Vulnerabilities with Nuclei Scanner Templates

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,649 CVEs tracked 53,649 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,377 vendors 43,908 researchers
4,077 results Clear all
CVE-2021-46419 9.1 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.88
Telesquare TLR-2855KS6 - Info Disclosure
An unauthorized file deletion vulnerability in Telesquare TLR-2855KS6 via DELETE method can allow deletion of system files and scripts.
Apr 07, 2022
CVE-2021-46418 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.63
Telesquare TLR-2855KS6 - Info Disclosure
An unauthorized file creation vulnerability in Telesquare TLR-2855KS6 via PUT method can allow creation of CGI scripts.
Apr 07, 2022
CVE-2021-46417 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Franklinfueling Colibri Firmware - Path Traversal
Insecure handling of a download function leads to disclosure of internal files due to path traversal with root privileges in Franklin Fueling Systems Colibri Controller Module 1.8.19.8580.
CWE-22 Apr 07, 2022
CVE-2021-30497 7.5 HIGH EXPLOITED NUCLEI EPSS 0.93
Ivanti Avalanche (Premise) 6.3.2 - Path Traversal
Ivanti Avalanche (Premise) 6.3.2 allows remote unauthenticated users to read arbitrary files via Absolute Path Traversal. The imageFilePath parameter processed by the /AvalancheWeb/image endpoint is not verified to be within the scope of the image folder, e.g., the attacker can obtain sensitive information via the C:/Windows/system32/config/system.sav value.
CWE-22 Apr 06, 2022
CVE-2021-44138 7.5 HIGH NUCLEI EPSS 0.82
Caucho Resin < 4.0.56 - Path Traversal
There is a Directory traversal vulnerability in Caucho Resin, as distributed in Resin 4.0.52 - 4.0.56, which allows remote attackers to read files in arbitrary directories via a ; in a pathname within an HTTP request.
CWE-22 Apr 04, 2022
CVE-2021-4191 5.3 MEDIUM EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
GitLab GraphQL API User Enumeration
An issue has been discovered in GitLab CE/EE affecting versions 13.0 to 14.6.5, 14.7 to 14.7.4, and 14.8 to 14.8.2. Private GitLab instances with restricted sign-ups may be vulnerable to user enumeration to unauthenticated users through the GraphQL API.
Mar 28, 2022
CVE-2021-43725 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.01
Spotweb <1.5.1 - XSS
There is a Cross Site Scripting (XSS) vulnerability in SpotPage_login.php of Spotweb 1.5.1 and below, which allows remote attackers to inject arbitrary web script or HTML via the data[performredirect] parameter.
CWE-79 Mar 28, 2022
CVE-2021-26599 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.04
Impresscms < 1.4.4 - SQL Injection
ImpressCMS before 1.4.3 allows include/findusers.php groups SQL Injection.
CWE-89 Mar 28, 2022
CVE-2021-26598 5.3 MEDIUM NUCLEI EPSS 0.76
Impresscms < 1.4.3 - Authentication Bypass
ImpressCMS before 1.4.3 has Incorrect Access Control because include/findusers.php allows access by unauthenticated attackers (who are, by design, able to have a security token).
CWE-287 Mar 28, 2022
CVE-2021-44139 7.5 HIGH NUCLEI EPSS 0.78
Hashicorp Sentinel - SSRF
Sentinel 1.8.2 is vulnerable to Server-side request forgery (SSRF).
CWE-918 Mar 23, 2022
CVE-2021-45968 7.5 HIGH NUCLEI EPSS 0.87
XMPP Server <7.20.x - SSRF
An issue was discovered in xmppserver jar in the XMPP Server component of the JIve platform, as used in Pascom Cloud Phone System before 7.20.x (and in other products). An endpoint in the backend Tomcat server of the Pascom allows SSRF, a related issue to CVE-2019-18394.
CWE-918 Mar 18, 2022
CVE-2021-45967 9.8 CRITICAL EXPLOITED SSVC PoC NUCLEI EPSS 0.93
Pascom Cloud Phone System <7.20.x - Path Traversal
An issue was discovered in Pascom Cloud Phone System before 7.20.x. A configuration error between NGINX and a backend Tomcat server leads to a path traversal in the Tomcat server, exposing unintended endpoints.
CWE-22 Mar 18, 2022
CVE-2021-46107 7.5 HIGH NUCLEI EPSS 0.63
Ligeo Archives Ligeo Basics - SSRF
Ligeo Archives Ligeo Basics as of 02_01-2022 is vulnerable to Server Side Request Forgery (SSRF) which allows an attacker to read any documents via the download features.
CWE-918 Mar 17, 2022
CVE-2021-44260 7.5 HIGH 1 Writeup NUCLEI EPSS 0.26
Wavlink Wl-wn531g3 Firmware - Missing Authentication
A vulnerability is in the 'live_mfg.html' page of the WAVLINK AC1200, version WAVLINK-A42W-1.27.6-20180418, which can allow a remote attacker to access this page without any authentication. When processed, it exposes some key information of the manager of router.
CWE-306 Mar 17, 2022
CVE-2021-45793 7.5 HIGH NUCLEI EPSS 0.31
Slims9 Bulian 9.4.2 - SQL Injection
Slims9 Bulian 9.4.2 is affected by SQL injection in lib/comment.inc.php. User data can be obtained.
CWE-89 Mar 17, 2022
CVE-2021-32478 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.03
Moodle < 3.8.9 - XSS
The redirect URI in the LTI authorization endpoint required extra sanitizing to prevent reflected XSS and open redirect risks. Moodle versions 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8 and earlier unsupported versions are affected.
CWE-601 Mar 11, 2022
CVE-2021-33851 5.4 MEDIUM NUCLEI EPSS 0.07
Apasionados Customize Login Image - XSS
A cross-site scripting (XSS) attack can cause arbitrary code (JavaScript) to run in a user's browser and can use an application as the vehicle for the attack. The XSS payload given in the "Custom logo link" executes whenever the user opens the Settings Page of the "Customize Login Image" Plugin.
CWE-79 Mar 10, 2022
CVE-2021-46704 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.87
GenieACS <1.2.8 - Command Injection
In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.
CWE-78 Mar 06, 2022
CVE-2021-46381 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.90
D-Link DAP-1620 - Path Traversal
Local File Inclusion due to path traversal in D-Link DAP-1620 leads to unauthorized internal files reading [/etc/passwd] and [/etc/shadow].
CWE-22 Mar 04, 2022
CVE-2021-46379 6.1 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.47
DLink DIR850 ET850-1.08TRb03 - Open Redirect
DLink DIR850 ET850-1.08TRb03 is affected by an incorrect access control vulnerability through URL redirection to untrusted site.
CWE-601 Mar 04, 2022