Vulnerabilities with Nuclei Scanner Templates
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2018-12998
6.1
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.54
Zohocorp Firewall Analyzer - XSS
A reflected Cross-site scripting (XSS) vulnerability in Zoho ManageEngine Netflow Analyzer before build 123137, Network Configuration Manager before build 123128, OpManager before build 123148, OpUtils before build 123161, and Firewall Analyzer before build 123147 allows remote attackers to inject arbitrary web script or HTML via the parameter 'operation' to /servlet/com.adventnet.me.opmanager.servlet.FailOverHelperServlet.
CWE-79
Jun 29, 2018
CVE-2018-12909
7.5
HIGH
NUCLEI
EPSS 0.90
Webgrind - Path Traversal
Webgrind 1.5 relies on user input to display a file, which lets anyone view files from the local filesystem (that the webserver user has access to) via an index.php?op=fileviewer&file= URI. NOTE: the vendor indicates that the product is not intended for a "publicly accessible environment.
CWE-22
Jun 27, 2018
CVE-2018-3760
7.5
HIGH
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Redhat Cloudforms < 2.12.4 - Information Disclosure
There is an information leak vulnerability in Sprockets. Versions Affected: 4.0.0.beta7 and lower, 3.7.1 and lower, 2.12.4 and lower. Specially crafted requests can be used to access files that exists on the filesystem that is outside an application's root directory, when the Sprockets server is used in production. All users running an affected release should either upgrade or use one of the work arounds immediately.
CWE-22
Jun 26, 2018
CVE-2018-1000600
8.8
HIGH
EXPLOITED
NUCLEI
EPSS 0.94
Jenkins GitHub Plugin <1.29.1 - Info Disclosure
A exposure of sensitive information vulnerability exists in Jenkins GitHub Plugin 1.29.1 and earlier in GitHubTokenCredentialsCreator.java that allows attackers to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
CWE-200
Jun 26, 2018
CVE-2018-1000533
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.92
klaussilveira GitList <=0.6 - RCE
klaussilveira GitList version <= 0.6 contains a Passing incorrectly sanitized input to system function vulnerability in `searchTree` function that can result in Execute any code as PHP user. This attack appear to be exploitable via Send POST request using search form. This vulnerability appears to have been fixed in 0.7 after commit 87b8c26b023c3fc37f0796b14bb13710f397b322.
CWE-20
Jun 26, 2018
CVE-2018-10956
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.92
Ipconfigure Orchid Core Vms - Path Traversal
IPConfigure Orchid Core VMS 2.0.5 allows Directory Traversal.
CWE-22
Jun 25, 2018
CVE-2018-12634
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.92
CirCarLife Scada <4.3 - Info Disclosure
CirCarLife Scada before 4.3 allows remote attackers to obtain sensitive information via a direct request for the html/log or services/system/info.html URI.
CWE-200
Jun 22, 2018
CVE-2018-12613
8.8
HIGH
EXPLOITED
9 PoCs
Analysis
NUCLEI
EPSS 0.94
phpMyAdmin 4.8.x <4.8.2 - Code Injection
An issue was discovered in phpMyAdmin 4.8.x before 4.8.2, in which an attacker can include (view and potentially execute) files on the server. The vulnerability comes from a portion of code where pages are redirected and loaded within phpMyAdmin, and an improper test for whitelisted pages. An attacker must be authenticated, except in the "$cfg['AllowArbitraryServer'] = true" case (where an attacker can specify any host he/she is already in control of, and execute arbitrary code on phpMyAdmin) and the "$cfg['ServerDefault'] = 0" case (which bypasses the login requirement and runs the vulnerable code without any authentication).
CWE-287
Jun 21, 2018
CVE-2018-8727
7.5
HIGH
NUCLEI
EPSS 0.52
Mirasys DVMS Workstation <5.12.6 - Path Traversal
Path Traversal in Gateway in Mirasys DVMS Workstation 5.12.6 and earlier allows an attacker to traverse the file system to access files or directories via the Web Client webserver.
CWE-22
Jun 19, 2018
CVE-2018-11222
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.03
Artica Pandora Fms < 7.23 - Improper Input Validation
Local File Inclusion (LFI) in Artica Pandora FMS through version 7.23 allows an attacker to call any php file via the /pandora_console/ajax.php ajax endpoint.
CWE-20
Jun 16, 2018
CVE-2018-6961
8.1
HIGH
KEV
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Vmware Nsx Sd-wan BY Velocloud < 3.1.0 - OS Command Injection
VMware NSX SD-WAN Edge by VeloCloud prior to version 3.1.0 contains a command injection vulnerability in the local web UI component. This component is disabled by default and should not be enabled on untrusted networks. VeloCloud by VMware will be removing this service from the product in future releases. Successful exploitation of this issue could result in remote code execution.
CWE-78
Jun 11, 2018
CVE-2018-12095
5.4
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.13
OEcms v3.1 - XSS
A Reflected Cross-Site Scripting web vulnerability has been discovered in the OEcms v3.1 web-application. The vulnerability is located in the mod parameter of info.php.
CWE-79
Jun 11, 2018
CVE-2018-11409
5.3
MEDIUM
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Splunk < 7.0.1 - Information Disclosure
Splunk through 7.0.1 allows information disclosure by appending __raw/services/server/info/server-info?output_mode=json to a query, as demonstrated by discovering a license key.
CWE-200
Jun 08, 2018
CVE-2018-10088
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.89
XiongMai uc-httpd 1.0.0 - Buffer Overflow
Buffer overflow in XiongMai uc-httpd 1.0.0 has unspecified impact and attack vectors, a different vulnerability than CVE-2017-16725.
CWE-119
Jun 08, 2018
CVE-2018-12054
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.86
PHP Scripts Mall Schools Alert Mgt - Path Traversal
Arbitrary File Read exists in PHP Scripts Mall Schools Alert Management Script via the f parameter in img.php, aka absolute path traversal.
CWE-22
Jun 08, 2018
CVE-2018-12031
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.75
Eaton Intelligent Power Manager <1.6 - Path Traversal
Local file inclusion in Eaton Intelligent Power Manager v1.6 allows an attacker to include a file via server/node_upgrade_srv.js directory traversal with the firmware parameter in a downloadFirmware action.
CWE-22
Jun 07, 2018
CVE-2018-0296
7.5
HIGH
KEV
8 PoCs
Analysis
NUCLEI
EPSS 0.94
Cisco Adaptive Security Appliance Software < 9.1.7.29 - Path Traversal
A vulnerability in the web interface of the Cisco Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. It is also possible on certain software releases that the ASA will not reload, but an attacker could view sensitive system information without authentication by using directory traversal techniques. The vulnerability is due to lack of proper input validation of the HTTP URL. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. An exploit could allow the attacker to cause a DoS condition or unauthenticated disclosure of information. This vulnerability applies to IPv4 and IPv6 HTTP traffic. This vulnerability affects Cisco ASA Software and Cisco Firepower Threat Defense (FTD) Software that is running on the following Cisco products: 3000 Series Industrial Security Appliance (ISA), ASA 1000V Cloud Firewall, ASA 5500 Series Adaptive Security Appliances, ASA 5500-X Series Next-Generation Firewalls, ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, Adaptive Security Virtual Appliance (ASAv), Firepower 2100 Series Security Appliance, Firepower 4100 Series Security Appliance, Firepower 9300 ASA Security Module, FTD Virtual (FTDv). Cisco Bug IDs: CSCvi16029.
CWE-22
Jun 07, 2018
CVE-2018-3714
6.5
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.73
Node-srv < 2.1.1 - Path Traversal
node-srv node module suffers from a Path Traversal vulnerability due to lack of validation of url, which allows a malicious user to read content of any file with known path.
CWE-22
Jun 07, 2018
CVE-2018-11709
6.1
MEDIUM
NUCLEI
EPSS 0.04
Gvectors Wpforo Forum < 1.4.12 - XSS
wpforo_get_request_uri in wpf-includes/functions.php in the wpForo Forum plugin before 1.4.12 for WordPress allows Unauthenticated Reflected Cross-Site Scripting (XSS) via the URI.
CWE-79
Jun 04, 2018
CVE-2018-11138
9.8
CRITICAL
KEV
RANSOMWARE
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Quest Kace System Management Appliance - OS Command Injection
The '/common/download_agent_installer.php' script in the Quest KACE System Management Appliance 8.0.318 is accessible by anonymous users and can be abused to execute arbitrary commands on the system.
CWE-78
May 31, 2018