instruction
stringlengths 41
188
| input
stringlengths 165
3.12k
| output
stringlengths 256
2.26M
| category
stringclasses 3
values | severity
stringclasses 5
values | id
stringlengths 5
54
|
|---|---|---|---|---|---|
Generate a Nuclei template for CVE-2014-1841
|
Title: Path Traversal in southrivertech titan_ftp_server
Summary: Directory traversal vulnerability in the web interface in Titan FTP Server before 10.40 build 1829 allows remote attackers to copy an arbitrary user's home folder via a Move action with a .. (dot dot) in the src parameter.
Vulnerability Type: Path Traversal
Severity: medium
Affected Products: southrivertech titan_ftp_server
Indicators: error, vulnerability detected
|
id: CVE-2014-1841
info:
name: Titan FTP Server < 10.40 Move Function - Directory Traversal
author: pussycat0x
severity: medium
description: Titan FTP Server versions prior to 10.40 build 1829 contain a directory traversal vulnerability in the Move function. Remote attackers can copy the complete home folder of another user by exploiting the ../ path traversal in the search-bar value, allowing unauthorized access to sensitive user data.
tags: cve,cve2014,network,ftp,titan-ftp,tcp,passive,lfi,vuln
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2014-1841
|
Generate a Nuclei template for: Codepen - Out of Band Template Injection
|
Title: Codepen - Out of Band Template Injection
Summary: Codepen - Out of Band Template Injection. Tags: ssti, dast, oast
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: codepen-oob
info:
name: Codepen - Out of Band Template Injection
author: ritikchaddha
severity: high
description: Codepen - Out of Band Template Injection
tags: ssti,dast,oast,oob,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
generic
|
high
|
codepen-oob
|
Generate a Nuclei template for CVE-2023-4974
|
Title: SQL Injection in creativeitem academy_lms
Summary: A vulnerability was found in Academy LMS 6.2. It has been rated as critical. Affected by this issue is some unknown functionality of the file /academy/tutor/filter of the component GET Parameter Handler. The manipulation of the argument price_min/price_max leads to sql injection. The attack may be launched remotely. VDB-239750 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Vulnerability Type: SQL Injection
Severity: medium
Affected Products: creativeitem academy_lms
Indicators: error, vulnerability detected
|
id: CVE-2023-4974
info:
name: Academy LMS 6.2 - SQL Injection
author: theamanrawat
severity: critical
description: A vulnerability was found in Academy LMS 6.2. It has been rated as critical. Affected by this issue is some unknown functionality of the file /academy/tutor/filter of the component GET Parameter Handler. The manipulation of the argument price_min/price_max leads to sql injection. The attack may be launched remotely. VDB-239750 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
tags: time-based-sqli,cve,cve2023,packetstorm,sqli,academy,lms,creativeitem,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
medium
|
CVE-2023-4974
|
Generate a Nuclei template for: Topsec Topacm - Remote Code Execution
|
Title: Topsec Topacm - Remote Code Execution
Summary: Topsec Topacm - Remote Code Execution. Tianrongxin Internet Behavior Management System static_convert.php remote command execution vulnerability
Vulnerability Type: Security Check
Severity: critical
Indicators: vulnerability detected
|
id: topsec-topacm-rce
info:
name: Topsec Topacm - Remote Code Execution
author: SleepingBag945
severity: critical
description: Tianrongxin Internet Behavior Management System static_convert.php remote command execution vulnerability
tags: rce,topsec,topacm,intrusive,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "{{randstr}}"
part: body_2
- type: word
words:
- "text/plain"
part: header_2
- type: status
status:
- 200
part: header_2
|
generic
|
critical
|
topsec-topacm-rce
|
Generate a Nuclei template for: Azure Storage Private Endpoint Not Configured
|
Title: Azure Storage Private Endpoint Not Configured
Summary: Azure Storage Private Endpoint Not Configured. Ensure that private endpoints are configured for Microsoft Azure Storage accounts in order to allow clients and services to securely access data located over a network via an encrypted Private Link connection.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: azure-storage-private-endpoint-unconfigured
info:
name: Azure Storage Private Endpoint Not Configured
author: princechaddha
severity: high
description: Ensure that private endpoints are configured for Microsoft Azure Storage accounts in order to allow clients and services to securely access data located over a network via an encrypted Private Link connection.
tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
high
|
azure-storage-private-endpoint-unconfigured
|
Generate a Nuclei template for CVE-2021-46068
|
Title: Cross-Site Scripting (XSS) in vehicle_service_management_system_project vehicle_service_management_system
Summary: A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: vehicle_service_management_system_project vehicle_service_management_system
Indicators: error, vulnerability detected
|
id: CVE-2021-46068
info:
name: Vehicle Service Management System - Stored Cross-Site Scripting
author: TenBird
severity: medium
description: A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel.
tags: cve2021,cve,xss,vms,authenticated,vehicle_service_management_system_project,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
medium
|
CVE-2021-46068
|
Generate a Nuclei template for: Fronsetiav1.1 - Cross-Site Scripting
|
Title: Fronsetiav1.1 - Cross-Site Scripting
Summary: Fronsetiav1.1 - Cross-Site Scripting. The fronsetiav1.1 application is vulnerable to a Reflected XSS attack through the show_operations.jsp endpoint. An attacker can inject malicious scripts via the WSDL Location input, which is executed in the victim's browser due to improper input sanitization. This allows attackers to execute arbitrary JavaScript, potentially stealing sensitive data or performing phishing attacks..
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected
|
id: fronsetiav-xss
info:
name: Fronsetiav1.1 - Cross-Site Scripting
author: s4e-io
severity: high
description: The fronsetiav1.1 application is vulnerable to a Reflected XSS attack through the show_operations.jsp endpoint. An attacker can inject malicious scripts via the WSDL Location input, which is executed in the victim's browser due to improper input sanitization. This allows attackers to execute arbitrary JavaScript, potentially stealing sensitive data or performing phishing attacks..
tags: xss,fronsetia,vuln
http:
- method: GET
path:
- "{{BaseURL}}/show_operations.jsp?Fronsetia_WSDL=%22%3E%3Cimg%2Bsrc%3Dx%20onerror%3Dalert(document.domain)%3E"
matchers:
- type: dsl
condition: and
|
generic
|
high
|
fronsetiav-xss
|
Generate a Nuclei template for CVE-2022-26352
|
Title: Unknown Vulnerability in dotcms dotcms
Summary: An issue was discovered in the ContentResource API in dotCMS 3.0 through 22.02. Attackers can craft a multipart form request to post a file whose filename is not initially sanitized. This allows directory traversal, in which the file is saved outside of the intended storage location. If anonymous content creation is enabled, this allows an unauthenticated attacker to upload an executable file, such as a .jsp file, that can lead to remote code execution.
Vulnerability Type: Unknown Vulnerability
Severity: critical
Affected Products: dotcms dotcms
Indicators: error, vulnerability detected
|
id: CVE-2022-26352
info:
name: DotCMS - Arbitrary File Upload
author: h1ei1
severity: critical
description: DotCMS management system contains an arbitrary file upload vulnerability via the /api/content/ path which can allow attackers to upload malicious Trojans to obtain server permissions.
tags: cve,cve2022,packetstorm,rce,dotcms,kev,fileupload,intrusive,vkev,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
critical
|
CVE-2022-26352
|
Generate a Nuclei template for: LDAP Metadata - Enumeration
|
Title: LDAP Metadata - Enumeration
Summary: LDAP Metadata - Enumeration. LDAP metadata refers to the data that describes the structure, schema, and attributes of the LDAP directory
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: ldap-metadata
info:
name: LDAP Metadata - Enumeration
author: pussycat0x
severity: info
description: LDAP metadata refers to the data that describes the structure, schema, and attributes of the LDAP directory
tags: js,network,ldap,discovery
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
ldap-metadata
|
Generate a Nuclei template for CVE-2025-47204
|
Title: Cross-Site Request Forgery (CSRF) in davidstutz bootstrap_multiselect
Summary: An issue was discovered in post.php in bootstrap-multiselect (aka Bootstrap Multiselect) 1.1.2. A PHP script in the source code echoes arbitrary POST data. If a developer adopts this structure wholesale in a live application, it could create a Reflective Cross-Site Scripting (XSS) vulnerability exploitable through Cross-Site Request Forgery (CSRF).
Vulnerability Type: Cross-Site Request Forgery (CSRF)
Severity: medium
Affected Products: davidstutz bootstrap_multiselect
Indicators: error, vulnerability detected
|
id: CVE-2025-47204
info:
name: Bootstrap Multiselect <= 1.1.2 - Cross-Site Scripting
author: r3naissance
severity: medium
description: A PHP script in the source code release echoes arbitrary POST data. If a developer adopts this structure wholesale in a live application, it could create a Reflective Cross-Site Scripting (XSS) vulnerability exploitable through Cross-Site Request Forgery (CSRF).
tags: cve,cve2025,xss,bootstrap-multiselect,vkev,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
medium
|
CVE-2025-47204
|
Generate a Nuclei template for CVE-2011-0518
|
Title: Path Traversal in lotuscms fraise
Summary: Directory traversal vulnerability in core/lib/router.php in LotusCMS Fraise 3.0, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via the system parameter to index.php.
Vulnerability Type: Path Traversal
Severity: medium
Affected Products: lotuscms fraise
Indicators: error, vulnerability detected
|
id: CVE-2011-0518
info:
name: LotusCMS 3.0 - Remote Code Execution
author: pikpikcu
severity: critical
description: LotusCMS 3.0 is susceptible to remote code execution via the Router () function. This is done by embedding PHP code in the 'page' parameter, which will be passed to a eval call and allow remote code execution.
tags: cve,cve2011,lotuscms,rce,vuln
http:
- method: POST
path:
- "{{BaseURL}}/index.php"
- "{{BaseURL}}/lcms/index.php"
matchers:
- type: word
words:
- "38ee63071a04dc5e04ed22624c38e648"
part: body
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2011-0518
|
Generate a Nuclei template for: Umbraco Security Checks
|
Title: Umbraco Security Checks
Summary: Umbraco Security Checks. A simple workflow that runs all Umbraco related nuclei templates on a given target.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: umbraco-workflow
info:
name: Umbraco Security Checks
author: daffainfo
severity: info
description: A simple workflow that runs all Umbraco related nuclei templates on a given target.
tags: unknown
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
umbraco-workflow
|
Generate a Nuclei template for: deliveroo phishing Detection
|
Title: deliveroo phishing Detection
Summary: deliveroo phishing Detection. A deliveroo phishing website was detected
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: deliveroo-phish
info:
name: deliveroo phishing Detection
author: rxerium
severity: info
description: A deliveroo phishing website was detected
tags: phishing,deliveroo,osint,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "Deliveroo - Takeaway Food Delivery from Local Restaurants & Shops"
- type: status
status:
- 200
- type: dsl
|
generic
|
info
|
deliveroo-phish
|
Generate a Nuclei template for CVE-2020-12259
|
Title: Cross-Site Scripting (XSS) in rconfig rconfig
Summary: rConfig 3.9.4 is vulnerable to reflected XSS. The configDevice.php file improperly validates user input. An attacker can exploit this vulnerability by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: rconfig rconfig
Indicators: error, vulnerability detected
|
id: CVE-2020-12259
info:
name: rConfig 3.9.4 - Cross-Site Scripting
author: r3Y3r53
severity: medium
description: rConfig 3.9.4 is vulnerable to reflected XSS. The configDevice.php file improperly validates user input. An attacker can exploit this vulnerability by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php
tags: cve2020,cve,rconfig,authenticated,xss,vuln
http:
- method: GET
path:
matchers:
- type: dsl
condition: and
|
cve
|
medium
|
CVE-2020-12259
|
Generate a Nuclei template to detect Insufficiently Protected Credentials
|
Title: Insufficiently Protected Credentials (CWE-522)
Summary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Vulnerability Type: Insufficiently Protected Credentials
Severity: medium
Indicators: unauthorized
|
id: kettle-default-login
info:
name: Kettle - Default Login
author: For3stCo1d
severity: medium
description: Kettle contains a default login vulnerability. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations.
tags: default-login,kettle,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "Kettle slave server"
part: body
- type: status
status:
- 200
|
cwe
|
medium
|
CWE-522
|
Generate a Nuclei template for: Freepbx Security Checks
|
Title: Freepbx Security Checks
Summary: Freepbx Security Checks. A simple workflow that runs all FreePBX related nuclei templates on a given target.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: freepbx-workflow
info:
name: Freepbx Security Checks
author: darses
severity: info
description: A simple workflow that runs all FreePBX related nuclei templates on a given target.
tags: unknown
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
freepbx-workflow
|
Generate a Nuclei template for: OpenObserve Login Panel - Detect
|
Title: OpenObserve Login Panel - Detect
Summary: OpenObserve Login Panel - Detect. OpenObserve products was detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: openobserve-panel
info:
name: OpenObserve Login Panel - Detect
author: righettod
severity: info
description: OpenObserve products was detected.
tags: panel,openobserve,login,discovery
http:
- method: GET
path:
- "{{BaseURL}}/web/login"
matchers:
- type: dsl
condition: and
|
generic
|
info
|
openobserve-panel
|
Generate a Nuclei template for CVE-2016-10956
|
Title: Vulnerability (CWE-20) in mail-masta_project mail-masta
Summary: The mail-masta plugin 1.0 for WordPress has local file inclusion in count_of_send.php and csvexport.php.
Vulnerability Type: Vulnerability (CWE-20)
Severity: high
Affected Products: mail-masta_project mail-masta
Indicators: error, vulnerability detected
|
id: CVE-2016-10956
info:
name: WordPress Mail Masta 1.0 - Local File Inclusion
author: daffainfo,0x240x23elu
severity: high
description: WordPress Mail Masta 1.0 is susceptible to local file inclusion in count_of_send.php and csvexport.php.
tags: cve,cve2016,wordpress,wp-plugin,lfi,mail,mail-masta_project,vuln
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd"
- "{{BaseURL}}/wp-content/plugins/mail-masta/inc/lists/csvexport.php?pl=/etc/passwd"
matchers:
- type: regex
part: body
- type: status
status:
- 200
|
cve
|
high
|
CVE-2016-10956
|
Generate a Nuclei template for CVE-2022-32771
|
Title: Cross-Site Scripting (XSS) in wwbn avideo
Summary: A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the "success" parameter which is inserted into the document with insufficient sanitization.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: wwbn avideo
Indicators: error, vulnerability detected
|
id: CVE-2022-32771
info:
name: WWBN AVideo 11.6 - Cross-Site Scripting
author: arafatansari
severity: medium
description: WWBN AVideo 11.6 contains a cross-site scripting vulnerability in the footer alerts functionality via the 'success' parameter, which is inserted into the document with insufficient sanitization.
tags: cve,cve2022,avideo,xss,wwbn,vuln
http:
- method: GET
path:
- "{{BaseURL}}/index.php?success=%3C%2Fscript%3E%3Cscript%3Ealert%28document.cookie%29%3B%3C%2Fscript%3E"
matchers:
- type: word
words:
- "avideoAlertSuccess("</script><script>alert(document.cookie);</script>"
- "text: "</script><script>alert(document.cookie);</script>"
part: body
condition: or
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2022-32771
|
Generate a Nuclei template for CVE-2021-24276
|
Title: Cross-Site Scripting (XSS) in supsystic contact_form
Summary: The Contact Form by Supsystic WordPress plugin before 1.7.15 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: supsystic contact_form
Indicators: error, vulnerability detected
|
id: CVE-2021-24276
info:
name: WordPress Supsystic Contact Form <1.7.15 - Cross-Site Scripting
author: dhiyaneshDK
severity: medium
description: WordPress Supsystic Contact Form plugin before 1.7.15 contains a cross-site scripting vulnerability. It does not sanitize the tab parameter of its options page before outputting it in an attribute.
tags: cve2021,cve,wordpress,wp-plugin,wpscan,packetstorm,supsystic,vuln
http:
- method: GET
path:
- "{{BaseURL}}/wp-admin/admin.php?page=contact-form-supsystic&tab=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E"
matchers:
- type: word
words:
- "</script><script>alert(document.domain)</script>"
part: body
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2021-24276
|
Generate a Nuclei template for CVE-2024-5420
|
Title: Cross-Site Scripting (XSS) in CVE-2024-5420
Summary: Missing input validation in the SEH Computertechnik utnserver Pro, SEH Computertechnik utnserver ProMAX, SEH Computertechnik INU-100 web-interface allows stored Cross-Site Scripting (XSS)..This issue affects utnserver Pro, utnserver ProMAX, INU-100 version 20.1.22 and below.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Indicators: error, vulnerability detected
|
id: CVE-2024-5420
info:
name: SEH utnserver Pro/ProMAX/INU-100 20.1.22 - Cross-Site Scripting
author: bl4ckp4r4d1s3
severity: high
description: A vulnerability was found in utnserver Pro, utnserver ProMAX, and INU-100 version 20.1.22 and earlier, affecting the device description parameter in the web interface. This flaw allows stored cross-site scripting (XSS), enabling attackers to inject JavaScript code. The attack can be executed remotely by tricking victims into visiting a malicious website, potentially leading to session hijacking. This vulnerability is publicly disclosed and identified as CVE-2024-5420.
tags: cve,cve2024,utnserver,seh,xss,seclists,vuln
http:
- method: GET
path:
matchers:
- type: word
words:
- "value="“><script>alert(document.domain)</script>" id="standort""
- "Host name</label>"
part: body
condition: and
- type: word
words:
- "text/html"
part: header
- type: status
status:
- 200
|
cve
|
medium
|
CVE-2024-5420
|
Generate a Nuclei template for: Cloudinary Credentials Disclosure
|
Title: Cloudinary Credentials Disclosure
Summary: Cloudinary Credentials Disclosure. Tags: exposure, token, cloudinary
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected
|
id: cloudinary-credentials
info:
name: Cloudinary Credentials Disclosure
author: Ice3man
severity: info
description: Cloudinary Credentials Disclosure
tags: exposure,token,cloudinary,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: status
status:
- 200
|
generic
|
info
|
cloudinary-credentials
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.