Dataset Viewer
Auto-converted to Parquet Duplicate
id
stringlengths
5
53
prompt
stringlengths
1.49k
6.97k
completion
stringlengths
924
11.2M
CVE-2021-24827
[CANONICAL_RECORD] { "cve_id": "CVE-2021-24827", "summary": "The Asgaros Forum WordPress plugin before 1.15.13 does not validate and escape user input when subscribing to a topic before using it in a SQL statement, leading to an unauthenticated SQL injection issue", "affected_products": [ { "vendor": "a...
{ "id": "cve-2021-24827", "info": { "name": "WordPress Asgaros Forum <1.15.13 - SQL Injection", "author": "theamanrawat", "severity": "critical", "description": "WordPress Asgaros Forum plugin before 1.15.13 is susceptible to SQL injection. The plugin does not validate and escape user input when sub...
wordpress-one-click-demo-import
[CANONICAL_RECORD] { "cve_id": "wordpress-one-click-demo-import", "summary": "One Click Demo Import Detection. This template detects One Click Demo Import Detection by checking specific patterns and responses.", "affected_products": [], "paths": [ "{{BaseURL}}/wp-content/plugins/one-click-demo-import/readme...
{ "id": "wordpress-one-click-demo-import", "info": { "name": "One Click Demo Import Detection", "author": "ricardomaia", "severity": "info", "description": "One Click Demo Import Detection", "tags": [ "tech", "wordpress", "wp-plugin", "top-100", "top-200", "di...
CVE-2018-8715
[CANONICAL_RECORD] { "cve_id": "CVE-2018-8715", "summary": "The Embedthis HTTP library, and Appweb versions before 7.0.3, have a logic flaw related to the authCondition function in http/httpLib.c. With a forged HTTP request, it is possible to bypass authentication for the form and digest login types.", "affected_...
{ "id": "cve-2018-8715", "info": { "name": "AppWeb - Authentication Bypass", "author": "milo2012", "severity": "high", "description": "The Embedthis HTTP library, and Appweb versions before 7.0.3, have a logic flaw related to the authCondition function in http/httpLib.c. With a forged HTTP request, ...
unauth-zwave-mqtt
[CANONICAL_RECORD] { "cve_id": "unauth-zwave-mqtt", "summary": "ZWave To MQTT Console is exposed.. This template detects Unauthenticated ZWave To MQTT Console by checking specific patterns and responses.", "affected_products": [], "paths": [ "{{BaseURL}}" ], "indicators": [ "ZWave To MQTT", "con...
{ "id": "unauth-zwave-mqtt", "info": { "name": "Unauthenticated ZWave To MQTT Console", "author": "geeknik", "severity": "low", "description": "ZWave To MQTT Console is exposed.", "tags": [ "misconfig", "zwave", "mqtt", "unauth", "vuln" ], "reference": [ ...
CWE-200
[CANONICAL_RECORD] { "cve_id": "CWE-200", "summary": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on ...
{ "id": "pulsar-adminui-panel", "info": { "name": "Pulsar Admin UI Panel - Detect", "author": "ritikchaddha", "severity": "info", "description": "Pulsar admin UI panel was detected.", "tags": [ "panel", "pulsar", "pulsarui", "admin", "apache", "discovery" ...
arcade-php-sqli
[CANONICAL_RECORD] { "cve_id": "arcade-php-sqli", "summary": "The arcade.php script is vulnerable to SQL injection. By exploiting this vulnerability, an attacker can manipulate the SQL queries executed by the script, potentially gaining unauthorized access to the database.\n", "affected_products": [], "paths": ...
{ "id": "arcade-php-sqli", "info": { "name": "Arcade.php - SQL Injection", "author": "MaStErChO", "severity": "high", "description": "The arcade.php script is vulnerable to SQL injection. By exploiting this vulnerability, an attacker can manipulate the SQL queries executed by the script, potentially...
CWE-200
[CANONICAL_RECORD] { "cve_id": "CWE-200", "summary": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on ...
{ "id": "gradle-cache-node-detect", "info": { "name": "Gradle Enterprise Build Cache Node Login Panel - Detect", "author": "Adam Crosser,righettod", "severity": "info", "description": "Gradle Enterprise Build Cache Node login panel was detected.", "tags": [ "panel", "gradle", "...
slack-config-refresh-token
[CANONICAL_RECORD] { "cve_id": "slack-config-refresh-token", "summary": "Slack Config Refresh Token. This template detects Slack Config Refresh Token by checking specific patterns and responses.", "affected_products": [], "paths": [ "{{BaseURL}}" ], "indicators": [ "Slack Config Refresh Token", ...
{ "id": "slack-config-refresh-token", "info": { "name": "Slack Config Refresh Token", "author": "DhiyaneshDK", "severity": "info", "description": "Slack Config Refresh Token", "tags": [ "exposure", "token", "slack", "vuln" ], "reference": [ "https://github.c...
CWE-200
[CANONICAL_RECORD] { "cve_id": "CWE-200", "summary": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on ...
{ "id": "steam", "info": { "name": "Steam User Name Information - Detect", "author": "dwisiswant0", "severity": "info", "description": "Steam user name information check was conducted.", "tags": [ "osint", "osint-gaming", "steam", "discovery" ], "reference": [] ...
hp-ftp-detect
[CANONICAL_RECORD] { "cve_id": "hp-ftp-detect", "summary": "Hewlett-Packard FTP service was detected.. This template detects Hewlett-Packard FTP Service - Detect by checking specific patterns and responses.", "affected_products": [], "paths": [], "indicators": [ "Hewlett-Packard FTP Service - Detect", ...
{ "id": "hp-ftp-detect", "info": { "name": "Hewlett-Packard FTP Service - Detect", "author": "pussycat0x", "severity": "info", "description": "Hewlett-Packard FTP service was detected.", "tags": [ "network", "ftp", "hp", "detect", "tcp", "discovery" ], ...
traefik-workflow
[CANONICAL_RECORD] { "cve_id": "traefik-workflow", "summary": "A simple workflow that runs all Traefik related nuclei templates on a given target.", "affected_products": [], "paths": [], "indicators": [ "Traefik Security Checks", "detected" ], "severity_hint": "info" } [RETRIEVED_TEMPLATES] [ {...
{ "id": "traefik-workflow", "info": { "name": "Traefik Security Checks", "author": "daffainfo", "severity": "info", "description": "A simple workflow that runs all Traefik related nuclei templates on a given target.", "tags": [ "unknown" ], "reference": [] }, "requests": [ ...
CWE-601
[CANONICAL_RECORD] { "cve_id": "CWE-601", "summary": "The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.", "affected_products": [], "paths": [], "indicators": [ "vulnerability detected", "error" ], "severity_hint": "high...
{ "id": "icewarp-open-redirect", "info": { "name": "IceWarp - Open Redirect", "author": "uomogrande", "severity": "medium", "description": "IceWarp open redirect vulnerabilities were detected. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data,...
CVE-2023-43325
[CANONICAL_RECORD] { "cve_id": "CVE-2023-43325", "summary": "A reflected cross-site scripting (XSS) vulnerability in the data[redirect_url] parameter of mooSocial v3.1.8 allows attackers to steal user's session cookies and impersonate their account via a crafted URL.", "affected_products": [ { "vendor":...
{ "id": "cve-2023-43325", "info": { "name": "MooSocial 3.1.8 - Cross-Site Scripting", "author": "r3Y3r53", "severity": "medium", "description": "A reflected cross-site scripting (XSS) vulnerability exisits in the data[redirect_url] parameter on user login function of mooSocial v3.1.8 which allows at...
jazzhr-takeover
[CANONICAL_RECORD] { "cve_id": "jazzhr-takeover", "summary": "jazzhr takeover was detected.. This template detects jazzhr takeover detection by checking specific patterns and responses.", "affected_products": [], "paths": [ "{{BaseURL}}" ], "indicators": [ "This account no longer active" ], "sev...
{ "id": "jazzhr-takeover", "info": { "name": "jazzhr takeover detection", "author": "pdteam", "severity": "high", "description": "jazzhr takeover was detected.", "tags": [ "takeover", "vuln" ], "reference": [ "https://github.com/EdOverflow/can-i-take-over-xyz" ] }...
CWE-200
[CANONICAL_RECORD] { "cve_id": "CWE-200", "summary": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on ...
{ "id": "itchio", "info": { "name": "Itch.io User Name Information - Detect", "author": "dwisiswant0", "severity": "info", "description": "Itch.io user name information check was conducted.", "tags": [ "osint", "osint-gaming", "itchio", "discovery" ], "reference":...
CWE-200
[CANONICAL_RECORD] { "cve_id": "CWE-200", "summary": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on ...
{ "id": "bazarr-login-detect", "info": { "name": "Bazarr Login - Detect", "author": "r3dg33k", "severity": "info", "description": "Bazarr login page was detected.", "tags": [ "panel", "bazarr", "login", "discovery" ], "reference": [ "https://www.bazarr.media...
CVE-2025-49029
[CANONICAL_RECORD] { "cve_id": "CVE-2025-49029", "summary": "Improper Control of Generation of Code ('Code Injection') vulnerability in bitto.Kazi Custom Login And Signup Widget allows Code Injection.This issue affects Custom Login And Signup Widget: from n/a through 1.0.", "affected_products": [], "paths": [],...
{ "id": "cve-2025-49029", "info": { "name": "WordPress Custom Login And Signup Widget Plugin <= 1.0 - Arbitrary Code Execution", "author": "pussycat0x", "severity": "high", "description": "Improper Control of Generation of Code ('Code Injection') vulnerability in bitto.Kazi Custom Login And Signup W...
tautulli-panel
[CANONICAL_RECORD] { "cve_id": "tautulli-panel", "summary": "A Python based monitoring and tracking tool for Plex Media Server.\n", "affected_products": [], "paths": [ "{{BaseURL}}", "{{BaseURL}}/auth/login" ], "indicators": [ "<title>Tautulli - Login", "content=\"Tautulli", "alt=\"Tautu...
{ "id": "tautulli-panel", "info": { "name": "Tautulli Panel - Detect", "author": "rxerium", "severity": "info", "description": "A Python based monitoring and tracking tool for Plex Media Server.\n", "tags": [ "panel", "tautulli", "detect", "discovery" ], "referenc...
CWE-200
[CANONICAL_RECORD] { "cve_id": "CWE-200", "summary": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on ...
{ "id": "wgetrc-config", "info": { "name": "Wgetrc Configuration File - Detect", "author": "DhiyaneshDK", "severity": "info", "description": "Wgetrc configuration file was detected.", "tags": [ "devops", "exposure", "vuln" ], "reference": [ "https://www.gnu.org/so...
CWE-200
[CANONICAL_RECORD] { "cve_id": "CWE-200", "summary": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on ...
{ "id": "drupal-jsonapi-user-listing", "info": { "name": "Drupal JSON:API Username Listing - Detect", "author": "lixts", "severity": "medium", "description": "Drupal JSON:API username listing was detected via the /user/user endpoint.", "tags": [ "drupal", "exposure", "discovery...
stripe-restricted-key
[CANONICAL_RECORD] { "cve_id": "stripe-restricted-key", "summary": "Stripe Restricted Key Disclosure. This template detects Stripe Restricted Key Disclosure by checking specific patterns and responses.", "affected_products": [], "paths": [ "{{BaseURL}}" ], "indicators": [ "Stripe Restricted Key Disc...
{ "id": "stripe-restricted-key", "info": { "name": "Stripe Restricted Key Disclosure", "author": "Ice3man", "severity": "info", "description": "Stripe Restricted Key Disclosure", "tags": [ "exposure", "token", "stripe", "vuln" ], "reference": [ "https://stri...
CWE-22
[CANONICAL_RECORD] { "cve_id": "CWE-22", "summary": "The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the...
{ "id": "feifeicms-lfr", "info": { "name": "FeiFeiCms - Local File Inclusion", "author": "princechaddha", "severity": "high", "description": "FeiFeiCms is vulnerable to local file inclusion.", "tags": [ "feifeicms", "lfi", "vuln" ], "reference": [ "https://www.cnb...
smtp4dev-interface-exposed
[CANONICAL_RECORD] { "cve_id": "smtp4dev-interface-exposed", "summary": "Publicly exposed smtp4dev interface allowing access to intercepted emails and test configurations.\n", "affected_products": [], "paths": [ "{{BaseURL}}" ], "indicators": [ "<title>smtp4dev</title>" ], "severity_hint": "high...
{ "id": "smtp4dev-interface-exposed", "info": { "name": "SMTP4Dev Interface - Exposed", "author": "DhiyaneshDk", "severity": "high", "description": "Publicly exposed smtp4dev interface allowing access to intercepted emails and test configurations.\n", "tags": [ "smtp4dev", "misconfig...
endpoint-protector-panel
[CANONICAL_RECORD] { "cve_id": "endpoint-protector-panel", "summary": "Endpoint Protector - Reporting and Administration Tool login panel was detected.\n", "affected_products": [], "paths": [ "{{BaseURL}}" ], "indicators": [ "Endpoint Protector - Reporting and Administration Tool" ], "severity_h...
{ "id": "endpoint-protector-panel", "info": { "name": "Endpoint Protector Login Panel - Detect", "author": "pussycat0x", "severity": "info", "description": "Endpoint Protector - Reporting and Administration Tool login panel was detected.\n", "tags": [ "panel", "endpoint", "logi...
CVE-2022-3124
[CANONICAL_RECORD] { "cve_id": "CVE-2022-3124", "summary": "The Frontend File Manager Plugin WordPress plugin before 21.3 allows any unauthenticated user to rename uploaded files from users. Furthermore, due to the lack of validation in the destination filename, this could allow allow them to change the content of ...
{ "id": "cve-2022-3124", "info": { "name": "Frontend File Manager < 21.3 - Unauthenticated File Renaming", "author": "riteshs4hu", "severity": "medium", "description": "The Frontend File Manager Plugin WordPress plugin before 21.3 allows any unauthenticated user to rename uploaded files from users. ...
cobalt-strike-c2
[CANONICAL_RECORD] { "cve_id": "cobalt-strike-c2", "summary": "Cobalt Strike gives you a post-exploitation agent and covert channels to emulate a quiet long-term embedded actor in your customer's network.\n", "affected_products": [], "paths": [], "indicators": [ "Cobalt Strike C2 - Detect", "detected"...
{ "id": "cobalt-strike-c2", "info": { "name": "Cobalt Strike C2 - Detect", "author": "pussycat0x", "severity": "info", "description": "Cobalt Strike gives you a post-exploitation agent and covert channels to emulate a quiet long-term embedded actor in your customer's network.\n", "tags": [ ...
CWE-89
[CANONICAL_RECORD] { "cve_id": "CWE-89", "summary": "The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream co...
{ "id": "imo-rce", "info": { "name": "IMO - Remote Code Execution", "author": "ritikchaddha", "severity": "critical", "description": "The lax filtering of imo cloud office/file/NDisk/get_file.php allows unlimited file uploads. Attackers can directly obtain website permissions through this vulnerabil...
tidepool-malware-hash
[CANONICAL_RECORD] { "cve_id": "tidepool-malware-hash", "summary": "Detects TidePool malware mentioned in Ke3chang report by Palo Alto Networks\n", "affected_products": [], "paths": [], "indicators": [ "TidePool Malware Hash - Detect", "detected" ], "severity_hint": "info" } [RETRIEVED_TEMPLATES]...
{ "id": "tidepool-malware-hash", "info": { "name": "TidePool Malware Hash - Detect", "author": "pussycat0x", "severity": "info", "description": "Detects TidePool malware mentioned in Ke3chang report by Palo Alto Networks\n", "tags": [ "malware", "tidepool" ], "reference": [ ...
grav-register-admin
[CANONICAL_RECORD] { "cve_id": "grav-register-admin", "summary": "Exposed Grav admin user register page.. This template detects Grav Register Admin User - Detect by checking specific patterns and responses.", "affected_products": [], "paths": [ "{{BaseURL}}/admin" ], "indicators": [ "Grav Register A...
{ "id": "grav-register-admin", "info": { "name": "Grav Register Admin User - Detect", "author": "DhiyaneshDk", "severity": "high", "description": "Exposed Grav admin user register page.", "tags": [ "grav", "register", "admin", "misconfig", "vuln" ], "referen...
CVE-2021-29484
[CANONICAL_RECORD] { "cve_id": "CVE-2021-29484", "summary": "Ghost is a Node.js CMS. An unused endpoint added during the development of 4.0.0 has left sites vulnerable to untrusted users gaining access to Ghost Admin. Attackers can gain access by getting logged in users to click a link containing malicious code. Us...
{ "id": "cve-2021-29484", "info": { "name": "Ghost CMS <=4.32 - Cross-Site Scripting", "author": "rootxharsh,iamnoooob", "severity": "medium", "description": "Ghost CMS 4.0.0 to 4.3.2 contains a DOM cross-site scripting vulnerability. An unused endpoint added during the development of 4.0.0 allows a...
CWE-200
[CANONICAL_RECORD] { "cve_id": "CWE-200", "summary": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on ...
{ "id": "openx-panel", "info": { "name": "OpenX/Revive Adserver Login Panel - Detect", "author": "pikpikcu,righettod", "severity": "info", "description": "OpenX login panel was detected. Note that OpenX is now a Revive Adserver.", "tags": [ "panel", "openx", "revive", "ad...
phpsys-info
[CANONICAL_RECORD] { "cve_id": "phpsys-info", "summary": "phpSysInfo: a customizable PHP script that displays information about your system nicely\n", "affected_products": [], "paths": [ "{{BaseURL}}/phpsysinfo/index.php?disp=bootstrap" ], "indicators": [ "phpSysInfo", "Hardware Information" ]...
{ "id": "phpsys-info", "info": { "name": "phpSysInfo Exposure", "author": "fpatrik", "severity": "low", "description": "phpSysInfo: a customizable PHP script that displays information about your system nicely\n", "tags": [ "config", "exposure", "phpsysinfo", "vuln" ],...
dash-panel-detect
[CANONICAL_RECORD] { "cve_id": "dash-panel-detect", "summary": "Dash Panel Detect. This template detects Dash Panel Detect by checking specific patterns and responses.", "affected_products": [], "paths": [ "{{BaseURL}}" ], "indicators": [ "_dash-config", "DashRenderer" ], "severity_hint": "i...
{ "id": "dash-panel-detect", "info": { "name": "Dash Panel Detect", "author": "tess", "severity": "info", "description": "Dash Panel Detect. This template detects security vulnerabilities.", "tags": [ "tech", "dash", "discovery" ], "reference": [] }, "requests": [ ...
mixed-active-content
[CANONICAL_RECORD] { "cve_id": "mixed-active-content", "summary": "This check detects if there are any active content loaded over HTTP instead of HTTPS.\n", "affected_products": [], "paths": [ "{{BaseURL}}" ], "indicators": [ "Mixed Active Content", "detected" ], "severity_hint": "info" } [...
{ "id": "mixed-active-content", "info": { "name": "Mixed Active Content", "author": "Liwermor", "severity": "info", "description": "This check detects if there are any active content loaded over HTTP instead of HTTPS.\n", "tags": [ "misconfig", "vuln" ], "reference": [ ...
CVE-2020-13945
[CANONICAL_RECORD] { "cve_id": "CVE-2020-13945", "summary": "In Apache APISIX, the user enabled the Admin API and deleted the Admin API access IP restriction rules. Eventually, the default token is allowed to access APISIX management data. This affects versions 1.2, 1.3, 1.4, 1.5.", "affected_products": [ { ...
{ "id": "cve-2020-13945", "info": { "name": "Apache APISIX - Insufficiently Protected Credentials", "author": "pdteam", "severity": "medium", "description": "Apache APISIX 1.2, 1.3, 1.4, and 1.5 is susceptible to insufficiently protected credentials. An attacker can enable the Admin API and delete t...
CWE-77
[CANONICAL_RECORD] { "cve_id": "CWE-77", "summary": "The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. ...
{ "id": "opensns-rce", "info": { "name": "OpenSNS - Remote Code Execution", "author": "gy741", "severity": "critical", "description": "OpenSNS allows remote unauthenticated attackers to execute arbitrary code via the 'shareBox' endpoint.\n", "tags": [ "opensns", "rce", "vuln" ...
CWE-22
[CANONICAL_RECORD] { "cve_id": "CWE-22", "summary": "The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the...
{ "id": "geowebserver-lfi", "info": { "name": "GeoVision Geowebserver 5.3.3 - Local File Inclusion", "author": "madrobot", "severity": "high", "description": "GeoVision Geowebserver 5.3.3 allows remote unauthenticated attackers to disclose the content of locally stored files via local file inclusion...
CWE-200
[CANONICAL_RECORD] { "cve_id": "CWE-200", "summary": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on ...
{ "id": "crowdin", "info": { "name": "Crowdin User Name Information - Detect", "author": "dwisiswant0", "severity": "info", "description": "Crowdin user name information check was conducted.", "tags": [ "osint", "osint-hobby", "crowdin", "discovery" ], "reference"...
CWE-200
[CANONICAL_RECORD] { "cve_id": "CWE-200", "summary": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on ...
{ "id": "disable-pad-service", "info": { "name": "Cisco Disable PAD - Detect", "author": "pussycat0x", "severity": "info", "description": "Cisco PAD service has proven vulnerable to attackers. To reduce the risk of unauthorized access, organizations should implement a security policy restricting or ...
CVE-2023-3578
[CANONICAL_RECORD] { "cve_id": "CVE-2023-3578", "summary": "A vulnerability classified as critical was found in DedeCMS 5.7.109. Affected by this vulnerability is an unknown functionality of the file co_do.php. The manipulation of the argument rssurl leads to server-side request forgery. The exploit has been disclo...
{ "id": "cve-2023-3578", "info": { "name": "DedeCMS 5.7.109 - Server-Side Request Forgery", "author": "ritikchaddha", "severity": "critical", "description": "Manipulation of the rssurl parameter in co_do.php leads to server-side request forgery in DedeCMS version 5.7.109.\n", "tags": [ "cv...
tongda-video-file-read
[CANONICAL_RECORD] { "cve_id": "tongda-video-file-read", "summary": "There is an arbitrary file reading vulnerability in Extreme OA video_file.php. An attacker can obtain sensitive files on the server through the vulnerability.\n", "affected_products": [], "paths": [ "{{BaseURL}}/general/mytable/intel_view/...
{ "id": "tongda-video-file-read", "info": { "name": "Tongda OA V2017 Video File - Arbitrary File Read", "author": "SleepingBag945", "severity": "medium", "description": "There is an arbitrary file reading vulnerability in Extreme OA video_file.php. An attacker can obtain sensitive files on the serve...
unpkg-angular-csp-bypass
[CANONICAL_RECORD] { "cve_id": "unpkg-angular-csp-bypass", "summary": "Content-Security-Policy Bypass - Unpkg Angular. This template detects Content-Security-Policy Bypass - Unpkg Angular by checking specific patterns and responses.", "affected_products": [], "paths": [ "{{BaseURL}}" ], "indicators": [ ...
{ "id": "unpkg-angular-csp-bypass", "info": { "name": "Content-Security-Policy Bypass - Unpkg Angular", "author": "renniepak,DhiyaneshDK", "severity": "medium", "description": "Content-Security-Policy Bypass - Unpkg Angular", "tags": [ "xss", "csp-bypass", "unpkg-angular", ...
CWE-200
[CANONICAL_RECORD] { "cve_id": "CWE-200", "summary": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on ...
{ "id": "gxd5-pacs-connexion-utilisateur", "info": { "name": "GXD5 Pacs Connexion Login Panel - Detect", "author": "dhiyaneshDK", "severity": "info", "description": "GXD5 Pacs Connexion panel was detected.", "tags": [ "panel", "login", "discovery" ], "reference": [] }...
oauth-credentials-json
[CANONICAL_RECORD] { "cve_id": "oauth-credentials-json", "summary": "Oauth Credentials file is exposed.. This template detects Oauth Credentials Json by checking specific patterns and responses.", "affected_products": [], "paths": [ "{{BaseURL}}/oauth-credentials.json" ], "indicators": [ "\"client_i...
{ "id": "oauth-credentials-json", "info": { "name": "Oauth Credentials Json", "author": "DhiyaneshDK", "severity": "low", "description": "Oauth Credentials file is exposed.", "tags": [ "exposure", "oauth", "files", "vuln" ], "reference": [] }, "requests": [ ...
CVE-2022-0949
[CANONICAL_RECORD] { "cve_id": "CVE-2022-0949", "summary": "The Block Bad Bots and Stop Bad Bots Crawlers and Spiders and Anti Spam Protection WordPress plugin before 6.930 does not properly sanitise and escape the fingerprint parameter before using it in a SQL statement via the stopbadbots_grava_fingerprint AJAX a...
{ "id": "cve-2022-0949", "info": { "name": "WordPress Stop Bad Bots <6.930 - SQL Injection", "author": "theamanrawat", "severity": "critical", "description": "WordPress Stop Bad Bots plugin before 6.930 contains a SQL injection vulnerability. The plugin does not properly sanitise and escape the fing...
CWE-200
[CANONICAL_RECORD] { "cve_id": "CWE-200", "summary": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on ...
{ "id": "tembosocial-panel", "info": { "name": "TemboSocial Admin Panel - Detect", "author": "DhiyaneshDK", "severity": "info", "description": "TemboSocial Admin panel was detected.", "tags": [ "panel", "tembosocial", "discovery" ], "reference": [] }, "requests": [ ...
CVE-2018-17431
[CANONICAL_RECORD] { "cve_id": "CVE-2018-17431", "summary": "Web Console in Comodo UTM Firewall before 2.7.0 allows remote attackers to execute arbitrary code without authentication via a crafted URL.", "affected_products": [ { "vendor": "comodo", "product": "unified_threat_management_firewall", ...
{ "id": "cve-2018-17431", "info": { "name": "Comodo Unified Threat Management Web Console - Remote Code Execution", "author": "dwisiswant0", "severity": "critical", "description": "Comodo Firewall & Central Manager (UTM) All Release before 2.7.0 & 1.5.0 are susceptible to a web shell based remote co...
CVE-2021-3223
[CANONICAL_RECORD] { "cve_id": "CVE-2021-3223", "summary": "Node-RED-Dashboard before 2.26.2 allows ui_base/js/..%2f directory traversal to read files.", "affected_products": [ { "vendor": "nodered", "product": "node-red-dashboard", "version_range": "< 2.26.2" } ], "paths": [], "in...
{ "id": "cve-2021-3223", "info": { "name": "Node RED Dashboard <2.26.2 - Local File Inclusion", "author": "gy741,pikpikcu", "severity": "high", "description": "NodeRED-Dashboard before 2.26.2 is vulnerable to local file inclusion because it allows ui_base/js/..%2f directory traversal to read files."...
gafgyt-oh-malware
[CANONICAL_RECORD] { "cve_id": "gafgyt-oh-malware", "summary": "Gafgyt Oh Malware - Detect. This template detects Gafgyt Oh Malware - Detect by checking specific patterns and responses.", "affected_products": [], "paths": [], "indicators": [ "Gafgyt Oh Malware - Detect", "detected" ], "severity_hi...
{ "id": "gafgyt-oh-malware", "info": { "name": "Gafgyt Oh Malware - Detect", "author": "daffainfo", "severity": "info", "description": "Gafgyt Oh Malware - Detect", "tags": [ "malware", "file" ], "reference": [ "https://github.com/Yara-Rules/rules/blob/master/malware/MA...
backup-directory-listing
[CANONICAL_RECORD] { "cve_id": "backup-directory-listing", "summary": "Backup Directory Listing folder was detected.\n. This template detects Backup Directory Listing - Detect by checking specific patterns and responses.", "affected_products": [], "paths": [ "{{BaseURL}}/backup/", "{{BaseURL}}/php/backu...
{ "id": "backup-directory-listing", "info": { "name": "Backup Directory Listing - Detect", "author": "DhiyaneshDK", "severity": "low", "description": "Backup Directory Listing folder was detected.\n", "tags": [ "hackerone", "backups", "exposure", "vuln" ], "refere...
End of preview. Expand in Data Studio

Ernest Nuclei Templates Dataset v3

A comprehensive dataset for training models to generate Nuclei security scanning templates from vulnerability descriptions.

Dataset Description

This dataset contains 11,590 training examples for generating Nuclei YAML templates in JSON IR (Intermediate Representation) format from structured vulnerability specifications.

Format

Each training example consists of:

  1. id: Unique identifier (CVE ID, CWE ID, or template name)
  2. prompt: Structured input with 4 sections (see below)
  3. completion: JSON IR output matching nuclei_ir.schema.json

Prompt Structure

The prompt contains exactly 4 sections in this order:

[CANONICAL_RECORD]

Structured vulnerability representation as JSON:

{
  "cve_id": "cve-2024-1234",
  "summary": "Description of vulnerability",
  "affected_products": [{"vendor": "...", "product": "...", "version_range": "..."}],
  "paths": ["/admin/upload.php"],
  "indicators": ["error", "exception"],
  "severity_hint": "high"
}

[RETRIEVED_TEMPLATES]

JSON array of 2-3 similar templates (flattened, structural):

[
  {
    "id": "cve-2024-5678",
    "severity": "high",
    "tags": ["cve", "sqli", "apache"],
    "requests": [
      {
        "method": "GET",
        "paths": ["{{BaseURL}}/admin.php?id=1"],
        "matcher_types": ["word", "status"]
      }
    ]
  }
]

[POC_SNIPPETS]

JSON array of PoC snippets (or empty array):

[
  {
    "source": "nvd",
    "url": "https://...",
    "snippet": "curl -X POST ..."
  }
]

[INSTRUCTION]

Fixed instruction text:

Generate a valid Nuclei template as JSON IR. Output ONLY the JSON object matching nuclei_ir.schema.json. No markdown, no explanations, no code fences.

Completion Format

Pure JSON IR matching nuclei_ir.schema.json:

{
  "id": "cve-2024-1234",
  "info": {
    "name": "XSS Vulnerability in Product X",
    "author": "ernest-generator",
    "severity": "high",
    "description": "...",
    "tags": ["cve", "xss"],
    "reference": ["https://..."]
  },
  "requests": [
    {
      "method": "GET",
      "path": ["{{BaseURL}}/vulnerable.php"],
      "matchers": [...]
    }
  ],
  "safety_flags": {...},
  "limits": {...},
  "metadata": {...}
}

No markdown, no code fences, no extra text - ONLY the JSON object.

Dataset Statistics

  • Total examples: 11,590
  • Train split: 8,112 (70%)
  • Test split: 1,736 (15%)
  • Validation split: 1,742 (15%)

By Category

  • CVE-based: 3,666 (31.6%) - Enriched with NVD CVE data
  • CWE-based: 2,499 (21.6%) - Enriched with MITRE CWE data
  • Generic: 5,425 (46.8%) - Self-contained templates

File Sizes

  • full.jsonl: 60 MB
  • train.jsonl: 42 MB
  • test.jsonl: 9 MB
  • validation.jsonl: 9 MB

Usage

Loading the Dataset

from datasets import load_dataset

# Load from local files
dataset = load_dataset('json', data_files={
    'train': 'train.jsonl',
    'test': 'test.jsonl',
    'validation': 'validation.jsonl'
})

# Or from Hugging Face Hub
# dataset = load_dataset('OzLabs/ernest-nuclei-templates-v3')

# Access a training example
example = dataset['train'][0]
print(f"ID: {example['id']}")
print(f"\nPrompt:\n{example['prompt'][:500]}...")
print(f"\nCompletion:\n{example['completion'][:500]}...")

Fine-tuning Example

from transformers import AutoTokenizer, AutoModelForCausalLM

model_name = "Qwen/Qwen2.5-Coder-7B-Instruct"
tokenizer = AutoTokenizer.from_pretrained(model_name)
model = AutoModelForCausalLM.from_pretrained(model_name)

def format_example(example):
    """Format example for instruction tuning."""
    return {
        "input": example["prompt"],
        "output": example["completion"]
    }

# Prepare dataset
formatted_dataset = dataset.map(format_example)

# Fine-tune with your preferred framework (TRL, Axolotl, etc.)

Data Source

Templates extracted from ProjectDiscovery/nuclei-templates repository and enriched with:

  • CVE Data: National Vulnerability Database (NVD) API 2.0
  • CWE Data: MITRE Common Weakness Enumeration
  • Template Similarity: Pre-computed similar templates for few-shot learning

Schema Validation

~70% of examples pass strict JSON schema validation. Validation failures are mostly due to:

  • Empty path arrays (legitimate for SSL/TLS templates)
  • Templates with minimal matchers

The prompt structure (4 sections) is valid for 100% of examples.

Intended Use

This dataset is designed for:

  1. Fine-tuning code generation models (Qwen, CodeLlama, DeepSeek Coder, etc.)
  2. Few-shot learning for security template generation
  3. Research on structured code generation from specifications

Model Recommendations

Best suited for instruction-tuned models:

  • Qwen2.5-Coder (1.5B - 32B)
  • CodeLlama-Instruct (7B - 34B)
  • DeepSeek-Coder-Instruct (6.7B - 33B)
  • StarCoder2-Instruct (3B - 15B)

Citation

If you use this dataset, please cite:

@dataset{ernest_nuclei_v3_2025,
  title={Ernest Nuclei Templates Dataset v3},
  author={OzLabs},
  year={2025},
  publisher={Hugging Face},
  howpublished={\url{https://huggingface.co/datasets/OzLabs/ernest-nuclei-templates-v3}}
}

License

This dataset is derived from Nuclei templates which are licensed under MIT. The dataset itself is released under MIT License.

Changelog

v3 (2025-01-13)

  • Complete restructuring to match specification
  • Added CANONICAL_RECORD with structured vulnerability data
  • Added RETRIEVED_TEMPLATES for few-shot learning
  • Added POC_SNIPPETS from CVE references
  • JSON IR completions (no YAML, no markdown)
  • Optimized similarity matching (O(n) vs O(n²))
  • 11,590 training pairs (99.8% success rate)

Contact


Note: This dataset is for security research and defensive purposes only. Generated templates should be validated before use in production environments.

Downloads last month
56