Vulnerabilities with Nuclei Scanner Templates
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2023-5863
6.1
MEDIUM
1 Writeup
NUCLEI
EPSS 0.06
Phpmyfaq < 3.2.2 - XSS
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.2.
CWE-79
Oct 31, 2023
CVE-2023-45671
4.7
MEDIUM
NUCLEI
EPSS 0.32
Frigate < 0.13.0 - XSS
Frigate is an open source network video recorder. Prior to version 0.13.0 Beta 3, there is a reflected cross-site scripting vulnerability in any API endpoints reliant on the `/<camera_name>` base path as values provided for the path are not sanitized. Exploiting this vulnerability requires the attacker to both know very specific information about a user's Frigate server and requires an authenticated user to be tricked into clicking a specially crafted link to their Frigate instance. This vulnerability could exploited by an attacker under the following circumstances: Frigate publicly exposed to the internet (even with authentication); attacker knows the address of a user's Frigate instance; attacker crafts a specialized page which links to the user's Frigate instance; attacker finds a way to get an authenticated user to visit their specialized page and click the button/link. As the reflected values included in the URL are not sanitized or escaped, this permits execution arbitrary Javascript payloads. Version 0.13.0 Beta 3 contains a patch for this issue.
CWE-79
Oct 30, 2023
CVE-2023-5830
7.3
HIGH
EXPLOITED
NUCLEI
EPSS 0.91
Documentlocator Document Locator < 7.2 - Authentication Bypass
A vulnerability classified as critical has been found in ColumbiaSoft Document Locator. This affects an unknown part of the file /api/authentication/login of the component WebTools. The manipulation of the argument Server leads to improper authentication. It is possible to initiate the attack remotely. Upgrading to version 7.2 SP4 and 2021.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-243729 was assigned to this vulnerability.
CWE-287
Oct 27, 2023
CVE-2023-46818
7.2
HIGH
12 PoCs
Analysis
NUCLEI
EPSS 0.89
ISPConfig language_edit.php PHP Code Injection
An issue was discovered in ISPConfig before 3.2.11p1. PHP code injection can be achieved in the language file editor by an admin if admin_allow_langedit is enabled.
CWE-94
Oct 27, 2023
CVE-2023-46747
9.8
CRITICAL
KEV
RANSOMWARE
13 PoCs
Analysis
NUCLEI
EPSS 0.94
BIG-IP - Auth Bypass
Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
CWE-306
Oct 26, 2023
CVE-2023-43208
9.8
CRITICAL
KEV
RANSOMWARE
15 PoCs
Analysis
NUCLEI
EPSS 0.94
NextGen Healthcare Mirth Connect <4.4.1 - RCE
NextGen Healthcare Mirth Connect before version 4.4.1 is vulnerable to unauthenticated remote code execution. Note that this vulnerability is caused by the incomplete patch of CVE-2023-37679.
CWE-78
Oct 26, 2023
CVE-2023-45136
9.6
CRITICAL
1 Writeup
NUCLEI
EPSS 0.75
Xwiki < 14.10.12 - XSS
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. When document names are validated according to a name strategy (disabled by default), XWiki starting in version 12.0-rc-1 and prior to versions 12.10.12 and 15.5-rc-1 is vulnerable to a reflected cross-site scripting attack in the page creation form. This allows an attacker to execute arbitrary actions with the rights of the user opening the malicious link. Depending on the rights of the user, this may allow remote code execution and full read and write access to the whole XWiki installation. This has been patched in XWiki 14.10.12 and 15.5-rc-1 by adding appropriate escaping. The vulnerable template file `createinline.vm` is part of XWiki's WAR and can be patched by manually applying the changes from the fix.
CWE-79
Oct 25, 2023
CVE-2023-46574
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.93
TOTOLINK A3700R <9.1.2u.6165_20211012 - RCE
An issue in TOTOLINK A3700R v.9.1.2u.6165_20211012 allows a remote attacker to execute arbitrary code via the FileName parameter of the UploadFirmwareFile function.
CWE-77
Oct 25, 2023
CVE-2023-46347
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.76
NDK Design for PrestaShop <1.5.6 - SQL Injection
In the module "Step by Step products Pack" (ndk_steppingpack) version 1.5.6 and before from NDK Design for PrestaShop, a guest can perform SQL injection. The method `NdkSpack::getPacks()` has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection.
CWE-89
Oct 25, 2023
CVE-2023-43795
8.6
HIGH
EXPLOITED
NUCLEI
EPSS 0.89
GeoServer - SSRF
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. The OGC Web Processing Service (WPS) specification is designed to process information from any server using GET and POST requests. This presents the opportunity for Server Side Request Forgery. This vulnerability has been patched in version 2.22.5 and 2.23.2.
CWE-918
Oct 25, 2023
CVE-2023-34048
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.93
vCenter Server - Memory Corruption
vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.
CWE-787
Oct 25, 2023
CVE-2023-38194
6.1
MEDIUM
NUCLEI
EPSS 0.04
SuperWebMailer 9.00.0.01710 - XSS
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows keepalive.php XSS via a GET parameter.
CWE-79
Oct 21, 2023
CVE-2023-38192
6.1
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.05
SuperWebMailer 9.00.0.01710 - XSS
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows superadmincreate.php XSS via crafted incorrect passwords.
CWE-79
Oct 21, 2023
CVE-2023-45826
6.5
MEDIUM
1 Writeup
NUCLEI
EPSS 0.28
Leantime < 2.4 - SQL Injection
Leantime is an open source project management system. A 'userId' variable in `app/domain/files/repositories/class.files.php` is not parameterized. An authenticated attacker can send a carefully crafted POST request to `/api/jsonrpc` to exploit an SQL injection vulnerability. Confidentiality is impacted as it allows for dumping information from the database. This issue has been addressed in version 2.4-beta-4. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-89
Oct 19, 2023
CVE-2023-5204
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.87
Quantumcloud Wpbot < 4.9.1 - SQL Injection
The ChatBot plugin for WordPress is vulnerable to SQL Injection via the $strid parameter in versions up to, and including, 4.8.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
Oct 19, 2023
CVE-2023-45375
8.8
HIGH
NUCLEI
EPSS 0.88
01generator Pireospay < 1.7.10 - SQL Injection
In the module "PireosPay" (pireospay) before version 1.7.10 from 01generator.com for PrestaShop, a guest can perform SQL injection via `PireosPayValidationModuleFrontController::postProcess().`
CWE-89
Oct 17, 2023
CVE-2023-45542
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.43
Moosocial - XSS
Cross Site Scripting vulnerability in mooSocial 3.1.8 allows a remote attacker to obtain sensitive information via a crafted script to the q parameter in the Search function.
CWE-79
Oct 16, 2023
CVE-2023-5561
5.3
MEDIUM
3 PoCs
Analysis
NUCLEI
EPSS 0.53
WordPress - Info Disclosure
WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack
Oct 16, 2023
CVE-2023-5089
5.3
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.83
Defender Security WP <4.1.0 - Auth Bypass
The Defender Security WordPress plugin before 4.1.0 does not prevent redirects to the login page via the auth_redirect WordPress function, allowing an unauthenticated visitor to access the login page, even when the hide login page functionality of the plugin is enabled.
Oct 16, 2023
CVE-2023-5003
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.78
WordPress <4.1.10 - Info Disclosure
The Active Directory Integration / LDAP Integration WordPress plugin before 4.1.10 stores sensitive LDAP logs in a buffer file when an administrator wants to export said logs. Unfortunately, this log file is never removed, and remains accessible to any users knowing the URL to do so.
Oct 16, 2023