Vulnerabilities with Nuclei Scanner Templates

Updated 54m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,402 CVEs tracked 53,629 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,301 vendors 43,863 researchers
4,077 results Clear all
CVE-2018-6530 9.8 CRITICAL KEV RANSOMWARE NUCLEI EPSS 0.94
Dlink Dir-860l Firmware < 1.10b04 - OS Command Injection
OS command injection vulnerability in soap.cgi (soapcgi_main in cgibin) in D-Link DIR-880L DIR-880L_REVA_FIRMWARE_PATCH_1.08B04 and previous versions, DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-65L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to execute arbitrary OS commands via the service parameter.
CWE-78 Mar 06, 2018
CVE-2018-7662 5.3 MEDIUM NUCLEI EPSS 0.90
Couch < 2.0 - Information Disclosure
Couch through 2.0 allows remote attackers to discover the full path via a direct request to includes/mysql2i/mysql2i.func.php or addons/phpmailer/phpmailer.php.
CWE-200 Mar 04, 2018
CVE-2018-7653 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.01
Yzmcms - XSS
In YzmCMS 3.6, index.php has XSS via the a, c, or m parameter.
CWE-79 Mar 04, 2018
CVE-2018-7467 7.5 HIGH NUCLEI EPSS 0.30
Axxonsoft Next - Path Traversal
AxxonSoft Axxon Next has Directory Traversal via an initial /css//..%2f substring in a URI.
CWE-22 Feb 27, 2018
CVE-2018-7490 7.5 HIGH 2 PoCs Analysis NUCLEI EPSS 0.93
Unbit Uwsgi < 2.0.17 - Path Traversal
uWSGI before 2.0.17 mishandles a DOCUMENT_ROOT check during use of the --php-docroot option, allowing directory traversal.
CWE-22 Feb 26, 2018
CVE-2018-7314 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Mlwebtechnologies Prayercenter - SQL Injection
SQL Injection exists in the PrayerCenter 3.0.2 component for Joomla! via the sessionid parameter, a different vulnerability than CVE-2008-6429.
CWE-89 Feb 22, 2018
CVE-2018-7251 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.91
Anchor < 0.12.7 - Information Disclosure
An issue was discovered in config/error.php in Anchor 0.12.3. The error log is exposed at an errors.log URI, and contains MySQL credentials if a MySQL error (such as "Too many connections") has occurred.
CWE-200 Feb 19, 2018
CVE-2018-2392 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.86
SAP Internet Graphics Server (IGS) XMLCHART XXE
Under certain conditions SAP Internet Graphics Server (IGS) 7.20, 7.20EXT, 7.45, 7.49, 7.53, fails to validate XML External Entity appropriately causing the SAP Internet Graphics Server (IGS) to become unavailable.
CWE-611 Feb 14, 2018
CVE-2018-6910 7.5 HIGH NUCLEI EPSS 0.91
Dedecms - Exposure to Wrong Actor
DedeCMS 5.7 allows remote attackers to discover the full path via a direct request for include/downmix.inc.php or inc/inc_archives_functions.php.
CWE-668 Feb 13, 2018
CVE-2018-0127 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.92
Cisco Rv132w Firmware - Information Disclosure
A vulnerability in the web interface of Cisco RV132W ADSL2+ Wireless-N VPN Routers and Cisco RV134W VDSL2 Wireless-AC VPN Routers could allow an unauthenticated, remote attacker to view configuration parameters for an affected device, which could lead to the disclosure of confidential information. The vulnerability is due to the absence of user authentication requirements for certain pages that are part of the web interface and contain confidential information for an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device and examining the HTTP response to the request. A successful exploit could allow the attacker to view configuration parameters, including the administrator password, for the affected device. Cisco Bug IDs: CSCvg92739, CSCvh60172.
CWE-306 Feb 08, 2018
CVE-2018-6605 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
ZH Baidumap - SQL Injection
SQL Injection exists in the Zh BaiduMap 3.0.0.1 component for Joomla! via the id parameter in a getPlacemarkDetails, getPlacemarkHoverText, getPathHoverText, or getPathDetails request.
CWE-89 Feb 05, 2018
CVE-2018-6008 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.76
Jtag Members Directory 5.3.7 - Info Disclosure
Arbitrary File Download exists in the Jtag Members Directory 5.3.7 component for Joomla! via the download_file parameter.
CWE-200 Jan 29, 2018
CVE-2018-6200 6.1 MEDIUM NUCLEI EPSS 0.10
Vbulletin < 3.8.11 - Open Redirect
vBulletin 3.x.x and 4.2.x through 4.2.5 has an open redirect via the redirector.php url parameter.
CWE-601 Jan 25, 2018
CVE-2018-6184 7.5 HIGH NUCLEI EPSS 0.15
ZEIT Next.js <4.2.3 - Path Traversal
ZEIT Next.js 4 before 4.2.3 has Directory Traversal under the /_next request namespace.
CWE-22 Jan 24, 2018
CVE-2018-5715 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.03
SugarCRM 3.5.1 - XSS
phprint.php in SugarCRM 3.5.1 has XSS via a parameter name in the query string (aka a $key variable).
CWE-79 Jan 16, 2018
CVE-2018-5316 6.1 MEDIUM NUCLEI EPSS 0.04
SagePay Server Gateway for WooCommerce <1.0.9 - XSS
The "SagePay Server Gateway for WooCommerce" plugin before 1.0.9 for WordPress has XSS via the includes/pages/redirect.php page parameter.
CWE-79 Jan 09, 2018
CVE-2018-3810 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.92
Oturia Smart Google Code Inserter < 3.5 - Authentication Bypass
Authentication Bypass vulnerability in the Oturia Smart Google Code Inserter plugin before 3.5 for WordPress allows unauthenticated attackers to insert arbitrary JavaScript or HTML code (via the sgcgoogleanalytic parameter) that runs on all pages served by WordPress. The saveGoogleCode() function in smartgooglecode.php does not check if the current request is made by an authorized user, thus allowing any unauthenticated user to successfully update the inserted code.
CWE-287 Jan 01, 2018
CVE-2018-25031 4.3 MEDIUM 16 PoCs Analysis NUCLEI EPSS 0.80
Swagger UI <4.1.2 - CSRF
Swagger UI 4.1.2 and earlier could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions. Note: This was originally claimed to be resolved in 4.1.3. However, third parties have indicated this is not resolved in 4.1.3 and even occurs in that version and possibly others.
CWE-918 Mar 11, 2022
CVE-2018-19518 7.5 HIGH EXPLOITED RANSOMWARE 6 PoCs Analysis NUCLEI EPSS 0.94
University of Washington IMAP Toolkit 2007f - Command Injection
University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.
CWE-88 Nov 25, 2018
CVE-2017-5645 9.8 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.94
Apache Log4j < 2.8.2 - Insecure Deserialization
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
CWE-502 Apr 17, 2017