Vulnerabilities with Nuclei Scanner Templates

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,077 results Clear all
CVE-2024-7029 8.8 HIGH EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.93
Avtech Avm1203 Firmware - Command Injection
Commands can be injected over the network and executed without authentication.
CWE-77 Aug 02, 2024
CVE-2024-39646 7.1 HIGH EXPLOITED NUCLEI EPSS 0.09
Kunalnagar Custom 404 Pro < 3.11.2 - XSS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kunal Custom 404 Pro custom-404-pro.This issue affects Custom 404 Pro: from n/a through <= 3.11.1.
CWE-79 Aug 01, 2024
CVE-2024-7339 5.3 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.90
Provision-isr Sh-4050a5-5l(mm) Firmware - Information Disclosure
A vulnerability has been found in TVT DVR TD-2104TS-CL, DVR TD-2108TS-HP, Provision-ISR DVR SH-4050A5-5L(MM) and AVISION DVR AV108T and classified as problematic. This vulnerability affects unknown code of the file /queryDevInfo. The manipulation leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-273262 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-200 Aug 01, 2024
CVE-2024-7332 9.8 CRITICAL NUCLEI EPSS 0.92
TOTOLINK CP450 4.1.0cu.747_B20191224 - Hard-Coded Password
A vulnerability was found in TOTOLINK CP450 4.1.0cu.747_B20191224. It has been classified as critical. This affects an unknown part of the file /web_cste/cgi-bin/product.ini of the component Telnet Service. The manipulation leads to use of hard-coded password. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-273255. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-259 Aug 01, 2024
CVE-2024-41955 5.2 MEDIUM 1 Writeup NUCLEI EPSS 0.15
Opensecurity Mobile Security Framework < 4.0.5 - Open Redirect
Mobile Security Framework (MobSF) is a security research platform for mobile applications in Android, iOS and Windows Mobile. An open redirect vulnerability exist in MobSF authentication view. Update to MobSF v4.0.5.
CWE-601 Jul 31, 2024
CVE-2024-7340 8.8 HIGH NUCLEI EPSS 0.88
Pypi Weave < 0.50.8 - Path Traversal
The Weave server API allows remote users to fetch files from a specific directory, but due to a lack of input validation, it is possible to traverse and leak arbitrary files remotely. In various common scenarios, this allows a low-privileged user to assume the role of the server admin.
CWE-20 Jul 31, 2024
CVE-2024-5975 9.1 CRITICAL NUCLEI EPSS 0.44
Contrive CZ Loan Management < 1.1 - SQL Injection
The CZ Loan Management WordPress plugin through 1.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
CWE-89 Jul 30, 2024
CVE-2024-5765 9.8 CRITICAL NUCLEI EPSS 0.78
A17lab Wpstickybar < 2.1.0 - SQL Injection
The WpStickyBar WordPress plugin through 2.1.0 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection
CWE-89 Jul 30, 2024
CVE-2024-41810 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.68
Twisted < 24.3.0 - Basic XSS
Twisted is an event-based framework for internet applications, supporting Python 3.6+. The `twisted.web.util.redirectTo` function contains an HTML injection vulnerability. If application code allows an attacker to control the redirect URL this vulnerability may result in Reflected Cross-Site Scripting (XSS) in the redirect response HTML body. This vulnerability is fixed in 24.7.0rc1.
CWE-80 Jul 29, 2024
CVE-2024-7188 7.3 HIGH 1 Writeup NUCLEI EPSS 0.86
Bylancer Quicklancer - SQL Injection
A vulnerability was found in Bylancer Quicklancer 2.4. It has been rated as critical. This issue affects some unknown processing of the file /listing of the component GET Parameter Handler. The manipulation of the argument range2 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-272609 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-89 Jul 29, 2024
CVE-2024-6366 9.1 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.91
User Profile Builder <3.11.8 - Info Disclosure
The User Profile Builder WordPress plugin before 3.11.8 does not have proper authorisation, allowing unauthenticated users to upload media files via the async upload functionality of WP.
CWE-434 Jul 29, 2024
CVE-2024-41628 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.91
Severalnines Cluster Control <2.1.0 - Path Traversal
Directory Traversal vulnerability in Severalnines Cluster Control 1.9.8 before 1.9.8-9778, 2.0.0 before 2.0.0-9779, and 2.1.0 before 2.1.0-9780 allows a remote attacker to include and display file content in an HTTP request via the CMON API.
CWE-22 Jul 26, 2024
CVE-2024-6922 MEDIUM NUCLEI EPSS 0.33
Automation Anywhere Automation 360 v21-v32 - SSRF
Automation Anywhere Automation 360 v21-v32 is vulnerable to Server-Side Request Forgery in a web API component. An attacker with unauthenticated access to the Automation 360 Control Room HTTPS service (port 443) or HTTP service (port 80) can trigger arbitrary web requests from the server.
CWE-918 Jul 26, 2024
CVE-2024-7120 6.3 MEDIUM EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
Raisecom Msg2300 Firmware - OS Command Injection
A vulnerability, which was classified as critical, was found in Raisecom MSG1200, MSG2100E, MSG2200 and MSG2300 3.90. This affects an unknown part of the file list_base_config.php of the component Web Interface. The manipulation of the argument template leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-272451.
CWE-78 Jul 26, 2024
CVE-2024-38289 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.84
R-HUB TurboMeeting <8.x - SQL Injection
A boolean-based SQL injection issue in the Virtual Meeting Password (VMP) endpoint in R-HUB TurboMeeting through 8.x allows unauthenticated remote attackers to extract hashed passwords from the database, and authenticate to the application, via crafted SQL input.
CWE-89 Jul 25, 2024
CVE-2024-38288 7.2 HIGH NUCLEI EPSS 0.69
R-HUB TurboMeeting <8.x - Command Injection
A command-injection issue in the Certificate Signing Request (CSR) functionality in R-HUB TurboMeeting through 8.x allows authenticated attackers with administrator privileges to execute arbitrary commands on the underlying server as root.
CWE-77 Jul 25, 2024
CVE-2024-41667 8.8 HIGH 1 Writeup NUCLEI EPSS 0.74
Org.openidentityplatform.openam Openam-oauth2 - Code Injection
OpenAM is an open access management solution. In versions 15.0.3 and prior, the `getCustomLoginUrlTemplate` method in RealmOAuth2ProviderSettings.java is vulnerable to template injection due to its usage of user input. Although the developer intended to implement a custom URL for handling login to override the default OpenAM login, they did not restrict the `CustomLoginUrlTemplate`, allowing it to be set freely. Commit fcb8432aa77d5b2e147624fe954cb150c568e0b8 introduces `TemplateClassResolver.SAFER_RESOLVER` to disable the resolution of commonly exploited classes in FreeMarker template injection. As of time of publication, this fix is expected to be part of version 15.0.4.
CWE-94 Jul 24, 2024
CVE-2024-40422 9.1 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.91
stitionai devika v1 - Path Traversal
The snapshot_path parameter in the /api/get-browser-snapshot endpoint in stitionai devika v1 is susceptible to a path traversal attack. An attacker can manipulate the snapshot_path parameter to traverse directories and access sensitive files on the server. This can potentially lead to unauthorized access to critical system files and compromise the confidentiality and integrity of the system.
CWE-22 Jul 24, 2024
CVE-2024-6753 7.2 HIGH EXPLOITED NUCLEI EPSS 0.05
Social Auto Poster <5.3.14 - XSS
The Social Auto Poster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘mapTypes’ parameter in the 'wpw_auto_poster_map_wordpress_post_type' AJAX function in all versions up to, and including, 5.3.14 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CWE-79 Jul 24, 2024
CVE-2024-6420 8.6 HIGH NUCLEI EPSS 0.37
Hide My WP Ghost <5.2.02 - CSRF
The Hide My WP Ghost WordPress plugin before 5.2.02 does not prevent redirects to the login page via the auth_redirect WordPress function, allowing an unauthenticated visitor to access the hidden login page.
Jul 23, 2024