Vulnerabilities with Nuclei Scanner Templates

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
4,077 results Clear all
CVE-2023-5863 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.06
Phpmyfaq < 3.2.2 - XSS
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.2.
CWE-79 Oct 31, 2023
CVE-2023-45671 4.7 MEDIUM NUCLEI EPSS 0.32
Frigate < 0.13.0 - XSS
Frigate is an open source network video recorder. Prior to version 0.13.0 Beta 3, there is a reflected cross-site scripting vulnerability in any API endpoints reliant on the `/<camera_name>` base path as values provided for the path are not sanitized. Exploiting this vulnerability requires the attacker to both know very specific information about a user's Frigate server and requires an authenticated user to be tricked into clicking a specially crafted link to their Frigate instance. This vulnerability could exploited by an attacker under the following circumstances: Frigate publicly exposed to the internet (even with authentication); attacker knows the address of a user's Frigate instance; attacker crafts a specialized page which links to the user's Frigate instance; attacker finds a way to get an authenticated user to visit their specialized page and click the button/link. As the reflected values included in the URL are not sanitized or escaped, this permits execution arbitrary Javascript payloads. Version 0.13.0 Beta 3 contains a patch for this issue.
CWE-79 Oct 30, 2023
CVE-2023-5830 7.3 HIGH EXPLOITED NUCLEI EPSS 0.91
Documentlocator Document Locator < 7.2 - Authentication Bypass
A vulnerability classified as critical has been found in ColumbiaSoft Document Locator. This affects an unknown part of the file /api/authentication/login of the component WebTools. The manipulation of the argument Server leads to improper authentication. It is possible to initiate the attack remotely. Upgrading to version 7.2 SP4 and 2021.1 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-243729 was assigned to this vulnerability.
CWE-287 Oct 27, 2023
CVE-2023-46818 7.2 HIGH 12 PoCs Analysis NUCLEI EPSS 0.89
ISPConfig language_edit.php PHP Code Injection
An issue was discovered in ISPConfig before 3.2.11p1. PHP code injection can be achieved in the language file editor by an admin if admin_allow_langedit is enabled.
CWE-94 Oct 27, 2023
CVE-2023-46747 9.8 CRITICAL KEV RANSOMWARE 13 PoCs Analysis NUCLEI EPSS 0.94
BIG-IP - Auth Bypass
Undisclosed requests may bypass configuration utility authentication, allowing an attacker with network access to the BIG-IP system through the management port and/or self IP addresses to execute arbitrary system commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
CWE-306 Oct 26, 2023
CVE-2023-43208 9.8 CRITICAL KEV RANSOMWARE 15 PoCs Analysis NUCLEI EPSS 0.94
NextGen Healthcare Mirth Connect <4.4.1 - RCE
NextGen Healthcare Mirth Connect before version 4.4.1 is vulnerable to unauthenticated remote code execution. Note that this vulnerability is caused by the incomplete patch of CVE-2023-37679.
CWE-78 Oct 26, 2023
CVE-2023-45136 9.6 CRITICAL 1 Writeup NUCLEI EPSS 0.75
Xwiki < 14.10.12 - XSS
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. When document names are validated according to a name strategy (disabled by default), XWiki starting in version 12.0-rc-1 and prior to versions 12.10.12 and 15.5-rc-1 is vulnerable to a reflected cross-site scripting attack in the page creation form. This allows an attacker to execute arbitrary actions with the rights of the user opening the malicious link. Depending on the rights of the user, this may allow remote code execution and full read and write access to the whole XWiki installation. This has been patched in XWiki 14.10.12 and 15.5-rc-1 by adding appropriate escaping. The vulnerable template file `createinline.vm` is part of XWiki's WAR and can be patched by manually applying the changes from the fix.
CWE-79 Oct 25, 2023
CVE-2023-46574 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.93
TOTOLINK A3700R <9.1.2u.6165_20211012 - RCE
An issue in TOTOLINK A3700R v.9.1.2u.6165_20211012 allows a remote attacker to execute arbitrary code via the FileName parameter of the UploadFirmwareFile function.
CWE-77 Oct 25, 2023
CVE-2023-46347 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.76
NDK Design for PrestaShop <1.5.6 - SQL Injection
In the module "Step by Step products Pack" (ndk_steppingpack) version 1.5.6 and before from NDK Design for PrestaShop, a guest can perform SQL injection. The method `NdkSpack::getPacks()` has sensitive SQL calls that can be executed with a trivial http call and exploited to forge a SQL injection.
CWE-89 Oct 25, 2023
CVE-2023-43795 8.6 HIGH EXPLOITED NUCLEI EPSS 0.89
GeoServer - SSRF
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. The OGC Web Processing Service (WPS) specification is designed to process information from any server using GET and POST requests. This presents the opportunity for Server Side Request Forgery. This vulnerability has been patched in version 2.22.5 and 2.23.2.
CWE-918 Oct 25, 2023
CVE-2023-34048 9.8 CRITICAL KEV NUCLEI EPSS 0.93
vCenter Server - Memory Corruption
vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.
CWE-787 Oct 25, 2023
CVE-2023-38194 6.1 MEDIUM NUCLEI EPSS 0.04
SuperWebMailer 9.00.0.01710 - XSS
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows keepalive.php XSS via a GET parameter.
CWE-79 Oct 21, 2023
CVE-2023-38192 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.05
SuperWebMailer 9.00.0.01710 - XSS
An issue was discovered in SuperWebMailer 9.00.0.01710. It allows superadmincreate.php XSS via crafted incorrect passwords.
CWE-79 Oct 21, 2023
CVE-2023-45826 6.5 MEDIUM 1 Writeup NUCLEI EPSS 0.28
Leantime < 2.4 - SQL Injection
Leantime is an open source project management system. A 'userId' variable in `app/domain/files/repositories/class.files.php` is not parameterized. An authenticated attacker can send a carefully crafted POST request to `/api/jsonrpc` to exploit an SQL injection vulnerability. Confidentiality is impacted as it allows for dumping information from the database. This issue has been addressed in version 2.4-beta-4. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-89 Oct 19, 2023
CVE-2023-5204 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.87
Quantumcloud Wpbot < 4.9.1 - SQL Injection
The ChatBot plugin for WordPress is vulnerable to SQL Injection via the $strid parameter in versions up to, and including, 4.8.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Oct 19, 2023
CVE-2023-45375 8.8 HIGH NUCLEI EPSS 0.88
01generator Pireospay < 1.7.10 - SQL Injection
In the module "PireosPay" (pireospay) before version 1.7.10 from 01generator.com for PrestaShop, a guest can perform SQL injection via `PireosPayValidationModuleFrontController::postProcess().`
CWE-89 Oct 17, 2023
CVE-2023-45542 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.43
Moosocial - XSS
Cross Site Scripting vulnerability in mooSocial 3.1.8 allows a remote attacker to obtain sensitive information via a crafted script to the q parameter in the Search function.
CWE-79 Oct 16, 2023
CVE-2023-5561 5.3 MEDIUM 3 PoCs Analysis NUCLEI EPSS 0.53
WordPress - Info Disclosure
WordPress does not properly restrict which user fields are searchable via the REST API, allowing unauthenticated attackers to discern the email addresses of users who have published public posts on an affected website via an Oracle style attack
Oct 16, 2023
CVE-2023-5089 5.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.83
Defender Security WP <4.1.0 - Auth Bypass
The Defender Security WordPress plugin before 4.1.0 does not prevent redirects to the login page via the auth_redirect WordPress function, allowing an unauthenticated visitor to access the login page, even when the hide login page functionality of the plugin is enabled.
Oct 16, 2023
CVE-2023-5003 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.78
WordPress <4.1.10 - Info Disclosure
The Active Directory Integration / LDAP Integration WordPress plugin before 4.1.10 stores sensitive LDAP logs in a buffer file when an administrator wants to export said logs. Unfortunately, this log file is never removed, and remains accessible to any users knowing the URL to do so.
Oct 16, 2023