Vulnerabilities with Nuclei Scanner Templates

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,417 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,077 results Clear all
CVE-2024-3552 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.93
Web Directory Free WP <1.7.0 - SQL Injection
The Web Directory Free WordPress plugin before 1.7.0 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection with different techniques like UNION, Time-Based and Error-Based.
CWE-89 Jun 13, 2024
CVE-2024-3032 6.1 MEDIUM NUCLEI EPSS 0.02
Themify Builder < 7.5.8 - Open Redirect
Themify Builder WordPress plugin before 7.5.8 does not validate a parameter before redirecting the user to its value, leading to an Open Redirect issue
CWE-601 Jun 13, 2024
CVE-2024-3922 10.0 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.89
Dokan Pro Plugin < 3.11.0 - SQL Injection
The Dokan Pro plugin for WordPress is vulnerable to SQL Injection via the 'code' parameter in all versions up to, and including, 3.10.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Jun 13, 2024
CVE-2024-4898 9.8 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.90
Instawp Connect < 0.1.0.39 - Missing Authorization
The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary option updates due to a missing authorization checks on the REST API calls in all versions up to, and including, 0.1.0.38. This makes it possible for unauthenticated attackers to connect the site to InstaWP API, edit arbitrary site options and create administrator accounts.
CWE-862 Jun 12, 2024
CVE-2024-2473 5.3 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.16
WPS Hide Login <= 1.9.15.2 - Login Page Disclosure
The WPS Hide Login plugin for WordPress is vulnerable to Login Page Disclosure in all versions up to, and including, 1.9.15.2. This is due to a bypass that is created when the 'action=postpass' parameter is supplied. This makes it possible for attackers to easily discover any login page that may have been hidden by the plugin.
CWE-863 Jun 11, 2024
CVE-2024-37393 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.85
Securenvoy Multi-factor Authenticatio... - Cleartext Transmission
Multiple LDAP injections vulnerabilities exist in SecurEnvoy MFA before 9.4.514 due to improper validation of user-supplied input. An unauthenticated remote attacker could exfiltrate data from Active Directory through blind LDAP injection attacks against the DESKTOP service exposed on the /secserver HTTP endpoint. This may include ms-Mcs-AdmPwd, which has a cleartext password for the Local Administrator Password Solution (LAPS) feature.
CWE-319 Jun 10, 2024
CVE-2024-36412 10.0 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.94
SuiteCRM <7.14.4-8.6.1 - SQL Injection
SuiteCRM is an open-source Customer Relationship Management (CRM) software application. Prior to versions 7.14.4 and 8.6.1, a vulnerability in events response entry point allows for a SQL injection attack. Versions 7.14.4 and 8.6.1 contain a fix for this issue.
CWE-89 Jun 10, 2024
CVE-2024-3850 5.4 MEDIUM 1 Writeup NUCLEI EPSS 0.12
Uniview Nvr301-04s2-p4 Firmware - XSS
Uniview NVR301-04S2-P4 is vulnerable to reflected cross-site scripting attack (XSS). An attacker could send a user a URL that if clicked on could execute malicious JavaScript in their browser. This vulnerability also requires authentication before it can be exploited, so the scope and severity is limited. Also, even if JavaScript is executed, no additional benefits are obtained.
CWE-79 Jun 10, 2024
CVE-2024-4577 9.8 CRITICAL KEV RANSOMWARE 86 PoCs Analysis NUCLEI EPSS 0.94
PHP CGI Argument Injection Remote Code Execution
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
CWE-78 Jun 09, 2024
CVE-2024-35694 7.1 HIGH EXPLOITED NUCLEI EPSS 0.17
Amauri Wpmobile.app < 11.42 - XSS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Amauri WPMobile.App wpappninja.This issue affects WPMobile.App: from n/a through <= 11.41.
CWE-79 Jun 08, 2024
CVE-2024-35693 7.1 HIGH EXPLOITED NUCLEI EPSS 0.17
Code4recovery 12 Step Meeting List < 3.14.34 - XSS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AA Web Servant 12 Step Meeting List 12-step-meeting-list.This issue affects 12 Step Meeting List: from n/a through <= 3.14.33.
CWE-79 Jun 08, 2024
CVE-2024-30163 9.8 CRITICAL NUCLEI EPSS 0.46
Invision Community <4.7.16 - SQL Injection
Invision Community before 4.7.16 allow SQL injection via the applications/nexus/modules/front/store/store.php IPS\nexus\modules\front\store\_store::_categoryView() method, where user input passed through the filter request parameter is not properly sanitized before being used to execute SQL queries. This can be exploited by unauthenticated attackers to carry out Blind SQL Injection attacks.
CWE-89 Jun 07, 2024
CVE-2024-4620 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.72
ARForms Premium WP Form Builder <6.6 - Code Injection
The ARForms - Premium WordPress Form Builder Plugin WordPress plugin before 6.6 allows unauthenticated users to modify uploaded files in such a way that PHP code can be uploaded when an upload file input is included on a form
Jun 07, 2024
CVE-2024-3408 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.91
D-Tale RCE
man-group/dtale version 3.10.0 is vulnerable to an authentication bypass and remote code execution (RCE) due to improper input validation. The vulnerability arises from a hardcoded `SECRET_KEY` in the flask configuration, allowing attackers to forge a session cookie if authentication is enabled. Additionally, the application fails to properly restrict custom filter queries, enabling attackers to execute arbitrary code on the server by bypassing the restriction on the `/update-settings` endpoint, even when `enable_custom_filters` is not enabled. This vulnerability allows attackers to bypass authentication mechanisms and execute remote code on the server.
CWE-94 Jun 06, 2024
CVE-2024-3234 9.8 CRITICAL 1 Writeup NUCLEI EPSS 0.86
Gaizhenbiao Chuanhuchatgpt < 20240305 - Path Traversal
The gaizhenbiao/chuanhuchatgpt application is vulnerable to a path traversal attack due to its use of an outdated gradio component. The application is designed to restrict user access to resources within the `web_assets` folder. However, the outdated version of gradio it employs is susceptible to path traversal, as identified in CVE-2023-51449. This vulnerability allows unauthorized users to bypass the intended restrictions and access sensitive files, such as `config.json`, which contains API keys. The issue affects the latest version of chuanhuchatgpt prior to the fixed version released on 20240305.
CWE-22 Jun 06, 2024
CVE-2024-2928 7.5 HIGH 2 PoCs Analysis NUCLEI EPSS 0.92
MLflow < 2.11.3 - Path Traversal
A Local File Inclusion (LFI) vulnerability was identified in mlflow/mlflow, specifically in version 2.9.2, which was fixed in version 2.11.3. This vulnerability arises from the application's failure to properly validate URI fragments for directory traversal sequences such as '../'. An attacker can exploit this flaw by manipulating the fragment part of the URI to read arbitrary files on the local file system, including sensitive files like '/etc/passwd'. The vulnerability is a bypass to a previous patch that only addressed similar manipulation within the URI's query string, highlighting the need for comprehensive validation of all parts of a URI to prevent LFI attacks.
CWE-29 Jun 06, 2024
CVE-2024-4325 8.6 HIGH EXPLOITED NUCLEI EPSS 0.65
Gradio < 4.41.0 - SSRF
A Server-Side Request Forgery (SSRF) vulnerability exists in the gradio-app/gradio version 4.21.0, specifically within the `/queue/join` endpoint and the `save_url_to_cache` function. The vulnerability arises when the `path` value, obtained from the user and expected to be a URL, is used to make an HTTP request without sufficient validation checks. This flaw allows an attacker to send crafted requests that could lead to unauthorized access to the local network or the AWS metadata endpoint, thereby compromising the security of internal servers.
CWE-918 Jun 06, 2024
CVE-2024-37152 5.3 MEDIUM 1 Writeup NUCLEI EPSS 0.80
Argoproj Argo CD < 2.9.17 - Missing Authentication
Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. The vulnerability allows unauthorized access to the sensitive settings exposed by /api/v1/settings endpoint without authentication. All sensitive settings are hidden except passwordPattern. This vulnerability is fixed in 2.11.3, 2.10.12, and 2.9.17.
CWE-287 Jun 06, 2024
CVE-2024-28995 8.6 HIGH KEV 14 PoCs Analysis NUCLEI EPSS 0.94
SolarWinds Serv-U - Directory Traversal
SolarWinds Serv-U was susceptible to a directory transversal vulnerability that would allow access to read sensitive files on the host machine.
CWE-22 Jun 06, 2024
CVE-2024-20404 7.2 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.79
Cisco Finesse - SSRF
A vulnerability in the web-based management interface of Cisco Finesse could allow an unauthenticated, remote attacker to conduct an SSRF attack on an affected system. This vulnerability is due to insufficient validation of user-supplied input for specific HTTP requests that are sent to an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected device. A successful exploit could allow the attacker to obtain limited sensitive information for services that are associated to the affected device.
CWE-918 Jun 05, 2024