Vulnerabilities with Nuclei Scanner Templates
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2021-39165
8.1
HIGH
2 PoCs
Analysis
NUCLEI
EPSS 0.89
Chachethq Cachet < 2.3.18 - Authentication Bypass
Cachet is an open source status page. With Cachet prior to and including 2.3.18, there is a SQL injection which is in the `SearchableTrait#scopeSearch()`. Attackers without authentication can utilize this vulnerability to exfiltrate sensitive data from the database such as administrator's password and session. The original repository of Cachet <https://github.com/CachetHQ/Cachet> is not active, the stable version 2.3.18 and it's developing 2.4 branch is affected.
CWE-287
Aug 26, 2021
CVE-2021-32648
8.2
HIGH
KEV
2 PoCs
1 Writeup
Analysis
NUCLEI
EPSS 0.93
October < 1.1.5 - Authentication Bypass
octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5.
CWE-287
Aug 26, 2021
CVE-2021-37538
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.92
Smartdatasoft Smartblog < 4.06 - SQL Injection
Multiple SQL injection vulnerabilities in SmartDataSoft SmartBlog for PrestaShop before 4.06 allow a remote unauthenticated attacker to execute arbitrary SQL commands via the day, month, or year parameter to the controllers/front/archive.php archive controller, or the id_category parameter to the controllers/front/category.php category controller.
CWE-89
Aug 24, 2021
CVE-2021-39152
8.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.62
Xstream < 1.4.18 - SSRF
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.
CWE-502
Aug 23, 2021
CVE-2021-39146
8.5
HIGH
NUCLEI
EPSS 0.47
Debian Linux < 1.4.18 - Insecure Deserialization
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
CWE-502
Aug 23, 2021
CVE-2021-39144
8.5
HIGH
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Xstream < 1.4.18 - Missing Authentication
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
CWE-502
Aug 23, 2021
CVE-2021-39141
8.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.82
Xstream < 1.4.18 - Insecure Deserialization
XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose.
CWE-502
Aug 23, 2021
CVE-2021-36748
7.5
HIGH
NUCLEI
EPSS 0.83
Prestahome Blog < 1.7.8 - SQL Injection
A SQL Injection issue in the list controller of the Prestahome Blog (aka ph_simpleblog) module before 1.7.8 for Prestashop allows a remote attacker to extract data from the database via the sb_category parameter.
CWE-89
Aug 20, 2021
CVE-2021-37598
5.3
MEDIUM
NUCLEI
EPSS 0.06
Wpcerber WP Cerber < 8.9.3 - Incorrect Authorization
WP Cerber before 8.9.3 allows bypass of /wp-json access control via a trailing ? character.
CWE-863
Aug 19, 2021
CVE-2021-38702
6.1
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.35
Cyberoam NetGenie - XSS
Cyberoam NetGenie C0101B1-20141120-NG11VO devices through 2021-08-14 allow tweb/ft.php?u=[XSS] attacks.
CWE-79
Aug 17, 2021
CVE-2021-34643
6.1
MEDIUM
NUCLEI
EPSS 0.08
Skaut-bazar < 1.3.2 - XSS
The Skaut bazar WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/skaut-bazar.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.2.
CWE-79
Aug 16, 2021
CVE-2021-38751
4.3
MEDIUM
NUCLEI
EPSS 0.08
ExponentCMS <2.6 - SSRF
A HTTP Host header attack exists in ExponentCMS 2.6 and below in /exponent_constants.php. A modified HTTP header can change links on the webpage to an arbitrary value, leading to a possible attack vector for MITM.
CWE-116
Aug 16, 2021
CVE-2021-35395
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.94
Realtek Jungle SDK <3.4.14B - Buffer Overflow
Realtek Jungle SDK version v2.x up to v3.4.14B provides an HTTP web server exposing a management interface that can be used to configure the access point. Two versions of this management interface exists: one based on Go-Ahead named webs and another based on Boa named boa. Both of them are affected by these vulnerabilities. Specifically, these binaries are vulnerable to the following issues: - stack buffer overflow in formRebootCheck due to unsafe copy of submit-url parameter - stack buffer overflow in formWsc due to unsafe copy of submit-url parameter - stack buffer overflow in formWlanMultipleAP due to unsafe copy of submit-url parameter - stack buffer overflow in formWlSiteSurvey due to unsafe copy of ifname parameter - stack buffer overflow in formStaticDHCP due to unsafe copy of hostname parameter - stack buffer overflow in formWsc due to unsafe copy of 'peerPin' parameter - arbitrary command execution in formSysCmd via the sysCmd parameter - arbitrary command injection in formWsc via the 'peerPin' parameter Exploitability of identified issues will differ based on what the end vendor/manufacturer did with the Realtek SDK webserver. Some vendors use it as-is, others add their own authentication implementation, some kept all the features from the server, some remove some of them, some inserted their own set of features. However, given that Realtek SDK implementation is full of insecure calls and that developers tends to re-use those examples in their custom code, any binary based on Realtek SDK webserver will probably contains its own set of issues on top of the Realtek ones (if kept). Successful exploitation of these issues allows remote attackers to gain arbitrary code execution on the device.
Aug 16, 2021
CVE-2021-26086
5.3
MEDIUM
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Atlassian Jira Data Center < 8.5.14 - Path Traversal
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to read particular files via a path traversal vulnerability in the /WEB-INF/web.xml endpoint. The affected versions are before version 8.5.14, from version 8.6.0 before 8.13.6, and from version 8.14.0 before 8.16.1.
CWE-22
Aug 16, 2021
CVE-2021-36380
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.94
Sunhillo SureLine <8.7.0.1.1 - Code Injection
Sunhillo SureLine before 8.7.0.1.1 allows Unauthenticated OS Command Injection via shell metacharacters in ipAddr or dnsAddr /cgi/networkDiag.cgi.
CWE-78
Aug 13, 2021
CVE-2021-37704
5.4
MEDIUM
1 Writeup
NUCLEI
EPSS 0.53
Phpfastcache < 6.1.5 - Information Disclosure
PhpFastCache is a high-performance backend cache system (packagist package phpfastcache/phpfastcache). In versions before 6.1.5, 7.1.2, and 8.0.7 the `phpinfo()` can be exposed if the `/vendor` is not protected from public access. This is a rare situation today since the vendor directory is often located outside the web directory or protected via server rule (.htaccess, etc). Only the v6, v7 and v8 will be patched respectively in 8.0.7, 7.1.2, 6.1.5. Older versions such as v5, v4 are not longer supported and will **NOT** be patched. As a workaround, protect the `/vendor` directory from public access.
CWE-200
Aug 12, 2021
CVE-2021-34640
6.1
MEDIUM
NUCLEI
EPSS 0.04
Securimage-wp-fixed < 3.5.4 - XSS
The Securimage-WP-Fixed WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/securimage-wp.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 3.5.4.
CWE-79
Aug 11, 2021
CVE-2021-37573
6.1
MEDIUM
NUCLEI
EPSS 0.24
Tiny Java Web Server < 1.115 - XSS
A reflected cross-site scripting (XSS) vulnerability in the web server TTiny Java Web Server and Servlet Container (TJWS) <=1.115 allows an adversary to inject malicious code on the server's "404 Page not Found" error page
CWE-79
Aug 09, 2021
CVE-2021-37833
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.12
Digitaldruid Hoteldruid - XSS
A reflected cross-site scripting (XSS) vulnerability exists in multiple pages in version 3.0.2 of the Hotel Druid application that allows for arbitrary execution of JavaScript commands.
CWE-79
Aug 03, 2021
CVE-2021-35265
6.1
MEDIUM
1 Writeup
NUCLEI
EPSS 0.05
MaxSite CMS <V106 - XSS
A reflected cross-site scripting (XSS) vulnerability in MaxSite CMS before V106 via product/page/* allows remote attackers to inject arbitrary web script to a page.
CWE-79
Aug 03, 2021