Vulnerabilities with Nuclei Scanner Templates

Updated 9m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,727 CVEs tracked 53,701 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,078 Nuclei templates 52,396 vendors 43,936 researchers
4,078 results Clear all
CVE-2022-23348 5.3 MEDIUM 1 Writeup NUCLEI EPSS 0.01
BigAnt Server <5.6.06 - Info Disclosure
BigAnt Software BigAnt Server v5.6.06 was discovered to utilize weak password hashes.
CWE-916 Mar 21, 2022
CVE-2022-23347 7.5 HIGH EXPLOITED 1 Writeup NUCLEI EPSS 0.72
Bigantsoft Bigant Server - Path Traversal
BigAnt Software BigAnt Server v5.6.06 was discovered to be vulnerable to directory traversal attacks.
CWE-22 Mar 21, 2022
CVE-2022-26960 9.1 CRITICAL 1 Writeup NUCLEI EPSS 0.84
std42 elFinder <2.1.60 - Path Traversal
connector.minimal.php in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
CWE-22 Mar 21, 2022
CVE-2022-25481 7.5 HIGH SSVC PoC 1 Writeup NUCLEI EPSS 0.10
Thinkphp - Improper Access Control
ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php. NOTE: this is disputed by a third party because system environment exposure is an intended feature of the debugging mode.
CWE-284 Mar 21, 2022
CVE-2022-24637 9.8 CRITICAL 9 PoCs Analysis NUCLEI EPSS 0.94
Open Web Analytics <1.7.4 - Info Disclosure
Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter.
CWE-269 Mar 18, 2022
CVE-2022-25497 5.3 MEDIUM NUCLEI EPSS 0.07
CuppaCMS v1.0 - Path Traversal
CuppaCMS v1.0 was discovered to contain an arbitrary file read via the copy function.
CWE-552 Mar 15, 2022
CVE-2022-25489 5.4 MEDIUM NUCLEI EPSS 0.05
Thedigitalcraft Atomcms - XSS
Atom CMS v2.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the "A" parameter in /widgets/debug.php.
CWE-79 Mar 15, 2022
CVE-2022-25488 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.73
Thedigitalcraft Atomcms - SQL Injection
Atom CMS v2.0 was discovered to contain a SQL injection vulnerability via the id parameter in /admin/ajax/avatar.php.
CWE-89 Mar 15, 2022
CVE-2022-25487 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.85
Thedigitalcraft Atomcms - Unrestricted File Upload
Atom CMS v2.0 was discovered to contain a remote code execution (RCE) vulnerability via /admin/uploads.php.
CWE-434 Mar 15, 2022
CVE-2022-25486 7.8 HIGH EXPLOITED NUCLEI EPSS 0.69
CuppaCMS v1.0 - Local File Inclusion
CuppaCMS v1.0 was discovered to contain a local file inclusion via the url parameter in /alerts/alertConfigField.php.
CWE-829 Mar 15, 2022
CVE-2022-25485 7.8 HIGH EXPLOITED NUCLEI EPSS 0.38
CuppaCMS v1.0 - Local File Inclusion
CuppaCMS v1.0 was discovered to contain a local file inclusion via the url parameter in /alerts/alertLightbox.php.
CWE-829 Mar 15, 2022
CVE-2022-24384 8.8 HIGH NUCLEI EPSS 0.48
SmarterTools SmarterTrack <100.0.8019.14010 - XSS
Cross-site Scripting (XSS) vulnerability in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.
CWE-79 Mar 14, 2022
CVE-2022-25216 7.5 HIGH NUCLEI EPSS 0.77
Dvdfab 12 Player < 6.2.11 - Path Traversal
An absolute path traversal vulnerability allows a remote attacker to download any file on the Windows file system for which the user account running DVDFab 12 Player (recently renamed PlayerFab) has read-access, by means of an HTTP GET request to http://<IP_ADDRESS>:32080/download/<URL_ENCODED_PATH>.
CWE-22 Mar 11, 2022
CVE-2022-26143 9.8 CRITICAL KEV SSVC ACTIVE NUCLEI EPSS 0.89
Mitel MiCollab - Information Disclosure & Denial of Service
The TP-240 (aka tp240dvr) component in Mitel MiCollab before 9.4 SP1 FP1 and MiVoice Business Express through 8.1 allows remote attackers to obtain sensitive information and cause a denial of service (performance degradation and excessive outbound traffic). This was exploited in the wild in February and March 2022 for the TP240PhoneHome DDoS attack.
CWE-306 Mar 10, 2022
CVE-2022-24716 7.5 HIGH EXPLOITED 10 PoCs Analysis NUCLEI EPSS 0.93
Icinga Web 2 <2.9.5 - Info Disclosure
Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.
CWE-22 Mar 08, 2022
CVE-2022-23397 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.02
Cedargate Ez-net Portal - XSS
The Cedar Gate EZ-NET portal 6.5.5 6.8.0 Internet portal has a call to display messages to users which does not properly sanitize data sent in through a URL parameter. This leads to a Reflected Cross-Site Scripting vulnerability. NOTE: the vendor disputes this because the ado.im reference has "no clear steps of reproduction."
CWE-79 Mar 04, 2022
CVE-2022-25125 9.8 CRITICAL 1 PoC NUCLEI EPSS 0.79
Mingsoft Mcms - SQL Injection
MCMS v5.2.4 was discovered to contain a SQL injection vulnerability via search.do in the file /mdiy/dict/listExcludeApp.
CWE-89 Mar 03, 2022
CVE-2022-23898 9.8 CRITICAL NUCLEI EPSS 0.79
MCMS v5.2.5 - SQL Injection
MCMS v5.2.5 was discovered to contain a SQL injection vulnerability via the categoryId parameter in the file IContentDao.xml.
CWE-89 Mar 03, 2022
CVE-2022-23779 5.3 MEDIUM 3 PoCs Analysis NUCLEI EPSS 0.79
Zohocorp Manageengine Desktop Central - Information Disclosure
Zoho ManageEngine Desktop Central before 10.1.2137.8 exposes the installed server name to anyone. The internal hostname can be discovered by reading HTTP redirect responses.
CWE-200 Mar 02, 2022
CVE-2022-26159 5.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.87
Ametys CMS <4.5.0 - Info Disclosure
The auto-completion plugin in Ametys CMS before 4.5.0 allows a remote unauthenticated attacker to read documents such as plugins/web/service/search/auto-completion/<domain>/en.xml (and similar pathnames for other languages), which contain all characters typed by all users, including the content of private pages. For example, a private page may contain usernames, e-mail addresses, and possibly passwords.
CWE-425 Feb 28, 2022