Vulnerabilities with Nuclei Scanner Templates

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,077 results Clear all
CVE-2024-4434 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.77
LearnPress - WordPress LMS Plugin <4.2.6.5 - SQL Injection
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the ‘term_id’ parameter in versions up to, and including, 4.2.6.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 May 14, 2024
CVE-2024-34351 7.5 HIGH 6 PoCs Analysis NUCLEI EPSS 0.93
Next.js - SSRF
Next.js is a React framework that can provide building blocks to create web applications. A Server-Side Request Forgery (SSRF) vulnerability was identified in Next.js Server Actions. If the `Host` header is modified, and the below conditions are also met, an attacker may be able to make requests that appear to be originating from the Next.js application server itself. The required conditions are 1) Next.js is running in a self-hosted manner; 2) the Next.js application makes use of Server Actions; and 3) the Server Action performs a redirect to a relative path which starts with a `/`. This vulnerability was fixed in Next.js `14.1.1`.
CWE-918 May 14, 2024
CVE-2024-32964 9.0 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.74
Lobehub Lobe Chat < 0.150.6 - SSRF
Lobe Chat is a chatbot framework that supports speech synthesis, multimodal, and extensible Function Call plugin system. Prior to 0.150.6, lobe-chat had an unauthorized Server-Side Request Forgery vulnerability in the /api/proxy endpoint. An attacker can construct malicious requests to cause Server-Side Request Forgery without logging in, attack intranet services, and leak sensitive information.
CWE-918 May 14, 2024
CVE-2024-32739 7.5 HIGH EXPLOITED NUCLEI EPSS 0.63
Cyberpower Powerpanel < 2.8.3 - SQL Injection
A sql injection vulnerability exists in CyberPower PowerPanel Enterprise prior to v2.8.3. An unauthenticated remote attacker can leak sensitive information via the "query_ptask_verbose" function within MCUDBHelper.
CWE-89 May 14, 2024
CVE-2024-32738 7.5 HIGH EXPLOITED NUCLEI EPSS 0.56
Cyberpower Powerpanel < 2.8.3 - SQL Injection
A sql injection vulnerability exists in CyberPower PowerPanel Enterprise prior to v2.8.3. An unauthenticated remote attacker can leak sensitive information via the "query_ptask_lean" function within MCUDBHelper.
CWE-89 May 14, 2024
CVE-2024-32737 7.5 HIGH EXPLOITED NUCLEI EPSS 0.56
Cyberpower Powerpanel < 2.8.3 - SQL Injection
A sql injection vulnerability exists in CyberPower PowerPanel Enterprise prior to v2.8.3. An unauthenticated remote attacker can leak sensitive information via the "query_contract_result" function within MCUDBHelper.
CWE-89 May 14, 2024
CVE-2024-32736 7.5 HIGH EXPLOITED NUCLEI EPSS 0.72
Cyberpower Powerpanel < 2.8.3 - SQL Injection
A sql injection vulnerability exists in CyberPower PowerPanel Enterprise prior to v2.8.3. An unauthenticated remote attacker can leak sensitive information via the "query_utask_verbose" function within MCUDBHelper.
CWE-89 May 14, 2024
CVE-2024-32735 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.76
Cyberpower Powerpanel < 2.8.3 - Missing Authentication
An issue regarding missing authentication for certain utilities exists in CyberPower PowerPanel Enterprise prior to v2.8.3. An unauthenticated remote attacker can access the PDNU REST APIs, which may result in compromise of the application.
CWE-306 May 14, 2024
CVE-2024-29895 10.0 CRITICAL EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.93
Cacti 1.3.x DEV - Command Injection
Cacti provides an operational monitoring and fault management framework. A command injection vulnerability on the 1.3.x DEV branch allows any unauthenticated user to execute arbitrary command on the server when `register_argc_argv` option of PHP is `On`. In `cmd_realtime.php` line 119, the `$poller_id` used as part of the command execution is sourced from `$_SERVER['argv']`, which can be controlled by URL when `register_argc_argv` option of PHP is `On`. And this option is `On` by default in many environments such as the main PHP Docker image for PHP. Commit 53e8014d1f082034e0646edc6286cde3800c683d contains a patch for the issue, but this commit was reverted in commit 99633903cad0de5ace636249de16f77e57a3c8fc.
CWE-77 May 14, 2024
CVE-2024-34257 9.8 CRITICAL EXPLOITED 1 Writeup NUCLEI EPSS 0.90
TOTOLINK EX1800T <V9.1.0cu.2112 - Command Injection
TOTOLINK EX1800T V9.1.0cu.2112_B20220316 has a vulnerability in the apcliEncrypType parameter that allows unauthorized execution of arbitrary commands, allowing an attacker to obtain device administrator privileges.
CWE-285 May 08, 2024
CVE-2024-32113 9.8 CRITICAL KEV 8 PoCs Analysis NUCLEI EPSS 0.94
Apache OFBiz <18.12.13 - Path Traversal
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Apache OFBiz.This issue affects Apache OFBiz: before 18.12.13. Users are recommended to upgrade to version 18.12.13, which fixes the issue.
CWE-22 May 08, 2024
CVE-2024-29889 7.1 HIGH 1 Writeup NUCLEI EPSS 0.72
GLPI <10.0.15 - SQL Injection
GLPI is a Free Asset and IT Management Software package. Prior to 10.0.15, an authenticated user can exploit a SQL injection vulnerability in the saved searches feature to alter another user account data take control of it. This vulnerability is fixed in 10.0.15.
CWE-89 May 07, 2024
CVE-2024-34470 8.6 HIGH 5 PoCs Analysis NUCLEI EPSS 0.94
HSC Mailinspector <5.2.18 - Path Traversal
An issue was discovered in HSC Mailinspector 5.2.17-3 through v.5.2.18. An Unauthenticated Path Traversal vulnerability exists in the /public/loader.php file. The path parameter does not properly filter whether the file and directory passed are part of the webroot, allowing an attacker to read arbitrary files on the server.
CWE-29 May 06, 2024
CVE-2024-33113 5.3 MEDIUM 2 PoCs Analysis NUCLEI EPSS 0.53
Dlink Dir-845l Firmware < 1.01krb03 - Command Injection
D-LINK DIR-845L <=v1.01KRb03 is vulnerable to Information disclosurey via bsc_sms_inbox.php.
CWE-79 May 06, 2024
CVE-2024-4439 7.2 HIGH 5 PoCs Analysis NUCLEI EPSS 0.91
WordPress Core <6.5.2 - XSS
WordPress Core is vulnerable to Stored Cross-Site Scripting via user display names in the Avatar block in various versions up to 6.5.2 due to insufficient output escaping on the display name. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. In addition, it also makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that have the comment block present and display the comment author's avatar.
CWE-80 May 03, 2024
CVE-2024-2876 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.91
Wordpress Email Subscribers by Icegram Express - SQL Injection
The Email Subscribers by Icegram Express – Email Marketing, Newsletters, Automation for WordPress & WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'run' function of the 'IG_ES_Subscribers_Query' class in all versions up to, and including, 5.7.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 May 02, 2024
CVE-2024-2667 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.91
InstaWP Connect <= 0.1.0.22 - Unauthenticated Arbitrary File Upload
The InstaWP Connect – 1-click WP Staging & Migration plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file validation in the /wp-json/instawp-connect/v1/config REST API endpoint in all versions up to, and including, 0.1.0.22. This makes it possible for unauthenticated attackers to upload arbitrary files.
CWE-434 May 02, 2024
CVE-2024-34061 4.3 MEDIUM 1 Writeup NUCLEI EPSS 0.28
changedetection.io <0.45.22 - Reflected XSS
changedetection.io is a free open source web page change detection, website watcher, restock monitor and notification service. In affected versions Input in parameter notification_urls is not processed resulting in javascript execution in the application. A reflected XSS vulnerability happens when the user input from a URL or POST data is reflected on the page without being stored, thus allowing the attacker to inject malicious content. This issue has been addressed in version 0.45.22. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-79 May 02, 2024
CVE-2024-4348 4.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.16
osCommerce 4 - XSS
A vulnerability, which was classified as problematic, was found in osCommerce 4. Affected is an unknown function of the file /catalog/all-products. The manipulation of the argument cat leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-262488. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-79 Apr 30, 2024
CVE-2024-26331 7.5 HIGH NUCLEI EPSS 0.68
ReCrystallize Server - Authentication Bypass
ReCrystallize Server 5.10.0.0 uses a authorization mechanism that relies on the value of a cookie, but it does not bind the cookie value to a session ID. Attackers can easily modify the cookie value, within a browser or by implementing client-side code outside of a browser. Attackers can bypass the authentication mechanism by modifying the cookie to contain an expected value.
CWE-287 Apr 30, 2024