Vulnerabilities with Nuclei Scanner Templates

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,544 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,344 vendors 43,890 researchers
4,077 results Clear all
CVE-2023-32235 7.5 HIGH EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.94
Ghost < 5.42.1 - Path Traversal
Ghost before 5.42.1 allows remote attackers to read arbitrary files within the active theme's folder via /assets/built%2F..%2F..%2F/ directory traversal. This occurs in frontend/web/middleware/static-theme.js.
CWE-22 May 05, 2023
CVE-2023-29827 9.8 CRITICAL 1 Writeup NUCLEI EPSS 0.79
Ejs - Injection
ejs v3.1.9 is vulnerable to server-side template injection. If the ejs file is controllable, template injection can be implemented through the configuration settings of the closeDelimiter parameter. NOTE: this is disputed by the vendor because the render function is not intended to be used with untrusted input.
CWE-74 May 04, 2023
CVE-2023-30943 6.5 MEDIUM 3 PoCs Analysis NUCLEI EPSS 0.17
Moodle - Path Traversal
The vulnerability was found Moodle which exists because the application allows a user to control path of the older to create in TinyMCE loaders. A remote user can send a specially crafted HTTP request and create arbitrary folders on the system.
CWE-610 May 02, 2023
CVE-2023-30869 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.31
Awesomemotive Easy Digital Downloads - Authentication Bypass
Improper Authentication vulnerability in Easy Digital Downloads plugin allows unauth. Privilege Escalation. This issue affects Easy Digital Downloads: from 3.1 through 3.1.1.4.1.
CWE-287 May 02, 2023
CVE-2023-29489 5.3 MEDIUM 20 PoCs Analysis NUCLEI EPSS 0.93
Cpanel < 11.102.0.31 - XSS
An issue was discovered in cPanel before 11.109.9999.116. XSS can occur on the cpsrvd error page via an invalid webcall ID, aka SEC-669. The fixed versions are 11.109.9999.116, 11.108.0.13, 11.106.0.18, and 11.102.0.31.
CWE-79 Apr 27, 2023
CVE-2023-30212 6.1 MEDIUM 17 PoCs Analysis NUCLEI EPSS 0.75
Ourphp < 7.2.0 - XSS
OURPHP <= 7.2.0 is vulnerale to Cross Site Scripting (XSS) via /client/manage/ourphp_out.php.
CWE-79 Apr 26, 2023
CVE-2023-30210 6.1 MEDIUM NUCLEI EPSS 0.15
Ourphp < 7.2.0 - XSS
OURPHP <= 7.2.0 is vulnerable to Cross Site Scripting (XSS) via ourphp_tz.php.
CWE-79 Apr 26, 2023
CVE-2023-26843 5.4 MEDIUM 1 Writeup NUCLEI EPSS 0.12
ChurchCRM 4.5.3 - XSS
A stored Cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the NoteEditor.php.
CWE-79 Apr 25, 2023
CVE-2023-25346 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.12
Churchcrm - XSS
A reflected cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the id parameter of /churchcrm/v2/family/not-found.
CWE-79 Apr 25, 2023
CVE-2023-27524 8.9 HIGH KEV 20 PoCs Analysis NUCLEI EPSS 0.84
Apache Superset Signed Cookie Priv Esc
Session Validation attacks in Apache Superset versions up to and including 2.0.1. Installations that have not altered the default configured SECRET_KEY according to installation instructions allow for an attacker to authenticate and access unauthorized resources. This does not affect Superset administrators who have changed the default value for SECRET_KEY config. All superset installations should always set a unique secure random SECRET_KEY. Your SECRET_KEY is used to securely sign all session cookies and encrypting sensitive information on the database. Add a strong SECRET_KEY to your `superset_config.py` file like: SECRET_KEY = <YOUR_OWN_RANDOM_GENERATED_SECRET_KEY> Alternatively you can set it with `SUPERSET_SECRET_KEY` environment variable.
CWE-1188 Apr 24, 2023
CVE-2023-31059 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Repetier Server <1.4.10 - Path Traversal
Repetier Server through 1.4.10 allows ..%5c directory traversal for reading files that contain credentials, as demonstrated by connectionLost.php.
CWE-22 Apr 24, 2023
CVE-2023-27351 7.5 HIGH KEV RANSOMWARE NUCLEI EPSS 0.86
Papercut MF < 20.1.7 - Authentication Bypass
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SecurityRequestFilter class. The issue results from improper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-19226.
CWE-287 Apr 20, 2023
CVE-2023-27350 9.8 CRITICAL KEV RANSOMWARE 16 PoCs Analysis NUCLEI EPSS 0.94
Papercut MF < 20.1.7 - Improper Access Control
This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SetupCompleted class. The issue results from improper access control. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18987.
CWE-284 Apr 20, 2023
CVE-2023-29922 5.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.91
Powerjob - Improper Access Control
PowerJob V4.3.1 is vulnerable to Incorrect Access Control via the create user/save interface.
CWE-284 Apr 19, 2023
CVE-2023-29923 5.3 MEDIUM 5 PoCs Analysis NUCLEI EPSS 0.85
Powerjob - Incorrect Default Permissions
PowerJob V4.3.1 is vulnerable to Insecure Permissions. via the list job interface.
CWE-276 Apr 19, 2023
CVE-2023-29887 7.5 HIGH NUCLEI EPSS 0.88
Nuovo Spreadsheet-reader - Path Traversal
A Local File inclusion vulnerability in test.php in spreadsheet-reader 0.5.11 allows remote attackers to include arbitrary files via the File parameter.
CWE-22 Apr 18, 2023
CVE-2023-29506 5.4 MEDIUM 1 Writeup NUCLEI EPSS 0.12
Xwiki < 13.10.11 - XSS
XWiki Commons are technical libraries common to several other top level XWiki projects. It was possible to inject some code using the URL of authenticated endpoints. This problem has been patched on XWiki 13.10.11, 14.4.7 and 14.10.
CWE-79 Apr 16, 2023
CVE-2023-29204 4.7 MEDIUM 1 Writeup NUCLEI EPSS 0.01
XWiki - Open Redirect
XWiki Commons are technical libraries common to several other top level XWiki projects. It is possible to bypass the existing security measures put in place to avoid open redirect by using a redirect such as `//mydomain.com` (i.e. omitting the `http:`). It was also possible to bypass it when using URL such as `http:/mydomain.com`. The problem has been patched on XWiki 13.10.10, 14.4.4 and 14.8RC1.
CWE-601 Apr 15, 2023
CVE-2023-29623 6.1 MEDIUM NUCLEI EPSS 0.27
Purchase Order Management - XSS
Purchase Order Management v1.0 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the password parameter at /purchase_order/classes/login.php.
CWE-79 Apr 14, 2023
CVE-2023-29084 7.2 HIGH 2 PoCs Analysis NUCLEI EPSS 0.94
ManageEngine ADManager Plus ChangePasswordAction Authenticated Command Injection
Zoho ManageEngine ADManager Plus before 7181 allows for authenticated users to exploit command injection via Proxy settings.
CWE-77 Apr 13, 2023