Vulnerabilities with Nuclei Scanner Templates

Updated 11m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,077 results Clear all
CVE-2018-15961 9.8 CRITICAL KEV 7 PoCs Analysis NUCLEI EPSS 0.94
Adobe Coldfusion - Unrestricted File Upload
Adobe ColdFusion versions July 12 release (2018.0.0.310739), Update 6 and earlier, and Update 14 and earlier have an unrestricted file upload vulnerability. Successful exploitation could lead to arbitrary code execution.
CWE-434 Sep 25, 2018
CVE-2018-16299 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.82
Localize MY Post - Path Traversal
The Localize My Post plugin 1.0 for WordPress allows Directory Traversal via the ajax/include.php file parameter.
CWE-22 Sep 24, 2018
CVE-2018-16283 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.77
Wechat Brodcast < 1.2.0 - Path Traversal
The Wechat Broadcast plugin 1.2.0 and earlier for WordPress allows Directory Traversal via the Image.php url parameter.
CWE-22 Sep 24, 2018
CVE-2018-17173 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.78
LG SuperSign CMS - RCE
LG SuperSign CMS allows remote attackers to execute arbitrary code via the sourceUri parameter to qsr_server/device/getThumbnail.
CWE-94 Sep 21, 2018
CVE-2018-17283 7.5 HIGH EXPLOITED NUCLEI EPSS 0.28
Zoho ManageEngine OpManager <12.3 Build 123196 - SQL Injection
Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Injection attack via the /api/json/device/setManaged name parameter.
CWE-89 Sep 21, 2018
CVE-2018-17254 9.8 CRITICAL EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.85
JCK Editor <6.4.4 - SQL Injection
The JCK Editor component 6.4.4 for Joomla! allows SQL Injection via the jtreelink/dialogs/links.php parent parameter.
CWE-89 Sep 20, 2018
CVE-2018-17207 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.91
Snap Creek Duplicator <1.2.42 - Code Injection
An issue was discovered in Snap Creek Duplicator before 1.2.42. By accessing leftover installer files (installer.php and installer-backup.php), an attacker can inject PHP code into wp-config.php during the database setup step, achieving arbitrary code execution.
CWE-94 Sep 19, 2018
CVE-2018-16671 5.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.42
CIRCONTROL CirCarLife <4.3 - Info Disclosure
An issue was discovered in CIRCONTROL CirCarLife before 4.3. There is system software information disclosure due to lack of authentication for /html/device-id.
CWE-200 Sep 18, 2018
CVE-2018-16670 5.3 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.46
CIRCONTROL CirCarLife <4.3 - Info Disclosure
An issue was discovered in CIRCONTROL CirCarLife before 4.3. There is PLC status disclosure due to lack of authentication for /html/devstat.html.
CWE-287 Sep 18, 2018
CVE-2018-16668 5.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.52
CIRCONTROL CirCarLife <4.3 - Info Disclosure
An issue was discovered in CIRCONTROL CirCarLife before 4.3. There is internal installation path disclosure due to the lack of authentication for /html/repository.
CWE-287 Sep 18, 2018
CVE-2018-17153 9.8 CRITICAL NUCLEI EPSS 0.92
Western Digital My Cloud <2.30.196 - Auth Bypass
It was discovered that the Western Digital My Cloud device before 2.30.196 is affected by an authentication bypass vulnerability. An unauthenticated attacker can exploit this vulnerability to authenticate as an admin user without needing to provide a password, thereby gaining full control of the device. (Whenever an admin logs into My Cloud, a server-side session is created that is bound to the user's IP address. After the session is created, it is possible to call authenticated CGI modules by sending the cookie username=admin in the HTTP request. The invoked CGI will check if a valid session is present and bound to the user's IP address.) It was found that it is possible for an unauthenticated attacker to create a valid session without a login. The network_mgr.cgi CGI module contains a command called "cgi_get_ipv6" that starts an admin session -- tied to the IP address of the user making the request -- if the additional parameter "flag" with the value "1" is provided. Subsequent invocation of commands that would normally require admin privileges now succeed if an attacker sets the username=admin cookie.
CWE-287 Sep 18, 2018
CVE-2018-17082 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.08
PHP <5.6.38, <7.0.32, <7.1.22, <7.2.10 - XSS
The Apache2 component in PHP before 5.6.38, 7.0.x before 7.0.32, 7.1.x before 7.1.22, and 7.2.x before 7.2.10 allows XSS via the body of a "Transfer-Encoding: chunked" request, because the bucket brigade is mishandled in the php_handler function in sapi/apache2handler/sapi_apache2.c.
CWE-79 Sep 16, 2018
CVE-2018-16288 8.6 HIGH 1 PoC Analysis NUCLEI EPSS 0.63
LG Supersign Cms - Information Disclosure
LG SuperSign CMS allows reading of arbitrary files via signEzUI/playlist/edit/upload/..%2f URIs.
CWE-200 Sep 14, 2018
CVE-2018-16979 6.1 MEDIUM NUCLEI EPSS 0.18
Monstra CMS V3.0.4 - HTTP Header Injection
Monstra CMS V3.0.4 allows HTTP header injection in the plugins/captcha/crypt/cryptographp.php cfg parameter, a related issue to CVE-2012-2943.
CWE-113 Sep 12, 2018
CVE-2018-16836 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.90
Rubedo <3.4.0 - Path Traversal
Rubedo through 3.4.0 contains a Directory Traversal vulnerability in the theme component, allowing unauthenticated attackers to read and execute arbitrary files outside of the service root path, as demonstrated by a /theme/default/img/%2e%2e/..//etc/passwd URI.
CWE-22 Sep 11, 2018
CVE-2018-16763 9.8 CRITICAL EXPLOITED 30 PoCs Analysis NUCLEI EPSS 0.94
FUEL CMS 1.4.1 - RCE
FUEL CMS 1.4.1 allows PHP Code Evaluation via the pages/select/ filter parameter or the preview/ data parameter. This can lead to Pre-Auth Remote Code Execution.
CWE-74 Sep 09, 2018
CVE-2018-16761 6.1 MEDIUM NUCLEI EPSS 0.01
Eventum <3.4.0 - Open Redirect
Eventum before 3.4.0 has an open redirect vulnerability.
CWE-601 Sep 09, 2018
CVE-2018-16363 5.4 MEDIUM NUCLEI EPSS 0.00
Filemanagerpro File Manager - XSS
The mndpsingh287 File Manager plugin V2.9 for WordPress has XSS via the lang parameter in a wp-admin/admin.php?page=wp_file_manager request because set_transient is used in file_folder_manager.php and there is an echo of lang in lib\wpfilemanager.php.
CWE-79 Sep 07, 2018
CVE-2018-16059 5.3 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.37
Endress Wirelesshart Fieldgate Swg70 Firmware - Path Traversal
Endress+Hauser WirelessHART Fieldgate SWG70 3.x devices allow Directory Traversal via the fcgi-bin/wgsetcgi filename parameter.
CWE-22 Sep 07, 2018
CVE-2018-1000671 6.1 MEDIUM NUCLEI EPSS 0.01
sympa >=6.2.16 - Open Redirect
sympa version 6.2.16 and later contains a CWE-601: URL Redirection to Untrusted Site ('Open Redirect') vulnerability in The "referer" parameter of the wwsympa.fcgi login action. that can result in Open redirection and reflected XSS via data URIs. This attack appear to be exploitable via Victim's browser must follow a URL supplied by the attacker. This vulnerability appears to have been fixed in none available.
CWE-601 Sep 06, 2018