Vulnerabilities with Nuclei Scanner Templates

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
4,077 results Clear all
CVE-2023-4666 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.76
The Form Maker <1.15.20 - RCE
The Form Maker by 10Web WordPress plugin before 1.15.20 does not validate signatures when creating them on the server from user input, allowing unauthenticated users to create arbitrary files and lead to RCE
Oct 16, 2023
CVE-2023-45855 7.5 HIGH 1 Writeup NUCLEI EPSS 0.79
qdPM 9.2 - Path Traversal
qdPM 9.2 allows Directory Traversal to list files and directories by navigating to the /uploads URI.
CWE-22 Oct 14, 2023
CVE-2023-45852 9.8 CRITICAL EXPLOITED 1 Writeup NUCLEI EPSS 0.94
Viessmann Vitogate 300 Firmware < 2.1.3.0 - Command Injection
In Vitogate 300 2.1.3.0, /cgi-bin/vitogate.cgi allows an unauthenticated attacker to bypass authentication and execute arbitrary commands via shell metacharacters in the ipaddr params JSON data for the put method.
CWE-77 Oct 14, 2023
CVE-2023-5556 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.27
Structurizr On-premises Installation < 3194 - XSS
Cross-site Scripting (XSS) - Reflected in GitHub repository structurizr/onpremises prior to 3194.
CWE-79 Oct 12, 2023
CVE-2023-45648 5.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.59
Apache Tomcat < 8.5.94 - Improper Input Validation
Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue.
CWE-20 Oct 10, 2023
CVE-2023-41763 5.3 MEDIUM KEV NUCLEI EPSS 0.16
Microsoft Skype For Business Server - SSRF
Skype for Business Elevation of Privilege Vulnerability
CWE-918 Oct 10, 2023
CVE-2023-34993 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.87
Fortinet Fortiwlm < 8.5.4 - OS Command Injection
A improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specifically crafted http get request parameters.
CWE-78 Oct 10, 2023
CVE-2023-4966 9.4 CRITICAL KEV RANSOMWARE 19 PoCs Analysis NUCLEI EPSS 0.94
Citrix Netscaler Application Delivery Controller - Memory Corruption
Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA  virtual server.
CWE-119 Oct 10, 2023
CVE-2023-44813 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.38
Moosocial - XSS
Cross Site Scripting (XSS) vulnerability in mooSocial v.3.1.8 allows a remote attacker to execute arbitrary code via a crafted payload to the mode parameter of the invite friend login function.
CWE-79 Oct 09, 2023
CVE-2023-44812 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.50
Moosocial - XSS
Cross Site Scripting (XSS) vulnerability in mooSocial v.3.1.8 allows a remote attacker to execute arbitrary code via a crafted payload to the admin_redirect_url parameter of the user login function.
CWE-79 Oct 09, 2023
CVE-2023-44393 9.3 CRITICAL 1 Writeup NUCLEI EPSS 0.06
Piwigo < 13.8.0 - Basic XSS
Piwigo is an open source photo gallery application. Prior to version 14.0.0beta4, a reflected cross-site scripting (XSS) vulnerability is in the` /admin.php?page=plugins&tab=new&installstatus=ok&plugin_id=[here]` page. This vulnerability can be exploited by an attacker to inject malicious HTML and JS code into the HTML page, which could then be executed by admin users when they visit the URL with the payload. The vulnerability is caused by the insecure injection of the `plugin_id` value from the URL into the HTML page. An attacker can exploit this vulnerability by crafting a malicious URL that contains a specially crafted `plugin_id` value. When a victim who is logged in as an administrator visits this URL, the malicious code will be injected into the HTML page and executed. This vulnerability can be exploited by any attacker who has access to a malicious URL. However, only users who are logged in as administrators are affected. This is because the vulnerability is only present on the `/admin.php?page=plugins&tab=new&installstatus=ok&plugin_id=[here]` page, which is only accessible to administrators. Version 14.0.0.beta4 contains a patch for this issue.
CWE-80 Oct 09, 2023
CVE-2023-43261 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
Milesight <v35.3.0.7 - Info Disclosure
An information disclosure in Milesight UR5X, UR32L, UR32, UR35, UR41 before v35.3.0.7 allows attackers to access sensitive router components.
CWE-532 Oct 04, 2023
CVE-2023-5375 6.1 MEDIUM 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.43
Mosparo < 1.0.2 - Open Redirect
Open Redirect in GitHub repository mosparo/mosparo prior to 1.0.2.
CWE-601 Oct 04, 2023
CVE-2023-44012 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.15
mojoPortal <2.7.0.0 - XSS
Cross Site Scripting vulnerability in mojoPortal v.2.7.0.0 allows a remote attacker to execute arbitrary code via the helpkey parameter in the Help.aspx component.
CWE-79 Oct 02, 2023
CVE-2023-43654 10.0 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
TorchServe <0.8.1 - RCE
TorchServe is a tool for serving and scaling PyTorch models in production. TorchServe default configuration lacks proper input validation, enabling third parties to invoke remote HTTP download requests and write files to the disk. This issue could be taken advantage of to compromise the integrity of the system and sensitive data. This issue is present in versions 0.1.0 to 0.8.1. A user is able to load the model of their choice from any URL that they would like to use. The user of TorchServe is responsible for configuring both the allowed_urls and specifying the model URL to be used. A pull request to warn the user when the default value for allowed_urls is used has been merged in PR #2534. TorchServe release 0.8.2 includes this change. Users are advised to upgrade. There are no known workarounds for this issue.
CWE-918 Sep 28, 2023
CVE-2023-43662 8.6 HIGH 1 Writeup NUCLEI EPSS 0.92
ShokoServer - Info Disclosure
ShokoServer is a media server which specializes in organizing anime. In affected versions the `/api/Image/WithPath` endpoint is accessible without authentication and is supposed to return default server images. The endpoint accepts the parameter `serverImagePath`, which is not sanitized in any way before being passed to `System.IO.File.OpenRead`, which results in an arbitrary file read. This issue may lead to an arbitrary file read which is exacerbated in the windows installer which installs the ShokoServer as administrator. Any unauthenticated attacker may be able to access sensitive information and read files stored on the server. The `/api/Image/WithPath` endpoint has been removed in commit `6c57ba0f0` which will be included in subsequent releases. Users should limit access to the `/api/Image/WithPath` endpoint or manually patch their installations until a patched release is made. This issue was discovered by the GitHub Security lab and is also indexed as GHSL-2023-191.
CWE-22 Sep 28, 2023
CVE-2023-43323 6.5 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.81
mooSocial 3.1.8 - SSRF
mooSocial 3.1.8 is vulnerable to external service interaction on post function. When executed, the server sends a HTTP and DNS request to external server. The Parameters effected are multiple - messageText, data[wall_photo], data[userShareVideo] and data[userShareLink].
CWE-15 Sep 28, 2023
CVE-2023-5244 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.29
Microweber < 2.0 - XSS
Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 2.0.
CWE-79 Sep 28, 2023
CVE-2023-5222 6.3 MEDIUM EXPLOITED 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.90
Viessmann Vitogate 300 <2.1.3.0 - Hard-Coded Password
A vulnerability classified as critical was found in Viessmann Vitogate 300 up to 2.1.3.0. This vulnerability affects the function isValidUser of the file /cgi-bin/vitogate.cgi of the component Web Management Interface. The manipulation leads to use of hard-coded password. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-240364. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-259 Sep 27, 2023
CVE-2023-43187 9.8 CRITICAL 1 Writeup NUCLEI EPSS 0.88
NodeBB <1.18.6 - RCE
A remote code execution (RCE) vulnerability in the xmlrpc.php endpoint of NodeBB Inc NodeBB forum software prior to v1.18.6 allows attackers to execute arbitrary code via crafted XML-RPC requests.
CWE-91 Sep 27, 2023