Vulnerabilities with Nuclei Scanner Templates

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,589 CVEs tracked 53,640 with exploits 4,860 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,361 vendors 43,897 researchers
4,077 results Clear all
CVE-2021-32819 8.0 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.90
Squirrelly <9.0.0 - RCE
Squirrelly is a template engine implemented in JavaScript that works out of the box with ExpressJS. Squirrelly mixes pure template data with engine configuration options through the Express render API. By overwriting internal configuration options remote code execution may be triggered in downstream applications. This issue is fixed in version 9.0.0. For complete details refer to the referenced GHSL-2021-023.
CWE-200 May 14, 2021
CVE-2021-28799 10.0 CRITICAL KEV RANSOMWARE NUCLEI EPSS 0.91
QNAP HBS 3 - Broken Access Control
An improper authorization vulnerability has been reported to affect QNAP NAS running HBS 3 (Hybrid Backup Sync. ) If exploited, the vulnerability allows remote attackers to log in to a device. This issue affects: QNAP Systems Inc. HBS 3 versions prior to v16.0.0415 on QTS 4.5.2; versions prior to v3.0.210412 on QTS 4.3.6; versions prior to v3.0.210411 on QTS 4.3.4; versions prior to v3.0.210411 on QTS 4.3.3; versions prior to v16.0.0419 on QuTS hero h4.5.1; versions prior to v16.0.0419 on QuTScloud c4.5.1~c4.5.4. This issue does not affect: QNAP Systems Inc. HBS 2 . QNAP Systems Inc. HBS 1.3 .
CWE-285 May 13, 2021
CVE-2021-30213 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.04
Knowage Suite 7.3 - XSS
Knowage Suite 7.3 is vulnerable to unauthenticated reflected cross-site scripting (XSS). An attacker can inject arbitrary web script in '/servlet/AdapterHTTP' via the 'targetService' parameter.
CWE-79 May 12, 2021
CVE-2021-31195 6.5 MEDIUM NUCLEI EPSS 0.78
Microsoft Exchange Server - Authentication Bypass by Spoofing
Microsoft Exchange Server Remote Code Execution Vulnerability
CWE-290 May 11, 2021
CVE-2021-31537 6.1 MEDIUM NUCLEI EPSS 0.88
Sisinformatik Sis-rewe GO < 7.7 - XSS
SIS SIS-REWE Go before 7.7 SP17 allows XSS: rewe/prod/web/index.php (affected parameters are config, version, win, db, pwd, and user) and /rewe/prod/web/rewe_go_check.php (version and all other parameters).
CWE-79 May 11, 2021
CVE-2021-31755 9.8 CRITICAL KEV NUCLEI EPSS 0.94
Tenda Ac11 Firmware < 02.03.01.104_cn - Out-of-Bounds Write
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CWE-787 May 07, 2021
CVE-2021-29203 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.90
HP Edgeline Infrastructure Manager < 1.22 - Missing Authentication
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gaining privileged access, causing denial of service, and changing the configuration. HPE has released a software update to resolve the vulnerability in the HPE Edgeline Infrastructure Manager.
CWE-306 May 06, 2021
CVE-2021-28151 8.8 HIGH EXPLOITED NUCLEI EPSS 0.93
Hongdian H8922 3.0.5 - Remote Command Injection
Hongdian H8922 3.0.5 devices allow OS command injection via shell metacharacters into the ip-address (aka Destination) field to the tools.cgi ping command, which is accessible with the username guest and password guest.
CWE-78 May 06, 2021
CVE-2021-28150 5.5 MEDIUM EXPLOITED NUCLEI EPSS 0.79
Hongdian H8922 3.0.5 - Information Disclosure
Hongdian H8922 3.0.5 devices allow the unprivileged guest user to read cli.conf (with the administrator password and other sensitive data) via /backup2.cgi.
CWE-425 May 06, 2021
CVE-2021-28149 6.5 MEDIUM EXPLOITED NUCLEI EPSS 0.91
Hongdian H8922 3.0.5 Devices - Local File Inclusion
Hongdian H8922 3.0.5 devices allow Directory Traversal. The /log_download.cgi log export handler does not validate user input and allows a remote attacker with minimal privileges to download any file from the device by substituting ../ (e.g., ../../etc/passwd) This can be carried out with a web browser by changing the file name accordingly. Upon visiting log_download.cgi?type=../../etc/passwd and logging in, the web server will allow a download of the contents of the /etc/passwd file.
CWE-22 May 06, 2021
CVE-2021-32030 9.8 CRITICAL KEV NUCLEI EPSS 0.94
Asus Lyra Mini Firmware < 3.0.0.4.384.46630 - Authentication Bypass
The administrator application on ASUS GT-AC2900 devices before 3.0.0.4.386.42643 and Lyra Mini before 3.0.0.4_384_46630 allows authentication bypass when processing remote input from an unauthenticated user, leading to unauthorized access to the administrator interface. This relates to handle_request in router/httpd/httpd.c and auth_check in web_hook.o. An attacker-supplied value of '\0' matches the device's default value of '\0' in some situations. Note: All versions of Lyra Mini and earlier which are unsupported (End-of-Life, EOL) are also affected by this vulnerability, Consumers can mitigate this vulnerability by disabling the remote access features from WAN.
CWE-287 May 06, 2021
CVE-2021-29490 5.8 MEDIUM NUCLEI EPSS 0.88
Jellyfin < 10.7.3 - SSRF
Jellyfin is a free software media system that provides media from a dedicated server to end-user devices via multiple apps. Verions prior to 10.7.3 vulnerable to unauthenticated Server-Side Request Forgery (SSRF) attacks via the imageUrl parameter. This issue potentially exposes both internal and external HTTP servers or other resources available via HTTP `GET` that are visible from the Jellyfin server. The vulnerability is patched in version 10.7.3. As a workaround, disable external access to the API endpoints `/Items/*/RemoteImages/Download`, `/Items/RemoteSearch/Image` and `/Images/Remote` via reverse proxy, or limit to known-friendly IPs.
CWE-918 May 06, 2021
CVE-2021-29484 6.8 MEDIUM NUCLEI EPSS 0.57
Ghost < 4.3.3 - XSS
Ghost is a Node.js CMS. An unused endpoint added during the development of 4.0.0 has left sites vulnerable to untrusted users gaining access to Ghost Admin. Attackers can gain access by getting logged in users to click a link containing malicious code. Users do not need to enter credentials and may not know they've visited a malicious site. Ghost(Pro) has already been patched. We can find no evidence that the issue was exploited on Ghost(Pro) prior to the patch being added. Self-hosters are impacted if running Ghost a version between 4.0.0 and 4.3.2. Immediate action should be taken to secure your site. The issue has been fixed in 4.3.3, all 4.x sites should upgrade as soon as possible. As the endpoint is unused, the patch simply removes it. As a workaround blocking access to /ghost/preview can also mitigate the issue.
CWE-79 Apr 29, 2021
CVE-2021-27651 9.8 CRITICAL 3 PoCs Analysis NUCLEI EPSS 0.92
Pega Infinity <8.5.2 - Auth Bypass
In versions 8.2.1 through 8.5.2 of Pega Infinity, the password reset functionality for local accounts can be used to bypass local authentication checks.
CWE-287 Apr 29, 2021
CVE-2021-31856 9.8 CRITICAL 1 PoC Analysis NUCLEI EPSS 0.79
Layer5 Meshery - SQL Injection
A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/meshery_pattern_persister.go).
CWE-89 Apr 28, 2021
CVE-2021-29442 8.6 HIGH EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.93
Alibaba Nacos < 1.4.1 - Missing Authentication
Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, the ConfigOpsController lets the user perform management operations like querying the database or even wiping it out. While the /data/remove endpoint is properly protected with the @Secured annotation, the /derby endpoint is not protected and can be openly accessed by unauthenticated users. These endpoints are only valid when using embedded storage (derby DB) so this issue should not affect those installations using external storage (e.g. mysql)
CWE-306 Apr 27, 2021
CVE-2021-29441 8.6 HIGH EXPLOITED 4 PoCs Analysis NUCLEI EPSS 0.94
Alibaba Nacos < 1.4.1 - Authentication Bypass by Spoofing
Nacos is a platform designed for dynamic service discovery and configuration and service management. In Nacos before version 1.4.1, when configured to use authentication (-Dnacos.core.auth.enabled=true) Nacos uses the AuthFilter servlet filter to enforce authentication. This filter has a backdoor that enables Nacos servers to bypass this filter and therefore skip authentication checks. This mechanism relies on the user-agent HTTP header so it can be easily spoofed. This issue may allow any user to carry out any administrative tasks on the Nacos server.
CWE-290 Apr 27, 2021
CVE-2021-30128 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.94
Apache OFBiz <17.12.07 - Deserialization
Apache OFBiz has unsafe deserialization prior to 17.12.07 version
CWE-502 Apr 27, 2021
CVE-2021-29200 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.92
Apache Ofbiz < 17.12.07 - Insecure Deserialization
Apache OFBiz has unsafe deserialization prior to 17.12.07 version An unauthenticated user can perform an RCE attack
CWE-502 Apr 27, 2021
CVE-2021-25899 7.5 HIGH EXPLOITED NUCLEI EPSS 0.73
Void Aurall Rec Monitor - SQL Injection
An issue was discovered in svc-login.php in Void Aural Rec Monitor 9.0.0.1. An unauthenticated attacker can send a crafted HTTP request to perform a blind time-based SQL Injection. The vulnerable parameter is param1.
CWE-89 Apr 23, 2021