Vulnerabilities with Nuclei Scanner Templates
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2022-40624
9.8
CRITICAL
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.85
Pfsense Pfblockerng < 2.1.4_27 - OS Command Injection
pfSense pfBlockerNG through 2.1.4_27 allows remote attackers to execute arbitrary OS commands as root via the HTTP Host header, a different vulnerability than CVE-2022-31814.
CWE-78
Dec 20, 2022
CVE-2022-4063
9.8
CRITICAL
EXPLOITED
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.88
InPost Gallery <2.1.4.1 - Code Injection
The InPost Gallery WordPress plugin before 2.1.4.1 insecurely uses PHP's extract() function when rendering HTML views, allowing attackers to force the inclusion of malicious files & URLs, which may enable them to run code on servers.
CWE-22
Dec 19, 2022
CVE-2022-4050
9.8
CRITICAL
EXPLOITED
SSVC PoC
NUCLEI
EPSS 0.77
JoomSport <5.2.8 - SQL Injection
The JoomSport WordPress plugin before 5.2.8 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users
Dec 19, 2022
CVE-2022-46443
8.8
HIGH
SSVC PoC
NUCLEI
EPSS 0.83
mesinkasir Bangresto 1.0 - SQL Injection
mesinkasir Bangresto 1.0 is vulnberable to SQL Injection via the itemqty%5B%5D parameter.
CWE-89
Dec 14, 2022
CVE-2022-46071
9.8
CRITICAL
SSVC PoC
NUCLEI
EPSS 0.79
Helmet Store Showroom v1.0 - SQL Injection
There is SQL Injection vulnerability at Helmet Store Showroom v1.0 Login Page. This vulnerability can be exploited to bypass admin access.
CWE-89
Dec 14, 2022
CVE-2022-46073
6.1
MEDIUM
SSVC PoC
NUCLEI
EPSS 0.30
Helmet Store Showroom 1.0 - XSS
Helmet Store Showroom 1.0 is vulnerable to Cross Site Scripting (XSS).
CWE-79
Dec 14, 2022
CVE-2022-3590
5.9
MEDIUM
EXPLOITED
SSVC PoC
4 PoCs
Analysis
NUCLEI
EPSS 0.91
WordPress - Blind SSRF
WordPress is affected by an unauthenticated blind SSRF in the pingback feature. Because of a TOCTOU race condition between the validation checks and the HTTP request, attackers can reach internal hosts that are explicitly forbidden.
CWE-367
Dec 14, 2022
CVE-2022-46381
6.1
MEDIUM
EXPLOITED
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.81
Linear eMerge E3-Series <0.32-08f - XSS
Certain Linear eMerge E3-Series devices are vulnerable to XSS via the type parameter (e.g., to the badging/badge_template_v0.php component). This affects 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e.
CWE-79
Dec 13, 2022
CVE-2022-4223
8.8
HIGH
NUCLEI
EPSS 0.88
Pgadmin 4 < 6.17 - Missing Authorization
The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is from. Versions of pgAdmin prior to 6.17 failed to properly secure this API, which could allow an unauthenticated user to call it with a path of their choosing, such as a UNC path to a server they control on a Windows machine. This would cause an appropriately named executable in the target path to be executed by the pgAdmin server.
CWE-862
Dec 13, 2022
CVE-2022-45269
7.5
HIGH
SSVC PoC
NUCLEI
EPSS 0.27
Gmaolinx Linx Sphere - Path Traversal
A directory traversal vulnerability in the component SCS.Web.Server.SPI/1.0 of Linx Sphere LINX 7.35.ST15 allows attackers to read arbitrary files.
CWE-22
Dec 12, 2022
CVE-2022-3982
9.8
CRITICAL
EXPLOITED
SSVC PoC
NUCLEI
EPSS 0.74
Booking Calendar <3.2.2 - Unauthenticated RCE
The Booking calendar, Appointment Booking System WordPress plugin before 3.2.2 does not validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE
Dec 12, 2022
CVE-2022-3934
5.4
MEDIUM
SSVC PoC
NUCLEI
EPSS 0.05
Mehanoid Flat PM < 2.661 - XSS
The FlatPM WordPress plugin before 3.0.13 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Dec 12, 2022
CVE-2022-3933
5.4
MEDIUM
SSVC PoC
NUCLEI
EPSS 0.06
G5theme Essential Real Estate < 3.9.6 - XSS
The Essential Real Estate WordPress plugin before 3.9.6 does not sanitize and escapes some parameters, which could allow users with a role as low as Admin to perform Cross-Site Scripting attacks.
Dec 12, 2022
CVE-2022-3908
6.1
MEDIUM
SSVC PoC
NUCLEI
EPSS 0.09
Helloprint < 1.4.7 - XSS
The Helloprint WordPress plugin before 1.4.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting
Dec 12, 2022
CVE-2022-37932
8.8
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.70
HPE Officeconnect 1820 J9979a Firmware - Authentication Bypass
A potential security vulnerability has been identified in Hewlett Packard Enterprise OfficeConnect 1820, 1850, and 1920S Network switches. The vulnerability could be remotely exploited to allow authentication bypass. HPE has made the following software updates to resolve the vulnerability in Hewlett Packard Enterprise OfficeConnect 1820, 1850 and 1920S Network switches versions: Prior to PT.02.14; Prior to PC.01.22; Prior to PO.01.21; Prior to PD.02.22;
Dec 12, 2022
CVE-2022-4375
6.3
MEDIUM
SSVC PoC
1 PoC
NUCLEI
EPSS 0.26
Mingsoft MCMS <5.2.9 - SQL Injection
A vulnerability was found in Mingsoft MCMS up to 5.2.9. It has been classified as critical. Affected is an unknown function of the file /cms/category/list. The manipulation of the argument sqlWhere leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 5.2.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215196.
CWE-89
Dec 09, 2022
CVE-2022-41800
8.7
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
BIG-IP - Auth Bypass
In all versions of BIG-IP, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CWE-77
Dec 07, 2022
CVE-2022-45917
6.1
MEDIUM
SSVC PoC
NUCLEI
EPSS 0.39
Ilias < 7.16 - Open Redirect
ILIAS before 7.16 has an Open Redirect.
CWE-601
Dec 07, 2022
CVE-2022-46169
9.8
CRITICAL
KEV
SSVC ACTIVE
44 PoCs
Analysis
NUCLEI
EPSS 0.94
Cacti 1.2.22 unauthenticated command injection
Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. The vulnerability resides in the `remote_agent.php` file. This file can be accessed without authentication. This function retrieves the IP address of the client via `get_client_addr` and resolves this IP address to the corresponding hostname via `gethostbyaddr`. After this, it is verified that an entry within the `poller` table exists, where the hostname corresponds to the resolved hostname. If such an entry was found, the function returns `true` and the client is authorized. This authorization can be bypassed due to the implementation of the `get_client_addr` function. The function is defined in the file `lib/functions.php` and checks serval `$_SERVER` variables to determine the IP address of the client. The variables beginning with `HTTP_` can be arbitrarily set by an attacker. Since there is a default entry in the `poller` table with the hostname of the server running Cacti, an attacker can bypass the authentication e.g. by providing the header `Forwarded-For: <TARGETIP>`. This way the function `get_client_addr` returns the IP address of the server running Cacti. The following call to `gethostbyaddr` will resolve this IP address to the hostname of the server, which will pass the `poller` hostname check because of the default entry. After the authorization of the `remote_agent.php` file is bypassed, an attacker can trigger different actions. One of these actions is called `polldata`. The called function `poll_for_data` retrieves a few request parameters and loads the corresponding `poller_item` entries from the database. If the `action` of a `poller_item` equals `POLLER_ACTION_SCRIPT_PHP`, the function `proc_open` is used to execute a PHP script. The attacker-controlled parameter `$poller_id` is retrieved via the function `get_nfilter_request_var`, which allows arbitrary strings. This variable is later inserted into the string passed to `proc_open`, which leads to a command injection vulnerability. By e.g. providing the `poller_id=;id` the `id` command is executed. In order to reach the vulnerable call, the attacker must provide a `host_id` and `local_data_id`, where the `action` of the corresponding `poller_item` is set to `POLLER_ACTION_SCRIPT_PHP`. Both of these ids (`host_id` and `local_data_id`) can easily be bruteforced. The only requirement is that a `poller_item` with an `POLLER_ACTION_SCRIPT_PHP` action exists. This is very likely on a productive instance because this action is added by some predefined templates like `Device - Uptime` or `Device - Polling Time`.
This command injection vulnerability allows an unauthenticated user to execute arbitrary commands if a `poller_item` with the `action` type `POLLER_ACTION_SCRIPT_PHP` (`2`) is configured. The authorization bypass should be prevented by not allowing an attacker to make `get_client_addr` (file `lib/functions.php`) return an arbitrary IP address. This could be done by not honoring the `HTTP_...` `$_SERVER` variables. If these should be kept for compatibility reasons it should at least be prevented to fake the IP address of the server running Cacti. This vulnerability has been addressed in both the 1.2.x and 1.3.x release branches with `1.2.23` being the first release containing the patch.
CWE-78
Dec 05, 2022
CVE-2022-35507
7.1
HIGH
SSVC PoC
NUCLEI
EPSS 0.14
Proxmox Mail Gateway < 4.1-3 - Injection
A response-header CRLF injection vulnerability in the Proxmox Virtual Environment (PVE) and Proxmox Mail Gateway (PMG) web interface allows a remote attacker to set cookies for a victim's browser that are longer than the server expects, causing a client-side DoS. This affects Chromium-based browsers because they allow injection of response headers with %0d. This is fixed in pve-http-server 4.1-3.
CWE-74
Dec 04, 2022