Vulnerabilities with Nuclei Scanner Templates
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2022-3124
5.3
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.09
Najeebmedia Frontend File Manager < 21.3 - Missing Authorization
The Frontend File Manager Plugin WordPress plugin before 21.3 allows any unauthenticated user to rename uploaded files from users. Furthermore, due to the lack of validation in the destination filename, this could allow allow them to change the content of arbitrary files on the web server
CWE-862
Oct 03, 2022
CVE-2022-38817
7.5
HIGH
NUCLEI
EPSS 0.77
Dapr Dashboard <0.11.0 - Info Disclosure
Dapr Dashboard v0.1.0 through v0.10.0 is vulnerable to Incorrect Access Control that allows attackers to obtain sensitive data.
CWE-306
Oct 03, 2022
CVE-2022-40879
6.1
MEDIUM
SSVC PoC
NUCLEI
EPSS 0.19
kkFileView v4.1.0 - XSS
kkFileView v4.1.0 is vulnerable to Cross Site Scripting (XSS) via the parameter 'errorMsg.'
CWE-79
Sep 29, 2022
CVE-2022-40083
9.6
CRITICAL
SSVC PoC
NUCLEI
EPSS 0.59
Labstack Echo < 4.9.0 - Open Redirect
Labstack Echo v4.8.0 was discovered to contain an open redirect vulnerability via the Static Handler component. This vulnerability can be leveraged by attackers to cause a Server-Side Request Forgery (SSRF).
CWE-601
Sep 28, 2022
CVE-2022-3062
6.1
MEDIUM
SSVC PoC
NUCLEI
EPSS 0.49
Simple File List <4.4.12 - XSS
The Simple File List WordPress plugin before 4.4.12 does not escape parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting
CWE-79
Sep 26, 2022
CVE-2022-38553
6.1
MEDIUM
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.31
Academy Learning Management System <5.9.1 - XSS
Academy Learning Management System before v5.9.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the Search parameter.
CWE-79
Sep 26, 2022
CVE-2022-41352
9.8
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Zimbra Collaboration <9.0 - Privilege Escalation
An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. An attacker can upload arbitrary files through amavis via a cpio loophole (extraction to /opt/zimbra/jetty/webapps/zimbra/public) that can lead to incorrect access to any other user accounts. Zimbra recommends pax over cpio. Also, pax is in the prerequisites of Zimbra on Ubuntu; however, pax is no longer part of a default Red Hat installation after RHEL 6 (or CentOS 6). Once pax is installed, amavis automatically prefers it over cpio.
CWE-22
Sep 26, 2022
CVE-2022-40359
6.1
MEDIUM
NUCLEI
EPSS 0.09
Kfm < 1.4.7 - XSS
Cross site scripting (XSS) vulnerability in kfm through 1.4.7 via crafted GET request to /kfm/index.php.
CWE-79
Sep 23, 2022
CVE-2022-3236
9.8
CRITICAL
KEV
SSVC ACTIVE
2 PoCs
NUCLEI
EPSS 0.93
Sophos Firewall <19.0 MR1 - Code Injection
A code injection vulnerability in the User Portal and Webadmin allows a remote attacker to execute code in Sophos Firewall version v19.0 MR1 and older.
CWE-94
Sep 23, 2022
CVE-2022-40443
5.3
MEDIUM
NUCLEI
EPSS 0.12
Zzcms - Path Traversal
An absolute path traversal vulnerability in ZZCMS 2022 allows attackers to obtain sensitive information via a crafted GET request sent to /one/siteinfo.php.
CWE-22
Sep 22, 2022
CVE-2022-3242
6.1
MEDIUM
SSVC PoC
1 Writeup
NUCLEI
EPSS 0.20
microweber/microweber <1.3.2 - Code Injection
Code Injection in GitHub repository microweber/microweber prior to 1.3.2.
CWE-94
Sep 20, 2022
CVE-2022-35914
9.8
CRITICAL
KEV
SSVC ACTIVE
11 PoCs
Analysis
NUCLEI
EPSS 0.94
GLPI htmLawed php command injection
/vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection.
CWE-74
Sep 19, 2022
CVE-2022-3142
8.8
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.08
Basixonline Nex-forms < 7.9.7 - SQL Injection
The NEX-Forms WordPress plugin before 7.9.7 does not properly sanitise and escape user input before using it in SQL statements, leading to SQL injections. The attack can be executed by anyone who is permitted to view the forms statistics chart, by default administrators, however can be configured otherwise via the plugin settings.
CWE-89
Sep 19, 2022
CVE-2022-39960
5.3
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.35
Netic Group Export < 1.0.3 - Missing Authorization
The Netic Group Export add-on before 1.0.3 for Atlassian Jira does not perform authorization checks. This might allow an unauthenticated user to export all groups from the Jira instance by making a groupexport_download=true request to a plugins/servlet/groupexportforjira/admin/ URI.
CWE-862
Sep 17, 2022
CVE-2022-2863
4.9
MEDIUM
NUCLEI
EPSS 0.08
WordPress Plugin <0.9.76 - Path Traversal
The Migration, Backup, Staging WordPress plugin before 0.9.76 does not sanitise and validate a parameter before using it to read the content of a file, allowing high privilege users to read any file from the web server via a Traversal attack
CWE-22
Sep 16, 2022
CVE-2022-40734
6.5
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.92
Unisharp Laravel Filemanager < 2.5.1 - Path Traversal
UniSharp laravel-filemanager (aka Laravel Filemanager) before 2.6.4 allows download?working_dir=%2F.. directory traversal to read arbitrary files, as exploited in the wild in June 2022. This is related to league/flysystem before 2.0.0.
CWE-22
Sep 14, 2022
CVE-2022-37191
6.5
MEDIUM
1 Writeup
NUCLEI
EPSS 0.46
CuppaCMS v1.0 - Path Traversal
The component "cuppa/api/index.php" of CuppaCMS v1.0 is Vulnerable to LFI. An authenticated user can read system files via crafted POST request using [function] parameter value as LFI payload.
CWE-829
Sep 13, 2022
CVE-2022-37190
8.8
HIGH
1 Writeup
NUCLEI
EPSS 0.85
Cuppacms - Remote Code Execution
CuppaCMS 1.0 is vulnerable to Remote Code Execution (RCE). An authenticated user can control both parameters (action and function) from "/api/index.php.
Sep 13, 2022
CVE-2022-35413
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.86
Pentasecurity Wapples < 6.0.0 - Hard-coded Credentials
WAPPLES through 6.0 has a hardcoded systemi account. A threat actor could use this account to access the system configuration and confidential information (such as SSL keys) via an HTTPS request to the /webapi/ URI on port 443 or 5001.
CWE-798
Sep 13, 2022
CVE-2022-38637
9.8
CRITICAL
NUCLEI
EPSS 0.31
Hospital Management System v1.0 - SQL Injection
Hospital Management System v1.0 was discovered to contain multiple SQL injection vulnerabilities via the Username and Password parameters on the Login page.
CWE-89
Sep 13, 2022