Vulnerabilities with Nuclei Scanner Templates
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2023-33568
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.90
Dolibarr <16.0.5 - Info Disclosure
An issue in Dolibarr 16 before 16.0.5 allows unauthenticated attackers to perform a database dump and access a company's entire customer file, prospects, suppliers, and employee information if a contact file exists.
CWE-552
Jun 13, 2023
CVE-2023-34105
7.5
HIGH
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.85
SRS <5.0.157, <5.0-b1, <6.0.48 - Command Injection
SRS is a real-time video server supporting RTMP, WebRTC, HLS, HTTP-FLV, SRT, MPEG-DASH, and GB28181. Prior to versions 5.0.157, 5.0-b1, and 6.0.48, SRS's `api-server` server is vulnerable to a drive-by command injection. An attacker may send a request to the `/api/v1/snapshots` endpoint containing any commands to be executed as part of the body of the POST request. This issue may lead to Remote Code Execution (RCE). Versions 5.0.157, 5.0-b1, and 6.0.48 contain a fix.
CWE-78
Jun 12, 2023
CVE-2023-3188
6.5
MEDIUM
1 Writeup
NUCLEI
EPSS 0.45
owncast <0.1.0 - SSRF
Server-Side Request Forgery (SSRF) in GitHub repository owncast/owncast prior to 0.1.0.
CWE-918
Jun 10, 2023
CVE-2023-33510
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.74
Jeecg P3 Biz Chat <1.0.5 - Info Disclosure
Jeecg P3 Biz Chat 1.0.5 allows remote attackers to read arbitrary files through specific parameters.
CWE-22
Jun 07, 2023
CVE-2023-34362
9.8
CRITICAL
KEV
RANSOMWARE
15 PoCs
Analysis
NUCLEI
EPSS 0.94
MOVEit SQL Injection vulnerability
In Progress MOVEit Transfer before 2021.0.6 (13.0.6), 2021.1.4 (13.1.4), 2022.0.4 (14.0.4), 2022.1.5 (14.1.5), and 2023.0.1 (15.0.1), a SQL injection vulnerability has been found in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain access to MOVEit Transfer's database. Depending on the database engine being used (MySQL, Microsoft SQL Server, or Azure SQL), an attacker may be able to infer information about the structure and contents of the database, and execute SQL statements that alter or delete database elements. NOTE: this is exploited in the wild in May and June 2023; exploitation of unpatched systems can occur via HTTP or HTTPS. All versions (e.g., 2020.0 and 2019x) before the five explicitly mentioned versions are affected, including older unsupported versions.
CWE-89
Jun 02, 2023
CVE-2023-27640
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.83
Tshirtecommerce Custom Product Designer < 2.1.4 - Path Traversal
An issue was discovered in the tshirtecommerce (aka Custom Product Designer) component 2.1.4 for PrestaShop. An HTTP request can be forged with the POST parameter type in the /tshirtecommerce/fonts.php endpoint, to allow a remote attacker to traverse directories on the system in order to open files (without restriction on the extension and path). The content of the file is returned with base64 encoding. This is exploited in the wild in March 2023.
CWE-22
Jun 01, 2023
CVE-2023-27639
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.83
Tshirtecommerce Custom Product Designer < 2.1.4 - Path Traversal
An issue was discovered in the tshirtecommerce (aka Custom Product Designer) component 2.1.4 for PrestaShop. An HTTP request can be forged with the POST parameter file_name in the tshirtecommerce/ajax.php?type=svg endpoint, to allow a remote attacker to traverse directories on the system in order to open files (without restriction on the extension and path). Only files that can be parsed in XML can be opened. This is exploited in the wild in March 2023.
CWE-22
Jun 01, 2023
CVE-2023-33960
7.5
HIGH
NUCLEI
EPSS 0.42
OpenProject <12.5.6 - Info Disclosure
OpenProject is web-based project management software. For any OpenProject installation, a `robots.txt` file is generated through the server to denote which routes shall or shall not be accessed by crawlers. These routes contain project identifiers of all public projects in the instance. Prior to version 12.5.6, even if the entire instance is marked as `Login required` and prevents all truly anonymous access, the `/robots.txt` route remains publicly available.
Version 12.5.6 has a fix for this issue. Alternatively, users can download a patchfile to apply the patch to any OpenProject version greater than 10.0 As a workaround, one may mark any public project as non-public and give anyone in need of access to the project a membership.
CWE-319
Jun 01, 2023
CVE-2023-33629
7.2
HIGH
EXPLOITED
NUCLEI
EPSS 0.88
H3C Magic R300 <R300-2100MV100R004 - Buffer Overflow
H3C Magic R300 version R300-2100MV100R004 was discovered to contain a stack overflow via the DeltriggerList interface at /goform/aspForm.
CWE-787
May 31, 2023
CVE-2023-31548
5.4
MEDIUM
1 Writeup
NUCLEI
EPSS 0.10
ChurchCRM v4.5.3 - XSS
A stored Cross-site scripting (XSS) vulnerability in the FundRaiserEditor.php component of ChurchCRM v4.5.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
CWE-79
May 31, 2023
CVE-2023-26842
5.4
MEDIUM
1 Writeup
NUCLEI
EPSS 0.14
ChurchCRM 4.5.3 - XSS
A stored Cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the OptionManager.php.
CWE-79
May 31, 2023
CVE-2023-2518
6.1
MEDIUM
NUCLEI
EPSS 0.11
Yikesinc Easy Forms For Mailchimp < 6.8.8 - XSS
The Easy Forms for Mailchimp WordPress plugin before 6.8.9 does not sanitise and escape a parameter before outputting it back in the page when the debug option is enabled, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
May 30, 2023
CVE-2023-33193
9.1
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.49
Emby Server - Privilege Escalation
Emby Server is a user-installable home media server which stores and organizes a user's media files of virtually any format and makes them available for viewing at home and abroad on a broad range of client devices. This vulnerability may allow administrative access to an Emby Server system, depending on certain user account settings. By spoofing certain headers which are intended for interoperation with reverse proxy servers, it may be possible to affect the local/non-local network determination to allow logging in without password or to view a list of user accounts which may have no password configured. Impacted are all Emby Server system which are publicly accessible and where the administrator hasn't tightened the account login configuration for administrative users. This issue has been patched in Emby Server Beta version 4.8.31 and Emby Server version 4.7.12.
CWE-444
May 30, 2023
CVE-2023-2949
6.1
MEDIUM
1 Writeup
NUCLEI
EPSS 0.72
Open-emr Openemr < 7.0.1 - XSS
Cross-site Scripting (XSS) - Reflected in GitHub repository openemr/openemr prior to 7.0.1.
CWE-79
May 28, 2023
CVE-2023-2948
6.1
MEDIUM
1 Writeup
NUCLEI
EPSS 0.84
Open-emr Openemr < 7.0.1 - XSS
Cross-site Scripting (XSS) - Generic in GitHub repository openemr/openemr prior to 7.0.1.
CWE-79
May 28, 2023
CVE-2023-32315
8.6
HIGH
KEV
RANSOMWARE
15 PoCs
Analysis
NUCLEI
EPSS 0.94
Openfire authentication bypass with RCE plugin
Openfire is an XMPP server licensed under the Open Source Apache License. Openfire's administrative console, a web-based application, was found to be vulnerable to a path traversal attack via the setup environment. This permitted an unauthenticated user to use the unauthenticated Openfire Setup Environment in an already configured Openfire environment to access restricted pages in the Openfire Admin Console reserved for administrative users. This vulnerability affects all versions of Openfire that have been released since April 2015, starting with version 3.10.0. The problem has been patched in Openfire release 4.7.5 and 4.6.8, and further improvements will be included in the yet-to-be released first version on the 4.8 branch (which is expected to be version 4.8.0). Users are advised to upgrade. If an Openfire upgrade isn’t available for a specific release, or isn’t quickly actionable, users may see the linked github advisory (GHSA-gw42-f939-fhvm) for mitigation advice.
CWE-22
May 26, 2023
CVE-2023-2825
10.0
CRITICAL
8 PoCs
Analysis
NUCLEI
EPSS 0.92
GitLab Authenticated File Read
An issue has been discovered in GitLab CE/EE affecting only version 16.0.0. An unauthenticated malicious user can use a path traversal vulnerability to read arbitrary files on the server when an attachment exists in a public project nested within at least five groups.
CWE-22
May 26, 2023
CVE-2023-33440
7.2
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.90
Sourcecodester Faculty Evaluation System v1.0 - RCE
Sourcecodester Faculty Evaluation System v1.0 is vulnerable to arbitrary code execution via /eval/ajax.php?action=save_user.
CWE-94
May 26, 2023
CVE-2023-33439
7.2
HIGH
1 Writeup
NUCLEI
EPSS 0.34
Sourcecodester Faculty Evaluation System v1.0 - SQL Injection
Sourcecodester Faculty Evaluation System v1.0 is vulnerable to SQL Injection via /eval/admin/manage_task.php?id=.
CWE-89
May 26, 2023
CVE-2023-2734
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.60
Inspireui Mstore API < 3.9.1 - Authentication Bypass
The MStore API plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.9.1. This is due to insufficient verification on the user being supplied during the cart sync from mobile REST API request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the user id.
CWE-288
May 25, 2023