Vulnerabilities with Nuclei Scanner Templates
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2021-3287
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.88
ManageEngine OpManager SumPDU Java Deserialization
Zoho ManageEngine OpManager before 12.5.329 allows unauthenticated Remote Code Execution due to a general bypass in the deserialization class.
CWE-502
Apr 22, 2021
CVE-2021-27850
9.8
CRITICAL
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Tapestry <5.7.0 - RCE
A critical unauthenticated remote code execution vulnerability was found all recent versions of Apache Tapestry. The affected versions include 5.4.5, 5.5.0, 5.6.2 and 5.7.0. The vulnerability I have found is a bypass of the fix for CVE-2019-0195. Recap: Before the fix of CVE-2019-0195 it was possible to download arbitrary class files from the classpath by providing a crafted asset file URL. An attacker was able to download the file `AppModule.class` by requesting the URL `http://localhost:8080/assets/something/services/AppModule.class` which contains a HMAC secret key. The fix for that bug was a blacklist filter that checks if the URL ends with `.class`, `.properties` or `.xml`. Bypass: Unfortunately, the blacklist solution can simply be bypassed by appending a `/` at the end of the URL: `http://localhost:8080/assets/something/services/AppModule.class/` The slash is stripped after the blacklist check and the file `AppModule.class` is loaded into the response. This class usually contains the HMAC secret key which is used to sign serialized Java objects. With the knowledge of that key an attacker can sign a Java gadget chain that leads to RCE (e.g. CommonsBeanUtils1 from ysoserial). Solution for this vulnerability: * For Apache Tapestry 5.4.0 to 5.6.1, upgrade to 5.6.2 or later. * For Apache Tapestry 5.7.0, upgrade to 5.7.1 or later.
CWE-502
Apr 15, 2021
CVE-2021-3017
7.5
HIGH
NUCLEI
EPSS 0.81
Intelbras WIN 300/WRN 342 - Info Disclosure
The web interface on Intelbras WIN 300 and WRN 342 devices through 2021-01-04 allows remote attackers to discover credentials by reading the def_wirelesspassword line in the HTML source code.
Apr 14, 2021
CVE-2021-26812
6.1
MEDIUM
NUCLEI
EPSS 0.19
Jitsi Meet < 2.8.3 - XSS
Cross Site Scripting (XSS) in the Jitsi Meet 2.7 through 2.8.3 plugin for Moodle via the "sessionpriv.php" module. This allows attackers to craft a malicious URL, which when clicked on by users, can inject javascript code to be run by the application.
CWE-79
Apr 14, 2021
CVE-2021-28481
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.34
Microsoft Exchange Server - Remote Code Execution
Microsoft Exchange Server Remote Code Execution Vulnerability
Apr 13, 2021
CVE-2021-28480
9.8
CRITICAL
3 PoCs
Analysis
NUCLEI
EPSS 0.87
Microsoft Exchange Server - Remote Code Execution
Microsoft Exchange Server Remote Code Execution Vulnerability
Apr 13, 2021
CVE-2021-30175
9.8
CRITICAL
1 Writeup
NUCLEI
EPSS 0.86
ZEROF Web Server 1.0 - SQL Injection
ZEROF Web Server 1.0 (April 2021) allows SQL Injection via the /HandleEvent endpoint for the login page.
CWE-89
Apr 13, 2021
CVE-2021-27905
9.8
CRITICAL
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Solr - SSRF
The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2.
CWE-918
Apr 13, 2021
CVE-2021-30151
6.1
MEDIUM
NUCLEI
EPSS 0.19
Sidekiq <6.2.0 - XSS
Sidekiq through 5.1.3 and 6.x through 6.2.0 allows XSS via the queue name of the live-poll feature when Internet Explorer is used.
CWE-79
Apr 06, 2021
CVE-2021-3374
5.3
MEDIUM
NUCLEI
EPSS 0.83
Rstudio Shiny Server < 1.5.16 - Path Traversal
Directory traversal in RStudio Shiny Server before 1.5.16 allows attackers to read the application source code, involving an encoded slash.
CWE-22
Apr 02, 2021
CVE-2021-26072
4.3
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.21
Atlassian Confluence Data Center < 5.8.6 - SSRF
The WidgetConnector plugin in Confluence Server and Confluence Data Center before version 5.8.6 allowed remote attackers to manipulate the content of internal network resources via a blind Server-Side Request Forgery (SSRF) vulnerability.
CWE-918
Apr 01, 2021
CVE-2021-28164
5.3
MEDIUM
3 PoCs
Analysis
NUCLEI
EPSS 0.93
Eclipse Jetty - Information Disclosure
In Eclipse Jetty 9.4.37.v20210219 to 9.4.38.v20210224, the default compliance mode allows requests with URIs that contain %2e or %2e%2e segments to access protected resources within the WEB-INF directory. For example a request to /context/%2e/WEB-INF/web.xml can retrieve the web.xml file. This can reveal sensitive information regarding the implementation of a web application.
CWE-551
Apr 01, 2021
CVE-2021-28918
9.1
CRITICAL
1 Writeup
NUCLEI
EPSS 0.86
Netmask < 1.0.6 - SSRF
Improper input validation of octal strings in netmask npm package v1.0.6 and below allows unauthenticated remote attackers to perform indeterminate SSRF, RFI, and LFI attacks on many of the dependent packages. A remote unauthenticated attacker can bypass packages relying on netmask to filter IPs and reach critical VPN or LAN hosts.
CWE-704
Apr 01, 2021
CVE-2021-28937
7.5
HIGH
NUCLEI
EPSS 0.34
Acexy Wireless-n Wifi Repeater Firmware - Cleartext Storage
The /password.html page of the Web management interface of the Acexy Wireless-N WiFi Repeater REV 1.0 (28.08.06.1) contains the administrator account password in plaintext. The page can be intercepted on HTTP.
CWE-312
Mar 29, 2021
CVE-2021-29156
7.5
HIGH
3 PoCs
Analysis
NUCLEI
EPSS 0.89
Forgerock Openam < 13.5.1 - Injection
ForgeRock OpenAM before 13.5.1 allows LDAP injection via the Webfinger protocol. For example, an unauthenticated attacker can perform character-by-character retrieval of password hashes, or retrieve a session token or a private key.
CWE-74
Mar 25, 2021
CVE-2021-27320
7.5
HIGH
NUCLEI
EPSS 0.76
Doctor Appointment System 1.0 - SQL Injection
Blind SQL injection in contactus.php in Doctor Appointment System 1.0 allows an unauthenticated attacker to insert malicious SQL queries via firstname parameter.
CWE-89
Mar 24, 2021
CVE-2021-27319
7.5
HIGH
NUCLEI
EPSS 0.72
Doctor Appointment System 1.0 - SQL Injection
Blind SQL injection in contactus.php in Doctor Appointment System 1.0 allows an unauthenticated attacker to insert malicious SQL queries via email parameter.
CWE-89
Mar 24, 2021
CVE-2021-27316
7.5
HIGH
NUCLEI
EPSS 0.71
Doctor Appointment System 1.0 - SQL Injection
Blind SQL injection in contactus.php in doctor appointment system 1.0 allows an unauthenticated attacker to insert malicious SQL queries via lastname parameter.
CWE-89
Mar 24, 2021
CVE-2021-27315
7.5
HIGH
NUCLEI
EPSS 0.71
Doctor Appointment System 1.0 - SQL Injection
Blind SQL injection in contactus.php in Doctor Appointment System 1.0 allows an unauthenticated attacker to insert malicious SQL queries via the comment parameter.
CWE-89
Mar 24, 2021
CVE-2021-27310
6.1
MEDIUM
1 Writeup
NUCLEI
EPSS 0.04
Clansphere CMS 2011.4 - XSS
Clansphere CMS 2011.4 allows unauthenticated reflected XSS via "language" parameter.
CWE-79
Mar 23, 2021