Vulnerabilities with Nuclei Scanner Templates

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,649 CVEs tracked 53,649 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,377 vendors 43,908 researchers
4,077 results Clear all
CVE-2021-3654 6.1 MEDIUM NUCLEI EPSS 0.87
Openstack Nova < 21.2.3 - Open Redirect
A vulnerability was found in openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL.
CWE-601 Mar 02, 2022
CVE-2021-41282 8.8 HIGH 1 PoC Analysis NUCLEI EPSS 0.91
pfSense Diag Routes Web Shell Upload
diag_routes.php in pfSense 2.5.2 allows sed data injection. Authenticated users are intended to be able to view data about the routes set in the firewall. The data is retrieved by executing the netstat utility, and then its output is parsed via the sed utility. Although the common protection mechanisms against command injection (i.e., the usage of the escapeshellarg function for the arguments) are used, it is still possible to inject sed-specific code and write an arbitrary file in an arbitrary location.
CWE-74 Mar 01, 2022
CVE-2021-46387 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.28
ZyXEL ZyWALL 2 Plus - XSS
ZyXEL ZyWALL 2 Plus Internet Security Appliance is affected by Cross Site Scripting (XSS). Insecure URI handling leads to bypass security restriction to achieve Cross Site Scripting, which allows an attacker able to execute arbitrary JavaScript codes to perform multiple attacks such as clipboard hijacking and session hijacking.
CWE-79 Mar 01, 2022
CVE-2021-45382 9.8 CRITICAL KEV SSVC ACTIVE 1 Writeup NUCLEI EPSS 0.94
Dlink Dir-820l Firmware - OS Command Injection
A Remote Command Execution (RCE) vulnerability exists in all series H/W revisions D-link DIR-810L, DIR-820L/LW, DIR-826L, DIR-830L, and DIR-836L routers via the DDNS function in ncc2 binary file. Note: DIR-810L, DIR-820L, DIR-830L, DIR-826L, DIR-836L, all hardware revisions, have reached their End of Life ("EOL") /End of Service Life ("EOS") Life-Cycle and as such this issue will not be patched.
CWE-78 Feb 17, 2022
CVE-2021-35380 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.49
Solari di Udine TTServer 3.24.0.2 - Path Traversal
A Directory Traversal vulnerability exists in Solari di Udine TermTalk Server (TTServer) 3.24.0.2, which lets an unauthenticated malicious user gain access to the files on the remote system by gaining access to the relative path of the file they want to download (http://url:port/file?valore).
CWE-22 Feb 15, 2022
CVE-2021-43734 7.5 HIGH NUCLEI EPSS 0.82
kkFileview <4.0.0 - Path Traversal
kkFileview v4.0.0 has arbitrary file read through a directory traversal vulnerability which may lead to sensitive file leak on related host.
CWE-22 Feb 15, 2022
CVE-2021-45420 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.82
Emerson Dixell Xweb-500 Firmware - Information Disclosure
Emerson Dixell XWEB-500 products are affected by arbitrary file write vulnerability in /cgi-bin/logo_extra_upload.cgi, /cgi-bin/cal_save.cgi, and /cgi-bin/lo_utils.cgi. An attacker will be able to write any file on the target system without any kind of authentication mechanism, and this can lead to denial of service and potentially remote code execution. Note: the product has not been supported since 2018 and should be removed or replaced
CWE-306 Feb 14, 2022
CVE-2021-43062 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.57
Fortinet FortiMail <7.0.1 - XSS
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiMail version 7.0.1 and 7.0.0, version 6.4.5 and below, version 6.3.7 and below, version 6.0.11 and below allows attacker to execute unauthorized code or commands via crafted HTTP GET requests to the FortiGuard URI protection service.
CWE-79 Feb 02, 2022
CVE-2021-44451 6.5 MEDIUM NUCLEI EPSS 0.75
Apache Superset < 1.3.2 - Insufficiently Protected Credentials
Apache Superset up to and including 1.3.2 allowed for registered database connections password leak for authenticated users. This information could be accessed in a non-trivial way. Users should upgrade to Apache Superset 1.4.0 or higher.
CWE-522 Feb 01, 2022
CVE-2021-43510 9.8 CRITICAL 1 Writeup NUCLEI EPSS 0.68
Sourcecodester Simple Client Management System 1.0 - SQL Injection
SQL Injection vulnerability exists in Sourcecodester Simple Client Management System 1.0 via the username field in login.php.
CWE-89 Feb 01, 2022
CVE-2021-34805 7.5 HIGH NUCLEI EPSS 0.90
Land-software Faust Iserver < 9.0.019.019.7 - Path Traversal
An issue was discovered in FAUST iServer before 9.0.019.019.7. For each URL request, it accesses the corresponding .fau file on the operating system without preventing %2e%2e%5c directory traversal.
CWE-22 Jan 31, 2022
CVE-2021-45380 6.1 MEDIUM NUCLEI EPSS 0.06
Appcms - XSS
AppCMS 2.0.101 has a XSS injection vulnerability in \templates\m\inc_head.php
CWE-79 Jan 23, 2022
CVE-2021-26247 6.1 MEDIUM NUCLEI EPSS 0.21
Cacti - XSS
As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" to successfully execute the JavaScript payload present in the "ref" URL parameter.
CWE-79 Jan 19, 2022
CVE-2021-46104 7.5 HIGH NUCLEI EPSS 0.20
webp_server_go <0.4.0 - Path Traversal
An issue was discovered in webp_server_go 0.4.0. There is a directory traversal vulnerability that can read arbitrary file information on the server.
CWE-22 Jan 19, 2022
CVE-2021-35587 9.8 CRITICAL KEV SSVC ACTIVE 3 PoCs Analysis NUCLEI EPSS 0.94
Oracle Fusion Middleware - OpenSSO Agent - Unauthenticated RCE
Vulnerability in the Oracle Access Manager product of Oracle Fusion Middleware (component: OpenSSO Agent). Supported versions that are affected are 11.1.2.3.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Access Manager. Successful attacks of this vulnerability can result in takeover of Oracle Access Manager. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CWE-306 Jan 19, 2022
CVE-2021-46005 5.4 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.12
Sourcecodester Car Rental Management System 1.0 - XSS
Sourcecodester Car Rental Management System 1.0 is vulnerable to Cross Site Scripting (XSS) via vehicalorcview parameter.
CWE-79 Jan 18, 2022
CVE-2021-42551 6.1 MEDIUM NUCLEI EPSS 0.07
Alcoda Netbiblio < 4.0.0.320 - XSS
Cross-site Scripting (XSS) vulnerability in the search functionality of AlCoda NetBiblio WebOPAC allows an unauthenticated user to craft a reflected Cross-Site Scripting attack. This issue affects: AlCoda NetBiblio WebOPAC versions prior to 4.0.0.320; versions later than 4.0.0.328. This issue does not affect: AlCoda NetBiblio WebOPAC version 4.0.0.335 and later versions.
CWE-79 Jan 14, 2022
CVE-2021-45422 6.1 MEDIUM EXPLOITED 1 Writeup NUCLEI EPSS 0.22
Reprisesoftware Reprise License Manager < 16.0 - XSS
Reprise License Manager 14.2 is affected by a reflected cross-site scripting vulnerability in the /goform/activate_process "count" parameter via GET. No authentication is required.
CWE-79 Jan 13, 2022
CVE-2021-28377 5.3 MEDIUM NUCLEI EPSS 0.53
Joomla! ChronoForums 2.0.11 - Local File Inclusion
ChronoForums 2.0.11 allows av Directory Traversal to read arbitrary files.
CWE-22 Jan 12, 2022
CVE-2021-44528 6.1 MEDIUM NUCLEI EPSS 0.41
Rails < 6.0.4.2 - Open Redirect
A open redirect vulnerability exists in Action Pack >= 6.0.0 that could allow an attacker to craft a "X-Forwarded-Host" headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website.
CWE-601 Jan 10, 2022