Vulnerabilities with Nuclei Scanner Templates
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2018-16716
9.1
CRITICAL
1 Writeup
NUCLEI
EPSS 0.45
NCBI ToolBox <2.2.26 - Info Disclosure
A path traversal vulnerability exists in viewcgi.c in the 2.0.7 through 2.2.26 legacy versions of the NCBI ToolBox, which may result in reading of arbitrary files (i.e., significant information disclosure) or file deletion via the nph-viewgif.cgi query string.
CWE-22
May 02, 2019
CVE-2018-10383
6.1
MEDIUM
1 Writeup
NUCLEI
EPSS 0.02
Lantronix SecureLinx Spider <2.2 - XSS
Lantronix SecureLinx Spider (SLS) 2.2+ devices have XSS in the auth.asp login page.
CWE-79
May 02, 2019
CVE-2018-14931
6.1
MEDIUM
NUCLEI
EPSS 0.07
Polaris FT Intellect Core Banking <9.7.1 - Open Redirect
An issue was discovered in the Core and Portal modules in Polaris FT Intellect Core Banking 9.7.1. An open redirect exists via a /IntellectMain.jsp?IntellectSystem= URI.
CWE-601
Apr 30, 2019
CVE-2018-20526
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.86
Roxyfileman Roxy Fileman - Unrestricted File Upload
Roxy Fileman 1.4.5 allows unrestricted file upload in upload.php.
CWE-434
Mar 21, 2019
CVE-2018-19365
9.1
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.87
Wowza Streaming Engine 4.7.4.01 - Path Traversal
The REST API in Wowza Streaming Engine 4.7.4.01 allows traversal of the directory structure and retrieval of a file via a remote, specifically crafted HTTP request.
CWE-22
Mar 21, 2019
CVE-2018-19276
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.93
OpenMRS Java Deserialization RCE
OpenMRS before 2.24.0 is affected by an Insecure Object Deserialization vulnerability that allows an unauthenticated user to execute arbitrary commands on the targeted system via crafted XML data in a request body.
CWE-502
Mar 21, 2019
CVE-2018-10093
8.8
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.67
AudioCodes IP phone 420HD <2.2.12.126 - RCE
AudioCodes IP phone 420HD devices using firmware version 2.2.12.126 allow Remote Code Execution.
CWE-862
Mar 21, 2019
CVE-2018-17422
6.1
MEDIUM
NUCLEI
EPSS 0.11
dotCMS <5.0.2 - Open Redirect
dotCMS before 5.0.2 has open redirects via the html/common/forward_js.jsp FORWARD_URL parameter or the html/portlet/ext/common/page_preview_popup.jsp hostname parameter.
CWE-601
Mar 07, 2019
CVE-2018-18809
6.5
MEDIUM
KEV
NUCLEI
EPSS 0.94
Tibco Jasperreports Library < 6.4.21 - Path Traversal
The default server implementation of TIBCO Software Inc.'s TIBCO JasperReports Library, TIBCO JasperReports Library Community Edition, TIBCO JasperReports Library for ActiveMatrix BPM, TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, and TIBCO Jaspersoft Reporting and Analytics for AWS contains a directory-traversal vulnerability that may theoretically allow web server users to access contents of the host system. Affected releases are TIBCO Software Inc.'s TIBCO JasperReports Library: versions up to and including 6.3.4; 6.4.1; 6.4.2; 6.4.21; 7.1.0; 7.2.0, TIBCO JasperReports Library Community Edition: versions up to and including 6.7.0, TIBCO JasperReports Library for ActiveMatrix BPM: versions up to and including 6.4.21, TIBCO JasperReports Server: versions up to and including 6.3.4; 6.4.0; 6.4.1; 6.4.2; 6.4.3; 7.1.0, TIBCO JasperReports Server Community Edition: versions up to and including 6.4.3; 7.1.0, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.3, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 7.1.0, TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 7.1.0.
CWE-22
Mar 07, 2019
CVE-2018-15517
8.6
HIGH
EXPLOITED
NUCLEI
EPSS 0.77
Dlink Central Wifimanager - SSRF
The MailConnect feature on D-Link Central WiFiManager CWM-100 1.03 r0098 devices is intended to check a connection to an SMTP server but actually allows outbound TCP to any port on any IP address, leading to SSRF, as demonstrated by an index.php/System/MailConnect/host/127.0.0.1/port/22/secure/ URI.
CWE-918
Jan 31, 2019
CVE-2018-17431
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.92
Comodo UTM Firewall <2.7.0 - RCE
Web Console in Comodo UTM Firewall before 2.7.0 allows remote attackers to execute arbitrary code without authentication via a crafted URL.
CWE-287
Jan 30, 2019
CVE-2018-16167
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.87
Jpcert Logontracer < 1.2.0 - OS Command Injection
LogonTracer 1.2.0 and earlier allows remote attackers to execute arbitrary OS commands via unspecified vectors.
CWE-78
Jan 09, 2019
CVE-2018-18264
7.5
HIGH
NUCLEI
EPSS 0.91
Kubernetes Dashboard < 1.10.1 - Missing Authentication
Kubernetes Dashboard before 1.10.1 allows attackers to bypass authentication and use Dashboard's Service Account for reading secrets within the cluster.
CWE-306
Jan 03, 2019
CVE-2018-20608
7.5
HIGH
NUCLEI
EPSS 0.64
Txjia Imcat - Information Disclosure
imcat 4.4 allows remote attackers to read phpinfo output via the root/tools/adbug/binfo.php?phpinfo1 URI.
CWE-200
Dec 30, 2018
CVE-2018-20463
7.5
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.85
Jsmol2wp - Path Traversal
An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF.
CWE-22
Dec 25, 2018
CVE-2018-20462
6.1
MEDIUM
NUCLEI
EPSS 0.05
Jsmol2wp - XSS
An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. A cross-site scripting (XSS) vulnerability allows remote attackers to inject arbitrary web script or HTML via the jsmol.php data parameter.
CWE-79
Dec 25, 2018
CVE-2018-17246
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Kibana <6.4.3, 5.6.13 - Code Injection
Kibana versions before 6.4.3 and 5.6.13 contain an arbitrary file inclusion flaw in the Console plugin. An attacker with access to the Kibana Console API could send a request that will attempt to execute javascript code. This could possibly lead to an attacker executing arbitrary commands with permissions of the Kibana process on the host system.
CWE-829
Dec 20, 2018
CVE-2018-1000856
4.8
MEDIUM
NUCLEI
EPSS 0.01
DomainMOD >=4.09.03 - XSS
DomainMOD version 4.09.03 and above. Also verified in the latest version 4.11.01 contains a Cross Site Scripting (XSS) vulnerability in Segment Name field in the segments page that can result in Arbitrary script can be executed on all users browsers who visit the affected page. This attack appear to be exploitable via Victim must visit the vulnerable page. This vulnerability appears to have been fixed in No fix yet.
CWE-79
Dec 20, 2018
CVE-2018-19439
6.1
MEDIUM
NUCLEI
EPSS 0.39
Oracle Secure Global Desktop <5.4 - XSS
XSS exists in the Administration Console in Oracle Secure Global Desktop 4.4 20080807152602 (but was fixed in later versions including 5.4). helpwindow.jsp has reflected XSS via all parameters, as demonstrated by the sgdadmin/faces/com_sun_web_ui/help/helpwindow.jsp windowTitle parameter.
CWE-79
Dec 13, 2018
CVE-2018-8033
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.92
Apache OFBiz 16.11.01-16.11.04 - Info Disclosure
In Apache OFBiz 16.11.01 to 16.11.04, the OFBiz HTTP engine (org.apache.ofbiz.service.engine.HttpEngine.java) handles requests for HTTP services via the /webtools/control/httpService endpoint. Both POST and GET requests to the httpService endpoint may contain three parameters: serviceName, serviceMode, and serviceContext. The exploitation occurs by having DOCTYPEs pointing to external references that trigger a payload that returns secret information from the host.
CWE-200
Dec 13, 2018