Vulnerabilities with Nuclei Scanner Templates
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2024-33832
6.3
MEDIUM
NUCLEI
EPSS 0.03
OneNav <0.9.35-20240318 - SSRF
OneNav v0.9.35-20240318 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /index.php?c=api&method=get_link_info.
CWE-918
Apr 30, 2024
CVE-2024-31621
7.6
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.83
Flowise <1.6.2 - RCE
An issue in FlowiseAI Inc Flowise v.1.6.2 and before allows a remote attacker to execute arbitrary code via a crafted script to the api/v1 component.
CWE-94
Apr 29, 2024
CVE-2024-33575
5.3
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.05
User Meta <3.0 - Info Disclosure
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in User Meta user-meta.This issue affects User Meta: from n/a through 3.0.
CWE-200
Apr 29, 2024
CVE-2024-4257
6.3
MEDIUM
1 Writeup
NUCLEI
EPSS 0.92
BlueNet Technology Clinical Browsing System 1.2.1 - SQL Injection
A vulnerability was found in BlueNet Technology Clinical Browsing System 1.2.1. It has been classified as critical. This affects an unknown part of the file /xds/deleteStudy.php. The manipulation of the argument documentUniqueId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-262149 was assigned to this vulnerability.
CWE-89
Apr 27, 2024
CVE-2024-32651
10.0
CRITICAL
4 PoCs
Analysis
NUCLEI
EPSS 0.92
changedetection.io - RCE
changedetection.io is an open source web page change detection, website watcher, restock monitor and notification service. There is a Server Side Template Injection (SSTI) in Jinja2 that allows Remote Command Execution on the server host. Attackers can run any system command without any restriction and they could use a reverse shell. The impact is critical as the attacker can completely takeover the server machine. This can be reduced if changedetection is behind a login page, but this isn't required by the application (not by default and not enforced).
CWE-1336
Apr 26, 2024
CVE-2024-32709
9.3
CRITICAL
1 PoC
NUCLEI
EPSS 0.93
Plechev Andrey WP-Recall <16.26.5 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.
CWE-89
Apr 24, 2024
CVE-2024-4040
9.8
CRITICAL
KEV
RANSOMWARE
22 PoCs
Analysis
NUCLEI
EPSS 0.94
CrushFTP <10.7.1-11.1.0 - RCE
A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.
CWE-1336
Apr 22, 2024
CVE-2024-32399
7.6
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.84
RaidenMAILD Mail Server <4.9.4 - Path Traversal
Directory Traversal vulnerability in RaidenMAILD Mail Server v.4.9.4 and before allows a remote attacker to obtain sensitive information via the /webeditor/ component.
CWE-22
Apr 22, 2024
CVE-2024-32238
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.90
H3C ER8300G2-X - Info Disclosure
H3C ER8300G2-X is vulnerable to Incorrect Access Control. The password for the router's management system can be accessed via the management system page login interface.
CWE-522
Apr 22, 2024
CVE-2024-27348
9.8
CRITICAL
KEV
9 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache HugeGraph-Server - Remote Command Execution
RCE-Remote Command Execution vulnerability in Apache HugeGraph-Server.This issue affects Apache HugeGraph-Server: from 1.0.0 before 1.3.0 in Java8 & Java11
Users are recommended to upgrade to version 1.3.0 with Java11 & enable the Auth system, which fixes the issue.
CWE-284
Apr 22, 2024
CVE-2024-29029
6.1
MEDIUM
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.02
Memos 0.13.2 - Cross-Site Scripting & SSRF
memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /o/get/image that allows unauthenticated users to enumerate the internal network and retrieve images. The response from the image request is then copied into the response of the current server request, causing a reflected XSS vulnerability. Version 0.22.0 of memos removes the vulnerable file.
CWE-918
Apr 19, 2024
CVE-2024-29030
5.8
MEDIUM
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.05
Memos 0.13.2 - Server-Side Request Forgery
memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /api/resource that allows authenticated users to enumerate the internal network. Version 0.22.0 of memos removes the vulnerable file.
CWE-918
Apr 19, 2024
CVE-2024-29028
5.8
MEDIUM
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.06
Memos 0.13.2 - Server-Side Request Forgery
memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /o/get/httpmeta that allows unauthenticated users to enumerate the internal network and receive limited html values in json form. This vulnerability is fixed in 0.16.1.
CWE-918
Apr 19, 2024
CVE-2024-31750
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.94
f-logic datacube3 <1.0 - Info Disclosure
SQL injection vulnerability in f-logic datacube3 v.1.0 allows a remote attacker to obtain sensitive information via the req_id parameter.
CWE-89
Apr 19, 2024
CVE-2024-3742
7.5
HIGH
NUCLEI
EPSS 0.09
Electrolink transmitter - Info Disclosure
Electrolink transmitters store credentials in clear-text. Use of these credentials could allow an attacker to access the system.
CWE-312
Apr 18, 2024
CVE-2024-1561
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
gradio-app/gradio - Info Disclosure
An issue was discovered in gradio-app/gradio, where the `/component_server` endpoint improperly allows the invocation of any method on a `Component` class with attacker-controlled arguments. Specifically, by exploiting the `move_resource_to_block_cache()` method of the `Block` class, an attacker can copy any file on the filesystem to a temporary directory and subsequently retrieve it. This vulnerability enables unauthorized local file read access, posing a significant risk especially when the application is exposed to the internet via `launch(share=True)`, thereby allowing remote attackers to read files on the host machine. Furthermore, gradio apps hosted on `huggingface.co` are also affected, potentially leading to the exposure of sensitive information such as API keys and credentials stored in environment variables.
CWE-29
Apr 16, 2024
CVE-2024-1483
7.5
HIGH
NUCLEI
EPSS 0.75
Lfprojects Mlflow < 2.12.1 - Path Traversal
A path traversal vulnerability exists in mlflow/mlflow version 2.9.2, allowing attackers to access arbitrary files on the server. By crafting a series of HTTP POST requests with specially crafted 'artifact_location' and 'source' parameters, using a local URI with '#' instead of '?', an attacker can traverse the server's directory structure. The issue occurs due to insufficient validation of user-supplied input in the server's handlers.
CWE-22
Apr 16, 2024
CVE-2024-32128
9.3
CRITICAL
NUCLEI
EPSS 0.11
Realtyna Organic IDX <4.14.4 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Realtyna Realtyna Organic IDX plugin.This issue affects Realtyna Organic IDX plugin: from n/a through 4.14.4.
CWE-89
Apr 15, 2024
CVE-2024-31839
4.8
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.85
CHAOS 5.0.1 - XSS
Cross Site Scripting vulnerability in tiagorlampert CHAOS v.5.0.1 allows a remote attacker to escalate privileges via the sendCommandHandler function in the handler.go component.
CWE-79
Apr 12, 2024
CVE-2024-3400
10.0
CRITICAL
KEV
RANSOMWARE
49 PoCs
Analysis
NUCLEI
EPSS 0.94
Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.
Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
CWE-20
Apr 12, 2024