Vulnerabilities with Nuclei Scanner Templates
Updated 11m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2024-27115
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.82
SOPlanning - Remote Code Execution
A unauthenticated Remote Code Execution (RCE) vulnerability is found in the SO Planning online planning tool. With this vulnerability, an attacker can upload executable files that are moved to a publicly accessible folder before verifying any requirements. This leads to the possibility of execution of code on the underlying system when the file is triggered. The vulnerability has been remediated in version 1.52.02.
CWE-434
Sep 11, 2024
CVE-2024-8503
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
VICIdial Authenticated Remote Code Execution
An unauthenticated attacker can leverage a time-based SQL injection vulnerability in VICIdial to enumerate database records. By default, VICIdial stores plaintext credentials within the database.
CWE-89
Sep 10, 2024
CVE-2024-45591
5.3
MEDIUM
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.86
Xwiki < 15.10.9 - Missing Authorization
XWiki Platform is a generic wiki platform. The REST API exposes the history of any page in XWiki of which the attacker knows the name. The exposed information includes for each modification of the page the time of the modification, the version number, the author of the modification (both username and displayed name) and the version comment. This information is exposed regardless of the rights setup, and even when the wiki is configured to be fully private. On a private wiki, this can be tested by accessing /xwiki/rest/wikis/xwiki/spaces/Main/pages/WebHome/history, if this shows the history of the main page then the installation is vulnerable. This has been patched in XWiki 15.10.9 and XWiki 16.3.0RC1.
CWE-359
Sep 10, 2024
CVE-2024-37728
7.5
HIGH
1 Writeup
NUCLEI
EPSS 0.13
OfficeWeb365 <8.6.1.0 - Info Disclosure
Arbitrary File Read vulnerability in Xi'an Daxi Information Technology Co., Ltd OfficeWeb365 v.7.18.23.0 and v8.6.1.0 allows a remote attacker to obtain sensitive information via the "Pic/Indexes" interface
CWE-22
Sep 10, 2024
CVE-2024-44849
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.92
Qualitor <8.24 - RCE
Qualitor up to 8.24 is vulnerable to Remote Code Execution (RCE) via Arbitrary File Upload in checkAcesso.php.
CWE-434
Sep 09, 2024
CVE-2024-6928
9.8
CRITICAL
NUCLEI
EPSS 0.77
Opti.marketing Opti Marketing < 2.0.9 - SQL Injection
The Opti Marketing WordPress plugin through 2.0.9 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
CWE-89
Sep 08, 2024
CVE-2024-6924
9.8
CRITICAL
NUCLEI
EPSS 0.77
Themetechmount Truebooker < 1.0.2 - SQL Injection
The TrueBooker WordPress plugin before 1.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
CWE-89
Sep 08, 2024
CVE-2024-40711
9.8
CRITICAL
KEV
RANSOMWARE
2 PoCs
Analysis
NUCLEI
EPSS 0.68
Veeam Backup & Replication 12.0.0.1420 through 12.2.0.334 - Deserialization RCE
A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE).
CWE-502
Sep 07, 2024
CVE-2024-8517
9.8
CRITICAL
3 PoCs
Analysis
NUCLEI
EPSS 0.93
SPIP <4.3.2-4.1.18 - Command Injection
SPIP before 4.3.2, 4.2.16, and
4.1.18 is vulnerable to a command injection issue. A
remote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request.
CWE-78
Sep 06, 2024
CVE-2024-7591
10.0
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.31
Kemptechnologies Loadmaster < 7.2.60.0 - OS Command Injection
Improper Input Validation vulnerability in Progress LoadMaster allows OS Command Injection.This issue affects:
* LoadMaster: 7.2.40.0 and above
* ECS: All versions
* Multi-Tenancy: 7.1.35.4 and above
CWE-78
Sep 05, 2024
CVE-2024-24759
9.3
CRITICAL
1 Writeup
NUCLEI
EPSS 0.83
MindsDB -DNS Rebinding SSRF Protection Bypass
MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 23.12.4.2, a threat actor can bypass the server-side request forgery protection on the whole website with DNS Rebinding. The vulnerability can also lead to denial of service. Version 23.12.4.2 contains a patch.
CWE-918
Sep 05, 2024
CVE-2024-6846
5.3
MEDIUM
NUCLEI
EPSS 0.06
Chatbot with ChatGPT WP <2.4.5 - Info Disclosure
The Chatbot with ChatGPT WordPress plugin before 2.4.5 does not validate access on some REST routes, allowing for an unauthenticated user to purge error and chat logs
Sep 05, 2024
CVE-2024-20440
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.77
Cisco Smart Licensing Utility - Info Disclosure
A vulnerability in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to access sensitive information.
This vulnerability is due to excessive verbosity in a debug log file. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain log files that contain sensitive data, including credentials that can be used to access the API.
CWE-532
Sep 04, 2024
CVE-2024-20439
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.86
Cisco Smart Licensing Utility - Auth Bypass
A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential.
This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to login to the affected system. A successful exploit could allow the attacker to login to the affected system with administrative rights over the CSLU application API.
CWE-912
Sep 04, 2024
CVE-2024-45507
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.90
Apache OFBiz <18.12.16 - SSRF/Code Injection
Server-Side Request Forgery (SSRF), Improper Control of Generation of Code ('Code Injection') vulnerability in Apache OFBiz.
This issue affects Apache OFBiz: before 18.12.16.
Users are recommended to upgrade to version 18.12.16, which fixes the issue.
CWE-918
Sep 04, 2024
CVE-2024-45195
7.5
HIGH
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Apache OFBiz <18.12.16 - Info Disclosure
Direct Request ('Forced Browsing') vulnerability in Apache OFBiz.
This issue affects Apache OFBiz: before 18.12.16.
Users are recommended to upgrade to version 18.12.16, which fixes the issue.
CWE-425
Sep 04, 2024
CVE-2024-7786
5.3
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.70
Sensei LMS <4.24.2 - Info Disclosure
The Sensei LMS WordPress plugin before 4.24.2 does not properly protect some its REST API routes, allowing unauthenticated attackers to leak email templates.
Sep 04, 2024
CVE-2024-6926
9.8
CRITICAL
NUCLEI
EPSS 0.74
Wow-company Viral Signup < 2.1 - SQL Injection
The Viral Signup WordPress plugin through 2.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
CWE-89
Sep 04, 2024
CVE-2024-45622
9.8
CRITICAL
1 Writeup
NUCLEI
EPSS 0.53
ASIS <3.2.0 - SQL Injection
ASIS (aka Aplikasi Sistem Sekolah using CodeIgniter 3) 3.0.0 through 3.2.0 allows index.php username SQL injection for Authentication Bypass.
CWE-89
Sep 02, 2024
CVE-2024-45388
7.5
HIGH
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.94
Hoverfly - Info Disclosure
Hoverfly is a lightweight service virtualization/ API simulation / API mocking tool for developers and testers. The `/api/v2/simulation` POST handler allows users to create new simulation views from the contents of a user-specified file. This feature can be abused by an attacker to read arbitrary files from the Hoverfly server. Note that, although the code prevents absolute paths from being specified, an attacker can escape out of the `hf.Cfg.ResponsesBodyFilesPath` base path by using `../` segments and reach any arbitrary files. This issue was found using the Uncontrolled data used in path expression CodeQL query for python. Users are advised to make sure the final path (`filepath.Join(hf.Cfg.ResponsesBodyFilesPath, filePath)`) is contained within the expected base path (`filepath.Join(hf.Cfg.ResponsesBodyFilesPath, "/")`). This issue is also tracked as GHSL-2023-274.
CWE-22
Sep 02, 2024