Vulnerabilities with Nuclei Scanner Templates

Updated 22m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
4,077 results Clear all
CVE-2023-7028 10.0 CRITICAL KEV 19 PoCs Analysis NUCLEI EPSS 0.93
GitLab Password Reset Account Takeover
An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
CWE-640 Jan 12, 2024
CVE-2023-6875 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.94
Wordpress POST SMTP Account Takeover
The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a type juggling issue on the connect-app REST endpoint in all versions up to, and including, 2.8.7. This makes it possible for unauthenticated attackers to reset the API key used to authenticate to the mailer and view logs, including password reset emails, allowing site takeover. CVE-2023-52233 appears to be a duplicate of this issue.
CWE-639 Jan 11, 2024
CVE-2023-6634 8.1 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
LearnPress <4.2.5.7 - Command Injection
The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution.
CWE-77 Jan 11, 2024
CVE-2023-6567 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.82
LearnPress <4.2.5.7 - SQL Injection
The LearnPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order_by’ parameter in all versions up to, and including, 4.2.5.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Jan 11, 2024
CVE-2023-6266 7.5 HIGH EXPLOITED NUCLEI EPSS 0.27
WordPress Backup Migration <1.3.6 - Info Disclosure
The Backup Migration plugin for WordPress is vulnerable to unauthorized access of data due to insufficient path and file validation on the BMI_BACKUP case of the handle_downloading function in all versions up to, and including, 1.3.6. This makes it possible for unauthenticated attackers to download back-up files which can contain sensitive information such as user passwords, PII, database credentials, and much more.
CWE-200 Jan 11, 2024
CVE-2023-48728 9.6 CRITICAL EXPLOITED NUCLEI EPSS 0.17
WWBN AVideo <11.6 - XSS
A cross-site scripting (xss) vulnerability exists in the functiongetOpenGraph videoName functionality of WWBN AVideo 11.6 and dev master commit 3c6bb3ff. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
CWE-79 Jan 10, 2024
CVE-2023-31446 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
Cassia Gateway firmware - Code Injection
In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup.
CWE-77 Jan 10, 2024
CVE-2023-6505 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.74
Migrate WP <1.9.3 - Path Traversal
The Migrate WordPress Website & Backups WordPress plugin before 1.9.3 does not prevent directory listing in sensitive directories containing export files.
Jan 08, 2024
CVE-2023-47211 9.1 CRITICAL NUCLEI EPSS 0.76
Zohocorp Manageengine Firewall Analyzer < 12.7 - Path Traversal
A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability.
CWE-22 Jan 08, 2024
CVE-2023-50094 8.8 HIGH 1 PoC Analysis NUCLEI EPSS 0.89
Yogeshojha Rengine < 2.0.2 - OS Command Injection
reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.
CWE-78 Jan 01, 2024
CVE-2023-6421 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.81
WordPress Download Mgr <3.2.83 - Info Disclosure
The Download Manager WordPress plugin before 3.2.83 does not protect file download's passwords, leaking it upon receiving an invalid one.
CWE-522 Jan 01, 2024
CVE-2023-6000 6.1 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.69
Sygnoos Popup Builder < 4.2.3 - XSS
The Popup Builder WordPress plugin before 4.2.3 does not prevent simple visitors from updating existing popups, and injecting raw JavaScript in them, which could lead to Stored XSS attacks.
CWE-79 Jan 01, 2024
CVE-2023-50578 9.8 CRITICAL 1 PoC NUCLEI EPSS 0.32
Mingsoft Mcms - SQL Injection
Mingsoft MCMS v5.2.9 was discovered to contain a SQL injection vulnerability via the categoryType parameter at /content/list.do.
CWE-89 Dec 30, 2023
CVE-2023-52085 3.3 LOW 1 Writeup NUCLEI EPSS 0.40
Winter <1.2.3 - Local File Inclusion
Winter is a free, open-source content management system. Users with access to backend forms that include a ColorPicker FormWidget can provide a value that would then be included without further processing in the compilation of custom stylesheets via LESS. This had the potential to lead to a Local File Inclusion vulnerability. This issue has been patched in v1.2.4.
CWE-22 Dec 29, 2023
CVE-2023-49230 8.8 HIGH NUCLEI EPSS 0.31
Peplink Balance Two <8.4.0 - Auth Bypass
An issue was discovered in Peplink Balance Two before 8.4.0. A missing authorization check in captive portals allows attackers to modify the portals' configurations without prior authentication.
CWE-862 Dec 28, 2023
CVE-2023-7116 6.3 MEDIUM NUCLEI EPSS 0.52
Datax-web - OS Command Injection
A vulnerability, which was classified as critical, has been found in WeiYe-Jing datax-web 2.1.2. Affected by this issue is some unknown functionality of the file /api/log/killJob of the component HTTP POST Request Handler. The manipulation of the argument processId leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249086 is the identifier assigned to this vulnerability.
CWE-78 Dec 27, 2023
CVE-2023-6114 7.5 HIGH EXPLOITED NUCLEI EPSS 0.61
Duplicator <1.5.7.1-4.5.14.2 - Info Disclosure
The Duplicator WordPress plugin before 1.5.7.1, Duplicator Pro WordPress plugin before 4.5.14.2 does not disallow listing the `backups-dup-lite/tmp` directory (or the `backups-dup-pro/tmp` directory in the Pro version), which temporarily stores files containing sensitive data. When directory listing is enabled in the web server, this allows unauthenticated attackers to discover and access these sensitive files, which include a full database dump and a zip archive of the site.
CWE-552 Dec 26, 2023
CVE-2023-5991 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.78
Motopress Hotel Booking Lite < 4.8.5 - Path Traversal
The Hotel Booking Lite WordPress plugin before 4.8.5 does not validate file paths provided via user input, as well as does not have proper CSRF and authorisation checks, allowing unauthenticated users to download and delete arbitrary files on the server
CWE-22 Dec 26, 2023
CVE-2023-51467 9.8 CRITICAL EXPLOITED 13 PoCs Analysis NUCLEI EPSS 0.94
Apache OFBiz XML-RPC Java Deserialization
The vulnerability permits attackers to circumvent authentication processes, enabling them to remotely execute arbitrary code
CWE-918 Dec 26, 2023
CVE-2023-50968 7.5 HIGH EXPLOITED NUCLEI EPSS 0.84
Apache Ofbiz < 18.12.11 - Information Disclosure
Arbitrary file properties reading vulnerability in Apache Software Foundation Apache OFBiz when user operates an uri call without authorizations. The same uri can be operated to realize a SSRF attack also without authorizations. Users are recommended to upgrade to version 18.12.11, which fixes this issue.
CWE-918 Dec 26, 2023