Vulnerabilities with Nuclei Scanner Templates
Updated 54m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2018-6530
9.8
CRITICAL
KEV
RANSOMWARE
NUCLEI
EPSS 0.94
Dlink Dir-860l Firmware < 1.10b04 - OS Command Injection
OS command injection vulnerability in soap.cgi (soapcgi_main in cgibin) in D-Link DIR-880L DIR-880L_REVA_FIRMWARE_PATCH_1.08B04 and previous versions, DIR-868L DIR868LA1_FW112b04 and previous versions, DIR-65L DIR-865L_REVA_FIRMWARE_PATCH_1.08.B01 and previous versions, and DIR-860L DIR860LA1_FW110b04 and previous versions allows remote attackers to execute arbitrary OS commands via the service parameter.
CWE-78
Mar 06, 2018
CVE-2018-7662
5.3
MEDIUM
NUCLEI
EPSS 0.90
Couch < 2.0 - Information Disclosure
Couch through 2.0 allows remote attackers to discover the full path via a direct request to includes/mysql2i/mysql2i.func.php or addons/phpmailer/phpmailer.php.
CWE-200
Mar 04, 2018
CVE-2018-7653
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.01
Yzmcms - XSS
In YzmCMS 3.6, index.php has XSS via the a, c, or m parameter.
CWE-79
Mar 04, 2018
CVE-2018-7467
7.5
HIGH
NUCLEI
EPSS 0.30
Axxonsoft Next - Path Traversal
AxxonSoft Axxon Next has Directory Traversal via an initial /css//..%2f substring in a URI.
CWE-22
Feb 27, 2018
CVE-2018-7490
7.5
HIGH
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Unbit Uwsgi < 2.0.17 - Path Traversal
uWSGI before 2.0.17 mishandles a DOCUMENT_ROOT check during use of the --php-docroot option, allowing directory traversal.
CWE-22
Feb 26, 2018
CVE-2018-7314
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
Mlwebtechnologies Prayercenter - SQL Injection
SQL Injection exists in the PrayerCenter 3.0.2 component for Joomla! via the sessionid parameter, a different vulnerability than CVE-2008-6429.
CWE-89
Feb 22, 2018
CVE-2018-7251
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.91
Anchor < 0.12.7 - Information Disclosure
An issue was discovered in config/error.php in Anchor 0.12.3. The error log is exposed at an errors.log URI, and contains MySQL credentials if a MySQL error (such as "Too many connections") has occurred.
CWE-200
Feb 19, 2018
CVE-2018-2392
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.86
SAP Internet Graphics Server (IGS) XMLCHART XXE
Under certain conditions SAP Internet Graphics Server (IGS) 7.20, 7.20EXT, 7.45, 7.49, 7.53, fails to validate XML External Entity appropriately causing the SAP Internet Graphics Server (IGS) to become unavailable.
CWE-611
Feb 14, 2018
CVE-2018-6910
7.5
HIGH
NUCLEI
EPSS 0.91
Dedecms - Exposure to Wrong Actor
DedeCMS 5.7 allows remote attackers to discover the full path via a direct request for include/downmix.inc.php or inc/inc_archives_functions.php.
CWE-668
Feb 13, 2018
CVE-2018-0127
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.92
Cisco Rv132w Firmware - Information Disclosure
A vulnerability in the web interface of Cisco RV132W ADSL2+ Wireless-N VPN Routers and Cisco RV134W VDSL2 Wireless-AC VPN Routers could allow an unauthenticated, remote attacker to view configuration parameters for an affected device, which could lead to the disclosure of confidential information. The vulnerability is due to the absence of user authentication requirements for certain pages that are part of the web interface and contain confidential information for an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device and examining the HTTP response to the request. A successful exploit could allow the attacker to view configuration parameters, including the administrator password, for the affected device. Cisco Bug IDs: CSCvg92739, CSCvh60172.
CWE-306
Feb 08, 2018
CVE-2018-6605
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
ZH Baidumap - SQL Injection
SQL Injection exists in the Zh BaiduMap 3.0.0.1 component for Joomla! via the id parameter in a getPlacemarkDetails, getPlacemarkHoverText, getPathHoverText, or getPathDetails request.
CWE-89
Feb 05, 2018
CVE-2018-6008
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.76
Jtag Members Directory 5.3.7 - Info Disclosure
Arbitrary File Download exists in the Jtag Members Directory 5.3.7 component for Joomla! via the download_file parameter.
CWE-200
Jan 29, 2018
CVE-2018-6200
6.1
MEDIUM
NUCLEI
EPSS 0.10
Vbulletin < 3.8.11 - Open Redirect
vBulletin 3.x.x and 4.2.x through 4.2.5 has an open redirect via the redirector.php url parameter.
CWE-601
Jan 25, 2018
CVE-2018-6184
7.5
HIGH
NUCLEI
EPSS 0.15
ZEIT Next.js <4.2.3 - Path Traversal
ZEIT Next.js 4 before 4.2.3 has Directory Traversal under the /_next request namespace.
CWE-22
Jan 24, 2018
CVE-2018-5715
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.03
SugarCRM 3.5.1 - XSS
phprint.php in SugarCRM 3.5.1 has XSS via a parameter name in the query string (aka a $key variable).
CWE-79
Jan 16, 2018
CVE-2018-5316
6.1
MEDIUM
NUCLEI
EPSS 0.04
SagePay Server Gateway for WooCommerce <1.0.9 - XSS
The "SagePay Server Gateway for WooCommerce" plugin before 1.0.9 for WordPress has XSS via the includes/pages/redirect.php page parameter.
CWE-79
Jan 09, 2018
CVE-2018-3810
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.92
Oturia Smart Google Code Inserter < 3.5 - Authentication Bypass
Authentication Bypass vulnerability in the Oturia Smart Google Code Inserter plugin before 3.5 for WordPress allows unauthenticated attackers to insert arbitrary JavaScript or HTML code (via the sgcgoogleanalytic parameter) that runs on all pages served by WordPress. The saveGoogleCode() function in smartgooglecode.php does not check if the current request is made by an authorized user, thus allowing any unauthenticated user to successfully update the inserted code.
CWE-287
Jan 01, 2018
CVE-2018-25031
4.3
MEDIUM
16 PoCs
Analysis
NUCLEI
EPSS 0.80
Swagger UI <4.1.2 - CSRF
Swagger UI 4.1.2 and earlier could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions. Note: This was originally claimed to be resolved in 4.1.3. However, third parties have indicated this is not resolved in 4.1.3 and even occurs in that version and possibly others.
CWE-918
Mar 11, 2022
CVE-2018-19518
7.5
HIGH
EXPLOITED
RANSOMWARE
6 PoCs
Analysis
NUCLEI
EPSS 0.94
University of Washington IMAP Toolkit 2007f - Command Injection
University of Washington IMAP Toolkit 2007f on UNIX, as used in imap_open() in PHP and other products, launches an rsh command (by means of the imap_rimap function in c-client/imap4r1.c and the tcp_aopen function in osdep/unix/tcp_unix.c) without preventing argument injection, which might allow remote attackers to execute arbitrary OS commands if the IMAP server name is untrusted input (e.g., entered by a user of a web application) and if rsh has been replaced by a program with different argument semantics. For example, if rsh is a link to ssh (as seen on Debian and Ubuntu systems), then the attack can use an IMAP server name containing a "-oProxyCommand" argument.
CWE-88
Nov 25, 2018
CVE-2017-5645
9.8
CRITICAL
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Log4j < 2.8.2 - Insecure Deserialization
In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.
CWE-502
Apr 17, 2017