id
stringlengths
5
53
prompt
stringlengths
1.49k
6.97k
completion
stringlengths
924
11.2M
CVE-2025-48828
[CANONICAL_RECORD] { "cve_id": "CVE-2025-48828", "summary": "Certain vBulletin versions might allow attackers to execute arbitrary PHP code by abusing Template Conditionals in the template engine. By crafting template code in an alternative PHP function invocation syntax, such as the \"var_dump\"(\"test\") syntax, ...
{ "id": "cve-2025-48828", "info": { "name": "vBulletin replaceAdTemplate - Remote Code Execution", "author": "DhiyaneshDK, Chocapikk", "severity": "critical", "description": "vBulletin versions 5.0.0 through 6.0.3 contain a Remote Code Execution (RCE) vulnerability in the ajax/api/ad/replaceAdTempla...
CWE-200
[CANONICAL_RECORD] { "cve_id": "CWE-200", "summary": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on ...
{ "id": "alfresco-panel", "info": { "name": "Alfresco Content App Panel - Detect", "author": "Splint3r7", "severity": "info", "description": "Alfresco Content App panel was detected.\n", "tags": [ "panel", "alfresco", "login", "detect", "discovery" ], "refer...
CWE-200
[CANONICAL_RECORD] { "cve_id": "CWE-200", "summary": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on ...
{ "id": "iot-vdme-simulator", "info": { "name": "IoT vDME Simulator Panel - Detect", "author": "tess", "severity": "medium", "description": "loT vDME Simulator panel was detected. Exposure IoT vDME Simulator panel allows anonymous access to create new Items.\n", "tags": [ "exposure", ...
CWE-200
[CANONICAL_RECORD] { "cve_id": "CWE-200", "summary": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on ...
{ "id": "hubpages", "info": { "name": "HubPages User Name Information - Detect", "author": "dwisiswant0", "severity": "info", "description": "HubPages user name information check was conducted.", "tags": [ "osint", "osint-blog", "hubpages", "discovery" ], "referen...
filebrowser-unauth
[CANONICAL_RECORD] { "cve_id": "filebrowser-unauth", "summary": "File Browser dashboard is exposed.. This template detects File Browser Dashboard - Unauthenticated Access by checking specific patterns and responses.", "affected_products": [], "paths": [ "{{BaseURL}}", "{{BaseURL}}/login" ], "indicat...
{ "id": "filebrowser-unauth", "info": { "name": "File Browser Dashboard - Unauthenticated Access", "author": "ritikchaddha", "severity": "medium", "description": "File Browser dashboard is exposed.", "tags": [ "misconfig", "filebrowser", "unauth", "vuln" ], "refer...
CWE-200
[CANONICAL_RECORD] { "cve_id": "CWE-200", "summary": "The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. There are many different kinds of mistakes that introduce information exposures. The severity of the error can range widely, depending on ...
{ "id": "airliners", "info": { "name": "Airliners User Name Information - Detect", "author": "dwisiswant0", "severity": "info", "description": "Airliners user name information check was conducted.", "tags": [ "osint", "osint-social", "airliners", "discovery" ], "r...
liveperson-lptag-csp-bypass
[CANONICAL_RECORD] { "cve_id": "liveperson-lptag-csp-bypass", "summary": "Content-Security-Policy Bypass - LivePerson LPTAG. This template detects Content-Security-Policy Bypass - LivePerson LPTAG by checking specific patterns and responses.", "affected_products": [], "paths": [ "{{BaseURL}}" ], "indica...
{ "id": "liveperson-lptag-csp-bypass", "info": { "name": "Content-Security-Policy Bypass - LivePerson LPTAG", "author": "renniepak,DhiyaneshDK", "severity": "medium", "description": "Content-Security-Policy Bypass - LivePerson LPTAG", "tags": [ "xss", "csp-bypass", "liveperson-...
k8s-etcd-cafile-set
[CANONICAL_RECORD] { "cve_id": "k8s-etcd-cafile-set", "summary": "Checks if the etcd-cafile argument is properly set in the etcd configuration, crucial for secure client connections to etcd.", "affected_products": [], "paths": [], "indicators": [ "Ensure etcd-cafile argument set", "detected" ], "s...
{ "id": "k8s-etcd-cafile-set", "info": { "name": "Ensure etcd-cafile argument set", "author": "princechaddha", "severity": "medium", "description": "Checks if the etcd-cafile argument is properly set in the etcd configuration, crucial for secure client connections to etcd.", "tags": [ "clo...
CVE-2010-1476
[CANONICAL_RECORD] { "cve_id": "CVE-2010-1476", "summary": "Directory traversal vulnerability in the AlphaUserPoints (com_alphauserpoints) component 1.5.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the view parameter to index.php.", ...
{ "id": "cve-2010-1476", "info": { "name": "Joomla! Component AlphaUserPoints 1.5.5 - Local File Inclusion", "author": "daffainfo", "severity": "medium", "description": "A directory traversal vulnerability in the AlphaUserPoints (com_alphauserpoints) component 1.5.5 for Joomla! allows remote attacke...
CVE-2022-42096
[CANONICAL_RECORD] { "cve_id": "CVE-2022-42096", "summary": "Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via Post content.", "affected_products": [ { "vendor": "backdropcms", "product": "backdrop_cms", "version_range": "*" } ]...
{ "id": "cve-2022-42096", "info": { "name": "Backdrop CMS version 1.23.0 - Cross Site Scripting (Stored)", "author": "theamanrawat", "severity": "medium", "description": "Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via Post content.\n", ...
CVE-2021-24236
[CANONICAL_RECORD] { "cve_id": "CVE-2021-24236", "summary": "The Imagements WordPress plugin through 1.2.5 allows images to be uploaded in comments, however only checks for the Content-Type in the request to forbid dangerous files. This allows unauthenticated attackers to upload arbitrary files by using a valid ima...
{ "id": "cve-2021-24236", "info": { "name": "WordPress Imagements <=1.2.5 - Arbitrary File Upload", "author": "pussycat0x", "severity": "critical", "description": "WordPress Imagements plugin through 1.2.5 is susceptible to arbitrary file upload which can lead to remote code execution. The plugin al...
industroyer-malware-hash
[CANONICAL_RECORD] { "cve_id": "industroyer-malware-hash", "summary": "Detects Industroyer related malware. This template detects Industroyer Malware Hash - Detect by checking specific patterns and responses.", "affected_products": [], "paths": [], "indicators": [ "Industroyer Malware Hash - Detect", ...
{ "id": "industroyer-malware-hash", "info": { "name": "Industroyer Malware Hash - Detect", "author": "pussycat0x", "severity": "info", "description": "Detects Industroyer related malware", "tags": [ "malware", "industroyer", "apt" ], "reference": [ "https://goo.gl...