Vulnerabilities with Nuclei Scanner Templates

Updated 11m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,682 CVEs tracked 53,700 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,389 vendors 43,933 researchers
4,077 results Clear all
CVE-2022-23134 3.7 LOW KEV SSVC ACTIVE 1 PoC Analysis NUCLEI EPSS 0.93
Zabbix < 5.4.8 - Improper Access Control
After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
CWE-284 Jan 13, 2022
CVE-2022-23131 9.1 CRITICAL KEV SSVC ACTIVE 22 PoCs Analysis NUCLEI EPSS 0.94
Zabbix < 5.4.8 - Authentication Bypass by Spoofing
In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).
CWE-290 Jan 13, 2022
CVE-2022-0087 6.1 MEDIUM NUCLEI EPSS 0.56
Keystone < 1.0.2 - XSS
keystone is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-79 Jan 12, 2022
CVE-2022-21661 8.0 HIGH EXPLOITED SSVC PoC 15 PoCs Analysis NUCLEI EPSS 0.91
Wordpress < 3.7.37 - SQL Injection
WordPress is a free and open-source content management system written in PHP and paired with a MariaDB database. Due to improper sanitization in WP_Query, there can be cases where SQL injection is possible through plugins or themes that use it in a certain way. This has been patched in WordPress version 5.8.3. Older affected versions are also fixed via security release, that go back till 3.7.37. We strongly recommend that you keep auto-updates enabled. There are no known workarounds for this vulnerability.
CWE-89 Jan 06, 2022
CVE-2022-42475 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 9 PoCs Analysis NUCLEI EPSS 0.94
Fortinet Fortios < 5.0.14 - Buffer Overflow
A heap-based buffer overflow vulnerability [CWE-122] in FortiOS SSL-VPN 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.10, 6.2.0 through 6.2.11, 6.0.15 and earlier and FortiProxy SSL-VPN 7.2.0 through 7.2.1, 7.0.7 and earlier may allow a remote unauthenticated attacker to execute arbitrary code or commands via specifically crafted requests.
CWE-197 Jan 02, 2023
CVE-2022-42889 9.8 CRITICAL EXPLOITED 62 PoCs Analysis NUCLEI EPSS 0.94
Apache Commons Text < 1.10.0 - Code Injection
Apache Commons Text performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.text.lookup.StringLookup that performs the interpolation. Starting with version 1.5 and continuing through 1.9, the set of default Lookup instances included interpolators that could result in arbitrary code execution or contact with remote servers. These lookups are: - "script" - execute expressions using the JVM script execution engine (javax.script) - "dns" - resolve dns records - "url" - load values from urls, including from remote servers Applications using the interpolation defaults in the affected versions may be vulnerable to remote code execution or unintentional contact with remote servers if untrusted configuration values are used. Users are recommended to upgrade to Apache Commons Text 1.10.0, which disables the problematic interpolators by default.
CWE-94 Oct 13, 2022
CVE-2022-34265 9.8 CRITICAL 6 PoCs Analysis NUCLEI EPSS 0.93
Django < 3.2.14 - SQL Injection
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
CWE-89 Jul 04, 2022
CVE-2021-3152 5.3 MEDIUM NUCLEI EPSS 0.45
Home-assistant < 2021.1.3 - Path Traversal
Home Assistant before 2021.1.3 does not have a protection layer that can help to prevent directory-traversal attacks against custom integrations. NOTE: the vendor's perspective is that the vulnerability itself is in custom integrations written by third parties, not in Home Assistant; however, Home Assistant does have a security update that is worthwhile in addressing this situation
CWE-22 Jan 26, 2021
CVE-2021-45328 6.1 MEDIUM NUCLEI EPSS 0.01
Gitea < 1.4.3 - Open Redirect
Gitea before 1.4.3 is affected by URL Redirection to Untrusted Site ('Open Redirect') via internal URLs.
CWE-601 Feb 08, 2022
CVE-2021-26947 6.1 MEDIUM NUCLEI EPSS 0.55
Odoo < 15.0 - XSS
Cross-site scripting (XSS) issue Odoo Community 15.0 and earlier and Odoo Enterprise 15.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim, via a crafted link.
CWE-79 Apr 25, 2023
CVE-2021-44228 10.0 CRITICAL KEV SSVC ACTIVE RANSOMWARE 453 PoCs Analysis NUCLEI EPSS 0.94
Log4Shell HTTP Header Injection
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
CWE-502 Dec 10, 2021
CVE-2021-22205 10.0 CRITICAL KEV SSVC ACTIVE RANSOMWARE 34 PoCs Analysis NUCLEI EPSS 0.94
Gitlab < 13.8.8 - Code Injection
An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files that were passed to a file parser which resulted in a remote command execution.
CWE-94 Apr 23, 2021
CVE-2021-46371 7.5 HIGH NUCLEI EPSS 0.26
antd-admin <5.5.0 - Info Disclosure
antd-admin 5.5.0 is affected by an incorrect access control vulnerability. Unauthorized access to some interfaces in the foreground leads to leakage of sensitive information.
CWE-306 Feb 14, 2022
CVE-2021-23337 7.2 HIGH 1 PoC Analysis NUCLEI EPSS 0.04
Lodash <4.17.21 - Command Injection
Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
CWE-94 Feb 15, 2021
CVE-2021-30047 7.5 HIGH SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.31
VSFTPD 3.0.3 - DoS
VSFTPD 3.0.3 allows attackers to cause a denial of service due to limited number of connections allowed.
Aug 22, 2023
CVE-2021-44521 9.1 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.91
Apache Cassandra < 3.0.26 - Code Injection
When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create user defined functions in the cluster to be able to exploit this. Note that this configuration is documented as unsafe, and will continue to be considered unsafe after this CVE.
CWE-94 Feb 11, 2022
CVE-2021-40524 7.5 HIGH 1 Writeup NUCLEI EPSS 0.30
Pure-FTPd <1.0.50 - DoS
In Pure-FTPd before 1.0.50, an incorrect max_filesize quota mechanism in the server allows attackers to upload files of unbounded size, which may lead to denial of service or a server hang. This occurs because a certain greater-than-zero test does not anticipate an initial -1 value. (Versions 1.0.23 through 1.0.49 are affected.)
CWE-434 Sep 05, 2021
CVE-2021-35394 9.8 CRITICAL KEV SSVC ACTIVE NUCLEI EPSS 0.94
Realtek Jungle SDK <3.4.14B - RCE
Realtek Jungle SDK version v2.x up to v3.4.14B provides a diagnostic tool called 'MP Daemon' that is usually compiled as 'UDPServer' binary. The binary is affected by multiple memory corruption vulnerabilities and an arbitrary command injection vulnerability that can be exploited by remote unauthenticated attackers.
CWE-78 Aug 16, 2021
CVE-2021-36754 7.5 HIGH EXPLOITED NUCLEI EPSS 0.81
Powerdns Authoritative Server < 4.5.1 - Memory Corruption
PowerDNS Authoritative Server 4.5.0 before 4.5.1 allows anybody to crash the process by sending a specific query (QTYPE 65535) that causes an out-of-bounds exception.
CWE-119 Jul 30, 2021
CVE-2021-35211 9.0 CRITICAL KEV SSVC ACTIVE RANSOMWARE 4 PoCs Analysis NUCLEI EPSS 0.94
SolarWinds Serv-U <15.2.3 HF2 - RCE
Microsoft discovered a remote code execution (RCE) vulnerability in the SolarWinds Serv-U product utilizing a Remote Memory Escape Vulnerability. If exploited, a threat actor may be able to gain privileged access to the machine hosting Serv-U Only. SolarWinds Serv-U Managed File Transfer and Serv-U Secure FTP for Windows before 15.2.3 HF2 are affected by this vulnerability.
CWE-787 Jul 14, 2021