Vulnerabilities with Nuclei Scanner Templates
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2021-44152
9.8
CRITICAL
NUCLEI
EPSS 0.87
Reprisesoftware Reprise License Manager - Missing Authentication
An issue was discovered in Reprise RLM 14.2. Because /goform/change_password_process does not verify authentication or authorization, an unauthenticated user can change the password of any existing user. This allows an attacker to change the password of any known user, thereby preventing valid users from accessing the system and granting the attacker full access to that user's account.
CWE-306
Dec 13, 2021
CVE-2021-40856
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.88
Auerswald COMfortel <2.8G - Auth Bypass
Auerswald COMfortel 1400 IP and 2600 IP before 2.8G devices allow Authentication Bypass via the /about/../ substring.
CWE-706
Dec 13, 2021
CVE-2021-44848
5.3
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.61
Cybelesoft Thinfinity Virtualui < 3.0 - Information Disclosure
In Cibele Thinfinity VirtualUI before 3.0, /changePassword returns different responses for invalid authentication requests depending on whether the username exists.
CWE-203
Dec 13, 2021
CVE-2021-44515
9.8
CRITICAL
KEV
SSVC ACTIVE
NUCLEI
EPSS 0.94
Zohocorp Manageengine Desktop Central - Remote Code Execution
Zoho ManageEngine Desktop Central is vulnerable to authentication bypass, leading to remote code execution on the server, as exploited in the wild in December 2021. For Enterprise builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For Enterprise builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3. For MSP builds 10.1.2127.17 and earlier, upgrade to 10.1.2127.18. For MSP builds 10.1.2128.0 through 10.1.2137.2, upgrade to 10.1.2137.3.
Dec 12, 2021
CVE-2021-44529
9.8
CRITICAL
KEV
SSVC ACTIVE
RANSOMWARE
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Ivanti Endpoint Manager Cloud Services Appliance - Code Injection
A code injection vulnerability in the Ivanti EPM Cloud Services Appliance (CSA) allows an unauthenticated user to execute arbitrary code with limited permissions (nobody).
CWE-94
Dec 08, 2021
CVE-2021-43810
8.8
HIGH
1 Writeup
NUCLEI
EPSS 0.73
Admidio <4.0.12 - XSS
Admidio is a free open source user management system for websites of organizations and groups. A cross-site scripting vulnerability is present in Admidio prior to version 4.0.12. The Reflected XSS vulnerability occurs because redirect.php does not properly validate the value of the url parameter. Through this vulnerability, an attacker is capable to execute malicious scripts. This issue is patched in version 4.0.12.
CWE-79
Dec 07, 2021
CVE-2021-42567
6.1
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.49
Apereo Central Authentication Service < 6.3.7.1 - XSS
Apereo CAS through 6.4.1 allows XSS via POST requests sent to the REST API endpoints.
CWE-79
Dec 07, 2021
CVE-2021-43798
7.5
HIGH
KEV
SSVC ACTIVE
58 PoCs
Analysis
NUCLEI
EPSS 0.94
Grafana Plugin Path Traversal
Grafana is an open-source platform for monitoring and observability. Grafana versions 8.0.0-beta1 through 8.3.0 (except for patched versions) iss vulnerable to directory traversal, allowing access to local files. The vulnerable URL path is: `<grafana_host_url>/public/plugins//`, where is the plugin ID for any installed plugin. At no time has Grafana Cloud been vulnerable. Users are advised to upgrade to patched versions 8.0.7, 8.1.8, 8.2.7, or 8.3.1. The GitHub Security Advisory contains more information about vulnerable URL paths, mitigation, and the disclosure timeline.
CWE-22
Dec 07, 2021
CVE-2021-40859
9.8
CRITICAL
3 PoCs
Analysis
NUCLEI
EPSS 0.81
Auerswald COMpact 5500R <8.0B - RCE
Backdoors were discovered in Auerswald COMpact 5500R 7.8A and 8.0B devices, that allow attackers with access to the web based management application full administrative access to the device.
Dec 07, 2021
CVE-2021-44427
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.84
Rosariosis < 8.1.1 - SQL Injection
An unauthenticated SQL Injection vulnerability in Rosario Student Information System (aka rosariosis) before 8.1.1 allows remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter.
CWE-89
Nov 29, 2021
CVE-2021-38147
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.79
Wipro Holmes Orchestrator 20.4.1 - Info Disclosure
Wipro Holmes Orchestrator 20.4.1 (20.4.1_02_11_2020) allows remote attackers to download arbitrary files, such as reports containing sensitive information, because authentication is not required for API access to processexecution/DownloadExcelFile/Domain_Credential_Report_Excel, processexecution/DownloadExcelFile/User_Report_Excel, processexecution/DownloadExcelFile/Process_Report_Excel, processexecution/DownloadExcelFile/Infrastructure_Report_Excel, or processexecution/DownloadExcelFile/Resolver_Report_Excel.
CWE-306
Nov 29, 2021
CVE-2021-44077
9.8
CRITICAL
KEV
SSVC ACTIVE
3 PoCs
Analysis
NUCLEI
EPSS 0.94
ManageEngine ServiceDesk Plus CVE-2021-44077
Zoho ManageEngine ServiceDesk Plus before 11306, ServiceDesk Plus MSP before 10530, and SupportCenter Plus before 11014 are vulnerable to unauthenticated remote code execution. This is related to /RestAPI URLs in a servlet, and ImportTechnicians in the Struts configuration.
CWE-306
Nov 29, 2021
CVE-2021-43778
9.1
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.90
GLPI <2.6.1 - Path Traversal
Barcode is a GLPI plugin for printing barcodes and QR codes. GLPI instances version 2.x prior to version 2.6.1 with the barcode plugin installed are vulnerable to a path traversal vulnerability. This issue was patched in version 2.6.1. As a workaround, delete the `front/send.php` file.
CWE-22
Nov 24, 2021
CVE-2021-41192
8.1
HIGH
1 Writeup
NUCLEI
EPSS 0.87
Redash <10.0.0 - Info Disclosure
Redash is a package for data visualization and sharing. If an admin sets up Redash versions 10.0.0 and prior without explicitly specifying the `REDASH_COOKIE_SECRET` or `REDASH_SECRET_KEY` environment variables, a default value is used for both that is the same across all installations. In such cases, the instance is vulnerable to attackers being able to forge sessions using the known default value. This issue only affects installations where the `REDASH_COOKIE_SECRET or REDASH_SECRET_KEY` environment variables have not been explicitly set. This issue does not affect users of the official Redash cloud images, Redash's Digital Ocean marketplace droplets, or the scripts in the `getredash/setup` repository. These instances automatically generate unique secret keys during installation. One can verify whether one's instance is affected by checking the value of the `REDASH_COOKIE_SECRET` environment variable. If it is `c292a0a3aa32397cdb050e233733900f`, should follow the steps to secure the instance, outlined in the GitHub Security Advisory.
CWE-1188
Nov 24, 2021
CVE-2021-38146
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.48
Wipro Holmes Orchestrator <20.4.1 - Path Traversal
The File Download API in Wipro Holmes Orchestrator 20.4.1 (20.4.1_02_11_2020) allows remote attackers to read arbitrary files via absolute path traversal in the SearchString JSON field in /home/download POST data.
CWE-22
Nov 22, 2021
CVE-2021-41569
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.74
SAS/Intrnet <9.4 build 1520 - Local File Inclusion
SAS/Intrnet 9.4 build 1520 and earlier allows Local File Inclusion. The samples library (included by default) in the appstart.sas file, allows end-users of the application to access the sample.webcsf1.sas program, which contains user-controlled macro variables that are passed to the DS2CSF macro. Users can escape the context of the configured user-controllable variable and append additional functions native to the macro but not included as variables within the library. This includes a function that retrieves files from the host OS.
CWE-829
Nov 19, 2021
CVE-2021-41277
10.0
CRITICAL
KEV
SSVC ACTIVE
10 PoCs
Analysis
NUCLEI
EPSS 0.94
Metabase - Local File Inclusion
Metabase is an open source data analytics platform. In affected versions a security issue has been discovered with the custom GeoJSON map (`admin->settings->maps->custom maps->add a map`) support and potential local file inclusion (including environment variables). URLs were not validated prior to being loaded. This issue is fixed in a new maintenance release (0.40.5 and 1.40.5), and any subsequent release after that. If you’re unable to upgrade immediately, you can mitigate this by including rules in your reverse proxy or load balancer or WAF to provide a validation filter before the application.
CWE-22
Nov 17, 2021
CVE-2021-37580
9.8
CRITICAL
EXPLOITED
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Shenyu < 2.4.1 - Authentication Bypass
A flaw was found in Apache ShenYu Admin. The incorrect use of JWT in ShenyuAdminBootstrap allows an attacker to bypass authentication. This issue affected Apache ShenYu 2.3.0 and 2.4.0
CWE-287
Nov 16, 2021
CVE-2021-41266
8.6
HIGH
EXPLOITED
NUCLEI
EPSS 0.86
Minio <0.12.2 - Auth Bypass
Minio console is a graphical user interface for the for MinIO operator. Minio itself is a multi-cloud object storage project. Affected versions are subject to an authentication bypass issue in the Operator Console when an external IDP is enabled. All users on release v0.12.2 and before are affected and are advised to update to 0.12.3 or newer. Users unable to upgrade should add automountServiceAccountToken: false to the operator-console deployment in Kubernetes so no service account token will get mounted inside the pod, then disable the external identity provider authentication by unset the CONSOLE_IDP_URL, CONSOLE_IDP_CLIENT_ID, CONSOLE_IDP_SECRET and CONSOLE_IDP_CALLBACK environment variable and instead use the Kubernetes service account token.
CWE-306
Nov 15, 2021
CVE-2021-41951
6.1
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.58
Montala Resourcespace < 9.6 - XSS
ResourceSpace before 9.6 rev 18290 is affected by a reflected Cross-Site Scripting vulnerability in plugins/wordpress_sso/pages/index.php via the wordpress_user parameter. If an attacker is able to persuade a victim to visit a crafted URL, malicious JavaScript content may be executed within the context of the victim's browser.
CWE-79
Nov 15, 2021