Vulnerabilities with Nuclei Scanner Templates
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2021-32819
8.0
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.90
Squirrelly <9.0.0 - RCE
Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. This issue is fixed in version 9.0.0. For complete details refer to the referenced GHSL-2021-023.
CWE-200
May 14, 2021
CVE-2021-28799
10.0
CRITICAL
KEV
RANSOMWARE
NUCLEI
EPSS 0.91
QNAP HBS 3 - Broken Access Control
An improper authorization vulnerability has been reported to affect QNAP NAS running HBS 3 (Hybrid Backup Sync. ) If exploited, the vulnerability allows remote attackers to log in to a device. This issue affects: QNAP Systems Inc. HBS 3 versions prior to v16.0.0415 on QTS 4.5.2; versions prior to v3.0.210412 on QTS 4.3.6; versions prior to v3.0.210411 on QTS 4.3.4; versions prior to v3.0.210411 on QTS 4.3.3; versions prior to v16.0.0419 on QuTS hero h4.5.1; versions prior to v16.0.0419 on QuTScloud c4.5.1~c4.5.4. This issue does not affect: QNAP Systems Inc. HBS 2 . QNAP Systems Inc. HBS 1.3 .
CWE-285
May 13, 2021
CVE-2021-30213
6.1
MEDIUM
1 Writeup
NUCLEI
EPSS 0.04
Knowage Suite 7.3 - XSS
Knowage Suite 7.3 is vulnerable to unauthenticated reflected cross-site scripting (XSS). An attacker can inject arbitrary web script in '/servlet/AdapterHTTP' via the 'targetService' parameter.
CWE-79
May 12, 2021
CVE-2021-31195
6.5
MEDIUM
NUCLEI
EPSS 0.78
Microsoft Exchange Server - Authentication Bypass by Spoofing
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-290
May 11, 2021
CVE-2021-31537
6.1
MEDIUM
NUCLEI
EPSS 0.88
Sisinformatik Sis-rewe GO < 7.7 - XSS
SIS SIS-REWE Go before 7.7 SP17 allows XSS: rewe/prod/web/index.php (affected parameters are config, version, win, db, pwd, and user) and /rewe/prod/web/rewe_go_check.php (version and all other parameters).
CWE-79
May 11, 2021
CVE-2021-31755
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.94
Tenda Ac11 Firmware < 02.03.01.104_cn - Out-of-Bounds Write
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CWE-787
May 07, 2021
CVE-2021-29203
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.90
HP Edgeline Infrastructure Manager < 1.22 - Missing Authentication
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access, causing denial of service, and changing the configuration. HPE has released a software update to resolve the vulnerability in the HPE Edgeline Infrastructure Manager.
CWE-306
May 06, 2021
CVE-2021-28151
8.8
HIGH
EXPLOITED
NUCLEI
EPSS 0.93
Hongdian H8922 3.0.5 - Remote Command Injection
Hongdian H8922 3.0.5 devices allow OS command injection via shell metacharacters into the ip-address (aka Destination) field to the tools.cgi ping command, which is accessible with the username guest and password guest.
CWE-78
May 06, 2021
CVE-2021-28150
5.5
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.79
Hongdian H8922 3.0.5 - Information Disclosure
Hongdian H8922 3.0.5 devices allow the unprivileged guest user to read cli.conf (with the administrator password and other sensitive data) via /backup2.cgi.
CWE-425
May 06, 2021
CVE-2021-28149
6.5
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.91
Hongdian H8922 3.0.5 Devices - Local File Inclusion
Hongdian H8922 3.0.5 devices allow Directory Traversal. The /log_download.cgi log export handler does not validate user input and allows a remote attacker with minimal privileges to download any file from the device by substituting ../ (e.g., ../../etc/passwd) This can be carried out with a web browser by changing the file name accordingly. Upon visiting log_download.cgi?type=../../etc/passwd and logging in, the web server will allow a download of the contents of the /etc/passwd file.
CWE-22
May 06, 2021
CVE-2021-32030
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.94
Asus Lyra Mini Firmware < 3.0.0.4.384.46630 - Authentication Bypass
The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 and Lyra Mini before 3.0.0.4_384_46630 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. Note: All versions of Lyra Mini and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability, Consumers can mitigate this vulnerability by disabling the remote access features from WAN.
CWE-287
May 06, 2021
CVE-2021-29490
5.8
MEDIUM
NUCLEI
EPSS 0.88
Jellyfin < 10.7.3 - SSRF
Jellyfin is a free software media system that provides media from a dedicated server to end-user devices via multiple apps. Verions prior to 10.7.3 vulnerable to unauthenticated Server-Side Request Forgery (SSRF) attacks via the imageUrl parameter. This issue potentially exposes both internal and external HTTP servers or other resources available via HTTP `GET` that are visible from the Jellyfin server. The vulnerability is patched in version 10.7.3. As a workaround, disable external access to the API endpoints `/Items/*/RemoteImages/Download`, `/Items/RemoteSearch/Image` and `/Images/Remote` via reverse proxy, or limit to known-friendly IPs.
CWE-918
May 06, 2021
CVE-2021-29484
6.8
MEDIUM
NUCLEI
EPSS 0.57
Ghost < 4.3.3 - XSS
Ghost is a Node.js CMS. An unused endpoint added during the development of 4.0.0 has left sites vulnerable to untrusted users gaining access to Ghost Admin. Attackers can gain access by getting logged in users to click a link containing malicious code. Users do not need to enter credentials and may not know they've visited a malicious site. Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added. Self-hosters are impacted if running Ghost a version between 4.0.0 and 4.3.2. Immediate action should be taken to secure your site. The issue has been fixed in 4.3.3, all 4.x sites should upgrade as soon as possible. As the endpoint is unused, the patch simply removes it. As a workaround blocking access to /ghost/preview can also mitigate the issue.
CWE-79
Apr 29, 2021
CVE-2021-27651
9.8
CRITICAL
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Pega Infinity <8.5.2 - Auth Bypass
In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionality for local accounts can be used to bypass local authentication checks.
CWE-287
Apr 29, 2021
CVE-2021-31856
9.8
CRITICAL
1 PoC
Analysis
NUCLEI
EPSS 0.79
Layer5 Meshery - SQL Injection
A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/meshery_pattern_persister.go).
CWE-89
Apr 28, 2021
CVE-2021-29442
8.6
HIGH
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.93
Alibaba Nacos < 1.4.1 - Missing Authentication
Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, the ConfigOpsController lets the user perform management operations like querying the database or even wiping it out. While the /data/remove endpoint is properly protected with the @Secured annotation, the /derby endpoint is not protected and can be openly accessed by unauthenticated users. These endpoints are only valid when using embedded storage (derby DB) so this issue should not affect those installations using external storage (e.g. mysql)
CWE-306
Apr 27, 2021
CVE-2021-29441
8.6
HIGH
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Alibaba Nacos < 1.4.1 - Authentication Bypass by Spoofing
Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true) Nacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the user-agent HTTP header so it can be easily spoofed. This issue may allow any user to carry out any administrative tasks on the Nacos server.
CWE-290
Apr 27, 2021
CVE-2021-30128
9.8
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache OFBiz <17.12.07 - Deserialization
Apache OFBiz has unsafe deserialization prior to 17.12.07 version
CWE-502
Apr 27, 2021
CVE-2021-29200
9.8
CRITICAL
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Apache Ofbiz < 17.12.07 - Insecure Deserialization
Apache OFBiz has unsafe deserialization prior to 17.12.07 version An unauthenticated user can perform an RCE attack
CWE-502
Apr 27, 2021
CVE-2021-25899
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.73
Void Aurall Rec Monitor - SQL Injection
An issue was discovered in svc-login.php in Void Aural Rec Monitor 9.0.0.1. An unauthenticated attacker can send a crafted HTTP request to perform a blind time-based SQL Injection. The vulnerable parameter is param1.
CWE-89
Apr 23, 2021