Vulnerabilities with Nuclei Scanner Templates
Updated 11m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2021-27877
8.2
HIGH
KEV
SSVC ACTIVE
RANSOMWARE
NUCLEI
EPSS 0.46
Veritas Backup Exec <21.2 - Privilege Escalation
An issue was discovered in Veritas Backup Exec before 21.2. It supports multiple authentication schemes: SHA authentication is one of these. This authentication scheme is no longer used in current versions of the product, but hadn't yet been disabled. An attacker could remotely exploit this scheme to gain unauthorized access to an Agent and execute privileged commands.
Mar 01, 2021
CVE-2021-3122
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.90
NCR Command Center Agent - OS Command Injection
CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."
CWE-78
Feb 07, 2021
CVE-2021-4462
9.8
CRITICAL
EXPLOITED
SSVC PoC
1 PoC
Analysis
NUCLEI
EPSS 0.18
Skittles Employee Records System - Unrestricted File Upload
Employee Records System version 1.0 contains an unrestricted file upload vulnerability that allows a remote unauthenticated attacker to upload arbitrary files via the uploadID.php endpoint; uploaded files can be executed because the application does not perform proper server-side validation. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-06 UTC.
CWE-434
Nov 10, 2025
CVE-2021-41691
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.03
Os4ed Opensis - SQL Injection
A SQL injection vulnerability exists in OS4Ed Open Source Information System Community v8.0 via the "student_id" and "TRANSFER{SCHOOL]" parameters in POST request sent to /TransferredOutModal.php.
CWE-89
Jun 24, 2025
CVE-2021-4449
9.8
CRITICAL
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.81
Digitalzoomstudio Zoomsounds < 5.96 - Unrestricted File Upload
The ZoomSounds plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'savepng.php' file in versions up to, and including, 5.96. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. CVE-2021-4457 is a duplicate of this.
CWE-434
Oct 16, 2024
CVE-2021-4448
7.3
HIGH
EXPLOITED
NUCLEI
EPSS 0.49
Kaswara < 3.0.1 - Missing Authorization
The Kaswara Modern VC Addons plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 3.0.1 due to insufficient capability checking on various AJAX actions. This makes it possible for unauthenticated attackers to perform a wide variety of unauthorized actions such as importing data, uploading arbitrary files, deleting arbitrary files, and more.
CWE-862
Oct 16, 2024
CVE-2021-4436
9.8
CRITICAL
EXPLOITED
SSVC PoC
RANSOMWARE
NUCLEI
EPSS 0.77
Wp3dprinting 3dprint Lite < 1.9.1.5 - Unrestricted File Upload
The 3DPrint Lite WordPress plugin before 1.9.1.5 does not have any authorisation and does not check the uploaded file in its p3dlite_handle_upload AJAX action , allowing unauthenticated users to upload arbitrary file to the web server. However, there is a .htaccess, preventing the file to be accessed on Web servers such as Apache.
CWE-434
Feb 05, 2024
CVE-2021-45811
6.5
MEDIUM
SSVC PoC
NUCLEI
EPSS 0.53
osTicket <1.15.x - SQL Injection
A SQL injection vulnerability in the "Search" functionality of "tickets.php" page in osTicket 1.15.x allows authenticated attackers to execute arbitrary SQL commands via the "keywords" and "topic_id" URL parameters combination.
CWE-89
Sep 08, 2023
CVE-2021-36646
6.1
MEDIUM
SSVC PoC
NUCLEI
EPSS 0.01
Kodcloud Kodexplorer - XSS
A Cross Site Scrtpting (XSS) vulnerability in KodExplorer 4.45 allows remote attackers to run arbitrary code via /index.php page.
CWE-79
Sep 06, 2023
CVE-2021-36580
6.1
MEDIUM
SSVC PoC
NUCLEI
EPSS 0.10
IceWarp MailServer <13.0.1.2 - Open Redirect
Open Redirect vulnerability exists in IceWarp MailServer IceWarp Server Deep Castle 2 Update 1 (13.0.1.2) via the referer parameter.
CWE-601
Jul 27, 2023
CVE-2021-30203
6.1
MEDIUM
SSVC PoC
NUCLEI
EPSS 0.01
dzzoffice 2.02.1_SC_UTF8 - XSS
A reflected cross-site scripting (XSS) vulnerability in the zero parameter of dzzoffice 2.02.1_SC_UTF8 allows attackers to execute arbitrary web scripts or HTML.
CWE-79
Jun 27, 2023
CVE-2021-4380
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.80
Pinterest Automatic <1.14.3 - Auth Bypass
The Pinterest Automatic plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the 'wp_pinterest_automatic_parse_request' function and the 'process_form.php' script in versions up to, and including, 1.14.3. This makes it possible for unauthenticated attackers to update arbitrary options on a site that can be used to create new administrative user accounts or redirect unsuspecting site visitors.
CWE-284
Jun 07, 2023
CVE-2021-4374
9.1
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.75
WordPress Automatic <3.53.2 - Info Disclosure
The WordPress Automatic Plugin for WordPress is vulnerable to arbitrary options updates in versions up to, and including, 3.53.2. This is due to missing authorization and option validation in the process_form.php file. This makes it possible for unauthenticated attackers to arbitrarily update the settings of a vulnerable site and ultimately compromise the entire site.
CWE-862
Jun 07, 2023
CVE-2021-32853
6.1
MEDIUM
SSVC PoC
1 Writeup
NUCLEI
EPSS 0.85
Erxes <0.22.3 - XSS
Erxes, an experience operating system (XOS) with a set of plugins, is vulnerable to cross-site scripting in versions 0.22.3 and prior. This results in client-side code execution. The victim must follow a malicious link or be redirected there from malicious web site. There are no known patches.
CWE-79
Feb 20, 2023
CVE-2021-37305
7.5
HIGH
EXPLOITED
SSVC PoC
NUCLEI
EPSS 0.57
Jeecg < 2.4.5 - Incorrect Permission Assignment
An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: /sys/user/querySysUser?username=admin.
CWE-732
Feb 03, 2023
CVE-2021-37304
7.5
HIGH
NUCLEI
EPSS 0.45
Jeecg < 2.4.5 - Incorrect Permission Assignment
An Insecure Permissions issue in jeecg-boot 2.4.5 allows unauthenticated remote attackers to gain escalated privilege and view sensitive information via the httptrace interface.
CWE-732
Feb 03, 2023
CVE-2021-30134
6.1
MEDIUM
SSVC PoC
NUCLEI
EPSS 0.03
php-mod/curl <2.3.2 - XSS
php-mod/curl (a wrapper of the PHP cURL extension) before 2.3.2 allows XSS via the post_file_path_upload.php key parameter and the POST data to post_multidimensional.php.
CWE-79
Dec 26, 2022
CVE-2021-45467
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.88
Webpanel < 0.9.8.1107 - Missing Authorization
In CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1107, an unauthenticated attacker can use %00 bytes to cause /user/loader.php to register an arbitrary API key, as demonstrated by a /user/loader.php?api=1&scripts= .%00./.%00./api/account_new_create&acc=guadaapi URI. Any number of %00 instances can be used, e.g., .%00%00%00./.%00%00%00./api/account_new_create could also be used for the scripts parameter.
CWE-862
Dec 26, 2022
CVE-2021-40272
6.1
MEDIUM
SSVC PoC
1 Writeup
NUCLEI
EPSS 0.05
OP5 Monitor <8.3.3 - XSS
OP5 Monitor 8.3.1, 8.3.2, and OP5 8.3.3 are vulnerable to Cross Site Scripting (XSS).
CWE-79
Nov 14, 2022
CVE-2021-40661
7.5
HIGH
SSVC PoC
NUCLEI
EPSS 0.87
IND780 Advanced Weighing Terminals <8.0.07,7.2.10 - Path Traversal
A remote, unauthenticated, directory traversal vulnerability was identified within the web interface used by IND780 Advanced Weighing Terminals Build 8.0.07 March 19, 2018 (SS Label 'IND780_8.0.07'), Version 7.2.10 June 18, 2012 (SS Label 'IND780_7.2.10'). It was possible to traverse the folders of the affected host by providing a traversal path to the 'webpage' parameter in AutoCE.ini This could allow a remote unauthenticated adversary to access additional files on the affected system. This could also allow the adversary to perform further enumeration against the affected host to identify the versions of the systems in use, in order to launch further attacks in future.
CWE-22
Oct 31, 2022