Vulnerabilities with Nuclei Scanner Templates
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2021-21389
8.1
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Buddypress < 7.2.1 - Incorrect Authorization
BuddyPress is an open source WordPress plugin to build a community site. In releases of BuddyPress from 5.0.0 before 7.2.1 it's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the REST API members endpoint. The vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue.
CWE-863
Mar 26, 2021
CVE-2021-21402
7.7
HIGH
EXPLOITED
4 PoCs
Analysis
NUCLEI
EPSS 0.90
Jellyfin < 10.7.1 - Path Traversal
Jellyfin is a Free Software Media System. In Jellyfin before version 10.7.1, with certain endpoints, well crafted requests will allow arbitrary file read from a Jellyfin server's file system. This issue is more prevalent when Windows is used as the host OS. Servers that are exposed to the public Internet are potentially at risk. This is fixed in version 10.7.1. As a workaround, users may be able to restrict some access by enforcing strict security permissions on their filesystem, however, it is recommended to update as soon as possible.
CWE-22
Mar 23, 2021
CVE-2021-21351
5.4
MEDIUM
NUCLEI
EPSS 0.92
Oracle Banking Platform < 5.15.14 - Insecure Deserialization
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
CWE-502
Mar 23, 2021
CVE-2021-21345
5.8
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.88
Netapp Oncommand Insight < 5.15.14 - Insecure Deserialization
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16.
CWE-502
Mar 23, 2021
CVE-2021-24146
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.75
Webnus Modern Events Calendar Lite < 5.16.5 - Improper Access Control
Lack of authorisation checks in the Modern Events Calendar Lite WordPress plugin, versions before 5.16.5, did not properly restrict access to the export files, allowing unauthenticated users to exports all events data in CSV or XML format for example.
CWE-284
Mar 18, 2021
CVE-2021-24145
7.2
HIGH
3 PoCs
Analysis
NUCLEI
EPSS 0.91
Webnus Modern Events Calendar Lite < 5.16.5 - Unrestricted File Upload
Arbitrary file upload in the Modern Events Calendar Lite WordPress plugin, versions before 5.16.5, did not properly check the imported file, allowing PHP ones to be uploaded by administrator by using the 'text/csv' content-type in the request.
CWE-434
Mar 18, 2021
CVE-2021-24139
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.48
10web Photo Gallery < 1.5.55 - SQL Injection
Unvalidated input in the Photo Gallery (10Web Photo Gallery) WordPress plugin, versions before 1.5.55, leads to SQL injection via the frontend/models/model.php bwg_search_x parameter.
CWE-89
Mar 18, 2021
CVE-2021-21978
9.8
CRITICAL
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.90
Vmware View Planner < 4.6 - Missing Authorization
VMware View Planner 4.x prior to 4.6 Security Patch 1 contains a remote code execution vulnerability. Improper input validation and lack of authorization leading to arbitrary file upload in logupload web application. An unauthorized attacker with network access to View Planner Harness could upload and execute a specially crafted file leading to remote code execution within the logupload container.
CWE-862
Mar 03, 2021
CVE-2021-25281
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.94
SaltStack Salt <3002.5 - RCE
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
CWE-287
Feb 27, 2021
CVE-2021-21973
5.3
MEDIUM
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.90
Vmware Cloud Foundation < 3.10.1.2 - SSRF
The vSphere Client (HTML5) contains an SSRF (Server Side Request Forgery) vulnerability due to improper validation of URLs in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue by sending a POST request to vCenter Server plugin leading to information disclosure. This affects: VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
CWE-918
Feb 24, 2021
CVE-2021-21972
9.8
CRITICAL
KEV
RANSOMWARE
34 PoCs
Analysis
NUCLEI
EPSS 0.94
Vmware Cloud Foundation < 3.10.1.2 - Path Traversal
The vSphere Client (HTML5) contains a remote code execution vulnerability in a vCenter Server plugin. A malicious actor with network access to port 443 may exploit this issue to execute commands with unrestricted privileges on the underlying operating system that hosts vCenter Server. This affects VMware vCenter Server (7.x before 7.0 U1c, 6.7 before 6.7 U3l and 6.5 before 6.5 U3n) and VMware Cloud Foundation (4.x before 4.2 and 3.x before 3.10.1.2).
CWE-22
Feb 24, 2021
CVE-2021-21315
7.1
HIGH
KEV
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Systeminformation < 5.3.1 - OS Command Injection
The System Information Library for Node.JS (npm package "systeminformation") is an open source collection of functions to retrieve detailed hardware, system and OS information. In systeminformation before version 5.3.1 there is a command injection vulnerability. Problem was fixed in version 5.3.1. As a workaround instead of upgrading, be sure to check or sanitize service parameters that are passed to si.inetLatency(), si.inetChecksite(), si.services(), si.processLoad() ... do only allow strings, reject any arrays. String sanitation works as expected.
CWE-78
Feb 16, 2021
CVE-2021-25299
6.1
MEDIUM
1 Writeup
NUCLEI
EPSS 0.85
Nagios XI xi-5.7.5 - XSS
Nagios XI version xi-5.7.5 is affected by cross-site scripting (XSS). The vulnerability exists in the file /usr/local/nagiosxi/html/admin/sshterm.php due to improper sanitization of user-controlled input. A maliciously crafted URL, when clicked by an admin user, can be used to steal his/her session cookies or it can be chained with the previous bugs to get one-click remote command execution (RCE) on the Nagios XI server.
CWE-79
Feb 15, 2021
CVE-2021-25298
8.8
HIGH
KEV
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.75
Nagios XI 5.5.6 to 5.7.5 - ConfigWizards Authenticated Remote Code Exection
Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/cloud-vm/cloud-vm.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.
CWE-78
Feb 15, 2021
CVE-2021-25297
8.8
HIGH
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.82
Nagios XI xi-5.7.5 - Command Injection
Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/switch/switch.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.
CWE-78
Feb 15, 2021
CVE-2021-25296
8.8
HIGH
KEV
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.93
Nagios XI xi-5.7.5 - Command Injection
Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/windowswmi/windowswmi.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.
Feb 15, 2021
CVE-2021-21311
7.2
HIGH
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Adminer < 4.7.9 - SSRF
Adminer is an open-source database management in a single PHP file. In adminer from version 4.0.0 and before 4.7.9 there is a server-side request forgery vulnerability. Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected. This is fixed in version 4.7.9.
CWE-918
Feb 11, 2021
CVE-2021-21307
8.6
HIGH
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.92
Lucee Server <5.3.7.47-5.3.6.68-5.3.5.96 - RCE
Lucee Server is a dynamic, Java based (JSR-223), tag and scripting language used for rapid web application development. In Lucee Admin before versions 5.3.7.47, 5.3.6.68 or 5.3.5.96 there is an unauthenticated remote code exploit. This is fixed in versions 5.3.7.47, 5.3.6.68 or 5.3.5.96. As a workaround, one can block access to the Lucee Administrator.
CWE-862
Feb 11, 2021
CVE-2021-22881
6.1
MEDIUM
NUCLEI
EPSS 0.15
Action Pack <6.1.2.1, 6.0.3.5 - Open Redirect
The Host Authorization middleware in Action Pack before 6.1.2.1, 6.0.3.5 suffers from an open redirect vulnerability. Specially crafted `Host` headers in combination with certain "allowed host" formats can cause the Host Authorization middleware in Action Pack to redirect users to a malicious website. Impacted applications will have allowed hosts with a leading dot. When an allowed host contains a leading dot, a specially crafted `Host` header can be used to redirect to a malicious website.
CWE-601
Feb 11, 2021
CVE-2021-21479
9.1
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.78
SAP Scimono < 0.0.19 - Injection
In SCIMono before 0.0.19, it is possible for an attacker to inject and execute java expression compromising the availability and integrity of the system.
CWE-74
Feb 09, 2021