Vulnerabilities with Nuclei Scanner Templates

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,077 results Clear all
CVE-2024-35219 8.3 HIGH EXPLOITED 1 Writeup NUCLEI EPSS 0.52
Org.openapitools Openapi-generator-online < 7.6.0 - Path Traversal
OpenAPI Generator allows generation of API client libraries (SDK generation), server stubs, documentation and configuration automatically given an OpenAPI Spec. Prior to version 7.6.0, attackers can exploit a path traversal vulnerability to read and delete files and folders from an arbitrary, writable directory as anyone can set the output folder when submitting the request via the `outputFolder` option. The issue was fixed in version 7.6.0 by removing the usage of the `outputFolder` option. No known workarounds are available.
CWE-22 May 27, 2024
CVE-2024-4455 7.2 HIGH EXPLOITED NUCLEI EPSS 0.08
YITH WooCommerce Ajax Search <2.4.0 - XSS
The YITH WooCommerce Ajax Search plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘item’ parameter in versions up to, and including, 2.4.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
CWE-79 May 24, 2024
CVE-2024-5315 9.1 CRITICAL NUCLEI EPSS 0.63
Dolibarr ERP - CRM <9.0.1 - SQL Injection
Vulnerabilities in Dolibarr ERP - CRM that affect version 9.0.1 and allow SQL injection. These vulnerabilities could allow a remote attacker to send a specially crafted SQL query to the system and retrieve all the information stored in the database through the parameters viewstatut in /dolibarr/commande/list.php.
CWE-89 May 24, 2024
CVE-2024-5084 9.8 CRITICAL 8 PoCs Analysis NUCLEI EPSS 0.93
Hashthemes Hash Form < 1.1.1 - Unrestricted File Upload
The Hash Form – Drag & Drop Form Builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'file_upload_action' function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.
CWE-434 May 23, 2024
CVE-2024-4399 9.1 CRITICAL NUCLEI EPSS 0.30
Apereo Central Authentication Service - SSRF
The does not validate a parameter before making a request to it, which could allow unauthenticated users to perform SSRF attack
CWE-918 May 23, 2024
CVE-2024-5230 5.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.41
EnvaySoft FleetCart <4.1.1 - Info Disclosure
A vulnerability has been found in EnvaySoft FleetCart up to 4.1.1 and classified as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument razorpayKeyId leads to information disclosure. The attack can be launched remotely. It is recommended to upgrade the affected component. The identifier VDB-265981 was assigned to this vulnerability.
CWE-200 May 23, 2024
CVE-2024-35627 6.1 MEDIUM NUCLEI EPSS 0.04
tileserver-gl <4.4.10 - XSS
tileserver-gl up to v4.4.10 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /data/v3/?key.
CWE-79 May 22, 2024
CVE-2024-3495 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.93
Country State City Dropdown CF7 <2.7.2 - SQL Injection
The Country State City Dropdown CF7 plugin for WordPress is vulnerable to SQL Injection via the ‘cnt’ and 'sid' parameters in versions up to, and including, 2.7.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 May 22, 2024
CVE-2024-4443 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Business Directory Plugin - WordPress <6.4.2 - SQL Injection
The Business Directory Plugin – Easy Listing Directories for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the ‘listingfields’ parameter in all versions up to, and including, 6.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 May 22, 2024
CVE-2024-21683 8.8 HIGH EXPLOITED 8 PoCs Analysis NUCLEI EPSS 0.94
Atlassian Confluence Data Center and Server - Remote Code Execution
This High severity RCE (Remote Code Execution) vulnerability was introduced in version 5.2 of Confluence Data Center and Server. This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 7.2, allows an authenticated attacker to execute arbitrary code which has high impact to confidentiality, high impact to integrity, high impact to availability, and requires no user interaction.  Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version. If you are unable to do so, upgrade your instance to one of the specified supported fixed versions. See the release notes https://confluence.atlassian.com/doc/confluence-release-notes-327.html You can download the latest version of Confluence Data Center and Server from the download center https://www.atlassian.com/software/confluence/download-archives. This vulnerability was found internally.
CWE-94 May 21, 2024
CVE-2024-2782 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.07
WordPress FluentForms <= 5.1.16 - Broken Access Control
The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the /wp-json/fluentform/v1/global-settings REST API endpoint in all versions up to, and including, 5.1.16. This makes it possible for unauthenticated attackers to modify all of the plugin's settings.
CWE-862 May 18, 2024
CVE-2024-2771 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.27
Contact Form Plugin by Fluent Forms < 5.1.17 - Unauthenticated Limited Privilege Escalation
The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag & Drop WP Form Builder plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the /wp-json/fluentform/v1/managers REST API endpoint in all versions up to, and including, 5.1.16. This makes it possible for unauthenticated attackers to grant users with Fluent Form management permissions which gives them access to all of the plugin's settings and features. This also makes it possible for unauthenticated attackers to delete manager accounts.
CWE-862 May 18, 2024
CVE-2024-34982 9.8 CRITICAL NUCLEI EPSS 0.80
Lylme Spage - Unrestricted File Upload
An arbitrary file upload vulnerability in the component /include/file.php of lylme_spage v1.9.5 allows attackers to execute arbitrary code via uploading a crafted file.
CWE-434 May 17, 2024
CVE-2024-27954 9.3 CRITICAL EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.93
WP Automatic <3.92.0 - Path Traversal
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in WP Automatic Automatic allows Path Traversal, Server Side Request Forgery.This issue affects Automatic: from n/a through 3.92.0.
CWE-22 May 17, 2024
CVE-2024-24882 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.48
Masteriyo LMS <= 1.7.2 - Unauthenticated Privilege Escalation
Incorrect Privilege Assignment vulnerability in masteriyo Masteriyo - LMS learning-management-system.This issue affects Masteriyo - LMS: from n/a through <= 1.7.2.
CWE-266 May 17, 2024
CVE-2024-3231 6.1 MEDIUM NUCLEI EPSS 0.04
Ivanweb Popup4phone < 1.3.2 - XSS
The Popup4Phone WordPress plugin through 1.3.2 does not sanitise and escape some parameters, which could allow unauthenticated users to perform Cross-Site Scripting attacks against admins.
CWE-79 May 17, 2024
CVE-2024-22476 10.0 CRITICAL NUCLEI EPSS 0.77
Intel Neural Compressor <2.5.0 - SQL Injection
Improper input validation in some Intel(R) Neural Compressor software before version 2.5.0 may allow an unauthenticated user to potentially enable escalation of privilege via remote access.
CWE-20 May 16, 2024
CVE-2024-4956 7.5 HIGH 18 PoCs Analysis NUCLEI EPSS 0.94
Sonatype Nexus Repository <3.68.1 - Path Traversal
Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1.
CWE-22 May 16, 2024
CVE-2024-3848 7.5 HIGH 1 Writeup NUCLEI EPSS 0.79
Lfprojects Mlflow < 2.12.1 - Path Traversal
A path traversal vulnerability exists in mlflow/mlflow version 2.11.0, identified as a bypass for the previously addressed CVE-2023-6909. The vulnerability arises from the application's handling of artifact URLs, where a '#' character can be used to insert a path into the fragment, effectively skipping validation. This allows an attacker to construct a URL that, when processed, ignores the protocol scheme and uses the provided path for filesystem access. As a result, an attacker can read arbitrary files, including sensitive information such as SSH and cloud keys, by exploiting the way the application converts the URL into a filesystem path. The issue stems from insufficient validation of the fragment portion of the URL, leading to arbitrary file read through path traversal.
CWE-29 May 16, 2024
CVE-2024-3822 4.8 MEDIUM NUCLEI EPSS 0.01
Mranderson Base64 Encoderdecoder < 0.9.2 - XSS
The Base64 Encoder/Decoder WordPress plugin through 0.9.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
CWE-79 May 15, 2024