Vulnerabilities with Nuclei Scanner Templates
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2023-0678
5.3
MEDIUM
1 Writeup
NUCLEI
EPSS 0.68
Phpipam < 1.5.1 - Missing Authorization
Missing Authorization in GitHub repository phpipam/phpipam prior to v1.5.1.
CWE-862
Feb 04, 2023
CVE-2023-0676
6.1
MEDIUM
2 Writeups
NUCLEI
EPSS 0.01
Phpipam < 1.5.1 - XSS
Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to 1.5.1.
CWE-79
Feb 04, 2023
CVE-2023-0563
3.5
LOW
1 Writeup
NUCLEI
EPSS 0.33
Phpgurukul Bank Locker Management System - XSS
A vulnerability classified as problematic has been found in PHPGurukul Bank Locker Management System 1.0. This affects an unknown part of the file add-locker-form.php of the component Assign Locker. The manipulation of the argument ahname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219717 was assigned to this vulnerability.
CWE-79
Jan 28, 2023
CVE-2023-0562
7.3
HIGH
1 Writeup
NUCLEI
EPSS 0.77
Phpgurukul Bank Locker Management System - SQL Injection
A vulnerability was found in PHPGurukul Bank Locker Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219716.
CWE-89
Jan 28, 2023
CVE-2023-0527
3.5
LOW
1 PoC
Analysis
NUCLEI
EPSS 0.09
Online Security Guards Hiring System - XSS
A vulnerability was found in PHPGurukul Online Security Guards Hiring System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file search-request.php. The manipulation of the argument searchdata with the input "><script>alert(document.domain)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219596.
CWE-79
Jan 27, 2023
CVE-2023-0448
6.1
MEDIUM
NUCLEI
EPSS 0.28
Matbao WP Helper Premium < 4.3 - XSS
The WP Helper Lite WordPress plugin, in versions < 4.3, returns all GET parameters unsanitized in the response, resulting in a reflected cross-site scripting vulnerability.
CWE-79
Jan 26, 2023
CVE-2023-23492
8.8
HIGH
NUCLEI
EPSS 0.87
Idehweb Login With Phone Number < 1.4.2 - SQL Injection
The Login with Phone Number WordPress Plugin, version < 1.4.2, is affected by an authenticated SQL injection vulnerability in the 'ID' parameter of its 'lwp_forgot_password' action.
CWE-89
Jan 20, 2023
CVE-2023-23491
6.1
MEDIUM
NUCLEI
EPSS 0.11
Fullworksplugins Quick Event Manager < 9.7.5 - XSS
The Quick Event Manager WordPress Plugin, version < 9.7.5, is affected by a reflected cross-site scripting vulnerability in the 'category' parameter of its 'qem_ajax_calendar' action.
CWE-79
Jan 20, 2023
CVE-2023-23489
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.85
Sandhillsdev Easy Digital Downloads < 3.1.0.4 - SQL Injection
The Easy Digital Downloads WordPress Plugin, versions 3.1.0.2 & 3.1.0.3, is affected by an unauthenticated SQL injection vulnerability in the 's' parameter of its 'edd_download_search' action.
CWE-89
Jan 20, 2023
CVE-2023-23488
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.84
Strangerstudios Paid Memberships Pro < 2.9.8 - SQL Injection
The Paid Memberships Pro WordPress Plugin, version < 2.9.8, is affected by an unauthenticated SQL injection vulnerability in the 'code' parameter of the '/pmpro/v1/order' REST route.
CWE-89
Jan 20, 2023
CVE-2023-0126
7.5
HIGH
NUCLEI
EPSS 0.93
SMA1000 <12.4.2 - Path Traversal
Pre-authentication path traversal vulnerability in SMA1000 firmware version 12.4.2, which allows an unauthenticated attacker to access arbitrary files and directories stored outside the web root directory.
CWE-22
Jan 19, 2023
CVE-2023-0297
9.8
CRITICAL
EXPLOITED
9 PoCs
Analysis
NUCLEI
EPSS 0.93
pyLoad js2py Python Execution
Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31.
CWE-94
Jan 14, 2023
CVE-2023-22480
7.3
HIGH
1 Writeup
NUCLEI
EPSS 0.76
Fit2cloud Kubeoperator < 3.16.4 - Incorrect Authorization
KubeOperator is an open source Kubernetes distribution focused on helping enterprises plan, deploy and operate production-level K8s clusters. In KubeOperator versions 3.16.3 and below, API interfaces with unauthorized entities and can leak sensitive information. This vulnerability could be used to take over the cluster under certain conditions. This issue has been patched in version 3.16.4.
CWE-285
Jan 14, 2023
CVE-2023-22478
7.3
HIGH
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.81
Fit2cloud Kubepi < 1.6.4 - Missing Authorization
KubePi is a modern Kubernetes panel. The API interfaces with unauthorized entities and may leak sensitive information. This issue has been patched in version 1.6.4. There are currently no known workarounds.
CWE-862
Jan 14, 2023
CVE-2023-22952
8.8
HIGH
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.93
SugarCRM unauthenticated Remote Code Execution (RCE)
In SugarCRM before 12.0. Hotfix 91155, a crafted request can inject custom PHP code through the EmailTemplates because of missing input validation.
CWE-94
Jan 11, 2023
CVE-2023-22463
9.8
CRITICAL
EXPLOITED
1 PoC
1 Writeup
NUCLEI
EPSS 0.92
Fit2cloud Kubepi < 1.6.3 - Hard-coded Credentials
KubePi is a k8s panel. The jwt authentication function of KubePi through version 1.6.2 uses hard-coded Jwtsigkeys, resulting in the same Jwtsigkeys for all online projects. This means that an attacker can forge any jwt token to take over the administrator account of any online project. Furthermore, they may use the administrator to take over the k8s cluster of the target enterprise. `session.go`, the use of hard-coded JwtSigKey, allows an attacker to use this value to forge jwt tokens arbitrarily. The JwtSigKey is confidential and should not be hard-coded in the code. The vulnerability has been fixed in 1.6.3. In the patch, JWT key is specified in app.yml. If the user leaves it blank, a random key will be used. There are no workarounds aside from upgrading.
CWE-798
Jan 04, 2023
CVE-2023-6246
8.4
HIGH
2 PoCs
Analysis
NUCLEI
EPSS 0.25
glibc <2.36 - Buffer Overflow
A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.
CWE-122
Jan 31, 2024
CVE-2023-49105
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.90
ownCloud <10.13.1 - Info Disclosure
An issue was discovered in ownCloud owncloud/core before 10.13.1. An attacker can access, modify, or delete any file without authentication if the username of a victim is known, and the victim has no signing-key configured. This occurs because pre-signed URLs can be accepted even when no signing-key is configured for the owner of the files. The earliest affected version is 10.6.0.
CWE-287
Nov 21, 2023
CVE-2023-4911
7.8
HIGH
KEV
RANSOMWARE
26 PoCs
Analysis
NUCLEI
EPSS 0.67
Glibc Tunables Privilege Escalation CVE-2023-4911 (aka Looney Tunables)
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
CWE-122
Oct 03, 2023
CVE-2023-2640
7.8
HIGH
EXPLOITED
14 PoCs
Analysis
NUCLEI
EPSS 0.91
GameOver(lay) Privilege Escalation and Container Escape
On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.
CWE-863
Jul 26, 2023