Vulnerabilities with Nuclei Scanner Templates

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,649 CVEs tracked 53,649 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,377 vendors 43,908 researchers
4,077 results Clear all
CVE-2021-43574 6.1 MEDIUM SSVC PoC NUCLEI EPSS 0.27
Atmail 6.5.0 - XSS
WebAdmin Control Panel in Atmail 6.5.0 (a version released in 2012) allows XSS via the format parameter to the default URI. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CWE-79 Nov 15, 2021
CVE-2021-43495 7.5 HIGH NUCLEI EPSS 0.55
Alquist - Path Traversal
AlquistManager branch as of commit 280d99f43b11378212652e75f6f3159cde9c1d36 is affected by a directory traversal vulnerability in alquist/IO/input.py. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.
CWE-22 Nov 15, 2021
CVE-2021-41653 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Tp-link Tl-wr840n Firmware - Code Injection
The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote code execution via a crafted payload in an IP address input field.
CWE-94 Nov 13, 2021
CVE-2021-3577 8.8 HIGH EXPLOITED NUCLEI EPSS 0.86
Motorola-branded Binatone Hubble Cameras - RCE
An unauthenticated remote code execution vulnerability was reported in some Motorola-branded Binatone Hubble Cameras that could allow an attacker on the same network unauthorized access to the device.
CWE-78 Nov 12, 2021
CVE-2021-43496 7.5 HIGH NUCLEI EPSS 0.40
Clustering master - Path Traversal
Clustering master branch as of commit 53e663e259bcfc8cdecb56c0bb255bd70bfcaa70 is affected by a directory traversal vulnerability. This attack can cause the disclosure of critical secrets stored anywhere on the system and can significantly aid in getting remote code access.
CWE-22 Nov 12, 2021
CVE-2021-41349 6.5 MEDIUM EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.91
Microsoft Exchange Server - SSRF
Microsoft Exchange Server Spoofing Vulnerability
Nov 10, 2021
CVE-2021-35488 6.1 MEDIUM NUCLEI EPSS 0.13
Thruk 2.40-2 - XSS
Thruk 2.40-2 allows /thruk/#cgi-bin/status.cgi?style=combined&title={TITLE] Reflected XSS via the host or title parameter. An attacker could inject arbitrary JavaScript into status.cgi. The payload would be triggered every time an authenticated user browses the page containing it.
CWE-79 Nov 09, 2021
CVE-2021-31602 5.3 MEDIUM EXPLOITED NUCLEI EPSS 0.93
Hitachi Vantara Pentaho < 9.1.0.0 - Authentication Bypass
An issue was discovered in Hitachi Vantara Pentaho through 9.1 and Pentaho Business Intelligence Server through 7.x. The Security Model has different layers of Access Control. One of these layers is the applicationContext security, which is defined in the applicationContext-spring-security.xml file. The default configuration allows an unauthenticated user with no previous knowledge of the platform settings to extract pieces of information without possessing valid credentials.
CWE-287 Nov 08, 2021
CVE-2021-42359 7.5 HIGH EXPLOITED NUCLEI EPSS 0.20
Legalweb WP Dsgvo Tools < 3.1.23 - Improper Access Control
WP DSGVO Tools (GDPR) <= 3.1.23 had an AJAX action, ‘admin-dismiss-unsubscribe‘, which lacked a capability check and a nonce check and was available to unauthenticated users, and did not check the post type when deleting unsubscription requests. As such, it was possible for an attacker to permanently delete an arbitrary post or page on the site by sending an AJAX request with the “action” parameter set to “admin-dismiss-unsubscribe” and the “id” parameter set to the post to be deleted. Sending such a request would move the post to the trash, and repeating the request would permanently delete the post in question.
CWE-284 Nov 05, 2021
CVE-2021-39411 6.1 MEDIUM NUCLEI EPSS 0.01
Phpgurukul Hospital Management System - XSS
Multiple Cross Site Scripting (XSS) vulnerabilities exist in PHPGurukul Hospital Management System 4.0 via the (1) searchdata parameter in (a) doctor/search.php and (b) admin/patient-search.php, and the (2) fromdate and (3) todate parameters in admin/betweendates-detailsreports.php.
CWE-79 Nov 05, 2021
CVE-2021-42667 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.72
Online Event Booking And Reservation System - SQL Injection
A SQL Injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP in event-management/views. An attacker can leverage this vulnerability in order to manipulate the sql query performed. As a result he can extract sensitive data from the web server and in some cases he can use this vulnerability in order to get a remote code execution on the remote web server.
CWE-89 Nov 05, 2021
CVE-2021-42663 4.3 MEDIUM 2 PoCs Analysis NUCLEI EPSS 0.38
Online Event Booking And Reservation System - XSS
An HTML injection vulnerability exists in Sourcecodester Online Event Booking and Reservation System in PHP/MySQL via the msg parameter to /event-management/index.php. An attacker can leverage this vulnerability in order to change the visibility of the website. Once the target user clicks on a given link he will display the content of the HTML code of the attacker's choice.
CWE-79 Nov 05, 2021
CVE-2021-42237 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 6 PoCs Analysis NUCLEI EPSS 0.94
Sitecore Experience Platform - Insecure Deserialization
Sitecore XP 7.5 Initial Release to Sitecore XP 8.2 Update-7 is vulnerable to an insecure deserialization attack where it is possible to achieve remote command execution on the machine. No authentication or special configuration is required to exploit this vulnerability.
CWE-502 Nov 05, 2021
CVE-2021-41174 6.9 MEDIUM EXPLOITED 1 Writeup NUCLEI EPSS 0.88
Grafana - XSS
Grafana is an open-source platform for monitoring and observability. In affected versions if an attacker is able to convince a victim to visit a URL referencing a vulnerable page, arbitrary JavaScript content may be executed within the context of the victim's browser. The user visiting the malicious link must be unauthenticated and the link must be for a page that contains the login button in the menu bar. The url has to be crafted to exploit AngularJS rendering and contain the interpolation binding for AngularJS expressions. AngularJS uses double curly braces for interpolation binding: {{ }} ex: {{constructor.constructor(‘alert(1)’)()}}. When the user follows the link and the page renders, the login button will contain the original link with a query parameter to force a redirect to the login page. The URL is not validated and the AngularJS rendering engine will execute the JavaScript expression contained in the URL. Users are advised to upgrade as soon as possible. If for some reason you cannot upgrade, you can use a reverse proxy or similar to block access to block the literal string {{ in the path.
CWE-79 Nov 03, 2021
CVE-2021-39341 8.2 HIGH EXPLOITED NUCLEI EPSS 0.44
Optinmonster < 2.6.4 - Incorrect Authorization
The OptinMonster WordPress plugin is vulnerable to sensitive information disclosure and unauthorized setting updates due to insufficient authorization validation via the logged_in_or_has_api_key function in the ~/OMAPI/RestApi.php file that can used to exploit inject malicious web scripts on sites with the plugin installed. This affects versions up to, and including, 2.6.4.
CWE-319 Nov 01, 2021
CVE-2021-31862 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.41
Sysaid - XSS
SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication.
CWE-79 Oct 29, 2021
CVE-2021-42258 9.8 CRITICAL KEV SSVC ACTIVE RANSOMWARE 1 PoC Analysis NUCLEI EPSS 0.94
BQE Billquick Web Suite < 22.0.9.1 - SQL Injection
BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include the ability to execute arbitrary code as MSSQLSERVER$ via xp_cmdshell.
CWE-89 Oct 22, 2021
CVE-2021-31682 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.41
Automatedlogic Webctrl < 6.5 - XSS
The login portal for the Automated Logic WebCTRL/WebCTRL OEM web application contains a vulnerability that allows for reflected XSS attacks due to the operatorlocale GET parameter not being sanitized. This issue impacts versions 6.5 and below. This issue works by passing in a basic XSS payload to a vulnerable GET parameter that is reflected in the output without sanitization.
CWE-79 Oct 22, 2021
CVE-2021-35323 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.03
Bludit <3-13-1 - XSS
Cross Site Scripting (XSS) vulnerability exists in bludit 3-13-1 via the username in admin/login.
CWE-79 Oct 19, 2021
CVE-2021-42566 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.01
Myfactory Fms < 7.1-912 - XSS
myfactory.FMS before 7.1-912 allows XSS via the Error parameter.
CWE-79 Oct 18, 2021