Vulnerabilities with Nuclei Scanner Templates

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,589 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,361 vendors 43,897 researchers
4,077 results Clear all
CVE-2021-39165 8.1 HIGH 2 PoCs Analysis NUCLEI EPSS 0.89
Chachethq Cachet < 2.3.18 - Authentication Bypass
Cachet is an open source status page. With Cachet prior to and including 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session. The original repository of Cachet <https://github.com/CachetHQ/Cachet> is not active, the stable version 2.3.18 and it's developing 2.4 branch is affected.
CWE-287 Aug 26, 2021
CVE-2021-32648 8.2 HIGH KEV 2 PoCs 1 Writeup Analysis NUCLEI EPSS 0.93
October < 1.1.5 - Authentication Bypass
octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5.
CWE-287 Aug 26, 2021
CVE-2021-37538 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.92
Smartdatasoft Smartblog < 4.06 - SQL Injection
Multiple SQL injection vulnerabilities in SmartDataSoft SmartBlog for PrestaShop before 4.06 allow a remote unauthenticated attacker to execute arbitrary SQL commands via the day, month, or year parameter to the controllers/front/archive.php archive controller, or the id_category parameter to the controllers/front/category.php category controller.
CWE-89 Aug 24, 2021
CVE-2021-39152 8.5 HIGH EXPLOITED NUCLEI EPSS 0.62
Xstream < 1.4.18 - SSRF
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.
CWE-502 Aug 23, 2021
CVE-2021-39146 8.5 HIGH NUCLEI EPSS 0.47
Debian Linux < 1.4.18 - Insecure Deserialization
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
CWE-502 Aug 23, 2021
CVE-2021-39144 8.5 HIGH KEV 2 PoCs Analysis NUCLEI EPSS 0.94
Xstream < 1.4.18 - Missing Authentication
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
CWE-502 Aug 23, 2021
CVE-2021-39141 8.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.82
Xstream < 1.4.18 - Insecure Deserialization
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
CWE-502 Aug 23, 2021
CVE-2021-36748 7.5 HIGH NUCLEI EPSS 0.83
Prestahome Blog < 1.7.8 - SQL Injection
A SQL Injection issue in the list controller of the Prestahome Blog (aka ph_simpleblog) module before 1.7.8 for Prestashop allows a remote attacker to extract data from the database via the sb_category parameter.
CWE-89 Aug 20, 2021
CVE-2021-37598 5.3 MEDIUM NUCLEI EPSS 0.06
Wpcerber WP Cerber < 8.9.3 - Incorrect Authorization
WP Cerber before 8.9.3 allows bypass of /wp-json access control via a trailing ? character.
CWE-863 Aug 19, 2021
CVE-2021-38702 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.35
Cyberoam NetGenie - XSS
Cyberoam NetGenie C0101B1-20141120-NG11VO devices through 2021-08-14 allow tweb/ft.php?u=[XSS] attacks.
CWE-79 Aug 17, 2021
CVE-2021-34643 6.1 MEDIUM NUCLEI EPSS 0.08
Skaut-bazar < 1.3.2 - XSS
The Skaut bazar WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/skaut-bazar.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.2.
CWE-79 Aug 16, 2021
CVE-2021-38751 4.3 MEDIUM NUCLEI EPSS 0.08
ExponentCMS <2.6 - SSRF
A HTTP Host header attack exists in ExponentCMS 2.6 and below in /exponent_constants.php. A modified HTTP header can change links on the webpage to an arbitrary value, leading to a possible attack vector for MITM.
CWE-116 Aug 16, 2021
CVE-2021-35395 9.8 CRITICAL KEV NUCLEI EPSS 0.94
Realtek Jungle SDK <3.4.14B - Buffer Overflow
Realtek Jungle SDK version v2.x up to v3.4.14B provides an HTTP web server exposing a management interface that can be used to configure the access point. Two versions of this management interface exists: one based on Go-Ahead named webs and another based on Boa named boa. Both of them are affected by these vulnerabilities. Specifically, these binaries are vulnerable to the following issues: - stack buffer overflow in formRebootCheck due to unsafe copy of submit-url parameter - stack buffer overflow in formWsc due to unsafe copy of submit-url parameter - stack buffer overflow in formWlanMultipleAP due to unsafe copy of submit-url parameter - stack buffer overflow in formWlSiteSurvey due to unsafe copy of ifname parameter - stack buffer overflow in formStaticDHCP due to unsafe copy of hostname parameter - stack buffer overflow in formWsc due to unsafe copy of 'peerPin' parameter - arbitrary command execution in formSysCmd via the sysCmd parameter - arbitrary command injection in formWsc via the 'peerPin' parameter Exploitability of identified issues will differ based on what the end vendor/manufacturer did with the Realtek SDK webserver. Some vendors use it as-is, others add their own authentication implementation, some kept all the features from the server, some remove some of them, some inserted their own set of features. However, given that Realtek SDK implementation is full of insecure calls and that developers tends to re-use those examples in their custom code, any binary based on Realtek SDK webserver will probably contains its own set of issues on top of the Realtek ones (if kept). Successful exploitation of these issues allows remote attackers to gain arbitrary code execution on the device.
Aug 16, 2021
CVE-2021-26086 5.3 MEDIUM KEV 4 PoCs Analysis NUCLEI EPSS 0.94
Atlassian Jira Data Center < 8.5.14 - Path Traversal
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. The affected versions are before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1.
CWE-22 Aug 16, 2021
CVE-2021-36380 9.8 CRITICAL KEV NUCLEI EPSS 0.94
Sunhillo SureLine <8.7.0.1.1 - Code Injection
Sunhillo SureLine before 8.7.0.1.1 allows Unauthenticated OS Command Injection via shell metacharacters in ipAddr or dnsAddr /cgi/networkDiag.cgi.
CWE-78 Aug 13, 2021
CVE-2021-37704 5.4 MEDIUM 1 Writeup NUCLEI EPSS 0.53
Phpfastcache < 6.1.5 - Information Disclosure
PhpFastCache is a high-performance backend cache system (packagist package phpfastcache/phpfastcache). In versions before 6.1.5, 7.1.2, and 8.0.7 the `phpinfo()` can be exposed if the `/vendor` is not protected from public access. This is a rare situation today since the vendor directory is often located outside the web directory or protected via server rule (.htaccess, etc). Only the v6, v7 and v8 will be patched respectively in 8.0.7, 7.1.2, 6.1.5. Older versions such as v5, v4 are not longer supported and will **NOT** be patched. As a workaround, protect the `/vendor` directory from public access.
CWE-200 Aug 12, 2021
CVE-2021-34640 6.1 MEDIUM NUCLEI EPSS 0.04
Securimage-wp-fixed < 3.5.4 - XSS
The Securimage-WP-Fixed WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/securimage-wp.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.5.4.
CWE-79 Aug 11, 2021
CVE-2021-37573 6.1 MEDIUM NUCLEI EPSS 0.24
Tiny Java Web Server < 1.115 - XSS
A reflected cross-site scripting (XSS) vulnerability in the web server TTiny Java Web Server and Servlet Container (TJWS) <=1.115 allows an adversary to inject malicious code on the server's "404 Page not Found" error page
CWE-79 Aug 09, 2021
CVE-2021-37833 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.12
Digitaldruid Hoteldruid - XSS
A reflected cross-site scripting (XSS) vulnerability exists in multiple pages in version 3.0.2 of the Hotel Druid application that allows for arbitrary execution of JavaScript commands.
CWE-79 Aug 03, 2021
CVE-2021-35265 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.05
MaxSite CMS <V106 - XSS
A reflected cross-site scripting (XSS) vulnerability in MaxSite CMS before V106 via product/page/* allows remote attackers to inject arbitrary web script to a page.
CWE-79 Aug 03, 2021