Vulnerabilities with Nuclei Scanner Templates

Updated 11m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,077 results Clear all
CVE-2024-27115 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.82
SOPlanning - Remote Code Execution
A unauthenticated Remote Code Execution (RCE) vulnerability is found in the SO Planning online planning tool. With this vulnerability, an attacker can upload executable files that are moved to a publicly accessible folder before verifying any requirements. This leads to the possibility of execution of code on the underlying system when the file is triggered. The vulnerability has been remediated in version 1.52.02.
CWE-434 Sep 11, 2024
CVE-2024-8503 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
VICIdial Authenticated Remote Code Execution
An unauthenticated attacker can leverage a time-based SQL injection vulnerability in VICIdial to enumerate database records. By default, VICIdial stores plaintext credentials within the database.
CWE-89 Sep 10, 2024
CVE-2024-45591 5.3 MEDIUM 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.86
Xwiki < 15.10.9 - Missing Authorization
XWiki Platform is a generic wiki platform. The REST API exposes the history of any page in XWiki of which the attacker knows the name. The exposed information includes for each modification of the page the time of the modification, the version number, the author of the modification (both username and displayed name) and the version comment. This information is exposed regardless of the rights setup, and even when the wiki is configured to be fully private. On a private wiki, this can be tested by accessing /xwiki/rest/wikis/xwiki/spaces/Main/pages/WebHome/history, if this shows the history of the main page then the installation is vulnerable. This has been patched in XWiki 15.10.9 and XWiki 16.3.0RC1.
CWE-359 Sep 10, 2024
CVE-2024-37728 7.5 HIGH 1 Writeup NUCLEI EPSS 0.13
OfficeWeb365 <8.6.1.0 - Info Disclosure
Arbitrary File Read vulnerability in Xi'an Daxi Information Technology Co., Ltd OfficeWeb365 v.7.18.23.0 and v8.6.1.0 allows a remote attacker to obtain sensitive information via the "Pic/Indexes" interface
CWE-22 Sep 10, 2024
CVE-2024-44849 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.92
Qualitor <8.24 - RCE
Qualitor up to 8.24 is vulnerable to Remote Code Execution (RCE) via Arbitrary File Upload in checkAcesso.php.
CWE-434 Sep 09, 2024
CVE-2024-6928 9.8 CRITICAL NUCLEI EPSS 0.77
Opti.marketing Opti Marketing < 2.0.9 - SQL Injection
The Opti Marketing WordPress plugin through 2.0.9 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
CWE-89 Sep 08, 2024
CVE-2024-6924 9.8 CRITICAL NUCLEI EPSS 0.77
Themetechmount Truebooker < 1.0.2 - SQL Injection
The TrueBooker WordPress plugin before 1.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.
CWE-89 Sep 08, 2024
CVE-2024-40711 9.8 CRITICAL KEV RANSOMWARE 2 PoCs Analysis NUCLEI EPSS 0.68
Veeam Backup & Replication 12.0.0.1420 through 12.2.0.334 - Deserialization RCE
A deserialization of untrusted data vulnerability with a malicious payload can allow an unauthenticated remote code execution (RCE).
CWE-502 Sep 07, 2024
CVE-2024-8517 9.8 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.93
SPIP <4.3.2-4.1.18 - Command Injection
SPIP before 4.3.2, 4.2.16, and 4.1.18 is vulnerable to a command injection issue. A remote and unauthenticated attacker can execute arbitrary operating system commands by sending a crafted multipart file upload HTTP request.
CWE-78 Sep 06, 2024
CVE-2024-7591 10.0 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.31
Kemptechnologies Loadmaster < 7.2.60.0 - OS Command Injection
Improper Input Validation vulnerability in Progress LoadMaster allows OS Command Injection.This issue affects: * LoadMaster: 7.2.40.0 and above * ECS: All versions * Multi-Tenancy: 7.1.35.4 and above
CWE-78 Sep 05, 2024
CVE-2024-24759 9.3 CRITICAL 1 Writeup NUCLEI EPSS 0.83
MindsDB -DNS Rebinding SSRF Protection Bypass
MindsDB is a platform for building artificial intelligence from enterprise data. Prior to version 23.12.4.2, a threat actor can bypass the server-side request forgery protection on the whole website with DNS Rebinding. The vulnerability can also lead to denial of service. Version 23.12.4.2 contains a patch.
CWE-918 Sep 05, 2024
CVE-2024-6846 5.3 MEDIUM NUCLEI EPSS 0.06
Chatbot with ChatGPT WP <2.4.5 - Info Disclosure
The Chatbot with ChatGPT WordPress plugin before 2.4.5 does not validate access on some REST routes, allowing for an unauthenticated user to purge error and chat logs
Sep 05, 2024
CVE-2024-20440 7.5 HIGH EXPLOITED NUCLEI EPSS 0.77
Cisco Smart Licensing Utility - Info Disclosure
A vulnerability in Cisco Smart Licensing Utility could allow an unauthenticated, remote attacker to access sensitive information. This vulnerability is due to excessive verbosity in a debug log file. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain log files that contain sensitive data, including credentials that can be used to access the API.
CWE-532 Sep 04, 2024
CVE-2024-20439 9.8 CRITICAL KEV NUCLEI EPSS 0.86
Cisco Smart Licensing Utility - Auth Bypass
A vulnerability in Cisco Smart Licensing Utility (CSLU) could allow an unauthenticated, remote attacker to log into an affected system by using a static administrative credential. This vulnerability is due to an undocumented static user credential for an administrative account. An attacker could exploit this vulnerability by using the static credentials to login to the affected system. A successful exploit could allow the attacker to login to the affected system with administrative rights over the CSLU application API.
CWE-912 Sep 04, 2024
CVE-2024-45507 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.90
Apache OFBiz <18.12.16 - SSRF/Code Injection
Server-Side Request Forgery (SSRF), Improper Control of Generation of Code ('Code Injection') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.16. Users are recommended to upgrade to version 18.12.16, which fixes the issue.
CWE-918 Sep 04, 2024
CVE-2024-45195 7.5 HIGH KEV 1 PoC Analysis NUCLEI EPSS 0.94
Apache OFBiz <18.12.16 - Info Disclosure
Direct Request ('Forced Browsing') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.16. Users are recommended to upgrade to version 18.12.16, which fixes the issue.
CWE-425 Sep 04, 2024
CVE-2024-7786 5.3 MEDIUM EXPLOITED NUCLEI EPSS 0.70
Sensei LMS <4.24.2 - Info Disclosure
The Sensei LMS WordPress plugin before 4.24.2 does not properly protect some its REST API routes, allowing unauthenticated attackers to leak email templates.
Sep 04, 2024
CVE-2024-6926 9.8 CRITICAL NUCLEI EPSS 0.74
Wow-company Viral Signup < 2.1 - SQL Injection
The Viral Signup WordPress plugin through 2.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
CWE-89 Sep 04, 2024
CVE-2024-45622 9.8 CRITICAL 1 Writeup NUCLEI EPSS 0.53
ASIS <3.2.0 - SQL Injection
ASIS (aka Aplikasi Sistem Sekolah using CodeIgniter 3) 3.0.0 through 3.2.0 allows index.php username SQL injection for Authentication Bypass.
CWE-89 Sep 02, 2024
CVE-2024-45388 7.5 HIGH EXPLOITED 1 Writeup NUCLEI EPSS 0.94
Hoverfly - Info Disclosure
Hoverfly is a lightweight service virtualization/ API simulation / API mocking tool for developers and testers. The `/api/v2/simulation` POST handler allows users to create new simulation views from the contents of a user-specified file. This feature can be abused by an attacker to read arbitrary files from the Hoverfly server. Note that, although the code prevents absolute paths from being specified, an attacker can escape out of the `hf.Cfg.ResponsesBodyFilesPath` base path by using `../` segments and reach any arbitrary files. This issue was found using the Uncontrolled data used in path expression CodeQL query for python. Users are advised to make sure the final path (`filepath.Join(hf.Cfg.ResponsesBodyFilesPath, filePath)`) is contained within the expected base path (`filepath.Join(hf.Cfg.ResponsesBodyFilesPath, "/")`). This issue is also tracked as GHSL-2023-274.
CWE-22 Sep 02, 2024