Vulnerabilities with Nuclei Scanner Templates

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,077 results Clear all
CVE-2024-2879 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.94
WordPress Plugin LayerSlider 7.9.11-7.10.0 - SQL Injection
The LayerSlider plugin for WordPress is vulnerable to SQL Injection via the ls_get_popup_markup action in versions 7.9.11 and 7.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Apr 03, 2024
CVE-2024-2389 10.0 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.94
Progress Kemp Flowmon - Command Injection
In Flowmon versions prior to 11.1.14 and 12.3.5, an operating system command injection vulnerability has been identified.  An unauthenticated user can gain entry to the system via the Flowmon management interface, allowing for the execution of arbitrary system commands.
CWE-78 Apr 02, 2024
CVE-2024-30490 9.3 CRITICAL NUCLEI EPSS 0.14
Metagauss Profilegrid < 5.7.9 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Metagauss ProfileGrid.This issue affects ProfileGrid : from n/a through 5.7.8.
CWE-89 Mar 29, 2024
CVE-2024-29792 7.1 HIGH EXPLOITED NUCLEI EPSS 0.14
Unlimited Elements for Elementor <= 1.5.93 - Cross Site Scripting
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Unlimited Elements Unlimited Elements For Elementor (Free Widgets, Addons, Templates) unlimited-elements-for-elementor.This issue affects Unlimited Elements For Elementor (Free Widgets, Addons, Templates): from n/a through <= 1.5.93.
CWE-79 Mar 27, 2024
CVE-2024-29931 7.1 HIGH EXPLOITED NUCLEI EPSS 0.13
WP Google Maps <9.0.29 - XSS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPGMaps WP Go Maps wp-google-maps.This issue affects WP Go Maps: from n/a through <= 9.0.29.
CWE-79 Mar 27, 2024
CVE-2024-30194 7.1 HIGH EXPLOITED NUCLEI EPSS 0.19
WP Sunshine Photo Cart <3.1.1 - XSS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sunshinephotocart Sunshine Photo Cart sunshine-photo-cart.This issue affects Sunshine Photo Cart: from n/a through <= 3.1.1.
CWE-79 Mar 27, 2024
CVE-2024-25735 9.1 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
WyreStorm Apollo VX20 - Information Disclosure
An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can discover cleartext passwords via a SoftAP /device/config GET request.
CWE-319 Mar 27, 2024
CVE-2024-2863 5.3 MEDIUM EXPLOITED NUCLEI EPSS 0.57
LG LED Assistant - Thumbnail Path Traversal File Upload
This vulnerability allows remote attackers to traverse paths via file upload on the affected LG LED Assistant.
CWE-22 Mar 25, 2024
CVE-2024-2862 9.1 CRITICAL EXPLOITED NUCLEI EPSS 0.75
LG LED Assistant - Unauthenticated Password Reset
This vulnerability allows remote attackers to reset the password of anonymous users without authorization on the affected LG LED Assistant.
CWE-287 Mar 25, 2024
CVE-2024-29059 7.5 HIGH KEV 1 PoC Analysis NUCLEI EPSS 0.94
.NET Framework - Leaking ObjRefs via HTTP .NET Remoting
.NET Framework Information Disclosure Vulnerability
CWE-209 Mar 23, 2024
CVE-2024-29272 6.5 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.89
VvvebJs < 1.7.5 - Arbitrary File Upload
Arbitrary File Upload vulnerability in VvvebJs before version 1.7.5, allows unauthenticated remote attackers to execute arbitrary code and obtain sensitive information via the sanitizeFileName parameter in save.php.
CWE-434 Mar 22, 2024
CVE-2024-27956 9.9 CRITICAL EXPLOITED 19 PoCs Analysis NUCLEI EPSS 0.94
WordPress Automatic Plugin <= 3.92.0 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Automatic allows SQL Injection.This issue affects Automatic: from n/a through 3.92.0.
CWE-89 Mar 21, 2024
CVE-2024-2053 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.41
Articatech Artica Proxy - Path Traversal
The Artica Proxy administrative web application will deserialize arbitrary PHP objects supplied by unauthenticated users and subsequently enable code execution as the "www-data" user. This issue was demonstrated on version 4.50 of the The Artica-Proxy administrative web application attempts to prevent local file inclusion. These protections can be bypassed and arbitrary file requests supplied by unauthenticated users will be returned according to the privileges of the "www-data" user.
CWE-23 Mar 21, 2024
CVE-2024-27292 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Docassemble - Local File Inclusion
Docassemble is an expert system for guided interviews and document assembly. The vulnerability allows attackers to gain unauthorized access to information on the system through URL manipulation. It affects versions 1.4.53 to 1.4.96. The vulnerability has been patched in version 1.4.97 of the master branch.
CWE-706 Mar 21, 2024
CVE-2024-29138 7.1 HIGH EXPLOITED NUCLEI EPSS 0.12
WordPress Restrict User Access <= 2.5 - Cross-Site Scripting
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joachim Jensen Restrict User Access – Membership Plugin with Force restrict-user-access.This issue affects Restrict User Access – Membership Plugin with Force: from n/a through <= 2.5.
CWE-79 Mar 19, 2024
CVE-2024-29137 7.1 HIGH EXPLOITED NUCLEI EPSS 0.17
WordPress Tourfic Plugin <= 2.11.7 - Cross-Site Scripting
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themefic Tourfic tourfic.This issue affects Tourfic: from n/a through <= 2.11.7.
CWE-79 Mar 19, 2024
CVE-2024-28734 6.1 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.11
Coda v.2024Q1 - Cross-Site Scripting
Cross Site Scripting vulnerability in Unit4 Financials by Coda prior to 2023Q4 allows a remote attacker to run arbitrary code via a crafted GET request using the cols parameter.
CWE-79 Mar 19, 2024
CVE-2024-2621 6.3 MEDIUM NUCLEI EPSS 0.15
Fujian Kelixin Communication - Command Injection
A vulnerability was found in Fujian Kelixin Communication Command and Dispatch Platform up to 20240318 and classified as critical. Affected by this issue is some unknown functionality of the file api/client/user/pwd_update.php. The manipulation of the argument uuid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-257198 is the identifier assigned to this vulnerability.
CWE-89 Mar 19, 2024
CVE-2024-20767 7.4 HIGH KEV 7 PoCs Analysis NUCLEI EPSS 0.94
CVE-2024-20767 - Adobe Coldfusion Arbitrary File Read
ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could result in arbitrary file system read. An attacker could leverage this vulnerability to access or modify restricted files. Exploitation of this issue does not require user interaction. Exploitation of this issue requires the admin panel be exposed to the internet.
CWE-284 Mar 18, 2024
CVE-2024-28255 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
OpenMetadata - Authentication Bypass
OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. The `JwtFilter` handles the API authentication by requiring and verifying JWT tokens. When a new request comes in, the request's path is checked against this list. When the request's path contains any of the excluded endpoints the filter returns without validating the JWT. Unfortunately, an attacker may use Path Parameters to make any path contain any arbitrary strings. For example, a request to `GET /api/v1;v1%2fusers%2flogin/events/subscriptions/validation/condition/111` will match the excluded endpoint condition and therefore will be processed with no JWT validation allowing an attacker to bypass the authentication mechanism and reach any arbitrary endpoint, including the ones listed above that lead to arbitrary SpEL expression injection. This bypass will not work when the endpoint uses the `SecurityContext.getUserPrincipal()` since it will return `null` and will throw an NPE. This issue may lead to authentication bypass and has been addressed in version 1.2.4. Users are advised to upgrade. There are no known workarounds for this vulnerability. This issue is also tracked as `GHSL-2023-237`.
CWE-287 Mar 15, 2024