<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
  <channel>
    <title>runZero Vulnerability Templates</title>
    <link>https://help.runzero.com/docs/em-templates/</link>
    <description>Latest Nuclei vulnerability templates curated by runZero</description>
    <language>en-us</language>
    <lastBuildDate>Tue, 12 May 2026 13:39:15 +0000</lastBuildDate>
    <item>
      <title>WordPress Campress Theme &lt;= 1.35 - Unauthenticated Local File Inclusion (critical)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2024/CVE-2024-10763.yaml</link>
      <description>&lt;p&gt;Campress theme for WordPress up to 1.35 contains a local file inclusion caused by &amp;#39;campress_woocommerce_get_ajax_products&amp;#39; function, letting unauthenticated attackers include and execute arbitrary PHP files, exploit requires no authentication.&lt;/p&gt;&lt;p&gt;Severity: critical · Category: http-cves · CVEs: CVE-2024-10763&lt;/p&gt;</description>
      <pubDate>Tue, 12 May 2026 13:39:15 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2024-10763</guid>
    </item>
    <item>
      <title>EspoCRM - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/espocrm-detect.yaml</link>
      <description>&lt;p&gt;EspoCRM panel was detected.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Tue, 12 May 2026 13:39:15 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#espocrm-detect</guid>
    </item>
    <item>
      <title>Blinko - Login Panel Detection (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/blinko-login-panel.yaml</link>
      <description>&lt;p&gt;Detected A Blinko self-hosted personal note application login panel.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Mon, 11 May 2026 16:18:19 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#blinko-login-panel</guid>
    </item>
    <item>
      <title>Tattile Camera &lt; 1.181.5 - Default Login (high)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2026/CVE-2026-26341.yaml</link>
      <description>&lt;p&gt;Tattile Smart+, Vega, and Basic device families firmware &amp;lt;= 1.181.5 contain a broken authentication caused by default credentials not forced to be changed, letting attackers with management interface access gain administrative privileges.&lt;/p&gt;&lt;p&gt;Severity: high · Category: http-cves · CVEs: CVE-2026-26341&lt;/p&gt;</description>
      <pubDate>Mon, 11 May 2026 16:18:19 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2026-26341</guid>
    </item>
    <item>
      <title>IBM MobileFirst Foundation - Default Credentials (critical)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/default-logins/ibm/ibm-mfp-default-login.yaml</link>
      <description>&lt;p&gt;Detected IBM MobileFirst Foundation Operations Console was found using default credentials. The administration REST API exposes full control over mobile application backends including adapter management, push notification infrastructure, OAuth security configuration, and application authenticity enforcement.&lt;/p&gt;&lt;p&gt;Severity: critical · Category: http-default-logins&lt;/p&gt;</description>
      <pubDate>Fri, 08 May 2026 17:28:25 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#ibm-mfp-default-login</guid>
    </item>
    <item>
      <title>Linkwarden Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/linkwarden-panel.yaml</link>
      <description>&lt;p&gt;Linkwarden (linkwarden.app / github.com/linkwarden/linkwarden) is a popular open-source self-hosted bookmark and link archiving manager. Default Docker port 3000. Exposed instances may reveal users&amp;#39; archived link collections, screenshots, and PDFs.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Wed, 06 May 2026 22:08:47 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#linkwarden-panel</guid>
    </item>
    <item>
      <title>Windmill Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/windmill-panel.yaml</link>
      <description>&lt;p&gt;Windmill panel was detected. Windmill (windmill.dev) is an open-source developer platform for workflows, scripts and internal apps, often self-hosted as a Postgres-backed UI. Exposed instances may reveal scripts, secrets and connected resources, and provide an authenticated path to script execution.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Wed, 06 May 2026 22:08:47 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#windmill-panel</guid>
    </item>
    <item>
      <title>Airbyte Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/airbyte-panel.yaml</link>
      <description>&lt;p&gt;Airbyte panel was detected. Airbyte is a popular open-source data integration platform.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Wed, 06 May 2026 22:08:47 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#airbyte-panel</guid>
    </item>
    <item>
      <title>OpenBao Web UI Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/openbao-webui-detect.yaml</link>
      <description>&lt;p&gt;Detects the presence of the OpenBao web console.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Wed, 06 May 2026 22:08:47 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#openbao-webui-detect</guid>
    </item>
    <item>
      <title>Apache ActiveMQ 6.x &lt; 6.1.2 - Broken Access Control (high)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2024/CVE-2024-32114.yaml</link>
      <description>&lt;p&gt;Apache ActiveMQ 6.x contains an unauthenticated API web context caused by default configuration lacking security measures in the Jetty server, letting anyone interact with broker APIs and messaging layers, exploit requires no authentication.&lt;/p&gt;&lt;p&gt;Severity: high · Category: http-cves · CVEs: CVE-2024-32114&lt;/p&gt;</description>
      <pubDate>Wed, 06 May 2026 22:08:47 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2024-32114</guid>
    </item>
    <item>
      <title>Laravel Login - Panel Detection (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/laravel-login-panel.yaml</link>
      <description>&lt;p&gt;A Laravel login panel was detected.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Wed, 06 May 2026 22:08:47 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#laravel-login-panel</guid>
    </item>
    <item>
      <title>MLflow Job API - Authentication Bypass (critical)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2026/CVE-2026-0545.yaml</link>
      <description>&lt;p&gt;MLflow latest version contains an authentication bypass caused by unprotected FastAPI job endpoints under /ajax-api/3.0/jobs/* when basic-auth is enabled, letting unauthenticated network clients submit and manage jobs, exploit requires job execution enabled and allowlisted job functions.&lt;/p&gt;&lt;p&gt;Severity: critical · Category: http-cves · CVEs: CVE-2026-0545&lt;/p&gt;</description>
      <pubDate>Wed, 06 May 2026 22:08:47 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2026-0545</guid>
    </item>
    <item>
      <title>Mealie Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/mealie-panel.yaml</link>
      <description>&lt;p&gt;Detected Mealie was a self-hosted recipe manager and meal planner with a Vue/Nuxt frontend and FastAPI backend.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Wed, 06 May 2026 22:08:47 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#mealie-panel</guid>
    </item>
    <item>
      <title>DataEase 2.10.4-2.10.7 - Remote Code Execution (critical)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2025/CVE-2025-32966.yaml</link>
      <description>&lt;p&gt;DataEase prior to version 2.10.8 contains a remote code execution caused by insecure backend JDBC link handling, letting authenticated users execute arbitrary code, exploit requires user authentication.&lt;/p&gt;&lt;p&gt;Severity: critical · Category: http-cves · CVEs: CVE-2025-32966&lt;/p&gt;</description>
      <pubDate>Wed, 06 May 2026 22:08:47 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2025-32966</guid>
    </item>
    <item>
      <title>ZITADEL Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/zitadel-panel.yaml</link>
      <description>&lt;p&gt;Detected ZITADEL was an open-source identity infrastructure platform providing OIDC, OAuth 2.0, SAML and machine-user IAM.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Wed, 06 May 2026 22:08:47 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#zitadel-panel</guid>
    </item>
    <item>
      <title>Paperless-ngx Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/paperless-ngx-panel.yaml</link>
      <description>&lt;p&gt;Detected Paperless-ngx was a self-hosted document management platform for scanning, OCR-ing and tagging paper documents.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Wed, 06 May 2026 22:08:47 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#paperless-ngx-panel</guid>
    </item>
    <item>
      <title>Device42 Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/device42-panel.yaml</link>
      <description>&lt;p&gt;Device42 was detected — a Discovery, Asset Management and Dependency Mapping for Data Center and Cloud.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Mon, 04 May 2026 17:12:58 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#device42-panel</guid>
    </item>
    <item>
      <title>cPanel &amp; WHM - Authentication Bypass via Session-File CRLF Injection (critical)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2026/CVE-2026-41940.yaml</link>
      <description>&lt;p&gt;cPanel and WHM versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, and 11.136.0.5 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.&lt;/p&gt;&lt;p&gt;Severity: critical · Category: http-cves&lt;/p&gt;</description>
      <pubDate>Mon, 04 May 2026 17:12:58 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2026-41940</guid>
    </item>
    <item>
      <title>Claris FileMaker Server Admin Console - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/claris-filemaker-panel.yaml</link>
      <description>&lt;p&gt;Claris FileMaker Server Admin Console panel was detected.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Mon, 04 May 2026 17:12:58 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#claris-filemaker-panel</guid>
    </item>
    <item>
      <title>Supabase Studio Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/supabase-studio-panel.yaml</link>
      <description>&lt;p&gt;Supabase Studio login panel was detected. The admin dashboard shipped with Supabase, the popular open-source Firebase alternative (Postgres + auth + realtime + storage + edge functions).&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Mon, 04 May 2026 17:12:58 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#supabase-studio-panel</guid>
    </item>
    <item>
      <title>ChurchCRM - API Authentication Bypass via URL Injection (critical)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2026/CVE-2026-39339.yaml</link>
      <description>&lt;p&gt;ChurchCRM &amp;lt; 7.1.0 contains an authentication bypass caused by improper API middleware URL handling in ChurchCRM/Slim/Middleware/AuthMiddleware.php, letting unauthenticated attackers access protected API endpoints, exploit requires crafted request URL with &amp;#39;api/public&lt;/p&gt;&lt;p&gt;Severity: critical · Category: http-cves · CVEs: CVE-2026-39339&lt;/p&gt;</description>
      <pubDate>Mon, 04 May 2026 17:12:58 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2026-39339</guid>
    </item>
    <item>
      <title>Langflow &lt; 1.9.0 - Remote Code Execution (critical)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2026/CVE-2026-33017.yaml</link>
      <description>&lt;p&gt;Langflow versions prior to 1.9.0 are vulnerable to unauthenticated remote code execution (RCE) via the build_public_tmp endpoint. Attackers can submit a manipulated flow JSON containing Python code that is executed during the build process without proper sandboxing.&lt;/p&gt;&lt;p&gt;Severity: critical · Category: http-cves · CVEs: CVE-2026-33017&lt;/p&gt;</description>
      <pubDate>Mon, 04 May 2026 17:12:58 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2026-33017</guid>
    </item>
    <item>
      <title>Mesop AI Sandbox &lt;= 1.2.2 - Remote Code Execution (critical)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2026/CVE-2026-33057.yaml</link>
      <description>&lt;p&gt;Mesop &amp;lt;= 1.2.2 contains an unrestricted remote code execution caused by unauthenticated ingestion and execution of base64-encoded Python code in the /exec-py endpoint of ai/testing module, letting attackers execute arbitrary commands on the host, exploit requires HTTP access to the server.&lt;/p&gt;&lt;p&gt;Severity: critical · Category: http-cves · CVEs: CVE-2026-33057&lt;/p&gt;</description>
      <pubDate>Mon, 04 May 2026 17:12:58 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2026-33057</guid>
    </item>
    <item>
      <title>FormLift for Infusionsoft Web Forms &lt;= 7.5.17 - SQL Injection (critical)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2024/CVE-2024-38773.yaml</link>
      <description>&lt;p&gt;The FormLift for Infusionsoft Web Forms plugin for WordPress is vulnerable to SQL Injection via the &amp;#39;form_id&amp;#39; parameter in versions up to, and including, 7.5.17 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.&lt;/p&gt;&lt;p&gt;Severity: critical · Category: http-cves · CVEs: CVE-2024-38773&lt;/p&gt;</description>
      <pubDate>Mon, 04 May 2026 17:12:58 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2024-38773</guid>
    </item>
    <item>
      <title>Outline Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/outline-panel.yaml</link>
      <description>&lt;p&gt;Outline (getoutline.com / github.com/outline/outline) is a popular open-source team knowledge base / wiki, often self-hosted as a Notion alternative. Exposed self-hosted instances may reveal team documents and provide a path to login enumeration if SSO is misconfigured.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Mon, 04 May 2026 17:12:58 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#outline-panel</guid>
    </item>
    <item>
      <title>RestroPress 3.0.0-3.2.1 - Authentication Bypass (critical)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2025/CVE-2025-9209.yaml</link>
      <description>&lt;p&gt;RestroPress Online Food Ordering System WordPress plugin 3.0.0 to 3.1.9.2 contains an authentication bypass caused by exposure of user private tokens and API data via /wp-json/wp/v2/users endpoint, letting unauthenticated attackers forge JWT tokens and authenticate as other users including administrators, exploit requires no authentication.&lt;/p&gt;&lt;p&gt;Severity: critical · Category: http-cves · CVEs: CVE-2025-9209&lt;/p&gt;</description>
      <pubDate>Thu, 23 Apr 2026 20:11:17 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2025-9209</guid>
    </item>
    <item>
      <title>Avaya Phone Web Interface - Default Login (high)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/default-logins/avaya-phone-default-login.yaml</link>
      <description>&lt;p&gt;Avaya phone web interface contains a default login vulnerability. An attacker can obtain access to sensitive information, modify data, and/or execute unauthorized operations.&lt;/p&gt;&lt;p&gt;Severity: high · Category: http-default-logins&lt;/p&gt;</description>
      <pubDate>Thu, 23 Apr 2026 20:11:17 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#avaya-phone-default-login</guid>
    </item>
    <item>
      <title>MajorDoMo - Unauthenticated RCE (critical)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2026/CVE-2026-27174.yaml</link>
      <description>&lt;p&gt;MajorDoMo contains a remote code execution caused by an include order bug and lack of exit after redirect in admin panel&amp;#39;s PHP console, letting unauthenticated attackers execute arbitrary PHP code via crafted GET requests.&lt;/p&gt;&lt;p&gt;Severity: critical · Category: http-cves · CVEs: CVE-2026-27174&lt;/p&gt;</description>
      <pubDate>Thu, 23 Apr 2026 20:11:17 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2026-27174</guid>
    </item>
    <item>
      <title>Rclone RC - Broken Access Control (critical)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2026/CVE-2026-41176.yaml</link>
      <description>&lt;p&gt;Rclone &amp;gt;= 1.45.0 and &amp;lt; 1.73.5 contains a broken access control vulnerability caused by unauthenticated access to the RC endpoint `options/set` allowing mutation of global runtime configuration, letting unauthenticated attackers access sensitive administrative functions, exploit requires RC server started without global HTTP authentication.&lt;/p&gt;&lt;p&gt;Severity: critical · Category: http-cves · CVEs: CVE-2026-41176&lt;/p&gt;</description>
      <pubDate>Thu, 23 Apr 2026 20:11:17 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2026-41176</guid>
    </item>
    <item>
      <title>Apache Superset - Default Login (high)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/default-logins/apache/superset-default-login.yaml</link>
      <description>&lt;p&gt;Apache Superset instance discovered using weak default credentials, allows the attacker to gain admin privilege.&lt;/p&gt;&lt;p&gt;Severity: high · Category: http-default-logins&lt;/p&gt;</description>
      <pubDate>Thu, 23 Apr 2026 20:11:17 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#superset-default-login</guid>
    </item>
    <item>
      <title>Export WP Page to Static HTML &lt;= 4.3.4 - Cookie Exposure (critical)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2025/CVE-2025-11693.yaml</link>
      <description>&lt;p&gt;Export WP Page to Static HTML &amp;amp; PDF WordPress plugin &amp;lt;= 4.3.4 contains a sensitive information exposure caused by publicly exposed cookies.txt files with authentication cookies, letting unauthenticated attackers access sensitive authentication data, exploit requires site administrator to trigger backup with specific user role.&lt;/p&gt;&lt;p&gt;Severity: critical · Category: http-cves · CVEs: CVE-2025-11693&lt;/p&gt;</description>
      <pubDate>Thu, 23 Apr 2026 20:11:17 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2025-11693</guid>
    </item>
    <item>
      <title>WP Directory Kit &lt;= 1.4.4 - Authentication Bypass (critical)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2025/CVE-2025-13390.yaml</link>
      <description>&lt;p&gt;The WP Directory Kit plugin for WordPress version 1.4.4 and below contains an authentication bypass vulnerability in its auto-login functionality. The vulnerability allows unauthenticated attackers to gain administrative access by exploiting a cryptographically weak token generation mechanism that uses only the first 10 characters of MD5(user_id). For user_id=1 (typically admin), the token is always predictable.&lt;/p&gt;&lt;p&gt;Severity: critical · Category: http-cves · CVEs: CVE-2025-13390&lt;/p&gt;</description>
      <pubDate>Thu, 23 Apr 2026 20:11:17 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2025-13390</guid>
    </item>
    <item>
      <title>Fortinet FortiSandbox Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/fortinet/fortisandbox-panel.yaml</link>
      <description>&lt;p&gt;Fortinet FortiSandbox login panel was discovered.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Thu, 23 Apr 2026 20:11:17 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#fortinet-fortisandbox-panel</guid>
    </item>
    <item>
      <title>Vendure Core - SQL Injection (critical)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2026/CVE-2026-40887.yaml</link>
      <description>&lt;p&gt;Vendure, an open-source headless commerce platform built on Node.js/TypeScript, contains a critical SQL injection vulnerability in its Shop API. The languageCode query parameter is interpolated directly into a raw SQL CASE expression in ProductService.findOneBySlug without parameterization or input validation, allowing unauthenticated attackers to execute arbitrary SQL commands. This can lead to full database disclosure and denial of service.&lt;/p&gt;&lt;p&gt;Severity: critical · Category: http-cves · CVEs: CVE-2026-40887&lt;/p&gt;</description>
      <pubDate>Fri, 17 Apr 2026 18:59:39 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2026-40887</guid>
    </item>
    <item>
      <title>Nginx UI - Broken Access Control (critical)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2026/CVE-2026-33032.yaml</link>
      <description>&lt;p&gt;Network attackers can fully control nginx service, including config modification and service restart, leading to complete service takeover.&lt;/p&gt;&lt;p&gt;Severity: critical · Category: http-cves · CVEs: CVE-2026-33032&lt;/p&gt;</description>
      <pubDate>Thu, 16 Apr 2026 15:25:44 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2026-33032</guid>
    </item>
    <item>
      <title>OpenHands Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/openhands-panel.yaml</link>
      <description>&lt;p&gt;OpenHands (formerly OpenDevin) was detected. OpenHands is an open-source AI software engineering agent platform that can write code, run commands, and perform development tasks autonomously. Exposed instances may allow unauthenticated access to the agent.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Tue, 14 Apr 2026 20:00:31 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#openhands-panel</guid>
    </item>
    <item>
      <title>H2O Wave ML Application Server - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/h2o-wave-panel.yaml</link>
      <description>&lt;p&gt;H2O Wave was detected. H2O Wave was an open-source Python development framework for building real-time interactive AI and ML web applications. The Wave server hosted applications built on the platform.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Tue, 14 Apr 2026 20:00:31 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#h2o-wave-panel</guid>
    </item>
    <item>
      <title>ClearML Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/clearml-panel.yaml</link>
      <description>&lt;p&gt;ClearML was detected. ClearML is an open-source MLOps platform for experiment tracking, model management, and pipeline orchestration. Exposed instances may allow access to ML experiments, models, and infrastructure configurations.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Tue, 14 Apr 2026 20:00:31 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#clearml-panel</guid>
    </item>
    <item>
      <title>Cisco Secure Firewall Management Center - Authentication Bypass (critical)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/cves/2026/CVE-2026-20079.yaml</link>
      <description>&lt;p&gt;Cisco Secure Firewall Management Center Software contains an authentication bypass caused by improper system process creation at boot, letting unauthenticated remote attackers execute scripts and gain root access, exploit requires crafted HTTP requests.&lt;/p&gt;&lt;p&gt;Severity: critical · Category: http-cves · CVEs: CVE-2026-20079&lt;/p&gt;</description>
      <pubDate>Tue, 14 Apr 2026 20:00:31 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#CVE-2026-20079</guid>
    </item>
    <item>
      <title>Flowise Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/flowise-panel.yaml</link>
      <description>&lt;p&gt;Flowise panel was detected. Flowise is an open-source drag-and-drop LLM flow builderand AI agent platform. Exposed instances may reveal AI workflow configurations, API keys, and connected data sources.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Tue, 14 Apr 2026 20:00:31 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#flowise-panel</guid>
    </item>
    <item>
      <title>Easy Diffusion Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/easydiffusion-panel.yaml</link>
      <description>&lt;p&gt;Easy Diffusion (formerly Stable Diffusion UI) was detected. Easy Diffusion is a one-click, self-hosted Stable Diffusion web application focused on accessibility and ease of use for AI image generation. Exposed instances allow unauthenticated access to image generation capabilities and stored outputs.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Tue, 14 Apr 2026 20:00:31 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#easydiffusion-panel</guid>
    </item>
    <item>
      <title>ShowDoc Panel Detection (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/showdoc-panel.yaml</link>
      <description>&lt;p&gt;ShowDoc panel was detected. ShowDoc was a tool for documenting APIs and interfaces.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Tue, 14 Apr 2026 20:00:31 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#showdoc-panel</guid>
    </item>
    <item>
      <title>AnythingLLM Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/anythingllm-panel.yaml</link>
      <description>&lt;p&gt;Detects the AnythingLLM web interface.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Tue, 14 Apr 2026 20:00:31 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#anythingllm-panel</guid>
    </item>
    <item>
      <title>SuperAGI Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/superagi-panel.yaml</link>
      <description>&lt;p&gt;SuperAGI panel was detected. SuperAGI was an open-source autonomous AI agent platform that enables building, managing, and running AI agents. Exposed instances may allow unauthorized access to agent configurations and execution environments.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Tue, 14 Apr 2026 20:00:31 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#superagi-panel</guid>
    </item>
    <item>
      <title>AstrBot - Default Login (high)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/default-logins/astrbot-default-login.yaml</link>
      <description>&lt;p&gt;AstrBot contains a default login vulnerability. An attacker can access the AstrBot dashboard using default credentials and gain control over the chatbot framework, modify configurations, manage LLM providers, and execute unauthorized operations.&lt;/p&gt;&lt;p&gt;Severity: high · Category: http-default-logins&lt;/p&gt;</description>
      <pubDate>Tue, 14 Apr 2026 20:00:31 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#astrbot-default-login</guid>
    </item>
    <item>
      <title>AgentGPT Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/agentgpt-panel.yaml</link>
      <description>&lt;p&gt;AgentGPT was detected. AgentGPT was a browser-based autonomous AI agent platform that allows users to create, configure and deploy AI agents directly in the browser.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Tue, 14 Apr 2026 20:00:31 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#agentgpt-panel</guid>
    </item>
    <item>
      <title>SillyTavern Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/sillytavern-panel.yaml</link>
      <description>&lt;p&gt;SillyTavern was detected. SillyTavern is a character-based AI roleplay and chat frontend that connects to local or remote LLM backends. Exposed instances may allow unauthenticated access to AI models and conversation history.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Tue, 14 Apr 2026 20:00:31 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#sillytavern-panel</guid>
    </item>
    <item>
      <title>KoboldAI Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/koboldai-panel.yaml</link>
      <description>&lt;p&gt;KoboldAI was detected. KoboldAI was an AI text adventure and story generation interface that supports multiple local and remote language models including koboldcpp and AI Horde.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Tue, 14 Apr 2026 20:00:31 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#koboldai-panel</guid>
    </item>
    <item>
      <title>AstrBot WebUI Login Panel - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/astrbot-panel-detect.yaml</link>
      <description>&lt;p&gt;Astrbot WebUI login panel was detected.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Tue, 14 Apr 2026 20:00:31 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#astrbot-panel-detect</guid>
    </item>
    <item>
      <title>CVAT Computer Vision Annotation Tool - Detect (info)</title>
      <link>https://github.com/runZeroInc/nuclei-templates/blob/main/http/exposed-panels/cvat-panel.yaml</link>
      <description>&lt;p&gt;CVAT (Computer Vision Annotation Tool) was detected. CVAT is a widely used open-source annotation platform for labelling images, video, and 3D point clouds used to train AI/ML computer vision models.&lt;/p&gt;&lt;p&gt;Severity: info · Category: http-exposed-panels&lt;/p&gt;</description>
      <pubDate>Tue, 14 Apr 2026 20:00:31 +0000</pubDate>
      <guid>https://help.runzero.com/docs/em-templates/#cvat-panel</guid>
    </item>
  </channel>
</rss>