Vulnerabilities with Nuclei Scanner Templates

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,391 CVEs tracked 53,627 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,294 vendors 43,856 researchers
4,077 results Clear all
CVE-2024-9707 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.90
Themehunk Hunk Companion < 1.8.5 - Missing Authorization
The Hunk Companion plugin for WordPress is vulnerable to unauthorized plugin installation/activation due to a missing capability check on the /wp-json/hc/v1/themehunk-import REST API endpoint in all versions up to, and including, 1.8.4. This makes it possible for unauthenticated attackers to install and activate arbitrary plugins which can be leveraged to achieve remote code execution if another vulnerable plugin is installed and activated.
CWE-862 Oct 11, 2024
CVE-2024-9796 9.8 CRITICAL 5 PoCs Analysis NUCLEI EPSS 0.83
Internet-formation Wp-advanced-search < 3.3.9.2 - SQL Injection
The WP-Advanced-Search WordPress plugin before 3.3.9.2 does not sanitize and escape the t parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
CWE-89 Oct 10, 2024
CVE-2024-45519 10.0 CRITICAL KEV 6 PoCs Analysis NUCLEI EPSS 0.94
Zimbra Collaboration <8.8.15-9.0.0-10.0.9-10.1.1 - Command Injection
The postjournal service in Zimbra Collaboration (ZCS) before 8.8.15 Patch 46, 9 before 9.0.0 Patch 41, 10 before 10.0.9, and 10.1 before 10.1.1 sometimes allows unauthenticated users to execute commands.
CWE-78 Oct 02, 2024
CVE-2024-47176 5.3 MEDIUM EXPLOITED 18 PoCs Analysis NUCLEI EPSS 0.87
CUPS - SSRF
CUPS is a standards-based, open-source printing system, and `cups-browsed` contains network printing functionality including, but not limited to, auto-discovering print services and shared printers. `cups-browsed` binds to `INADDR_ANY:631`, causing it to trust any packet from any source, and can cause the `Get-Printer-Attributes` IPP request to an attacker controlled URL. When combined with other vulnerabilities, such as CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177, an attacker can execute arbitrary commands remotely on the target machine without authentication when a malicious printer is printed to.
CWE-1327 Sep 26, 2024
CVE-2024-23108 10.0 CRITICAL EXPLOITED RANSOMWARE 2 PoCs Analysis NUCLEI EPSS 0.90
Fortinet FortiSIEM - OS Command Injection
An improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet allows attacker to execute unauthorized code or commands via via crafted API requests.
CWE-78 Feb 05, 2024
CVE-2024-23897 9.8 CRITICAL KEV RANSOMWARE 56 PoCs Analysis NUCLEI EPSS 0.94
Jenkins cli Ampersand Replacement Arbitrary File Read
Jenkins 2.441 and earlier, LTS 2.426.2 and earlier does not disable a feature of its CLI command parser that replaces an '@' character followed by a file path in an argument with the file's contents, allowing unauthenticated attackers to read arbitrary files on the Jenkins controller file system.
CWE-22 Jan 24, 2024
CVE-2024-14015 7.1 HIGH NUCLEI EPSS 0.00
WordPress eCommerce Plugin <2.9.0 - XSS
The WordPress eCommerce Plugin WordPress plugin through 2.9.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
Nov 24, 2025
CVE-2024-13979 9.8 CRITICAL EXPLOITED 1 Writeup NUCLEI EPSS 0.09
St. Joe Erp System - SQL Injection
A SQL injection vulnerability exists in the St. Joe ERP system ("圣乔ERP系统") that allows unauthenticated remote attackers to execute arbitrary SQL commands via crafted HTTP POST requests to the login endpoint. The application fails to properly sanitize user-supplied input before incorporating it into SQL queries, enabling direct manipulation of the backend database. Successful exploitation may result in unauthorized data access, modification of records, or limited disruption of service. An affected version range is undefined. Exploitation evidence was first observed by the Shadowserver Foundation on 2025-04-14 UTC.
CWE-89 Aug 27, 2025
CVE-2024-32640 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.94
MASA CMS <7.4.5-7.2.7 - SQL Injection
MASA CMS is an Enterprise Content Management platform based on open source technology. Versions prior to 7.4.5, 7.3.12, and 7.2.7 contain a SQL injection vulnerability in the `processAsyncObject` method that can result in remote code execution. Versions 7.4.5, 7.3.12, and 7.2.7 contain a fix for the issue.
CWE-89 Aug 11, 2025
CVE-2024-37656 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.00
SIR Gnuboard - Open Redirect
An open redirect vulnerability in gnuboard5 v.5.5.16 allows a remote attacker to obtain sensitive information via the insufficient URL parameter verification in bbs/logout.php.
CWE-601 Jul 07, 2025
CVE-2024-51978 9.8 CRITICAL EXPLOITED 1 PoC 2 Writeups Analysis NUCLEI EPSS 0.54
Unknown Device - Info Disclosure
An unauthenticated attacker who knows the target device's serial number, can generate the default administrator password for the device. An unauthenticated attacker can first discover the target device's serial number via CVE-2024-51977 over HTTP/HTTPS/IPP, or via a PJL request, or via an SNMP request.
CWE-1391 Jun 25, 2025
CVE-2024-51977 5.3 MEDIUM EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.45
Multiple Brother devices authentication bypass via default administrator password generation
An unauthenticated attacker who can access either the HTTP service (TCP port 80), the HTTPS service (TCP port 443), or the IPP service (TCP port 631), can leak several pieces of sensitive information from a vulnerable device. The URI path /etc/mnt_info.csv can be accessed via a GET request and no authentication is required. The returned result is a comma separated value (CSV) table of information. The leaked information includes the device’s model, firmware version, IP address, and serial number.
CWE-538 Jun 25, 2025
CVE-2024-29198 7.5 HIGH EXPLOITED NUCLEI EPSS 0.10
GeoServer Demo Request Endpoint - Server Side Request Forgery
GeoServer is an open source software server written in Java that allows users to share and edit geospatial data. It possible to achieve Service Side Request Forgery (SSRF) via the Demo request endpoint if Proxy Base URL has not been set. Upgrading to GeoServer 2.24.4, or 2.25.2, removes the TestWfsPost servlet resolving this issue.
CWE-918 Jun 10, 2025
CVE-2024-7097 4.3 MEDIUM EXPLOITED NUCLEI EPSS 0.27
Wso2 API Manager - Incorrect Authorization
An incorrect authorization vulnerability exists in multiple WSO2 products due to a flaw in the SOAP admin service, which allows user account creation regardless of the self-registration configuration settings. This vulnerability enables malicious actors to create new user accounts without proper authorization. Exploitation of this flaw could allow an attacker to create multiple low-privileged user accounts, gaining unauthorized access to the system. Additionally, continuous exploitation could lead to system resource exhaustion through mass user creation.
CWE-863 May 30, 2025
CVE-2024-33939 5.3 MEDIUM EXPLOITED NUCLEI EPSS 0.04
Masteriyo - LMS <1.7.3 - Auth Bypass
Authentication Bypass Using an Alternate Path or Channel vulnerability in masteriyo Masteriyo - LMS learning-management-system.This issue affects Masteriyo - LMS: from n/a through <= 1.7.3.
CWE-288 May 19, 2025
CVE-2024-8673 9.1 CRITICAL NUCLEI EPSS 0.06
Z-Downloads <1.11.7 - XSS
The Z-Downloads WordPress plugin before 1.11.7 does not properly validate uploaded files allowing for the uploading of SVGs containing malicious JavaScript.
May 15, 2025
CVE-2024-6690 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.00
WordPress wccp-pro <15.3 - Open Redirect
The wccp-pro WordPress plugin before 15.3 contains an open-redirect flaw via the referrer parameter, allowing redirection of users to external sites
CWE-601 May 15, 2025
CVE-2024-6159 9.8 CRITICAL NUCLEI EPSS 0.10
WordPress Plugin <1.9.4 - SQL Injection
The Push Notification for Post and BuddyPress WordPress plugin before 1.9.4 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
CWE-89 May 15, 2025
CVE-2024-13727 6.1 MEDIUM NUCLEI EPSS 0.00
Memberspace < 2.1.14 - XSS
The MemberSpace WordPress plugin before 2.1.14 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against only unauthenticated users.
CWE-79 May 15, 2025
CVE-2024-13619 6.1 MEDIUM NUCLEI EPSS 0.00
Lifterlms < 8.0.1 - XSS
The LifterLMS WordPress plugin before 8.0.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
CWE-79 May 15, 2025