Vulnerabilities with Nuclei Scanner Templates

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
4,077 results Clear all
CVE-2020-35846 9.8 CRITICAL 2 PoCs Analysis NUCLEI EPSS 0.94
Agentejo Cockpit < 0.11.2 - SQL Injection
Agentejo Cockpit before 0.11.2 allows NoSQL injection via the Controller/Auth.php check function.
CWE-89 Dec 30, 2020
CVE-2020-35774 5.4 MEDIUM 1 Writeup NUCLEI EPSS 0.81
Twitter-server < 20.12.0 - XSS
server/handler/HistogramQueryHandler.scala in Twitter TwitterServer (aka twitter-server) before 20.12.0, in some configurations, allows XSS via the /histograms endpoint.
CWE-79 Dec 29, 2020
CVE-2020-35736 7.5 HIGH NUCLEI EPSS 0.82
Liftoffsoftware Gateone - Path Traversal
GateOne 1.1 allows arbitrary file download without authentication via /downloads/.. directory traversal because os.path.join is misused.
CWE-22 Dec 27, 2020
CVE-2020-35729 9.8 CRITICAL 4 PoCs Analysis NUCLEI EPSS 0.90
Klogserver Klog Server - OS Command Injection
KLog Server 2.4.1 allows OS command injection via shell metacharacters in the actions/authenticate.php user parameter.
CWE-78 Dec 27, 2020
CVE-2020-35713 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Linksys Re6500 Firmware < 1.0.012.001 - OS Command Injection
Belkin LINKSYS RE6500 devices before 1.0.012.001 allow remote attackers to execute arbitrary commands or set a new password via shell metacharacters to the goform/setSysAdm page.
CWE-78 Dec 26, 2020
CVE-2020-28188 9.8 CRITICAL EXPLOITED RANSOMWARE 1 PoC Analysis NUCLEI EPSS 0.93
Terra-master Tos < 4.2.06 - OS Command Injection
Remote Command Execution (RCE) vulnerability in TerraMaster TOS <= 4.2.06 allow remote unauthenticated attackers to inject OS commands via /include/makecvs.php in Event parameter.
CWE-78 Dec 24, 2020
CVE-2020-28185 5.3 MEDIUM EXPLOITED NUCLEI EPSS 0.91
TerraMaster TOS <= 4.2.06 - Info Disclosure
User Enumeration vulnerability in TerraMaster TOS <= 4.2.06 allows remote unauthenticated attackers to identify valid users within the system via the username parameter to wizard/initialise.php.
Dec 24, 2020
CVE-2020-35598 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.79
Advanced Comment System - Path Traversal
ACS Advanced Comment System 1.0 is affected by Directory Traversal via an advanced_component_system/index.php?ACS_path=..%2f URI. NOTE: this might be the same as CVE-2009-4623
CWE-22 Dec 23, 2020
CVE-2020-29583 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.94
Zyxel USG <4.60 - Privilege Escalation
Firmware version 4.60 of Zyxel USG devices contains an undocumented account (zyfwp) with an unchangeable password. The password for this account can be found in cleartext in the firmware. This account can be used by someone to login to the ssh server or web interface with admin privileges.
CWE-522 Dec 22, 2020
CVE-2020-24579 8.8 HIGH NUCLEI EPSS 0.85
D-Link DSL-2888A <AU_2.31_V1.1.47ae55 - Auth Bypass
An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. An unauthenticated attacker could bypass authentication to access authenticated pages and functionality.
CWE-287 Dec 22, 2020
CVE-2020-17526 7.7 HIGH NUCLEI EPSS 0.92
Apache Airflow Webserver <1.10.14 - Info Disclosure
Incorrect Session Validation in Apache Airflow Webserver versions prior to 1.10.14 with default config allows a malicious airflow user on site A where they log in normally, to access unauthorized Airflow Webserver on Site B through the session from Site A. This does not affect users who have changed the default value for `[webserver] secret_key` config.
Dec 21, 2020
CVE-2020-20300 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.57
Weiphp - SQL Injection
SQL injection vulnerability in the wp_where function in WeiPHP 5.0.
CWE-89 Dec 18, 2020
CVE-2020-20285 5.4 MEDIUM 1 Writeup NUCLEI EPSS 0.06
Zzcms - XSS
There is a XSS in the user login page in zzcms 2019. Users can inject js code by the referer header via user/login.php
CWE-79 Dec 18, 2020
CVE-2020-25495 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.03
Xinuos Openserver - XSS
A reflected Cross-site scripting (XSS) vulnerability in Xinuo (formerly SCO) Openserver version 5 and 6 allows remote attackers to inject arbitrary web script or HTML tag via the parameter 'section'.
CWE-79 Dec 18, 2020
CVE-2020-35476 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
OpenTSDB 2.4.0 unauthenticated command injection
A remote code execution vulnerability occurs in OpenTSDB through 2.4.0 via command injection in the yrange parameter. The yrange value is written to a gnuplot file in the /tmp directory. This file is then executed via the mygnuplot.sh shell script. (tsd/GraphHandler.java attempted to prevent command injections by blocking backticks but this is insufficient.)
CWE-78 Dec 16, 2020
CVE-2020-26258 6.3 MEDIUM 5 PoCs Analysis NUCLEI EPSS 0.94
XStream <1.4.15 - SSRF
XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, a Server-Side Forgery Request vulnerability can be activated when unmarshalling. The vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.15. The reported vulnerability does not exist if running Java 15 or higher. No user is affected who followed the recommendation to setup XStream's Security Framework with a whitelist! Anyone relying on XStream's default blacklist can immediately switch to a whilelist for the allowed types to avoid the vulnerability. Users of XStream 1.4.14 or below who still want to use XStream default blacklist can use a workaround described in more detailed in the referenced advisories.
CWE-918 Dec 16, 2020
CVE-2020-10770 5.3 MEDIUM EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.92
Keycloak <13.0.0 - SSRF
A flaw was found in Keycloak before 13.0.0, where it is possible to force the server to call out an unverified URL using the OIDC parameter request_uri. This flaw allows an attacker to use this parameter to execute a Server-side request forgery (SSRF) attack.
CWE-918 Dec 15, 2020
CVE-2020-35338 9.8 CRITICAL NUCLEI EPSS 0.82
Mobileviewpoint Wireless Multiplex Te... - Hard-coded Credentials
The Web Administrative Interface in Mobile Viewpoint Wireless Multiplex Terminal (WMT) Playout Server 20.2.8 and earlier has a default account with a password of "pokon."
CWE-798 Dec 14, 2020
CVE-2020-29227 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.93
Car Rental Management System 1.0 - Code Injection
An issue was discovered in Car Rental Management System 1.0. An unauthenticated user can perform a file inclusion attack against the /index.php file with a partial filename in the "page" parameter, to cause local file inclusion resulting in code execution.
Dec 14, 2020
CVE-2020-35234 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.81
Wp-ecommerce Easy WP SMTP < 1.4.4 - Log Information Exposure
The easy-wp-smtp plugin before 1.4.4 for WordPress allows Administrator account takeover, as exploited in the wild in December 2020. If an attacker can list the wp-content/plugins/easy-wp-smtp/ directory, then they can discover a log file (such as #############_debug_log.txt) that contains all password-reset links. The attacker can request a reset of the Administrator password and then use a link found there.
CWE-532 Dec 14, 2020