Vulnerabilities with Nuclei Scanner Templates

Updated 6h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,589 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,361 vendors 43,897 researchers
4,077 results Clear all
CVE-2021-40968 6.1 MEDIUM NUCLEI EPSS 0.01
spotweb <1.5.1 - XSS
Cross-site scripting (XSS) vulnerability in templates/installer/step-004.inc.php in spotweb 1.5.1 and below allow remote attackers to inject arbitrary web script or HTML via the newpassword2 parameter.
CWE-79 Oct 01, 2021
CVE-2021-41649 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.92
Online-shopping-system-advanced - SQL Injection
An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input.
CWE-89 Oct 01, 2021
CVE-2021-41648 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.76
Online-shopping-system-advanced - SQL Injection
An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /action.php prId parameter. Using a post request does not sanitize the user input.
CWE-89 Oct 01, 2021
CVE-2021-40960 9.8 CRITICAL NUCLEI EPSS 0.79
Galera WebTemplate 1.0 - Path Traversal
Galera WebTemplate 1.0 is affected by a directory traversal vulnerability that could reveal information from /etc/passwd and /etc/shadow.
CWE-22 Oct 01, 2021
CVE-2021-41293 7.5 HIGH EXPLOITED NUCLEI EPSS 0.90
ECOA BAS controller - Path Traversal
ECOA BAS controller suffers from a path traversal vulnerability, causing arbitrary files disclosure. Using the specific POST parameter, unauthenticated attackers can remotely disclose arbitrary files on the affected device and disclose sensitive and system information.
CWE-22 Sep 30, 2021
CVE-2021-41291 7.5 HIGH NUCLEI EPSS 0.92
ECOA BAS controller - Path Traversal
ECOA BAS controller suffers from a path traversal content disclosure vulnerability. Using the GET parameter in File Manager, unauthenticated attackers can remotely disclose directory content on the affected device.
CWE-22 Sep 30, 2021
CVE-2021-41826 6.1 MEDIUM NUCLEI EPSS 0.24
Placeos Authentication < 1.29.10.0 - Open Redirect
PlaceOS Authentication Service before 1.29.10.0 allows app/controllers/auth/sessions_controller.rb open redirect.
CWE-601 Sep 30, 2021
CVE-2021-40651 6.5 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.76
OS4Ed OpenSIS Community 8.0 - Info Disclosure
OS4Ed OpenSIS Community 8.0 is vulnerable to a local file inclusion vulnerability in Modules.php (modname parameter), which can disclose arbitrary file from the server's filesystem as long as the application has access to the file.
CWE-22 Sep 29, 2021
CVE-2021-41097 9.1 CRITICAL NUCLEI EPSS 0.12
Aurelia-path <1.1.7 - Prototype Pollution
aurelia-path is part of the Aurelia platform and contains utilities for path manipulation. There is a prototype pollution vulnerability in aurelia-path before version 1.1.7. The vulnerability exposes Aurelia application that uses `aurelia-path` package to parse a string. The majority of this will be Aurelia applications that employ the `aurelia-router` package. An example is this could allow an attacker to change the prototype of base object class `Object` by tricking an application to parse the following URL: `https://aurelia.io/blog/?__proto__[asdf]=asdf`. The problem is patched in version `1.1.7`.
CWE-1321 Sep 27, 2021
CVE-2021-40655 7.5 HIGH KEV 1 Writeup NUCLEI EPSS 0.93
D-LINK-DIR-605 B2 - Info Disclosure
An informtion disclosure issue exists in D-LINK-DIR-605 B2 Firmware Version : 2.01MT. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page
CWE-863 Sep 24, 2021
CVE-2021-36749 6.5 MEDIUM EXPLOITED 6 PoCs Analysis NUCLEI EPSS 0.94
Apache Druid < 0.22.0 - Incorrect Authorization
In the Druid ingestion system, the InputSource is used for reading data from a certain data source. However, the HTTP InputSource allows authenticated users to read data from other sources than intended, such as the local file system, with the privileges of the Druid server process. This is not an elevation of privilege when users access Druid directly, since Druid also provides the Local InputSource, which allows the same level of access. But it is problematic when users interact with Druid indirectly through an application that allows users to specify the HTTP InputSource, but not the Local InputSource. In this case, users could bypass the application-level restriction by passing a file URL to the HTTP InputSource. This issue was previously mentioned as being fixed in 0.21.0 as per CVE-2021-26920 but was not fixed in 0.21.0 or 0.21.1.
CWE-863 Sep 24, 2021
CVE-2021-36873 5.5 MEDIUM NUCLEI EPSS 0.04
Webence IQ Block Country < 1.2.11 - XSS
Authenticated Persistent Cross-Site Scripting (XSS) vulnerability in WordPress iQ Block Country plugin (versions <= 1.2.11). Vulnerable parameter: &blockcountry_blockmessage.
CWE-79 Sep 23, 2021
CVE-2021-41381 7.5 HIGH 2 PoCs Analysis NUCLEI EPSS 0.84
Payara Micro Community < 5.2021.6 - Path Traversal
Payara Micro Community 5.2021.6 and below allows Directory Traversal.
CWE-22 Sep 23, 2021
CVE-2021-40875 7.5 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.81
Gurock TestRail <7.2.0.3014 - Info Disclosure
Improper Access Control in Gurock TestRail versions < 7.2.0.3014 resulted in sensitive information exposure. A threat actor can access the /files.md5 file on the client side of a Gurock TestRail application, disclosing a full list of application files and the corresponding file paths. The corresponding file paths can be tested, and in some cases, result in the disclosure of hardcoded credentials, API keys, or other sensitive data.
CWE-425 Sep 22, 2021
CVE-2021-36260 9.8 CRITICAL KEV 17 PoCs Analysis NUCLEI EPSS 0.94
Hikvision IP Camera Unauthenticated Command Injection
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
CWE-78 Sep 22, 2021
CVE-2021-40868 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.24
Cloudron 6.2 - XSS
In Cloudron 6.2, the returnTo parameter on the login page is vulnerable to Reflected XSS.
CWE-79 Sep 21, 2021
CVE-2021-39327 5.3 MEDIUM 2 PoCs Analysis NUCLEI EPSS 0.91
Wordpress BulletProof Security Backup Disclosure
The BulletProof Security WordPress plugin is vulnerable to sensitive information disclosure due to a file path disclosure in the publicly accessible ~/db_backup_log.txt file which grants attackers the full path of the site, in addition to the path of database backup files. This affects versions up to, and including, 5.1.
CWE-200 Sep 17, 2021
CVE-2021-40438 9.0 CRITICAL KEV RANSOMWARE 12 PoCs Analysis NUCLEI EPSS 0.94
Apache HTTP Server <2.4.48 - SSRF
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
CWE-918 Sep 16, 2021
CVE-2021-33045 9.8 CRITICAL KEV 3 PoCs Analysis NUCLEI EPSS 0.94
Dahua - Auth Bypass
The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.
CWE-287 Sep 15, 2021
CVE-2021-33044 9.8 CRITICAL KEV 8 PoCs Analysis NUCLEI EPSS 0.94
Dahua - Auth Bypass
The identity authentication bypass vulnerability found in some Dahua products during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.
CWE-287 Sep 15, 2021