Vulnerabilities with Nuclei Scanner Templates

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,077 results Clear all
CVE-2024-33832 6.3 MEDIUM NUCLEI EPSS 0.03
OneNav <0.9.35-20240318 - SSRF
OneNav v0.9.35-20240318 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /index.php?c=api&method=get_link_info.
CWE-918 Apr 30, 2024
CVE-2024-31621 7.6 HIGH 1 PoC Analysis NUCLEI EPSS 0.83
Flowise <1.6.2 - RCE
An issue in FlowiseAI Inc Flowise v.1.6.2 and before allows a remote attacker to execute arbitrary code via a crafted script to the api/v1 component.
CWE-94 Apr 29, 2024
CVE-2024-33575 5.3 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.05
User Meta <3.0 - Info Disclosure
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in User Meta user-meta.This issue affects User Meta: from n/a through 3.0.
CWE-200 Apr 29, 2024
CVE-2024-4257 6.3 MEDIUM 1 Writeup NUCLEI EPSS 0.92
BlueNet Technology Clinical Browsing System 1.2.1 - SQL Injection
A vulnerability was found in BlueNet Technology Clinical Browsing System 1.2.1. It has been classified as critical. This affects an unknown part of the file /xds/deleteStudy.php. The manipulation of the argument documentUniqueId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-262149 was assigned to this vulnerability.
CWE-89 Apr 27, 2024
CVE-2024-32651 10.0 CRITICAL 4 PoCs Analysis NUCLEI EPSS 0.92
changedetection.io - RCE
changedetection.io is an open source web page change detection, website watcher, restock monitor and notification service. There is a Server Side Template Injection (SSTI) in Jinja2 that allows Remote Command Execution on the server host. Attackers can run any system command without any restriction and they could use a reverse shell. The impact is critical as the attacker can completely takeover the server machine. This can be reduced if changedetection is behind a login page, but this isn't required by the application (not by default and not enforced).
CWE-1336 Apr 26, 2024
CVE-2024-32709 9.3 CRITICAL 1 PoC NUCLEI EPSS 0.93
Plechev Andrey WP-Recall <16.26.5 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Plechev Andrey WP-Recall.This issue affects WP-Recall: from n/a through 16.26.5.
CWE-89 Apr 24, 2024
CVE-2024-4040 9.8 CRITICAL KEV RANSOMWARE 22 PoCs Analysis NUCLEI EPSS 0.94
CrushFTP <10.7.1-11.1.0 - RCE
A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticated remote attackers to read files from the filesystem outside of the VFS Sandbox, bypass authentication to gain administrative access, and perform remote code execution on the server.
CWE-1336 Apr 22, 2024
CVE-2024-32399 7.6 HIGH 1 PoC Analysis NUCLEI EPSS 0.84
RaidenMAILD Mail Server <4.9.4 - Path Traversal
Directory Traversal vulnerability in RaidenMAILD Mail Server v.4.9.4 and before allows a remote attacker to obtain sensitive information via the /webeditor/ component.
CWE-22 Apr 22, 2024
CVE-2024-32238 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.90
H3C ER8300G2-X - Info Disclosure
H3C ER8300G2-X is vulnerable to Incorrect Access Control. The password for the router's management system can be accessed via the management system page login interface.
CWE-522 Apr 22, 2024
CVE-2024-27348 9.8 CRITICAL KEV 9 PoCs Analysis NUCLEI EPSS 0.94
Apache HugeGraph-Server - Remote Command Execution
RCE-Remote Command Execution vulnerability in Apache HugeGraph-Server.This issue affects Apache HugeGraph-Server: from 1.0.0 before 1.3.0 in Java8 & Java11 Users are recommended to upgrade to version 1.3.0 with Java11 & enable the Auth system, which fixes the issue.
CWE-284 Apr 22, 2024
CVE-2024-29029 6.1 MEDIUM EXPLOITED 1 Writeup NUCLEI EPSS 0.02
Memos 0.13.2 - Cross-Site Scripting & SSRF
memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /o/get/image that allows unauthenticated users to enumerate the internal network and retrieve images. The response from the image request is then copied into the response of the current server request, causing a reflected XSS vulnerability. Version 0.22.0 of memos removes the vulnerable file.
CWE-918 Apr 19, 2024
CVE-2024-29030 5.8 MEDIUM EXPLOITED 1 Writeup NUCLEI EPSS 0.05
Memos 0.13.2 - Server-Side Request Forgery
memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /api/resource that allows authenticated users to enumerate the internal network. Version 0.22.0 of memos removes the vulnerable file.
CWE-918 Apr 19, 2024
CVE-2024-29028 5.8 MEDIUM EXPLOITED 1 Writeup NUCLEI EPSS 0.06
Memos 0.13.2 - Server-Side Request Forgery
memos is a privacy-first, lightweight note-taking service. In memos 0.13.2, an SSRF vulnerability exists at the /o/get/httpmeta that allows unauthenticated users to enumerate the internal network and receive limited html values in json form. This vulnerability is fixed in 0.16.1.
CWE-918 Apr 19, 2024
CVE-2024-31750 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.94
f-logic datacube3 <1.0 - Info Disclosure
SQL injection vulnerability in f-logic datacube3 v.1.0 allows a remote attacker to obtain sensitive information via the req_id parameter.
CWE-89 Apr 19, 2024
CVE-2024-3742 7.5 HIGH NUCLEI EPSS 0.09
Electrolink transmitter - Info Disclosure
Electrolink transmitters store credentials in clear-text. Use of these credentials could allow an attacker to access the system.
CWE-312 Apr 18, 2024
CVE-2024-1561 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
gradio-app/gradio - Info Disclosure
An issue was discovered in gradio-app/gradio, where the `/component_server` endpoint improperly allows the invocation of any method on a `Component` class with attacker-controlled arguments. Specifically, by exploiting the `move_resource_to_block_cache()` method of the `Block` class, an attacker can copy any file on the filesystem to a temporary directory and subsequently retrieve it. This vulnerability enables unauthorized local file read access, posing a significant risk especially when the application is exposed to the internet via `launch(share=True)`, thereby allowing remote attackers to read files on the host machine. Furthermore, gradio apps hosted on `huggingface.co` are also affected, potentially leading to the exposure of sensitive information such as API keys and credentials stored in environment variables.
CWE-29 Apr 16, 2024
CVE-2024-1483 7.5 HIGH NUCLEI EPSS 0.75
Lfprojects Mlflow < 2.12.1 - Path Traversal
A path traversal vulnerability exists in mlflow/mlflow version 2.9.2, allowing attackers to access arbitrary files on the server. By crafting a series of HTTP POST requests with specially crafted 'artifact_location' and 'source' parameters, using a local URI with '#' instead of '?', an attacker can traverse the server's directory structure. The issue occurs due to insufficient validation of user-supplied input in the server's handlers.
CWE-22 Apr 16, 2024
CVE-2024-32128 9.3 CRITICAL NUCLEI EPSS 0.11
Realtyna Organic IDX <4.14.4 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Realtyna Realtyna Organic IDX plugin.This issue affects Realtyna Organic IDX plugin: from n/a through 4.14.4.
CWE-89 Apr 15, 2024
CVE-2024-31839 4.8 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.85
CHAOS 5.0.1 - XSS
Cross Site Scripting vulnerability in tiagorlampert CHAOS v.5.0.1 allows a remote attacker to escalate privileges via the sendCommandHandler function in the handler.go component.
CWE-79 Apr 12, 2024
CVE-2024-3400 10.0 CRITICAL KEV RANSOMWARE 49 PoCs Analysis NUCLEI EPSS 0.94
Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
CWE-20 Apr 12, 2024