Vulnerabilities with Nuclei Scanner Templates

Updated 11m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,682 CVEs tracked 53,700 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,389 vendors 43,933 researchers
4,077 results Clear all
CVE-2021-27877 8.2 HIGH KEV SSVC ACTIVE RANSOMWARE NUCLEI EPSS 0.46
Veritas Backup Exec <21.2 - Privilege Escalation
An issue was discovered in Veritas Backup Exec before 21.2. It supports multiple authentication schemes: SHA authentication is one of these. This authentication scheme is no longer used in current versions of the product, but hadn't yet been disabled. An attacker could remotely exploit this scheme to gain unauthorized access to an Agent and execute privileged commands.
Mar 01, 2021
CVE-2021-3122 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.90
NCR Command Center Agent - OS Command Injection
CMCAgent in NCR Command Center Agent 16.3 on Aloha POS/BOH servers permits the submission of a runCommand parameter (within an XML document sent to port 8089) that enables the remote, unauthenticated execution of an arbitrary command as SYSTEM, as exploited in the wild in 2020 and/or 2021. NOTE: the vendor's position is that exploitation occurs only on devices with a certain "misconfiguration."
CWE-78 Feb 07, 2021
CVE-2021-4462 9.8 CRITICAL EXPLOITED SSVC PoC 1 PoC Analysis NUCLEI EPSS 0.18
Skittles Employee Records System - Unrestricted File Upload
Employee Records System version 1.0 contains an unrestricted file upload vulnerability that allows a remote unauthenticated attacker to upload arbitrary files via the uploadID.php endpoint; uploaded files can be executed because the application does not perform proper server-side validation. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-06 UTC.
CWE-434 Nov 10, 2025
CVE-2021-41691 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.03
Os4ed Opensis - SQL Injection
A SQL injection vulnerability exists in OS4Ed Open Source Information System Community v8.0 via the "student_id" and "TRANSFER{SCHOOL]" parameters in POST request sent to /TransferredOutModal.php.
CWE-89 Jun 24, 2025
CVE-2021-4449 9.8 CRITICAL EXPLOITED 1 Writeup NUCLEI EPSS 0.81
Digitalzoomstudio Zoomsounds < 5.96 - Unrestricted File Upload
The ZoomSounds plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'savepng.php' file in versions up to, and including, 5.96. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. CVE-2021-4457 is a duplicate of this.
CWE-434 Oct 16, 2024
CVE-2021-4448 7.3 HIGH EXPLOITED NUCLEI EPSS 0.49
Kaswara < 3.0.1 - Missing Authorization
The Kaswara Modern VC Addons plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 3.0.1 due to insufficient capability checking on various AJAX actions. This makes it possible for unauthenticated attackers to perform a wide variety of unauthorized actions such as importing data, uploading arbitrary files, deleting arbitrary files, and more.
CWE-862 Oct 16, 2024
CVE-2021-4436 9.8 CRITICAL EXPLOITED SSVC PoC RANSOMWARE NUCLEI EPSS 0.77
Wp3dprinting 3dprint Lite < 1.9.1.5 - Unrestricted File Upload
The 3DPrint Lite WordPress plugin before 1.9.1.5 does not have any authorisation and does not check the uploaded file in its p3dlite_handle_upload AJAX action , allowing unauthenticated users to upload arbitrary file to the web server. However, there is a .htaccess, preventing the file to be accessed on Web servers such as Apache.
CWE-434 Feb 05, 2024
CVE-2021-45811 6.5 MEDIUM SSVC PoC NUCLEI EPSS 0.53
osTicket <1.15.x - SQL Injection
A SQL injection vulnerability in the "Search" functionality of "tickets.php" page in osTicket 1.15.x allows authenticated attackers to execute arbitrary SQL commands via the "keywords" and "topic_id" URL parameters combination.
CWE-89 Sep 08, 2023
CVE-2021-36646 6.1 MEDIUM SSVC PoC NUCLEI EPSS 0.01
Kodcloud Kodexplorer - XSS
A Cross Site Scrtpting (XSS) vulnerability in KodExplorer 4.45 allows remote attackers to run arbitrary code via /index.php page.
CWE-79 Sep 06, 2023
CVE-2021-36580 6.1 MEDIUM SSVC PoC NUCLEI EPSS 0.10
IceWarp MailServer <13.0.1.2 - Open Redirect
Open Redirect vulnerability exists in IceWarp MailServer IceWarp Server Deep Castle 2 Update 1 (13.0.1.2) via the referer parameter.
CWE-601 Jul 27, 2023
CVE-2021-30203 6.1 MEDIUM SSVC PoC NUCLEI EPSS 0.01
dzzoffice 2.02.1_SC_UTF8 - XSS
A reflected cross-site scripting (XSS) vulnerability in the zero parameter of dzzoffice 2.02.1_SC_UTF8 allows attackers to execute arbitrary web scripts or HTML.
CWE-79 Jun 27, 2023
CVE-2021-4380 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.80
Pinterest Automatic <1.14.3 - Auth Bypass
The Pinterest Automatic plugin for WordPress is vulnerable to authorization bypass due to missing capability checks on the 'wp_pinterest_automatic_parse_request' function and the 'process_form.php' script in versions up to, and including, 1.14.3. This makes it possible for unauthenticated attackers to update arbitrary options on a site that can be used to create new administrative user accounts or redirect unsuspecting site visitors.
CWE-284 Jun 07, 2023
CVE-2021-4374 9.1 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.75
WordPress Automatic <3.53.2 - Info Disclosure
The WordPress Automatic Plugin for WordPress is vulnerable to arbitrary options updates in versions up to, and including, 3.53.2. This is due to missing authorization and option validation in the process_form.php file. This makes it possible for unauthenticated attackers to arbitrarily update the settings of a vulnerable site and ultimately compromise the entire site.
CWE-862 Jun 07, 2023
CVE-2021-32853 6.1 MEDIUM SSVC PoC 1 Writeup NUCLEI EPSS 0.85
Erxes <0.22.3 - XSS
Erxes, an experience operating system (XOS) with a set of plugins, is vulnerable to cross-site scripting in versions 0.22.3 and prior. This results in client-side code execution. The victim must follow a malicious link or be redirected there from malicious web site. There are no known patches.
CWE-79 Feb 20, 2023
CVE-2021-37305 7.5 HIGH EXPLOITED SSVC PoC NUCLEI EPSS 0.57
Jeecg < 2.4.5 - Incorrect Permission Assignment
An Insecure Permissions issue in jeecg-boot 2.4.5 and earlier allows remote attackers to gain escalated privilege and view sensitive information via api uri: /sys/user/querySysUser?username=admin.
CWE-732 Feb 03, 2023
CVE-2021-37304 7.5 HIGH NUCLEI EPSS 0.45
Jeecg < 2.4.5 - Incorrect Permission Assignment
An Insecure Permissions issue in jeecg-boot 2.4.5 allows unauthenticated remote attackers to gain escalated privilege and view sensitive information via the httptrace interface.
CWE-732 Feb 03, 2023
CVE-2021-30134 6.1 MEDIUM SSVC PoC NUCLEI EPSS 0.03
php-mod/curl <2.3.2 - XSS
php-mod/curl (a wrapper of the PHP cURL extension) before 2.3.2 allows XSS via the post_file_path_upload.php key parameter and the POST data to post_multidimensional.php.
CWE-79 Dec 26, 2022
CVE-2021-45467 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.88
Webpanel < 0.9.8.1107 - Missing Authorization
In CWP (aka Control Web Panel or CentOS Web Panel) before 0.9.8.1107, an unauthenticated attacker can use %00 bytes to cause /user/loader.php to register an arbitrary API key, as demonstrated by a /user/loader.php?api=1&scripts= .%00./.%00./api/account_new_create&acc=guadaapi URI. Any number of %00 instances can be used, e.g., .%00%00%00./.%00%00%00./api/account_new_create could also be used for the scripts parameter.
CWE-862 Dec 26, 2022
CVE-2021-40272 6.1 MEDIUM SSVC PoC 1 Writeup NUCLEI EPSS 0.05
OP5 Monitor <8.3.3 - XSS
OP5 Monitor 8.3.1, 8.3.2, and OP5 8.3.3 are vulnerable to Cross Site Scripting (XSS).
CWE-79 Nov 14, 2022
CVE-2021-40661 7.5 HIGH SSVC PoC NUCLEI EPSS 0.87
IND780 Advanced Weighing Terminals <8.0.07,7.2.10 - Path Traversal
A remote, unauthenticated, directory traversal vulnerability was identified within the web interface used by IND780 Advanced Weighing Terminals Build 8.0.07 March 19, 2018 (SS Label 'IND780_8.0.07'), Version 7.2.10 June 18, 2012 (SS Label 'IND780_7.2.10'). It was possible to traverse the folders of the affected host by providing a traversal path to the 'webpage' parameter in AutoCE.ini This could allow a remote unauthenticated adversary to access additional files on the affected system. This could also allow the adversary to perform further enumeration against the affected host to identify the versions of the systems in use, in order to launch further attacks in future.
CWE-22 Oct 31, 2022