Vulnerabilities with Nuclei Scanner Templates

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,649 CVEs tracked 53,649 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,377 vendors 43,908 researchers
4,077 results Clear all
CVE-2021-46073 4.8 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.06
Sourcecodester Vehicle Service Mgmt 1.0 - XSS
A Stored Cross Site Scripting (XSS) vulnerability exists in Sourcecodester Vehicle Service Management System 1.0 via the User List Section in login panel.
CWE-79 Jan 06, 2022
CVE-2021-46072 4.8 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.06
Vehicle Service Management System 1.0 - XSS
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Service List Section in login panel.
CWE-79 Jan 06, 2022
CVE-2021-46071 4.8 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.06
Vehicle Service Management System 1.0 - XSS
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Category List Section in login panel.
CWE-79 Jan 06, 2022
CVE-2021-46069 4.8 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.06
Vehicle Service Management System 1.0 - XSS
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the Mechanic List Section in login panel.
CWE-79 Jan 06, 2022
CVE-2021-46068 4.8 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.06
Vehicle Service Management System 1.0 - XSS
A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel.
CWE-79 Jan 06, 2022
CVE-2021-31589 6.1 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.12
Beyondtrust Appliance Base Software < 6.0.1 - XSS
A cross-site scripting (XSS) vulnerability has been reported and confirmed for BeyondTrust Secure Remote Access Base Software version 6.0.1 and older, which allows the injection of unauthenticated, specially-crafted web requests without proper sanitization.
CWE-79 Jan 05, 2022
CVE-2021-45428 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.94
Telesquare Tlr-2005ksh Firmware - IDOR
TLR-2005KSH is affected by an incorrect access control vulnerability. THe PUT method is enabled so an attacker can upload arbitrary files including HTML and CGI formats.
CWE-639 Jan 03, 2022
CVE-2021-45232 9.8 CRITICAL 9 PoCs Analysis NUCLEI EPSS 0.94
Apache Apisix Dashboard < 2.10.1 - Missing Authentication
In Apache APISIX Dashboard before 2.10.1, the Manager API uses two frameworks and introduces framework `droplet` on the basis of framework `gin`, all APIs and authentication middleware are developed based on framework `droplet`, but some API directly use the interface of framework `gin` thus bypassing the authentication.
CWE-306 Dec 27, 2021
CVE-2021-45092 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.79
Thinfinity VirtualUI <3.0 - Code Injection
Thinfinity VirtualUI before 3.0 has functionality in /lab.html reachable by default that could allow IFRAME injection via the vpath parameter.
Dec 16, 2021
CVE-2021-43831 7.7 HIGH NUCLEI EPSS 0.30
Gradio <2.5.0 - Path Traversal
Gradio is an open source framework for building interactive machine learning models and demos. In versions prior to 2.5.0 there is a vulnerability that affects anyone who creates and publicly shares Gradio interfaces. File paths are not restricted and users who receive a Gradio link can access any files on the host computer if they know the file names or file paths. This is limited only by the host operating system. Paths are opened in read only mode. The problem has been patched in gradio 2.5.0.
CWE-22 Dec 15, 2021
CVE-2021-27858 5.3 MEDIUM NUCLEI EPSS 0.32
FatPipe WARP/IPVPN/MPVPN <10.1.2r60p91-10.2.2r42 - Info Disclosure
A missing authorization vulnerability in the web management interface of FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 allows a remote attacker to access at least the URL "/fpui/jsp/index.jsp" leading to unknown impact, presumably some violation of confidentiality. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA004.
CWE-862 Dec 15, 2021
CVE-2021-27856 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.46
FatPipe <10.1.2r60p91, 10.2.2r42 - Info Disclosure
FatPipe WARP, IPVPN, and MPVPN software prior to versions 10.1.2r60p91 and 10.2.2r42 includes an account named "cmuser" that has administrative privileges and no password. Older versions of FatPipe software may also be vulnerable. The FatPipe advisory identifier for this vulnerability is FPSA002.
Dec 15, 2021
CVE-2021-36888 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.70
Blocksera Image Hover Effects < 9.6.1 - Improper Access Control
Unauthenticated Arbitrary Options Update vulnerability leading to full website compromise discovered in Image Hover Effects Ultimate (versions <= 9.6.1) WordPress plugin.
CWE-284 Dec 15, 2021
CVE-2021-45043 7.5 HIGH 2 PoCs Analysis NUCLEI EPSS 0.82
Hd-network Real-time Monitoring System - Path Traversal
HD-Network Real-time Monitoring System 2.0 allows ../ directory traversal to read /etc/shadow via the /language/lang s_Language parameter.
CWE-22 Dec 15, 2021
CVE-2021-36450 6.1 MEDIUM NUCLEI EPSS 0.20
Verint WFO <15.2.8.10048 - XSS
Verint Workforce Optimization (WFO) 15.2.8.10048 allows XSS via the control/my_notifications NEWUINAV parameter.
CWE-79 Dec 15, 2021
CVE-2021-45046 9.0 CRITICAL KEV SSVC ACTIVE RANSOMWARE 14 PoCs Analysis NUCLEI EPSS 0.94
Apache Log4j < 2.12.2 - Remote Code Execution
It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.
CWE-917 Dec 14, 2021
CVE-2021-4073 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.69
RegistrationMagic <5.0.1.7 - Auth Bypass
The RegistrationMagic WordPress plugin made it possible for unauthenticated users to log in as any site user, including administrators, if they knew a valid username on the site due to missing identity validation in the social login function social_login_using_email() of the plugin. This affects versions equal to, and less than, 5.0.1.7.
CWE-287 Dec 14, 2021
CVE-2021-42063 6.1 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.41
SAP Knowledge Warehouse - XSS
A security vulnerability has been discovered in the SAP Knowledge Warehouse - versions 7.30, 7.31, 7.40, 7.50. The usage of one SAP KW component within a Web browser enables unauthorized attackers to conduct XSS attacks, which might lead to disclose sensitive data.
CWE-79 Dec 14, 2021
CVE-2021-39312 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Trueranker True Ranker < 2.2.2 - Path Traversal
The True Ranker plugin <= 2.2.2 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be accessed via the src parameter found in the ~/admin/vendor/datatables/examples/resources/examples.php file.
CWE-22 Dec 14, 2021
CVE-2021-3831 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.27
gnuboard5 - XSS
gnuboard5 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CWE-79 Dec 14, 2021