Vulnerabilities with Nuclei Scanner Templates

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,482 CVEs tracked 53,635 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,335 vendors 43,883 researchers
4,077 results Clear all
CVE-2023-38501 6.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.80
copyparty <1.8.7 - XSS
copyparty is file server software. Prior to version 1.8.7, the application contains a reflected cross-site scripting via URL-parameter `?k304=...` and `?setck=...`. The worst-case outcome of this is being able to move or delete existing files on the server, or upload new files, using the account of the person who clicks the malicious link. It is recommended to change the passwords of one's copyparty accounts, unless one have inspected one's logs and found no trace of attacks. Version 1.8.7 contains a patch for the issue.
CWE-79 Jul 25, 2023
CVE-2023-35078 9.8 CRITICAL KEV RANSOMWARE 7 PoCs Analysis NUCLEI EPSS 0.94
Ivanti Endpoint Manager Mobile < 11.8.1.1 - Authentication Bypass
An authentication bypass vulnerability in Ivanti EPMM allows unauthorized users to access restricted functionality or resources of the application without proper authentication.
CWE-287 Jul 25, 2023
CVE-2023-3849 3.5 LOW 1 PoC Analysis NUCLEI EPSS 0.08
mooSocial mooDating 1.2 - XSS
A vulnerability, which was classified as problematic, was found in mooSocial mooDating 1.2. Affected is an unknown function of the file /find-a-match of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The identifier of this vulnerability is VDB-235200. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
CWE-79 Jul 23, 2023
CVE-2023-3848 3.5 LOW 1 PoC Analysis NUCLEI EPSS 0.08
mooSocial mooDating 1.2 - XSS
A vulnerability, which was classified as problematic, has been found in mooSocial mooDating 1.2. This issue affects some unknown processing of the file /users/view of the component URL Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-235199. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
CWE-79 Jul 23, 2023
CVE-2023-3847 3.5 LOW 1 PoC Analysis NUCLEI EPSS 0.10
mooSocial mooDating 1.2 - XSS
A vulnerability classified as problematic was found in mooSocial mooDating 1.2. This vulnerability affects unknown code of the file /users of the component URL Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. VDB-235198 is the identifier assigned to this vulnerability. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
CWE-79 Jul 23, 2023
CVE-2023-3846 3.5 LOW 1 PoC Analysis NUCLEI EPSS 0.08
mooSocial mooDating 1.2 - XSS
A vulnerability classified as problematic has been found in mooSocial mooDating 1.2. This affects an unknown part of the file /pages of the component URL Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The identifier VDB-235197 was assigned to this vulnerability. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
CWE-79 Jul 23, 2023
CVE-2023-3845 3.5 LOW 1 PoC Analysis NUCLEI EPSS 0.08
mooSocial mooDating 1.2 - XSS
A vulnerability was found in mooSocial mooDating 1.2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /friends/ajax_invite of the component URL Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The identifier of this vulnerability is VDB-235196. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
CWE-79 Jul 23, 2023
CVE-2023-3844 3.5 LOW 1 PoC Analysis NUCLEI EPSS 0.08
mooSocial mooDating 1.2 - XSS
A vulnerability was found in mooSocial mooDating 1.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /friends of the component URL Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The associated identifier of this vulnerability is VDB-235195. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
CWE-79 Jul 23, 2023
CVE-2023-3843 3.5 LOW 1 PoC Analysis NUCLEI EPSS 0.08
mooSocial mooDating 1.2 - XSS
A vulnerability was found in mooSocial mooDating 1.2. It has been classified as problematic. Affected is an unknown function of the file /matchmakings/question of the component URL Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. VDB-235194 is the identifier assigned to this vulnerability. NOTE: We tried to contact the vendor early about the disclosure but the official mail address was not working properly.
CWE-79 Jul 23, 2023
CVE-2023-3836 6.3 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Dahua Smart Park Management <20230713 - Unrestricted Upload
A vulnerability classified as critical was found in Dahua Smart Park Management up to 20230713. This vulnerability affects unknown code of the file /emap/devicePoint_addImgIco?hasSubsystem=true. The manipulation of the argument upload leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-235162 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-434 Jul 22, 2023
CVE-2023-38646 9.8 CRITICAL EXPLOITED 43 PoCs Analysis NUCLEI EPSS 0.94
Metabase <0.46.6.1-1.46.6.1 - RCE
Metabase open source before 0.46.6.1 and Metabase Enterprise before 1.46.6.1 allow attackers to execute arbitrary commands on the server, at the server's privilege level. Authentication is not required for exploitation. The other fixed versions are 0.45.4.1, 1.45.4.1, 0.44.7.1, 1.44.7.1, 0.43.7.2, and 1.43.7.2.
Jul 21, 2023
CVE-2023-37645 5.3 MEDIUM NUCLEI EPSS 0.48
Eyoucms - Exposure to Wrong Actor
eyoucms v1.6.3 was discovered to contain an information disclosure vulnerability via the component /custom_model_path/recruit.filelist.txt.
CWE-668 Jul 20, 2023
CVE-2023-37728 6.1 MEDIUM NUCLEI EPSS 0.14
Icewarp - XSS
IceWarp v10.2.1 was discovered to contain cross-site scripting (XSS) vulnerability via the color parameter.
CWE-79 Jul 20, 2023
CVE-2023-38203 9.8 CRITICAL KEV RANSOMWARE NUCLEI EPSS 0.94
Adobe ColdFusion <2018u17, <2021u7, <2023u1 - Code Injection
Adobe ColdFusion versions 2018u17 (and earlier), 2021u7 (and earlier) and 2023u1 (and earlier) are affected by a Deserialization of Untrusted Data vulnerability that could result in Arbitrary code execution. Exploitation of this issue does not require user interaction.
CWE-502 Jul 20, 2023
CVE-2023-3722 8.6 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.55
Avaya Aura Device Services < 8.1.4.0 - Unrestricted File Upload
An OS command injection vulnerability was found in the Avaya Aura Device Services Web application which could allow remote code execution as the Web server user via a malicious uploaded file. This issue affects Avaya Aura Device Services version 8.1.4.0 and earlier.
CWE-434 Jul 19, 2023
CVE-2023-3519 9.8 CRITICAL KEV RANSOMWARE 17 PoCs Analysis NUCLEI EPSS 0.94
Unspecified Product <Version> - RCE
Unauthenticated remote code execution
CWE-94 Jul 19, 2023
CVE-2023-3765 10.0 CRITICAL 1 Writeup NUCLEI EPSS 0.91
Lfprojects Mlflow < 2.5.0 - Absolute Path Traversal
Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.5.0.
CWE-36 Jul 19, 2023
CVE-2023-37266 9.8 CRITICAL 1 Writeup NUCLEI EPSS 0.89
Icewhale Casaos < 0.4.4 - Authentication Bypass
CasaOS is an open-source Personal Cloud system. Unauthenticated attackers can craft arbitrary JWTs and access features that usually require authentication and execute arbitrary commands as `root` on CasaOS instances. This problem was addressed by improving the validation of JWTs in commit `705bf1f`. This patch is part of CasaOS 0.4.4. Users should upgrade to CasaOS 0.4.4. If they can't, they should temporarily restrict access to CasaOS to untrusted users, for instance by not exposing it publicly.
CWE-287 Jul 17, 2023
CVE-2023-37265 9.8 CRITICAL 1 Writeup NUCLEI EPSS 0.91
Icewhale Casaos < 0.4.4 - Missing Authentication
CasaOS is an open-source Personal Cloud system. Due to a lack of IP address verification an unauthenticated attackers can execute arbitrary commands as `root` on CasaOS instances. The problem was addressed by improving the detection of client IP addresses in `391dd7f`. This patch is part of CasaOS 0.4.4. Users should upgrade to CasaOS 0.4.4. If they can't, they should temporarily restrict access to CasaOS to untrusted users, for instance by not exposing it publicly.
CWE-306 Jul 17, 2023
CVE-2023-37462 9.9 CRITICAL 1 Writeup NUCLEI EPSS 0.90
Xwiki < 14.4.8 - Injection
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Improper escaping in the document `SkinsCode.XWikiSkinsSheet` leads to an injection vector from view right on that document to programming rights, or in other words, it is possible to execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The attack works by opening a non-existing page with a name crafted to contain a dangerous payload. It is possible to check if an existing installation is vulnerable. See the linked GHSA for instructions on testing an installation. This issue has been patched in XWiki 14.4.8, 14.10.4 and 15.0-rc-1. Users are advised to upgrade. The fix commit `d9c88ddc` can also be applied manually to the impacted document `SkinsCode.XWikiSkinsSheet` and users unable to upgrade are advised to manually patch their installations.
CWE-74 Jul 14, 2023