Vulnerabilities with Nuclei Scanner Templates

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,077 results Clear all
CVE-2018-16716 9.1 CRITICAL 1 Writeup NUCLEI EPSS 0.45
NCBI ToolBox <2.2.26 - Info Disclosure
A path traversal vulnerability exists in viewcgi.c in the 2.0.7 through 2.2.26 legacy versions of the NCBI ToolBox, which may result in reading of arbitrary files (i.e., significant information disclosure) or file deletion via the nph-viewgif.cgi query string.
CWE-22 May 02, 2019
CVE-2018-10383 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.02
Lantronix SecureLinx Spider <2.2 - XSS
Lantronix SecureLinx Spider (SLS) 2.2+ devices have XSS in the auth.asp login page.
CWE-79 May 02, 2019
CVE-2018-14931 6.1 MEDIUM NUCLEI EPSS 0.07
Polaris FT Intellect Core Banking <9.7.1 - Open Redirect
An issue was discovered in the Core and Portal modules in Polaris FT Intellect Core Banking 9.7.1. An open redirect exists via a /IntellectMain.jsp?IntellectSystem= URI.
CWE-601 Apr 30, 2019
CVE-2018-20526 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.86
Roxyfileman Roxy Fileman - Unrestricted File Upload
Roxy Fileman 1.4.5 allows unrestricted file upload in upload.php.
CWE-434 Mar 21, 2019
CVE-2018-19365 9.1 CRITICAL EXPLOITED NUCLEI EPSS 0.87
Wowza Streaming Engine 4.7.4.01 - Path Traversal
The REST API in Wowza Streaming Engine 4.7.4.01 allows traversal of the directory structure and retrieval of a file via a remote, specifically crafted HTTP request.
CWE-22 Mar 21, 2019
CVE-2018-19276 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.93
OpenMRS Java Deserialization RCE
OpenMRS before 2.24.0 is affected by an Insecure Object Deserialization vulnerability that allows an unauthenticated user to execute arbitrary commands on the targeted system via crafted XML data in a request body.
CWE-502 Mar 21, 2019
CVE-2018-10093 8.8 HIGH 1 PoC Analysis NUCLEI EPSS 0.67
AudioCodes IP phone 420HD <2.2.12.126 - RCE
AudioCodes IP phone 420HD devices using firmware version 2.2.12.126 allow Remote Code Execution.
CWE-862 Mar 21, 2019
CVE-2018-17422 6.1 MEDIUM NUCLEI EPSS 0.11
dotCMS <5.0.2 - Open Redirect
dotCMS before 5.0.2 has open redirects via the html/common/forward_js.jsp FORWARD_URL parameter or the html/portlet/ext/common/page_preview_popup.jsp hostname parameter.
CWE-601 Mar 07, 2019
CVE-2018-18809 6.5 MEDIUM KEV NUCLEI EPSS 0.94
Tibco Jasperreports Library < 6.4.21 - Path Traversal
The default server implementation of TIBCO Software Inc.'s TIBCO JasperReports Library, TIBCO JasperReports Library Community Edition, TIBCO JasperReports Library for ActiveMatrix BPM, TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a directory-traversal vulnerability that may theoretically allow web server users to access contents of the host system. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Library: versions up to and including 6.3.4; 6.4.1; 6.4.2; 6.4.21; 7.1.0; 7.2.0, TIBCO JasperReports Library Community Edition: versions up to and including 6.7.0, TIBCO JasperReports Library for ActiveMatrix BPM: versions up to and including 6.4.21, TIBCO JasperReports Server: versions up to and including 6.3.4; 6.4.0; 6.4.1; 6.4.2; 6.4.3; 7.1.0, TIBCO JasperReports Server Community Edition: versions up to and including 6.4.3; 7.1.0, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.3, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 7.1.0, TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 7.1.0.
CWE-22 Mar 07, 2019
CVE-2018-15517 8.6 HIGH EXPLOITED NUCLEI EPSS 0.77
Dlink Central Wifimanager - SSRF
The MailConnect feature on D-Link Central WiFiManager CWM-100 1.03 r0098 devices is intended to check a connection to an SMTP server but actually allows outbound TCP to any port on any IP address, leading to SSRF, as demonstrated by an index.php/System/MailConnect/host/127.0.0.1/port/22/secure/ URI.
CWE-918 Jan 31, 2019
CVE-2018-17431 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.92
Comodo UTM Firewall <2.7.0 - RCE
Web Console in Comodo UTM Firewall before 2.7.0 allows remote attackers to execute arbitrary code without authentication via a crafted URL.
CWE-287 Jan 30, 2019
CVE-2018-16167 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.87
Jpcert Logontracer < 1.2.0 - OS Command Injection
LogonTracer 1.2.0 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors.
CWE-78 Jan 09, 2019
CVE-2018-18264 7.5 HIGH NUCLEI EPSS 0.91
Kubernetes Dashboard < 1.10.1 - Missing Authentication
Kubernetes Dashboard before 1.10.1 allows attackers to bypass authentication and use Dashboard's Service Account for reading secrets within the cluster.
CWE-306 Jan 03, 2019
CVE-2018-20608 7.5 HIGH NUCLEI EPSS 0.64
Txjia Imcat - Information Disclosure
imcat 4.4 allows remote attackers to read phpinfo output via the root/tools/adbug/binfo.php?phpinfo1 URI.
CWE-200 Dec 30, 2018
CVE-2018-20463 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.85
Jsmol2wp - Path Traversal
An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF.
CWE-22 Dec 25, 2018
CVE-2018-20462 6.1 MEDIUM NUCLEI EPSS 0.05
Jsmol2wp - XSS
An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via the jsmol.php data parameter.
CWE-79 Dec 25, 2018
CVE-2018-17246 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Kibana <6.4.3, 5.6.13 - Code Injection
Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
CWE-829 Dec 20, 2018
CVE-2018-1000856 4.8 MEDIUM NUCLEI EPSS 0.01
DomainMOD >=4.09.03 - XSS
DomainMOD version 4.09.03 and above. Also verified in the latest version 4.11.01 contains a Cross Site Scripting (XSS) vulnerability in Segment Name field in the segments page that can result in Arbitrary script can be executed on all users browsers who visit the affected page. This attack appear to be exploitable via Victim must visit the vulnerable page. This vulnerability appears to have been fixed in No fix yet.
CWE-79 Dec 20, 2018
CVE-2018-19439 6.1 MEDIUM NUCLEI EPSS 0.39
Oracle Secure Global Desktop <5.4 - XSS
XSS exists in the Administration Console in Oracle Secure Global Desktop 4.4 20080807152602 (but was fixed in later versions including 5.4). helpwindow.jsp has reflected XSS via all parameters, as demonstrated by the sgdadmin/faces/com_sun_web_ui/help/helpwindow.jsp windowTitle parameter.
CWE-79 Dec 13, 2018
CVE-2018-8033 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.92
Apache OFBiz 16.11.01-16.11.04 - Info Disclosure
In Apache OFBiz 16.11.01 to 16.11.04, the OFBiz HTTP engine (org.apache.ofbiz.service.engine.HttpEngine.java) handles requests for HTTP services via the /webtools/control/httpService endpoint. Both POST and GET requests to the httpService endpoint may contain three parameters: serviceName, serviceMode, and serviceContext. The exploitation occurs by having DOCTYPEs pointing to external references that trigger a payload that returns secret information from the host.
CWE-200 Dec 13, 2018