Vulnerabilities with Nuclei Scanner Templates
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2023-40044
10.0
CRITICAL
KEV
RANSOMWARE
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Progress WS FTP Server < 8.7.4 - Insecure Deserialization
In WS_FTP Server versions prior to 8.7.4 and 8.8.2, a pre-authenticated attacker could leverage a .NET deserialization vulnerability in the Ad Hoc Transfer module to execute remote commands on the underlying WS_FTP Server operating system.
CWE-502
Sep 27, 2023
CVE-2023-43325
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.20
mooSocial <3.1.8 - XSS
A reflected cross-site scripting (XSS) vulnerability in the data[redirect_url] parameter of mooSocial v3.1.8 allows attackers to steal user's session cookies and impersonate their account via a crafted URL.
CWE-79
Sep 26, 2023
CVE-2023-43326
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.35
mooSocial <3.1.8 - XSS
A reflected cross-site scripting (XSS) vulnerability exisits in multiple url of mooSocial v3.1.8 allows attackers to steal user's session cookies and impersonate their account via a crafted URL.
CWE-79
Sep 25, 2023
CVE-2023-4521
9.8
CRITICAL
NUCLEI
EPSS 0.93
WordPress plugin <2.1.5 - RCE
The Import XML and RSS Feeds WordPress plugin before 2.1.5 contains a web shell, allowing unauthenticated attackers to perform RCE. The plugin/vendor was not compromised and the files are the result of running a PoC for a previously reported issue (https://wpscan.com/vulnerability/d4220025-2272-4d5f-9703-4b2ac4a51c42) and not deleting the created files when releasing the new version.
Sep 25, 2023
CVE-2023-4490
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.41
Wpjobportal WP Job Portal < 2.0.6 - SQL Injection
The WP Job Portal WordPress plugin before 2.0.6 does not sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users
Sep 25, 2023
CVE-2023-4148
6.1
MEDIUM
NUCLEI
EPSS 0.10
Metaphorcreations Ditty < 3.1.25 - XSS
The Ditty WordPress plugin before 3.1.25 does not sanitise and escape some parameters and generated URLs before outputting them back in attributes, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
CWE-79
Sep 25, 2023
CVE-2023-39677
7.5
HIGH
NUCLEI
EPSS 0.77
Simpleimportproduct - Information Disclosure
MyPrestaModules Prestashop Module v6.2.9 and UpdateProducts Prestashop Module v3.6.9 were discovered to contain a PHPInfo information disclosure vulnerability via send.php.
CWE-200
Sep 20, 2023
CVE-2023-38875
6.1
MEDIUM
1 Writeup
NUCLEI
EPSS 0.05
msaad1999's PHP-Login-System 2.0.1 - XSS
A reflected cross-site scripting (XSS) vulnerability in msaad1999's PHP-Login-System 2.0.1 allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'validator' parameter in '/reset-password'.
CWE-79
Sep 20, 2023
CVE-2023-43374
9.8
CRITICAL
NUCLEI
EPSS 0.17
Hoteldruid v3.0.5 - SQL Injection
Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the id_utente_log parameter at /hoteldruid/personalizza.php.
CWE-89
Sep 20, 2023
CVE-2023-43373
9.8
CRITICAL
NUCLEI
EPSS 0.17
Hoteldruid v3.0.5 - SQL Injection
Hoteldruid v3.0.5 was discovered to contain a SQL injection vulnerability via the n_utente_agg parameter at /hoteldruid/interconnessioni.php.
CWE-89
Sep 20, 2023
CVE-2023-5074
9.8
CRITICAL
EXPLOITED
1 PoC
NUCLEI
EPSS 0.93
D-Link D-View 8 <v2.0.1.28 - Auth Bypass
Use of a static key to protect a JWT token used in user authentication can allow an for an authentication bypass in D-Link D-View 8 v2.0.1.28
CWE-798
Sep 20, 2023
CVE-2023-40931
6.5
MEDIUM
3 PoCs
Analysis
NUCLEI
EPSS 0.86
Nagios XI <5.11.1 - SQL Injection
A SQL injection vulnerability in Nagios XI from version 5.11.0 up to and including 5.11.1 allows authenticated attackers to execute arbitrary SQL commands via the ID parameter in the POST request to /nagiosxi/admin/banner_message-ajaxhelper.php
CWE-89
Sep 19, 2023
CVE-2023-42793
9.8
CRITICAL
KEV
RANSOMWARE
19 PoCs
Analysis
NUCLEI
EPSS 0.93
Jetbrains Teamcity < 2023.05.4 - Missing Authentication
In JetBrains TeamCity before 2023.05.4 authentication bypass leading to RCE on TeamCity Server was possible
CWE-306
Sep 19, 2023
CVE-2023-41599
5.3
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.92
JFinalCMS <5.0.0 - Path Traversal
An issue in the component /common/DownController.java of JFinalCMS v5.0.0 allows attackers to execute a directory traversal.
CWE-22
Sep 19, 2023
CVE-2023-33831
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
FUXA 1.1.13 - RCE
A remote command execution (RCE) vulnerability in the /api/runscript endpoint of FUXA 1.1.13 allows attackers to execute arbitrary commands via a crafted POST request.
CWE-77
Sep 18, 2023
CVE-2023-38040
6.1
MEDIUM
NUCLEI
EPSS 0.08
Revive-adserver Revive Adserver < 5.4.1 - XSS
A reflected XSS vulnerability exists in Revive Adserver 5.4.1 and earlier versions..
CWE-79
Sep 17, 2023
CVE-2023-42442
8.2
HIGH
3 PoCs
Analysis
NUCLEI
EPSS 0.88
Fit2cloud Jumpserver < 3.5.5 - Authentication Bypass
JumpServer is an open source bastion host and a professional operation and maintenance security audit system. Starting in version 3.0.0 and prior to versions 3.5.5 and 3.6.4, session replays can download without authentication. Session replays stored in S3, OSS, or other cloud storage are not affected. The api `/api/v1/terminal/sessions/` permission control is broken and can be accessed anonymously. SessionViewSet permission classes set to `[RBACPermission | IsSessionAssignee]`, relation is or, so any permission matched will be allowed. Versions 3.5.5 and 3.6.4 have a fix. After upgrading, visit the api `$HOST/api/v1/terminal/sessions/?limit=1`. The expected http response code is 401 (`not_authenticated`).
CWE-287
Sep 15, 2023
CVE-2023-4974
6.3
MEDIUM
NUCLEI
EPSS 0.42
Creativeitem Academy Lms - SQL Injection
A vulnerability was found in Academy LMS 6.2. It has been rated as critical. Affected by this issue is some unknown functionality of the file /academy/tutor/filter of the component GET Parameter Handler. The manipulation of the argument price_min/price_max leads to sql injection. The attack may be launched remotely. VDB-239750 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-89
Sep 15, 2023
CVE-2023-4973
3.5
LOW
NUCLEI
EPSS 0.05
Creativeitem Academy Lms - XSS
A vulnerability was found in Academy LMS 6.2 on Windows. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /academy/tutor/filter of the component GET Parameter Handler. The manipulation of the argument searched_word/searched_tution_class_type[]/searched_price_type[]/searched_duration[] leads to cross site scripting. The attack can be launched remotely. The identifier VDB-239749 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-79
Sep 15, 2023
CVE-2023-40779
6.1
MEDIUM
NUCLEI
EPSS 0.34
IceWarp Mail Server Deep Castle 2 <v.13.0.1.2 - RCE
An issue in IceWarp Mail Server Deep Castle 2 v.13.0.1.2 allows a remote attacker to execute arbitrary code via a crafted request to the URL.
CWE-601
Sep 14, 2023