Vulnerabilities with Nuclei Scanner Templates

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,589 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,361 vendors 43,897 researchers
4,077 results Clear all
CVE-2023-0678 5.3 MEDIUM 1 Writeup NUCLEI EPSS 0.68
Phpipam < 1.5.1 - Missing Authorization
Missing Authorization in GitHub repository phpipam/phpipam prior to v1.5.1.
CWE-862 Feb 04, 2023
CVE-2023-0676 6.1 MEDIUM 2 Writeups NUCLEI EPSS 0.01
Phpipam < 1.5.1 - XSS
Cross-site Scripting (XSS) - Reflected in GitHub repository phpipam/phpipam prior to 1.5.1.
CWE-79 Feb 04, 2023
CVE-2023-0563 3.5 LOW 1 Writeup NUCLEI EPSS 0.33
Phpgurukul Bank Locker Management System - XSS
A vulnerability classified as problematic has been found in PHPGurukul Bank Locker Management System 1.0. This affects an unknown part of the file add-locker-form.php of the component Assign Locker. The manipulation of the argument ahname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219717 was assigned to this vulnerability.
CWE-79 Jan 28, 2023
CVE-2023-0562 7.3 HIGH 1 Writeup NUCLEI EPSS 0.77
Phpgurukul Bank Locker Management System - SQL Injection
A vulnerability was found in PHPGurukul Bank Locker Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php of the component Login. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219716.
CWE-89 Jan 28, 2023
CVE-2023-0527 3.5 LOW 1 PoC Analysis NUCLEI EPSS 0.09
Online Security Guards Hiring System - XSS
A vulnerability was found in PHPGurukul Online Security Guards Hiring System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file search-request.php. The manipulation of the argument searchdata with the input "><script>alert(document.domain)</script> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-219596.
CWE-79 Jan 27, 2023
CVE-2023-0448 6.1 MEDIUM NUCLEI EPSS 0.28
Matbao WP Helper Premium < 4.3 - XSS
The WP Helper Lite WordPress plugin, in versions < 4.3, returns all GET parameters unsanitized in the response, resulting in a reflected cross-site scripting vulnerability.
CWE-79 Jan 26, 2023
CVE-2023-23492 8.8 HIGH NUCLEI EPSS 0.87
Idehweb Login With Phone Number < 1.4.2 - SQL Injection
The Login with Phone Number WordPress Plugin, version < 1.4.2, is affected by an authenticated SQL injection vulnerability in the 'ID' parameter of its 'lwp_forgot_password' action.
CWE-89 Jan 20, 2023
CVE-2023-23491 6.1 MEDIUM NUCLEI EPSS 0.11
Fullworksplugins Quick Event Manager < 9.7.5 - XSS
The Quick Event Manager WordPress Plugin, version < 9.7.5, is affected by a reflected cross-site scripting vulnerability in the 'category' parameter of its 'qem_ajax_calendar' action.
CWE-79 Jan 20, 2023
CVE-2023-23489 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.85
Sandhillsdev Easy Digital Downloads < 3.1.0.4 - SQL Injection
The Easy Digital Downloads WordPress Plugin, versions 3.1.0.2 & 3.1.0.3, is affected by an unauthenticated SQL injection vulnerability in the 's' parameter of its 'edd_download_search' action.
CWE-89 Jan 20, 2023
CVE-2023-23488 9.8 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.84
Strangerstudios Paid Memberships Pro < 2.9.8 - SQL Injection
The Paid Memberships Pro WordPress Plugin, version < 2.9.8, is affected by an unauthenticated SQL injection vulnerability in the 'code' parameter of the '/pmpro/v1/order' REST route.
CWE-89 Jan 20, 2023
CVE-2023-0126 7.5 HIGH NUCLEI EPSS 0.93
SMA1000 <12.4.2 - Path Traversal
Pre-authentication path traversal vulnerability in SMA1000 firmware version 12.4.2, which allows an unauthenticated attacker to access arbitrary files and directories stored outside the web root directory.
CWE-22 Jan 19, 2023
CVE-2023-0297 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.93
pyLoad js2py Python Execution
Code Injection in GitHub repository pyload/pyload prior to 0.5.0b3.dev31.
CWE-94 Jan 14, 2023
CVE-2023-22480 7.3 HIGH 1 Writeup NUCLEI EPSS 0.76
Fit2cloud Kubeoperator < 3.16.4 - Incorrect Authorization
KubeOperator is an open source Kubernetes distribution focused on helping enterprises plan, deploy and operate production-level K8s clusters. In KubeOperator versions 3.16.3 and below, API interfaces with unauthorized entities and can leak sensitive information. This vulnerability could be used to take over the cluster under certain conditions. This issue has been patched in version 3.16.4.
CWE-285 Jan 14, 2023
CVE-2023-22478 7.3 HIGH EXPLOITED 1 Writeup NUCLEI EPSS 0.81
Fit2cloud Kubepi < 1.6.4 - Missing Authorization
KubePi is a modern Kubernetes panel. The API interfaces with unauthorized entities and may leak sensitive information. This issue has been patched in version 1.6.4. There are currently no known workarounds.
CWE-862 Jan 14, 2023
CVE-2023-22952 8.8 HIGH KEV 1 PoC Analysis NUCLEI EPSS 0.93
SugarCRM unauthenticated Remote Code Execution (RCE)
In SugarCRM before 12.0. Hotfix 91155, a crafted request can inject custom PHP code through the EmailTemplates because of missing input validation.
CWE-94 Jan 11, 2023
CVE-2023-22463 9.8 CRITICAL EXPLOITED 1 PoC 1 Writeup NUCLEI EPSS 0.92
Fit2cloud Kubepi < 1.6.3 - Hard-coded Credentials
KubePi is a k8s panel. The jwt authentication function of KubePi through version 1.6.2 uses hard-coded Jwtsigkeys, resulting in the same Jwtsigkeys for all online projects. This means that an attacker can forge any jwt token to take over the administrator account of any online project. Furthermore, they may use the administrator to take over the k8s cluster of the target enterprise. `session.go`, the use of hard-coded JwtSigKey, allows an attacker to use this value to forge jwt tokens arbitrarily. The JwtSigKey is confidential and should not be hard-coded in the code. The vulnerability has been fixed in 1.6.3. In the patch, JWT key is specified in app.yml. If the user leaves it blank, a random key will be used. There are no workarounds aside from upgrading.
CWE-798 Jan 04, 2023
CVE-2023-6246 8.4 HIGH 2 PoCs Analysis NUCLEI EPSS 0.25
glibc <2.36 - Buffer Overflow
A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.
CWE-122 Jan 31, 2024
CVE-2023-49105 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.90
ownCloud <10.13.1 - Info Disclosure
An issue was discovered in ownCloud owncloud/core before 10.13.1. An attacker can access, modify, or delete any file without authentication if the username of a victim is known, and the victim has no signing-key configured. This occurs because pre-signed URLs can be accepted even when no signing-key is configured for the owner of the files. The earliest affected version is 10.6.0.
CWE-287 Nov 21, 2023
CVE-2023-4911 7.8 HIGH KEV RANSOMWARE 26 PoCs Analysis NUCLEI EPSS 0.67
Glibc Tunables Privilege Escalation CVE-2023-4911 (aka Looney Tunables)
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
CWE-122 Oct 03, 2023
CVE-2023-2640 7.8 HIGH EXPLOITED 14 PoCs Analysis NUCLEI EPSS 0.91
GameOver(lay) Privilege Escalation and Container Escape
On Ubuntu kernels carrying both c914c0e27eb0 and "UBUNTU: SAUCE: overlayfs: Skip permission checking for trusted.overlayfs.* xattrs", an unprivileged user may set privileged extended attributes on the mounted files, leading them to be set on the upper files without the appropriate security checks.
CWE-863 Jul 26, 2023