Vulnerabilities with Nuclei Scanner Templates

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,077 results Clear all
CVE-2024-5334 7.5 HIGH EXPLOITED 1 Writeup NUCLEI EPSS 0.63
stitionai/devika - Info Disclosure
A local file read vulnerability exists in the stitionai/devika repository, affecting the latest version. The vulnerability is due to improper handling of the 'snapshot_path' parameter in the '/api/get-browser-snapshot' endpoint. An attacker can exploit this vulnerability by crafting a request with a malicious 'snapshot_path' parameter, leading to arbitrary file read from the system. This issue impacts the security of the application by allowing unauthorized access to sensitive files on the server.
CWE-73 Jun 27, 2024
CVE-2024-33326 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.06
Lumisxp <16.1.x - XSS
A cross-site scripting (XSS) vulnerability in the component XsltResultControllerHtml.jsp of Lumisxp v15.0.x to v16.1.x allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the lumPageID parameter.
CWE-79 Jun 26, 2024
CVE-2024-37843 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.89
Craftcms Craft Cms < 3.7.31 - SQL Injection
Craft CMS up to v3.7.31 was discovered to contain a SQL injection vulnerability via the GraphQL API endpoint.
CWE-89 Jun 25, 2024
CVE-2024-5276 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.87
Fortra FileCatalyst Workflow SQL Injection (CVE-2024-5276)
A SQL Injection vulnerability in Fortra FileCatalyst Workflow allows an attacker to modify application data.  Likely impacts include creation of administrative users and deletion or modification of data in the application database. Data exfiltration via SQL injection is not possible using this vulnerability. Successful unauthenticated exploitation requires a Workflow system with anonymous access enabled, otherwise an authenticated user is required. This issue affects all versions of FileCatalyst Workflow from 5.1.6 Build 135 and earlier.
CWE-20 Jun 25, 2024
CVE-2024-4885 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.94
Progress Whatsup Gold < 23.1.3 - Path Traversal
In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Remote Code Execution vulnerability in Progress WhatsUpGold.  The WhatsUp.ExportUtilities.Export.GetFileWithoutZip allows execution of commands with iisapppool\nmconsole privileges.
CWE-22 Jun 25, 2024
CVE-2024-6028 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.80
Ays-pro Quiz Maker < 6.5.8.4 - SQL Injection
The Quiz Maker plugin for WordPress is vulnerable to time-based SQL Injection via the 'ays_questions' parameter in all versions up to, and including, 6.5.8.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Jun 25, 2024
CVE-2024-36683 7.3 HIGH NUCLEI EPSS 0.01
Smart Modules for PrestaShop <1.7.4 - SQL Injection
SQL injection vulnerability in the module "Products Alert" (productsalert) before 1.7.4 from Smart Modules for PrestaShop allows attackers to obtain sensitive information and cause other impacts via the ProductsAlertAjaxProcessModuleFrontController::initContent method.
CWE-89 Jun 24, 2024
CVE-2024-29868 9.1 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.78
Apache StreamPipes <0.95.0 - Info Disclosure
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism. This allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account. This issue affects Apache StreamPipes: from 0.69.0 through 0.93.0. Users are recommended to upgrade to version 0.95.0, which fixes the issue.
CWE-338 Jun 24, 2024
CVE-2024-4841 3.3 LOW EXPLOITED NUCLEI EPSS 0.08
Lollms-webui - Path Traversal
A Path Traversal vulnerability exists in the parisneo/lollms-webui, specifically within the 'add_reference_to_local_mode' function due to the lack of input sanitization. This vulnerability affects versions v9.6 to the latest. By exploiting this vulnerability, an attacker can predict the folders, subfolders, and files present on the victim's computer. The vulnerability is present in the way the application handles the 'path' parameter in HTTP requests to the '/add_reference_to_local_model' endpoint.
CWE-29 Jun 23, 2024
CVE-2024-4940 6.1 MEDIUM NUCLEI EPSS 0.07
gradio-app/gradio - Open Redirect
An open redirect vulnerability exists in the gradio-app/gradio, affecting the latest version. The vulnerability allows an attacker to redirect users to arbitrary websites, which can be exploited for phishing attacks, Cross-site Scripting (XSS), Server-Side Request Forgery (SSRF), amongst others. This issue is due to improper validation of user-supplied input in the handling of URLs. Attackers can exploit this vulnerability by crafting a malicious URL that, when processed by the application, redirects the user to an attacker-controlled web page.
CWE-601 Jun 22, 2024
CVE-2024-28397 5.3 MEDIUM 17 PoCs Analysis NUCLEI EPSS 0.65
pyload-ng js2py - Remote Code Execution
An issue in the component js2py.disable_pyimport() of js2py up to v0.74 allows attackers to execute arbitrary code via a crafted API call.
CWE-94 Jun 20, 2024
CVE-2024-6188 5.3 MEDIUM EXPLOITED NUCLEI EPSS 0.32
Parsec Automation TrackSYS 11.x.x - Info Disclosure
A vulnerability was found in Parsec Automation TrackSYS 11.x.x and classified as problematic. This issue affects some unknown processing of the file /TS/export/pagedefinition. The manipulation of the argument ID leads to direct request. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-269159. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-425 Jun 20, 2024
CVE-2024-5522 6.5 MEDIUM 3 PoCs Analysis NUCLEI EPSS 0.84
Bplugins Html5 Video Player < 2.5.27 - SQL Injection
The HTML5 Video Player WordPress plugin before 2.5.27 does not sanitize and escape a parameter from a REST route before using it in a SQL statement, allowing unauthenticated users to perform SQL injection attacks
CWE-89 Jun 20, 2024
CVE-2024-3605 10.0 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.79
Thimpress WP Hotel Booking < 2.1.0 - SQL Injection
The WP Hotel Booking plugin for WordPress is vulnerable to SQL Injection via the 'room_type' parameter of the /wphb/v1/rooms/search-rooms REST API endpoint in all versions up to, and including, 2.1.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Jun 20, 2024
CVE-2024-36117 8.6 HIGH EXPLOITED 1 Writeup NUCLEI EPSS 0.78
Reposilite <3.5.10 - Path Traversal
Reposilite is an open source, lightweight and easy-to-use repository manager for Maven based artifacts in JVM ecosystem. Reposilite v3.5.10 is affected by an Arbitrary File Read vulnerability via path traversal while serving expanded javadoc files. Reposilite has addressed this issue in version 3.5.12. There are no known workarounds for this vulnerability. This issue was discovered and reported by the GitHub Security lab and is also tracked as GHSL-2024-074.
CWE-22 Jun 19, 2024
CVE-2024-37881 5.3 MEDIUM NUCLEI EPSS 0.05
SiteGuard WP Plugin <1.7.7 - Info Disclosure
SiteGuard WP Plugin provides a functionality to customize the path to the login page wp-login.php and implements a measure to avoid redirection from other URLs. However, SiteGuard WP Plugin versions prior to 1.7.7 missed to implement a measure to avoid redirection from wp-register.php. As a result, the customized path to the login page may be exposed.
CWE-201 Jun 19, 2024
CVE-2024-36527 6.5 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.89
Puppeteer-Renderer <3.2.0 - Path Traversal
puppeteer-renderer v.3.2.0 and before is vulnerable to Directory Traversal. Attackers can exploit the URL parameter using the file protocol to read sensitive information from the server.
CWE-22 Jun 17, 2024
CVE-2024-3080 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.54
ASUS Router Models - Auth Bypass
Certain ASUS router models have authentication bypass vulnerability, allowing unauthenticated remote attackers to log in the device.
CWE-287 Jun 14, 2024
CVE-2024-5947 6.5 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.74
Deepseaelectronics Dse855 Firmware - Missing Authentication
Deep Sea Electronics DSE855 Configuration Backup Missing Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of Deep Sea Electronics DSE855 devices. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web-based UI. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-22679.
CWE-306 Jun 13, 2024
CVE-2024-34102 9.8 CRITICAL KEV 27 PoCs Analysis NUCLEI EPSS 0.94
CosmicSting: Magento Arbitrary File Read (CVE-2024-34102) + PHP Buffer Overflow in the iconv() function of glibc (CVE-2024-2961)
Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in arbitrary code execution. An attacker could exploit this vulnerability by sending a crafted XML document that references external entities. Exploitation of this issue does not require user interaction.
CWE-611 Jun 13, 2024