Vulnerabilities with Nuclei Scanner Templates
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2017-15715
8.1
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.94
Apache httpd <=2.4.29 - Arbitrary File Upload
In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
CWE-20
Mar 26, 2018
CVE-2017-14537
6.5
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.85
Trixbox 2.8.0 - Path Traversal
trixbox 2.8.0.4 has path traversal via the xajaxargs array parameter to /maint/index.php?packages or the lang parameter to /maint/modules/home/index.php.
CWE-22
Feb 16, 2018
CVE-2017-14535
8.8
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.85
Trixbox - 2.8.0.4 OS Command Injection
trixbox 2.8.0.4 has OS command injection via shell metacharacters in the lang parameter to /maint/modules/home/index.php.
CWE-78
Feb 16, 2018
CVE-2017-12544
5.4
MEDIUM
NUCLEI
EPSS 0.60
HP System Management Homepage < 7.6.1 - XSS
A cross-site scripting vulnerability in HPE System Management Homepage for Windows and Linux version prior to v7.6.1 was found.
CWE-79
Feb 15, 2018
CVE-2017-12542
10.0
CRITICAL
EXPLOITED
RANSOMWARE
6 PoCs
Analysis
NUCLEI
EPSS 0.94
HP Integrated Lights-out 4 Firmware < 2.53 - Authentication Bypass
A authentication bypass and execution of code vulnerability in HPE Integrated Lights-out 4 (iLO 4) version prior to 2.53 was found.
Feb 15, 2018
CVE-2017-1000353
9.8
CRITICAL
KEV
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Jenkins <2.56-<2.46.1 LTS - RCE
Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an unauthenticated remote code execution. An unauthenticated remote code execution vulnerability allowed attackers to transfer a serialized Java `SignedObject` object to the Jenkins CLI, that would be deserialized using a new `ObjectInputStream`, bypassing the existing blacklist-based protection mechanism. We're fixing this issue by adding `SignedObject` to the blacklist. We're also backporting the new HTTP CLI protocol from Jenkins 2.54 to LTS 2.46.2, and deprecating the remoting-based (i.e. Java serialization) CLI protocol, disabling it by default.
CWE-502
Jan 29, 2018
CVE-2017-1000486
9.8
CRITICAL
KEV
10 PoCs
Analysis
NUCLEI
EPSS 0.94
Primefaces Remote Code Execution Exploit
Primetek Primefaces 5.x is vulnerable to a weak encryption flaw resulting in remote code execution
CWE-326
Jan 03, 2018
CVE-2017-15944
9.8
CRITICAL
KEV
8 PoCs
Analysis
NUCLEI
EPSS 0.94
Palo Alto Network PAN-OS - Remote Code Execution
Palo Alto Networks PAN-OS before 6.1.19, 7.0.x before 7.0.19, 7.1.x before 7.1.14, and 8.0.x before 8.0.6 allows remote attackers to execute arbitrary code via vectors involving the management interface.
CWE-119
Dec 11, 2017
CVE-2017-14186
5.4
MEDIUM
NUCLEI
EPSS 0.03
FortiGate FortiOS SSL VPN Web Portal - Cross-Site Scripting
A Cross-site Scripting (XSS) vulnerability in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.0 to 5.6.7, 5.4 and below versions under SSL VPN web portal allows a remote user to inject arbitrary web script or HTML in the context of the victim's browser via the login redir parameter. An URL Redirection attack may also be feasible by injecting an external URL via the affected parameter.
CWE-79
Nov 29, 2017
CVE-2017-17059
6.1
MEDIUM
NUCLEI
EPSS 0.01
WordPress amtyThumb Posts 8.1.3 - Cross-Site Scripting
XSS exists in the amtyThumb amty-thumb-recent-post (aka amtyThumb posts or wp-thumb-post) plugin 8.1.3 for WordPress via the query string to amtyThumbPostsAdminPg.php.
CWE-79
Nov 29, 2017
CVE-2017-17043
6.1
MEDIUM
NUCLEI
EPSS 0.04
WordPress Emag Marketplace Connector 1.0 - Cross-Site Scripting
The Emag Marketplace Connector plugin 1.0.0 for WordPress has reflected XSS because the parameter "post" to /wp-content/plugins/emag-marketplace-connector/templates/order/awb-meta-box.php is not filtered correctly.
CWE-79
Nov 28, 2017
CVE-2017-16894
7.5
HIGH
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.89
Laravel <5.5.21 - Information Disclosure
In Laravel framework through 5.5.21, remote attackers can obtain sensitive information (such as externally usable passwords) via a direct request for the /.env URI. NOTE: this CVE is only about Laravel framework's writeNewEnvironmentFileWith function in src/Illuminate/Foundation/Console/KeyGenerateCommand.php, which uses file_put_contents without restricting the .env permissions. The .env filename is not used exclusively by Laravel framework.
CWE-200
Nov 20, 2017
CVE-2017-1000163
6.1
MEDIUM
NUCLEI
EPSS 0.02
Phoenix Framework <1.0.4, 1.1.6, 1.2.2, 1.3.0-rc.0 - Open Redirect
The Phoenix Framework versions 1.0.0 through 1.0.4, 1.1.0 through 1.1.6, 1.2.0, 1.2.2 and 1.3.0-rc.0 are vulnerable to unvalidated URL redirection, which may result in phishing or social engineering attacks.
CWE-601
Nov 17, 2017
CVE-2017-1000170
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.90
jqueryFileTree <2.1.5 - Path Traversal
jqueryFileTree 2.1.5 and older Directory Traversal
CWE-22
Nov 17, 2017
CVE-2017-16877
7.5
HIGH
1 Writeup
NUCLEI
EPSS 0.81
Nextjs <2.4.1 - Local File Inclusion
ZEIT Next.js before 2.4.1 has directory traversal under the /_next and /static request namespace, allowing attackers to obtain sensitive information.
CWE-22
Nov 17, 2017
CVE-2017-12635
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache CouchDB 1.7.0 / 2.x < 2.1.1 - Remote Privilege Escalation
Due to differences in the Erlang-based JSON parser and JavaScript-based JSON parser, it is possible in Apache CouchDB before 1.7.0 and 2.x before 2.1.1 to submit _users documents with duplicate keys for 'roles' used for access control within the database, including the special case '_admin' role, that denotes administrative users. In combination with CVE-2017-12636 (Remote Code Execution), this can be used to give non-admin users access to arbitrary shell commands on the server as the database system user. The JSON parser differences result in behaviour that if two 'roles' keys are available in the JSON, the second one will be used for authorising the document write, but the first 'roles' key is used for subsequent authorization for the newly created user. By design, users can not assign themselves roles. The vulnerability allows non-admin users to give themselves admin privileges.
CWE-269
Nov 14, 2017
CVE-2017-16806
7.5
HIGH
3 PoCs
Analysis
NUCLEI
EPSS 0.86
Ulterius Server < 1.9.5.0 - Directory Traversal
The Process function in RemoteTaskServer/WebServer/HttpServer.cs in Ulterius before 1.9.5.0 allows HTTP server directory traversal.
CWE-22
Nov 13, 2017
CVE-2017-11512
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.83
ManageEngine ServiceDesk <9.3.9328 - Path Traversal
The ManageEngine ServiceDesk 9.3.9328 is vulnerable to arbitrary file downloads due to improper restrictions of the pathname used in the name parameter for the download-snapshot URL. An unauthenticated remote attacker can use this vulnerability to download arbitrary files.
CWE-22
Nov 08, 2017
CVE-2017-15647
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.39
FiberHome Routers - Local File Inclusion
On FiberHome routers, Directory Traversal exists in /cgi-bin/webproc via the getpage parameter in conjunction with a crafted var:page value.
CWE-22
Oct 19, 2017
CVE-2017-10271
7.5
HIGH
KEV
RANSOMWARE
37 PoCs
Analysis
NUCLEI
EPSS 0.94
Oracle WebLogic wls-wsat Component Deserialization RCE
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
CWE-306
Oct 19, 2017