instruction
stringlengths
41
188
input
stringlengths
165
3.12k
output
stringlengths
256
2.26M
category
stringclasses
3 values
severity
stringclasses
5 values
id
stringlengths
5
54
Generate a Nuclei template for CVE-2014-1841
Title: Path Traversal in southrivertech titan_ftp_server Summary: Directory traversal vulnerability in the web interface in Titan FTP Server before 10.40 build 1829 allows remote attackers to copy an arbitrary user's home folder via a Move action with a .. (dot dot) in the src parameter. Vulnerability Type: Path Traversal Severity: medium Affected Products: southrivertech titan_ftp_server Indicators: error, vulnerability detected
id: CVE-2014-1841 info: name: Titan FTP Server < 10.40 Move Function - Directory Traversal author: pussycat0x severity: medium description: Titan FTP Server versions prior to 10.40 build 1829 contain a directory traversal vulnerability in the Move function. Remote attackers can copy the complete home folder of another user by exploiting the ../ path traversal in the search-bar value, allowing unauthorized access to sensitive user data. tags: cve,cve2014,network,ftp,titan-ftp,tcp,passive,lfi,vuln http: - method: GET path: - "/" matchers: - type: status status: - 200
cve
medium
CVE-2014-1841
Generate a Nuclei template for: Codepen - Out of Band Template Injection
Title: Codepen - Out of Band Template Injection Summary: Codepen - Out of Band Template Injection. Tags: ssti, dast, oast Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: codepen-oob info: name: Codepen - Out of Band Template Injection author: ritikchaddha severity: high description: Codepen - Out of Band Template Injection tags: ssti,dast,oast,oob,vuln http: - method: GET path: matchers: - type: dsl condition: and
generic
high
codepen-oob
Generate a Nuclei template for CVE-2023-4974
Title: SQL Injection in creativeitem academy_lms Summary: A vulnerability was found in Academy LMS 6.2. It has been rated as critical. Affected by this issue is some unknown functionality of the file /academy/tutor/filter of the component GET Parameter Handler. The manipulation of the argument price_min/price_max leads to sql injection. The attack may be launched remotely. VDB-239750 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. Vulnerability Type: SQL Injection Severity: medium Affected Products: creativeitem academy_lms Indicators: error, vulnerability detected
id: CVE-2023-4974 info: name: Academy LMS 6.2 - SQL Injection author: theamanrawat severity: critical description: A vulnerability was found in Academy LMS 6.2. It has been rated as critical. Affected by this issue is some unknown functionality of the file /academy/tutor/filter of the component GET Parameter Handler. The manipulation of the argument price_min/price_max leads to sql injection. The attack may be launched remotely. VDB-239750 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. tags: time-based-sqli,cve,cve2023,packetstorm,sqli,academy,lms,creativeitem,vuln http: - method: GET path: matchers: - type: dsl condition: and
cve
medium
CVE-2023-4974
Generate a Nuclei template for: Topsec Topacm - Remote Code Execution
Title: Topsec Topacm - Remote Code Execution Summary: Topsec Topacm - Remote Code Execution. Tianrongxin Internet Behavior Management System static_convert.php remote command execution vulnerability Vulnerability Type: Security Check Severity: critical Indicators: vulnerability detected
id: topsec-topacm-rce info: name: Topsec Topacm - Remote Code Execution author: SleepingBag945 severity: critical description: Tianrongxin Internet Behavior Management System static_convert.php remote command execution vulnerability tags: rce,topsec,topacm,intrusive,vuln http: - method: GET path: matchers: - type: word words: - "{{randstr}}" part: body_2 - type: word words: - "text/plain" part: header_2 - type: status status: - 200 part: header_2
generic
critical
topsec-topacm-rce
Generate a Nuclei template for: Azure Storage Private Endpoint Not Configured
Title: Azure Storage Private Endpoint Not Configured Summary: Azure Storage Private Endpoint Not Configured. Ensure that private endpoints are configured for Microsoft Azure Storage accounts in order to allow clients and services to securely access data located over a network via an encrypted Private Link connection. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: azure-storage-private-endpoint-unconfigured info: name: Azure Storage Private Endpoint Not Configured author: princechaddha severity: high description: Ensure that private endpoints are configured for Microsoft Azure Storage accounts in order to allow clients and services to securely access data located over a network via an encrypted Private Link connection. tags: cloud,devops,azure,microsoft,azure-storage,azure-cloud-config http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
high
azure-storage-private-endpoint-unconfigured
Generate a Nuclei template for CVE-2021-46068
Title: Cross-Site Scripting (XSS) in vehicle_service_management_system_project vehicle_service_management_system Summary: A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: vehicle_service_management_system_project vehicle_service_management_system Indicators: error, vulnerability detected
id: CVE-2021-46068 info: name: Vehicle Service Management System - Stored Cross-Site Scripting author: TenBird severity: medium description: A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel. tags: cve2021,cve,xss,vms,authenticated,vehicle_service_management_system_project,vuln http: - method: GET path: matchers: - type: dsl condition: and
cve
medium
CVE-2021-46068
Generate a Nuclei template for: Fronsetiav1.1 - Cross-Site Scripting
Title: Fronsetiav1.1 - Cross-Site Scripting Summary: Fronsetiav1.1 - Cross-Site Scripting. The fronsetiav1.1 application is vulnerable to a Reflected XSS attack through the show_operations.jsp endpoint. An attacker can inject malicious scripts via the WSDL Location input, which is executed in the victim's browser due to improper input sanitization. This allows attackers to execute arbitrary JavaScript, potentially stealing sensitive data or performing phishing attacks.. Vulnerability Type: Security Check Severity: high Indicators: vulnerability detected
id: fronsetiav-xss info: name: Fronsetiav1.1 - Cross-Site Scripting author: s4e-io severity: high description: The fronsetiav1.1 application is vulnerable to a Reflected XSS attack through the show_operations.jsp endpoint. An attacker can inject malicious scripts via the WSDL Location input, which is executed in the victim's browser due to improper input sanitization. This allows attackers to execute arbitrary JavaScript, potentially stealing sensitive data or performing phishing attacks.. tags: xss,fronsetia,vuln http: - method: GET path: - "{{BaseURL}}/show_operations.jsp?Fronsetia_WSDL=%22%3E%3Cimg%2Bsrc%3Dx%20onerror%3Dalert(document.domain)%3E" matchers: - type: dsl condition: and
generic
high
fronsetiav-xss
Generate a Nuclei template for CVE-2022-26352
Title: Unknown Vulnerability in dotcms dotcms Summary: An issue was discovered in the ContentResource API in dotCMS 3.0 through 22.02. Attackers can craft a multipart form request to post a file whose filename is not initially sanitized. This allows directory traversal, in which the file is saved outside of the intended storage location. If anonymous content creation is enabled, this allows an unauthenticated attacker to upload an executable file, such as a .jsp file, that can lead to remote code execution. Vulnerability Type: Unknown Vulnerability Severity: critical Affected Products: dotcms dotcms Indicators: error, vulnerability detected
id: CVE-2022-26352 info: name: DotCMS - Arbitrary File Upload author: h1ei1 severity: critical description: DotCMS management system contains an arbitrary file upload vulnerability via the /api/content/ path which can allow attackers to upload malicious Trojans to obtain server permissions. tags: cve,cve2022,packetstorm,rce,dotcms,kev,fileupload,intrusive,vkev,vuln http: - method: GET path: matchers: - type: dsl condition: and
cve
critical
CVE-2022-26352
Generate a Nuclei template for: LDAP Metadata - Enumeration
Title: LDAP Metadata - Enumeration Summary: LDAP Metadata - Enumeration. LDAP metadata refers to the data that describes the structure, schema, and attributes of the LDAP directory Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: ldap-metadata info: name: LDAP Metadata - Enumeration author: pussycat0x severity: info description: LDAP metadata refers to the data that describes the structure, schema, and attributes of the LDAP directory tags: js,network,ldap,discovery http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
ldap-metadata
Generate a Nuclei template for CVE-2025-47204
Title: Cross-Site Request Forgery (CSRF) in davidstutz bootstrap_multiselect Summary: An issue was discovered in post.php in bootstrap-multiselect (aka Bootstrap Multiselect) 1.1.2. A PHP script in the source code echoes arbitrary POST data. If a developer adopts this structure wholesale in a live application, it could create a Reflective Cross-Site Scripting (XSS) vulnerability exploitable through Cross-Site Request Forgery (CSRF). Vulnerability Type: Cross-Site Request Forgery (CSRF) Severity: medium Affected Products: davidstutz bootstrap_multiselect Indicators: error, vulnerability detected
id: CVE-2025-47204 info: name: Bootstrap Multiselect <= 1.1.2 - Cross-Site Scripting author: r3naissance severity: medium description: A PHP script in the source code release echoes arbitrary POST data. If a developer adopts this structure wholesale in a live application, it could create a Reflective Cross-Site Scripting (XSS) vulnerability exploitable through Cross-Site Request Forgery (CSRF). tags: cve,cve2025,xss,bootstrap-multiselect,vkev,vuln http: - method: GET path: matchers: - type: dsl condition: and
cve
medium
CVE-2025-47204
Generate a Nuclei template for CVE-2011-0518
Title: Path Traversal in lotuscms fraise Summary: Directory traversal vulnerability in core/lib/router.php in LotusCMS Fraise 3.0, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via the system parameter to index.php. Vulnerability Type: Path Traversal Severity: medium Affected Products: lotuscms fraise Indicators: error, vulnerability detected
id: CVE-2011-0518 info: name: LotusCMS 3.0 - Remote Code Execution author: pikpikcu severity: critical description: LotusCMS 3.0 is susceptible to remote code execution via the Router () function. This is done by embedding PHP code in the 'page' parameter, which will be passed to a eval call and allow remote code execution. tags: cve,cve2011,lotuscms,rce,vuln http: - method: POST path: - "{{BaseURL}}/index.php" - "{{BaseURL}}/lcms/index.php" matchers: - type: word words: - "38ee63071a04dc5e04ed22624c38e648" part: body - type: status status: - 200
cve
medium
CVE-2011-0518
Generate a Nuclei template for: Umbraco Security Checks
Title: Umbraco Security Checks Summary: Umbraco Security Checks. A simple workflow that runs all Umbraco related nuclei templates on a given target. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: umbraco-workflow info: name: Umbraco Security Checks author: daffainfo severity: info description: A simple workflow that runs all Umbraco related nuclei templates on a given target. tags: unknown http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
umbraco-workflow
Generate a Nuclei template for: deliveroo phishing Detection
Title: deliveroo phishing Detection Summary: deliveroo phishing Detection. A deliveroo phishing website was detected Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: deliveroo-phish info: name: deliveroo phishing Detection author: rxerium severity: info description: A deliveroo phishing website was detected tags: phishing,deliveroo,osint,discovery http: - method: GET path: - "{{BaseURL}}" matchers: - type: word words: - "Deliveroo - Takeaway Food Delivery from Local Restaurants &amp; Shops" - type: status status: - 200 - type: dsl
generic
info
deliveroo-phish
Generate a Nuclei template for CVE-2020-12259
Title: Cross-Site Scripting (XSS) in rconfig rconfig Summary: rConfig 3.9.4 is vulnerable to reflected XSS. The configDevice.php file improperly validates user input. An attacker can exploit this vulnerability by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: rconfig rconfig Indicators: error, vulnerability detected
id: CVE-2020-12259 info: name: rConfig 3.9.4 - Cross-Site Scripting author: r3Y3r53 severity: medium description: rConfig 3.9.4 is vulnerable to reflected XSS. The configDevice.php file improperly validates user input. An attacker can exploit this vulnerability by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php tags: cve2020,cve,rconfig,authenticated,xss,vuln http: - method: GET path: matchers: - type: dsl condition: and
cve
medium
CVE-2020-12259
Generate a Nuclei template to detect Insufficiently Protected Credentials
Title: Insufficiently Protected Credentials (CWE-522) Summary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. Vulnerability Type: Insufficiently Protected Credentials Severity: medium Indicators: unauthorized
id: kettle-default-login info: name: Kettle - Default Login author: For3stCo1d severity: medium description: Kettle contains a default login vulnerability. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unauthorized operations. tags: default-login,kettle,vuln http: - method: GET path: matchers: - type: word words: - "Kettle slave server" part: body - type: status status: - 200
cwe
medium
CWE-522
Generate a Nuclei template for: Freepbx Security Checks
Title: Freepbx Security Checks Summary: Freepbx Security Checks. A simple workflow that runs all FreePBX related nuclei templates on a given target. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: freepbx-workflow info: name: Freepbx Security Checks author: darses severity: info description: A simple workflow that runs all FreePBX related nuclei templates on a given target. tags: unknown http: - method: GET path: - "/" matchers: - type: status status: - 200
generic
info
freepbx-workflow
Generate a Nuclei template for: OpenObserve Login Panel - Detect
Title: OpenObserve Login Panel - Detect Summary: OpenObserve Login Panel - Detect. OpenObserve products was detected. Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: openobserve-panel info: name: OpenObserve Login Panel - Detect author: righettod severity: info description: OpenObserve products was detected. tags: panel,openobserve,login,discovery http: - method: GET path: - "{{BaseURL}}/web/login" matchers: - type: dsl condition: and
generic
info
openobserve-panel
Generate a Nuclei template for CVE-2016-10956
Title: Vulnerability (CWE-20) in mail-masta_project mail-masta Summary: The mail-masta plugin 1.0 for WordPress has local file inclusion in count_of_send.php and csvexport.php. Vulnerability Type: Vulnerability (CWE-20) Severity: high Affected Products: mail-masta_project mail-masta Indicators: error, vulnerability detected
id: CVE-2016-10956 info: name: WordPress Mail Masta 1.0 - Local File Inclusion author: daffainfo,0x240x23elu severity: high description: WordPress Mail Masta 1.0 is susceptible to local file inclusion in count_of_send.php and csvexport.php. tags: cve,cve2016,wordpress,wp-plugin,lfi,mail,mail-masta_project,vuln http: - method: GET path: - "{{BaseURL}}/wp-content/plugins/mail-masta/inc/campaign/count_of_send.php?pl=/etc/passwd" - "{{BaseURL}}/wp-content/plugins/mail-masta/inc/lists/csvexport.php?pl=/etc/passwd" matchers: - type: regex part: body - type: status status: - 200
cve
high
CVE-2016-10956
Generate a Nuclei template for CVE-2022-32771
Title: Cross-Site Scripting (XSS) in wwbn avideo Summary: A cross-site scripting (xss) vulnerability exists in the footer alerts functionality of WWBN AVideo 11.6 and dev master commit 3f7c0364. A specially-crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get an authenticated user to send a crafted HTTP request to trigger this vulnerability.This vulnerability arrises from the "success" parameter which is inserted into the document with insufficient sanitization. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: wwbn avideo Indicators: error, vulnerability detected
id: CVE-2022-32771 info: name: WWBN AVideo 11.6 - Cross-Site Scripting author: arafatansari severity: medium description: WWBN AVideo 11.6 contains a cross-site scripting vulnerability in the footer alerts functionality via the 'success' parameter, which is inserted into the document with insufficient sanitization. tags: cve,cve2022,avideo,xss,wwbn,vuln http: - method: GET path: - "{{BaseURL}}/index.php?success=%3C%2Fscript%3E%3Cscript%3Ealert%28document.cookie%29%3B%3C%2Fscript%3E" matchers: - type: word words: - "avideoAlertSuccess("</script><script>alert(document.cookie);</script>" - "text: "</script><script>alert(document.cookie);</script>" part: body condition: or - type: word words: - "text/html" part: header - type: status status: - 200
cve
medium
CVE-2022-32771
Generate a Nuclei template for CVE-2021-24276
Title: Cross-Site Scripting (XSS) in supsystic contact_form Summary: The Contact Form by Supsystic WordPress plugin before 1.7.15 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Affected Products: supsystic contact_form Indicators: error, vulnerability detected
id: CVE-2021-24276 info: name: WordPress Supsystic Contact Form <1.7.15 - Cross-Site Scripting author: dhiyaneshDK severity: medium description: WordPress Supsystic Contact Form plugin before 1.7.15 contains a cross-site scripting vulnerability. It does not sanitize the tab parameter of its options page before outputting it in an attribute. tags: cve2021,cve,wordpress,wp-plugin,wpscan,packetstorm,supsystic,vuln http: - method: GET path: - "{{BaseURL}}/wp-admin/admin.php?page=contact-form-supsystic&tab=%3C%2Fscript%3E%3Cscript%3Ealert%28document.domain%29%3C%2Fscript%3E" matchers: - type: word words: - "</script><script>alert(document.domain)</script>" part: body - type: word words: - "text/html" part: header - type: status status: - 200
cve
medium
CVE-2021-24276
Generate a Nuclei template for CVE-2024-5420
Title: Cross-Site Scripting (XSS) in CVE-2024-5420 Summary: Missing input validation in the SEH Computertechnik utnserver Pro, SEH Computertechnik utnserver ProMAX, SEH Computertechnik INU-100 web-interface allows stored Cross-Site Scripting (XSS)..This issue affects utnserver Pro, utnserver ProMAX, INU-100 version 20.1.22 and below. Vulnerability Type: Cross-Site Scripting (XSS) Severity: medium Indicators: error, vulnerability detected
id: CVE-2024-5420 info: name: SEH utnserver Pro/ProMAX/INU-100 20.1.22 - Cross-Site Scripting author: bl4ckp4r4d1s3 severity: high description: A vulnerability was found in utnserver Pro, utnserver ProMAX, and INU-100 version 20.1.22 and earlier, affecting the device description parameter in the web interface. This flaw allows stored cross-site scripting (XSS), enabling attackers to inject JavaScript code. The attack can be executed remotely by tricking victims into visiting a malicious website, potentially leading to session hijacking. This vulnerability is publicly disclosed and identified as CVE-2024-5420. tags: cve,cve2024,utnserver,seh,xss,seclists,vuln http: - method: GET path: matchers: - type: word words: - "value="“><script>alert(document.domain)</script>" id="standort"" - "Host name</label>" part: body condition: and - type: word words: - "text/html" part: header - type: status status: - 200
cve
medium
CVE-2024-5420
Generate a Nuclei template for: Cloudinary Credentials Disclosure
Title: Cloudinary Credentials Disclosure Summary: Cloudinary Credentials Disclosure. Tags: exposure, token, cloudinary Vulnerability Type: Security Check Severity: info Indicators: vulnerability detected
id: cloudinary-credentials info: name: Cloudinary Credentials Disclosure author: Ice3man severity: info description: Cloudinary Credentials Disclosure tags: exposure,token,cloudinary,vuln http: - method: GET path: - "{{BaseURL}}" matchers: - type: status status: - 200
generic
info
cloudinary-credentials