Vulnerabilities with Nuclei Scanner Templates
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2024-55550
2.7
LOW
KEV
RANSOMWARE
NUCLEI
EPSS 0.18
Mitel Micollab < 9.8.1.201 - Path Traversal
Mitel MiCollab through 9.8 SP2 could allow an authenticated attacker with administrative privilege to conduct a local file read, due to insufficient input sanitization. A successful exploit could allow the authenticated admin attacker to access resources that are constrained to the admin access level, and the disclosure is limited to non-sensitive system information. This vulnerability does not allow file modification or privilege escalation.
CWE-22
Dec 10, 2024
CVE-2024-53900
9.1
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.64
Mongoose <8.8.3 - SQL Injection
Mongoose before 8.8.3 can improperly use $where in match, leading to search injection.
CWE-89
Dec 02, 2024
CVE-2024-51228
6.8
MEDIUM
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.64
TOTOLINK - RCE
An issue in TOTOLINK-CX-A3002RU V1.0.4-B20171106.1512 and TOTOLINK-CX-N150RT V2.1.6-B20171121.1002 and TOTOLINK-CX-N300RT V2.1.6-B20170724.1420 and TOTOLINK-CX-N300RT V2.1.8-B20171113.1408 and TOTOLINK-CX-N300RT V2.1.8-B20191010.1107 and TOTOLINK-CX-N302RE V2.0.2-B20170511.1523 allows a remote attacker to execute arbitrary code via the /boafrm/formSysCmd component.
CWE-78
Nov 27, 2024
CVE-2024-33610
9.1
CRITICAL
NUCLEI
EPSS 0.62
Unauthenticated Access - Info Disclosure
"sessionlist.html" and "sys_trayentryreboot.html" are accessible with no authentication. "sessionlist.html" provides logged-in users' session information including session cookies, and "sys_trayentryreboot.html" allows to reboot the device. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
CWE-288
Nov 26, 2024
CVE-2024-33605
7.5
HIGH
NUCLEI
EPSS 0.60
Multiple MFPs - Path Traversal via installed_emanual_list.html
Improper processing of some parameters of installed_emanual_list.html leads to a path traversal vulnerability. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References].
CWE-22
Nov 26, 2024
CVE-2024-52763
5.4
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.01
Ganglia-web < 3.7.5 - XSS
A cross-site scripting (XSS) vulnerability in the component /graph_all_periods.php of Ganglia-web v3.73 to v3.75 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the "g" parameter.
CWE-79
Nov 19, 2024
CVE-2024-52762
5.4
MEDIUM
NUCLEI
EPSS 0.01
Ganglia-web < 3.76 - XSS
A cross-site scripting (XSS) vulnerability in the component /master/header.php of Ganglia-web v3.73 to v3.76 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the "tz" parameter.
CWE-79
Nov 19, 2024
CVE-2024-47533
9.8
CRITICAL
5 PoCs
Analysis
NUCLEI
EPSS 0.72
Cobbler <3.2.3, <3.3.7 - Auth Bypass
Cobbler, a Linux installation server that allows for rapid setup of network installation environments, has an improper authentication vulnerability starting in version 3.0.0 and prior to versions 3.2.3 and 3.3.7. `utils.get_shared_secret()` always returns `-1`, which allows anyone to connect to cobbler XML-RPC as user `''` password `-1` and make any changes. This gives anyone with network access to a cobbler server full control of the server. Versions 3.2.3 and 3.3.7 fix the issue.
CWE-287
Nov 18, 2024
CVE-2024-52433
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.80
Mindstien MY Geo Posts Free < 1.2 - Insecure Deserialization
Deserialization of Untrusted Data vulnerability in Mindstien Technologies My Geo Posts Free my-geo-posts-free allows Object Injection.This issue affects My Geo Posts Free: from n/a through <= 1.2.
CWE-502
Nov 18, 2024
CVE-2024-8856
9.8
CRITICAL
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.93
WordPress WP Time Capsule Arbitrary File Upload to RCE
The Backup and Staging by WP Time Capsule plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the the UploadHandler.php file and no direct file access prevention in all versions up to, and including, 1.22.21. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434
Nov 16, 2024
CVE-2024-9186
8.6
HIGH
NUCLEI
EPSS 0.33
Funnelkit Automations < 3.3.0 - SQL Injection
The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit WordPress plugin before 3.3.0 does not sanitize and escape the bwfan-track-id parameter before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
CWE-89
Nov 14, 2024
CVE-2024-5082
HIGH
EXPLOITED
NUCLEI
EPSS 0.06
Sonatype Nexus Repository <2.15.1 - RCE
A Remote Code Execution vulnerability has been discovered in Sonatype Nexus Repository 2.
This issue affects Nexus Repository 2 OSS/Pro versions up to and including 2.15.1.
CWE-94
Nov 14, 2024
CVE-2024-51211
9.8
CRITICAL
EXPLOITED
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.04
Os4ed Opensis - SQL Injection
SQL injection vulnerability exists in OS4ED openSIS-Classic Version 9.1, specifically in the resetuserinfo.php file. The vulnerability is due to improper input validation of the $username_stn_id parameter, which can be manipulated by an attacker to inject arbitrary SQL commands.
CWE-89
Nov 08, 2024
CVE-2024-47073
9.1
CRITICAL
NUCLEI
EPSS 0.56
DataEase <2.10.2 - Auth Bypass
DataEase is an open source data visualization analysis tool that helps users quickly analyze data and gain insights into business trends. In affected versions a the lack of signature verification of jwt tokens allows attackers to forge jwts which then allow access to any interface. The vulnerability has been fixed in v2.10.2 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-347
Nov 07, 2024
CVE-2024-43425
8.1
HIGH
9 PoCs
Analysis
NUCLEI
EPSS 0.89
Moodle Remote Code Execution (CVE-2024-43425)
A flaw was found in Moodle. Additional restrictions are required to avoid a remote code execution risk in calculated question types. Note: This requires the capability to add/update questions.
CWE-94
Nov 07, 2024
CVE-2024-50340
7.3
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.86
Symfony Runtime < 5.4.46 - Injection
symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the `register_argv_argc` php directive is set to `on` , and users call any URL with a special crafted query string, they are able to change the environment or debug mode used by the kernel when handling the request. As of versions 5.4.46, 6.4.14, and 7.1.7 the `SymfonyRuntime` now ignores the `argv` values for non-SAPI PHP runtimes. All users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-74
Nov 06, 2024
CVE-2024-51739
7.5
HIGH
NUCLEI
EPSS 0.32
Combodo iTop - Info Disclosure
Combodo iTop is a simple, web based IT Service Management tool. Unauthenticated user can perform users enumeration, which can make it easier to bruteforce a valid account. As a fix the sentence displayed after resetting password no longer shows if the user exists or not. This fix is included in versions 2.7.11, 3.0.5, 3.1.2, and 3.2.0. Users are advised to upgrade. Users unable to upgrade may overload the dictionary entry `"UI:ResetPwd-Error-WrongLogin"` through an extension and replace it with a generic message.
CWE-200
Nov 05, 2024
CVE-2024-32870
5.8
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.21
Combodo Itop < 2.7.11 - Information Disclosure
Combodo iTop is a simple, web based IT Service Management tool. Server, OS, DBMS, PHP, and iTop info (name, version and parameters) can be read by anyone having access to iTop URI. This issue has been patched in versions 2.7.11, 3.0.5, 3.1.2, and 3.2.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-200
Nov 05, 2024
CVE-2024-51483
MEDIUM
1 Writeup
NUCLEI
EPSS 0.39
Pypi Changedetection.io < 0.47.5 - Path Traversal
changedetection.io is free, open source web page change detection software. Prior to version 0.47.5, when a WebDriver is used to fetch files, `source:file:///etc/passwd` can be used to retrieve local system files, where the more traditional `file:///etc/passwd` gets blocked. Version 0.47.5 fixes the issue.
CWE-22
Nov 01, 2024
CVE-2024-47308
6.5
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.41
Templately <3.1.2 - Info Disclosure
Missing Authorization vulnerability in WPDeveloper Templately templately.This issue affects Templately: from n/a through <= 3.1.2.
CWE-862
Nov 01, 2024