Vulnerabilities with Nuclei Scanner Templates

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
4,077 results Clear all
CVE-2023-44353 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.89
Adobe Coldfusion < 2021 - Insecure Deserialization
Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.
CWE-502 Nov 17, 2023
CVE-2023-44352 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.80
Adobe Coldfusion < 2021 - XSS
Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an unauthenticated attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
CWE-79 Nov 17, 2023
CVE-2023-26347 7.5 HIGH EXPLOITED NUCLEI EPSS 0.83
Adobe ColdFusion <2023.5-2021.11 - Auth Bypass
Adobe ColdFusion versions 2023.5 (and earlier) and 2021.11 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An unauthenticated attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction.
CWE-284 Nov 17, 2023
CVE-2023-6020 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.81
Ray's <static> - Info Disclosure
LFI in Ray's /static/ directory allows attackers to read any file on the server without authentication.
CWE-862 Nov 16, 2023
CVE-2023-6038 7.5 HIGH EXPLOITED NUCLEI EPSS 0.63
h2o-3 <3.40.0.4 - LFI
A Local File Inclusion (LFI) vulnerability exists in the h2o-3 REST API, allowing unauthenticated remote attackers to read arbitrary files on the server with the permissions of the user running the h2o-3 instance. This issue affects the default installation and does not require user interaction. The vulnerability can be exploited by making specific GET or POST requests to the ImportFiles and ParseSetup endpoints, respectively. This issue was identified in version 3.40.0.4 of h2o-3.
CWE-862 Nov 16, 2023
CVE-2023-6021 7.5 HIGH NUCLEI EPSS 0.87
Ray's log API - LFI
LFI in Ray's log API endpoint allows attackers to read any file on the server without authentication. The issue is fixed in version 2.8.1+. Ray maintainers' response can be found here: https://www.anyscale.com/blog/update-on-ray-cves-cve-2023-6019-cve-2023-6020-cve-2023-6021-cve-2023-48022-cve-2023-48023
CWE-29 Nov 16, 2023
CVE-2023-6023 7.5 HIGH EXPLOITED NUCLEI EPSS 0.48
ModelDB - Info Disclosure
An attacker can read any file on the filesystem on the server hosting ModelDB through an LFI in the artifact_path URL parameter.
CWE-29 Nov 16, 2023
CVE-2023-6018 9.8 CRITICAL NUCLEI EPSS 0.91
MLflow - Unauthenticated File Overwrite
An attacker can overwrite any file on the server hosting MLflow without any authentication.
CWE-78 Nov 16, 2023
CVE-2023-41597 6.1 MEDIUM NUCLEI EPSS 0.11
EyouCms <1.6.2 - XSS
EyouCms v1.6.2 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the component /admin/twitter.php?active_t.
CWE-79 Nov 15, 2023
CVE-2023-45878 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.93
GibbonEdu Gibbon <25.0.1 - Arbitrary File Write
GibbonEdu Gibbon version 25.0.1 and before allows Arbitrary File Write because rubrics_visualise_saveAjax.phps does not require authentication. The endpoint accepts the img, path, and gibbonPersonID parameters. The img parameter is expected to be a base64 encoded image. If the path parameter is set, the defined path is used as the destination folder, concatenated with the absolute path of the installation directory. The content of the img parameter is base64 decoded and written to the defined file path. This allows creation of PHP files that permit Remote Code Execution (unauthenticated).
CWE-787 Nov 14, 2023
CVE-2023-47684 7.1 HIGH NUCLEI EPSS 0.02
Themepunch Essential Grid < 3.1.0 - XSS
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ThemePunch OHG Essential Grid plugin <= 3.1.0 versions.
CWE-79 Nov 14, 2023
CVE-2023-47117 7.5 HIGH 1 Writeup NUCLEI EPSS 0.66
Humansignal Label Studio < 1.9.2 - Information Disclosure
Label Studio is an open source data labeling tool. In all current versions of Label Studio prior to 1.9.2post0, the application allows users to insecurely set filters for filtering tasks. An attacker can construct a filter chain to filter tasks based on sensitive fields for all user accounts on the platform by exploiting Django's Object Relational Mapper (ORM). Since the results of query can be manipulated by the ORM filter, an attacker can leak these sensitive fields character by character. In addition, Label Studio had a hard coded secret key that an attacker can use to forge a session token of any user by exploiting this ORM Leak vulnerability to leak account password hashes. This vulnerability has been addressed in commit `f931d9d129` which is included in the 1.9.2post0 release. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-200 Nov 13, 2023
CVE-2023-47246 9.8 CRITICAL KEV RANSOMWARE 7 PoCs Analysis NUCLEI EPSS 0.94
Sysaid < 23.3.36 - Path Traversal
In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.
CWE-22 Nov 10, 2023
CVE-2023-39796 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.71
Wbce Cms - SQL Injection
SQL injection vulnerability in the miniform module in WBCE CMS v.1.6.0 allows remote unauthenticated attacker to execute arbitrary code via the DB_RECORD_TABLE parameter.
CWE-89 Nov 10, 2023
CVE-2023-47248 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.85
Apache Pyarrow < 14.0.0 - Insecure Deserialization
Deserialization of untrusted data in IPC and Parquet readers in PyArrow versions 0.14.0 to 14.0.0 allows arbitrary code execution. An application is vulnerable if it reads Arrow IPC, Feather or Parquet data from untrusted sources (for example user-supplied input files). This vulnerability only affects PyArrow, not other Apache Arrow implementations or bindings. It is recommended that users of PyArrow upgrade to 14.0.1. Similarly, it is recommended that downstream libraries upgrade their dependency requirements to PyArrow 14.0.1 or later. PyPI packages are already available, and we hope that conda-forge packages will be available soon. If it is not possible to upgrade, we provide a separate package `pyarrow-hotfix` that disables the vulnerability on older PyArrow versions. See https://pypi.org/project/pyarrow-hotfix/ for instructions.
CWE-502 Nov 09, 2023
CVE-2023-46732 9.6 CRITICAL EXPLOITED 1 Writeup NUCLEI EPSS 0.48
XWiki Platform - XSS
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki is vulnerable to reflected cross-site scripting (RXSS) via the `rev` parameter that is used in the content of the content menu without escaping. If an attacker can convince a user to visit a link with a crafted parameter, this allows the attacker to execute arbitrary actions in the name of the user, including remote code (Groovy) execution in the case of a user with programming right, compromising the confidentiality, integrity and availability of the whole XWiki installation. This has been patched in XWiki 15.6 RC1, 15.5.1 and 14.10.14. The patch in commit `04e325d57` can be manually applied without upgrading (or restarting) the instance. Users are advised to upgrade or to manually apply the patch. There are no known workarounds for this vulnerability.
CWE-79 Nov 06, 2023
CVE-2023-47253 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Qualitor < 8.20 - Command Injection
Qualitor through 8.20 allows remote attackers to execute arbitrary code via PHP code in the html/ad/adpesquisasql/request/processVariavel.php gridValoresPopHidden parameter.
CWE-77 Nov 06, 2023
CVE-2023-3277 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.45
Inspireui Mstore API < 4.10.7 - Privilege Escalation
The MStore API plugin for WordPress is vulnerable to Unauthorized Account Access and Privilege Escalation in versions up to, and including, 4.10.7 due to improper implementation of the Apple login feature. This allows unauthenticated attackers to log in as any user as long as they know the user's email address.
CWE-288 Nov 03, 2023
CVE-2023-34259 4.9 MEDIUM NUCLEI EPSS 0.93
Kyocera D-copia253mf Plus Firmware < 2vg_s000.002.561 - Path Traversal
Kyocera TASKalfa 4053ci printers through 2VG_S000.002.561 allow /wlmdeu%2f%2e%2e%2f%2e%2e directory traversal to read arbitrary files on the filesystem, even files that require root privileges. NOTE: this issue exists because of an incomplete fix for CVE-2020-23575.
CWE-22 Nov 03, 2023
CVE-2023-5360 9.8 CRITICAL EXPLOITED 12 PoCs Analysis NUCLEI EPSS 0.93
WordPress Royal Elementor Addons RCE
The Royal Elementor Addons and Templates WordPress plugin before 1.3.79 does not properly validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE.
CWE-434 Oct 31, 2023