Vulnerabilities with Nuclei Scanner Templates

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,077 results Clear all
CVE-2024-6911 7.5 HIGH NUCLEI EPSS 0.93
PerkinElmer ProcessPlus <1.11.6507.0 - Info Disclosure
Files on the Windows system are accessible without authentication to external parties due to a local file inclusion in PerkinElmer ProcessPlus.This issue affects ProcessPlus: through 1.11.6507.0.
CWE-552 Jul 22, 2024
CVE-2024-39250 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.85
Efrotech Timetrax - SQL Injection
EfroTech Timetrax v8.3 was discovered to contain an unauthenticated SQL injection vulnerability via the q parameter in the search web interface.
CWE-89 Jul 22, 2024
CVE-2024-37259 7.1 HIGH EXPLOITED NUCLEI EPSS 0.12
Wpextended WP Extended < 3.0.0 - XSS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Extended The Ultimate WordPress Toolkit – WP Extended wpextended.This issue affects The Ultimate WordPress Toolkit – WP Extended: from n/a through <= 2.4.7.
CWE-79 Jul 22, 2024
CVE-2024-40348 8.2 HIGH 2 PoCs Analysis NUCLEI EPSS 0.93
Bazaar <1.4.3 - Path Traversal
An issue in the component /api/swaggerui/static of Bazaar v1.4.3 allows unauthenticated attackers to execute a directory traversal.
CWE-22 Jul 20, 2024
CVE-2024-41107 8.1 HIGH 1 PoC Analysis NUCLEI EPSS 0.92
Apache Cloudstack < 4.18.2.2 - Authentication Bypass by Spoofing
The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and other user details of a SAML-enabled CloudStack user-account. In such environments, this can result in a complete compromise of the resources owned and/or accessible by a SAML enabled user-account. Affected users are recommended to disable the SAML authentication plugin by setting the "saml2.enabled" global setting to "false", or upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue.
CWE-290 Jul 19, 2024
CVE-2024-6205 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.90
PayPlus Payment Gateway <6.6.9 - SQL Injection
The PayPlus Payment Gateway WordPress plugin before 6.6.9 does not properly sanitise and escape a parameter before using it in a SQL statement via a WooCommerce API route available to unauthenticated users, leading to an SQL injection vulnerability.
CWE-89 Jul 19, 2024
CVE-2024-39907 9.8 CRITICAL NUCLEI EPSS 0.85
Fit2cloud 1panel < 1.10.12-lts - SQL Injection
1Panel is a web-based linux server management control panel. There are many sql injections in the project, and some of them are not well filtered, leading to arbitrary file writes, and ultimately leading to RCEs. These sql injections have been resolved in version 1.10.12-tls. Users are advised to upgrade. There are no known workarounds for these issues.
CWE-89 Jul 18, 2024
CVE-2024-20419 10.0 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.91
Cisco Smart Software Manager (SSM) On-Prem Account Takeover (CVE-2024-20419)
A vulnerability in the authentication system of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to change the password of any user, including administrative users. This vulnerability is due to improper implementation of the password-change process. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow an attacker to access the web UI or API with the privileges of the compromised user.
CWE-620 Jul 17, 2024
CVE-2024-6220 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.72
Keydatas plugin <2.5.2 - RCE
The 简数采集器 (Keydatas) plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the keydatas_downloadImages function in all versions up to, and including, 2.5.2. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 Jul 17, 2024
CVE-2024-21136 8.6 HIGH EXPLOITED NUCLEI EPSS 0.42
Oracle Retail Xstore Office - Information Disclosure
Vulnerability in the Oracle Retail Xstore Office product of Oracle Retail Applications (component: Security). Supported versions that are affected are 19.0.5, 20.0.3, 20.0.4, 22.0.0 and 23.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Xstore Office. While the vulnerability is in Oracle Retail Xstore Office, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Retail Xstore Office accessible data. CVSS 3.1 Base Score 8.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
CWE-200 Jul 16, 2024
CVE-2024-39887 4.3 MEDIUM NUCLEI EPSS 0.64
Apache Superset < 4.0.2 - SQL Injection
An SQL Injection vulnerability in Apache Superset exists due to improper neutralization of special elements used in SQL commands. Specifically, certain engine-specific functions are not checked, which allows attackers to bypass Apache Superset's SQL authorization. To mitigate this, a new configuration key named DISALLOWED_SQL_FUNCTIONS has been introduced. This key disallows the use of the following PostgreSQL functions: version, query_to_xml, inet_server_addr, and inet_client_addr. Additional functions can be added to this list for increased protection. This issue affects Apache Superset: before 4.0.2. Users are recommended to upgrade to version 4.0.2, which fixes the issue.
CWE-89 Jul 16, 2024
CVE-2024-6746 4.3 MEDIUM NUCLEI EPSS 0.74
NaiboWang EasySpider 0.6.2 - Path Traversal
A vulnerability classified as problematic was found in NaiboWang EasySpider 0.6.2 on Windows. Affected by this vulnerability is an unknown functionality of the file \EasySpider\resources\app\server.js of the component HTTP GET Request Handler. The manipulation with the input /../../../../../../../../../Windows/win.ini leads to path traversal: '../filedir'. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The identifier VDB-271477 was assigned to this vulnerability. NOTE: The code maintainer explains, that this is not a big issue "because the default is that the software runs locally without going through the Internet".
CWE-22 Jul 15, 2024
CVE-2024-6289 6.1 MEDIUM NUCLEI EPSS 0.08
WPS Hide Login <1.9.16.4 - Auth Bypass
The WPS Hide Login WordPress plugin before 1.9.16.4 does not prevent redirects to the login page via the auth_redirect WordPress function, allowing an unauthenticated visitor to access the hidden login page.
CWE-601 Jul 15, 2024
CVE-2024-3753 5.9 MEDIUM NUCLEI EPSS 0.01
Kibokolabs Hostel < 1.1.5.3 - XSS
The Hostel WordPress plugin before 1.1.5.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
CWE-79 Jul 13, 2024
CVE-2024-39914 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Fogproject < 1.5.10.41 - Command Injection
FOG is a cloning/imaging/rescue suite/inventory management system. Prior to 1.5.10.34, packages/web/lib/fog/reportmaker.class.php in FOG was affected by a command injection via the filename parameter to /fog/management/export.php. This vulnerability is fixed in 1.5.10.34.
CWE-77 Jul 12, 2024
CVE-2024-39903 8.6 HIGH 1 Writeup NUCLEI EPSS 0.47
Widgetti Solara < 1.35.1 - Path Traversal
Solara is a pure Python, React-style framework for scaling Jupyter and web apps. A Local File Inclusion (LFI) vulnerability was identified in widgetti/solara, in version <1.35.1, which was fixed in version 1.35.1. This vulnerability arises from the application's failure to properly validate URI fragments for directory traversal sequences such as '../' when serving static files. An attacker can exploit this flaw by manipulating the fragment part of the URI to read arbitrary files on the local file system.
CWE-22 Jul 12, 2024
CVE-2024-6555 5.3 MEDIUM NUCLEI EPSS 0.08
WP Popups - WordPress Popup builder <2.2.0.1 - Info Disclosure
The WP Popups – WordPress Popup builder plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 2.2.0.1. This is due the plugin utilizing mobiledetect without preventing direct access to the files. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website.
CWE-200 Jul 12, 2024
CVE-2024-6396 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.90
aimhubio/aim <3.19.3 - RCE
A vulnerability in the `_backup_run` function in aimhubio/aim version 3.19.3 allows remote attackers to overwrite any file on the host server and exfiltrate arbitrary data. The vulnerability arises due to improper handling of the `run_hash` and `repo.path` parameters, which can be manipulated to create and write to arbitrary file paths. This can lead to denial of service by overwriting critical system files, loss of private data, and potential remote code execution.
CWE-29 Jul 12, 2024
CVE-2024-38353 5.3 MEDIUM NUCLEI EPSS 0.05
CodiMD <2.5.4 - Info Disclosure
CodiMD allows realtime collaborative markdown notes on all platforms. CodiMD before 2.5.4 is missing authentication and access control vulnerability allowing an unauthenticated attacker to gain unauthorised access to image data uploaded to CodiMD. CodiMD does not require valid authentication to access uploaded images or to upload new image data. An attacker who can determine an uploaded image's URL can gain unauthorised access to uploaded image data. Due to the insecure random filename generation in the underlying Formidable library, an attacker can determine the filenames for previously uploaded images and the likelihood of this issue being exploited is increased. This vulnerability is fixed in 2.5.4.
CWE-862 Jul 10, 2024
CVE-2024-6235 8.8 HIGH EXPLOITED NUCLEI EPSS 0.87
NetScaler Console - Info Disclosure
Sensitive information disclosure in NetScaler Console
CWE-287 Jul 10, 2024