Vulnerabilities with Nuclei Scanner Templates
Updated 9m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,078 results
Clear all
CVE-2022-23348
5.3
MEDIUM
1 Writeup
NUCLEI
EPSS 0.01
BigAnt Server <5.6.06 - Info Disclosure
BigAnt Software BigAnt Server v5.6.06 was discovered to utilize weak password hashes.
CWE-916
Mar 21, 2022
CVE-2022-23347
7.5
HIGH
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.72
Bigantsoft Bigant Server - Path Traversal
BigAnt Software BigAnt Server v5.6.06 was discovered to be vulnerable to directory traversal attacks.
CWE-22
Mar 21, 2022
CVE-2022-26960
9.1
CRITICAL
1 Writeup
NUCLEI
EPSS 0.84
std42 elFinder <2.1.60 - Path Traversal
connector.minimal.php in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
CWE-22
Mar 21, 2022
CVE-2022-25481
7.5
HIGH
SSVC PoC
1 Writeup
NUCLEI
EPSS 0.10
Thinkphp - Improper Access Control
ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php. NOTE: this is disputed by a third party because system environment exposure is an intended feature of the debugging mode.
CWE-284
Mar 21, 2022
CVE-2022-24637
9.8
CRITICAL
9 PoCs
Analysis
NUCLEI
EPSS 0.94
Open Web Analytics <1.7.4 - Info Disclosure
Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter.
CWE-269
Mar 18, 2022
CVE-2022-25497
5.3
MEDIUM
NUCLEI
EPSS 0.07
CuppaCMS v1.0 - Path Traversal
CuppaCMS v1.0 was discovered to contain an arbitrary file read via the copy function.
CWE-552
Mar 15, 2022
CVE-2022-25489
5.4
MEDIUM
NUCLEI
EPSS 0.05
Thedigitalcraft Atomcms - XSS
Atom CMS v2.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the "A" parameter in /widgets/debug.php.
CWE-79
Mar 15, 2022
CVE-2022-25488
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.73
Thedigitalcraft Atomcms - SQL Injection
Atom CMS v2.0 was discovered to contain a SQL injection vulnerability via the id parameter in /admin/ajax/avatar.php.
CWE-89
Mar 15, 2022
CVE-2022-25487
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.85
Thedigitalcraft Atomcms - Unrestricted File Upload
Atom CMS v2.0 was discovered to contain a remote code execution (RCE) vulnerability via /admin/uploads.php.
CWE-434
Mar 15, 2022
CVE-2022-25486
7.8
HIGH
EXPLOITED
NUCLEI
EPSS 0.69
CuppaCMS v1.0 - Local File Inclusion
CuppaCMS v1.0 was discovered to contain a local file inclusion via the url parameter in /alerts/alertConfigField.php.
CWE-829
Mar 15, 2022
CVE-2022-25485
7.8
HIGH
EXPLOITED
NUCLEI
EPSS 0.38
CuppaCMS v1.0 - Local File Inclusion
CuppaCMS v1.0 was discovered to contain a local file inclusion via the url parameter in /alerts/alertLightbox.php.
CWE-829
Mar 15, 2022
CVE-2022-24384
8.8
HIGH
NUCLEI
EPSS 0.48
SmarterTools SmarterTrack <100.0.8019.14010 - XSS
Cross-site Scripting (XSS) vulnerability in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010.
CWE-79
Mar 14, 2022
CVE-2022-25216
7.5
HIGH
NUCLEI
EPSS 0.77
Dvdfab 12 Player < 6.2.11 - Path Traversal
An absolute path traversal vulnerability allows a remote attacker to download any file on the Windows file system for which the user account running DVDFab 12 Player (recently renamed PlayerFab) has read-access, by means of an HTTP GET request to http://<IP_ADDRESS>:32080/download/<URL_ENCODED_PATH>.
CWE-22
Mar 11, 2022
CVE-2022-26143
9.8
CRITICAL
KEV
SSVC ACTIVE
NUCLEI
EPSS 0.89
Mitel MiCollab - Information Disclosure & Denial of Service
The TP-240 (aka tp240dvr) component in Mitel MiCollab before 9.4 SP1 FP1 and MiVoice Business Express through 8.1 allows remote attackers to obtain sensitive information and cause a denial of service (performance degradation and excessive outbound traffic). This was exploited in the wild in February and March 2022 for the TP240PhoneHome DDoS attack.
CWE-306
Mar 10, 2022
CVE-2022-24716
7.5
HIGH
EXPLOITED
10 PoCs
Analysis
NUCLEI
EPSS 0.93
Icinga Web 2 <2.9.5 - Info Disclosure
Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.
CWE-22
Mar 08, 2022
CVE-2022-23397
6.1
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.02
Cedargate Ez-net Portal - XSS
The Cedar Gate EZ-NET portal 6.5.5 6.8.0 Internet portal has a call to display messages to users which does not properly sanitize data sent in through a URL parameter. This leads to a Reflected Cross-Site Scripting vulnerability. NOTE: the vendor disputes this because the ado.im reference has "no clear steps of reproduction."
CWE-79
Mar 04, 2022
CVE-2022-25125
9.8
CRITICAL
1 PoC
NUCLEI
EPSS 0.79
Mingsoft Mcms - SQL Injection
MCMS v5.2.4 was discovered to contain a SQL injection vulnerability via search.do in the file /mdiy/dict/listExcludeApp.
CWE-89
Mar 03, 2022
CVE-2022-23898
9.8
CRITICAL
NUCLEI
EPSS 0.79
MCMS v5.2.5 - SQL Injection
MCMS v5.2.5 was discovered to contain a SQL injection vulnerability via the categoryId parameter in the file IContentDao.xml.
CWE-89
Mar 03, 2022
CVE-2022-23779
5.3
MEDIUM
3 PoCs
Analysis
NUCLEI
EPSS 0.79
Zohocorp Manageengine Desktop Central - Information Disclosure
Zoho ManageEngine Desktop Central before 10.1.2137.8 exposes the installed server name to anyone. The internal hostname can be discovered by reading HTTP redirect responses.
CWE-200
Mar 02, 2022
CVE-2022-26159
5.3
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.87
Ametys CMS <4.5.0 - Info Disclosure
The auto-completion plugin in Ametys CMS before 4.5.0 allows a remote unauthenticated attacker to read documents such as plugins/web/service/search/auto-completion/<domain>/en.xml (and similar pathnames for other languages), which contain all characters typed by all users, including the content of private pages. For example, a private page may contain usernames, e-mail addresses, and possibly passwords.
CWE-425
Feb 28, 2022