Vulnerabilities with Nuclei Scanner Templates

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,402 CVEs tracked 53,629 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,301 vendors 43,863 researchers
4,077 results Clear all
CVE-2024-43919 5.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.85
Yarpp Yet Another Related Posts Plugin - Missing Authorization
Access Control vulnerability in YARPP YARPP allows . This issue affects YARPP: from n/a through 5.30.10.
CWE-862 Nov 01, 2024
CVE-2024-48360 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.91
Qualitor - SSRF
Qualitor v8.24 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /request/viewValidacao.php.
CWE-918 Oct 31, 2024
CVE-2024-51482 9.9 CRITICAL 8 PoCs Analysis NUCLEI EPSS 0.48
ZoneMinder <1.37.64 - SQL Injection
ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder v1.37.* <= 1.37.64 is vulnerable to boolean-based SQL Injection in function of web/ajax/event.php. This is fixed in 1.37.65.
CWE-89 Oct 31, 2024
CVE-2024-48307 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Jeecg Boot - SQL Injection
JeecgBoot v3.7.1 was discovered to contain a SQL injection vulnerability via the component /onlDragDatasetHead/getTotalData.
CWE-89 Oct 31, 2024
CVE-2024-51568 10.0 CRITICAL EXPLOITED RANSOMWARE 1 PoC Analysis NUCLEI EPSS 0.93
CyberPanel <2.3.5 - Command Injection
CyberPanel (aka Cyber Panel) before 2.3.5 allows Command Injection via completePath in the ProcessUtilities.outputExecutioner() sink. There is /filemanager/upload (aka File Manager upload) unauthenticated remote code execution via shell metacharacters.
CWE-78 Oct 29, 2024
CVE-2024-51567 10.0 CRITICAL KEV RANSOMWARE 5 PoCs Analysis NUCLEI EPSS 0.94
CyberPanel Multi CVE Pre-auth RCE
upgrademysqlstatus in databases/views.py in CyberPanel (aka Cyber Panel) before 5b08cd6 allows remote attackers to bypass authentication and execute arbitrary commands via /dataBases/upgrademysqlstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
CWE-306 Oct 29, 2024
CVE-2024-51378 10.0 CRITICAL KEV RANSOMWARE 6 PoCs Analysis NUCLEI EPSS 0.94
Cyberpanel < 2.3.8 - OS Command Injection
getresetstatus in dns/views.py and ftp/views.py in CyberPanel (aka Cyber Panel) before 1c0c6cb allows remote attackers to bypass authentication and execute arbitrary commands via /dns/getresetstatus or /ftp/getresetstatus by bypassing secMiddleware (which is only for a POST request) and using shell metacharacters in the statusfile property, as exploited in the wild in October 2024 by PSAUX. Versions through 2.3.6 and (unpatched) 2.3.7 are affected.
CWE-78 Oct 29, 2024
CVE-2024-50334 5.3 MEDIUM EXPLOITED NUCLEI EPSS 0.10
Scoold - Path Traversal
Scoold is a Q&A and a knowledge sharing platform for teams. A semicolon path injection vulnerability was found on the /api;/config endpoint. By appending a semicolon in the URL, attackers can bypass authentication and gain unauthorised access to sensitive configuration data. Furthermore, PUT requests on the /api;/config endpoint while setting the Content-Type: application/hocon header allow unauthenticated attackers to file reading via HOCON file inclusion. This allows attackers to retrieve sensitive information such as configuration files from the server, which can be leveraged for further exploitation. The vulnerability has been fixed in Scoold 1.64.0. A workaround would be to disable the Scoold API with scoold.api_enabled = false.
CWE-288 Oct 29, 2024
CVE-2024-50498 10.0 CRITICAL EXPLOITED 7 PoCs Analysis NUCLEI EPSS 0.92
Lubus WP Query Console < 1.0 - Code Injection
Improper Control of Generation of Code ('Code Injection') vulnerability in Ajit Bohra WP Query Console wp-query-console allows Code Injection.This issue affects WP Query Console: from n/a through <= 1.0.
CWE-94 Oct 28, 2024
CVE-2024-50477 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.82
Stacksmarket Stacks Mobile App Builder - Missing Authentication
Authentication Bypass Using an Alternate Path or Channel vulnerability in Stacks Stacks Mobile App Builder stacks-mobile-app-builder allows Authentication Bypass.This issue affects Stacks Mobile App Builder: from n/a through <= 5.2.3.
CWE-288 Oct 28, 2024
CVE-2024-50623 9.8 CRITICAL KEV RANSOMWARE 5 PoCs Analysis NUCLEI EPSS 0.94
Cleo Harmony < 5.8.0.21 - Unrestricted File Upload
In Cleo Harmony before 5.8.0.21, VLTrader before 5.8.0.21, and LexiCom before 5.8.0.21, there is an unrestricted file upload and download that could lead to remote code execution.
CWE-434 Oct 28, 2024
CVE-2024-49757 7.5 HIGH NUCLEI EPSS 0.11
Zitadel <2.64.0-2.58.7 - Auth Bypass
The open-source identity infrastructure software Zitadel allows administrators to disable the user self-registration. Due to a missing security check in versions prior to 2.64.0, 2.63.5, 2.62.7, 2.61.4, 2.60.4, 2.59.5, and 2.58.7, disabling the "User Registration allowed" option only hid the registration button on the login page. Users could bypass this restriction by directly accessing the registration URL (/ui/login/loginname) and register a user that way. Versions 2.64.0, 2.63.5, 2.62.7, 2.61.4, 2.60.4, 2.59.5, and 2.58.7 contain a patch. No known workarounds are available.
CWE-287 Oct 25, 2024
CVE-2024-49380 7.5 HIGH EXPLOITED 1 Writeup NUCLEI EPSS 0.64
Plenti <0.7.2 - RCE
Plenti, a static site generator, has an arbitrary file write vulnerability in versions prior to 0.7.2. The `/postLocal` endpoint is vulnerable to an arbitrary file write vulnerability when a plenti user serves their website. This issue may lead to Remote Code Execution. Version 0.7.2 fixes the vulnerability.
CWE-78 Oct 25, 2024
CVE-2024-6049 7.5 HIGH NUCLEI EPSS 0.73
Lawo AG vsm LTC Time Sync - Path Traversal
The web server of Lawo AG vsm LTC Time Sync (vTimeSync) is affected by a "..." (triple dot) path traversal vulnerability. By sending a specially crafted HTTP request, an unauthenticated remote attacker could download arbitrary files from the operating system. As a limitation, the exploitation is only possible if the requested file has some file extension, e. g. .exe or .txt.
CWE-32 Oct 24, 2024
CVE-2024-8852 5.3 MEDIUM EXPLOITED NUCLEI EPSS 0.10
Servmask All-in-one WP Migration < 7.87 - Information Disclosure
The All-in-One WP Migration and Backup plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.86 through publicly exposed log files. This makes it possible for unauthenticated attackers to view potentially sensitive information such as full paths contained in the exposed log files.
CWE-200 Oct 22, 2024
CVE-2024-41713 9.1 CRITICAL KEV RANSOMWARE 6 PoCs Analysis NUCLEI EPSS 0.94
Mitel Micollab < 9.8.1.201 - Path Traversal
A vulnerability in the NuPoint Unified Messaging (NPM) component of Mitel MiCollab through 9.8 SP1 FP2 (9.8.1.201) could allow an unauthenticated attacker to conduct a path traversal attack, due to insufficient input validation. A successful exploit could allow unauthorized access, enabling the attacker to view, corrupt, or delete users' data and system configurations.
CWE-22 Oct 21, 2024
CVE-2024-35286 9.8 CRITICAL EXPLOITED 1 PoC NUCLEI EPSS 0.64
Mitel Micollab < 9.8.0.33 - SQL Injection
A vulnerability in NuPoint Messenger (NPM) of Mitel MiCollab through 9.8.0.33 allows an unauthenticated attacker to conduct a SQL injection attack due to insufficient sanitization of user input. A successful exploit could allow an attacker to access sensitive information and execute arbitrary database and management operations.
CWE-89 Oct 21, 2024
CVE-2024-45309 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.89
OneDev Unauthenticated Arbitrary File Read
OneDev is a Git server with CI/CD, kanban, and packages. A vulnerability in versions prior to 11.0.9 allows unauthenticated users to read arbitrary files accessible by the OneDev server process. This issue has been fixed in version 11.0.9.
CWE-22 Oct 21, 2024
CVE-2024-44000 9.8 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.93
Litespeedtech Litespeed Cache - Insufficiently Protected Credentials
Insufficiently Protected Credentials vulnerability in LiteSpeed Technologies LiteSpeed Cache litespeed-cache allows Authentication Bypass.This issue affects LiteSpeed Cache: from n/a through < 6.5.0.1.
CWE-522 Oct 20, 2024
CVE-2024-9264 9.9 CRITICAL 13 PoCs Analysis NUCLEI EPSS 0.94
Grafana < 11.0.6+security-01 - Command Injection
The SQL Expressions experimental feature of Grafana allows for the evaluation of `duckdb` queries containing user input. These queries are insufficiently sanitized before being passed to `duckdb`, leading to a command injection and local file inclusion vulnerability. Any user with the VIEWER or higher permission is capable of executing this attack. The `duckdb` binary must be present in Grafana's $PATH for this attack to function; by default, this binary is not installed in Grafana distributions.
CWE-94 Oct 18, 2024