Vulnerabilities with Nuclei Scanner Templates

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,649 CVEs tracked 53,649 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,377 vendors 43,908 researchers
4,077 results Clear all
CVE-2022-40624 9.8 CRITICAL SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.85
Pfsense Pfblockerng < 2.1.4_27 - OS Command Injection
pfSense pfBlockerNG through 2.1.4_27 allows remote attackers to execute arbitrary OS commands as root via the HTTP Host header, a different vulnerability than CVE-2022-31814.
CWE-78 Dec 20, 2022
CVE-2022-4063 9.8 CRITICAL EXPLOITED SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.88
InPost Gallery <2.1.4.1 - Code Injection
The InPost Gallery WordPress plugin before 2.1.4.1 insecurely uses PHP's extract() function when rendering HTML views, allowing attackers to force the inclusion of malicious files & URLs, which may enable them to run code on servers.
CWE-22 Dec 19, 2022
CVE-2022-4050 9.8 CRITICAL EXPLOITED SSVC PoC NUCLEI EPSS 0.77
JoomSport <5.2.8 - SQL Injection
The JoomSport WordPress plugin before 5.2.8 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users
Dec 19, 2022
CVE-2022-46443 8.8 HIGH SSVC PoC NUCLEI EPSS 0.83
mesinkasir Bangresto 1.0 - SQL Injection
mesinkasir Bangresto 1.0 is vulnberable to SQL Injection via the itemqty%5B%5D parameter.
CWE-89 Dec 14, 2022
CVE-2022-46071 9.8 CRITICAL SSVC PoC NUCLEI EPSS 0.79
Helmet Store Showroom v1.0 - SQL Injection
There is SQL Injection vulnerability at Helmet Store Showroom v1.0 Login Page. This vulnerability can be exploited to bypass admin access.
CWE-89 Dec 14, 2022
CVE-2022-46073 6.1 MEDIUM SSVC PoC NUCLEI EPSS 0.30
Helmet Store Showroom 1.0 - XSS
Helmet Store Showroom 1.0 is vulnerable to Cross Site Scripting (XSS).
CWE-79 Dec 14, 2022
CVE-2022-3590 5.9 MEDIUM EXPLOITED SSVC PoC 4 PoCs Analysis NUCLEI EPSS 0.91
WordPress - Blind SSRF
WordPress is affected by an unauthenticated blind SSRF in the pingback feature. Because of a TOCTOU race condition between the validation checks and the HTTP request, attackers can reach internal hosts that are explicitly forbidden.
CWE-367 Dec 14, 2022
CVE-2022-46381 6.1 MEDIUM EXPLOITED SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.81
Linear eMerge E3-Series <0.32-08f - XSS
Certain Linear eMerge E3-Series devices are vulnerable to XSS via the type parameter (e.g., to the badging/badge_template_v0.php component). This affects 0.32-08f, 0.32-07p, 0.32-07e, 0.32-09c, 0.32-09b, 0.32-09a, and 0.32-08e.
CWE-79 Dec 13, 2022
CVE-2022-4223 8.8 HIGH NUCLEI EPSS 0.88
Pgadmin 4 < 6.17 - Missing Authorization
The pgAdmin server includes an HTTP API that is intended to be used to validate the path a user selects to external PostgreSQL utilities such as pg_dump and pg_restore. The utility is executed by the server to determine what PostgreSQL version it is from. Versions of pgAdmin prior to 6.17 failed to properly secure this API, which could allow an unauthenticated user to call it with a path of their choosing, such as a UNC path to a server they control on a Windows machine. This would cause an appropriately named executable in the target path to be executed by the pgAdmin server.
CWE-862 Dec 13, 2022
CVE-2022-45269 7.5 HIGH SSVC PoC NUCLEI EPSS 0.27
Gmaolinx Linx Sphere - Path Traversal
A directory traversal vulnerability in the component SCS.Web.Server.SPI/1.0 of Linx Sphere LINX 7.35.ST15 allows attackers to read arbitrary files.
CWE-22 Dec 12, 2022
CVE-2022-3982 9.8 CRITICAL EXPLOITED SSVC PoC NUCLEI EPSS 0.74
Booking Calendar <3.2.2 - Unauthenticated RCE
The Booking calendar, Appointment Booking System WordPress plugin before 3.2.2 does not validate uploaded files, which could allow unauthenticated users to upload arbitrary files, such as PHP and achieve RCE
Dec 12, 2022
CVE-2022-3934 5.4 MEDIUM SSVC PoC NUCLEI EPSS 0.05
Mehanoid Flat PM < 2.661 - XSS
The FlatPM WordPress plugin before 3.0.13 does not sanitise and escape some parameters before outputting them back in pages, leading to Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Dec 12, 2022
CVE-2022-3933 5.4 MEDIUM SSVC PoC NUCLEI EPSS 0.06
G5theme Essential Real Estate < 3.9.6 - XSS
The Essential Real Estate WordPress plugin before 3.9.6 does not sanitize and escapes some parameters, which could allow users with a role as low as Admin to perform Cross-Site Scripting attacks.
Dec 12, 2022
CVE-2022-3908 6.1 MEDIUM SSVC PoC NUCLEI EPSS 0.09
Helloprint < 1.4.7 - XSS
The Helloprint WordPress plugin before 1.4.7 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting
Dec 12, 2022
CVE-2022-37932 8.8 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.70
HPE Officeconnect 1820 J9979a Firmware - Authentication Bypass
A potential security vulnerability has been identified in Hewlett Packard Enterprise OfficeConnect 1820, 1850, and 1920S Network switches. The vulnerability could be remotely exploited to allow authentication bypass. HPE has made the following software updates to resolve the vulnerability in Hewlett Packard Enterprise OfficeConnect 1820, 1850 and 1920S Network switches versions: Prior to PT.02.14; Prior to PC.01.22; Prior to PO.01.21; Prior to PD.02.22;
Dec 12, 2022
CVE-2022-4375 6.3 MEDIUM SSVC PoC 1 PoC NUCLEI EPSS 0.26
Mingsoft MCMS <5.2.9 - SQL Injection
A vulnerability was found in Mingsoft MCMS up to 5.2.9. It has been classified as critical. Affected is an unknown function of the file /cms/category/list. The manipulation of the argument sqlWhere leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 5.2.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215196.
CWE-89 Dec 09, 2022
CVE-2022-41800 8.7 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
BIG-IP - Auth Bypass
In all versions of BIG-IP, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary.   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
CWE-77 Dec 07, 2022
CVE-2022-45917 6.1 MEDIUM SSVC PoC NUCLEI EPSS 0.39
Ilias < 7.16 - Open Redirect
ILIAS before 7.16 has an Open Redirect.
CWE-601 Dec 07, 2022
CVE-2022-46169 9.8 CRITICAL KEV SSVC ACTIVE 44 PoCs Analysis NUCLEI EPSS 0.94
Cacti 1.2.22 unauthenticated command injection
Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. The vulnerability resides in the `remote_agent.php` file. This file can be accessed without authentication. This function retrieves the IP address of the client via `get_client_addr` and resolves this IP address to the corresponding hostname via `gethostbyaddr`. After this, it is verified that an entry within the `poller` table exists, where the hostname corresponds to the resolved hostname. If such an entry was found, the function returns `true` and the client is authorized. This authorization can be bypassed due to the implementation of the `get_client_addr` function. The function is defined in the file `lib/functions.php` and checks serval `$_SERVER` variables to determine the IP address of the client. The variables beginning with `HTTP_` can be arbitrarily set by an attacker. Since there is a default entry in the `poller` table with the hostname of the server running Cacti, an attacker can bypass the authentication e.g. by providing the header `Forwarded-For: <TARGETIP>`. This way the function `get_client_addr` returns the IP address of the server running Cacti. The following call to `gethostbyaddr` will resolve this IP address to the hostname of the server, which will pass the `poller` hostname check because of the default entry. After the authorization of the `remote_agent.php` file is bypassed, an attacker can trigger different actions. One of these actions is called `polldata`. The called function `poll_for_data` retrieves a few request parameters and loads the corresponding `poller_item` entries from the database. If the `action` of a `poller_item` equals `POLLER_ACTION_SCRIPT_PHP`, the function `proc_open` is used to execute a PHP script. The attacker-controlled parameter `$poller_id` is retrieved via the function `get_nfilter_request_var`, which allows arbitrary strings. This variable is later inserted into the string passed to `proc_open`, which leads to a command injection vulnerability. By e.g. providing the `poller_id=;id` the `id` command is executed. In order to reach the vulnerable call, the attacker must provide a `host_id` and `local_data_id`, where the `action` of the corresponding `poller_item` is set to `POLLER_ACTION_SCRIPT_PHP`. Both of these ids (`host_id` and `local_data_id`) can easily be bruteforced. The only requirement is that a `poller_item` with an `POLLER_ACTION_SCRIPT_PHP` action exists. This is very likely on a productive instance because this action is added by some predefined templates like `Device - Uptime` or `Device - Polling Time`. This command injection vulnerability allows an unauthenticated user to execute arbitrary commands if a `poller_item` with the `action` type `POLLER_ACTION_SCRIPT_PHP` (`2`) is configured. The authorization bypass should be prevented by not allowing an attacker to make `get_client_addr` (file `lib/functions.php`) return an arbitrary IP address. This could be done by not honoring the `HTTP_...` `$_SERVER` variables. If these should be kept for compatibility reasons it should at least be prevented to fake the IP address of the server running Cacti. This vulnerability has been addressed in both the 1.2.x and 1.3.x release branches with `1.2.23` being the first release containing the patch.
CWE-78 Dec 05, 2022
CVE-2022-35507 7.1 HIGH SSVC PoC NUCLEI EPSS 0.14
Proxmox Mail Gateway < 4.1-3 - Injection
A response-header CRLF injection vulnerability in the Proxmox Virtual Environment (PVE) and Proxmox Mail Gateway (PMG) web interface allows a remote attacker to set cookies for a victim's browser that are longer than the server expects, causing a client-side DoS. This affects Chromium-based browsers because they allow injection of response headers with %0d. This is fixed in pve-http-server 4.1-3.
CWE-74 Dec 04, 2022