Vulnerabilities with Nuclei Scanner Templates

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
4,077 results Clear all
CVE-2023-6568 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.33
mlflow/mlflow - XSS
A reflected Cross-Site Scripting (XSS) vulnerability exists in the mlflow/mlflow repository, specifically within the handling of the Content-Type header in POST requests. An attacker can inject malicious JavaScript code into the Content-Type header, which is then improperly reflected back to the user without adequate sanitization or escaping, leading to arbitrary JavaScript execution in the context of the victim's browser. The vulnerability is present in the mlflow/server/auth/__init__.py file, where the user-supplied Content-Type header is directly injected into a Python formatted string and returned to the user, facilitating the XSS attack.
CWE-79 Dec 07, 2023
CVE-2023-49070 9.8 CRITICAL EXPLOITED 8 PoCs Analysis NUCLEI EPSS 0.94
Apache Ofbiz <18.12.10 - RCE
Pre-auth RCE in Apache Ofbiz 18.12.09. It's due to XML-RPC no longer maintained still present. This issue affects Apache OFBiz: before 18.12.10.  Users are recommended to upgrade to version 18.12.10
CWE-94 Dec 05, 2023
CVE-2023-43472 7.5 HIGH NUCLEI EPSS 0.74
MLFlow <2.8.1 - Info Disclosure
An issue in MLFlow versions 2.8.1 and before allows a remote attacker to obtain sensitive information via a crafted request to REST API.
Dec 05, 2023
CVE-2023-6063 7.5 HIGH 6 PoCs Analysis NUCLEI EPSS 0.92
WordPress WP Fastest Cache Unauthenticated SQLi (CVE-2023-6063)
The WP Fastest Cache WordPress plugin before 1.2.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users.
CWE-89 Dec 04, 2023
CVE-2023-6360 8.6 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.85
WordPress My Calendar <3.4.22 - SQL Injection
The 'My Calendar' WordPress Plugin, version < 3.4.22 is affected by an unauthenticated SQL injection vulnerability in the 'from' and 'to' parameters in the '/my-calendar/v1/events' rest route.
CWE-89 Nov 30, 2023
CVE-2023-40211 7.5 HIGH EXPLOITED NUCLEI EPSS 0.37
Pickplugins Post Grid Combo < 2.2.51 - Information Disclosure
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in PickPlugins Post Grid Combo – 36+ Gutenberg Blocks.This issue affects Post Grid Combo – 36+ Gutenberg Blocks: from n/a through 2.2.50.
CWE-200 Nov 30, 2023
CVE-2023-4220 8.1 HIGH EXPLOITED 32 PoCs Analysis NUCLEI EPSS 0.93
Chamilo v1.11.24 Unrestricted File Upload PHP Webshell
Unrestricted file upload in big file upload functionality in `/main/inc/lib/javascript/bigupload/inc/bigUpload.php` in Chamilo LMS <= v1.11.24 allows unauthenticated attackers to perform stored cross-site scripting attacks and obtain remote code execution via uploading of web shell.
CWE-434 Nov 28, 2023
CVE-2023-48023 9.1 CRITICAL NUCLEI EPSS 0.89
Anyscale Ray - SSRF
Anyscale Ray 2.6.3 and 2.8.0 allows /log_proxy SSRF. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment
CWE-918 Nov 28, 2023
CVE-2023-48022 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
Anyscale Ray - SSRF
Anyscale Ray 2.6.3 and 2.8.0 allows a remote attacker to execute arbitrary code via the job submission API. NOTE: the vendor's position is that this report is irrelevant because Ray, as stated in its documentation, is not intended for use outside of a strictly controlled network environment. (Also, within that environment, customers at version 2.52.0 and later can choose to use token authentication.)
CWE-918 Nov 28, 2023
CVE-2023-3368 9.8 CRITICAL EXPLOITED 1 Writeup NUCLEI EPSS 0.89
Chamilo LMS <= 1.11.20 - Command Injection
Command injection in `/main/webservices/additional_webservices.php` in Chamilo LMS <= v1.11.20 allows unauthenticated attackers to obtain remote code execution via improper neutralisation of special characters. This is a bypass of CVE-2023-34960.
CWE-78 Nov 28, 2023
CVE-2023-6329 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Control iD iDSecure Authentication Bypass (CVE-2023-6329)
An authentication bypass vulnerability exists in Control iD iDSecure v4.7.32.0. The login routine used by iDS-Core.dll contains a "passwordCustom" option that allows an unauthenticated attacker to compute valid credentials that can be used to bypass authentication and act as an administrative user.
CWE-287 Nov 27, 2023
CVE-2023-5974 9.8 CRITICAL NUCLEI EPSS 0.82
Wpb Show Core < 2.2 - SSRF
The WPB Show Core WordPress plugin through 2.2 is vulnerable to server-side request forgery (SSRF) via the `path` parameter.
CWE-918 Nov 27, 2023
CVE-2023-5559 9.1 CRITICAL EXPLOITED NUCLEI EPSS 0.52
10web Booster < 2.24.18 - Denial of Service
The 10Web Booster WordPress plugin before 2.24.18 does not validate the option name given to some AJAX actions, allowing unauthenticated users to delete arbitrary options from the database, leading to denial of service.
Nov 27, 2023
CVE-2023-6275 3.5 LOW 2 PoCs Analysis NUCLEI EPSS 0.52
TOTVS Fluig Platform <1.7.1 - XSS
A vulnerability was found in TOTVS Fluig Platform 1.6.x/1.7.x/1.8.0/1.8.1. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /mobileredir/openApp.jsp of the component mobileredir. The manipulation of the argument redirectUrl/user with the input "><script>alert(document.domain)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.7.1-231128, 1.8.0-231127 and 1.8.1-231127 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-246104.
CWE-79 Nov 24, 2023
CVE-2023-5815 8.1 HIGH EXPLOITED NUCLEI EPSS 0.43
Infornweb News & Blog Designer Pack < 3.4.1 - Remote Code Execution
The News & Blog Designer Pack – WordPress Blog Plugin — (Blog Post Grid, Blog Post Slider, Blog Post Carousel, Blog Post Ticker, Blog Post Masonry) plugin for WordPress is vulnerable to Remote Code Execution via Local File Inclusion in all versions up to, and including, 3.4.1 via the bdp_get_more_post function hooked via a nopriv AJAX. This is due to function utilizing an unsafe extract() method to extract values from the POST variable and passing that input to the include() function. This makes it possible for unauthenticated attackers to include arbitrary PHP files and achieve remote code execution. On vulnerable Docker configurations it may be possible for an attacker to create a PHP file and then subsequently include it to achieve RCE.
CWE-98 Nov 22, 2023
CVE-2023-49103 10.0 CRITICAL KEV 4 PoCs Analysis NUCLEI EPSS 0.94
ownCloud Phpinfo Reader
An issue was discovered in ownCloud owncloud/graphapi 0.2.x before 0.2.1 and 0.3.x before 0.3.1. The graphapi app relies on a third-party GetPhpInfo.php library that provides a URL. When this URL is accessed, it reveals the configuration details of the PHP environment (phpinfo). This information includes all the environment variables of the webserver. In containerized deployments, these environment variables may include sensitive data such as the ownCloud admin password, mail server credentials, and license key. Simply disabling the graphapi app does not eliminate the vulnerability. Additionally, phpinfo exposes various other potentially sensitive configuration details that could be exploited by an attacker to gather information about the system. Therefore, even if ownCloud is not running in a containerized environment, this vulnerability should still be a cause for concern. Note that Docker containers from before February 2023 are not vulnerable to the credential disclosure.
CWE-200 Nov 21, 2023
CVE-2023-47643 3.1 LOW EXPLOITED 1 Writeup NUCLEI EPSS 0.50
Salesagility Suitecrm - Information Disclosure
SuiteCRM is a Customer Relationship Management (CRM) software application. Prior to version 8.4.2, Graphql Introspection is enabled without authentication, exposing the scheme defining all object types, arguments, and functions. An attacker can obtain the GraphQL schema and understand the entire attack surface of the API, including sensitive fields such as UserHash. This issue is patched in version 8.4.2. There are no known workarounds.
CWE-200 Nov 21, 2023
CVE-2023-38879 7.5 HIGH 1 Writeup NUCLEI EPSS 0.11
openSIS Classic <9.0 - Path Traversal
The Community Edition version 9.0 of OS4ED's openSIS Classic allows remote attackers to read arbitrary files via a directory traversal vulnerability in the 'filename' parameter of 'DownloadWindow.php'.
CWE-22 Nov 20, 2023
CVE-2023-48241 7.5 HIGH 1 Writeup NUCLEI EPSS 0.69
Xwiki < 14.10.5 - Improper Authorization
XWiki Platform is a generic wiki platform. Starting in version 6.3-milestone-2 and prior to versions 14.10.15, 15.5.1, and 15.6RC1, the Solr-based search suggestion provider that also duplicates as generic JavaScript API for search results in XWiki exposes the content of all documents of all wikis to anybody who has access to it, by default it is public. This exposes all information stored in the wiki (but not some protected information like password hashes). While there is a right check normally, the right check can be circumvented by explicitly requesting fields from Solr that don't include the data for the right check. This has been fixed in XWiki 15.6RC1, 15.5.1 and 14.10.15 by not listing documents whose rights cannot be checked. No known workarounds are available.
CWE-285 Nov 20, 2023
CVE-2023-43177 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.77
CrushFTP Unauthenticated RCE
CrushFTP prior to 10.5.1 is vulnerable to Improperly Controlled Modification of Dynamically-Determined Object Attributes.
CWE-913 Nov 18, 2023