Vulnerabilities with Nuclei Scanner Templates

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,682 CVEs tracked 53,700 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,389 vendors 43,933 researchers
4,077 results Clear all
CVE-2022-34048 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.05
Wavlink WN533A8 M33A8.V5030.190716 - XSS
Wavlink WN533A8 M33A8.V5030.190716 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the login_page parameter.
CWE-79 Jul 20, 2022
CVE-2022-34047 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.59
Wavlink WN530HG4 M30HG4.V5030.191116 - Info Disclosure
An access control issue in Wavlink WN530HG4 M30HG4.V5030.191116 allows attackers to obtain usernames and passwords via view-source:http://IP_ADDRESS/set_safety.shtml?r=52300 and searching for [var syspasswd].
CWE-668 Jul 20, 2022
CVE-2022-34046 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.57
Wavlink WN533A8 M33A8.V5030.190716 - Info Disclosure
An access control issue in Wavlink WN533A8 M33A8.V5030.190716 allows attackers to obtain usernames and passwords via view-source:http://IP_ADDRESS/sysinit.shtml?r=52300 and searching for [logincheck(user);].
CWE-863 Jul 20, 2022
CVE-2022-34045 9.8 CRITICAL NUCLEI EPSS 0.36
Wavlink WN530HG4 - Info Disclosure
Wavlink WN530HG4 M30HG4.V5030.191116 was discovered to contain a hardcoded encryption/decryption key for its configuration files at /etc_ro/lighttpd/www/cgi-bin/ExportAllSettings.sh.
CWE-798 Jul 20, 2022
CVE-2022-2488 8.0 HIGH EXPLOITED SSVC PoC 1 Writeup NUCLEI EPSS 0.93
Wavlink Wl-wn535k2 Firmware - OS Command Injection
A vulnerability was found in WAVLINK WN535K2 and WN535K3 and classified as critical. This issue affects some unknown processing of the file /cgi-bin/touchlist_sync.cgi. The manipulation of the argument IP leads to os command injection. The exploit has been disclosed to the public and may be used.
CWE-78 Jul 20, 2022
CVE-2022-2487 8.0 HIGH EXPLOITED SSVC PoC 1 Writeup NUCLEI EPSS 0.93
Wavlink Wl-wn535k2 Firmware - OS Command Injection
A vulnerability has been found in WAVLINK WN535K2 and WN535K3 and classified as critical. This vulnerability affects unknown code of the file /cgi-bin/nightled.cgi. The manipulation of the argument start_hour leads to os command injection. The exploit has been disclosed to the public and may be used.
CWE-78 Jul 20, 2022
CVE-2022-2486 8.0 HIGH EXPLOITED SSVC PoC 1 Writeup NUCLEI EPSS 0.91
Wavlink Wl-wn535k2 Firmware - OS Command Injection
A vulnerability, which was classified as critical, was found in WAVLINK WN535K2 and WN535K3. This affects an unknown part of the file /cgi-bin/mesh.cgi?page=upgrade. The manipulation of the argument key leads to os command injection. The exploit has been disclosed to the public and may be used.
CWE-78 Jul 20, 2022
CVE-2022-34534 7.5 HIGH NUCLEI EPSS 0.29
Digital Watchdog DW Spectrum Server 4.2.0.32842 - Info Disclosure
Digital Watchdog DW Spectrum Server 4.2.0.32842 allows attackers to access sensitive infromation via a crafted API call.
Jul 19, 2022
CVE-2022-35405 9.8 CRITICAL KEV SSVC ACTIVE 2 PoCs Analysis NUCLEI EPSS 0.94
Zohocorp Manageengine Access Manager Plus - Insecure Deserialization
Zoho ManageEngine Password Manager Pro before 12101 and PAM360 before 5510 are vulnerable to unauthenticated remote code execution. (This also affects ManageEngine Access Manager Plus before 4303 with authentication.)
CWE-502 Jul 19, 2022
CVE-2022-2467 7.3 HIGH SSVC PoC 1 Writeup NUCLEI EPSS 0.72
Garage Management System - SQL Injection
A vulnerability has been found in SourceCodester Garage Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument username with the input [email protected]' AND (SELECT 6427 FROM (SELECT(SLEEP(5)))LwLu) AND 'hsvT'='hsvT leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
CWE-89 Jul 19, 2022
CVE-2022-33891 8.8 HIGH KEV SSVC ACTIVE 14 PoCs Analysis NUCLEI EPSS 0.94
Apache Spark UI - Privilege Escalation
The Apache Spark UI offers the possibility to enable ACLs via the configuration option spark.acls.enable. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonation by providing an arbitrary user name. A malicious user might then be able to reach a permission check function that will ultimately build a Unix shell command based on their input, and execute it. This will result in arbitrary shell command execution as the user Spark is currently running as. This affects Apache Spark versions 3.0.3 and earlier, versions 3.1.1 to 3.1.2, and versions 3.2.0 to 3.2.1.
CWE-78 Jul 18, 2022
CVE-2022-26352 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 1 PoC Analysis NUCLEI EPSS 0.94
dotCMS 3.0-22.02 - Path Traversal
An issue was discovered in the ContentResource API in dotCMS 3.0 through 22.02. Attackers can craft a multipart form request to post a file whose filename is not initially sanitized. This allows directory traversal, in which the file is saved outside of the intended storage location. If anonymous content creation is enabled, this allows an unauthenticated attacker to upload an executable file, such as a .jsp file, that can lead to remote code execution.
Jul 17, 2022
CVE-2022-31260 6.5 MEDIUM 1 Writeup NUCLEI EPSS 0.25
Montala ResourceSpace <9.8 - Info Disclosure
In Montala ResourceSpace through 9.8 before r19636, csv_export_results_metadata.php allows attackers to export collection metadata via a non-NULL k value.
CWE-306 Jul 17, 2022
CVE-2022-31161 10.0 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.73
Roxy-WI <6.1.1.0 - Command Injection
Roxy-WI is a Web interface for managing HAProxy, Nginx and Keepalived servers. Prior to version 6.1.1.0, the system command can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Version 6.1.1.0 contains a patch for this issue.
CWE-434 Jul 15, 2022
CVE-2022-34094 6.1 MEDIUM NUCLEI EPSS 0.02
Portal do Software Publico Brasileiro i3geo <7.0.5 - XSS
Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via request_token.php.
CWE-79 Jul 14, 2022
CVE-2022-34093 6.1 MEDIUM NUCLEI EPSS 0.03
Portal do Software Publico Brasileiro i3geo <7.0.5 - XSS
Portal do Software Publico Brasileiro i3geo v7.0.5 was discovered to contain a cross-site scripting (XSS) vulnerability via access_token.php.
CWE-79 Jul 14, 2022
CVE-2022-32409 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.67
Softwarepublico I3geo - Path Traversal
A local file inclusion (LFI) vulnerability in the component codemirror.php of Portal do Software Publico Brasileiro i3geo v7.0.5 allows attackers to execute arbitrary PHP code via a crafted HTTP request.
CWE-22 Jul 14, 2022
CVE-2022-34753 8.8 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Schneider-electric Spacelogic C-bus H... - OS Command Injection
A CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability exists that could cause remote root exploit when the command is compromised. Affected Products: SpaceLogic C-Bus Home Controller (5200WHC2), formerly known as C-Bus Wiser Homer Controller MK2 (V1.31.460 and prior)
CWE-78 Jul 13, 2022
CVE-2022-35416 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.07
H3C SSL VPN < 2022-07-10 - XSS
H3C SSL VPN through 2022-07-10 allows wnm/login/login.json svpnlang cookie XSS.
CWE-79 Jul 11, 2022
CVE-2022-31137 10.0 CRITICAL EXPLOITED SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.94
Roxy-WI <6.1.1.0 - RCE
Roxy-WI is a web interface for managing Haproxy, Nginx, Apache and Keepalived servers. Versions prior to 6.1.1.0 are subject to a remote code execution vulnerability. System commands can be run remotely via the subprocess_execute function without processing the inputs received from the user in the /app/options.py file. Attackers need not be authenticated to exploit this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-78 Jul 08, 2022