Vulnerabilities with Nuclei Scanner Templates
Updated 4h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2021-24284
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.68
Kaswara < 3.0.1 - Unrestricted File Upload
The Kaswara Modern VC Addons WordPress plugin through 3.0.1 allows unauthenticated arbitrary file upload via the 'uploadFontIcon' AJAX action. The supplied zipfile being unzipped in the wp-content/uploads/kaswara/fonts_icon directory with no checks for malicious files such as PHP.
CWE-434
May 14, 2021
CVE-2021-24278
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.35
Querysol Redirection For Contact Form 7 - Incorrect Authorization
In the Redirection for Contact Form 7 WordPress plugin before 2.3.4, unauthenticated users can use the wpcf7r_get_nonce AJAX action to retrieve a valid nonce for any WordPress action/function.
CWE-863
May 14, 2021
CVE-2021-24245
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.18
Trumani Stop Spammers < 2021.9 - XSS
The Stop Spammers WordPress plugin before 2021.9 did not escape user input when blocking requests (such as matching a spam word), outputting it in an attribute after sanitising it to remove HTML tags, which is not sufficient and lead to a reflected Cross-Site Scripting issue.
CWE-79
May 06, 2021
CVE-2021-24236
9.8
CRITICAL
NUCLEI
EPSS 0.74
Imagements < 1.2.5 - Unrestricted File Upload
The Imagements WordPress plugin through 1.2.5 allows images to be uploaded in comments, however only checks for the Content-Type in the request to forbid dangerous files. This allows unauthenticated attackers to upload arbitrary files by using a valid image Content-Type along with a PHP filename and code, leading to RCE.
CWE-434
May 06, 2021
CVE-2021-24214
6.1
MEDIUM
NUCLEI
EPSS 0.04
Daggerhartlab Openid Connect Generic Client - XSS
The OpenID Connect Generic Client WordPress plugin 3.8.0 and 3.8.1 did not sanitise the login error when output back in the login form, leading to a reflected Cross-Site Scripting issue. This issue does not require authentication and can be exploited with the default configuration.
CWE-79
May 06, 2021
CVE-2021-1499
5.3
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.93
Cisco HyperFlex HX Data Platform unauthenticated file upload to RCE (CVE-2021-1499)
A vulnerability in the web-based management interface of Cisco HyperFlex HX Data Platform could allow an unauthenticated, remote attacker to upload files to an affected device. This vulnerability is due to missing authentication for the upload function. An attacker could exploit this vulnerability by sending a specific HTTP request to an affected device. A successful exploit could allow the attacker to upload files to the affected device with the permissions of the tomcat8 user.
CWE-306
May 06, 2021
CVE-2021-1498
9.8
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Cisco Hyperflex HX Data Platform < 4.0\(2e\) - Command Injection
Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-78
May 06, 2021
CVE-2021-1497
9.8
CRITICAL
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Cisco Hyperflex HX Data Platform < 4.0\(2e\) - OS Command Injection
Multiple vulnerabilities in the web-based management interface of Cisco HyperFlex HX could allow an unauthenticated, remote attacker to perform command injection attacks against an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
CWE-78
May 06, 2021
CVE-2021-24276
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.08
Supsystic Contact Form < 1.7.15 - XSS
The Contact Form by Supsystic WordPress plugin before 1.7.15 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue
CWE-79
May 05, 2021
CVE-2021-24275
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.06
Supsystic Popup < 1.10.5 - XSS
The Popup by Supsystic WordPress plugin before 1.10.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue
CWE-79
May 05, 2021
CVE-2021-24274
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.06
Supsystic Ultimate Maps < 1.2.5 - XSS
The Ultimate Maps by Supsystic WordPress plugin before 1.2.5 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue
CWE-79
May 05, 2021
CVE-2021-20092
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.69
Buffalo Wsr-2533dhpl2-bk Firmware < 1.02 - Authentication Bypass
The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly restrict access to sensitive information from an unauthorized actor.
CWE-287
Apr 29, 2021
CVE-2021-20091
8.8
HIGH
EXPLOITED
NUCLEI
EPSS 0.85
Buffalo Wsr-2533dhpl2-bk Firmware < 1.02 - Remote Code Execution
The web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 do not properly sanitize user input. An authenticated remote attacker could leverage this vulnerability to alter device configuration, potentially gaining remote code execution.
Apr 29, 2021
CVE-2021-20090
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.94
Buffalo Wsr-2533dhpl2-bk Firmware < 1.02 - Path Traversal
A path traversal vulnerability in the web interfaces of Buffalo WSR-2533DHPL2 firmware version <= 1.02 and WSR-2533DHP3 firmware version <= 1.24 could allow unauthenticated remote attackers to bypass authentication.
CWE-22
Apr 29, 2021
CVE-2021-20086
8.8
HIGH
1 Writeup
NUCLEI
EPSS 0.50
Jquery-bbq - Prototype Pollution
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in jquery-bbq 1.2.1 allows a malicious user to inject properties into Object.prototype.
CWE-1321
Apr 23, 2021
CVE-2021-2135
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.71
Oracle WebLogic Server <14.1.1.0.0 - RCE
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Coherence Container). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Apr 22, 2021
CVE-2021-24239
6.1
MEDIUM
NUCLEI
EPSS 0.02
Genetechsolutions Pie Register < 3.7.0.1 - XSS
The Pie Register – User Registration Forms. Invitation based registrations, Custom Login, Payments WordPress plugin before 3.7.0.1 does not sanitise the invitaion_code GET parameter when outputting it in the Activation Code page, leading to a reflected Cross-Site Scripting issue.
CWE-79
Apr 22, 2021
CVE-2021-24237
6.1
MEDIUM
NUCLEI
EPSS 0.63
Purethemes Findeo < 1.3.1 - XSS
The Realteo WordPress plugin before 1.2.4, used by the Findeo Theme, did not properly sanitise the keyword_search, search_radius. _bedrooms and _bathrooms GET parameters before outputting them in its properties page, leading to an unauthenticated reflected Cross-Site Scripting issue.
CWE-79
Apr 22, 2021
CVE-2021-24235
6.1
MEDIUM
NUCLEI
EPSS 0.44
Boostifythemes Goto < 2.0 - XSS
The Goto WordPress theme before 2.0 does not sanitise the keywords and start_date GET parameter on its Tour List page, leading to an unauthenticated reflected Cross-Site Scripting issue.
CWE-79
Apr 22, 2021
CVE-2021-21087
5.4
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.84
Adobe Coldfusion <2021.0.0.323925 - XSS
Adobe Coldfusion versions 2016 (update 16 and earlier), 2018 (update 10 and earlier) and 2021.0.0.323925 are affected by an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. An attacker could abuse this vulnerability to execute arbitrary JavaScript code in context of the current user. Exploitation of this issue requires user interaction.
CWE-79
Apr 15, 2021