Vulnerabilities with Nuclei Scanner Templates

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,077 results Clear all
CVE-2024-6460 9.8 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.92
Grow by Tradedoubler <2.0.21 - Code Injection
The Grow by Tradedoubler WordPress plugin through 2.0.21 is vulnerable to Local File Inclusion via the component parameter. This makes it possible for attackers to include and execute PHP files on the server, allowing the execution of any PHP code in those files.
Aug 16, 2024
CVE-2024-32231 6.3 MEDIUM NUCLEI EPSS 0.03
Stash <0.25.1 - SQL Injection
Stash up to v0.25.1 was discovered to contain a SQL injection vulnerability via the sort parameter.
CWE-89 Aug 15, 2024
CVE-2024-38653 7.5 HIGH EXPLOITED NUCLEI EPSS 0.90
Ivanti Avalanche 6.3.1 - Info Disclosure
XXE in SmartDeviceServer in Ivanti Avalanche 6.3.1 allows a remote unauthenticated attacker to read arbitrary files on the server.
CWE-611 Aug 14, 2024
CVE-2024-28986 9.8 CRITICAL KEV NUCLEI EPSS 0.77
SolarWinds Web Help Desk < 12.8.3 - Insecure Deserialization
SolarWinds Web Help Desk was found to be susceptible to a Java Deserialization Remote Code Execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. While it was reported as an unauthenticated vulnerability, SolarWinds has been unable to reproduce it without authentication after thorough testing.   However, out of an abundance of caution, we recommend all Web Help Desk customers apply the patch, which is now available.
CWE-502 Aug 13, 2024
CVE-2024-7593 9.8 CRITICAL KEV 5 PoCs Analysis NUCLEI EPSS 0.94
Ivanti Virtual Traffic Manager Authentication Bypass (CVE-2024-7593)
Incorrect implementation of an authentication algorithm in Ivanti vTM other than versions 22.2R1 or 22.7R2 allows a remote unauthenticated attacker to bypass authentication of the admin panel.
CWE-287 Aug 13, 2024
CVE-2024-43160 10.0 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.84
BerqWP <1.7.6 - Code Injection
Unrestricted Upload of File with Dangerous Type vulnerability in BerqWP allows Code Injection.This issue affects BerqWP: from n/a through 1.7.6.
CWE-434 Aug 13, 2024
CVE-2024-43360 9.8 CRITICAL EXPLOITED 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.63
Zoneminder < 1.36.34 - SQL Injection
ZoneMinder is a free, open source closed-circuit television software application. ZoneMinder is affected by a time-based SQL Injection vulnerability. This vulnerability is fixed in 1.36.34 and 1.37.61.
CWE-89 Aug 12, 2024
CVE-2024-27443 6.1 MEDIUM KEV NUCLEI EPSS 0.32
Zimbra Collaboration - Cross-Site Scripting (XSS)
An issue was discovered in Zimbra Collaboration (ZCS) 9.0 and 10.0. A Cross-Site Scripting (XSS) vulnerability exists in the CalendarInvite feature of the Zimbra webmail classic user interface, because of improper input validation in the handling of the calendar header. An attacker can exploit this via an email message containing a crafted calendar header with an embedded XSS payload. When a victim views this message in the Zimbra webmail classic interface, the payload is executed in the context of the victim's session, potentially leading to execution of arbitrary JavaScript code.
CWE-79 Aug 12, 2024
CVE-2024-7399 8.8 HIGH KEV 2 PoCs Analysis NUCLEI EPSS 0.82
Samsung MagicINFO 9 Server Remote Code Execution (CVE-2024-7399)
Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version before 21.1050 allows attackers to write arbitrary file as system authority.
CWE-22 Aug 12, 2024
CVE-2024-30188 8.1 HIGH NUCLEI EPSS 0.89
Apache DolphinScheduler <3.2.2 - Info Disclosure
File read and write vulnerability in Apache DolphinScheduler ,  authenticated users can illegally access additional resource files. This issue affects Apache DolphinScheduler: from 3.1.0 before 3.2.2. Users are recommended to upgrade to version 3.2.2, which fixes the issue.
CWE-20 Aug 12, 2024
CVE-2024-6893 7.5 HIGH EXPLOITED NUCLEI EPSS 0.91
Journyx soap_cgi.pyc - XML External Entity Reference
The "soap_cgi.pyc" API handler allows the XML body of SOAP requests to contain references to external entities. This allows an unauthenticated attacker to read local files, perform server-side request forgery, and overwhelm the web server resources.
CWE-611 Aug 08, 2024
CVE-2024-6892 6.1 MEDIUM NUCLEI EPSS 0.06
Journyx - XSS
Attackers can craft a malicious link that once clicked will execute arbitrary JavaScript in the context of the Journyx web application.
CWE-81 Aug 08, 2024
CVE-2024-6651 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.12
WordPress File Upload <4.24.8 - XSS
The WordPress File Upload WordPress plugin before 4.24.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
CWE-79 Aug 06, 2024
CVE-2024-7008 5.4 MEDIUM 1 Writeup NUCLEI EPSS 0.13
Calibre < 7.15.0 - XSS
Unsanitized user-input in Calibre <= 7.15.0 allow attackers to perform reflected cross-site scripting.
CWE-79 Aug 06, 2024
CVE-2024-6886 CRITICAL NUCLEI EPSS 0.25
Gitea <1.22.0 - XSS
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Gitea Gitea Open Source Git Server allows Stored XSS.This issue affects Gitea Open Source Git Server: 1.22.0.
CWE-79 Aug 06, 2024
CVE-2024-6782 9.8 CRITICAL EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.94
Calibre 6.9.0-7.14.0 - Unauthenticated RCE
Improper access control in Calibre 6.9.0 ~ 7.14.0 allow unauthenticated attackers to achieve remote code execution.
CWE-863 Aug 06, 2024
CVE-2024-6781 7.5 HIGH 1 Writeup NUCLEI EPSS 0.94
Calibre <= 7.14.0 - Path Traversal
Path traversal in Calibre <= 7.14.0 allow unauthenticated attackers to achieve arbitrary file read.
CWE-22 Aug 06, 2024
CVE-2024-42009 9.3 CRITICAL KEV 6 PoCs Analysis NUCLEI EPSS 0.91
Roundcube Webmail < 1.5.8 - XSS
A Cross-Site Scripting vulnerability in Roundcube through 1.5.7 and 1.6.x through 1.6.7 allows a remote attacker to steal and send emails of a victim via a crafted e-mail message that abuses a Desanitization issue in message_body() in program/actions/mail/show.php.
CWE-79 Aug 05, 2024
CVE-2024-39713 8.6 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.90
Rocket.chat < 6.10.1 - SSRF
A Server-Side Request Forgery (SSRF) affects Rocket.Chat's Twilio webhook endpoint before version 6.10.1.
CWE-918 Aug 05, 2024
CVE-2024-7314 9.8 CRITICAL EXPLOITED 1 Writeup NUCLEI EPSS 0.70
Anji-plus Report < 1.4.1 - Authentication Bypass
anji-plus AJ-Report is affected by an authentication bypass vulnerability. A remote and unauthenticated attacker can append ";swagger-ui" to HTTP requests to bypass authentication and execute arbitrary Java on the victim server. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.
CWE-288 Aug 02, 2024