Vulnerabilities with Nuclei Scanner Templates
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2020-9365
7.5
HIGH
1 Writeup
NUCLEI
EPSS 0.32
Pureftpd Pure-ftpd - Out-of-Bounds Read
An issue was discovered in Pure-FTPd 1.0.49. An out-of-bounds (OOB) read has been detected in the pure_strcmp function in utils.c.
CWE-125
Feb 24, 2020
CVE-2020-7247
9.8
CRITICAL
KEV
15 PoCs
Analysis
NUCLEI
EPSS 0.94
Openbsd Opensmtpd - Improper Exception Handling
smtp_mailaddr in smtp_session.c in OpenSMTPD 6.6, as used in OpenBSD 6.6 and other products, allows remote attackers to execute arbitrary commands as root via a crafted SMTP session, as demonstrated by shell metacharacters in a MAIL FROM field. This affects the "uncommented" default configuration. The issue exists because of an incorrect return value upon failure of input validation.
CWE-78
Jan 29, 2020
CVE-2020-37123
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.17
Pinger 1.0 - RCE
Pinger 1.0 contains a remote code execution vulnerability that allows attackers to inject shell commands through the ping and socket parameters. Attackers can exploit the unsanitized input in ping.php to write arbitrary PHP files and execute system commands by appending shell metacharacters.
CWE-78
Feb 05, 2026
CVE-2020-26073
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.91
Cisco Catalyst Sd-wan Manager - Path Traversal
A vulnerability in the application data endpoints of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to gain access to sensitive information.
The vulnerability is due to improper validation of directory traversal character sequences within requests to application programmatic interfaces (APIs). An attacker could exploit this vulnerability by sending malicious requests to an API within the affected application. A successful exploit could allow the attacker to conduct directory traversal attacks and gain access to sensitive information including credentials or user tokens.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
CWE-35
Nov 18, 2024
CVE-2020-36836
8.0
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.37
WP Fastest Cache <0.9.0.2 - Privilege Escalation
The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized arbitrary file deletion in versions up to, and including, 0.9.0.2 due to a lack of capability checking and insufficient path validation. This makes it possible for authenticated users with minimal permissions to delete arbitrary files from the server.
CWE-22
Oct 16, 2024
CVE-2020-36728
6.5
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.84
Adning Advertising <1.5.5 - Path Traversal
The Adning Advertising plugin for WordPress is vulnerable to file deletion via path traversal in versions up to, and including, 1.5.5. This allows unauthenticated attackers to delete arbitrary files which can be used to reset and gain full control of a site.
CWE-22
Jun 07, 2023
CVE-2020-36705
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.90
Adning Advertising <1.5.5 - RCE
The Adning Advertising plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the _ning_upload_image function in versions up to, and including, 1.5.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible.
CWE-434
Jun 07, 2023
CVE-2020-36731
7.2
HIGH
EXPLOITED
NUCLEI
EPSS 0.19
WooCommerce <2.3.1 - XSS
The Flexible Checkout Fields for WooCommerce plugin for WordPress is vulnerable to Unauthenticated Arbitrary Plugin Settings update, in addition to Stored Cross-Site Scripting in versions up to, and including, 2.3.1. This is due to missing authorization checks on the updateSettingsAction() function which is called via an admin_init hook, along with missing sanitization and escaping on the settings that are stored.
CWE-79
Jun 07, 2023
CVE-2020-36723
5.3
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.21
ListingPro - WordPress Directory & Listing Theme <2.6.1 - Info Disc...
The ListingPro - WordPress Directory & Listing Theme for WordPress is vulnerable to Sensitive Data Exposure in versions before 2.6.1 via the ~/listingpro-plugin/functions.php file. This makes it possible for unauthenticated attackers to extract sensitive data including usernames, full names, email addresses, phone numbers, physical addresses and user post counts.
CWE-200
Jun 07, 2023
CVE-2020-36719
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.74
ListingPro - WordPress Directory & Listing Theme <2.6.1 - Command I...
The ListingPro - WordPress Directory & Listing Theme for WordPress is vulnerable to Arbitrary Plugin Installation, Activation and Deactivation in versions before 2.6.1. This is due to a missing capability check on the lp_cc_addons_actions function. This makes it possible for unauthenticated attackers to arbitrarily install, activate and deactivate any plugin.
CWE-862
Jun 07, 2023
CVE-2020-36708
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.90
WordPress Themes - Function Injection
The following themes for WordPress are vulnerable to Function Injections in versions up to and including Shapely <= 1.2.7, NewsMag <= 2.4.1, Activello <= 1.4.0, Illdy <= 2.1.4, Allegiant <= 1.2.2, Newspaper X <= 1.3.1, Pixova Lite <= 2.0.5, Brilliance <= 1.2.7, MedZone Lite <= 1.2.4, Regina Lite <= 2.0.4, Transcend <= 1.1.8, Affluent <= 1.1.0, Bonkers <= 1.0.4, Antreas <= 1.0.2, Sparkling <= 2.4.8, and NatureMag Lite <= 1.0.4. This is due to epsilon_framework_ajax_action. This makes it possible for unauthenticated attackers to call functions and achieve remote code execution.
CWE-94
Jun 07, 2023
CVE-2020-36510
6.1
MEDIUM
NUCLEI
EPSS 0.03
Codetipi 15zine < 3.3.0 - XSS
The 15Zine WordPress theme before 3.3.0 does not sanitise and escape the cbi parameter before outputing it back in the response via the cb_s_a AJAX action, leading to a Reflected Cross-Site Scripting
CWE-79
Feb 28, 2022
CVE-2020-27467
7.5
HIGH
NUCLEI
EPSS 0.86
Processwire CMS <2.7.1 - Path Traversal
A Directory Traversal vulnerability exits in Processwire CMS before 2.7.1 via the download parameter to index.php.
CWE-22
Feb 24, 2022
CVE-2020-20601
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.58
Thinkcmf - Code Injection
An issue in ThinkCMF X2.2.2 and below allows attackers to execute arbitrary code via a crafted packet.
CWE-94
Dec 22, 2021
CVE-2020-20982
9.6
CRITICAL
NUCLEI
EPSS 0.32
Wdja Cms - XSS
Cross Site Scripting (XSS) vulnerability in shadoweb wdja v1.5.1, allows attackers to execute arbitrary code and gain escalated privileges, via the backurl parameter to /php/passport/index.php.
CWE-79
Nov 03, 2021
CVE-2020-19295
6.1
MEDIUM
NUCLEI
EPSS 0.11
Jeesns - XSS
A reflected cross-site scripting (XSS) vulnerability in the /weibo/topic component of Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML.
CWE-79
Sep 09, 2021
CVE-2020-19283
6.1
MEDIUM
NUCLEI
EPSS 0.02
Jeesns 1.4.2 - XSS
A reflected cross-site scripting (XSS) vulnerability in the /newVersion component of Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML.
CWE-79
Sep 09, 2021
CVE-2020-19282
6.1
MEDIUM
NUCLEI
EPSS 0.07
Jeesns 1.4.2 - XSS
A reflected cross-site scripting (XSS) vulnerability in Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the system error message's text field.
CWE-79
Sep 09, 2021
CVE-2020-19515
6.1
MEDIUM
NUCLEI
EPSS 0.05
Qdpm - XSS
qdPM V9.1 is vulnerable to Cross Site Scripting (XSS) via qdPM\install\modules\database_config.php.
CWE-79
Sep 09, 2021
CVE-2020-20988
5.4
MEDIUM
NUCLEI
EPSS 0.02
Domainmod - XSS
A cross site scripting (XSS) vulnerability in the /domains/cost-by-owner.php component of Domainmod 4.13 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the "or Expiring Between" parameter.
CWE-79
Aug 12, 2021