Vulnerabilities with Nuclei Scanner Templates
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2024-2879
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.94
WordPress Plugin LayerSlider 7.9.11-7.10.0 - SQL Injection
The LayerSlider plugin for WordPress is vulnerable to SQL Injection via the ls_get_popup_markup action in versions 7.9.11 and 7.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89
Apr 03, 2024
CVE-2024-2389
10.0
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Progress Kemp Flowmon - Command Injection
In Flowmon versions prior to 11.1.14 and 12.3.5, an operating system command injection vulnerability has been identified. An unauthenticated user can gain entry to the system via the Flowmon management interface, allowing for the execution of arbitrary system commands.
CWE-78
Apr 02, 2024
CVE-2024-30490
9.3
CRITICAL
NUCLEI
EPSS 0.14
Metagauss Profilegrid < 5.7.9 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Metagauss ProfileGrid.This issue affects ProfileGrid : from n/a through 5.7.8.
CWE-89
Mar 29, 2024
CVE-2024-29792
7.1
HIGH
EXPLOITED
NUCLEI
EPSS 0.14
Unlimited Elements for Elementor <= 1.5.93 - Cross Site Scripting
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Unlimited Elements Unlimited Elements For Elementor (Free Widgets, Addons, Templates) unlimited-elements-for-elementor.This issue affects Unlimited Elements For Elementor (Free Widgets, Addons, Templates): from n/a through <= 1.5.93.
CWE-79
Mar 27, 2024
CVE-2024-29931
7.1
HIGH
EXPLOITED
NUCLEI
EPSS 0.13
WP Google Maps <9.0.29 - XSS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPGMaps WP Go Maps wp-google-maps.This issue affects WP Go Maps: from n/a through <= 9.0.29.
CWE-79
Mar 27, 2024
CVE-2024-30194
7.1
HIGH
EXPLOITED
NUCLEI
EPSS 0.19
WP Sunshine Photo Cart <3.1.1 - XSS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sunshinephotocart Sunshine Photo Cart sunshine-photo-cart.This issue affects Sunshine Photo Cart: from n/a through <= 3.1.1.
CWE-79
Mar 27, 2024
CVE-2024-25735
9.1
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
WyreStorm Apollo VX20 - Information Disclosure
An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can discover cleartext passwords via a SoftAP /device/config GET request.
CWE-319
Mar 27, 2024
CVE-2024-2863
5.3
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.57
LG LED Assistant - Thumbnail Path Traversal File Upload
This vulnerability allows remote attackers to traverse paths via file upload on the affected LG LED Assistant.
CWE-22
Mar 25, 2024
CVE-2024-2862
9.1
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.75
LG LED Assistant - Unauthenticated Password Reset
This vulnerability allows remote attackers to reset the password of anonymous users without authorization on the affected LG LED Assistant.
CWE-287
Mar 25, 2024
CVE-2024-29059
7.5
HIGH
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
.NET Framework - Leaking ObjRefs via HTTP .NET Remoting
.NET Framework Information Disclosure Vulnerability
CWE-209
Mar 23, 2024
CVE-2024-29272
6.5
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.89
VvvebJs < 1.7.5 - Arbitrary File Upload
Arbitrary File Upload vulnerability in VvvebJs before version 1.7.5, allows unauthenticated remote attackers to execute arbitrary code and obtain sensitive information via the sanitizeFileName parameter in save.php.
CWE-434
Mar 22, 2024
CVE-2024-27956
9.9
CRITICAL
EXPLOITED
19 PoCs
Analysis
NUCLEI
EPSS 0.94
WordPress Automatic Plugin <= 3.92.0 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.
CWE-89
Mar 21, 2024
CVE-2024-2053
7.5
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.41
Articatech Artica Proxy - Path Traversal
The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user. This issue was demonstrated on version 4.50 of the The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the "www-data" user.
CWE-23
Mar 21, 2024
CVE-2024-27292
7.5
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Docassemble - Local File Inclusion
Docassemble is an expert system for guided interviews and document assembly. The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. It affects versions 1.4.53 to 1.4.96. The vulnerability has been patched in version 1.4.97 of the master branch.
CWE-706
Mar 21, 2024
CVE-2024-29138
7.1
HIGH
EXPLOITED
NUCLEI
EPSS 0.12
WordPress Restrict User Access <= 2.5 - Cross-Site Scripting
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joachim Jensen Restrict User Access – Membership Plugin with Force restrict-user-access.This issue affects Restrict User Access – Membership Plugin with Force: from n/a through <= 2.5.
CWE-79
Mar 19, 2024
CVE-2024-29137
7.1
HIGH
EXPLOITED
NUCLEI
EPSS 0.17
WordPress Tourfic Plugin <= 2.11.7 - Cross-Site Scripting
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themefic Tourfic tourfic.This issue affects Tourfic: from n/a through <= 2.11.7.
CWE-79
Mar 19, 2024
CVE-2024-28734
6.1
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.11
Coda v.2024Q1 - Cross-Site Scripting
Cross Site Scripting vulnerability in Unit4 Financials by Coda prior to 2023Q4 allows a remote attacker to run arbitrary code via a crafted GET request using the cols parameter.
CWE-79
Mar 19, 2024
CVE-2024-2621
6.3
MEDIUM
NUCLEI
EPSS 0.15
Fujian Kelixin Communication - Command Injection
A vulnerability was found in Fujian Kelixin Communication Command and Dispatch Platform up to 20240318 and classified as critical. Affected by this issue is some unknown functionality of the file api/client/user/pwd_update.php. The manipulation of the argument uuid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257198 is the identifier assigned to this vulnerability.
CWE-89
Mar 19, 2024
CVE-2024-20767
7.4
HIGH
KEV
7 PoCs
Analysis
NUCLEI
EPSS 0.94
CVE-2024-20767 - Adobe Coldfusion Arbitrary File Read
ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify restricted files. Exploitation of this issue does not require user interaction. Exploitation of this issue requires the admin panel be exposed to the internet.
CWE-284
Mar 18, 2024
CVE-2024-28255
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
OpenMetadata - Authentication Bypass
OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. The `JwtFilter` handles the API authentication by requiring and verifying JWT tokens. When a new request comes in, the request's path is checked against this list. When the request's path contains any of the excluded endpoints the filter returns without validating the JWT. Unfortunately, an attacker may use Path Parameters to make any path contain any arbitrary strings. For example, a request to `GET /api/v1;v1%2fusers%2flogin/events/subscriptions/validation/condition/111` will match the excluded endpoint condition and therefore will be processed with no JWT validation allowing an attacker to bypass the authentication mechanism and reach any arbitrary endpoint, including the ones listed above that lead to arbitrary SpEL expression injection. This bypass will not work when the endpoint uses the `SecurityContext.getUserPrincipal()` since it will return `null` and will throw an NPE. This issue may lead to authentication bypass and has been addressed in version 1.2.4. Users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as `GHSL-2023-237`.
CWE-287
Mar 15, 2024