Vulnerabilities with Nuclei Scanner Templates

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,077 results Clear all
CVE-2024-36837 7.5 HIGH 2 PoCs Analysis NUCLEI EPSS 0.92
CRMEB <5.2.2 - SQL Injection
SQL Injection vulnerability in CRMEB v.5.2.2 allows a remote attacker to obtain sensitive information via the getProductList function in the ProductController.php file.
CWE-89 Jun 05, 2024
CVE-2024-3469 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.12
Generatepress < 2.4.1 - XSS
The GP Premium plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the message parameter in all versions up to, and including, 2.4.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
CWE-79 Jun 05, 2024
CVE-2024-4295 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.93
Email Subscribers by Icegram Express <5.7.20 - SQL Injection
The Email Subscribers by Icegram Express plugin for WordPress is vulnerable to SQL Injection via the ‘hash’ parameter in all versions up to, and including, 5.7.20 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Jun 05, 2024
CVE-2024-5483 5.3 MEDIUM NUCLEI EPSS 0.06
LearnPress - WordPress LMS Plugin <4.2.6.8 - Info Disclosure
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.2.6.8 due to incorrect implementation of get_items_permissions_check function. This makes it possible for unauthenticated attackers to extract basic information about website users, including their emails
CWE-200 Jun 05, 2024
CVE-2024-36675 9.1 CRITICAL EXPLOITED NUCLEI EPSS 0.44
LyLme_spaege v1.9.5 - SSRF
LyLme_spage v1.9.5 is vulnerable to Server-Side Request Forgery (SSRF) via the get_head function.
CWE-918 Jun 04, 2024
CVE-2024-36858 9.8 CRITICAL EXPLOITED 1 Writeup NUCLEI EPSS 0.74
Jan v0.4.12 - RCE
An arbitrary file upload vulnerability in the /v1/app/writeFileSync interface of Jan v0.4.12 allows attackers to execute arbitrary code via uploading a crafted file.
CWE-434 Jun 04, 2024
CVE-2024-36857 7.5 HIGH EXPLOITED 1 Writeup NUCLEI EPSS 0.53
Jan v0.4.12 - Info Disclosure
Jan v0.4.12 was discovered to contain an arbitrary file read vulnerability via the /v1/app/readFileSync interface.
CWE-31 Jun 04, 2024
CVE-2024-25600 10.0 CRITICAL EXPLOITED 26 PoCs Analysis NUCLEI EPSS 0.94
Unauthenticated Remote Code Execution - Bricks <= 1.9.6
Improper Control of Generation of Code ('Code Injection') vulnerability in Codeer Limited Bricks Builder allows Code Injection.This issue affects Bricks Builder: from n/a through 1.9.6.
CWE-94 Jun 04, 2024
CVE-2024-5421 HIGH NUCLEI EPSS 0.24
utnserver Pro <20.1.22 - Command Injection
Missing input validation and OS command integration of the input in the utnserver Pro, utnserver ProMAX, INU-100 web-interface allows authenticated command injection.This issue affects utnserver Pro, utnserver ProMAX, INU-100 version 20.1.22 and below.
CWE-78 Jun 04, 2024
CVE-2024-5420 HIGH 2 PoCs Analysis NUCLEI EPSS 0.47
SEH Computertechnik <20.1.22 - XSS
Missing input validation in the SEH Computertechnik utnserver Pro, SEH Computertechnik utnserver ProMAX, SEH Computertechnik INU-100 web-interface allows stored Cross-Site Scripting (XSS)..This issue affects utnserver Pro, utnserver ProMAX, INU-100 version 20.1.22 and below.
CWE-79 Jun 04, 2024
CVE-2024-36104 9.1 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Apache OFBiz <18.12.14 - Path Traversal
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz. This issue affects Apache OFBiz: before 18.12.14. Users are recommended to upgrade to version 18.12.14, which fixes the issue.
CWE-22 Jun 04, 2024
CVE-2024-4180 9.1 CRITICAL NUCLEI EPSS 0.42
Stellarwp The Events Calendar < 6.4.0.1 - XSS
The Events Calendar WordPress plugin before 6.4.0.1 does not properly sanitize user-submitted content when rendering some views via AJAX.
CWE-79 Jun 04, 2024
CVE-2024-29973 9.8 CRITICAL EXPLOITED 11 PoCs Analysis NUCLEI EPSS 0.94
Zyxel NAS326 <V5.21(AAZF.17)C0 - Command Injection
** UNSUPPORTED WHEN ASSIGNED ** The command injection vulnerability in the “setCookie” parameter in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
CWE-78 Jun 04, 2024
CVE-2024-29972 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Zyxel NAS326 <V5.21(AAZF.17)C0 - Command Injection
** UNSUPPORTED WHEN ASSIGNED ** The command injection vulnerability in the CGI program "remote_help-cgi" in Zyxel NAS326 firmware versions before V5.21(AAZF.17)C0 and NAS542 firmware versions before V5.21(ABAG.14)C0 could allow an unauthenticated attacker to execute some operating system (OS) commands by sending a crafted HTTP POST request.
CWE-78 Jun 04, 2024
CVE-2024-29824 8.8 HIGH KEV 3 PoCs Analysis NUCLEI EPSS 0.94
Ivanti EPM RecordGoodApp SQLi RCE
An unspecified SQL Injection vulnerability in Core server of Ivanti EPM 2022 SU5 and prior allows an unauthenticated attacker within the same network to execute arbitrary code.
CWE-89 May 31, 2024
CVE-2024-23692 9.8 CRITICAL KEV RANSOMWARE 17 PoCs Analysis NUCLEI EPSS 0.94
Rejetto HTTP File Server - Template injection
Rejetto HTTP File Server, up to and including version 2.3m, is vulnerable to a template injection vulnerability. This vulnerability allows a remote, unauthenticated attacker to execute arbitrary commands on the affected system by sending a specially crafted HTTP request. As of the CVE assignment date, Rejetto HFS 2.3m is no longer supported.
CWE-1336 May 31, 2024
CVE-2024-37032 8.8 HIGH EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.94
Ollama < 0.1.34 - Path Traversal
Ollama before 0.1.34 does not validate the format of the digest (sha256 with 64 hex digits) when getting the model path, and thus mishandles the TestGetBlobsPath test cases such as fewer than 64 hex digits, more than 64 hex digits, or an initial ../ substring.
CWE-22 May 31, 2024
CVE-2024-3300 9.0 CRITICAL NUCLEI EPSS 0.32
DELMIA Apriso <2024 - Code Injection
An unsafe .NET object deserialization vulnerability in DELMIA Apriso Release 2019 through Release 2024 could lead to pre-authentication remote code execution.
CWE-502 May 30, 2024
CVE-2024-4358 9.8 CRITICAL KEV 8 PoCs Analysis NUCLEI EPSS 0.94
Telerik Report Server Auth Bypass and Deserialization RCE
In Progress Telerik Report Server, version 2024 Q1 (10.0.24.305) or earlier, on IIS, an unauthenticated attacker can gain access to Telerik Report Server restricted functionality via an authentication bypass vulnerability.
CWE-290 May 29, 2024
CVE-2024-24919 8.6 HIGH KEV RANSOMWARE 69 PoCs Analysis NUCLEI EPSS 0.94
Check Point Quantum Gateway - Information Disclosure
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
CWE-200 May 28, 2024