instruction stringlengths 41 188 | input stringlengths 165 3.12k | output stringlengths 256 2.26M | category stringclasses 3
values | severity stringclasses 5
values | id stringlengths 5 54 |
|---|---|---|---|---|---|
Generate a Nuclei template for: OpenSearch Dashboard Panel - Detect | Title: OpenSearch Dashboard Panel - Detect
Summary: OpenSearch Dashboard Panel - Detect. OpenSearch Dashboard is a visualization and management tool for OpenSearch. This template detects the presence of the OpenSearch Dashboard login panel, which is the default authentication interface for accessing the dashboard.
Vul... | id: opensearch-dashboard-panel
info:
name: OpenSearch Dashboard Panel - Detect
author: ritikchaddha
severity: info
description: OpenSearch Dashboard is a visualization and management tool for OpenSearch. This template detects the presence of the OpenSearch Dashboard login panel, which is the default authentica... | generic | info | opensearch-dashboard-panel |
Generate a Nuclei template for CVE-2010-1056 | Title: Path Traversal in rockettheme com_rokdownloads
Summary: Directory traversal vulnerability in the RokDownloads (com_rokdownloads) component before 1.0.1 for Joomla! allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the controller parameter to index.php.
Vulnerability Type:... | id: CVE-2010-1056
info:
name: Joomla! Component com_rokdownloads - Local File Inclusion
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the RokDownloads (com_rokdownloads) component before 1.0.1 for Joomla! allows remote attackers to include and execute arbitrary local fi... | cve | medium | CVE-2010-1056 |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: arcgis-rest-api
info:
name: ArcGIS Exposed REST API documentation
author: Podalirius
severity: info
description: ArcGIS REST API documentation was discovered.
tags: api,arcgis,cms,tech,esri,discovery
http:
- method: GET
path:
- "{{BaseURL}}/server/sdk/rest/index.html"
matchers:
- ... | cwe | medium | CWE-200 |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: gargoyle-router
info:
name: Gargoyle Router Management Utility Admin Login Panel - Detect
author: DhiyaneshDk
severity: info
description: Gargoyle Router Management Utility admin login panel was detected.
tags: panel,iot,gargoyle,router,edb,discovery
http:
- method: GET
path:
- "{{BaseURL}}/... | cwe | medium | CWE-200 |
Generate a Nuclei template for CVE-2020-12478 | Title: Vulnerability (CWE-306) in teampass teampass
Summary: TeamPass 2.1.27.36 allows an unauthenticated attacker to retrieve files from the TeamPass web root. This may include backups or LDAP debug files.
Vulnerability Type: Vulnerability (CWE-306)
Severity: high
Affected Products: teampass teampass
Indicators: error... | id: CVE-2020-12478
info:
name: TeamPass 2.1.27.36 - Improper Authentication
author: arafatansari
severity: high
description: TeamPass 2.1.27.36 is susceptible to improper authentication. An attacker can retrieve files from the TeamPass web root, which may include backups or LDAP debug files, and therefore poss... | cve | high | CVE-2020-12478 |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: bitchute
info:
name: Bitchute User Name Information - Detect
author: dwisiswant0
severity: info
description: Bitchute user name information check was conducted.
tags: osint,osint-political,bitchute,discovery
http:
- method: GET
path:
- "https://www.bitchute.com/channel/{{user}}/"
matche... | cwe | medium | CWE-200 |
Generate a Nuclei template for: Ash - Privilege Escalation | Title: Ash - Privilege Escalation
Summary: Ash - Privilege Escalation. Ash allows the value of a variable to be set at the same time it is marked read only by writing readonly name=value With no arguments
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected | id: privesc-ash
info:
name: Ash - Privilege Escalation
author: daffainfo
severity: high
description: Ash allows the value of a variable to be set at the same time it is marked read only by writing readonly name=value With no arguments
tags: code,linux,ash,privesc,local
http:
- method: GET
path:
... | generic | high | privesc-ash |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: anaqua-login-panel
info:
name: Anaqua Login - Panel
author: Ep1cSage
severity: info
description: Checks for the presence of Anaqua login page
tags: anaqua,login,panel,discovery
http:
- method: GET
path:
- "{{BaseURL}}/anaqua/Public/Login.aspx?ReturnUrl=%2fanaqua%2f"
matchers:
- ty... | cwe | medium | CWE-200 |
Generate a Nuclei template for CVE-2025-8943 | Title: Vulnerability (CWE-306) in flowiseai flowise
Summary: The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermo... | id: CVE-2025-8943
info:
name: Flowise < 3.0.1 - Remote Command Execution
author: zezezez
severity: critical
description: The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization mo... | cve | critical | CVE-2025-8943 |
Generate a Nuclei template for CVE-2023-31059 | Title: Path Traversal in repetier-server repetier-server
Summary: Repetier Server through 1.4.10 allows ..%5c directory traversal for reading files that contain credentials, as demonstrated by connectionLost.php.
Vulnerability Type: Path Traversal
Severity: high
Affected Products: repetier-server repetier-server
Indica... | id: CVE-2023-31059
info:
name: Repetier Server - Directory Traversal
author: parthmalhotra,pdresearch
severity: high
description: Repetier Server through 1.4.10 allows ..%5c directory traversal for reading files that contain credentials, as demonstrated by connectionLost.php.
tags: cve2023,cve,repetier,lfi,r... | cve | high | CVE-2023-31059 |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: fortiadc-panel
info:
name: FortiADC Login Panel - Detect
author: DhiyaneshDk
severity: info
description: FortiADC login panel was detected.
tags: panel,fortinet,discovery
http:
- method: GET
path:
- "{{BaseURL}}/ui/#navigate/Login"
matchers:
- type: word
words:
-... | cwe | medium | CWE-200 |
Generate a Nuclei template for CVE-2019-16932 | Title: Vulnerability (CWE-918) in themeisle visualizer
Summary: A blind SSRF vulnerability exists in the Visualizer plugin before 3.3.1 for WordPress via wp-json/visualizer/v1/upload-data.
Vulnerability Type: Vulnerability (CWE-918)
Severity: critical
Affected Products: themeisle visualizer
Indicators: error, vulnerabi... | id: CVE-2019-16932
info:
name: Visualizer <3.3.1 - Blind Server-Side Request Forgery
author: akincibor
severity: critical
description: Visualizer prior to 3.3.1 suffers from a blind server-side request forgery vulnerability via the /wp-json/visualizer/v1/upload-data endpoint.
tags: cve,cve2019,wp-plugin,ssrf... | cve | critical | CVE-2019-16932 |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: ebay-stores
info:
name: Ebay stores User Name Information - Detect
author: dwisiswant0
severity: info
description: Ebay stores user name information check was conducted.
tags: osint,osint-shopping,ebay-stores,discovery
http:
- method: GET
path:
- "https://www.ebay.com/str/{{user}}"
matc... | cwe | medium | CWE-200 |
Generate a Nuclei template for CVE-2015-2807 | Title: Cross-Site Scripting (XSS) in documentcloud navis_documentcloud
Summary: Cross-site scripting (XSS) vulnerability in js/window.php in the Navis DocumentCloud plugin before 0.1.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the wpbase parameter.
Vulnerability Type: Cross-Site S... | id: CVE-2015-2807
info:
name: Navis DocumentCloud <0.1.1 - Cross-Site Scripting
author: daffainfo
severity: medium
description: Navis DocumentCloud plugin before 0.1.1 for WordPress contains a reflected cross-site scripting vulnerability in js/window.php which allows remote attackers to inject arbitrary web sc... | cve | medium | CVE-2015-2807 |
Generate a Nuclei template for: Content-Security-Policy Bypass - PBS URS | Title: Content-Security-Policy Bypass - PBS URS
Summary: Content-Security-Policy Bypass - PBS URS. Tags: xss, csp-bypass, pbs-urs
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected | id: pbs-urs-csp-bypass
info:
name: Content-Security-Policy Bypass - PBS URS
author: renniepak,DhiyaneshDK
severity: medium
description: Content-Security-Policy Bypass - PBS URS
tags: xss,csp-bypass,pbs-urs,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
w... | generic | medium | pbs-urs-csp-bypass |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: satis-repository
info:
name: Satis Composer Repository - Detect
author: FlorianMaak
severity: info
description: Satis composer repository was detected
tags: panel,exposure,composer,satis,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
... | cwe | medium | CWE-200 |
Generate a Nuclei template for CVE-2012-4242 | Title: Cross-Site Scripting (XSS) in mf_gig_calendar_project mf_gig_calendar
Summary: Cross-site scripting (XSS) vulnerability in the MF Gig Calendar plugin 0.9.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the query string to the calendar page.
Vulnerability Type: Cross-Site Script... | id: CVE-2012-4242
info:
name: WordPress Plugin MF Gig Calendar 0.9.2 - Cross-Site Scripting
author: daffainfo
severity: medium
description: A cross-site scripting vulnerability in the MF Gig Calendar plugin 0.9.2 for WordPress allows remote attackers to inject arbitrary web script or HTML via the query string ... | cve | medium | CVE-2012-4242 |
Generate a Nuclei template for: Confluent Access Token | Title: Confluent Access Token
Summary: Confluent Access Token. Tags: file, keys, confluent
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: confluent-access-token
info:
name: Confluent Access Token
author: DhiyaneshDK
severity: info
description: Confluent Access Token
tags: file,keys,confluent,token
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200 | generic | info | confluent-access-token |
Generate a Nuclei template for: SSRF due to misconfiguration in OAuth | Title: SSRF due to misconfiguration in OAuth
Summary: SSRF due to misconfiguration in OAuth. Sends a POST request with the endpoint "/connect/register" to check external Interaction with multiple POST parameters.
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected | id: ssrf-via-oauth-misconfig
info:
name: SSRF due to misconfiguration in OAuth
author: KabirSuda
severity: medium
description: Sends a POST request with the endpoint "/connect/register" to check external Interaction with multiple POST parameters.
tags: misconfig,oast,oauth,ssrf,intrusive,vuln
http:
- meth... | generic | medium | ssrf-via-oauth-misconfig |
Generate a Nuclei template for CVE-2025-5086 | Title: Deserialization of Untrusted Data in 3ds delmia_apriso
Summary: A deserialization of untrusted data vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could lead to a remote code execution.
Vulnerability Type: Deserialization of Untrusted Data
Severity: critical
Affected Products: 3ds d... | id: CVE-2025-5086
info:
name: Dassault Systèmes DELMIA Apriso (up to 2025) - Insecure Deserialization
author: hacktronai,iamnoooob,pdresearch
severity: critical
description: A deserialization of untrusted data vulnerability affecting DELMIA Apriso from Release 2020 through Release 2025 could lead to a remote c... | cve | critical | CVE-2025-5086 |
Generate a Nuclei template for CVE-2024-55591 | Title: Vulnerability (CWE-288) in fortinet fortiproxy and others
Summary: An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] affecting FortiOS version 7.0.0 through 7.0.16 and FortiProxy version 7.0.0 through 7.0.19 and 7.2.0 through 7.2.12 allows a remote attacker to gain super-admin p... | id: CVE-2024-55591
info:
name: Fortinet Authentication Bypass
author: rootxharsh,iamnoooob,pdresearch
severity: critical
description: Fortinet FortiOS is vulnerable to an information disclosure via service-worker.js that could allow an attacker to access sensitive information.This vulnerability affects FortiOS... | cve | critical | CVE-2024-55591 |
Generate a Nuclei template for: Widgets for Google Reviews Detection | Title: Widgets for Google Reviews Detection
Summary: Widgets for Google Reviews Detection. Tags: tech, wordpress, wp-plugin
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: wordpress-wp-reviews-plugin-for-google
info:
name: Widgets for Google Reviews Detection
author: ricardomaia
severity: info
description: Widgets for Google Reviews Detection
tags: tech,wordpress,wp-plugin,top-100,top-200,discovery
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/wp... | generic | info | wordpress-wp-reviews-plugin-for-google |
Generate a Nuclei template for: Angular JSON File Exposure | Title: Angular JSON File Exposure
Summary: Angular JSON File Exposure. Tags: exposure, angularjs, files
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: angular-json
info:
name: Angular JSON File Exposure
author: DhiyaneshDk
severity: info
description: Angular JSON File Exposure
tags: exposure,angularjs,files,vuln
http:
- method: GET
path:
- "{{BaseURL}}/.angular-cli.json"
- "{{BaseURL}}/angular-cli.json"
- "{{BaseURL}}/angular... | generic | info | angular-json |
Generate a Nuclei template for: Operations Automation Default Page | Title: Operations Automation Default Page
Summary: Operations Automation Default Page. Tags: tech, default, discovery
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: operations-automation-default-page
info:
name: Operations Automation Default Page
author: dhiyaneshDK
severity: info
description: Operations Automation Default Page
tags: tech,default,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
... | generic | info | operations-automation-default-page |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: scalar-detection
info:
name: Scalar API Documentation - Detect
author: recepgunes
severity: info
description: Scalar API documentation panel was detected.
tags: panel,scalar,api,documentation,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}/scalar"
- "{{BaseURL}}"
matche... | cwe | medium | CWE-200 |
Generate a Nuclei template for: Royal Elementor Addons and Templates Detection | Title: Royal Elementor Addons and Templates Detection
Summary: Royal Elementor Addons and Templates Detection. Tags: tech, wordpress, wp-plugin
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: wordpress-royal-elementor-addons
info:
name: Royal Elementor Addons and Templates Detection
author: ricardomaia
severity: info
description: Royal Elementor Addons and Templates Detection
tags: tech,wordpress,wp-plugin,top-200,discovery
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plug... | generic | info | wordpress-royal-elementor-addons |
Generate a Nuclei template for CVE-2022-1574 | Title: Cross-Site Request Forgery (CSRF) in html2wp_project html2wp
Summary: The HTML2WP WordPress plugin through 1.0.0 does not have authorisation and CSRF checks when importing files, and does not validate them, as a result, unauthenticated attackers can upload arbitrary files (such as PHP) on the remote server
Vulne... | id: CVE-2022-1574
info:
name: WordPress HTML2WP <=1.0.0 - Arbitrary File Upload
author: theamanrawat
severity: critical
description: WordPress HTML2WP plugin through 1.0.0 contains an arbitrary file upload vulnerability. The plugin does not perform authorization and CSRF checks when importing files and does no... | cve | critical | CVE-2022-1574 |
Generate a Nuclei template for CVE-2024-13159 | Title: Vulnerability (CWE-36) in ivanti endpoint_manager
Summary: Absolute path traversal in Ivanti EPM before the 2024 January-2025 Security Update and 2022 SU6 January-2025 Security Update allows a remote unauthenticated attacker to leak sensitive information.
Vulnerability Type: Vulnerability (CWE-36)
Severity: crit... | id: CVE-2024-13159
info:
name: Ivanti EPM - Credential Coercion Vulnerability in GetHashForWildcardRecursive
author: ritikchaddha
severity: critical
description: A vulnerability in Ivanti Endpoint Manager (EPM) allows an unauthenticated attacker to coerce the EPM machine account credential via the GetHashForWi... | cve | critical | CVE-2024-13159 |
Generate a Nuclei template for: Balada Injector Malware - Detect | Title: Balada Injector Malware - Detect
Summary: Balada Injector Malware - Detect. Checks websites for Balada Injector malware.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected | id: balada-injector-malware
info:
name: Balada Injector Malware - Detect
author: kazet
severity: high
description: Checks websites for Balada Injector malware.
tags: malware,balada,misc,miscellaneous,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: regex
part: ... | generic | high | balada-injector-malware |
Generate a Nuclei template for CVE-2023-51409 | Title: Unrestricted File Upload in meowapps ai_engine
Summary: Unrestricted Upload of File with Dangerous Type vulnerability in Jordy Meow AI Engine: ChatGPT Chatbot.This issue affects AI Engine: ChatGPT Chatbot: from n/a through 1.9.98.
Vulnerability Type: Unrestricted File Upload
Severity: critical
Affected Product... | id: CVE-2023-51409
info:
name: Jordy Meow AI Engine - Unrestricted File Upload
author: pussycat0x
severity: critical
description: Unrestricted Upload of File with Dangerous Type vulnerability in Jordy Meow AI Engine- ChatGPT Chatbot.This issue affects AI Engine- ChatGPT Chatbot- from n/a through 1.9.98.
tags... | cve | critical | CVE-2023-51409 |
Generate a Nuclei template for CVE-2022-3982 | Title: Unknown Vulnerability in wpdevart booking_calendar
Summary: The Booking calendar, Appointment Booking System WordPress plugin before 3.2.2 does not validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE
Vulnerability Type: Unknown Vulnerability
Sev... | id: CVE-2022-3982
info:
name: WordPress Booking Calendar <3.2.2 - Arbitrary File Upload
author: theamanrawat
severity: critical
description: WordPress Booking Calendar plugin before 3.2.2 is susceptible to arbitrary file upload possibly leading to remote code execution. The plugin does not validate uploaded fi... | cve | critical | CVE-2022-3982 |
Generate a Nuclei template for: Quivr Panel - Detect | Title: Quivr Panel - Detect
Summary: Quivr Panel - Detect. Quivr panel was discovered.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: quivr-panel
info:
name: Quivr Panel - Detect
author: s4e-io
severity: info
description: Quivr panel was discovered.
tags: panel,login,quivr,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}/login"
matchers:
- type: dsl
condition: and | generic | info | quivr-panel |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: icecast-mediaserver-detect
info:
name: Icecast Streaming Media Server Information Panel - Detect
author: pussycat0x
severity: info
description: Icecast Streaming Media Server information panel was detected.
tags: tech,icecast,media-server,detect,discovery
http:
- method: GET
path:
- "{{BaseU... | cwe | medium | CWE-200 |
Generate a Nuclei template for CVE-2022-31854 | Title: Unrestricted File Upload in codologic codoforum
Summary: Codoforum v5.1 was discovered to contain an arbitrary file upload vulnerability via the logo change option in the admin panel.
Vulnerability Type: Unrestricted File Upload
Severity: high
Affected Products: codologic codoforum
Indicators: error, vulnerabili... | id: CVE-2022-31854
info:
name: Codoforum 5.1 - Arbitrary File Upload
author: theamanrawat
severity: high
description: Codoforum 5.1 contains an arbitrary file upload vulnerability via the logo change option in the admin panel. An attacker can upload arbitrary files to the server, which in turn can be used to m... | cve | high | CVE-2022-31854 |
Generate a Nuclei template for: Detect Gunicorn Server | Title: Detect Gunicorn Server
Summary: Detect Gunicorn Server. Gunicorn Python WSGI HTTP Server for UNIX
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: gunicorn-detect
info:
name: Detect Gunicorn Server
author: joanbono
severity: info
description: Gunicorn Python WSGI HTTP Server for UNIX
tags: tech,gunicorn,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: regex
part: header | generic | info | gunicorn-detect |
Generate a Nuclei template for CVE-2021-41419 | Title: Deserialization of Untrusted Data in qvis dvr_firmware and others
Summary: QVIS NVR DVR before 2021-12-13 is vulnerable to Remote Code Execution via Java deserialization.
Vulnerability Type: Deserialization of Untrusted Data
Severity: critical
Affected Products: qvis dvr_firmware, qvis nvr_firmware
Indicators: e... | id: CVE-2021-41419
info:
name: QVIS NVR/DVR - Remote Code Execution
author: me9187
severity: critical
description: QVIS NVR DVR before 2021-12-13 is vulnerable to Remote Code Execution via Java deserialization.
tags: cve,cve2021,qvisdvr,rce,deserialization,jsf,iot,oast
http:
- method: GET
path:
ma... | cve | critical | CVE-2021-41419 |
Generate a Nuclei template for: Application Insights Integration for Azure Function Apps | Title: Application Insights Integration for Azure Function Apps
Summary: Application Insights Integration for Azure Function Apps. Ensure that the functions managed with Microsoft Azure Function App are configured to use Azure Monitor Application Insights. Application Insights is a robust APM solution designed to cater... | id: azure-functionapp-appinsights-missing
info:
name: Application Insights Integration for Azure Function Apps
author: princechaddha
severity: high
description: Ensure that the functions managed with Microsoft Azure Function App are configured to use Azure Monitor Application Insights. Application Insights is ... | generic | high | azure-functionapp-appinsights-missing |
Generate a Nuclei template for: RCDevs WebADM Panel - Detect | Title: RCDevs WebADM Panel - Detect
Summary: RCDevs WebADM Panel - Detect. RCDevs WebADM Login Panel was detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: rcdevs-webadm-panel
info:
name: RCDevs WebADM Panel - Detect
author: righettod
severity: info
description: RCDevs WebADM Login Panel was detected.
tags: panel,rcdevs,webadm,login,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/webapps/index.php"
- "{{B... | generic | info | rcdevs-webadm-panel |
Generate a Nuclei template for: Unrestricted PostgreSQL Access | Title: Unrestricted PostgreSQL Access
Summary: Unrestricted PostgreSQL Access. Identifies unrestricted inbound access to PostgreSQL databases in Amazon EC2 security groups, which can expose databases to security risks.
Vulnerability Type: Security Check
Severity: critical
Indicators: vulnerability detected | id: ec2-unrestricted-pgsql
info:
name: Unrestricted PostgreSQL Access
author: princechaddha
severity: critical
description: Identifies unrestricted inbound access to PostgreSQL databases in Amazon EC2 security groups, which can expose databases to security risks.
tags: cloud,devops,aws,amazon,ec2,aws-cloud-c... | generic | critical | ec2-unrestricted-pgsql |
Generate a Nuclei template for CVE-2022-30525 | Title: OS Command Injection in zyxel usg_flex_100w_firmware and others
Summary: A OS command injection vulnerability in the CGI program of Zyxel USG FLEX 100(W) firmware versions 5.00 through 5.21 Patch 1, USG FLEX 200 firmware versions 5.00 through 5.21 Patch 1, USG FLEX 500 firmware versions 5.00 through 5.21 Patch 1... | id: unauth-ztp-ping
info:
name: Unauthenticated ZyXEL USG ZTP - Detect
author: dmartyn
severity: high
description: Make a ZyXEL USG with ZTP support, pre CVE-2023-28771 patch, do a DNS lookup by asking it to make an ICMP request.
This template can be used to detect hosts potentially vulnerable to CVE-2023-2877... | cve | critical | CVE-2022-30525 |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: secure-login-panel
info:
name: Secure Login Service Login Panel - Detect
author: dhiyaneshDK
severity: info
description: Secure Login Service login panel was detected.
tags: panel,sls,login,service,discovery
http:
- method: GET
path:
- "{{BaseURL}}/login/sls/auth"
matchers:
- type... | cwe | medium | CWE-200 |
Generate a Nuclei template for: kaspersky phishing Detection | Title: kaspersky phishing Detection
Summary: kaspersky phishing Detection. A kaspersky phishing website was detected
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: kaspersky-phish
info:
name: kaspersky phishing Detection
author: rxerium
severity: info
description: A kaspersky phishing website was detected
tags: phishing,kaspersky,osint,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "Kasp... | generic | info | kaspersky-phish |
Generate a Nuclei template for: Currencylayer API Test | Title: Currencylayer API Test
Summary: Currencylayer API Test. Exchange rates and currency conversion
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: api-currencylayer
info:
name: Currencylayer API Test
author: daffainfo
severity: info
description: Exchange rates and currency conversion
tags: token-spray,currencylayer
http:
- method: GET
path:
- "http://api.currencylayer.com/live?access_key={{token}}"
matchers:
- type: word
... | generic | info | api-currencylayer |
Generate a Nuclei template for CVE-2015-2196 | Title: SQL Injection in web-dorado spider_calendar
Summary: SQL injection vulnerability in Spider Event Calendar 1.4.9 for WordPress allows remote attackers to execute arbitrary SQL commands via the cat_id parameter in a spiderbigcalendar_month action to wp-admin/admin-ajax.php.
Vulnerability Type: SQL Injection
Severi... | id: CVE-2015-2196
info:
name: WordPress Spider Calendar <=1.4.9 - SQL Injection
author: theamanrawat
severity: high
description: WordPress Spider Calendar plugin through 1.4.9 is susceptible to SQL injection. An attacker can execute arbitrary SQL commands via the cat_id parameter in a spiderbigcalendar_month a... | cve | high | CVE-2015-2196 |
Generate a Nuclei template for: Facebook phishing Detection | Title: Facebook phishing Detection
Summary: Facebook phishing Detection. A Facebook phishing website was detected
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: facebook-phish
info:
name: Facebook phishing Detection
author: rxerium
severity: info
description: A Facebook phishing website was detected
tags: phishing,facebook,osint,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "Facebook... | generic | info | facebook-phish |
Generate a Nuclei template for: FacturaScripts Installer Exposure | Title: FacturaScripts Installer Exposure
Summary: FacturaScripts Installer Exposure. FacturaScripts is susceptible to the Installation page exposure due to misconfiguration.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected | id: facturascripts-installer
info:
name: FacturaScripts Installer Exposure
author: DhiyaneshDk
severity: high
description: FacturaScripts is susceptible to the Installation page exposure due to misconfiguration.
tags: misconfig,facturascripts,install,exposure,vuln
http:
- method: GET
path:
- "{{... | generic | high | facturascripts-installer |
Generate a Nuclei template for CVE-2015-7297 | Title: SQL Injection in joomla joomla\!
Summary: SQL injection vulnerability in Joomla! 3.2 before 3.4.4 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, a different vulnerability than CVE-2015-7858.
Vulnerability Type: SQL Injection
Severity: high
Affected Products: joomla joomla\!
In... | id: CVE-2015-7297
info:
name: Joomla! Core SQL Injection
author: princechaddha
severity: high
description: A SQL injection vulnerability in Joomla! 3.2 before 3.4.4 allows remote attackers to execute arbitrary SQL commands.
tags: cve2015,cve,packetstorm,joomla,sqli,vuln
http:
- method: GET
path:
... | cve | high | CVE-2015-7297 |
Generate a Nuclei template for: Content-Security-Policy Bypass - Cloudflare CDN | Title: Content-Security-Policy Bypass - Cloudflare CDN
Summary: Content-Security-Policy Bypass - Cloudflare CDN. Tags: xss, csp-bypass, cloudflare-cdn
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected | id: cloudflare-cdn-csp-bypass
info:
name: Content-Security-Policy Bypass - Cloudflare CDN
author: renniepak,DhiyaneshDK
severity: medium
description: Content-Security-Policy Bypass - Cloudflare CDN
tags: xss,csp-bypass,cloudflare-cdn,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
... | generic | medium | cloudflare-cdn-csp-bypass |
Generate a Nuclei template for: Tailon Panel - Detect | Title: Tailon Panel - Detect
Summary: Tailon Panel - Detect. Tags: panel, tailon, detect
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: tailon-panel
info:
name: Tailon Panel - Detect
author: ritikchaddha
severity: info
description: Tailon Panel - Detect
tags: panel,tailon,detect,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "<title>Tailon"
- "class... | generic | info | tailon-panel |
Generate a Nuclei template for: Jeecg-Boot Detect | Title: Jeecg-Boot Detect
Summary: Jeecg-Boot Detect. Tags: jeecg-boot, tech, discovery
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: jeecg-boot-detect
info:
name: Jeecg-Boot Detect
author: pikpikcu
severity: info
description: Jeecg-Boot Detect
tags: jeecg-boot,tech,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
- "{{BaseURL}}/jeecg-boot/"
matchers:
- type: word
words:
- "Jeecg-Boot... | generic | info | jeecg-boot-detect |
Generate a Nuclei template for CVE-2022-0692 | Title: Vulnerability (CWE-601) in alltube_project alltube
Summary: Open Redirect on Rudloff/alltube in Packagist rudloff/alltube prior to 3.0.1.
Vulnerability Type: Vulnerability (CWE-601)
Severity: medium
Affected Products: alltube_project alltube
Indicators: error, vulnerability detected | id: CVE-2022-0692
info:
name: Rudloff alltube prior to 3.0.1 - Open Redirect
author: 0x_Akoko
severity: medium
description: An open redirect vulnerability exists in Rudloff/alltube that could let an attacker construct a URL within the application that causes redirection to an arbitrary external domain via Pack... | cve | medium | CVE-2022-0692 |
Generate a Nuclei template for CVE-2022-42749 | Title: Cross-Site Scripting (XSS) in auieo candidats
Summary: CandidATS version 3.0.0 on 'page' of the 'ajax.php' resource, allows an external attacker to steal the cookie of arbitrary users. This is possible because the application application does not properly validate user input against XSS attacks.
Vulnerability ... | id: CVE-2022-42749
info:
name: CandidATS 3.0.0 - Cross-Site Scripting
author: arafatansari
severity: medium
description: CandidATS 3.0.0 contains a cross-site scripting vulnerability via the page parameter of the ajax.php resource. An attacker can inject arbitrary script in the browser of an unsuspecting user ... | cve | medium | CVE-2022-42749 |
Generate a Nuclei template for CVE-2024-46938 | Title: Information Disclosure in sitecore experience_commerce and others
Summary: An issue was discovered in Sitecore Experience Platform (XP), Experience Manager (XM), and Experience Commerce (XC) 8.0 Initial Release through 10.4 Initial Release. An unauthenticated attacker can read arbitrary files.
Vulnerability Type... | id: CVE-2024-46938
info:
name: Sitecore Experience Platform <= 10.4 - Arbitrary File Read
author: DhiyaneshDK
severity: high
description: An issue was discovered in Sitecore Experience Platform (XP), Experience Manager (XM), and Experience Commerce (XC) 8.0 Initial Release through 10.4 Initial Release. An unau... | cve | high | CVE-2024-46938 |
Generate a Nuclei template for: Indegy Sensor Setup - Installer | Title: Indegy Sensor Setup - Installer
Summary: Indegy Sensor Setup - Installer. Indegy Sensor is susceptible to the Installation page exposure due to misconfiguration.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected | id: indegy-sensor-installer
info:
name: Indegy Sensor Setup - Installer
author: ritikchaddha
severity: high
description: Indegy Sensor is susceptible to the Installation page exposure due to misconfiguration.
tags: misconfig,indegy,sensor,installer,vuln
http:
- method: GET
path:
- "{{BaseURL}}/s... | generic | high | indegy-sensor-installer |
Generate a Nuclei template for: Nucleus FTP Service - Detect | Title: Nucleus FTP Service - Detect
Summary: Nucleus FTP Service - Detect. Nucleus FTP service was detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: nucleus-ftp-detect
info:
name: Nucleus FTP Service - Detect
author: pussycat0x
severity: info
description: Nucleus FTP service was detected.
tags: network,ftp,nucleus,detect,tcp,discovery
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200 | generic | info | nucleus-ftp-detect |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: cyberoam-ssl-vpn-panel
info:
name: Cyberoam SSL VPN Panel - Detect
author: idealphase
severity: info
description: Cyberoam SSL VPN panel was detected.
tags: panel,cyberoam,vpn,sophos,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
... | cwe | medium | CWE-200 |
Generate a Nuclei template for: Content-Security-Policy Bypass - Meteoprog | Title: Content-Security-Policy Bypass - Meteoprog
Summary: Content-Security-Policy Bypass - Meteoprog. Tags: xss, csp-bypass, meteoprog
Vulnerability Type: Security Check
Severity: medium
Indicators: vulnerability detected | id: meteoprog-csp-bypass
info:
name: Content-Security-Policy Bypass - Meteoprog
author: renniepak,DhiyaneshDK
severity: medium
description: Content-Security-Policy Bypass - Meteoprog
tags: xss,csp-bypass,meteoprog,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
... | generic | medium | meteoprog-csp-bypass |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: amazon-sns-token
info:
name: Amazon SNS Token - Detect
author: TheBinitGhimire
severity: info
description: Amazon SNS token was detected.
tags: file,keys,token,amazon,aws,sns
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200 | cwe | medium | CWE-200 |
Generate a Nuclei template to detect Use of Weak Credentials | Title: Use of Weak Credentials (CWE-1391)
Summary: The product uses weak credentials (such as a default key or hard-coded password) that can be calculated, derived, reused, or guessed by an attacker. By design, authentication protocols try to ensure that attackers must perform brute force attacks if they do not know th... | id: ruckus-wireless-default-login
info:
name: Ruckus Wireless - Default Login
author: pussycat0x
severity: critical
description: Ruckus Wireless router contains a default admin login vulnerability. An attacker can obtain access to user accounts and access sensitive information, modify data, and/or execute unau... | cwe | medium | CWE-1391 |
Generate a Nuclei template for: Unrestricted Access on Uncommon EC2 Ports | Title: Unrestricted Access on Uncommon EC2 Ports
Summary: Unrestricted Access on Uncommon EC2 Ports. Ensure Amazon EC2 security groups do not allow unrestricted access (0.0.0.0/0, ::/0) on uncommon ports, protecting against brute force attacks on EC2 instances.
Vulnerability Type: Security Check
Severity: high
Indicat... | id: ec2-sg-ingress
info:
name: Unrestricted Access on Uncommon EC2 Ports
author: princechaddha
severity: high
description: Ensure Amazon EC2 security groups do not allow unrestricted access (0.0.0.0/0, ::/0) on uncommon ports, protecting against brute force attacks on EC2 instances.
tags: cloud,devops,aws,am... | generic | high | ec2-sg-ingress |
Generate a Nuclei template for: Ruby Configuration File - Detect | Title: Ruby Configuration File - Detect
Summary: Ruby Configuration File - Detect. Multiple Ruby configuration files were detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: config-rb
info:
name: Ruby Configuration File - Detect
author: DhiyaneshDK
severity: info
description: Multiple Ruby configuration files were detected.
tags: ruby,devops,exposure,config,vuln
http:
- method: GET
path:
- "{{BaseURL}}/config.rb"
- "{{BaseURL}}/.chef/config.rb"
- "... | generic | info | config-rb |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: pewex
info:
name: Pewex User Name Information - Detect
author: dwisiswant0
severity: info
description: Pewex user name information check was conducted.
tags: osint,osint-misc,pewex,discovery
http:
- method: GET
path:
- "https://retro.pewex.pl/user/{{user}}"
matchers:
- type: statu... | cwe | medium | CWE-200 |
Generate a Nuclei template for: WP Rollback – Rollback Plugins and Themes Detection | Title: WP Rollback – Rollback Plugins and Themes Detection
Summary: WP Rollback – Rollback Plugins and Themes Detection
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: wordpress-wp-rollback
info:
name: WP Rollback – Rollback Plugins and Themes Detection
author: ricardomaia
severity: info
description: WP Rollback – Rollback Plugins and Themes Detection
tags: tech,wordpress,wp-plugin,top-200,discovery
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugi... | generic | info | wordpress-wp-rollback |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: jupyter-notebook
info:
name: Jupyter Notebook Login Panel - Detect
author: hakimkt,arafatansari
severity: info
description: Jupyter Notebook login panel was detected.
tags: edb,panel,jupyter,notebook,exposure,discovery
http:
- method: GET
path:
- "{{BaseURL}}/jupyter/login"
- "{{BaseU... | cwe | medium | CWE-200 |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: openvpn-monitor
info:
name: OpenVPN Monitor - Detect
author: geeknik
severity: info
description: openvpn-monitor was discovered. OpenVPN Monitor is a simple python program to generate html that displays the status of an OpenVPN server, including all its current connections.
tags: openvpn,disclosure,panel... | cwe | medium | CWE-200 |
Generate a Nuclei template for CVE-2005-0851 | Title: Vulnerability (CWE-835) in filezilla-project filezilla_server
Summary: FileZilla FTP server before 0.9.6, when using MODE Z (zlib compression), allows remote attackers to cause a denial of service (infinite loop) via certain file uploads or directory listings.
Vulnerability Type: Vulnerability (CWE-835)
Severity... | id: CVE-2005-0851
info:
name: FileZilla Server < 0.9.6 - DoS via MODE Z Infinite Loop
author: pussycat0x
severity: medium
description: FileZilla Server versions prior to 0.9.6 are vulnerable to denial of service when using MODE Z (zlib compression). Remote attackers can cause an infinite loop via certain file ... | cve | medium | CVE-2005-0851 |
Generate a Nuclei template to detect Command Injection | Title: Command Injection (CWE-77)
Summary: The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component. Many protocols... | id: fastjson-1-2-42-rce
info:
name: Fastjson 1.2.42 - Remote Code Execution
author: zh
severity: critical
description: Fastjson 1.2.42 is susceptible to a deserialization remote code execution vulnerability
tags: fastjson,rce,deserialization,oast,vuln
http:
- method: GET
path:
matchers:
- ty... | cwe | medium | CWE-77 |
Generate a Nuclei template for: Dionaea SMB Honeypot - Detect | Title: Dionaea SMB Honeypot - Detect
Summary: Dionaea SMB Honeypot - Detect. A Dionaea SMB honeypot has been identified.
The response to an SMB connection packet differs from real installations, signaling a possible deceptive setup.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: dionaea-smb-honeypot-detect
info:
name: Dionaea SMB Honeypot - Detect
author: UnaPibaGeek
severity: info
description: A Dionaea SMB honeypot has been identified.
The response to an SMB connection packet differs from real installations, signaling a possible deceptive setup.
tags: dionaea,smb,honeypot,ir,c... | generic | info | dionaea-smb-honeypot-detect |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: parse-dashboard
info:
name: Parse Dashboard Login Panel - Detect
author: tess
severity: info
description: Parse Dashboard login panel was detected.
tags: panel,parse,exposure,parseplatform,discovery
http:
- method: GET
path:
- "{{BaseURL}}/login"
matchers:
- type: word
wor... | cwe | medium | CWE-200 |
Generate a Nuclei template for CVE-2023-4521 | Title: Unknown Vulnerability in mooveagency import_xml_and_rss_feeds
Summary: The Import XML and RSS Feeds WordPress plugin before 2.1.5 contains a web shell, allowing unauthenticated attackers to perform RCE. The plugin/vendor was not compromised and the files are the result of running a PoC for a previously reported ... | id: CVE-2023-4521
info:
name: Import XML and RSS Feeds < 2.1.5 - Unauthenticated RCE
author: princechaddha
severity: critical
description: The Import XML and RSS Feeds WordPress plugin before 2.1.5 allows unauthenticated attackers to execute arbitrary commands via a web shell.
tags: cve,cve2023,wordpress,wp,... | cve | critical | CVE-2023-4521 |
Generate a Nuclei template for: Magento Connect Manager Installer - Detect | Title: Magento Connect Manager Installer - Detect
Summary: Magento Connect Manager Installer - Detect. Magento Connect Manager installer was detected. The software, available via /downloader/ location, requires Magento admin rights and uses the same authorization methods as for backend. If an attacker locates a matchin... | id: magento-downloader-panel
info:
name: Magento Connect Manager Installer - Detect
author: 5up3r541y4n
severity: info
description: Magento Connect Manager installer was detected. The software, available via /downloader/ location, requires Magento admin rights and uses the same authorization methods as for bac... | generic | info | magento-downloader-panel |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: myanimelist
info:
name: MyAnimeList User Name Information - Detect
author: dwisiswant0
severity: info
description: MyAnimeList user name information check was conducted.
tags: osint,osint-social,myanimelist,discovery
http:
- method: GET
path:
- "https://myanimelist.net/profile/{{user}}"
... | cwe | medium | CWE-200 |
Generate a Nuclei template for: Really Simple CAPTCHA Detection | Title: Really Simple CAPTCHA Detection
Summary: Really Simple CAPTCHA Detection. Tags: tech, wordpress, wp-plugin
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: wordpress-really-simple-captcha
info:
name: Really Simple CAPTCHA Detection
author: ricardomaia
severity: info
description: Really Simple CAPTCHA Detection
tags: tech,wordpress,wp-plugin,top-200,discovery
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/really-simple-captcha/readm... | generic | info | wordpress-really-simple-captcha |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: imap-detect
info:
name: IMAP - Detect
author: pussycat0x
severity: info
description: IMAP was detected.
tags: network,detect,imap,mail,detection,tcp,discovery
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 200 | cwe | medium | CWE-200 |
Generate a Nuclei template for CVE-2010-1977 | Title: Path Traversal in gohigheris com_jwhmcs
Summary: Directory traversal vulnerability in the J!WHMCS Integrator (com_jwhmcs) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot) in the controller parameter to index.php.
Vulnerability Type: Path Traversal
Severity: high
Affe... | id: CVE-2010-1977
info:
name: Joomla! Component J!WHMCS Integrator 1.5.0 - Local File Inclusion
author: daffainfo
severity: high
description: A directory traversal vulnerability in the J!WHMCS Integrator (com_jwhmcs) component 1.5.0 for Joomla! allows remote attackers to read arbitrary files via a .. (dot dot)... | cve | high | CVE-2010-1977 |
Generate a Nuclei template to detect Open Redirect | Title: Open Redirect (CWE-601)
Summary: The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.
Vulnerability Type: Open Redirect
Severity: high
Indicators: vulnerability detected, error | id: icewarp-open-redirect
info:
name: IceWarp - Open Redirect
author: uomogrande
severity: medium
description: IceWarp open redirect vulnerabilities were detected. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.... | cwe | high | CWE-601 |
Generate a Nuclei template for CVE-2025-6934 | Title: Vulnerability (CWE-269) in CVE-2025-6934
Summary: The Opal Estate Pro – Property Management and Submission plugin for WordPress, used by the FullHouse - Real Estate Responsive WordPress Theme, is vulnerable to privilege escalation via in all versions up to, and including, 1.7.5. This is due to a lack of role res... | id: CVE-2025-6934
info:
name: The Opal Estate Pro – Property Management <= 1.7.5 - Unauthenticated Privilege Escalation
author: pussycat0x
severity: critical
description: The Opal Estate Pro plugin (≤ 1.7.5) is vulnerable to privilege escalation. Due to missing role restrictions in the on_register_user functio... | cve | critical | CVE-2025-6934 |
Generate a Nuclei template for: LiteSpeed Cache Detection | Title: LiteSpeed Cache Detection
Summary: LiteSpeed Cache Detection. Tags: tech, wordpress, wp-plugin
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: wordpress-litespeed-cache
info:
name: LiteSpeed Cache Detection
author: ricardomaia
severity: info
description: LiteSpeed Cache Detection
tags: tech,wordpress,wp-plugin,top-100,top-200,discovery
http:
- method: GET
path:
- "{{BaseURL}}/wp-content/plugins/litespeed-cache/readme.txt"
matc... | generic | info | wordpress-litespeed-cache |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: bittube
info:
name: Bittube User Name Information - Detect
author: dwisiswant0
severity: info
description: Bittube user name information check was conducted.
tags: osint,osint-video,bittube,discovery
http:
- method: GET
path:
- "https://bittube.video/c/{{user}}/videos"
matchers:
-... | cwe | medium | CWE-200 |
Generate a Nuclei template for: CSZ CMS 1.3.0 - SQL Injection | Title: CSZ CMS 1.3.0 - SQL Injection
Summary: CSZ CMS 1.3.0 - SQL Injection. CSZ CMS version 1.3.0 suffers from multiple remote blind SQL injection vulnerabilities.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected | id: csz-cms-sqli
info:
name: CSZ CMS 1.3.0 - SQL Injection
author: r3Y3r53
severity: high
description: CSZ CMS version 1.3.0 suffers from multiple remote blind SQL injection vulnerabilities.
tags: time-based-sqli,packetstorm,sqli,csz,cms,vuln
http:
- method: GET
path:
matchers:
- type: dsl
... | generic | high | csz-cms-sqli |
Generate a Nuclei template for CVE-2022-29455 | Title: Cross-Site Scripting (XSS) in elementor website_builder
Summary: DOM-based Reflected Cross-Site Scripting (XSS) vulnerability in Elementor's Elementor Website Builder plugin <= 3.5.5 versions.
Vulnerability Type: Cross-Site Scripting (XSS)
Severity: medium
Affected Products: elementor website_builder
Indicators:... | id: CVE-2022-29455
info:
name: WordPress Elementor Website Builder <= 3.5.5 - DOM Cross-Site Scripting
author: rotembar,daffainfo
severity: medium
description: WordPress Elementor Website Builder plugin 3.5.5 and prior contains a reflected cross-site scripting vulnerability via the document object model.
tag... | cve | medium | CVE-2022-29455 |
Generate a Nuclei template for: Vista Web Login Panel | Title: Vista Web Login Panel
Summary: Vista Web Login Panel. Vista Web login panel was detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: vistaweb-panel
info:
name: Vista Web Login Panel
author: righettod
severity: info
description: Vista Web login panel was detected.
tags: panel,vistaweb,login,discovery
http:
- method: GET
path:
- "{{BaseURL}}/account/login"
matchers:
- type: dsl
condition: and | generic | info | vistaweb-panel |
Generate a Nuclei template for: Hugo Detect | Title: Hugo Detect
Summary: Hugo Detect. Hugo is a fast and modern static site generator written in Go
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: hugo-detect
info:
name: Hugo Detect
author: daffainfo
severity: info
description: Hugo is a fast and modern static site generator written in Go
tags: tech,hugo,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
- "<meta name=generat... | generic | info | hugo-detect |
Generate a Nuclei template to detect SQL Injection | Title: SQL Injection (CWE-89)
Summary: The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without s... | id: xdcms-sqli
info:
name: XdCMS - SQL Injection
author: pikpikcu
severity: critical
description: XdCMS contains a SQL injection vulnerability. An attacker can possibly obtain sensitive information from a database, modify data, and execute unauthorized administrative operations in the context of the affected s... | cwe | critical | CWE-89 |
Generate a Nuclei template for CVE-2021-20837 | Title: OS Command Injection in sixapart movable_type
Summary: Movable Type 7 r.5002 and earlier (Movable Type 7 Series), Movable Type 6.8.2 and earlier (Movable Type 6 Series), Movable Type Advanced 7 r.5002 and earlier (Movable Type Advanced 7 Series), Movable Type Advanced 6.8.2 and earlier (Movable Type Advanced 6 S... | id: movable-workflow
info:
name: Movable Type Security Checks
author: dhiyaneshDk
severity: info
description: A simple workflow that runs all Movable related nuclei templates on a given target.
tags: unknown
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
... | cve | critical | CVE-2021-20837 |
Generate a Nuclei template for: Zabbix Security Checks | Title: Zabbix Security Checks
Summary: Zabbix Security Checks. A simple workflow that runs all Zabbix related nuclei templates on a given target.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: zabbix-workflow
info:
name: Zabbix Security Checks
author: daffainfo
severity: info
description: A simple workflow that runs all Zabbix related nuclei templates on a given target.
tags: unknown
http:
- method: GET
path:
- "/"
matchers:
- type: status
status:
- 20... | generic | info | zabbix-workflow |
Generate a Nuclei template for CVE-2025-64095 | Title: Unrestricted File Upload in dnnsoftware dotnetnuke
Summary: DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to 10.1.1, the default HTML editor provider allows unauthenticated file uploads and images can overwrite existing files. An unauthenticat... | id: CVE-2025-64095
info:
name: DNN - Unrestricted Arbitrary File Upload
author: DhiyaneshDk,pussycat0x
severity: critical
description: DNN (formerly DotNetNuke) \u003C 10.1.1 contains an unrestricted file upload vulnerability caused by the default HTML editor provider allowing unauthenticated file uploads and ... | cve | critical | CVE-2025-64095 |
Generate a Nuclei template for: Apache ActiveMQ Detection | Title: Apache ActiveMQ Detection
Summary: Apache ActiveMQ Detection. Apache ActiveMQ is an open source message broker written in Java together with a full Java Message Service client. It provides "Enterprise Features" which in this case means fostering the communication from more than one client or server.
Vulnerabili... | id: apache-activemq-detect
info:
name: Apache ActiveMQ Detection
author: pussycat0x
severity: info
description: Apache ActiveMQ is an open source message broker written in Java together with a full Java Message Service client. It provides "Enterprise Features" which in this case means fostering the communicati... | generic | info | apache-activemq-detect |
Generate a Nuclei template to detect Exposure of Sensitive Information to an Unauthorized Actor | Title: Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)
Summary: The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can ... | id: farkascity
info:
name: Farkascity User Name Information - Detect
author: dwisiswant0
severity: info
description: Farkascity user name information check was conducted.
tags: osint,osint-blog,farkascity,discovery
http:
- method: GET
path:
- "https://farkascity.org/{{user}}/"
matchers:
... | cwe | medium | CWE-200 |
Generate a Nuclei template for: ThingsBoard Access Token | Title: ThingsBoard Access Token
Summary: ThingsBoard Access Token. Tags: thingsboard, exposure, tokens
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: thingsboard-access-token
info:
name: ThingsBoard Access Token
author: DhiyaneshDK
severity: info
description: ThingsBoard Access Token
tags: thingsboard,exposure,tokens,vuln
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: status
status:
- 200 | generic | info | thingsboard-access-token |
Generate a Nuclei template for CVE-2018-7600 | Title: Vulnerability (CWE-20) in drupal drupal and others
Summary: Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or common module configurations.
Vulnerability Type: Vulner... | id: CVE-2018-7600
info:
name: Drupal - Remote Code Execution
author: pikpikcu
severity: critical
description: Drupal before 7.58, 8.x before 8.3.9, 8.4.x before 8.4.6, and 8.5.x before 8.5.1 allows remote attackers to execute arbitrary code because of an issue affecting multiple subsystems with default or comm... | cve | critical | CVE-2018-7600 |
Generate a Nuclei template to detect Insufficiently Protected Credentials | Title: Insufficiently Protected Credentials (CWE-522)
Summary: The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Vulnerability Type: Insufficiently Protected Credentials
Severity: medium
Indicators: unauthorized | id: jboss-jbpm-default-login
info:
name: JBoss jBPM Administration Console Default Login - Detect
author: DhiyaneshDk
severity: high
description: JBoss jBPM Administration Console default login information was detected.
tags: jboss,jbpm,default-login,vuln
http:
- method: GET
path:
matchers:
... | cwe | medium | CWE-522 |
Generate a Nuclei template for CVE-2007-2449 | Title: Unknown Vulnerability in apache tomcat
Summary: Multiple cross-site scripting (XSS) vulnerabilities in certain JSP files in the examples web application in Apache Tomcat 4.0.0 through 4.0.6, 4.1.0 through 4.1.36, 5.0.0 through 5.0.30, 5.5.0 through 5.5.24, and 6.0.0 through 6.0.13 allow remote attackers to injec... | id: CVE-2007-2449
info:
name: Apache Tomcat 4.x-7.x - Cross-Site Scripting
author: pdteam,ritikchaddha
severity: medium
description: Apache Tomcat 4.x through 7.x contains a cross-site scripting vulnerability which an attacker can use to execute arbitrary script in the browser of an unsuspecting user in the co... | cve | medium | CVE-2007-2449 |
Generate a Nuclei template for CVE-2010-2680 | Title: Path Traversal in harmistechnology com_jesectionfinder
Summary: Directory traversal vulnerability in the JExtensions JE Section/Property Finder (jesectionfinder) component for Joomla! allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the view parameter to i... | id: CVE-2010-2680
info:
name: Joomla! Component jesectionfinder - Local File Inclusion
author: daffainfo
severity: medium
description: A directory traversal vulnerability in the JExtensions JE Section/Property Finder (jesectionfinder) component for Joomla! allows remote attackers to include and execute arbitra... | cve | medium | CVE-2010-2680 |
Generate a Nuclei template for: Utility Services Administration - Detect | Title: Utility Services Administration - Detect
Summary: Utility Services Administration - Detect. Tags: tech, avaya, aura
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: utility-service-detect
info:
name: Utility Services Administration - Detect
author: DhiyaneshDK
severity: info
description: Utility Services Administration - Detect
tags: tech,avaya,aura,discovery
http:
- method: GET
path:
- "{{BaseURL}}"
matchers:
- type: word
words:
... | generic | info | utility-service-detect |
Generate a Nuclei template to detect Use of Hard-coded Credentials | Title: Use of Hard-coded Credentials (CWE-798)
Summary: The product contains hard-coded credentials, such as a password or cryptographic key. There are two main variations:
Inbound: the product contains an authentication mechanism that checks the input credentials against a hard-coded set of credentials. In this... | id: azkaban-default-login
info:
name: Azkaban Web Client Default Credential
author: pussycat0x
severity: high
description: Azkaban is a batch workflow job scheduler created at LinkedIn to run Hadoop jobs. Default web client credentials were discovered.
tags: default-login,azkaban,vuln
http:
- method: GET... | cwe | high | CWE-798 |
Generate a Nuclei template for: Fortinet FGFM protocol - Detect | Title: Fortinet FGFM protocol - Detect
Summary: Fortinet FGFM protocol - Detect. FortiGate to FortiManager Protocol (FGFM) was detected.
Vulnerability Type: Security Check
Severity: info
Indicators: vulnerability detected | id: fortinet-fgfm-detect
info:
name: Fortinet FGFM protocol - Detect
author: johnk3r
severity: info
description: FortiGate to FortiManager Protocol (FGFM) was detected.
tags: network,tcp,fortinet,fortigate,fortimanager,discovery
http:
- method: GET
path:
- "/"
matchers:
- type: status... | generic | info | fortinet-fgfm-detect |
Generate a Nuclei template for CVE-2012-6499 | Title: Vulnerability (CWE-20) in age_verification_project age_verification
Summary: Open redirect vulnerability in age-verification.php in the Age Verification plugin 0.4 and earlier for WordPress allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the redirect_to ... | id: CVE-2012-6499
info:
name: WordPress Plugin Age Verification v0.4 - Open Redirect
author: ctflearner
severity: medium
description: Open redirect vulnerability in age-verification.php in the Age Verification plugin 0.4 and earlier for WordPress allows remote attackers to redirect users to arbitrary web sites... | cve | medium | CVE-2012-6499 |
Generate a Nuclei template for: Unrestricted OpenSearch Access | Title: Unrestricted OpenSearch Access
Summary: Unrestricted OpenSearch Access. Checks EC2 security groups for inbound rules allowing unrestricted access to OpenSearch on TCP port 9200. Restricts access to essential IP addresses only.
Vulnerability Type: Security Check
Severity: critical
Indicators: vulnerability detec... | id: ec2-unrestricted-opensearch
info:
name: Unrestricted OpenSearch Access
author: princechaddha
severity: critical
description: Checks EC2 security groups for inbound rules allowing unrestricted access to OpenSearch on TCP port 9200. Restricts access to essential IP addresses only.
tags: cloud,devops,aws,am... | generic | critical | ec2-unrestricted-opensearch |
Generate a Nuclei template for: Smarty - Server Side Template Injection | Title: Smarty - Server Side Template Injection
Summary: Smarty - Server Side Template Injection. In PHP template engine Smarty, template injection is possible by exploiting the passthru function combined with array_map and chr.
Vulnerability Type: Security Check
Severity: high
Indicators: vulnerability detected | id: smarty-ssti
info:
name: Smarty - Server Side Template Injection
author: ritikchaddha
severity: high
description: In PHP template engine Smarty, template injection is possible by exploiting the passthru function combined with array_map and chr.
tags: smarty,ssti,dast,vuln
http:
- method: GET
path:
... | generic | high | smarty-ssti |
End of preview. Expand in Data Studio
YAML Metadata Warning:empty or missing yaml metadata in repo card
Check out the documentation for more information.
Ernest Nuclei Templates Dataset v1 (Instruction Format)
This is a restructured version of the Ernest Nuclei Templates dataset optimized for instruction tuning.
Format
Each example has this structure:
{
"instruction": "Generate a Nuclei template for CVE-2024-1234",
"input": "Title: XSS in Product\nSummary: Description...\nSeverity: high",
"output": "id: cve-2024-1234\n\ninfo:\n name: ...\n\nhttp:\n - method: GET\n ...",
"category": "cve",
"severity": "high",
"id": "CVE-2024-1234"
}
Usage
from datasets import load_dataset
dataset = load_dataset('json', data_files={
'train': 'train.jsonl',
'test': 'test.jsonl',
'validation': 'validation.jsonl'
})
# For instruction tuning
example = dataset['train'][0]
print(f"Instruction: {example['instruction']}")
print(f"Input: {example['input']}")
print(f"Output: {example['output']}")
Advantages
- Flatter structure: Easier to work with in ML frameworks
- Instruction format: Ready for instruction-tuning (Alpaca, GPT-4 style)
- Text-focused: Input and output are plain text strings
- Smaller size: ~30% smaller than nested format
- Faster loading: Less parsing overhead
Original Dataset
See the original nested format at: ../ernest-nuclei-templates-v1/
- Downloads last month
- 26