Vulnerabilities with Nuclei Scanner Templates
Updated 3h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2021-46073
4.8
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.06
Sourcecodester Vehicle Service Mgmt 1.0 - XSS
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the User List Section in login panel.
CWE-79
Jan 06, 2022
CVE-2021-46072
4.8
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.06
Vehicle Service Management System 1.0 - XSS
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service List Section in login panel.
CWE-79
Jan 06, 2022
CVE-2021-46071
4.8
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.06
Vehicle Service Management System 1.0 - XSS
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Category List Section in login panel.
CWE-79
Jan 06, 2022
CVE-2021-46069
4.8
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.06
Vehicle Service Management System 1.0 - XSS
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel.
CWE-79
Jan 06, 2022
CVE-2021-46068
4.8
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.06
Vehicle Service Management System 1.0 - XSS
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel.
CWE-79
Jan 06, 2022
CVE-2021-31589
6.1
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.12
Beyondtrust Appliance Base Software < 6.0.1 - XSS
A cross-site scripting (XSS) vulnerability has been reported and confirmed for BeyondTrust Secure Remote Access Base Software version 6.0.1 and older, which allows the injection of unauthenticated, specially-crafted web requests without proper sanitization.
CWE-79
Jan 05, 2022
CVE-2021-45428
9.8
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Telesquare Tlr-2005ksh Firmware - IDOR
TLR-2005KSH is affected by an incorrect access control vulnerability. THe PUT method is enabled so an attacker can upload arbitrary files including HTML and CGI formats.
CWE-639
Jan 03, 2022
CVE-2021-45232
9.8
CRITICAL
9 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Apisix Dashboard < 2.10.1 - Missing Authentication
In Apache APISIX Dashboard before 2.10.1, the Manager API uses two frameworks and introduces framework `droplet` on the basis of framework `gin`, all APIs and authentication middleware are developed based on framework `droplet`, but some API directly use the interface of framework `gin` thus bypassing the authentication.
CWE-306
Dec 27, 2021
CVE-2021-45092
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.79
Thinfinity VirtualUI <3.0 - Code Injection
Thinfinity VirtualUI before 3.0 has functionality in /lab.html reachable by default that could allow IFRAME injection via the vpath parameter.
Dec 16, 2021
CVE-2021-43831
7.7
HIGH
NUCLEI
EPSS 0.30
Gradio <2.5.0 - Path Traversal
Gradio is an open source framework for building interactive machine learning models and demos. In versions prior to 2.5.0 there is a vulnerability that affects anyone who creates and publicly shares Gradio interfaces. File paths are not restricted and users who receive a Gradio link can access any files on the host computer if they know the file names or file paths. This is limited only by the host operating system. Paths are opened in read only mode. The problem has been patched in gradio 2.5.0.
CWE-22
Dec 15, 2021
CVE-2021-27858
5.3
MEDIUM
NUCLEI
EPSS 0.32
FatPipe WARP/IPVPN/MPVPN <10.1.2r60p91-10.2.2r42 - Info Disclosure
A missing authorization vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows a remote attacker to access at least the URL "/fpui/jsp/index.jsp" leading to unknown impact, presumably some violation of confidentiality. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA004.
CWE-862
Dec 15, 2021
CVE-2021-27856
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.46
FatPipe <10.1.2r60p91, 10.2.2r42 - Info Disclosure
FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 includes an account named "cmuser" that has administrative privileges and no password. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA002.
Dec 15, 2021
CVE-2021-36888
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.70
Blocksera Image Hover Effects < 9.6.1 - Improper Access Control
Unauthenticated Arbitrary Options Update vulnerability leading to full website compromise discovered in Image Hover Effects Ultimate (versions <= 9.6.1) WordPress plugin.
CWE-284
Dec 15, 2021
CVE-2021-45043
7.5
HIGH
2 PoCs
Analysis
NUCLEI
EPSS 0.82
Hd-network Real-time Monitoring System - Path Traversal
HD-Network Real-time Monitoring System 2.0 allows ../ directory traversal to read /etc/shadow via the /language/lang s_Language parameter.
CWE-22
Dec 15, 2021
CVE-2021-36450
6.1
MEDIUM
NUCLEI
EPSS 0.20
Verint WFO <15.2.8.10048 - XSS
Verint Workforce Optimization (WFO) 15.2.8.10048 allows XSS via the control/my_notifications NEWUINAV parameter.
CWE-79
Dec 15, 2021
CVE-2021-45046
9.0
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
14 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Log4j < 2.12.2 - Remote Code Execution
It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.
CWE-917
Dec 14, 2021
CVE-2021-4073
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.69
RegistrationMagic <5.0.1.7 - Auth Bypass
The RegistrationMagic WordPress plugin made it possible for unauthenticated users to log in as any site user, including administrators, if they knew a valid username on the site due to missing identity validation in the social login function social_login_using_email() of the plugin. This affects versions equal to, and less than, 5.0.1.7.
CWE-287
Dec 14, 2021
CVE-2021-42063
6.1
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.41
SAP Knowledge Warehouse - XSS
A security vulnerability has been discovered in the SAP Knowledge Warehouse - versions 7.30, 7.31, 7.40, 7.50. The usage of one SAP KW component within a Web browser enables unauthorized attackers to conduct XSS attacks, which might lead to disclose sensitive data.
CWE-79
Dec 14, 2021
CVE-2021-39312
7.5
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.91
Trueranker True Ranker < 2.2.2 - Path Traversal
The True Ranker plugin <= 2.2.2 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file.
CWE-22
Dec 14, 2021
CVE-2021-3831
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.27
gnuboard5 - XSS
gnuboard5 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-79
Dec 14, 2021