Vulnerabilities with Nuclei Scanner Templates

Updated 5h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,077 results Clear all
CVE-2024-21485 6.5 MEDIUM 1 Writeup NUCLEI EPSS 0.01
Plotly Dash < 2.13.0 - XSS
Versions of the package dash-core-components before 2.13.0; versions of the package dash-core-components before 2.0.0; versions of the package dash before 2.15.0; versions of the package dash-html-components before 2.0.0; versions of the package dash-html-components before 2.0.16 are vulnerable to Cross-site Scripting (XSS) when the href of the a tag is controlled by an adversary. An authenticated attacker who stores a view that exploits this vulnerability could steal the data that's visible to another user who opens that view - not just the data already included on the page, but they could also, in theory, make additional requests and access other data accessible to this user. In some cases, they could also steal the access tokens of that user, which would allow the attacker to act as that user, including viewing other apps and resources hosted on the same server. **Note:** This is only exploitable in Dash apps that include some mechanism to store user input to be reloaded by a different user.
CWE-79 Feb 02, 2024
CVE-2024-22320 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.91
IBM Operational Decision Manager - Java Deserialization
IBM Operational Decision Manager 8.10.3 could allow a remote authenticated attacker to execute arbitrary code on the system, caused by an unsafe deserialization. By sending specially crafted request, an attacker could exploit this vulnerability to execute arbitrary code in the context of SYSTEM. IBM X-Force ID: 279146.
CWE-502 Feb 02, 2024
CVE-2024-22319 8.1 HIGH EXPLOITED NUCLEI EPSS 0.87
IBM Operational Decision Manager - JNDI Injection
IBM Operational Decision Manager 8.10.3, 8.10.4, 8.10.5.1, 8.11, 8.11.0.1, 8.11.1 and 8.12.0.1 is susceptible to remote code execution attack via JNDI injection when passing an unchecked argument to a certain API. IBM X-Force ID: 279145.
CWE-74 Feb 02, 2024
CVE-2024-22927 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.14
eyoucms v.1.6.5 - Cross-Site Scripting
Cross Site Scripting (XSS) vulnerability in the func parameter in eyoucms v.1.6.5 allows a remote attacker to run arbitrary code via crafted URL.
CWE-79 Feb 01, 2024
CVE-2024-21893 8.2 HIGH KEV RANSOMWARE 3 PoCs Analysis NUCLEI EPSS 0.94
Ivanti SAML - Server Side Request Forgery (SSRF)
A server-side request forgery vulnerability in the SAML component of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) and Ivanti Neurons for ZTA allows an attacker to access certain restricted resources without authentication.
CWE-918 Jan 31, 2024
CVE-2024-24565 5.7 MEDIUM 1 Writeup NUCLEI EPSS 0.86
CrateDB Database - Arbitrary File Read
CrateDB is a distributed SQL database that makes it simple to store and analyze massive amounts of data in real-time. There is a COPY FROM function in the CrateDB database that is used to import file data into database tables. This function has a flaw, and authenticated attackers can use the COPY FROM function to import arbitrary file content into database tables, resulting in information leakage. This vulnerability is patched in 5.3.9, 5.4.8, 5.5.4, and 5.6.1.
CWE-22 Jan 30, 2024
CVE-2024-24329 9.8 CRITICAL EXPLOITED 1 Writeup NUCLEI EPSS 0.83
TotoLink Router setPortForwardRules - Command Injection
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the enable parameter in the setPortForwardRules function.
CWE-78 Jan 30, 2024
CVE-2024-24328 9.8 CRITICAL EXPLOITED 1 Writeup NUCLEI EPSS 0.84
TotoLink Router setMacFilterRules - Command Injection
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the enable parameter in the setMacFilterRules function.
CWE-78 Jan 30, 2024
CVE-2024-23334 5.9 MEDIUM EXPLOITED RANSOMWARE 19 PoCs Analysis NUCLEI EPSS 0.93
aiohttp - Directory Traversal
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. When using aiohttp as a web server and configuring static routes, it is necessary to specify the root path for static files. Additionally, the option 'follow_symlinks' can be used to determine whether to follow symbolic links outside the static root directory. When 'follow_symlinks' is set to True, there is no validation to check if reading a file is within the root directory. This can lead to directory traversal vulnerabilities, resulting in unauthorized access to arbitrary files on the system, even when symlinks are not present. Disabling follow_symlinks and using a reverse proxy are encouraged mitigations. Version 3.9.2 fixes this issue.
CWE-22 Jan 29, 2024
CVE-2024-23055 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.04
Plone Docker - Host Header Injection
An issue in Plone Docker Official Image 5.2.13 (5221) open-source software allows for remote code execution via improper validation of input by the HOST headers.
Jan 25, 2024
CVE-2024-22729 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Netis MW5360 V1.0.1.3031 - Command Injection
NETIS SYSTEMS MW5360 V1.0.1.3031 was discovered to contain a command injection vulnerability via the password parameter on the login page.
CWE-77 Jan 25, 2024
CVE-2024-22207 5.3 MEDIUM 1 Writeup NUCLEI EPSS 0.14
Fastify Swagger-UI - Information Disclosure
fastify-swagger-ui is a Fastify plugin for serving Swagger UI. Prior to 2.1.0, the default configuration of `@fastify/swagger-ui` without `baseDir` set will lead to all files in the module's directory being exposed via http routes served by the module. The vulnerability is fixed in v2.1.0. Setting the `baseDir` option can also work around this vulnerability.
CWE-1188 Jan 15, 2024
CVE-2024-21887 9.1 CRITICAL KEV RANSOMWARE 15 PoCs Analysis NUCLEI EPSS 0.94
Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) - Command Injection
A command injection vulnerability in web components of Ivanti Connect Secure (9.x, 22.x) and Ivanti Policy Secure (9.x, 22.x) allows an authenticated administrator to send specially crafted requests and execute arbitrary commands on the appliance.
CWE-77 Jan 12, 2024
CVE-2024-21650 10.0 CRITICAL EXPLOITED 1 Writeup NUCLEI EPSS 0.93
XWiki < 4.10.20 - Remote code execution
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki is vulnerable to a remote code execution (RCE) attack through its user registration feature. This issue allows an attacker to execute arbitrary code by crafting malicious payloads in the "first name" or "last name" fields during user registration. This impacts all installations that have user registration enabled for guests. This vulnerability has been patched in XWiki 14.10.17, 15.5.3 and 15.8 RC1.
CWE-95 Jan 08, 2024
CVE-2024-21645 5.3 MEDIUM 1 Writeup NUCLEI EPSS 0.71
Pyload < 0.4.9 - Injection
pyLoad is the free and open-source Download Manager written in pure Python. A log injection vulnerability was identified in `pyload` allowing any unauthenticated actor to inject arbitrary messages into the logs gathered by `pyload`. Forged or otherwise, corrupted log files can be used to cover an attacker’s tracks or even to implicate another party in the commission of a malicious act. This vulnerability has been patched in version 0.5.0b3.dev77.
CWE-74 Jan 08, 2024
CVE-2024-21644 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.87
Pyload < 0.4.9 - Improper Access Control
pyLoad is the free and open-source Download Manager written in pure Python. Any unauthenticated user can browse to a specific URL to expose the Flask config, including the `SECRET_KEY` variable. This issue has been patched in version 0.5.0b3.dev77.
CWE-284 Jan 08, 2024
CVE-2024-21641 6.5 MEDIUM 2 Writeups NUCLEI EPSS 0.33
Flarum < 1.8.5 - Open Redirect
Flarum is open source discussion platform software. Prior to version 1.8.5, the Flarum `/logout` route includes a redirect parameter that allows any third party to redirect users from a (trusted) domain of the Flarum installation to redirect to any link. For logged-in users, the logout must be confirmed. Guests are immediately redirected. This could be used by spammers to redirect to a web address using a trusted domain of a running Flarum installation. The vulnerability has been fixed and published as flarum/core v1.8.5. As a workaround, some extensions modifying the logout route can remedy this issue if their implementation is safe.
CWE-601 Jan 05, 2024
CVE-2024-21633 7.8 HIGH 1 PoC Analysis NUCLEI EPSS 0.81
Apktool < 2.9.2 - Path Traversal
Apktool is a tool for reverse engineering Android APK files. In versions 2.9.1 and prior, Apktool infers resource files' output path according to their resource names which can be manipulated by attacker to place files at desired location on the system Apktool runs on. Affected environments are those in which an attacker may write/overwrite any file that user has write access, and either user name is known or cwd is under user folder. Commit d348c43b24a9de350ff6e5bd610545a10c1fc712 contains a patch for this issue.
CWE-22 Jan 03, 2024
CVE-2024-12873 6.1 MEDIUM NUCLEI EPSS 0.00
F1logic Custom Field Manager < 1.0 - XSS
The Custom Field Manager WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
CWE-79 May 15, 2025
CVE-2024-12734 6.1 MEDIUM NUCLEI EPSS 0.00
Niceit Advance Post Prefix < 1.1.1 - XSS
The Advance Post Prefix WordPress plugin through 1.1.1, Advance Post Prefix WordPress plugin through 1.1.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
CWE-79 May 15, 2025