Vulnerabilities with Nuclei Scanner Templates

Updated 7m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,391 CVEs tracked 53,627 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,294 vendors 43,856 researchers
4,077 results Clear all
CVE-2016-10940 7.2 HIGH NUCLEI EPSS 0.22
Zm-gallery - SQL Injection
The zm-gallery plugin 1.0 for WordPress has SQL injection via the order parameter.
CWE-89 Sep 13, 2019
CVE-2016-10924 7.5 HIGH EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.62
Zedna Ebook Download < 1.2 - Path Traversal
The ebook-download plugin before 1.2 for WordPress has directory traversal.
CWE-22 Aug 22, 2019
CVE-2016-4975 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.73
Apache HTTP Server <2.4.24, <2.2.32 - CRLF Injection
Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.31).
CWE-93 Aug 14, 2018
CVE-2016-8527 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.62
Aruba Airwave <8.2.3.1 - XSS
Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to a reflected cross-site scripting (XSS). The vulnerability is present in the VisualRF component of AirWave. By exploiting this vulnerability, an attacker who can trick a logged-in AirWave administrative user into clicking a link could obtain sensitive information, such as session cookies or passwords. The vulnerability requires that an administrative users click on the malicious link while currently logged into AirWave in the same browser.
CWE-79 Aug 06, 2018
CVE-2016-5649 9.8 CRITICAL NUCLEI EPSS 0.67
Netgear DGN2200-V1.0.0.50_7.0.50 & DGND3700-V1.0.0.17_1.0.17 - Info...
A vulnerability is in the 'BSW_cxttongr.htm' page of the Netgear DGN2200, version DGN2200-V1.0.0.50_7.0.50, and DGND3700, version DGND3700-V1.0.0.17_1.0.17, which can allow a remote attacker to access this page without any authentication. When processed, it exposes the admin password in clear text before it gets redirected to absw_vfysucc.cgia. An attacker can use this password to gain administrator access to the targeted router's web interface.
CWE-319 Jul 24, 2018
CVE-2016-4977 8.8 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Pivotal Spring Security Oauth < 2.0.10 - Remote Code Execution
When processing authorization requests using the whitelabel views in Spring Security OAuth 2.0.0 to 2.0.9 and 1.0.0 to 1.0.5, the response_type parameter value was executed as Spring SpEL which enabled a malicious user to trigger remote code execution via the crafting of the value for response_type.
CWE-19 May 25, 2017
CVE-2016-10368 6.1 MEDIUM NUCLEI EPSS 0.01
Opsview - Open Redirect
Open redirect vulnerability in Opsview Monitor Pro (Prior to 5.1.0.162300841, prior to 5.0.2.27475, prior to 4.6.4.162391051, and 4.5.x without a certain 2016 security patch) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the back parameter to the /login URI.
CWE-601 May 03, 2017
CVE-2016-10367 7.5 HIGH EXPLOITED NUCLEI EPSS 0.51
Opsview - Path Traversal
In Opsview Monitor Pro (Prior to 5.1.0.162300841, prior to 5.0.2.27475, prior to 4.6.4.162391051, and 4.5.x without a certain 2016 security patch), an unauthenticated Directory Traversal vulnerability can be exploited by issuing a specially crafted HTTP GET request utilizing a simple URL encoding bypass, %252f instead of /.
CWE-22 May 03, 2017
CVE-2016-1555 9.8 CRITICAL KEV 3 PoCs Analysis NUCLEI EPSS 0.94
Netgear Devices Unauthenticated Remote Command Execution
(1) boardData102.php, (2) boardData103.php, (3) boardDataJP.php, (4) boardDataNA.php, and (5) boardDataWW.php in Netgear WN604 before 3.3.3 and WN802Tv2, WNAP210v2, WNAP320, WNDAP350, WNDAP360, and WNDAP660 before 3.5.5.0 allow remote attackers to execute arbitrary commands.
CWE-77 Apr 21, 2017
CVE-2016-7834 8.8 HIGH NUCLEI EPSS 0.39
Sony Snc Series Firmware < 1.8.5.00 - Information Disclosure
SONY SNC-CH115, SNC-CH120, SNC-CH160, SNC-CH220, SNC-CH260, SNC-DH120, SNC-DH120T, SNC-DH160, SNC-DH220, SNC-DH220T, SNC-DH260, SNC-EB520, SNC-EM520, SNC-EM521, SNC-ZB550, SNC-ZM550, SNC-ZM551, SNC-EP550, SNC-EP580, SNC-ER550, SNC-ER550C, SNC-ER580, SNC-ER585, SNC-ER585H, SNC-ZP550, SNC-ZR550, SNC-EP520, SNC-EP521, SNC-ER520, SNC-ER521, SNC-ER521C network cameras with firmware before Ver.1.86.00 and SONY SNC-CX600, SNC-CX600W, SNC-EB600, SNC-EB600B, SNC-EB602R, SNC-EB630, SNC-EB630B, SNC-EB632R, SNC-EM600, SNC-EM601, SNC-EM602R, SNC-EM602RC, SNC-EM630, SNC-EM631, SNC-EM632R, SNC-EM632RC, SNC-VB600, SNC-VB600B, SNC-VB600B5, SNC-VB630, SNC-VB6305, SNC-VB6307, SNC-VB632D, SNC-VB635, SNC-VM600, SNC-VM600B, SNC-VM600B5, SNC-VM601, SNC-VM601B, SNC-VM602R, SNC-VM630, SNC-VM6305, SNC-VM6307, SNC-VM631, SNC-VM632R, SNC-WR600, SNC-WR602, SNC-WR602C, SNC-WR630, SNC-WR632, SNC-WR632C, SNC-XM631, SNC-XM632, SNC-XM636, SNC-XM637, SNC-VB600L, SNC-VM600L, SNC-XM631L, SNC-WR602CL network cameras with firmware before Ver.2.7.2 are prone to sensitive information disclosure. This may allow an attacker on the same local network segment to login to the device with administrative privileges and perform operations on the device.
CWE-200 Apr 13, 2017
CVE-2016-7552 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.93
Trendmicro Threat Discovery Appliance - Path Traversal
On the Trend Micro Threat Discovery Appliance 2.6.1062r1, directory traversal when processing a session_id cookie allows a remote, unauthenticated attacker to delete arbitrary files as root. This can be used to bypass authentication or cause a DoS.
CWE-22 Apr 12, 2017
CVE-2016-8735 9.8 CRITICAL KEV 1 PoC NUCLEI EPSS 0.94
Apache Tomcat , 7.x , 8.x , 8.5.x , 9.x <6.0.48 <7.0.73 <8.0.39 <8.5.7 - Remote Code Execution
Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.
Apr 06, 2017
CVE-2016-10134 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.86
Zabbix <2.2.14, <3.0.4 - SQL Injection
SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php.
CWE-89 Feb 17, 2017
CVE-2016-6601 7.5 HIGH 2 PoCs Analysis NUCLEI EPSS 0.93
ZOHO WebNMS Framework <5.2-5.2 SP1 - Path Traversal
Directory traversal vulnerability in the file download functionality in ZOHO WebNMS Framework 5.2 and 5.2 SP1 allows remote attackers to read arbitrary files via a .. (dot dot) in the fileName parameter to servlets/FetchFile.
CWE-22 Jan 23, 2017
CVE-2016-7981 6.1 MEDIUM NUCLEI EPSS 0.43
Spip < 3.1.2 - XSS
Cross-site scripting (XSS) vulnerability in valider_xml.php in SPIP 3.1.2 and earlier allows remote attackers to inject arbitrary web script or HTML via the var_url parameter in a valider_xml action.
CWE-79 Jan 18, 2017
CVE-2016-9299 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.89
Jenkins <2.32-2.19.3 - RCE
The remoting module in Jenkins before 2.32 and LTS before 2.19.3 allows remote attackers to execute arbitrary code via a crafted serialized Java object, which triggers an LDAP query to a third-party server.
CWE-90 Jan 12, 2017
CVE-2016-10108 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Western Digital MyCloud unauthenticated command injection
Unauthenticated Remote Command injection as root occurs in the Western Digital MyCloud NAS 2.11.142 /web/google_analytics.php URL via a modified arg parameter in the POST data.
CWE-77 Jan 03, 2017
CVE-2016-10033 9.8 CRITICAL KEV 32 PoCs Analysis NUCLEI EPSS 0.94
PHPMailer Sendmail Argument Injection
The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property.
CWE-88 Dec 30, 2016
CVE-2016-6277 8.8 HIGH KEV 3 PoCs Analysis NUCLEI EPSS 0.94
NETGEAR - RCE
NETGEAR R6250 before 1.0.4.6.Beta, R6400 before 1.0.1.18.Beta, R6700 before 1.0.1.14.Beta, R6900, R7000 before 1.0.7.6.Beta, R7100LG before 1.0.0.28.Beta, R7300DST before 1.0.0.46.Beta, R7900 before 1.0.1.8.Beta, R8000 before 1.0.3.26.Beta, D6220, D6400, D7000, and possibly other routers allow remote attackers to execute arbitrary commands via shell metacharacters in the path info to cgi-bin/.
CWE-352 Dec 14, 2016
CVE-2016-1000155 6.1 MEDIUM NUCLEI EPSS 0.02
WordPress Plugin WPSOLR-Search-Engine <7.6 - XSS
Reflected XSS in wordpress plugin wpsolr-search-engine v7.6
CWE-79 Oct 10, 2016