg-cifs-unrestricted
|
Generate a Nuclei template for CVE-2022-37153
|
Title: Cross-Site Scripting (XSS) in articatech artica_proxy
Summary: An issue was discovered in Artica Proxy 4.30.000000. There is a XSS vulnerability via the password parameter in /fw.login.php.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: articatech artica_proxy
Indicators: error, vulnerability detected
|
id: CVE-2022-37153
info:
name: Artica Proxy 4.30.000000 - Cross-Site Scripting
author: arafatansari
severity: medium
description: Artica Proxy 4.30.000000 contains a cross-site scripting vulnerability via the password parameter in /fw.login.php.
tags: cve,cve2022,xss,artica,articatech,vkev,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "Password" value="admin"><script>alert(document.domain)</script>"
- "Artica Web"
part: body
condition: and
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2022-37153
|
Generate a Nuclei template for: Content-Security-Policy Bypass - Quantserve Secure
|
Title: Content-Security-Policy Bypass - Quantserve Secure
Summary: Content-Security-Policy Bypass - Quantserve Secure
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: quantserve-secure-csp-bypass
info:
name: Content-Security-Policy Bypass - Quantserve Secure
author: renniepak,DhiyaneshDK
severity: medium
description: Content-Security-Policy Bypass - Quantserve Secure
tags: xss,csp-bypass,quantserve-secure,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "Content-Security-Policy"
- "quantserve.com"
part: header
condition: and
|
generic
|
medium
|
quantserve-secure-csp-bypass
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: americanthinker
info:
name: AmericanThinker User Name Information - Detect
author: dwisiswant0
severity: info
description: AmericanThinker user name information check was conducted.
tags: osint,osint-political,americanthinker,discovery
http:
- method: GET
path:
- "https://www.americanthinker.com/author/{{user}}/"
matchers:
- type: status
status:
- 200
- type: word
words:
- "Articles &"
part: body
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: Zhiyuan Oa Unauthorized
|
Title: Zhiyuan Oa Unauthorized
Summary: Zhiyuan Oa Unauthorized. Zhiyuan Oa is exposed.. Tags: seeyon, unauth, zhiyuan
Vulnerability Type: Security Check
Severity: low
Indicators: vulnerability detected
|
id: zhiyuan-oa-unauthorized
info:
name: Zhiyuan Oa Unauthorized
author: pikpikcu
severity: low
description: Zhiyuan Oa is exposed.
tags: seeyon,unauth,zhiyuan,misconfig,vuln
http:
- method: GET
path:
- "{{BaseURL}}/seeyon/personalBind.do.jpg/..;/ajax.do?method=ajaxAction&managerName=mMOneProfileManager&managerMethod=getOAProfile"
matchers:
- type: word
words:
- "serverIdentifier"
- "companyName"
condition: and
- type: word
words:
- "application/json"
part: header
- type: status
status:
- 200
|
generic
|
low
|
zhiyuan-oa-unauthorized
|
Generate a Nuclei template for CVE-2020-11441
|
Title: Vulnerability (CWE-74) in phpmyadmin phpmyadmin
Summary: phpMyAdmin 5.0.2 allows CRLF injection, as demonstrated by %0D%0Astring%0D%0A inputs to login form fields causing CRLF sequences to be reflected on an error page. NOTE: the vendor states "I don't see anything specifically exploitable.
Vulnerability Type: Vulnerability (CWE-74)
Severity: medium
Affected Products: phpmyadmin phpmyadmin
Indicators: error
|
id: CVE-2020-11441
info:
name: phpMyAdmin 5.0.2 - CRLF Injection
author: ritikchaddha
severity: medium
description: phpMyAdmin 5.0.2 allows CRLF injection, as demonstrated by %0D%0Astring%0D%0A inputs to login form fields causing CRLF sequences to be reflected on an error page. NOTE: the vendor states "I don't see anything specifically exploitable.
tags: cve,crlf,phpmyadmin,cve2020,vuln
http:
- method: GET
path:
matchers:
- type: regex
part: body
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2020-11441
|
Generate a Nuclei template for CVE-2017-17043
|
Title: Cross-Site Scripting (XSS) in zitec emag_marketplace_connector
Summary: The Emag Marketplace Connector plugin 1.0.0 for WordPress has reflected XSS because the parameter "post" to /wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.php is not filtered correctly.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: zitec emag_marketplace_connector
Indicators: error, vulnerability detected
|
id: CVE-2017-17043
info:
name: WordPress Emag Marketplace Connector 1.0 - Cross-Site Scripting
author: daffainfo
severity: medium
description: WordPress Emag Marketplace Connector plugin 1.0 contains a reflected cross-site scripting vulnerability because the parameter "post" to /wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.php is not filtered correctly.
tags: cve,cve2017,xss,wp-plugin,packetstorm,wordpress,zitec,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "/wp-content/plugins/emag-marketplace-connector/"
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.php?post=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
matchers:
- type: word
words:
- "</script><script>alert(document.domain)</script>"
part: body
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2017-17043
|
Generate a Nuclei template for: SonarQube Cloud Token Disclosure
|
Title: SonarQube Cloud Token Disclosure
Summary: SonarQube Cloud Token Disclosure. Tags: exposure, token, sonarqube
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: sonarqube-cloud-token
info:
name: SonarQube Cloud Token Disclosure
author: DhiyaneshDk
severity: high
description: SonarQube Cloud Token Disclosure
tags: exposure,token,sonarqube,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: regex
part: body
- method: GET
path:
matchers:
- type: dsl
condition: and
|
generic
|
high
|
sonarqube-cloud-token
|
Generate a Nuclei template for CVE-2022-46443
|
Title: SQL Injection in bangresto_project bangresto
Summary: mesinkasir Bangresto 1.0 is vulnberable to SQL Injection via the itemqty%5B%5D parameter.
Vulnerability Type: SQL Injection
Severity: high
Affected Products: bangresto_project bangresto
Indicators: error, vulnerability detected
|
id: CVE-2022-46443
info:
name: Bangresto - SQL Injection
author: Harsh
severity: high
description: Bangresto 1.0 is vulnberable to SQL Injection via the itemqty%5B%5D parameter.
tags: cve,cve2022,bangresto,sqli,bangresto_project,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "{{md5({{num}})}}"
|
cve
|
high
|
CVE-2022-46443
|
Generate a Nuclei template for: ActionTrail Log Buckets - Publicly Exposed
|
Title: ActionTrail Log Buckets - Publicly Exposed
Summary: ActionTrail Log Buckets - Publicly Exposed. Identify any publicly accessible ActionTrail trail log buckets in order to determine if your Alibaba Cloud account could be at risk. A publicly accessible trail bucket is a bucket were all users, including anonymous users, can perform read and write operations on the objects within the bucket.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: public-actiontrail-bucket
info:
name: ActionTrail Log Buckets - Publicly Exposed
author: ritikchaddha
severity: high
description: Identify any publicly accessible ActionTrail trail log buckets in order to determine if your Alibaba Cloud account could be at risk. A publicly accessible trail bucket is a bucket were all users, including anonymous users, can perform read and write operations on the objects within the bucket.
tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,actiontrail
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
high
|
public-actiontrail-bucket
|
Generate a Nuclei template for: Phinx Configuration Exposure
|
Title: Phinx Configuration Exposure
Summary: Phinx Configuration Exposure. Phinx configuration file was exposed.
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: phinx-config
info:
name: Phinx Configuration Exposure
author: DhiyaneshDk
severity: medium
description: Phinx configuration file was exposed.
tags: devops,exposure,files,vuln
http:
- method: GET
path:
- "{{BaseURL}}/phinx.yml"
matchers:
- type: word
words:
- "paths:"
- "environments:"
- "development:"
part: body
condition: and
- type: status
status:
- 200
|
generic
|
medium
|
phinx-config
|
Generate a Nuclei template to detect Path Traversal
|
Title: Path Traversal (CWE-22)
Summary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as ".." and "/" separators, attackers can escap
Vulnerability Type: Path Traversal
Severity: high
Indicators: unexpected
|
id: vmware-vcenter-lfi-linux
info:
name: Linux Vmware Vcenter - Local File Inclusion
author: PR3R00T
severity: high
description: Linux appliance based Vmware Vcenter is vulnerable to local file inclusion.
tags: vmware,lfi,vcenter,linux,vuln
http:
- method: GET
path:
- "{{BaseURL}}/eam/vib?id=/etc/passwd"
matchers:
- type: regex
|
cwe
|
high
|
CWE-22
|
Generate a Nuclei template for: Discuz Panel - Detection
|
Title: Discuz Panel - Detection
Summary: Discuz Panel - Detection. Tags: panel, discuz, detect
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: discuz-panel
info:
name: Discuz Panel - Detection
author: ritikchaddha
severity: info
description: Discuz Panel - Detection
tags: panel,discuz,detect,login,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "discuz_uid ="
- "discuz</a>"
- "Powered by Discuz!"
- "content="Discuz"
part: body
condition: or
|
generic
|
info
|
discuz-panel
|
Generate a Nuclei template to detect Path Traversal
|
Title: Path Traversal (CWE-22)
Summary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as ".." and "/" separators, attackers can escap
Vulnerability Type: Path Traversal
Severity: high
Indicators: unexpected
|
id: pacsone-server-lfi
info:
name: PACSOne Server 6.6.2 - Local File Inclusion
author: 0x_Akoko
severity: high
description: PACSOne Server 6.6.2 is vulnerable to local file inclusion via its integrated DICOM Web Viewer.
tags: pacsone,lfi,vuln
http:
- method: GET
path:
- "{{BaseURL}}/pacsone/nocache.php?path=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2f.%2fzpx%2f..%2fpasswd"
matchers:
- type: regex
- type: status
status:
- 200
|
cwe
|
high
|
CWE-22
|
Generate a Nuclei template for CVE-2023-26067
|
Title: Vulnerability (CWE-20) in lexmark cxtpc_firmware and others
Summary: Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 1 of 4).
Vulnerability Type: Vulnerability (CWE-20)
Severity: high
Affected Products: lexmark cxtpc_firmware, lexmark cstpc_firmware, lexmark mxtct_firmware
Indicators: error, vulnerability detected
|
id: CVE-2023-26067
info:
name: Lexmark Printers - Command Injection
author: DhiyaneshDK
severity: high
description: Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 1 of 4).
tags: cve2023,cve,printer,iot,lexmark,vkev,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
high
|
CVE-2023-26067
|
Generate a Nuclei template for CVE-2020-11515
|
Title: Vulnerability (CWE-601) in rankmath seo
Summary: The Rank Math plugin through 1.0.40.2 for WordPress allows unauthenticated remote attackers to create new URIs (that redirect to an external web site) via the unsecured rankmath/v1/updateRedirection REST API endpoint. In other words, this is not an "Open Redirect" issue; instead, it allows the attacker to create a new URI with an arbitrary name (e.g., the /exampleredirect URI).
Vulnerability Type: Vulnerability (CWE-601)
Severity: medium
Affected Products: rankmath seo
Indicators: error, vulnerability detected
|
id: CVE-2020-11515
info:
name: Rank Math SEO <= 1.0.40.2 - Redirect Creation via Unprotected REST API Endpoint
author: s4e-io
severity: medium
description: The Rank Math plugin through 1.0.40.2 for WordPress allows unauthenticated remote attackers to create new URIs (that redirect to an external web site) via the unsecured rankmath/v1/updateRedirection REST API endpoint. In other words, this is not an "Open Redirect" issue; instead, it allows the attacker to create a new URI with an arbitrary name (e.g., the /exampleredirect URI).
tags: cve,cve2020,wordpress,wordfence,redirect,seo-by-rank-math,wp-plugin,wp,vkev,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
medium
|
CVE-2020-11515
|
Generate a Nuclei template for CVE-2023-24657
|
Title: Cross-Site Scripting (XSS) in phpipam phpipam
Summary: phpipam v1.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the closeClass parameter at /subnet-masks/popup.php.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: phpipam phpipam
Indicators: error, vulnerability detected
|
id: CVE-2023-24657
info:
name: phpIPAM - 1.6 - Cross-Site Scripting
author: r3Y3r53
severity: medium
description: phpIPAM 1.6 contains a cross-site scripting vulnerability via the closeClass parameter at /subnet-masks/popup.php. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
tags: cve2023,cve,xss,phpipam,authenticated,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
medium
|
CVE-2023-24657
|
Generate a Nuclei template for: SpotWeb Login Panel - Detect
|
Title: SpotWeb Login Panel - Detect
Summary: SpotWeb Login Panel - Detect. Tags: panel, spotweb, detect
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: spotweb-login-panel
info:
name: SpotWeb Login Panel - Detect
author: theamanrawat
severity: info
description: SpotWeb Login Panel - Detect
tags: panel,spotweb,detect,spotweb_project,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "SpotWeb - overview"
- "initSpotwebJs"
part: body
condition: or
- type: status
status:
- 200
|
generic
|
info
|
spotweb-login-panel
|
Generate a Nuclei template for: Petya Malware (Variant Bitcoin) - Detect
|
Title: Petya Malware (Variant Bitcoin) - Detect
Summary: Petya Malware (Variant Bitcoin) - Detect. Tags: malware, file, petya
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: petya-malware-variant-bitcoin
info:
name: Petya Malware (Variant Bitcoin) - Detect
author: daffainfo
severity: info
description: Petya Malware (Variant Bitcoin) - Detect
tags: malware,file,petya
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
petya-malware-variant-bitcoin
|
Generate a Nuclei template for: Windows Admin Center Panel - Detection
|
Title: Windows Admin Center Panel - Detection
Summary: Windows Admin Center Panel - Detection. Detect Windows Admin Center Panel web interface.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: windows-admin-center-panel
info:
name: Windows Admin Center Panel - Detection
author: darses
severity: info
description: Detect Windows Admin Center Panel web interface.
tags: detect,windows,panel,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: status
status:
- 403
- type: word
words:
- "Windows Admin Center</title>"
part: body
|
generic
|
info
|
windows-admin-center-panel
|
Generate a Nuclei template for: DNSSEC RSASHA1 Algorithm Deprecated Usage
|
Title: DNSSEC RSASHA1 Algorithm Deprecated Usage
Summary: DNSSEC RSASHA1 Algorithm Deprecated Usage. Ensure that Domain Name System Security Extensions (DNSSEC) feature is not using the deprecated RSASHA1 algorithm for the Key-Signing Key (KSK) associated with your DNS managed zone file.
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: gcloud-dnssec-keysigning-rsasha1
info:
name: DNSSEC RSASHA1 Algorithm Deprecated Usage
author: princechaddha
severity: medium
description: Ensure that Domain Name System Security Extensions (DNSSEC) feature is not using the deprecated RSASHA1 algorithm for the Key-Signing Key (KSK) associated with your DNS managed zone file.
tags: cloud,devops,gcp,gcloud,dns,dnssec,gcp-cloud-config,discovery
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
medium
|
gcloud-dnssec-keysigning-rsasha1
|
Generate a Nuclei template for CVE-2021-45793
|
Title: SQL Injection in slims senayan_library_management_system
Summary: Slims9 Bulian 9.4.2 is affected by SQL injection in lib/comment.inc.php. User data can be obtained.
Vulnerability Type: SQL Injection
Severity: high
Affected Products: slims senayan_library_management_system
Indicators: error, vulnerability detected
|
id: CVE-2021-45793
info:
name: Slims9 Bulian 9.4.2 - SQL Injection
author: nblirwn
severity: high
description: Slims9 Bulian 9.4.2 is affected by SQL injection in lib/comment.inc.php. User data can be obtained.
tags: cve2021,cve,slims,sqli,vuln
http:
- method: GET
path:
matchers:
- type: status
status:
- 200
- method: GET
path:
matchers:
- type: status
status:
- 200
- method: GET
path:
matchers:
- type: word
words:
- "c8c605999f3d8352d7bb792cf3fd"
part: body
- type: status
status:
- 200
|
cve
|
high
|
CVE-2021-45793
|
Generate a Nuclei template for: Query JCR role via QueryBuilder Servlet
|
Title: Query JCR role via QueryBuilder Servlet
Summary: Query JCR role via QueryBuilder Servlet. Tags: aem, misconfig, vuln
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: aem-jcr-querybuilder
info:
name: Query JCR role via QueryBuilder Servlet
author: DhiyaneshDk
severity: info
description: Query JCR role via QueryBuilder Servlet
tags: aem,misconfig,vuln
http:
- method: GET
path:
matchers:
- type: status
status:
- 200
- type: word
words:
- ""success":true"
- "jcr:uuid"
condition: and
|
generic
|
info
|
aem-jcr-querybuilder
|
Generate a Nuclei template for: Travis CI Disclosure
|
Title: Travis CI Disclosure
Summary: Travis CI Disclosure. Travis CI is a Software as a Service (SaaS) based continuous integration service used to build and test software projects. By defining a configuration file named `.travis.yml` in their source code repositories, developers can customize their applications build workflows.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: travis-ci-disclosure
info:
name: Travis CI Disclosure
author: DhiyaneshDK,AmirHossein Raeisi
severity: high
description: Travis CI is a Software as a Service (SaaS) based continuous integration service used to build and test software projects. By defining a configuration file named `.travis.yml` in their source code repositories, developers can customize their applications build workflows.
tags: exposure,file,config,tenable,vuln
http:
- method: GET
path:
- "{{BaseURL}}/.travis.yml"
- "{{BaseURL}}/matomo/.travis.yml"
- "{{BaseURL}}/ckeditor/.travis.yml"
matchers:
- type: word
words:
- "before_script:"
- "jobs:"
- "language:"
part: body
condition: and
- type: word
words:
- "application/octet-stream"
part: header
- type: status
status:
- 200
|
generic
|
high
|
travis-ci-disclosure
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: ektron-cms-panel
info:
name: Ektron CMS Login Panel - Detect
author: pikpikcu
severity: info
description: Ektron CMS login panel was detected.
tags: panel,ektron,cms,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "EktronClientManager"
- "ektronTheme"
- "Ektron.ready"
part: body
condition: or
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: bimpos
info:
name: Bimpos User Name Information - Detect
author: dwisiswant0
severity: info
description: Bimpos user name information check was conducted.
tags: osint,osint-tech,bimpos,discovery
http:
- method: GET
path:
- "https://ask.bimpos.com/user/{{user}}"
matchers:
- type: status
status:
- 200
- type: word
words:
- "<title>User "
part: body
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: Content-Security-Policy Bypass - Azure Inno
|
Title: Content-Security-Policy Bypass - Azure Inno
Summary: Content-Security-Policy Bypass - Azure Inno. Tags: xss, csp-bypass, azure-inno
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: azure-inno-csp-bypass
info:
name: Content-Security-Policy Bypass - Azure Inno
author: renniepak,DhiyaneshDK
severity: medium
description: Content-Security-Policy Bypass - Azure Inno
tags: xss,csp-bypass,azure-inno,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "Content-Security-Policy"
- "azure.com"
part: header
condition: and
|
generic
|
medium
|
azure-inno-csp-bypass
|
Generate a Nuclei template for CVE-2021-27310
|
Title: Cross-Site Scripting (XSS) in csphere clansphere
Summary: Clansphere CMS 2011.4 allows unauthenticated reflected XSS via "language" parameter.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: csphere clansphere
Indicators: error, vulnerability detected
|
id: CVE-2021-27310
info:
name: Clansphere CMS 2011.4 - Cross-Site Scripting
author: alph4byt3
severity: medium
description: Clansphere CMS 2011.4 contains an unauthenticated reflected cross-site scripting vulnerability via the "language" parameter.
tags: cve2021,cve,xss,clansphere,csphere,vuln
http:
- method: GET
path:
- "{{BaseURL}}/clansphere/mods/clansphere/lang_modvalidate.php?language=language%27%22()%26%25%3Cyes%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&module=module"
matchers:
- type: word
words:
- "</script><script>alert(document.domain)</script>"
part: body
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2021-27310
|
Generate a Nuclei template for CVE-2020-36719
|
Title: Missing Authorization in cridio listingpro
Summary: The ListingPro - WordPress Directory & Listing Theme for WordPress is vulnerable to Arbitrary Plugin Installation, Activation and Deactivation in versions before 2.6.1. This is due to a missing capability check on the lp_cc_addons_actions function. This makes it possible for unauthenticated attackers to arbitrarily install, activate and deactivate any plugin.
Vulnerability Type: Missing Authorization
Severity: critical
Affected Products: cridio listingpro
Indicators: error, vulnerability detected
|
id: CVE-2020-36719
info:
name: ListingPro < 2.6.1 - Arbitrary Plugin Installation/Activation/Deactivation
author: ritikchaddha
severity: critical
description: The ListingPro - WordPress Directory & Listing Theme for WordPress is vulnerable to Arbitrary Plugin Installation, Activation and Deactivation in versions before 2.6.1. This is due to a missing capability check on the lp_cc_addons_actions function. This makes it possible for unauthenticated attackers to arbitrarily install, activate and deactivate any plugin.
tags: cve,cve2020,wp,wp-pluginwordpress,listingpro,passive,vkev,vuln
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/themes/listingpro/style.css"
matchers:
- type: word
words:
- "ListingPro"
- "Version:"
part: body
condition: and
- type: dsl
condition: and
|
cve
|
critical
|
CVE-2020-36719
|
Generate a Nuclei template for: DotJS - Out of Band Template Injection
|
Title: DotJS - Out of Band Template Injection
Summary: DotJS - Out of Band Template Injection. Tags: ssti, dast, oast
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: dotjs-oob
info:
name: DotJS - Out of Band Template Injection
author: 0xAwali,DhiyaneshDK
severity: high
description: DotJS - Out of Band Template Injection
tags: ssti,dast,oast,oob,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
generic
|
high
|
dotjs-oob
|
Generate a Nuclei template for: FirstClass FTP Service - Detect
|
Title: FirstClass FTP Service - Detect
Summary: FirstClass FTP Service - Detect. FirstClass FTP service was detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: firstclass-ftp-detect
info:
name: FirstClass FTP Service - Detect
author: pussycat0x
severity: info
description: FirstClass FTP service was detected.
tags: network,ftp,firstclass,detect,tcp,discovery
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
firstclass-ftp-detect
|
Generate a Nuclei template for CVE-2022-34047
|
Title: Vulnerability (CWE-668) in wavlink wl-wn530hg4_firmware
Summary: An access control issue in Wavlink WN530HG4 M30HG4.V5030.191116 allows attackers to obtain usernames and passwords via view-source:http://IP_ADDRESS/set_safety.shtml?r=52300 and searching for [var syspasswd].
Vulnerability Type: Vulnerability (CWE-668)
Severity: high
Affected Products: wavlink wl-wn530hg4_firmware
Indicators: error, vulnerability detected
|
id: CVE-2022-34047
info:
name: WAVLINK WN530HG4 - Improper Access Control
author: For3stCo1d
severity: high
description: WAVLINK WN530HG4 M30HG4.V5030.191116 is susceptible to improper access control. An attacker can obtain usernames and passwords via view-source:http://IP_ADDRESS/set_safety.shtml?r=52300 and searching for [var syspasswd] and thereby possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
tags: cve,cve2022,wavlink,router,exposure,packetstorm,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "var syspasswd=""
- "<title>APP</title>"
part: body
condition: and
- type: status
status:
- 200
|
cve
|
high
|
CVE-2022-34047
|
Generate a Nuclei template for CVE-2024-55417
|
Title: Unrestricted File Upload in thecontrolgroup voyager
Summary: DevDojo Voyager through version 1.8.0 is vulnerable to bypassing the file type verification when an authenticated user uploads a file via /admin/media/upload. An authenticated user can upload a web shell causing arbitrary code execution on the server.
Vulnerability Type: Unrestricted File Upload
Severity: medium
Affected Products: thecontrolgroup voyager
Indicators: error, vulnerability detected
|
id: CVE-2024-55417
info:
name: DevDojo Voyager <= 1.8.0 - Arbitrary File Write vulnerability
author: iamnoooob,rootxharsh,pdresearch
severity: high
description: DevDojo Voyager through version 1.8.0 is vulnerable to bypassing the file type verification when an authenticated user uploads a file via /admin/media/upload. An authenticated user can upload a web shell causing arbitrary code execution on the server.
tags: cve,cve2024,intrusive,devdojo,voyager,file-upload,authenticated,vuln
http:
- method: GET
path:
matchers:
- type: status
status:
- 200
- method: GET
path:
matchers:
- type: dsl
condition: and
- method: GET
path:
matchers:
- type: status
status:
- 200
- method: GET
path:
matchers:
- type: word
words:
- "Encoding format (php) is not supported."
part: body
- method: GET
path:
matchers:
- type: word
words:
- "{{randstr}}"
part: body
|
cve
|
medium
|
CVE-2024-55417
|
Generate a Nuclei template to detect Cross-site Scripting
|
Title: Cross-site Scripting (CWE-79)
Summary: The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. There are many variants of cross-site scripting, characterized by a variety of terms or involving different attack topologies. However, they all indicate the same fundamental weakness: improper neutralization of dangerous input between the adversary and a victim.
Vulnerability Type: Cross-site Scripting
Severity: high
Indicators: vulnerability detected, error
|
id: my-chatbot-xss
info:
name: WordPress My Chatbot <= 1.1 - Cross-Site Scripting
author: dhiyaneshDk
severity: high
description: WordPress My Chatbot <= 1.1 is susceptible to cross-site scripting. The plugin does not sanitize or escape its tab parameter in the Settings page before outputting it back in an attribute.
tags: wordpress,wp-plugin,xss,authenticated,wpscan,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "</script><script>alert(document.domain)</script>"
part: body
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
|
cwe
|
high
|
CWE-79
|
Generate a Nuclei template for: OpenAI Admin API Key Detection
|
Title: OpenAI Admin API Key Detection
Summary: OpenAI Admin API Key Detection. Tags: openai, exposure, tokens
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: openai-admin-api-key
info:
name: OpenAI Admin API Key Detection
author: Chemo850
severity: info
description: OpenAI Admin API Key Detection
tags: openai,exposure,tokens,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
openai-admin-api-key
|
Generate a Nuclei template for: Frappe Helpdesk Login Panel - Detect
|
Title: Frappe Helpdesk Login Panel - Detect
Summary: Frappe Helpdesk Login Panel - Detect. Frappe Helpdesk products was detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: frappe-helpdesk-panel
info:
name: Frappe Helpdesk Login Panel - Detect
author: righettod
severity: info
description: Frappe Helpdesk products was detected.
tags: panel,frappe,login,discovery
http:
- method: GET
path:
- "{{BaseURL}}/helpdesk/login"
matchers:
- type: dsl
condition: and
|
generic
|
info
|
frappe-helpdesk-panel
|
Generate a Nuclei template for CVE-2020-36705
|
Title: Unknown Vulnerability in tunasite adning_advertising
Summary: The Adning Advertising plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the _ning_upload_image function in versions up to, and including, 1.5.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
Vulnerability Type: Unknown Vulnerability
Severity: critical
Affected Products: tunasite adning_advertising
Indicators: error, vulnerability detected
|
id: CVE-2020-36705
info:
name: Adning Advertising <= 1.5.5 - Arbitrary File Upload
author: DhiyaneshDK
severity: critical
description: The Adning Advertising plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the _ning_upload_image function in versions up to, and including, 1.5.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
tags: cve,cve2020,wordpress,wp-plugin,angwp,wp,passive,vkev,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
critical
|
CVE-2020-36705
|
Generate a Nuclei template for: Dropbox API Token
|
Title: Dropbox API Token
Summary: Dropbox API Token. Tags: dropbox, exposure, tokens
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: dropbox-token
info:
name: Dropbox API Token
author: DhiyaneshDK
severity: info
description: Dropbox API Token
tags: dropbox,exposure,tokens,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
dropbox-token
|
Generate a Nuclei template for CVE-2020-11853
|
Title: Unknown Vulnerability in microfocus operation_bridge_manager and others
Summary: Arbitrary code execution vulnerability affecting multiple Micro Focus products. 1.) Operation Bridge Manager affecting version: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, versions 10.6x and 10.1x and older versions. 2.) Application Performance Management affecting versions : 9.51, 9.50 and 9.40 with uCMDB 10.33 CUP 3 3.) Data Center Automation affected version 2019.11 4.) Operations Bridge (containerized) affecting versions: 2019.11, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05, 2018.02, 2017.11 5.) Universal CMDB affecting version: 2020.05, 2019.11, 2019.05, 2019.02, 2018.11, 2018.08, 2018.05, 11, 10.33, 10.32, 10.31, 10.30 6.) Hybrid Cloud Management affecting version 2020.05 7.) Service Management Automation affecting version 2020.5 and 2020.02. The vulnerability could allow to execute arbitrary code.
Vulnerability Type: Unknown Vulnerability
Severity: high
Affected Products: microfocus operation_bridge_manager, microfocus operations_bridge_manager, hp universal_cmbd_foundation
Indicators: error, vulnerability detected
|
id: micro-focus-workflow
info:
name: Micro Focus Checks
author: dwisiswant0
severity: info
description: A simple workflow that runs all Micro Focus related nuclei templates on a given target.
tags: unknown
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
cve
|
high
|
CVE-2020-11853
|
Generate a Nuclei template for CVE-2023-51713
|
Title: Vulnerability (CWE-125) in proftpd proftpd
Summary: make_ftp_cmd in main.c in ProFTPD before 1.3.8a has a one-byte out-of-bounds read, and daemon crash, because of mishandling of quote/backslash semantics.
Vulnerability Type: Vulnerability (CWE-125)
Severity: high
Affected Products: proftpd proftpd
Indicators: error, vulnerability detected
|
id: CVE-2023-51713
info:
name: ProFTPD < 1.3.8a - DoS via Out-of-Bounds Read
author: pussycat0x
severity: high
description: ProFTPD versions before 1.3.8a contain a one-byte out-of-bounds read vulnerability in the make_ftp_cmd function within main.c. This vulnerability can lead to a daemon crash, causing denial of service.
tags: cve,cve2023,network,ftp,proftpd,tcp,passive,vuln
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
cve
|
high
|
CVE-2023-51713
|
Generate a Nuclei template for: Gradle Library Version Disclosure
|
Title: Gradle Library Version Disclosure
Summary: Gradle Library Version Disclosure. Tags: file, gradle, exposure
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: gradle-libs
info:
name: Gradle Library Version Disclosure
author: DhiyaneshDK
severity: info
description: Gradle Library Version Disclosure
tags: file,gradle,exposure,vuln
http:
- method: GET
path:
- "{{BaseURL}}/gradle/libs.versions.toml"
- "{{BaseURL}}/libs.versions.toml"
matchers:
- type: word
words:
- "[versions]"
- "[libraries]"
- "[bundles]"
part: body
condition: and
- type: status
status:
- 200
|
generic
|
info
|
gradle-libs
|
Generate a Nuclei template for CVE-2010-3867
|
Title: Path Traversal in proftpd proftpd
Summary: Multiple directory traversal vulnerabilities in the mod_site_misc module in ProFTPD before 1.3.3c allow remote authenticated users to create directories, delete directories, create symlinks, and modify file timestamps via directory traversal sequences in a (1) SITE MKDIR, (2) SITE RMDIR, (3) SITE SYMLINK, or (4) SITE UTIME command.
Vulnerability Type: Path Traversal
Severity: high
Affected Products: proftpd proftpd
Indicators: error, vulnerability detected
|
id: CVE-2010-3867
info:
name: ProFTPD < 1.3.3c - Directory Traversal via mod_site_misc
author: pussycat0x
severity: high
description: ProFTPD versions before 1.3.3c contain directory traversal vulnerabilities in the mod_site_misc module. The vulnerability allows attackers to traverse directories and potentially overwrite arbitrary files on the system through crafted input to commands like SITE MKDIR and other SITE commands.
tags: cve,cve2010,network,ftp,proftpd,tcp,passive,lfi,vuln
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
cve
|
high
|
CVE-2010-3867
|
Generate a Nuclei template for: Headless Http Screenshot
|
Title: Headless Http Screenshot
Summary: Headless Http Screenshot. Takes a screenshot of the specified URLS.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: screenshot
info:
name: Headless Http Screenshot
author: V0idC0de,righettod,tarunKoyalwar
severity: info
description: Takes a screenshot of the specified URLS.
tags: headless,screenshot,discovery
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
screenshot
|
Generate a Nuclei template for: FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider Detection
|
Title: FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider Detection
Summary: FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider Detection
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: wordpress-fluent-smtp
info:
name: FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider Detection
author: ricardomaia
severity: info
description: FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider Detection
tags: tech,wordpress,wp-plugin,top-200,discovery
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/fluent-smtp/readme.txt"
matchers:
- type: dsl
- type: regex
part: body
|
generic
|
info
|
wordpress-fluent-smtp
|
Generate a Nuclei template for CVE-2023-1263
|
Title: Information Disclosure in niteothemes coming_soon_\&_maintenance
Summary: The CMP – Coming Soon & Maintenance plugin for WordPress is vulnerable to Information Exposure in versions up to, and including, 4.1.6 via the cmp_get_post_detail function. This can allow unauthenticated individuals to obtain the contents of any non-password-protected, published post or page even when maintenance mode is enabled.
Vulnerability Type: Information Disclosure
Severity: medium
Affected Products: niteothemes coming_soon_\&_maintenance
Indicators: error, vulnerability detected
|
id: CVE-2023-1263
info:
name: Coming Soon & Maintenance < 4.1.7 - Unauthenticated Post/Page Access
author: r3Y3r53
severity: medium
description: The plugin does not restrict access to published and non protected posts/pages when the maintenance mode is enabled, allowing unauthenticated users to access them.
tags: cve,cve2023,wordpress,wpscan,wp-plugin,wp,cmp-coming-soon-maintenance,unauth,niteothemes,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- ""img":"
- ""date":"
- ""title":"
part: body
condition: and
- type: word
words:
- "application/json"
part: header
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2023-1263
|
Generate a Nuclei template for CVE-2023-38879
|
Title: Path Traversal in os4ed opensis
Summary: The Community Edition version 9.0 of OS4ED's openSIS Classic allows remote attackers to read arbitrary files via a directory traversal vulnerability in the 'filename' parameter of 'DownloadWindow.php'.
Vulnerability Type: Path Traversal
Severity: high
Affected Products: os4ed opensis
Indicators: error, vulnerability detected
|
id: CVE-2023-38879
info:
name: openSIS v9.0 - Path Traversal
author: haliteroglu
severity: high
description: A path traversal vulnerability exists in openSIS Classic Community Edition v9.0 via the 'filename' parameter in DownloadWindow.php. An unauthenticated remote attacker can exploit this to read arbitrary files on the server by manipulating file paths.
tags: cve,cve2023,opensis,lfi,vuln
http:
- method: GET
path:
- "{{BaseURL}}/DownloadWindow.php?filename=../../../../../../../../etc/passwd"
matchers:
- type: regex
part: body
- type: word
words:
- "filename="
- "text/html"
part: header
condition: and
- type: status
status:
- 200
|
cve
|
high
|
CVE-2023-38879
|
Generate a Nuclei template for: Kube API Namespaces
|
Title: Kube API Namespaces
Summary: Kube API Namespaces. Scans for kube namespaces. Tags: tech, k8s, kubernetes
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: kube-api-namespaces
info:
name: Kube API Namespaces
author: sharath
severity: info
description: Scans for kube namespaces
tags: tech,k8s,kubernetes,devops,kube,discovery
http:
- method: GET
path:
- "{{BaseURL}}/api/v1/namespaces"
matchers:
- type: status
status:
- 200
- type: word
words:
- ""NamespaceList":"
- ""items":"
part: body
condition: and
|
generic
|
info
|
kube-api-namespaces
|
Generate a Nuclei template for: Dropbox Long Lived API Token
|
Title: Dropbox Long Lived API Token
Summary: Dropbox Long Lived API Token. Tags: dropbox, exposure, tokens
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: dropbox-long-token
info:
name: Dropbox Long Lived API Token
author: DhiyaneshDK
severity: info
description: Dropbox Long Lived API Token
tags: dropbox,exposure,tokens,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
dropbox-long-token
|
Generate a Nuclei template to detect Insufficiently Protected Credentials
|
Title: Insufficiently Protected Credentials (CWE-522)
Summary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Vulnerability Type: Insufficiently Protected Credentials
Severity: medium
Indicators: unauthorized
|
id: google-earth-dlogin
info:
name: Google Earth Enterprise Default Login
author: orpheus,johnjhacking
severity: high
description: Google Earth Enterprise default login credentials were discovered.
tags: default-login,google-earth,vuln
http:
- method: GET
path:
matchers:
- type: status
status:
- 200
- type: word
words:
- "DashboardPanel"
- "Earth Enterprise Server"
condition: and
|
cwe
|
medium
|
CWE-522
|
Generate a Nuclei template for CVE-2020-8497
|
Title: Vulnerability (CWE-306) in artica pandora_fms
Summary: In Artica Pandora FMS through 7.42, an unauthenticated attacker can read the chat history. The file is in JSON format and it contains user names, user IDs, private messages, and timestamps.
Vulnerability Type: Vulnerability (CWE-306)
Severity: medium
Affected Products: artica pandora_fms
Indicators: error, vulnerability detected
|
id: CVE-2020-8497
info:
name: Artica Pandora FMS <=7.42 - Arbitrary File Read
author: gy741
severity: medium
description: Artica Pandora FMS through 7.42 is susceptible to arbitrary file read. An attacker can read the chat history, which is in JSON format and contains user names, user IDs, private messages, and timestamps. This can potentially lead to unauthorized data modification and other operations.
tags: cve,cve2020,fms,artica,vuln
http:
- method: GET
path:
- "{{BaseURL}}/pandora_console/attachment/pandora_chat.log.json.txt"
matchers:
- type: word
words:
- ""type""
- ""id_user""
- ""user_name""
- ""text""
part: body
condition: and
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2020-8497
|
Generate a Nuclei template for CVE-2022-2461
|
Title: Missing Authorization in transposh transposh_wordpress_translation
Summary: The Transposh WordPress Translation plugin for WordPress is vulnerable to unauthorized setting changes by unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient permissions checking on the 'tp_translation' AJAX action and default settings which makes it possible for unauthenticated attackers to influence the data shown on the site.
Vulnerability Type: Missing Authorization
Severity: medium
Affected Products: transposh transposh_wordpress_translation
Indicators: unauthorized
|
id: CVE-2022-2461
info:
name: Transposh WordPress Translation <= 1.0.8 - Unauthenticated Settings Change
author: riteshs4hu
severity: medium
description: The Transposh WordPress Translation plugin for WordPress is vulnerable to unauthorized setting changes by unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient permissions checking on the 'tp_translation' AJAX action and default settings which makes it possible for unauthenticated attackers to influence the data shown on the site.
tags: cve,cve2022,wordpress,wp-plugin,wp,wpscan,transposh-translation-filter-for-wordpress,info-leak,vkev,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
medium
|
CVE-2022-2461
|
Generate a Nuclei template for: BigQuery Datasets Not Encrypted with Customer-Managed Keys
|
Title: BigQuery Datasets Not Encrypted with Customer-Managed Keys
Summary: BigQuery Datasets Not Encrypted with Customer-Managed Keys. Ensure that the tables created for your Google Cloud BigQuery datasets are encrypted with Customer-Managed Keys (CMKs) to have more granular control over the data encryption/decryption process. Using CMKs allows you to create, rotate, manage, and destroy your own encryption keys using Google Cloud Key Management Service (Cloud KMS).
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: gcloud-bigquery-cmk-not-enabled
info:
name: BigQuery Datasets Not Encrypted with Customer-Managed Keys
author: princechaddha
severity: high
description: Ensure that the tables created for your Google Cloud BigQuery datasets are encrypted with Customer-Managed Keys (CMKs) to have more granular control over the data encryption/decryption process. Using CMKs allows you to create, rotate, manage, and destroy your own encryption keys using Google Cloud Key Management Service (Cloud KMS).
tags: cloud,devops,gcp,gcloud,bigquery,gcp-cloud-config
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
high
|
gcloud-bigquery-cmk-not-enabled
|
Generate a Nuclei template for: mcafee phishing Detection
|
Title: mcafee phishing Detection
Summary: mcafee phishing Detection. A mcafee phishing website was detected
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: mcafee-phish
info:
name: mcafee phishing Detection
author: rxerium
severity: info
description: A mcafee phishing website was detected
tags: phishing,mcafee,osint,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "Antivirus, VPN, Identity & Privacy Protection | McAfee"
- type: status
status:
- 200
- type: dsl
|
generic
|
info
|
mcafee-phish
|
Generate a Nuclei template for CVE-2022-31704
|
Title: Vulnerability (CWE-284) in vmware vrealize_log_insight
Summary: The vRealize Log Insight contains a broken access control vulnerability. An unauthenticated malicious actor can remotely inject code into sensitive files of an impacted appliance which can result in remote code execution.
Vulnerability Type: Vulnerability (CWE-284)
Severity: critical
Affected Products: vmware vrealize_log_insight
Indicators: error, vulnerability detected
|
id: CVE-2022-31704
info:
name: VMware vRealize Log Insight - Improper Access Control to RCE
author: ritikchaddha
severity: critical
description: The vRealize Log Insight contains a broken access control vulnerability. An unauthenticated malicious actor can remotely inject code into sensitive files of an impacted appliance which can result in remote code execution.
tags: cve,cve2022,vmware,vrealize,rce,lfi,passive,vkev,vuln
http:
- method: GET
path:
- "{{BaseURL}}/i18n/component/JS?locale=en-US"
- "{{BaseURL}}/api/v1/version"
matchers:
- type: dsl
condition: and
- type: dsl
condition: or
|
cve
|
critical
|
CVE-2022-31704
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.