Vulnerabilities with Nuclei Scanner Templates

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,391 CVEs tracked 53,627 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,294 vendors 43,856 researchers
4,077 results Clear all
CVE-2017-15363 7.5 HIGH EXPLOITED NUCLEI EPSS 0.61
Luracast Restler 3.0.1 via TYPO3 Restler 1.7.1 - Local File Inclusion
Directory traversal vulnerability in public/examples/resources/getsource.php in Luracast Restler through 3.0.0, as used in the restler extension before 1.7.1 for TYPO3, allows remote attackers to read arbitrary files via the file parameter.
CWE-22 Oct 15, 2017
CVE-2017-12629 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.94
Apache Solr < 5.5.4 - XXE
Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr.
CWE-611 Oct 14, 2017
CVE-2017-15287 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.01
Dreambox WebControl 2.0.0 - Cross-Site Scripting
There is XSS in the BouquetEditor WebPlugin for Dream Multimedia Dreambox devices, as demonstrated by the "Name des Bouquets" field, or the file parameter to the /file URI.
CWE-79 Oct 12, 2017
CVE-2017-12149 9.8 CRITICAL KEV RANSOMWARE 12 PoCs Analysis NUCLEI EPSS 0.94
Jboss Application Server - Code Injection
In Jboss Application Server as shipped with Red Hat Enterprise Application Platform 5.2, it was found that the doFilter method in the ReadOnlyAccessFilter of the HTTP Invoker does not restrict classes for which it performs deserialization and thus allowing an attacker to execute arbitrary code via crafted serialized data.
CWE-502 Oct 04, 2017
CVE-2017-12617 8.1 HIGH KEV 19 PoCs Analysis NUCLEI EPSS 0.94
Apache Tomcat < 7.0.82 - Unrestricted File Upload
When running Apache Tomcat versions 9.0.0.M1 to 9.0.0, 8.5.0 to 8.5.22, 8.0.0.RC1 to 8.0.46 and 7.0.0 to 7.0.81 with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default servlet to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
CWE-434 Oct 04, 2017
CVE-2017-14942 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.01
Intelbras WRN 150 - Authentication Bypass
Intelbras WRN 150 devices allow remote attackers to read the configuration file, and consequently bypass authentication, via a direct request for cgi-bin/DownloadCfg/RouterCfm.cfg containing an admin:language=pt cookie.
CWE-552 Sep 30, 2017
CVE-2017-14849 7.5 HIGH NUCLEI EPSS 0.90
Node.js <8.6.0 - Directory Traversal
Node.js 8.5.0 before 8.6.0 allows remote attackers to access unintended files, because a change to ".." handling was incompatible with the pathname validation used by unspecified community modules.
CWE-22 Sep 28, 2017
CVE-2017-14622 6.1 MEDIUM NUCLEI EPSS 0.00
WordPress 2kb Amazon Affiliates Store <2.1.1 - Cross-Site Scripting
Multiple cross-site scripting (XSS) vulnerabilities in the 2kb Amazon Affiliates Store plugin before 2.1.1 for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) page parameter or (2) kbAction parameter in the kbAmz page to wp-admin/admin.php.
CWE-79 Sep 28, 2017
CVE-2017-14524 6.1 MEDIUM NUCLEI EPSS 0.01
OpenText Documentum Administrator 7.2.0180.0055 - Open Redirect
Multiple open redirect vulnerabilities in OpenText Documentum Administrator 7.2.0180.0055 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a (1) URL in the startat parameter to xda/help/en/default.htm or (2) /%09/ (slash encoded horizontal tab slash) followed by a domain in the redirectUrl parameter to xda/component/virtuallinkconnect.
CWE-601 Sep 28, 2017
CVE-2017-14725 5.4 MEDIUM NUCLEI EPSS 0.04
WordPress < 4.8.2 - Authenticated Open Redirect
Before version 4.8.2, WordPress was susceptible to an open redirect attack in wp-admin/edit-tag-form.php and wp-admin/user-edit.php.
CWE-601 Sep 23, 2017
CVE-2017-14651 4.8 MEDIUM NUCLEI EPSS 0.04
WSO2 Data Analytics Server 3.1.0 - Cross-Site Scripting
WSO2 Data Analytics Server 3.1.0 has XSS in carbon/resources/add_collection_ajaxprocessor.jsp via the collectionName or parentPath parameter.
CWE-79 Sep 21, 2017
CVE-2017-12611 9.8 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.94
Apache Struts < 2.3.34 - Improper Input Validation
In Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack.
CWE-20 Sep 20, 2017
CVE-2017-12615 8.1 HIGH KEV RANSOMWARE 21 PoCs Analysis NUCLEI EPSS 0.94
Apache Tomcat < 7.0.79 - Unrestricted File Upload
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
CWE-434 Sep 19, 2017
CVE-2017-12794 6.1 MEDIUM NUCLEI EPSS 0.21
Django Debug Page - Cross-Site Scripting
In Django 1.10.x before 1.10.8 and 1.11.x before 1.11.5, HTML autoescaping was disabled in a portion of the template for the technical 500 debug page. Given the right circumstances, this allowed a cross-site scripting attack. This vulnerability shouldn't affect most production sites since you shouldn't run with "DEBUG = True" (which makes this page accessible) in your production settings.
CWE-79 Sep 07, 2017
CVE-2017-14135 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.90
OpenDreambox 2.0.0 - Remote Code Execution
enigma2-plugins/blob/master/webadmin/src/WebChilds/Script.py in the webadmin plugin for opendreambox 2.0.0 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the command parameter to the /script URI.
CWE-78 Sep 04, 2017
CVE-2017-11610 8.8 HIGH EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.94
Supervisor XML-RPC Authenticated Remote Code Execution
The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.
CWE-276 Aug 23, 2017
CVE-2017-10075 8.2 HIGH NUCLEI EPSS 0.86
Oracle WebCenter Content <12.2.1.2.0 - Info Disclosure
Vulnerability in the Oracle WebCenter Content component of Oracle Fusion Middleware (subcomponent: Content Server). Supported versions that are affected are 11.1.1.9.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Content. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebCenter Content, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Content accessible data as well as unauthorized update, insert or delete access to some of Oracle WebCenter Content accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
Aug 08, 2017
CVE-2017-12637 7.5 HIGH KEV 1 PoC Analysis NUCLEI EPSS 0.93
SAP NetWeaver Application Server Java 7.5 - Local File Inclusion
Directory traversal vulnerability in scheduler/ui/js/ffffffffbca41eb4/UIUtilJavaScriptJS in SAP NetWeaver Application Server Java 7.5 allows remote attackers to read arbitrary files via a .. (dot dot) in the query string, as exploited in the wild in August 2017, aka SAP Security Note 2486657.
CWE-22 Aug 07, 2017
CVE-2017-12583 6.1 MEDIUM NUCLEI EPSS 0.01
Dokuwiki < 2017-02-19b - XSS
DokuWiki through 2017-02-19b has XSS in the at parameter (aka the DATE_AT variable) to doku.php.
CWE-79 Aug 06, 2017
CVE-2017-12138 6.1 MEDIUM NUCLEI EPSS 0.12
XOOPS Core 2.5.8 - Open Redirect
XOOPS Core 2.5.8 has a stored URL redirect bypass vulnerability in /modules/profile/index.php because of the URL filter.
CWE-601 Aug 02, 2017