instruction
stringlengths
41
188
input
stringlengths
165
3.12k
output
stringlengths
256
2.26M
category
stringclasses
3 values
severity
stringclasses
5 values
id
stringlengths
5
54
Generate a Nuclei template for CVE-2013-1965
Title: Code Injection in apache struts and others Summary: Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect. Vulnerability Type: Code Injection Severity: high Affected Products: apache struts, apache struts2-showcase Indicators: error, vulnerability detected
id: CVE-2013-1965 info: name: Apache Struts2 S2-012 RCE author: pikpikcu severity: critical description: Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect. tags: cve2013,cve,apache,rce,struts,ognl,vuln http: - method: POST path: - "{{BaseURL}}/user.action" matchers: - type: regex - type: status status: - 200
cve
high
CVE-2013-1965
Generate a Nuclei template for: Imsanity Detection
Title: Imsanity Detection Summary: Imsanity Detection. Tags: tech, wordpress, wp-plugin Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: wordpress-imsanity info: name: Imsanity Detection author: ricardomaia severity: info description: Imsanity Detection tags: tech,wordpress,wp-plugin,top-200,discovery http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/imsanity/readme.txt" matchers: - type: dsl - type: regex part: body
generic
info
wordpress-imsanity
Generate a Nuclei template for: vBulletin Security Checks
Title: vBulletin Security Checks Summary: vBulletin Security Checks. A simple workflow that runs all vBulletin related nuclei templates on a given target. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: vbulletin-workflow info: name: vBulletin Security Checks author: pdteam severity: info description: A simple workflow that runs all vBulletin related nuclei templates on a given target. tags: unknown http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
vbulletin-workflow
Generate a Nuclei template for CVE-2020-9425
Title: Vulnerability (CWE-670) in rconfig rconfig Summary: An issue was discovered in includes/head.inc.php in rConfig before 3.9.4. An unauthenticated attacker can retrieve saved cleartext credentials via a GET request to settings.php. Because the application was not exiting after a redirect is applied, the rest of the page still executed, resulting in the disclosure of cleartext credentials in the response. Vulnerability Type: Vulnerability (CWE-670) Severity: high Affected Products: rconfig rconfig Indicators: error, vulnerability detected
id: CVE-2020-9425 info: name: rConfig <3.9.4 - Sensitive Information Disclosure author: madrobot severity: high description: rConfig prior to version 3.9.4 is susceptible to sensitive information disclosure. An unauthenticated attacker can retrieve saved cleartext credentials via a GET request to settings.php. Because the application does not exit after a redirect is applied, the rest of the page still executes, resulting in the disclosure of cleartext credentials in the response. tags: cve,cve2020,rconfig.exposure,rconfig,vuln http: - method: GET path: - "{{BaseURL}}/settings.php" matchers: - type: word words: - "defaultNodeUsername" - "defaultNodePassword" part: body condition: and - type: status status: - 200
cve
high
CVE-2020-9425
Generate a Nuclei template for CVE-2024-0692
Title: Deserialization of Untrusted Data in solarwinds security_event_manager Summary: The SolarWinds Security Event Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse SolarWinds’ service, resulting in remote code execution. Vulnerability Type: Deserialization of Untrusted Data Severity: high Affected Products: solarwinds security_event_manager Indicators: error, vulnerability detected
id: CVE-2024-0692 info: name: SolarWinds Security Event Manager - Unauthenticated RCE author: DhiyaneshDK severity: high description: The SolarWinds Security Event Manager was susceptible to Remote Code Execution Vulnerability. This vulnerability allows an unauthenticated user to abuse SolarWinds’ service, resulting in remote code execution. tags: cve,cve2024,solarwinds,event-manager,cisa,vkev,vuln http: - method: GET path: matchers: - type: word words: - "SolarWinds Security Event Manager" part: body - method: GET path: matchers: - type: dsl condition: and
cve
high
CVE-2024-0692
Generate a Nuclei template to detect Path Traversal
Title: Path Traversal (CWE-22) Summary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as ".." and "/" separators, attackers can escap Vulnerability Type: Path Traversal Severity: high Indicators: unexpected
id: sl-studio-lfi info: name: Webbdesign SL-Studio - Local File Inclusion author: 0x_Akoko severity: high description: Webbdesign SL-Studio is vulnerable to local file inclusion. tags: slstudio,lfi,vuln http: - method: GET path: - "{{BaseURL}}/index.php?page=../../../../../../../../../../etc/passwd" matchers: - type: regex - type: status status: - 200
cwe
high
CWE-22
Generate a Nuclei template for: AWS S3 Buckets - Cloud Enumeration
Title: AWS S3 Buckets - Cloud Enumeration Summary: AWS S3 Buckets - Cloud Enumeration. Searches for open and protected buckets in AWS S3 Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: aws-s3-bucket-enum info: name: AWS S3 Buckets - Cloud Enumeration author: initstring severity: info description: Searches for open and protected buckets in AWS S3 tags: cloud,enum,cloud-enum,aws,discovery http: - method: GET path: matchers: - type: status status: - 200 - type: status status: - 403
generic
info
aws-s3-bucket-enum
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: nutanix-web-console-login info: name: Nutanix Web Console Login Panel - Detect author: gy741 severity: info description: Nutanix Web Console login panel was detected. tags: panel,nutanix,login,discovery http: - method: GET path: - "{{BaseURL}}/console/" matchers: - type: word words: - "<title>Nutanix Web Console</title>" - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template for: Workerman Websocket Detection
Title: Workerman Websocket Detection Summary: Workerman Websocket Detection. Tags: tech, workerman, websocket Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: workerman-websocket-detect info: name: Workerman Websocket Detection author: geeknik severity: info description: Workerman Websocket Detection tags: tech,workerman,websocket,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "workerman/" part: header
generic
info
workerman-websocket-detect
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: hadoop-exposure info: name: Apache Hadoop Panel - Detect author: pdteam severity: info description: Apache Hadoop panel was detected. tags: panel,apache,hadoop,discovery http: - method: GET path: - "{{BaseURL}}/dfshealth.html" matchers: - type: word words: - "<div class="navbar-brand">Hadoop</div>"
cwe
medium
CWE-200
Generate a Nuclei template for: Get Access Token Json
Title: Get Access Token Json Summary: Get Access Token Json. Internal file is exposed in Constant Contact Forms wordpress plugin. Vulnerability Type: Security Check Severity: low Indicators: vulnerability detected
id: get-access-token-json info: name: Get Access Token Json author: DhiyaneshDK severity: low description: Internal file is exposed in Constant Contact Forms wordpress plugin. tags: exposure,files,vuln http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/constant-contact-forms/vendor/constantcontact/constantcontact/test/Json/Auth/get_access_token.json" - "{{BaseURL}}/wp-content/plugins/constant-contact-api-old/vendor/constantcontact/constantcontact/test/Json/Auth/get_access_token.json" matchers: - type: word words: - ""access_token":" - ""token_type":" condition: and - type: status status: - 200
generic
low
get-access-token-json
Generate a Nuclei template for CVE-2023-4284
Title: Unknown Vulnerability in agilelogix post_timeline Summary: The Post Timeline WordPress plugin before 2.2.6 does not sanitise and escape an invalid nonce before outputting it back in an AJAX response, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin Vulnerability Type: Unknown Vulnerability Severity: medium Affected Products: agilelogix post_timeline Indicators: error, vulnerability detected
id: CVE-2023-4284 info: name: WordPress Post Timeline Plugin < 2.2.6 - Cross-Site Scripting author: ritikchaddha severity: high description: The Post Timeline WordPress plugin before version 2.2.6 contains a reflected cross-site scripting vulnerability. The plugin does not properly sanitize and escape an invalid nonce before outputting it back in an AJAX response, which could allow attackers to execute arbitrary JavaScript code in an administrator's browser context. tags: cve,cve2023,wordpress,wp,wp-plugin,xss,post-timeline,authenticated,vuln http: - method: GET path: matchers: - type: word words: - "post-timeline" part: body - method: GET path: matchers: - type: word words: - "<img src onerror=alert(document.domain)" part: body - type: word words: - "text/html" part: header - type: status status: - 200
cve
medium
CVE-2023-4284
Generate a Nuclei template for: Deadbolt Ransomware Detection
Title: Deadbolt Ransomware Detection Summary: Deadbolt Ransomware Detection. Tags: ransomware, deadbolt, vuln Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: deadbolt-ransomware info: name: Deadbolt Ransomware Detection author: pdteam severity: info description: Deadbolt Ransomware Detection tags: ransomware,deadbolt,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "<title>ALL YOUR FILES HAVE BEEN LOCKED BY DEADBOLT.</title>"
generic
info
deadbolt-ransomware
Generate a Nuclei template for: FileGator Panel - Detect
Title: FileGator Panel - Detect Summary: FileGator Panel - Detect. Tags: filegator, panel, login Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: filegator-panel info: name: FileGator Panel - Detect author: ritikchaddha severity: info description: FileGator Panel - Detect tags: filegator,panel,login,detect,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "<title>FileGator" part: body - type: status status: - 200
generic
info
filegator-panel
Generate a Nuclei template to detect SQL Injection
Title: SQL Injection (CWE-89) Summary: The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. Vulnerability Type: SQL Injection Severity: critical Indicators: vulnerability detected, error
id: ems-sqli info: name: Employee Management System 1.0 - SQL Injection author: arafatansari severity: critical description: Employee Management System 1.0 contains a SQL injection vulnerability via the username parameter. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected site. tags: ems,sqli,cms,auth-bypass,edb,vuln http: - method: GET path: matchers: - type: word words: - "Admin Panel" - "Log Out" - "Employee Management System" part: body condition: and - type: status status: - 200
cwe
critical
CWE-89
Generate a Nuclei template for: Samsung SmartTV Debug Config
Title: Samsung SmartTV Debug Config Summary: Samsung SmartTV Debug Config. Tags: samsung, tech, iot Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: samsung-smarttv-debug info: name: Samsung SmartTV Debug Config author: pussycat0x severity: info description: Samsung SmartTV Debug Config tags: samsung,tech,iot,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "<title>Debug Config</title>" - "MultiScreen Service" condition: and - type: status status: - 200
generic
info
samsung-smarttv-debug
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: hp-ilo-5 info: name: Hewlett Packard Integrated Lights Out 5 Login Panel - Detect author: geeknik severity: info description: Hewlett Packard Integrated Lights Out 5 login panel was detected. tags: hp,ilo,panel,hpe,discovery http: - method: GET path: - "{{BaseURL}}/html/login.html" matchers: - type: status status: - 200 - type: word words: - "titleHeading>iLO 5" - "titleFwver>Firmware" - "2002-2018 Hewlett Packard Enterprise Development LP" part: body condition: and - type: word words: - "text/html" part: header
cwe
medium
CWE-200
Generate a Nuclei template for: Changjietong Remote Communication GNRemote.dll - SQL Injection
Title: Changjietong Remote Communication GNRemote.dll - SQL Injection Summary: Changjietong Remote Communication GNRemote.dll - SQL Injection. Chanjetong has a SQL injection vulnerability, which can be used by attackers to obtain sensitive information in the database. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: chanjet-gnremote-sqli info: name: Changjietong Remote Communication GNRemote.dll - SQL Injection author: SleepingBag945 severity: high description: Chanjetong has a SQL injection vulnerability, which can be used by attackers to obtain sensitive information in the database. tags: yonyou,chanjet,sqli,vuln http: - method: GET path: matchers: - type: word words: - "{"RetCode":0}" part: body_1 - type: word words: - "{"RetCode":2}" part: body_2
generic
high
chanjet-gnremote-sqli
Generate a Nuclei template for CVE-2022-0949
Title: SQL Injection in stopbadbots block_and_stop_bad_bots Summary: The Block Bad Bots and Stop Bad Bots Crawlers and Spiders and Anti Spam Protection WordPress plugin before 6.930 does not properly sanitise and escape the fingerprint parameter before using it in a SQL statement via the stopbadbots_grava_fingerprint AJAX action, available to unauthenticated users, leading to a SQL injection Vulnerability Type: SQL Injection Severity: critical Affected Products: stopbadbots block_and_stop_bad_bots Indicators: error, vulnerability detected
id: CVE-2022-0949 info: name: WordPress Stop Bad Bots <6.930 - SQL Injection author: theamanrawat severity: critical description: WordPress Stop Bad Bots plugin before 6.930 contains a SQL injection vulnerability. The plugin does not properly sanitise and escape the fingerprint parameter before using it in a SQL statement via the stopbadbots_grava_fingerprint AJAX action, available to unauthenticated users. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site. tags: time-based-sqli,cve,cve2022,stopbadbots,wp-plugin,wp,unauth,wpscan,sqli,wordpress,vuln http: - method: GET path: matchers: - type: dsl condition: and
cve
critical
CVE-2022-0949
Generate a Nuclei template for: BeyondTrust Remote Support Version - Detect
Title: BeyondTrust Remote Support Version - Detect Summary: BeyondTrust Remote Support Version - Detect. Detects and extracts version information from BeyondTrust Remote Support installations by querying the /get_rdf endpoint. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: beyondtrust-remotesupport-version info: name: BeyondTrust Remote Support Version - Detect author: missing0x00 severity: info description: Detects and extracts version information from BeyondTrust Remote Support installations by querying the /get_rdf endpoint. tags: tech,beyondtrust,version,detect,discovery http: - method: GET path: - "{{BaseURL}}/get_rdf?comp=sdcust&locale_code=en-us" matchers: - type: status status: - 200 - type: word words: - "BeyondTrust" part: response
generic
info
beyondtrust-remotesupport-version
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: np-data-cache info: name: NP Data Cache Panel - Detect author: tess severity: info description: NP Data Cache panel was detected. tags: np,panel,cache,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "NP Data Cache" - "Server logs (if subscribed)" part: body condition: and - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template for: Kedacom Network Keyboard Console - Arbitrary File Read
Title: Kedacom Network Keyboard Console - Arbitrary File Read Summary: Kedacom Network Keyboard Console - Arbitrary File Read. There is an arbitrary file reading vulnerability in the KEDACOM network keyboard console. Attacking this vulnerability can read arbitrary information from the server Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: kedacom-network-lfi info: name: Kedacom Network Keyboard Console - Arbitrary File Read author: DhiyaneshDk severity: high description: There is an arbitrary file reading vulnerability in the KEDACOM network keyboard console. Attacking this vulnerability can read arbitrary information from the server tags: lfi,kedacom,network,vuln http: - method: GET path: - "{{BaseURL}}/../../../../../../../../etc/passwd" matchers: - type: regex part: body - type: word words: - "text/html" - "Server: kedacom-hs" part: header condition: and - type: status status: - 200
generic
high
kedacom-network-lfi
Generate a Nuclei template for: SPIP - Detect
Title: SPIP - Detect Summary: SPIP - Detect. Detects a SPIP and SPIP version. . Tags: spip, tech, detect Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: spip-detect info: name: SPIP - Detect author: s4e-io severity: info description: Detects a SPIP and SPIP version. tags: spip,tech,detect,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: regex part: header condition: or - type: status status: - 200
generic
info
spip-detect
Generate a Nuclei template for CVE-2020-28208
Title: Vulnerability (CWE-203) in rocket.chat rocket.chat Summary: An email address enumeration vulnerability exists in the password reset function of Rocket.Chat through 3.9.1. Vulnerability Type: Vulnerability (CWE-203) Severity: medium Affected Products: rocket.chat rocket.chat Indicators: error, vulnerability detected
id: CVE-2020-28208 info: name: Rocket.Chat <3.9.1 - Information Disclosure author: pdteam severity: medium description: Rocket.Chat through 3.9.1 is susceptible to information disclosure. An attacker can enumerate email addresses via the password reset function and thus potentially access sensitive information, modify data, and/or execute unauthorized operations. tags: cve,cve2020,packetstorm,rocketchat,rocket.chat,vuln http: - method: GET path: matchers: - type: word words: - ""result\":false" - ""success":true" part: body condition: and - type: status status: - 200
cve
medium
CVE-2020-28208
Generate a Nuclei template for CVE-2021-44848
Title: Vulnerability (CWE-203) in cybelesoft thinfinity_virtualui Summary: In Cibele Thinfinity VirtualUI before 3.0, /changePassword returns different responses for invalid authentication requests depending on whether the username exists. Vulnerability Type: Vulnerability (CWE-203) Severity: medium Affected Products: cybelesoft thinfinity_virtualui Indicators: error, vulnerability detected
id: CVE-2021-44848 info: name: Thinfinity VirtualUI User Enumeration author: danielmofer severity: medium description: Thinfinity VirtualUI (before v3.0), /changePassword returns different responses for requests depending on whether the username exists. It may enumerate OS users (Administrator, Guest, etc.) tags: cve2021,cve,exposure,thinfinity,packetstorm,virtualui,tenable,cybelesoft,vuln http: - method: GET path: matchers: - type: regex part: body condition: and - type: status status: - 200
cve
medium
CVE-2021-44848
Generate a Nuclei template for: Microsoft Internet Information Services 8
Title: Microsoft Internet Information Services 8 Summary: Microsoft Internet Information Services 8. Tags: tech, iis, microsoft Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: microsoft-iis-8 info: name: Microsoft Internet Information Services 8 author: dhiyaneshDK severity: info description: Microsoft Internet Information Services 8 tags: tech,iis,microsoft,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: status status: - 200 - type: word words: - "<title>Microsoft Internet Information Services 8</title>"
generic
info
microsoft-iis-8
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: mastoai info: name: Masto.ai User Name Information - Detect author: dwisiswant0 severity: info description: Masto.ai user name information check was conducted. tags: osint,osint-social,mastoai,discovery http: - method: GET path: - "https://masto.ai/@{{user}}" matchers: - type: status status: - 200 - type: word words: - "@masto.ai) - Mastodon</title>" part: body
cwe
medium
CWE-200
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: openemr-detect info: name: OpenEMR Product Registration Panel - Detect author: pussycat0x severity: info description: OpenEMR Product Registration panel was detected. tags: panel,openemr,open-emr,discovery http: - method: GET path: - "{{BaseURL}}/interface/login/login.php?site=default" matchers: - type: word words: - ""title":"OpenEMR Product Registration"" part: body - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template for: firefox phishing Detection
Title: firefox phishing Detection Summary: firefox phishing Detection. A firefox phishing website was detected Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: firefox-phish info: name: firefox phishing Detection author: rxerium severity: info description: A firefox phishing website was detected tags: phishing,firefox,osint,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "Download Firefox for Desktop — Mozilla" - type: status status: - 200 - type: dsl
generic
info
firefox-phish
Generate a Nuclei template for: rpmverify - Privilege Escalation
Title: rpmverify - Privilege Escalation Summary: rpmverify - Privilege Escalation. The rpmverify command is used to verify the integrity and authenticity of installed RPM packages on a Linux system. It checks the files in the installed packages against the information stored in the RPM database to detect any modifications or discrepancies. This helps ensure the security and stability of the system by identifying any unauthorized changes to the installed packages. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: privesc-rpmverify info: name: rpmverify - Privilege Escalation author: daffainfo severity: high description: The rpmverify command is used to verify the integrity and authenticity of installed RPM packages on a Linux system. It checks the files in the installed packages against the information stored in the RPM database to detect any modifications or discrepancies. This helps ensure the security and stability of the system by identifying any unauthorized changes to the installed packages. tags: code,linux,rpmverify,privesc,local http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
high
privesc-rpmverify
Generate a Nuclei template for: Log Min Messages Flag Not Configured Properly for PostgreSQL Instances
Title: Log Min Messages Flag Not Configured Properly for PostgreSQL Instances Summary: Log Min Messages Flag Not Configured Properly for PostgreSQL Instances. Ensure that the "log_min_messages" database flag configured for your Google Cloud PostgreSQL database instances has the appropriate severity level in accordance with your organization's logging policy. The "log_min_messages" flag defines the minimum severity level for messages to be logged. Valid levels include DEBUG5, DEBUG4, DEBUG3, DEBUG2, DEBUG1, INFO, NOTICE, WARNING, ERROR, LOG, FATAL, and PANIC. Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: gcloud-pg-log-min-messages-flag-not-configured info: name: Log Min Messages Flag Not Configured Properly for PostgreSQL Instances author: princechaddha severity: medium description: Ensure that the "log_min_messages" database flag configured for your Google Cloud PostgreSQL database instances has the appropriate severity level in accordance with your organization's logging policy. The "log_min_messages" flag defines the minimum severity level for messages to be logged. Valid levels include DEBUG5, DEBUG4, DEBUG3, DEBUG2, DEBUG1, INFO, NOTICE, WARNING, ERROR, LOG, FATAL, and PANIC. tags: cloud,devops,gcp,gcloud,google-cloud-sql,postgresql,logging,gcp-cloud-config http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
medium
gcloud-pg-log-min-messages-flag-not-configured
Generate a Nuclei template for: Wordpress sym404 directory
Title: Wordpress sym404 directory Summary: Wordpress sym404 directory. Searches for sensitive directories present in the sym404. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: wp-sym404 info: name: Wordpress sym404 directory author: pussycat0x severity: high description: Searches for sensitive directories present in the sym404. tags: wordpress,listing,wp,exposure,vuln http: - method: GET path: - "{{BaseURL}}/wp-includes/sym404/root/etc/passwd" matchers: - type: regex part: body - type: status status: - 200
generic
high
wp-sym404
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: bitbucket info: name: Bitbucket User Name Information - Detect author: dwisiswant0 severity: info description: Bitbucket user name information check was conducted. tags: osint,osint-coding,bitbucket,discovery http: - method: GET path: - "https://bitbucket.org/{{user}}/" matchers: - type: status status: - 200 - type: word words: - "Repositories" part: body
cwe
medium
CWE-200
Generate a Nuclei template for: Hongjing HCM - Local File Inclusion
Title: Hongjing HCM - Local File Inclusion Summary: Hongjing HCM - Local File Inclusion. There is an arbitrary file read vulnerability in the Hongjing eHR /DownLoadCourseware interface. Unauthenticated attackers can use this vulnerability to read important system files (such as database configuration files, system configuration files), database configuration files, etc., causing the website to be extremely unsafe. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: hjsoft-hcm-lfi info: name: Hongjing HCM - Local File Inclusion author: s4e-io severity: high description: There is an arbitrary file read vulnerability in the Hongjing eHR /DownLoadCourseware interface. Unauthenticated attackers can use this vulnerability to read important system files (such as database configuration files, system configuration files), database configuration files, etc., causing the website to be extremely unsafe. tags: lfi,hjsoft,management-system,file-read,vuln http: - method: GET path: matchers: - type: word words: - "bit app support" - "fonts" - "extensions" part: body condition: and - type: word words: - "multipart/form-data" part: content_type - type: status status: - 200
generic
high
hjsoft-hcm-lfi
Generate a Nuclei template for CVE-2023-27922
Title: Cross-Site Scripting (XSS) in thenewsletterplugin newsletter Summary: Cross-site scripting vulnerability in Newsletter versions prior to 7.6.9 allows a remote unauthenticated attacker to inject an arbitrary script. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: thenewsletterplugin newsletter Indicators: error, vulnerability detected
id: CVE-2023-27922 info: name: Newsletter < 7.6.9 - Cross-Site Scripting author: r3Y3r53 severity: medium description: The plugin does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as administrators tags: cve2023,cve,wpscan,wordpress,wp,wp-plugin,xss,newsletter,authenticated,thenewsletterplugin,vuln http: - method: GET path: matchers: - type: dsl condition: and
cve
medium
CVE-2023-27922
Generate a Nuclei template for: Express Stack Trace
Title: Express Stack Trace Summary: Express Stack Trace. Express Stack trace is exposed. Vulnerability Type: Security Check Severity: low Indicators: vulnerability detected
id: express-stack-trace info: name: Express Stack Trace author: DhiyaneshDk severity: low description: Express Stack trace is exposed. tags: misconfig,express,intrusive,vuln http: - method: GET path: - "{{BaseURL}}/{{randstr}}" matchers: - type: word words: - "NotFoundError: Not Found" - "at Function.handle" part: body condition: and - type: word words: - "text/html" part: header - type: status status: - 404
generic
low
express-stack-trace
Generate a Nuclei template for: SphinxOnline Panel - Detect
Title: SphinxOnline Panel - Detect Summary: SphinxOnline Panel - Detect. SphinxOnline Login Panel was detected. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: sphinxonline-panel info: name: SphinxOnline Panel - Detect author: righettod severity: info description: SphinxOnline Login Panel was detected. tags: panel,sphinxonline,login,detect,discovery http: - method: GET path: - "{{BaseURL}}/SphinxAuth/Account/Login" matchers: - type: word words: - "<title>Connection - SphinxOnline</title>" - "SphinxOnline</span>" part: body condition: or - type: status status: - 200
generic
info
sphinxonline-panel
Generate a Nuclei template for: Apache Shiro Default Page
Title: Apache Shiro Default Page Summary: Apache Shiro Default Page. Tags: tech, apache, shiro Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: default-apache-shiro info: name: Apache Shiro Default Page author: DhiyaneshDK severity: info description: Apache Shiro Default Page tags: tech,apache,shiro,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "<title>Apache Shiro Quickstart</title>" part: body - type: status status: - 200
generic
info
default-apache-shiro
Generate a Nuclei template for CVE-2024-6159
Title: SQL Injection in pnfpb push_notification_for_post_and_buddypress Summary: The Push Notification for Post and BuddyPress WordPress plugin before 1.9.4 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection Vulnerability Type: SQL Injection Severity: critical Affected Products: pnfpb push_notification_for_post_and_buddypress Indicators: error, vulnerability detected
id: CVE-2024-6159 info: name: Push Notification for Post and BuddyPress <= 1.93 - SQL Injection author: s4e-io severity: critical description: Push Notification for Post and BuddyPress plugin for WordPress is vulnerable to SQL Injection via the 'onesignal_externalid' and 'onesignal_get_subscriptionoptions_id' paramters in all versions up to, and including, 1.93 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. tags: time-based-sqli,cve,cve2024,wpscan,wp-plugin,wordpress,push-notification,vuln http: - method: GET path: matchers: - type: dsl - method: GET path: matchers: - type: dsl condition: and
cve
critical
CVE-2024-6159
Generate a Nuclei template for CVE-2021-24644
Title: Path Traversal in imagestowebp_project images_to_webp Summary: The Images to WebP WordPress plugin before 1.9 does not validate or sanitise the tab parameter before passing it to the include() function, which could lead to a Local File Inclusion issue Vulnerability Type: Path Traversal Severity: high Affected Products: imagestowebp_project images_to_webp Indicators: error, vulnerability detected
id: CVE-2021-24644 info: name: Images to WebP < 1.9 - Authenticated Local File Inclusion author: Sourabh-Sahu severity: high description: The Images to WebP WordPress plugin before version 1.9 did not validate or sanitize the tab parameter before using it in the include() function. tags: wpscan,cve,cve2021,wordpress,wp-plugin,images-to-webp,lfi,authenticated,intrusive,vkev,vuln http: - method: GET path: matchers: - type: dsl condition: and - method: GET path: matchers: - type: dsl condition: and
cve
high
CVE-2021-24644
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: myspace info: name: MySpace User Name Information - Detect author: dwisiswant0 severity: info description: MySpace user name information check was conducted. tags: osint,osint-social,myspace,discovery http: - method: GET path: - "https://myspace.com/{{user}}" matchers: - type: status status: - 200 - type: word words: - "<!-- Profile -->" part: body
cwe
medium
CWE-200
Generate a Nuclei template for: NocoDB Panel - Detect
Title: NocoDB Panel - Detect Summary: NocoDB Panel - Detect. NocoDB Login panel was discovered. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: nocodb-panel info: name: NocoDB Panel - Detect author: userdehghani severity: info description: NocoDB Login panel was discovered. tags: panel,nocodb,login,detect,discovery http: - method: GET path: - "{{BaseURL}}/dashboard/#/signin" - "{{BaseURL}}/dashboard/favicon.ico" matchers: - type: word words: - "content="NocoDB" part: body - type: dsl
generic
info
nocodb-panel
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: qnap-photostation-panel info: name: QNAP Photo Station Panel - Detect author: idealphase severity: info description: QNAP Photo Station panel was detected. tags: panel,photostation,qnap,discovery http: - method: GET path: - "{{BaseURL}}/photo/" matchers: - type: regex part: body - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template for: Splash Render - SSRF
Title: Splash Render - SSRF Summary: Splash Render - SSRF. Splash Render is vulnerable to Server-Side Request Forgery (SSRF) Vulnerability. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: splash-render-ssrf info: name: Splash Render - SSRF author: pwnhxl severity: high description: Splash Render is vulnerable to Server-Side Request Forgery (SSRF) Vulnerability. tags: splash,ssrf,oast,oss,vuln http: - method: GET path: - "{{BaseURL}}/render.html?url=https://oast.live" matchers: - type: word words: - "Interactsh Server" part: body - type: status status: - 200
generic
high
splash-render-ssrf
Generate a Nuclei template for CVE-2025-3515
Title: Unrestricted File Upload in codedropz drag_and_drop_multiple_file_upload_-_contact_form_7 Summary: The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in all versions up to, and including, 1.3.8.9. This makes it possible for unauthenticated attackers to bypass the plugin's blacklist and upload .phar or other dangerous file types on the affected site's server, which may make remote code execution possible on the servers that are configured to handle .phar files as executable PHP scripts, particularly in default Apache+mod_php configurations where the file extension is not strictly validated before being passed to the PHP interpreter. Vulnerability Type: Unrestricted File Upload Severity: high Affected Products: codedropz drag_and_drop_multiple_file_upload_-_contact_form_7 Indicators: error, vulnerability detected
id: CVE-2025-3515 info: name: Contact Form 7 Drag and Drop Multiple File Upload - Arbitrary File Upload author: hnd3884 severity: high description: The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in all versions up to, and including, 1.3.8.9. This makes it possible for unauthenticated attackers to bypass the plugin's blacklist and upload .phar or other dangerous file types on the affected site's server, which may make remote code execution possible on the servers that are configured to handle .phar files as executable PHP scripts, particularly in default Apache+mod_php configurations where the file extension is not strictly validated before being passed to the PHP interpreter. tags: cve,cve2025,wordpress,wp,contact-form-7,file-upload,intrusive,vkev,vuln http: - method: GET path: - "{{BaseURL}}" - "{{BaseURL}}/contact/" - "{{BaseURL}}/contact-us/" - "{{BaseURL}}/submit/" - "{{BaseURL}}/support/" - "{{BaseURL}}/form/" - "{{BaseURL}}/get-in-touch/" matchers: - type: word words: - "wpcf7-drag-n-drop-file" part: body - method: POST path: - "{{BaseURL}}/wp-admin/admin-ajax.php" matchers: - type: word words: - ""success":true" part: body - method: GET path: - "{{RootURL}}/wp-content/uploads/wp_dndcf7_uploads/wpcf7-files/{{uploaded_file}}" matchers: - type: word words: - "{{phar_marker}}" part: body - method: GET path: - "{{BaseURL}}/wp-content/plugins/drag-and-drop-multiple-file-upload-contact-form-7/readme.txt" matchers: - type: word words: - "Drag and Drop Multiple File Upload" - "Stable tag:" condition: and - type: dsl
cve
high
CVE-2025-3515
Generate a Nuclei template for: Ambassador Edge Stack - Detect
Title: Ambassador Edge Stack - Detect Summary: Ambassador Edge Stack - Detect. Ambassador Edge Stack is a Kubernetes-native API Gateway that delivers the scalability, security, and simplicity for some of the world's largest Kubernetes installations. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: ambassador-edgestack-detect info: name: Ambassador Edge Stack - Detect author: ja1sh severity: info description: Ambassador Edge Stack is a Kubernetes-native API Gateway that delivers the scalability, security, and simplicity for some of the world's largest Kubernetes installations. tags: tech,ambassador,gateway,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "Ambassador Edge Stack</p>" part: body - type: status status: - 200 condition: or
generic
info
ambassador-edgestack-detect
Generate a Nuclei template for: Unrestricted CIFS Access in Azure NSGs
Title: Unrestricted CIFS Access in Azure NSGs Summary: Unrestricted CIFS Access in Azure NSGs. Ensure that Microsoft Azure network security groups (NSGs) do not allow unrestricted access on TCP port 445, used by Common Internet File System (CIFS), to prevent unauthorized access. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: azure-nsg-cifs-unrestricted info: name: Unrestricted CIFS Access in Azure NSGs author: princechaddha severity: high description: Ensure that Microsoft Azure network security groups (NSGs) do not allow unrestricted access on TCP port 445, used by Common Internet File System (CIFS), to prevent unauthorized access. tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
high
azure-nsg-cifs-unrestricted
Generate a Nuclei template for CVE-2022-37153
Title: Cross-Site Scripting (XSS) in articatech artica_proxy Summary: An issue was discovered in Artica Proxy 4.30.000000. There is a XSS vulnerability via the password parameter in /fw.login.php. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: articatech artica_proxy Indicators: error, vulnerability detected
id: CVE-2022-37153 info: name: Artica Proxy 4.30.000000 - Cross-Site Scripting author: arafatansari severity: medium description: Artica Proxy 4.30.000000 contains a cross-site scripting vulnerability via the password parameter in /fw.login.php. tags: cve,cve2022,xss,artica,articatech,vkev,vuln http: - method: GET path: matchers: - type: word words: - "Password" value="admin"><script>alert(document.domain)</script>" - "Artica Web" part: body condition: and - type: word words: - "text/html" part: header - type: status status: - 200
cve
medium
CVE-2022-37153
Generate a Nuclei template for: Content-Security-Policy Bypass - Quantserve Secure
Title: Content-Security-Policy Bypass - Quantserve Secure Summary: Content-Security-Policy Bypass - Quantserve Secure Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: quantserve-secure-csp-bypass info: name: Content-Security-Policy Bypass - Quantserve Secure author: renniepak,DhiyaneshDK severity: medium description: Content-Security-Policy Bypass - Quantserve Secure tags: xss,csp-bypass,quantserve-secure,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "Content-Security-Policy" - "quantserve.com" part: header condition: and
generic
medium
quantserve-secure-csp-bypass
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: americanthinker info: name: AmericanThinker User Name Information - Detect author: dwisiswant0 severity: info description: AmericanThinker user name information check was conducted. tags: osint,osint-political,americanthinker,discovery http: - method: GET path: - "https://www.americanthinker.com/author/{{user}}/" matchers: - type: status status: - 200 - type: word words: - "Articles &amp;" part: body
cwe
medium
CWE-200
Generate a Nuclei template for: Zhiyuan Oa Unauthorized
Title: Zhiyuan Oa Unauthorized Summary: Zhiyuan Oa Unauthorized. Zhiyuan Oa is exposed.. Tags: seeyon, unauth, zhiyuan Vulnerability Type: Security Check Severity: low Indicators: vulnerability detected
id: zhiyuan-oa-unauthorized info: name: Zhiyuan Oa Unauthorized author: pikpikcu severity: low description: Zhiyuan Oa is exposed. tags: seeyon,unauth,zhiyuan,misconfig,vuln http: - method: GET path: - "{{BaseURL}}/seeyon/personalBind.do.jpg/..;/ajax.do?method=ajaxAction&managerName=mMOneProfileManager&managerMethod=getOAProfile" matchers: - type: word words: - "serverIdentifier" - "companyName" condition: and - type: word words: - "application/json" part: header - type: status status: - 200
generic
low
zhiyuan-oa-unauthorized
Generate a Nuclei template for CVE-2020-11441
Title: Vulnerability (CWE-74) in phpmyadmin phpmyadmin Summary: phpMyAdmin 5.0.2 allows CRLF injection, as demonstrated by %0D%0Astring%0D%0A inputs to login form fields causing CRLF sequences to be reflected on an error page. NOTE: the vendor states "I don't see anything specifically exploitable. Vulnerability Type: Vulnerability (CWE-74) Severity: medium Affected Products: phpmyadmin phpmyadmin Indicators: error
id: CVE-2020-11441 info: name: phpMyAdmin 5.0.2 - CRLF Injection author: ritikchaddha severity: medium description: phpMyAdmin 5.0.2 allows CRLF injection, as demonstrated by %0D%0Astring%0D%0A inputs to login form fields causing CRLF sequences to be reflected on an error page. NOTE: the vendor states "I don't see anything specifically exploitable. tags: cve,crlf,phpmyadmin,cve2020,vuln http: - method: GET path: matchers: - type: regex part: body - type: status status: - 200
cve
medium
CVE-2020-11441
Generate a Nuclei template for CVE-2017-17043
Title: Cross-Site Scripting (XSS) in zitec emag_marketplace_connector Summary: The Emag Marketplace Connector plugin 1.0.0 for WordPress has reflected XSS because the parameter "post" to /wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.php is not filtered correctly. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: zitec emag_marketplace_connector Indicators: error, vulnerability detected
id: CVE-2017-17043 info: name: WordPress Emag Marketplace Connector 1.0 - Cross-Site Scripting author: daffainfo severity: medium description: WordPress Emag Marketplace Connector plugin 1.0 contains a reflected cross-site scripting vulnerability because the parameter "post" to /wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.php is not filtered correctly. tags: cve,cve2017,xss,wp-plugin,packetstorm,wordpress,zitec,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "/wp-content/plugins/emag-marketplace-connector/" - method: GET path: - "{{BaseURL}}/wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.php?post=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers: - type: word words: - "</script><script>alert(document.domain)</script>" part: body - type: word words: - "text/html" part: header - type: status status: - 200
cve
medium
CVE-2017-17043
Generate a Nuclei template for: SonarQube Cloud Token Disclosure
Title: SonarQube Cloud Token Disclosure Summary: SonarQube Cloud Token Disclosure. Tags: exposure, token, sonarqube Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: sonarqube-cloud-token info: name: SonarQube Cloud Token Disclosure author: DhiyaneshDk severity: high description: SonarQube Cloud Token Disclosure tags: exposure,token,sonarqube,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: regex part: body - method: GET path: matchers: - type: dsl condition: and
generic
high
sonarqube-cloud-token
Generate a Nuclei template for CVE-2022-46443
Title: SQL Injection in bangresto_project bangresto Summary: mesinkasir Bangresto 1.0 is vulnberable to SQL Injection via the itemqty%5B%5D parameter. Vulnerability Type: SQL Injection Severity: high Affected Products: bangresto_project bangresto Indicators: error, vulnerability detected
id: CVE-2022-46443 info: name: Bangresto - SQL Injection author: Harsh severity: high description: Bangresto 1.0 is vulnberable to SQL Injection via the itemqty%5B%5D parameter. tags: cve,cve2022,bangresto,sqli,bangresto_project,vuln http: - method: GET path: matchers: - type: word words: - "{{md5({{num}})}}"
cve
high
CVE-2022-46443
Generate a Nuclei template for: ActionTrail Log Buckets - Publicly Exposed
Title: ActionTrail Log Buckets - Publicly Exposed Summary: ActionTrail Log Buckets - Publicly Exposed. Identify any publicly accessible ActionTrail trail log buckets in order to determine if your Alibaba Cloud account could be at risk. A publicly accessible trail bucket is a bucket were all users, including anonymous users, can perform read and write operations on the objects within the bucket. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: public-actiontrail-bucket info: name: ActionTrail Log Buckets - Publicly Exposed author: ritikchaddha severity: high description: Identify any publicly accessible ActionTrail trail log buckets in order to determine if your Alibaba Cloud account could be at risk. A publicly accessible trail bucket is a bucket were all users, including anonymous users, can perform read and write operations on the objects within the bucket. tags: cloud,devops,aliyun,alibaba,aliyun-cloud-config,actiontrail http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
high
public-actiontrail-bucket
Generate a Nuclei template for: Phinx Configuration Exposure
Title: Phinx Configuration Exposure Summary: Phinx Configuration Exposure. Phinx configuration file was exposed. Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: phinx-config info: name: Phinx Configuration Exposure author: DhiyaneshDk severity: medium description: Phinx configuration file was exposed. tags: devops,exposure,files,vuln http: - method: GET path: - "{{BaseURL}}/phinx.yml" matchers: - type: word words: - "paths:" - "environments:" - "development:" part: body condition: and - type: status status: - 200
generic
medium
phinx-config
Generate a Nuclei template to detect Path Traversal
Title: Path Traversal (CWE-22) Summary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as ".." and "/" separators, attackers can escap Vulnerability Type: Path Traversal Severity: high Indicators: unexpected
id: vmware-vcenter-lfi-linux info: name: Linux Vmware Vcenter - Local File Inclusion author: PR3R00T severity: high description: Linux appliance based Vmware Vcenter is vulnerable to local file inclusion. tags: vmware,lfi,vcenter,linux,vuln http: - method: GET path: - "{{BaseURL}}/eam/vib?id=/etc/passwd" matchers: - type: regex
cwe
high
CWE-22
Generate a Nuclei template for: Discuz Panel - Detection
Title: Discuz Panel - Detection Summary: Discuz Panel - Detection. Tags: panel, discuz, detect Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: discuz-panel info: name: Discuz Panel - Detection author: ritikchaddha severity: info description: Discuz Panel - Detection tags: panel,discuz,detect,login,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "discuz_uid =" - "discuz</a>" - "Powered by Discuz!" - "content="Discuz" part: body condition: or
generic
info
discuz-panel
Generate a Nuclei template to detect Path Traversal
Title: Path Traversal (CWE-22) Summary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as ".." and "/" separators, attackers can escap Vulnerability Type: Path Traversal Severity: high Indicators: unexpected
id: pacsone-server-lfi info: name: PACSOne Server 6.6.2 - Local File Inclusion author: 0x_Akoko severity: high description: PACSOne Server 6.6.2 is vulnerable to local file inclusion via its integrated DICOM Web Viewer. tags: pacsone,lfi,vuln http: - method: GET path: - "{{BaseURL}}/pacsone/nocache.php?path=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2f.%2fzpx%2f..%2fpasswd" matchers: - type: regex - type: status status: - 200
cwe
high
CWE-22
Generate a Nuclei template for CVE-2023-26067
Title: Vulnerability (CWE-20) in lexmark cxtpc_firmware and others Summary: Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 1 of 4). Vulnerability Type: Vulnerability (CWE-20) Severity: high Affected Products: lexmark cxtpc_firmware, lexmark cstpc_firmware, lexmark mxtct_firmware Indicators: error, vulnerability detected
id: CVE-2023-26067 info: name: Lexmark Printers - Command Injection author: DhiyaneshDK severity: high description: Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 1 of 4). tags: cve2023,cve,printer,iot,lexmark,vkev,vuln http: - method: GET path: matchers: - type: dsl condition: and
cve
high
CVE-2023-26067
Generate a Nuclei template for CVE-2020-11515
Title: Vulnerability (CWE-601) in rankmath seo Summary: The Rank Math plugin through 1.0.40.2 for WordPress allows unauthenticated remote attackers to create new URIs (that redirect to an external web site) via the unsecured rankmath/v1/updateRedirection REST API endpoint. In other words, this is not an "Open Redirect" issue; instead, it allows the attacker to create a new URI with an arbitrary name (e.g., the /exampleredirect URI). Vulnerability Type: Vulnerability (CWE-601) Severity: medium Affected Products: rankmath seo Indicators: error, vulnerability detected
id: CVE-2020-11515 info: name: Rank Math SEO <= 1.0.40.2 - Redirect Creation via Unprotected REST API Endpoint author: s4e-io severity: medium description: The Rank Math plugin through 1.0.40.2 for WordPress allows unauthenticated remote attackers to create new URIs (that redirect to an external web site) via the unsecured rankmath/v1/updateRedirection REST API endpoint. In other words, this is not an "Open Redirect" issue; instead, it allows the attacker to create a new URI with an arbitrary name (e.g., the /exampleredirect URI). tags: cve,cve2020,wordpress,wordfence,redirect,seo-by-rank-math,wp-plugin,wp,vkev,vuln http: - method: GET path: matchers: - type: dsl condition: and
cve
medium
CVE-2020-11515
Generate a Nuclei template for CVE-2023-24657
Title: Cross-Site Scripting (XSS) in phpipam phpipam Summary: phpipam v1.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the closeClass parameter at /subnet-masks/popup.php. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: phpipam phpipam Indicators: error, vulnerability detected
id: CVE-2023-24657 info: name: phpIPAM - 1.6 - Cross-Site Scripting author: r3Y3r53 severity: medium description: phpIPAM 1.6 contains a cross-site scripting vulnerability via the closeClass parameter at /subnet-masks/popup.php. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks. tags: cve2023,cve,xss,phpipam,authenticated,vuln http: - method: GET path: matchers: - type: dsl condition: and
cve
medium
CVE-2023-24657
Generate a Nuclei template for: SpotWeb Login Panel - Detect
Title: SpotWeb Login Panel - Detect Summary: SpotWeb Login Panel - Detect. Tags: panel, spotweb, detect Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: spotweb-login-panel info: name: SpotWeb Login Panel - Detect author: theamanrawat severity: info description: SpotWeb Login Panel - Detect tags: panel,spotweb,detect,spotweb_project,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "SpotWeb - overview" - "initSpotwebJs" part: body condition: or - type: status status: - 200
generic
info
spotweb-login-panel
Generate a Nuclei template for: Petya Malware (Variant Bitcoin) - Detect
Title: Petya Malware (Variant Bitcoin) - Detect Summary: Petya Malware (Variant Bitcoin) - Detect. Tags: malware, file, petya Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: petya-malware-variant-bitcoin info: name: Petya Malware (Variant Bitcoin) - Detect author: daffainfo severity: info description: Petya Malware (Variant Bitcoin) - Detect tags: malware,file,petya http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
petya-malware-variant-bitcoin
Generate a Nuclei template for: Windows Admin Center Panel - Detection
Title: Windows Admin Center Panel - Detection Summary: Windows Admin Center Panel - Detection. Detect Windows Admin Center Panel web interface. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: windows-admin-center-panel info: name: Windows Admin Center Panel - Detection author: darses severity: info description: Detect Windows Admin Center Panel web interface. tags: detect,windows,panel,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: status status: - 403 - type: word words: - "Windows Admin Center</title>" part: body
generic
info
windows-admin-center-panel
Generate a Nuclei template for: DNSSEC RSASHA1 Algorithm Deprecated Usage
Title: DNSSEC RSASHA1 Algorithm Deprecated Usage Summary: DNSSEC RSASHA1 Algorithm Deprecated Usage. Ensure that Domain Name System Security Extensions (DNSSEC) feature is not using the deprecated RSASHA1 algorithm for the Key-Signing Key (KSK) associated with your DNS managed zone file. Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: gcloud-dnssec-keysigning-rsasha1 info: name: DNSSEC RSASHA1 Algorithm Deprecated Usage author: princechaddha severity: medium description: Ensure that Domain Name System Security Extensions (DNSSEC) feature is not using the deprecated RSASHA1 algorithm for the Key-Signing Key (KSK) associated with your DNS managed zone file. tags: cloud,devops,gcp,gcloud,dns,dnssec,gcp-cloud-config,discovery http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
medium
gcloud-dnssec-keysigning-rsasha1
Generate a Nuclei template for CVE-2021-45793
Title: SQL Injection in slims senayan_library_management_system Summary: Slims9 Bulian 9.4.2 is affected by SQL injection in lib/comment.inc.php. User data can be obtained. Vulnerability Type: SQL Injection Severity: high Affected Products: slims senayan_library_management_system Indicators: error, vulnerability detected
id: CVE-2021-45793 info: name: Slims9 Bulian 9.4.2 - SQL Injection author: nblirwn severity: high description: Slims9 Bulian 9.4.2 is affected by SQL injection in lib/comment.inc.php. User data can be obtained. tags: cve2021,cve,slims,sqli,vuln http: - method: GET path: matchers: - type: status status: - 200 - method: GET path: matchers: - type: status status: - 200 - method: GET path: matchers: - type: word words: - "c8c605999f3d8352d7bb792cf3fd" part: body - type: status status: - 200
cve
high
CVE-2021-45793
Generate a Nuclei template for: Query JCR role via QueryBuilder Servlet
Title: Query JCR role via QueryBuilder Servlet Summary: Query JCR role via QueryBuilder Servlet. Tags: aem, misconfig, vuln Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: aem-jcr-querybuilder info: name: Query JCR role via QueryBuilder Servlet author: DhiyaneshDk severity: info description: Query JCR role via QueryBuilder Servlet tags: aem,misconfig,vuln http: - method: GET path: matchers: - type: status status: - 200 - type: word words: - ""success":true" - "jcr:uuid" condition: and
generic
info
aem-jcr-querybuilder
Generate a Nuclei template for: Travis CI Disclosure
Title: Travis CI Disclosure Summary: Travis CI Disclosure. Travis CI is a Software as a Service (SaaS) based continuous integration service used to build and test software projects. By defining a configuration file named `.travis.yml` in their source code repositories, developers can customize their applications build workflows. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: travis-ci-disclosure info: name: Travis CI Disclosure author: DhiyaneshDK,AmirHossein Raeisi severity: high description: Travis CI is a Software as a Service (SaaS) based continuous integration service used to build and test software projects. By defining a configuration file named `.travis.yml` in their source code repositories, developers can customize their applications build workflows. tags: exposure,file,config,tenable,vuln http: - method: GET path: - "{{BaseURL}}/.travis.yml" - "{{BaseURL}}/matomo/.travis.yml" - "{{BaseURL}}/ckeditor/.travis.yml" matchers: - type: word words: - "before_script:" - "jobs:" - "language:" part: body condition: and - type: word words: - "application/octet-stream" part: header - type: status status: - 200
generic
high
travis-ci-disclosure
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: ektron-cms-panel info: name: Ektron CMS Login Panel - Detect author: pikpikcu severity: info description: Ektron CMS login panel was detected. tags: panel,ektron,cms,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "EktronClientManager" - "ektronTheme" - "Ektron.ready" part: body condition: or - type: status status: - 200
cwe
medium
CWE-200
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200) Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include: private, personal information, such as p Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor Severity: medium Indicators: error, unauthorized
id: bimpos info: name: Bimpos User Name Information - Detect author: dwisiswant0 severity: info description: Bimpos user name information check was conducted. tags: osint,osint-tech,bimpos,discovery http: - method: GET path: - "https://ask.bimpos.com/user/{{user}}" matchers: - type: status status: - 200 - type: word words: - "<title>User " part: body
cwe
medium
CWE-200
Generate a Nuclei template for: Content-Security-Policy Bypass - Azure Inno
Title: Content-Security-Policy Bypass - Azure Inno Summary: Content-Security-Policy Bypass - Azure Inno. Tags: xss, csp-bypass, azure-inno Vulnerability Type: Security Check Severity: medium Indicators: vulnerability detected
id: azure-inno-csp-bypass info: name: Content-Security-Policy Bypass - Azure Inno author: renniepak,DhiyaneshDK severity: medium description: Content-Security-Policy Bypass - Azure Inno tags: xss,csp-bypass,azure-inno,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "Content-Security-Policy" - "azure.com" part: header condition: and
generic
medium
azure-inno-csp-bypass
Generate a Nuclei template for CVE-2021-27310
Title: Cross-Site Scripting (XSS) in csphere clansphere Summary: Clansphere CMS 2011.4 allows unauthenticated reflected XSS via "language" parameter. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: csphere clansphere Indicators: error, vulnerability detected
id: CVE-2021-27310 info: name: Clansphere CMS 2011.4 - Cross-Site Scripting author: alph4byt3 severity: medium description: Clansphere CMS 2011.4 contains an unauthenticated reflected cross-site scripting vulnerability via the "language" parameter. tags: cve2021,cve,xss,clansphere,csphere,vuln http: - method: GET path: - "{{BaseURL}}/clansphere/mods/clansphere/lang_modvalidate.php?language=language%27%22()%26%25%3Cyes%3E%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E&module=module" matchers: - type: word words: - "</script><script>alert(document.domain)</script>" part: body - type: word words: - "text/html" part: header - type: status status: - 200
cve
medium
CVE-2021-27310
Generate a Nuclei template for CVE-2020-36719
Title: Missing Authorization in cridio listingpro Summary: The ListingPro - WordPress Directory & Listing Theme for WordPress is vulnerable to Arbitrary Plugin Installation, Activation and Deactivation in versions before 2.6.1. This is due to a missing capability check on the lp_cc_addons_actions function. This makes it possible for unauthenticated attackers to arbitrarily install, activate and deactivate any plugin. Vulnerability Type: Missing Authorization Severity: critical Affected Products: cridio listingpro Indicators: error, vulnerability detected
id: CVE-2020-36719 info: name: ListingPro < 2.6.1 - Arbitrary Plugin Installation/Activation/Deactivation author: ritikchaddha severity: critical description: The ListingPro - WordPress Directory & Listing Theme for WordPress is vulnerable to Arbitrary Plugin Installation, Activation and Deactivation in versions before 2.6.1. This is due to a missing capability check on the lp_cc_addons_actions function. This makes it possible for unauthenticated attackers to arbitrarily install, activate and deactivate any plugin. tags: cve,cve2020,wp,wp-pluginwordpress,listingpro,passive,vkev,vuln http: - method: GET path: - "{{BaseURL}}/wp-content/themes/listingpro/style.css" matchers: - type: word words: - "ListingPro" - "Version:" part: body condition: and - type: dsl condition: and
cve
critical
CVE-2020-36719
Generate a Nuclei template for: DotJS - Out of Band Template Injection
Title: DotJS - Out of Band Template Injection Summary: DotJS - Out of Band Template Injection. Tags: ssti, dast, oast Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: dotjs-oob info: name: DotJS - Out of Band Template Injection author: 0xAwali,DhiyaneshDK severity: high description: DotJS - Out of Band Template Injection tags: ssti,dast,oast,oob,vuln http: - method: GET path: matchers: - type: dsl condition: and
generic
high
dotjs-oob
Generate a Nuclei template for: FirstClass FTP Service - Detect
Title: FirstClass FTP Service - Detect Summary: FirstClass FTP Service - Detect. FirstClass FTP service was detected. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: firstclass-ftp-detect info: name: FirstClass FTP Service - Detect author: pussycat0x severity: info description: FirstClass FTP service was detected. tags: network,ftp,firstclass,detect,tcp,discovery http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
firstclass-ftp-detect
Generate a Nuclei template for CVE-2022-34047
Title: Vulnerability (CWE-668) in wavlink wl-wn530hg4_firmware Summary: An access control issue in Wavlink WN530HG4 M30HG4.V5030.191116 allows attackers to obtain usernames and passwords via view-source:http://IP_ADDRESS/set_safety.shtml?r=52300 and searching for [var syspasswd]. Vulnerability Type: Vulnerability (CWE-668) Severity: high Affected Products: wavlink wl-wn530hg4_firmware Indicators: error, vulnerability detected
id: CVE-2022-34047 info: name: WAVLINK WN530HG4 - Improper Access Control author: For3stCo1d severity: high description: WAVLINK WN530HG4 M30HG4.V5030.191116 is susceptible to improper access control. An attacker can obtain usernames and passwords via view-source:http://IP_ADDRESS/set_safety.shtml?r=52300 and searching for [var syspasswd] and thereby possibly obtain sensitive information, modify data, and/or execute unauthorized operations. tags: cve,cve2022,wavlink,router,exposure,packetstorm,vuln http: - method: GET path: matchers: - type: word words: - "var syspasswd="" - "<title>APP</title>" part: body condition: and - type: status status: - 200
cve
high
CVE-2022-34047
Generate a Nuclei template for CVE-2024-55417
Title: Unrestricted File Upload in thecontrolgroup voyager Summary: DevDojo Voyager through version 1.8.0 is vulnerable to bypassing the file type verification when an authenticated user uploads a file via /admin/media/upload. An authenticated user can upload a web shell causing arbitrary code execution on the server. Vulnerability Type: Unrestricted File Upload Severity: medium Affected Products: thecontrolgroup voyager Indicators: error, vulnerability detected
id: CVE-2024-55417 info: name: DevDojo Voyager <= 1.8.0 - Arbitrary File Write vulnerability author: iamnoooob,rootxharsh,pdresearch severity: high description: DevDojo Voyager through version 1.8.0 is vulnerable to bypassing the file type verification when an authenticated user uploads a file via /admin/media/upload. An authenticated user can upload a web shell causing arbitrary code execution on the server. tags: cve,cve2024,intrusive,devdojo,voyager,file-upload,authenticated,vuln http: - method: GET path: matchers: - type: status status: - 200 - method: GET path: matchers: - type: dsl condition: and - method: GET path: matchers: - type: status status: - 200 - method: GET path: matchers: - type: word words: - "Encoding format (php) is not supported." part: body - method: GET path: matchers: - type: word words: - "{{randstr}}" part: body
cve
medium
CVE-2024-55417
Generate a Nuclei template to detect Cross-site Scripting
Title: Cross-site Scripting (CWE-79) Summary: The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. There are many variants of cross-site scripting, characterized by a variety of terms or involving different attack topologies. However, they all indicate the same fundamental weakness: improper neutralization of dangerous input between the adversary and a victim. Vulnerability Type: Cross-site Scripting Severity: high Indicators: vulnerability detected, error
id: my-chatbot-xss info: name: WordPress My Chatbot <= 1.1 - Cross-Site Scripting author: dhiyaneshDk severity: high description: WordPress My Chatbot <= 1.1 is susceptible to cross-site scripting. The plugin does not sanitize or escape its tab parameter in the Settings page before outputting it back in an attribute. tags: wordpress,wp-plugin,xss,authenticated,wpscan,vuln http: - method: GET path: matchers: - type: word words: - "</script><script>alert(document.domain)</script>" part: body - type: word words: - "text/html" part: header - type: status status: - 200
cwe
high
CWE-79
Generate a Nuclei template for: OpenAI Admin API Key Detection
Title: OpenAI Admin API Key Detection Summary: OpenAI Admin API Key Detection. Tags: openai, exposure, tokens Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: openai-admin-api-key info: name: OpenAI Admin API Key Detection author: Chemo850 severity: info description: OpenAI Admin API Key Detection tags: openai,exposure,tokens,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: status status: - 200
generic
info
openai-admin-api-key
Generate a Nuclei template for: Frappe Helpdesk Login Panel - Detect
Title: Frappe Helpdesk Login Panel - Detect Summary: Frappe Helpdesk Login Panel - Detect. Frappe Helpdesk products was detected. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: frappe-helpdesk-panel info: name: Frappe Helpdesk Login Panel - Detect author: righettod severity: info description: Frappe Helpdesk products was detected. tags: panel,frappe,login,discovery http: - method: GET path: - "{{BaseURL}}/helpdesk/login" matchers: - type: dsl condition: and
generic
info
frappe-helpdesk-panel
Generate a Nuclei template for CVE-2020-36705
Title: Unknown Vulnerability in tunasite adning_advertising Summary: The Adning Advertising plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the _ning_upload_image function in versions up to, and including, 1.5.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible. Vulnerability Type: Unknown Vulnerability Severity: critical Affected Products: tunasite adning_advertising Indicators: error, vulnerability detected
id: CVE-2020-36705 info: name: Adning Advertising <= 1.5.5 - Arbitrary File Upload author: DhiyaneshDK severity: critical description: The Adning Advertising plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the _ning_upload_image function in versions up to, and including, 1.5.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible. tags: cve,cve2020,wordpress,wp-plugin,angwp,wp,passive,vkev,vuln http: - method: GET path: matchers: - type: dsl condition: and
cve
critical
CVE-2020-36705
Generate a Nuclei template for: Dropbox API Token
Title: Dropbox API Token Summary: Dropbox API Token. Tags: dropbox, exposure, tokens Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: dropbox-token info: name: Dropbox API Token author: DhiyaneshDK severity: info description: Dropbox API Token tags: dropbox,exposure,tokens,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: status status: - 200
generic
info
dropbox-token
Generate a Nuclei template for CVE-2020-11853
Title: Unknown Vulnerability in microfocus operation_bridge_manager and others Summary: Arbitrary code execution vulnerability affecting multiple Micro Focus products. 1.) Operation Bridge Manager affecting version: 2020.05, 2019.11, 2019.05, 2018.11, 2018.05, versions 10.6x and 10.1x and older versions. 2.) Application Performance Management affecting versions : 9.51, 9.50 and 9.40 with uCMDB 10.33 CUP 3 3.) Data Center Automation affected version 2019.11 4.) Operations Bridge (containerized) affecting versions: 2019.11, 2019.08, 2019.05, 2018.11, 2018.08, 2018.05, 2018.02, 2017.11 5.) Universal CMDB affecting version: 2020.05, 2019.11, 2019.05, 2019.02, 2018.11, 2018.08, 2018.05, 11, 10.33, 10.32, 10.31, 10.30 6.) Hybrid Cloud Management affecting version 2020.05 7.) Service Management Automation affecting version 2020.5 and 2020.02. The vulnerability could allow to execute arbitrary code. Vulnerability Type: Unknown Vulnerability Severity: high Affected Products: microfocus operation_bridge_manager, microfocus operations_bridge_manager, hp universal_cmbd_foundation Indicators: error, vulnerability detected
id: micro-focus-workflow info: name: Micro Focus Checks author: dwisiswant0 severity: info description: A simple workflow that runs all Micro Focus related nuclei templates on a given target. tags: unknown http: - method: GET path: - "/" matchers: - type: status status: - 200
cve
high
CVE-2020-11853
Generate a Nuclei template for CVE-2023-51713
Title: Vulnerability (CWE-125) in proftpd proftpd Summary: make_ftp_cmd in main.c in ProFTPD before 1.3.8a has a one-byte out-of-bounds read, and daemon crash, because of mishandling of quote/backslash semantics. Vulnerability Type: Vulnerability (CWE-125) Severity: high Affected Products: proftpd proftpd Indicators: error, vulnerability detected
id: CVE-2023-51713 info: name: ProFTPD < 1.3.8a - DoS via Out-of-Bounds Read author: pussycat0x severity: high description: ProFTPD versions before 1.3.8a contain a one-byte out-of-bounds read vulnerability in the make_ftp_cmd function within main.c. This vulnerability can lead to a daemon crash, causing denial of service. tags: cve,cve2023,network,ftp,proftpd,tcp,passive,vuln http: - method: GET path: - "/" matchers: - type: status status: - 200
cve
high
CVE-2023-51713
Generate a Nuclei template for: Gradle Library Version Disclosure
Title: Gradle Library Version Disclosure Summary: Gradle Library Version Disclosure. Tags: file, gradle, exposure Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: gradle-libs info: name: Gradle Library Version Disclosure author: DhiyaneshDK severity: info description: Gradle Library Version Disclosure tags: file,gradle,exposure,vuln http: - method: GET path: - "{{BaseURL}}/gradle/libs.versions.toml" - "{{BaseURL}}/libs.versions.toml" matchers: - type: word words: - "[versions]" - "[libraries]" - "[bundles]" part: body condition: and - type: status status: - 200
generic
info
gradle-libs
Generate a Nuclei template for CVE-2010-3867
Title: Path Traversal in proftpd proftpd Summary: Multiple directory traversal vulnerabilities in the mod_site_misc module in ProFTPD before 1.3.3c allow remote authenticated users to create directories, delete directories, create symlinks, and modify file timestamps via directory traversal sequences in a (1) SITE MKDIR, (2) SITE RMDIR, (3) SITE SYMLINK, or (4) SITE UTIME command. Vulnerability Type: Path Traversal Severity: high Affected Products: proftpd proftpd Indicators: error, vulnerability detected
id: CVE-2010-3867 info: name: ProFTPD < 1.3.3c - Directory Traversal via mod_site_misc author: pussycat0x severity: high description: ProFTPD versions before 1.3.3c contain directory traversal vulnerabilities in the mod_site_misc module. The vulnerability allows attackers to traverse directories and potentially overwrite arbitrary files on the system through crafted input to commands like SITE MKDIR and other SITE commands. tags: cve,cve2010,network,ftp,proftpd,tcp,passive,lfi,vuln http: - method: GET path: - "/" matchers: - type: status status: - 200
cve
high
CVE-2010-3867
Generate a Nuclei template for: Headless Http Screenshot
Title: Headless Http Screenshot Summary: Headless Http Screenshot. Takes a screenshot of the specified URLS. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: screenshot info: name: Headless Http Screenshot author: V0idC0de,righettod,tarunKoyalwar severity: info description: Takes a screenshot of the specified URLS. tags: headless,screenshot,discovery http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
screenshot
Generate a Nuclei template for: FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider Detection
Title: FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider Detection Summary: FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider Detection Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: wordpress-fluent-smtp info: name: FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider Detection author: ricardomaia severity: info description: FluentSMTP – WP SMTP Plugin with Amazon SES, SendGrid, MailGun, Postmark, Google and Any SMTP Provider Detection tags: tech,wordpress,wp-plugin,top-200,discovery http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/fluent-smtp/readme.txt" matchers: - type: dsl - type: regex part: body
generic
info
wordpress-fluent-smtp
Generate a Nuclei template for CVE-2023-1263
Title: Information Disclosure in niteothemes coming_soon_\&_maintenance Summary: The CMP – Coming Soon & Maintenance plugin for WordPress is vulnerable to Information Exposure in versions up to, and including, 4.1.6 via the cmp_get_post_detail function. This can allow unauthenticated individuals to obtain the contents of any non-password-protected, published post or page even when maintenance mode is enabled. Vulnerability Type: Information Disclosure Severity: medium Affected Products: niteothemes coming_soon_\&_maintenance Indicators: error, vulnerability detected
id: CVE-2023-1263 info: name: Coming Soon & Maintenance < 4.1.7 - Unauthenticated Post/Page Access author: r3Y3r53 severity: medium description: The plugin does not restrict access to published and non protected posts/pages when the maintenance mode is enabled, allowing unauthenticated users to access them. tags: cve,cve2023,wordpress,wpscan,wp-plugin,wp,cmp-coming-soon-maintenance,unauth,niteothemes,vuln http: - method: GET path: matchers: - type: word words: - ""img":" - ""date":" - ""title":" part: body condition: and - type: word words: - "application/json" part: header - type: status status: - 200
cve
medium
CVE-2023-1263
Generate a Nuclei template for CVE-2023-38879
Title: Path Traversal in os4ed opensis Summary: The Community Edition version 9.0 of OS4ED's openSIS Classic allows remote attackers to read arbitrary files via a directory traversal vulnerability in the 'filename' parameter of 'DownloadWindow.php'. Vulnerability Type: Path Traversal Severity: high Affected Products: os4ed opensis Indicators: error, vulnerability detected
id: CVE-2023-38879 info: name: openSIS v9.0 - Path Traversal author: haliteroglu severity: high description: A path traversal vulnerability exists in openSIS Classic Community Edition v9.0 via the 'filename' parameter in DownloadWindow.php. An unauthenticated remote attacker can exploit this to read arbitrary files on the server by manipulating file paths. tags: cve,cve2023,opensis,lfi,vuln http: - method: GET path: - "{{BaseURL}}/DownloadWindow.php?filename=../../../../../../../../etc/passwd" matchers: - type: regex part: body - type: word words: - "filename=" - "text/html" part: header condition: and - type: status status: - 200
cve
high
CVE-2023-38879
Generate a Nuclei template for: Kube API Namespaces
Title: Kube API Namespaces Summary: Kube API Namespaces. Scans for kube namespaces. Tags: tech, k8s, kubernetes Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: kube-api-namespaces info: name: Kube API Namespaces author: sharath severity: info description: Scans for kube namespaces tags: tech,k8s,kubernetes,devops,kube,discovery http: - method: GET path: - "{{BaseURL}}/api/v1/namespaces" matchers: - type: status status: - 200 - type: word words: - ""NamespaceList":" - ""items":" part: body condition: and
generic
info
kube-api-namespaces
Generate a Nuclei template for: Dropbox Long Lived API Token
Title: Dropbox Long Lived API Token Summary: Dropbox Long Lived API Token. Tags: dropbox, exposure, tokens Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: dropbox-long-token info: name: Dropbox Long Lived API Token author: DhiyaneshDK severity: info description: Dropbox Long Lived API Token tags: dropbox,exposure,tokens,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: status status: - 200
generic
info
dropbox-long-token
Generate a Nuclei template to detect Insufficiently Protected Credentials
Title: Insufficiently Protected Credentials (CWE-522) Summary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. Vulnerability Type: Insufficiently Protected Credentials Severity: medium Indicators: unauthorized
id: google-earth-dlogin info: name: Google Earth Enterprise Default Login author: orpheus,johnjhacking severity: high description: Google Earth Enterprise default login credentials were discovered. tags: default-login,google-earth,vuln http: - method: GET path: matchers: - type: status status: - 200 - type: word words: - "DashboardPanel" - "Earth Enterprise Server" condition: and
cwe
medium
CWE-522
Generate a Nuclei template for CVE-2020-8497
Title: Vulnerability (CWE-306) in artica pandora_fms Summary: In Artica Pandora FMS through 7.42, an unauthenticated attacker can read the chat history. The file is in JSON format and it contains user names, user IDs, private messages, and timestamps. Vulnerability Type: Vulnerability (CWE-306) Severity: medium Affected Products: artica pandora_fms Indicators: error, vulnerability detected
id: CVE-2020-8497 info: name: Artica Pandora FMS <=7.42 - Arbitrary File Read author: gy741 severity: medium description: Artica Pandora FMS through 7.42 is susceptible to arbitrary file read. An attacker can read the chat history, which is in JSON format and contains user names, user IDs, private messages, and timestamps. This can potentially lead to unauthorized data modification and other operations. tags: cve,cve2020,fms,artica,vuln http: - method: GET path: - "{{BaseURL}}/pandora_console/attachment/pandora_chat.log.json.txt" matchers: - type: word words: - ""type"" - ""id_user"" - ""user_name"" - ""text"" part: body condition: and - type: status status: - 200
cve
medium
CVE-2020-8497
Generate a Nuclei template for CVE-2022-2461
Title: Missing Authorization in transposh transposh_wordpress_translation Summary: The Transposh WordPress Translation plugin for WordPress is vulnerable to unauthorized setting changes by unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient permissions checking on the 'tp_translation' AJAX action and default settings which makes it possible for unauthenticated attackers to influence the data shown on the site. Vulnerability Type: Missing Authorization Severity: medium Affected Products: transposh transposh_wordpress_translation Indicators: unauthorized
id: CVE-2022-2461 info: name: Transposh WordPress Translation <= 1.0.8 - Unauthenticated Settings Change author: riteshs4hu severity: medium description: The Transposh WordPress Translation plugin for WordPress is vulnerable to unauthorized setting changes by unauthenticated users in versions up to, and including, 1.0.8.1. This is due to insufficient permissions checking on the 'tp_translation' AJAX action and default settings which makes it possible for unauthenticated attackers to influence the data shown on the site. tags: cve,cve2022,wordpress,wp-plugin,wp,wpscan,transposh-translation-filter-for-wordpress,info-leak,vkev,vuln http: - method: GET path: matchers: - type: dsl condition: and
cve
medium
CVE-2022-2461
Generate a Nuclei template for: BigQuery Datasets Not Encrypted with Customer-Managed Keys
Title: BigQuery Datasets Not Encrypted with Customer-Managed Keys Summary: BigQuery Datasets Not Encrypted with Customer-Managed Keys. Ensure that the tables created for your Google Cloud BigQuery datasets are encrypted with Customer-Managed Keys (CMKs) to have more granular control over the data encryption/decryption process. Using CMKs allows you to create, rotate, manage, and destroy your own encryption keys using Google Cloud Key Management Service (Cloud KMS). Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: gcloud-bigquery-cmk-not-enabled info: name: BigQuery Datasets Not Encrypted with Customer-Managed Keys author: princechaddha severity: high description: Ensure that the tables created for your Google Cloud BigQuery datasets are encrypted with Customer-Managed Keys (CMKs) to have more granular control over the data encryption/decryption process. Using CMKs allows you to create, rotate, manage, and destroy your own encryption keys using Google Cloud Key Management Service (Cloud KMS). tags: cloud,devops,gcp,gcloud,bigquery,gcp-cloud-config http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
high
gcloud-bigquery-cmk-not-enabled
Generate a Nuclei template for: mcafee phishing Detection
Title: mcafee phishing Detection Summary: mcafee phishing Detection. A mcafee phishing website was detected Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: mcafee-phish info: name: mcafee phishing Detection author: rxerium severity: info description: A mcafee phishing website was detected tags: phishing,mcafee,osint,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "Antivirus, VPN, Identity &amp; Privacy Protection | McAfee" - type: status status: - 200 - type: dsl
generic
info
mcafee-phish
Generate a Nuclei template for CVE-2022-31704
Title: Vulnerability (CWE-284) in vmware vrealize_log_insight Summary: The vRealize Log Insight contains a broken access control vulnerability. An unauthenticated malicious actor can remotely inject code into sensitive files of an impacted appliance which can result in remote code execution. Vulnerability Type: Vulnerability (CWE-284) Severity: critical Affected Products: vmware vrealize_log_insight Indicators: error, vulnerability detected
id: CVE-2022-31704 info: name: VMware vRealize Log Insight - Improper Access Control to RCE author: ritikchaddha severity: critical description: The vRealize Log Insight contains a broken access control vulnerability. An unauthenticated malicious actor can remotely inject code into sensitive files of an impacted appliance which can result in remote code execution. tags: cve,cve2022,vmware,vrealize,rce,lfi,passive,vkev,vuln http: - method: GET path: - "{{BaseURL}}/i18n/component/JS?locale=en-US" - "{{BaseURL}}/api/v1/version" matchers: - type: dsl condition: and - type: dsl condition: or
cve
critical
CVE-2022-31704