Vulnerabilities with Nuclei Scanner Templates
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2024-5334
7.5
HIGH
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.63
stitionai/devika - Info Disclosure
A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the 'snapshot_path' parameter in the '/api/get-browser-snapshot' endpoint. An attacker can exploit this vulnerability by crafting a request with a malicious 'snapshot_path' parameter, leading to arbitrary file read from the system. This issue impacts the security of the application by allowing unauthorized access to sensitive files on the server.
CWE-73
Jun 27, 2024
CVE-2024-33326
6.1
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.06
Lumisxp <16.1.x - XSS
A cross-site scripting (XSS) vulnerability in the component XsltResultControllerHtml.jsp of Lumisxp v15.0.x to v16.1.x allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the lumPageID parameter.
CWE-79
Jun 26, 2024
CVE-2024-37843
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.89
Craftcms Craft Cms < 3.7.31 - SQL Injection
Craft CMS up to v3.7.31 was discovered to contain a SQL injection vulnerability via the GraphQL API endpoint.
CWE-89
Jun 25, 2024
CVE-2024-5276
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.87
Fortra FileCatalyst Workflow SQL Injection (CVE-2024-5276)
A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data. Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required. This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier.
CWE-20
Jun 25, 2024
CVE-2024-4885
9.8
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Progress Whatsup Gold < 23.1.3 - Path Traversal
In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold. The
WhatsUp.ExportUtilities.Export.GetFileWithoutZip
allows execution of commands with iisapppool\nmconsole privileges.
CWE-22
Jun 25, 2024
CVE-2024-6028
9.8
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.80
Ays-pro Quiz Maker < 6.5.8.4 - SQL Injection
The Quiz Maker plugin for WordPress is vulnerable to time-based SQL Injection via the 'ays_questions' parameter in all versions up to, and including, 6.5.8.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
Jun 25, 2024
CVE-2024-36683
7.3
HIGH
NUCLEI
EPSS 0.01
Smart Modules for PrestaShop <1.7.4 - SQL Injection
SQL injection vulnerability in the module "Products Alert" (productsalert) before 1.7.4 from Smart Modules for PrestaShop allows attackers to obtain sensitive information and cause other impacts via the ProductsAlertAjaxProcessModuleFrontController::initContent method.
CWE-89
Jun 24, 2024
CVE-2024-29868
9.1
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.78
Apache StreamPipes <0.95.0 - Info Disclosure
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism.
This allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account.
This issue affects Apache StreamPipes: from 0.69.0 through 0.93.0.
Users are recommended to upgrade to version 0.95.0, which fixes the issue.
CWE-338
Jun 24, 2024
CVE-2024-4841
3.3
LOW
EXPLOITED
NUCLEI
EPSS 0.08
Lollms-webui - Path Traversal
A Path Traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'add_reference_to_local_mode' function due to the lack of input sanitization. This vulnerability affects versions v9.6 to the latest. By exploiting this vulnerability, an attacker can predict the folders, subfolders, and files present on the victim's computer. The vulnerability is present in the way the application handles the 'path' parameter in HTTP requests to the '/add_reference_to_local_model' endpoint.
CWE-29
Jun 23, 2024
CVE-2024-4940
6.1
MEDIUM
NUCLEI
EPSS 0.07
gradio-app/gradio - Open Redirect
An open redirect vulnerability exists in the gradio-app/gradio, affecting the latest version. The vulnerability allows an attacker to redirect users to arbitrary websites, which can be exploited for phishing attacks, Cross-site Scripting (XSS), Server-Side Request Forgery (SSRF), amongst others. This issue is due to improper validation of user-supplied input in the handling of URLs. Attackers can exploit this vulnerability by crafting a malicious URL that, when processed by the application, redirects the user to an attacker-controlled web page.
CWE-601
Jun 22, 2024
CVE-2024-28397
5.3
MEDIUM
17 PoCs
Analysis
NUCLEI
EPSS 0.65
pyload-ng js2py - Remote Code Execution
An issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows attackers to execute arbitrary code via a crafted API call.
CWE-94
Jun 20, 2024
CVE-2024-6188
5.3
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.32
Parsec Automation TrackSYS 11.x.x - Info Disclosure
A vulnerability was found in Parsec Automation TrackSYS 11.x.x and classified as problematic. This issue affects some unknown processing of the file /TS/export/pagedefinition. The manipulation of the argument ID leads to direct request. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269159. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-425
Jun 20, 2024
CVE-2024-5522
6.5
MEDIUM
3 PoCs
Analysis
NUCLEI
EPSS 0.84
Bplugins Html5 Video Player < 2.5.27 - SQL Injection
The HTML5 Video Player WordPress plugin before 2.5.27 does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
CWE-89
Jun 20, 2024
CVE-2024-3605
10.0
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.79
Thimpress WP Hotel Booking < 2.1.0 - SQL Injection
The WP Hotel Booking plugin for WordPress is vulnerable to SQL Injection via the 'room_type' parameter of the /wphb/v1/rooms/search-rooms REST API endpoint in all versions up to, and including, 2.1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
Jun 20, 2024
CVE-2024-36117
8.6
HIGH
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.78
Reposilite <3.5.10 - Path Traversal
Reposilite is an open source, lightweight and easy-to-use repository manager for Maven based artifacts in JVM ecosystem. Reposilite v3.5.10 is affected by an Arbitrary File Read vulnerability via path traversal while serving expanded javadoc files. Reposilite has addressed this issue in version 3.5.12. There are no known workarounds for this vulnerability. This issue was discovered and reported by the GitHub Security lab and is also tracked as GHSL-2024-074.
CWE-22
Jun 19, 2024
CVE-2024-37881
5.3
MEDIUM
NUCLEI
EPSS 0.05
SiteGuard WP Plugin <1.7.7 - Info Disclosure
SiteGuard WP Plugin provides a functionality to customize the path to the login page wp-login.php and implements a measure to avoid redirection from other URLs. However, SiteGuard WP Plugin versions prior to 1.7.7 missed to implement a measure to avoid redirection from wp-register.php. As a result, the customized path to the login page may be exposed.
CWE-201
Jun 19, 2024
CVE-2024-36527
6.5
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.89
Puppeteer-Renderer <3.2.0 - Path Traversal
puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server.
CWE-22
Jun 17, 2024
CVE-2024-3080
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.54
ASUS Router Models - Auth Bypass
Certain ASUS router models have authentication bypass vulnerability, allowing unauthenticated remote attackers to log in the device.
CWE-287
Jun 14, 2024
CVE-2024-5947
6.5
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.74
Deepseaelectronics Dse855 Firmware - Missing Authentication
Deep Sea Electronics DSE855 Configuration Backup Missing Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the web-based UI. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-22679.
CWE-306
Jun 13, 2024
CVE-2024-34102
9.8
CRITICAL
KEV
27 PoCs
Analysis
NUCLEI
EPSS 0.94
CosmicSting: Magento Arbitrary File Read (CVE-2024-34102) + PHP Buffer Overflow in the iconv() function of glibc (CVE-2024-2961)
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
CWE-611
Jun 13, 2024