Vulnerabilities with Nuclei Scanner Templates
Updated 22m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2023-7028
10.0
CRITICAL
KEV
19 PoCs
Analysis
NUCLEI
EPSS 0.93
GitLab Password Reset Account Takeover
An issue has been discovered in GitLab CE/EE affecting all versions from 16.1 prior to 16.1.6, 16.2 prior to 16.2.9, 16.3 prior to 16.3.7, 16.4 prior to 16.4.5, 16.5 prior to 16.5.6, 16.6 prior to 16.6.4, and 16.7 prior to 16.7.2 in which user account password reset emails could be delivered to an unverified email address.
CWE-640
Jan 12, 2024
CVE-2023-6875
9.8
CRITICAL
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Wordpress POST SMTP Account Takeover
The POST SMTP Mailer – Email log, Delivery Failure Notifications and Best Mail SMTP for WordPress plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a type juggling issue on the connect-app REST endpoint in all versions up to, and including, 2.8.7. This makes it possible for unauthenticated attackers to reset the API key used to authenticate to the mailer and view logs, including password reset emails, allowing site takeover. CVE-2023-52233 appears to be a duplicate of this issue.
CWE-639
Jan 11, 2024
CVE-2023-6634
8.1
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
LearnPress <4.2.5.7 - Command Injection
The LearnPress plugin for WordPress is vulnerable to Command Injection in all versions up to, and including, 4.2.5.7 via the get_content function. This is due to the plugin making use of the call_user_func function with user input. This makes it possible for unauthenticated attackers to execute any public function with one parameter, which could result in remote code execution.
CWE-77
Jan 11, 2024
CVE-2023-6567
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.82
LearnPress <4.2.5.7 - SQL Injection
The LearnPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order_by’ parameter in all versions up to, and including, 4.2.5.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
Jan 11, 2024
CVE-2023-6266
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.27
WordPress Backup Migration <1.3.6 - Info Disclosure
The Backup Migration plugin for WordPress is vulnerable to unauthorized access of data due to insufficient path and file validation on the BMI_BACKUP case of the handle_downloading function in all versions up to, and including, 1.3.6. This makes it possible for unauthenticated attackers to download back-up files which can contain sensitive information such as user passwords, PII, database credentials, and much more.
CWE-200
Jan 11, 2024
CVE-2023-48728
9.6
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.17
WWBN AVideo <11.6 - XSS
A cross-site scripting (xss) vulnerability exists in the functiongetOpenGraph videoName functionality of WWBN AVideo 11.6 and dev master commit 3c6bb3ff. A specially crafted HTTP request can lead to arbitrary Javascript execution. An attacker can get a user to visit a webpage to trigger this vulnerability.
CWE-79
Jan 10, 2024
CVE-2023-31446
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.93
Cassia Gateway firmware - Code Injection
In Cassia Gateway firmware XC1000_2.1.1.2303082218 and XC2000_2.1.1.2303090947, the queueUrl parameter in /bypass/config is not sanitized. This leads to injecting Bash code and executing it with root privileges on device startup.
CWE-77
Jan 10, 2024
CVE-2023-6505
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.74
Migrate WP <1.9.3 - Path Traversal
The Migrate WordPress Website & Backups WordPress plugin before 1.9.3 does not prevent directory listing in sensitive directories containing export files.
Jan 08, 2024
CVE-2023-47211
9.1
CRITICAL
NUCLEI
EPSS 0.76
Zohocorp Manageengine Firewall Analyzer < 12.7 - Path Traversal
A directory traversal vulnerability exists in the uploadMib functionality of ManageEngine OpManager 12.7.258. A specially crafted HTTP request can lead to arbitrary file creation. An attacker can send a malicious MiB file to trigger this vulnerability.
CWE-22
Jan 08, 2024
CVE-2023-50094
8.8
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.89
Yogeshojha Rengine < 2.0.2 - OS Command Injection
reNgine before 2.1.2 allows OS Command Injection if an adversary has a valid session ID. The attack places shell metacharacters in an api/tools/waf_detector/?url= string. The commands are executed as root via subprocess.check_output.
CWE-78
Jan 01, 2024
CVE-2023-6421
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.81
WordPress Download Mgr <3.2.83 - Info Disclosure
The Download Manager WordPress plugin before 3.2.83 does not protect file download's passwords, leaking it upon receiving an invalid one.
CWE-522
Jan 01, 2024
CVE-2023-6000
6.1
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.69
Sygnoos Popup Builder < 4.2.3 - XSS
The Popup Builder WordPress plugin before 4.2.3 does not prevent simple visitors from updating existing popups, and injecting raw JavaScript in them, which could lead to Stored XSS attacks.
CWE-79
Jan 01, 2024
CVE-2023-50578
9.8
CRITICAL
1 PoC
NUCLEI
EPSS 0.32
Mingsoft Mcms - SQL Injection
Mingsoft MCMS v5.2.9 was discovered to contain a SQL injection vulnerability via the categoryType parameter at /content/list.do.
CWE-89
Dec 30, 2023
CVE-2023-52085
3.3
LOW
1 Writeup
NUCLEI
EPSS 0.40
Winter <1.2.3 - Local File Inclusion
Winter is a free, open-source content management system. Users with access to backend forms that include a ColorPicker FormWidget can provide a value that would then be included without further processing in the compilation of custom stylesheets via LESS. This had the potential to lead to a Local File Inclusion vulnerability. This issue has been patched in v1.2.4.
CWE-22
Dec 29, 2023
CVE-2023-49230
8.8
HIGH
NUCLEI
EPSS 0.31
Peplink Balance Two <8.4.0 - Auth Bypass
An issue was discovered in Peplink Balance Two before 8.4.0. A missing authorization check in captive portals allows attackers to modify the portals' configurations without prior authentication.
CWE-862
Dec 28, 2023
CVE-2023-7116
6.3
MEDIUM
NUCLEI
EPSS 0.52
Datax-web - OS Command Injection
A vulnerability, which was classified as critical, has been found in WeiYe-Jing datax-web 2.1.2. Affected by this issue is some unknown functionality of the file /api/log/killJob of the component HTTP POST Request Handler. The manipulation of the argument processId leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-249086 is the identifier assigned to this vulnerability.
CWE-78
Dec 27, 2023
CVE-2023-6114
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.61
Duplicator <1.5.7.1-4.5.14.2 - Info Disclosure
The Duplicator WordPress plugin before 1.5.7.1, Duplicator Pro WordPress plugin before 4.5.14.2 does not disallow listing the `backups-dup-lite/tmp` directory (or the `backups-dup-pro/tmp` directory in the Pro version), which temporarily stores files containing sensitive data. When directory listing is enabled in the web server, this allows unauthenticated attackers to discover and access these sensitive files, which include a full database dump and a zip archive of the site.
CWE-552
Dec 26, 2023
CVE-2023-5991
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.78
Motopress Hotel Booking Lite < 4.8.5 - Path Traversal
The Hotel Booking Lite WordPress plugin before 4.8.5 does not validate file paths provided via user input, as well as does not have proper CSRF and authorisation checks, allowing unauthenticated users to download and delete arbitrary files on the server
CWE-22
Dec 26, 2023
CVE-2023-51467
9.8
CRITICAL
EXPLOITED
13 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache OFBiz XML-RPC Java Deserialization
The vulnerability permits attackers to circumvent authentication processes, enabling them to remotely execute arbitrary code
CWE-918
Dec 26, 2023
CVE-2023-50968
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.84
Apache Ofbiz < 18.12.11 - Information Disclosure
Arbitrary file properties reading vulnerability in Apache Software Foundation Apache OFBiz when user operates an uri call without authorizations.
The same uri can be operated to realize a SSRF attack also without authorizations.
Users are recommended to upgrade to version 18.12.11, which fixes this issue.
CWE-918
Dec 26, 2023