Vulnerabilities with Nuclei Scanner Templates
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2024-43919
5.3
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.85
Yarpp Yet Another Related Posts Plugin - Missing Authorization
Access Control vulnerability in YARPP YARPP allows .
This issue affects YARPP: from n/a through 5.30.10.
CWE-862
Nov 01, 2024
CVE-2024-48360
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.91
Qualitor - SSRF
Qualitor v8.24 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /request/viewValidacao.php.
CWE-918
Oct 31, 2024
CVE-2024-51482
9.9
CRITICAL
8 PoCs
Analysis
NUCLEI
EPSS 0.48
ZoneMinder <1.37.64 - SQL Injection
ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder v1.37.* <= 1.37.64 is vulnerable to boolean-based SQL Injection in function of web/ajax/event.php. This is fixed in 1.37.65.
CWE-89
Oct 31, 2024
CVE-2024-48307
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Jeecg Boot - SQL Injection
JeecgBoot v3.7.1 was discovered to contain a SQL injection vulnerability via the component /onlDragDatasetHead/getTotalData.
CWE-89
Oct 31, 2024
CVE-2024-51568
10.0
CRITICAL
EXPLOITED
RANSOMWARE
1 PoC
Analysis
NUCLEI
EPSS 0.93
CyberPanel <2.3.5 - Command Injection
CyberPanel (aka Cyber Panel) before 2.3.5 allows Command Injection via completePath in the ProcessUtilities.outputExecutioner() sink. There is /filemanager/upload (aka File Manager upload) unauthenticated remote code execution via shell metacharacters.
CWE-78
Oct 29, 2024
CVE-2024-51567
10.0
CRITICAL
KEV
RANSOMWARE
5 PoCs
Analysis
NUCLEI
EPSS 0.94
CyberPanel Multi CVE Pre-auth RCE
upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
CWE-306
Oct 29, 2024
CVE-2024-51378
10.0
CRITICAL
KEV
RANSOMWARE
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Cyberpanel < 2.3.8 - OS Command Injection
getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
CWE-78
Oct 29, 2024
CVE-2024-50334
5.3
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.10
Scoold - Path Traversal
Scoold is a Q&A and a knowledge sharing platform for teams. A semicolon path injection vulnerability was found on the /api;/config endpoint. By appending a semicolon in the URL, attackers can bypass authentication and gain unauthorised access to sensitive configuration data. Furthermore, PUT requests on the /api;/config endpoint while setting the Content-Type: application/hocon header allow unauthenticated attackers to file reading via HOCON file inclusion. This allows attackers to retrieve sensitive information such as configuration files from the server, which can be leveraged for further exploitation. The vulnerability has been fixed in Scoold 1.64.0. A workaround would be to disable the Scoold API with scoold.api_enabled = false.
CWE-288
Oct 29, 2024
CVE-2024-50498
10.0
CRITICAL
EXPLOITED
7 PoCs
Analysis
NUCLEI
EPSS 0.92
Lubus WP Query Console < 1.0 - Code Injection
Improper Control of Generation of Code ('Code Injection') vulnerability in Ajit Bohra WP Query Console wp-query-console allows Code Injection.This issue affects WP Query Console: from n/a through <= 1.0.
CWE-94
Oct 28, 2024
CVE-2024-50477
9.8
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.82
Stacksmarket Stacks Mobile App Builder - Missing Authentication
Authentication Bypass Using an Alternate Path or Channel vulnerability in Stacks Stacks Mobile App Builder stacks-mobile-app-builder allows Authentication Bypass.This issue affects Stacks Mobile App Builder: from n/a through <= 5.2.3.
CWE-288
Oct 28, 2024
CVE-2024-50623
9.8
CRITICAL
KEV
RANSOMWARE
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Cleo Harmony < 5.8.0.21 - Unrestricted File Upload
In Cleo Harmony before 5.8.0.21, VLTrader before 5.8.0.21, and LexiCom before 5.8.0.21, there is an unrestricted file upload and download that could lead to remote code execution.
CWE-434
Oct 28, 2024
CVE-2024-49757
7.5
HIGH
NUCLEI
EPSS 0.11
Zitadel <2.64.0-2.58.7 - Auth Bypass
The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. Due to a missing security check in versions prior to 2.64.0, 2.63.5, 2.62.7, 2.61.4, 2.60.4, 2.59.5, and 2.58.7, disabling the "User Registration allowed" option only hid the registration button on the login page. Users could bypass this restriction by directly accessing the registration URL (/ui/login/loginname) and register a user that way. Versions 2.64.0, 2.63.5, 2.62.7, 2.61.4, 2.60.4, 2.59.5, and 2.58.7 contain a patch. No known workarounds are available.
CWE-287
Oct 25, 2024
CVE-2024-49380
7.5
HIGH
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.64
Plenti <0.7.2 - RCE
Plenti, a static site generator, has an arbitrary file write vulnerability in versions prior to 0.7.2. The `/postLocal` endpoint is vulnerable to an arbitrary file write vulnerability when a plenti user serves their website. This issue may lead to Remote Code Execution. Version 0.7.2 fixes the vulnerability.
CWE-78
Oct 25, 2024
CVE-2024-6049
7.5
HIGH
NUCLEI
EPSS 0.73
Lawo AG vsm LTC Time Sync - Path Traversal
The web server of Lawo AG vsm LTC Time Sync (vTimeSync) is affected by a "..." (triple dot) path traversal vulnerability. By sending a specially crafted HTTP request, an unauthenticated remote attacker could download arbitrary files from the operating system. As a limitation, the exploitation is only possible if the requested file has some file extension, e. g. .exe or .txt.
CWE-32
Oct 24, 2024
CVE-2024-8852
5.3
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.10
Servmask All-in-one WP Migration < 7.87 - Information Disclosure
The All-in-One WP Migration and Backup plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.86 through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information such as full paths contained in the exposed log files.
CWE-200
Oct 22, 2024
CVE-2024-41713
9.1
CRITICAL
KEV
RANSOMWARE
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Mitel Micollab < 9.8.1.201 - Path Traversal
A vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct a path traversal attack, due to insufficient input validation. A successful exploit could allow unauthorized access, enabling the attacker to view, corrupt, or delete users' data and system configurations.
CWE-22
Oct 21, 2024
CVE-2024-35286
9.8
CRITICAL
EXPLOITED
1 PoC
NUCLEI
EPSS 0.64
Mitel Micollab < 9.8.0.33 - SQL Injection
A vulnerability in NuPoint Messenger (NPM) of Mitel MiCollab through 9.8.0.33 allows an unauthenticated attacker to conduct a SQL injection attack due to insufficient sanitization of user input. A successful exploit could allow an attacker to access sensitive information and execute arbitrary database and management operations.
CWE-89
Oct 21, 2024
CVE-2024-45309
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.89
OneDev Unauthenticated Arbitrary File Read
OneDev is a Git server with CI/CD, kanban, and packages. A vulnerability in versions prior to 11.0.9 allows unauthenticated users to read arbitrary files accessible by the OneDev server process. This issue has been fixed in version 11.0.9.
CWE-22
Oct 21, 2024
CVE-2024-44000
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.93
Litespeedtech Litespeed Cache - Insufficiently Protected Credentials
Insufficiently Protected Credentials vulnerability in LiteSpeed Technologies LiteSpeed Cache litespeed-cache allows Authentication Bypass.This issue affects LiteSpeed Cache: from n/a through < 6.5.0.1.
CWE-522
Oct 20, 2024
CVE-2024-9264
9.9
CRITICAL
13 PoCs
Analysis
NUCLEI
EPSS 0.94
Grafana < 11.0.6+security-01 - Command Injection
The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
CWE-94
Oct 18, 2024