Vulnerabilities with Nuclei Scanner Templates

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,589 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,361 vendors 43,897 researchers
4,077 results Clear all
CVE-2021-33690 9.9 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
SAP Netweaver Development Infrastructure - SSRF
Server-Side Request Forgery (SSRF) vulnerability has been detected in the SAP NetWeaver Development Infrastructure Component Build Service versions - 7.11, 7.20, 7.30, 7.31, 7.40, 7.50The SAP NetWeaver Development Infrastructure Component Build Service allows a threat actor who has access to the server to perform proxy attacks on server by sending crafted queries. Due to this, the threat actor could completely compromise sensitive data residing on the Server and impact its availability.Note: The impact of this vulnerability depends on whether SAP NetWeaver Development Infrastructure (NWDI) runs on the intranet or internet. The CVSS score reflects the impact considering the worst-case scenario that it runs on the internet.
CWE-918 Sep 15, 2021
CVE-2021-39211 5.3 MEDIUM EXPLOITED NUCLEI EPSS 0.39
Glpi < 9.5.6 - Information Disclosure
GLPI is a free Asset and IT management software package. Starting in version 9.2 and prior to version 9.5.6, the telemetry endpoint discloses GLPI and server information. This issue is fixed in version 9.5.6. As a workaround, remove the file `ajax/telemetry.php`, which is not needed for usual functions of GLPI.
CWE-200 Sep 15, 2021
CVE-2021-38156 5.4 MEDIUM NUCLEI EPSS 0.84
Nagios XI <5.8.6 - XSS
In Nagios XI before 5.8.6, XSS exists in the dashboard page (/dashboards/#) when administrative users attempt to edit a dashboard.
CWE-79 Sep 15, 2021
CVE-2021-38647 9.8 CRITICAL KEV RANSOMWARE 13 PoCs Analysis NUCLEI EPSS 0.94
Microsoft OMI Management Interface Authentication Bypass
Open Management Infrastructure Remote Code Execution Vulnerability
Sep 15, 2021
CVE-2021-33544 7.2 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Multiple Camera Devices - Command Injection
Multiple camera devices by UDP Technology, Geutebrück and other vendors are vulnerable to command injection, which may allow an attacker to remotely execute arbitrary code.
CWE-78 Sep 13, 2021
CVE-2021-40870 9.8 CRITICAL KEV 6 PoCs Analysis NUCLEI EPSS 0.94
Aviatrix Controller <6.5-1804.1922 - Code Injection
An issue was discovered in Aviatrix Controller 6.x before 6.5-1804.1922. Unrestricted upload of a file with a dangerous type is possible, which allows an unauthenticated user to execute arbitrary code via directory traversal.
CWE-23 Sep 13, 2021
CVE-2021-38540 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.92
Airflow >=2.0.0-<2.1.3 - RCE/Info Disclosure
The variable import endpoint was not protected by authentication in Airflow >=2.0.0, <2.1.3. This allowed unauthenticated users to hit that endpoint to add/modify Airflow variables used in DAGs, potentially resulting in a denial of service, information disclosure or remote code execution. This issue affects Apache Airflow >=2.0.0, <2.1.3.
CWE-269 Sep 09, 2021
CVE-2021-39501 6.1 MEDIUM NUCLEI EPSS 0.32
Eyoucms - Open Redirect
EyouCMS 1.5.4 is vulnerable to Open Redirect. An attacker can redirect a user to a malicious url via the Logout function.
CWE-601 Sep 07, 2021
CVE-2021-38704 6.1 MEDIUM NUCLEI EPSS 0.05
ClinicCases 7.3.3 - XSS
Multiple reflected cross-site scripting (XSS) vulnerabilities in ClinicCases 7.3.3 allow unauthenticated attackers to introduce arbitrary JavaScript by crafting a malicious URL. This can result in account takeover via session token theft.
CWE-79 Sep 07, 2021
CVE-2021-40539 9.8 CRITICAL KEV RANSOMWARE 6 PoCs Analysis NUCLEI EPSS 0.94
ManageEngine ADSelfService Plus CVE-2021-40539
Zoho ManageEngine ADSelfService Plus version 6113 and prior is vulnerable to REST API authentication bypass with resultant remote code execution.
CWE-706 Sep 07, 2021
CVE-2021-39322 6.1 MEDIUM NUCLEI EPSS 0.14
Cybernetikz Easy Social Icons < 3.0.9 - XSS
The Easy Social Icons plugin <= 3.0.8 for WordPress echoes out the raw value of `$_SERVER['PHP_SELF']` in its main file. On certain configurations including Apache+modPHP this makes it possible to use it to perform a reflected Cross-Site Scripting attack by injecting malicious code in the request path.
CWE-79 Sep 02, 2021
CVE-2021-38314 5.3 MEDIUM 7 PoCs Analysis NUCLEI EPSS 0.92
Gutenberg Template Library & Redux Framework < 4.2.11 - Information Disclosure
The Gutenberg Template Library & Redux Framework plugin <= 4.2.11 for WordPress registered several AJAX actions available to unauthenticated users in the `includes` function in `redux-core/class-redux-core.php` that were unique to a given site but deterministic and predictable given that they were based on an md5 hash of the site URL with a known salt value of '-redux' and an md5 hash of the previous hash with a known salt value of '-support'. These AJAX actions could be used to retrieve a list of active plugins and their versions, the site's PHP version, and an unsalted md5 hash of site’s `AUTH_KEY` concatenated with the `SECURE_AUTH_KEY`.
CWE-200 Sep 02, 2021
CVE-2021-39320 6.1 MEDIUM NUCLEI EPSS 0.20
Underconstruction < 1.19 - XSS
The underConstruction plugin <= 1.18 for WordPress echoes out the raw value of `$GLOBALS['PHP_SELF']` in the ucOptions.php file. On certain configurations including Apache+modPHP, this makes it possible to use it to perform a reflected Cross-Site Scripting attack by injecting malicious code in the request path.
CWE-79 Sep 01, 2021
CVE-2021-37415 9.8 CRITICAL KEV NUCLEI EPSS 0.92
Zohocorp Manageengine Servicedesk Plus - Missing Authentication
Zoho ManageEngine ServiceDesk Plus before 11302 is vulnerable to authentication bypass that allows a few REST-API URLs without authentication.
CWE-306 Sep 01, 2021
CVE-2021-39316 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Digitalzoomstudio Zoomsounds < 6.45 - Path Traversal
The Zoomsounds plugin <= 6.45 for WordPress allows arbitrary files, including sensitive configuration files such as wp-config.php, to be downloaded via the `dzsap_download` action using directory traversal in the `link` parameter.
CWE-22 Aug 31, 2021
CVE-2021-36356 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
KRAMER VIAware - RCE
KRAMER VIAware through August 2021 allows remote attackers to execute arbitrary code because ajaxPages/writeBrowseFilePathAjax.php accepts arbitrary executable pathnames (even though browseSystemFiles.php is no longer reachable via the GUI). NOTE: this issue exists because of an incomplete fix for CVE-2019-17124.
CWE-434 Aug 31, 2021
CVE-2021-37416 6.1 MEDIUM NUCLEI EPSS 0.07
Zohocorp Manageengine Adselfservice Plus < 6.1 - XSS
Zoho ManageEngine ADSelfService Plus version 6103 and prior is vulnerable to reflected XSS on the loadframe page.
CWE-79 Aug 30, 2021
CVE-2021-27909 6.3 MEDIUM NUCLEI EPSS 0.19
Mautic <3.3.4 - Cross-Site Scripting
For Mautic versions prior to 3.3.4/4.0.0, there is an XSS vulnerability on Mautic's password reset page where a vulnerable parameter, "bundle," in the URL could allow an attacker to execute Javascript code. The attacker would be required to convince or trick the target into clicking a password reset URL with the vulnerable parameter utilized.
CWE-79 Aug 30, 2021
CVE-2021-26084 9.8 CRITICAL KEV RANSOMWARE 41 PoCs Analysis NUCLEI EPSS 0.94
Atlassian Confluence Server and Data Center - OGNL Injection
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are before version 6.13.23, from version 6.14.0 before 7.4.11, from version 7.5.0 before 7.11.6, and from version 7.12.0 before 7.12.5.
CWE-917 Aug 30, 2021
CVE-2021-38154 7.5 HIGH EXPLOITED NUCLEI EPSS 0.09
Canon devices <2020 - Info Disclosure
Certain Canon devices manufactured in 2012 through 2020 (such as imageRUNNER ADVANCE iR-ADV C5250), when Catwalk Server is enabled for HTTP access, allow remote attackers to modify an e-mail address setting, and thus cause the device to send sensitive information through e-mail to the attacker. For example, an incoming FAX may be sent through e-mail to the attacker. This occurs when a PIN is not required for General User Mode, as exploited in the wild in August 2021.
CWE-732 Aug 29, 2021