Vulnerabilities with Nuclei Scanner Templates

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,077 results Clear all
CVE-2024-28253 9.4 CRITICAL EXPLOITED 1 Writeup NUCLEI EPSS 0.92
OpenMetaData - SpEL Injection in PUT /api/v1/policies
OpenMetadata is a unified platform for discovery, observability, and governance powered by a central metadata repository, in-depth lineage, and seamless team collaboration. `CompiledRule::validateExpression` is also called from `PolicyRepository.prepare`. `prepare()` is called from `EntityRepository.prepareInternal()` which, in turn, gets called from `EntityResource.createOrUpdate()`. Note that even though there is an authorization check (`authorizer.authorize()`), it gets called after `prepareInternal()` gets called and therefore after the SpEL expression has been evaluated. In order to reach this method, an attacker can send a PUT request to `/api/v1/policies` which gets handled by `PolicyResource.createOrUpdate()`. This vulnerability was discovered with the help of CodeQL's Expression language injection (Spring) query and is also tracked as `GHSL-2023-252`. This issue may lead to Remote Code Execution and has been addressed in version 1.3.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-94 Mar 15, 2024
CVE-2024-1751 8.8 HIGH NUCLEI EPSS 0.35
Themeum Tutor Lms < 2.6.2 - SQL Injection
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to time-based SQL Injection via the question_id parameter in all versions up to, and including, 2.6.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber/student access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Mar 13, 2024
CVE-2024-1380 5.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.86
Relevanssi < 4.22.1 - Missing Authorization
The Relevanssi – A Better Search plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the relevanssi_export_log_check() function in all versions up to, and including, 4.22.0 (Free) and 2.25.0 (Premium). This makes it possible for unauthenticated attackers to export the query log data. The vendor has indicated that they may look into adding a capability check for proper authorization control, however, this vulnerability is theoretically patched as is.
CWE-862 Mar 13, 2024
CVE-2024-28623 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.00
RiteCMS 3.0.0 - Cross-site Scripting
RiteCMS v3.0.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component main_menu/edit_section.
CWE-79 Mar 13, 2024
CVE-2024-2330 6.3 MEDIUM EXPLOITED 1 Writeup NUCLEI EPSS 0.93
NS-ASG Application Security Gateway 6.3 - Sql Injection
A vulnerability was found in Netentsec NS-ASG Application Security Gateway 6.3. It has been classified as critical. This affects an unknown part of the file /protocol/index.php. The manipulation of the argument IPAddr leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-256281 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
CWE-89 Mar 09, 2024
CVE-2024-27564 5.8 MEDIUM EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.92
ChatGPT个人专用版 - Server Side Request Forgery
pictureproxy.php in the dirk1983 mm1.ltd source code f9f4bbc allows SSRF via the url parameter. NOTE: the references section has an archived copy of pictureproxy.php from its original GitHub location, but the repository name might later change because it is misleading.
CWE-918 Mar 05, 2024
CVE-2024-27718 7.8 HIGH 1 Writeup NUCLEI EPSS 0.06
Smart s200 Management Platform v.S200 - SQL Injection
SQL Injection vulnerability in Baizhuo Network Smart s200 Management Platform v.S200 allows a local attacker to obtain sensitive information and escalate privileges via the /importexport.php component.
CWE-89 Mar 05, 2024
CVE-2024-27199 7.3 HIGH KEV RANSOMWARE 2 PoCs 1 Writeup Analysis NUCLEI EPSS 0.91
TeamCity < 2023.11.4 - Authentication Bypass
In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible
CWE-22 Mar 04, 2024
CVE-2024-27198 9.8 CRITICAL KEV RANSOMWARE 19 PoCs Analysis NUCLEI EPSS 0.93
TeamCity < 2023.11.4 - Authentication Bypass
In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible
CWE-288 Mar 04, 2024
CVE-2024-27497 8.8 HIGH EXPLOITED NUCLEI EPSS 0.82
Linksys E2000 1.0.06 position.js Improper Authentication
Linksys E2000 Ver.1.0.06 build 1 is vulnerable to authentication bypass via the position.js file.
CWE-284 Mar 01, 2024
CVE-2024-25723 8.8 HIGH 1 PoC Analysis NUCLEI EPSS 0.87
ZenML ZenML Server - Improper Authentication
ZenML Server in the ZenML machine learning package before 0.46.7 for Python allows remote privilege escalation because the /api/v1/users/{user_name_or_id}/activate REST API endpoint allows access on the basis of a valid username along with a new password in the request body. These are also patched versions: 0.44.4, 0.43.1, and 0.42.2.
CWE-284 Feb 27, 2024
CVE-2024-1698 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.94
Wpdeveloper Notificationx < 2.8.3 - SQL Injection
The NotificationX – Best FOMO, Social Proof, WooCommerce Sales Popup & Notification Bar Plugin With Elementor plugin for WordPress is vulnerable to SQL Injection via the 'type' parameter in all versions up to, and including, 2.8.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Feb 27, 2024
CVE-2024-1709 10.0 CRITICAL KEV RANSOMWARE 9 PoCs Analysis NUCLEI EPSS 0.94
Connectwise Screenconnect < 23.9.8 - Authentication Bypass
ConnectWise ScreenConnect 23.9.7 and prior are affected by an Authentication Bypass Using an Alternate Path or Channel vulnerability, which may allow an attacker direct access to confidential information or critical systems.
CWE-288 Feb 21, 2024
CVE-2024-24763 4.3 MEDIUM NUCLEI EPSS 0.31
JumpServer < 3.10.0 - Open Redirect
JumpServer is an open source bastion host and an operation and maintenance security audit system. Prior to version 3.10.0, attackers can exploit this vulnerability to construct malicious links, leading users to click on them, thereby facilitating phishing attacks or cross-site scripting attacks. Version 3.10.0 contains a patch for this issue. No known workarounds are available.
CWE-601 Feb 20, 2024
CVE-2024-25608 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.11
Liferay Portal - Open Redirect
HtmlUtil.escapeRedirect in Liferay Portal 7.2.0 through 7.4.3.18, and older unsupported versions, and Liferay DXP 7.4 before update 19, 7.3 before update 4, 7.2 before fix pack 19, and older unsupported versions can be circumvented by using the 'REPLACEMENT CHARACTER' (U+FFFD), which allows remote attackers to redirect users to arbitrary external URLs via the (1) 'redirect` parameter (2) `FORWARD_URL` parameter, (3) `noSuchEntryRedirect` parameter, and (4) others parameters that rely on HtmlUtil.escapeRedirect.
CWE-601 Feb 20, 2024
CVE-2024-1512 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.93
Stylemixthemes Masterstudy Lms < 3.2.5 - SQL Injection
The MasterStudy LMS WordPress Plugin – for Online Courses and Education plugin for WordPress is vulnerable to union based SQL Injection via the 'user' parameter of the /lms/stm-lms/order/items REST route in all versions up to, and including, 3.2.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
CWE-89 Feb 17, 2024
CVE-2024-22024 8.3 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Ivanti Connect Secure - XXE
An XML external entity or XXE vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x), Ivanti Policy Secure (9.x, 22.x) and ZTA gateways which allows an attacker to access certain restricted resources without authentication.
CWE-611 Feb 13, 2024
CVE-2024-24131 6.1 MEDIUM NUCLEI EPSS 0.13
SuperWebMailer 9.31.0.01799 - Cross-Site Scripting
SuperWebMailer v9.31.0.01799 was discovered to contain a reflected cross-site scripting (XSS) vulenrability via the component api.php.
CWE-79 Feb 07, 2024
CVE-2024-23917 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.73
JetBrains TeamCity > 2023.11.3 - Authentication Bypass
In JetBrains TeamCity before 2023.11.3 authentication bypass leading to RCE was possible
CWE-306 Feb 06, 2024
CVE-2024-24112 9.8 CRITICAL NUCLEI EPSS 0.82
Exrick XMall - SQL Injection
xmall v1.1 was discovered to contain a SQL injection vulnerability via the orderDir parameter.
CWE-89 Feb 06, 2024