Vulnerabilities with Nuclei Scanner Templates

Updated 3h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
4,077 results Clear all
CVE-2020-26413 5.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.82
GitLab CE/EE <13.6.2 - Info Disclosure
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.4 before 13.6.2. Information disclosure via GraphQL results in user email being unexpectedly visible.
CWE-200 Dec 11, 2020
CVE-2020-17530 9.8 CRITICAL KEV 14 PoCs Analysis NUCLEI EPSS 0.94
Apache Struts 2 Forced Multi OGNL Evaluation
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.
CWE-917 Dec 11, 2020
CVE-2020-26836 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.05
SAP Solution Manager 720 - Open Redirect
SAP Solution Manager (Trace Analysis), version - 720, allows for misuse of a parameter in the application URL leading to Open Redirect vulnerability, an attacker can enter a link to malicious site which could trick the user to enter credentials or download malicious software, as a parameter in the application URL and share it with the end user who could potentially become a victim of the attack.
CWE-601 Dec 09, 2020
CVE-2020-29597 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.85
IncomCMS 2.0 - File Upload
IncomCMS 2.0 has a modules/uploader/showcase/script.php insecure file upload vulnerability. This vulnerability allows unauthenticated attackers to upload files into the server.
CWE-434 Dec 07, 2020
CVE-2020-13945 6.5 MEDIUM 3 PoCs Analysis NUCLEI EPSS 0.93
Apache APISIX <1.6 - Privilege Escalation
In Apache APISIX, the user enabled the Admin API and deleted the Admin API access IP restriction rules. Eventually, the default token is allowed to access APISIX management data. This affects versions 1.2, 1.3, 1.4, 1.5.
Dec 07, 2020
CVE-2020-26248 6.8 MEDIUM 1 Writeup NUCLEI EPSS 0.77
PrestaShop productcomments <4.2.1 - SQL Injection
In the PrestaShop module "productcomments" before version 4.2.1, an attacker can use a Blind SQL injection to retrieve data or stop the MySQL service. The problem is fixed in 4.2.1 of the module.
CWE-89 Dec 03, 2020
CVE-2020-29279 9.8 CRITICAL EXPLOITED 1 Writeup NUCLEI EPSS 0.62
74CMS <6.0.48 - RCE
PHP remote file inclusion in the assign_resume_tpl method in Application/Common/Controller/BaseController.class.php in 74CMS before 6.0.48 allows remote code execution.
Dec 02, 2020
CVE-2020-29395 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.03
WordPress EventON <3.0.5 - XSS
The EventON plugin through 3.0.5 for WordPress allows addons/?q= XSS via the search field.
CWE-79 Nov 30, 2020
CVE-2020-29390 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.91
Zeroshell 3.9.3 - Command Injection
Zeroshell 3.9.3 contains a command injection vulnerability in the /cgi-bin/kerbynet StartSessionSubmit parameter that could allow an unauthenticated attacker to execute a system command by using shell metacharacters and the %0a character.
CWE-78 Nov 30, 2020
CVE-2020-28976 5.3 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.26
Canto - SSRF
The Canto plugin 1.3.0 for WordPress contains a blind SSRF vulnerability. It allows an unauthenticated attacker can make a request to any internal and external server via /includes/lib/detail.php?subdomain=SSRF.
CWE-918 Nov 30, 2020
CVE-2020-12262 5.4 MEDIUM NUCLEI EPSS 0.01
Intelbras Tip200 Firmware - XSS
Intelbras TIP200 60.61.75.15, TIP200LITE 60.61.75.15, and TIP300 65.61.75.15 devices allow /cgi-bin/cgiServer.exx?page= XSS.
CWE-79 Nov 27, 2020
CVE-2020-13886 5.3 MEDIUM 3 PoCs Analysis NUCLEI EPSS 0.02
Intelbras Tip200 Firmware - Path Traversal
Intelbras TIP 200 60.61.75.15, TIP 200 LITE 60.61.75.15, and TIP 300 65.61.75.22 devices allow cgi-bin/cgiServer.exx?page=../ Directory Traversal.
CWE-22 Nov 26, 2020
CVE-2020-13942 9.8 CRITICAL EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.94
Apache Unomi < 1.5.2 - Injection
It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of the 1.5.x release to fix this problem.
CWE-74 Nov 24, 2020
CVE-2020-26217 8.0 HIGH 9 PoCs Analysis NUCLEI EPSS 0.93
Xstream < 1.4.14 - OS Command Injection
XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14.
CWE-78 Nov 16, 2020
CVE-2020-27191 7.5 HIGH NUCLEI EPSS 0.73
LionWiki <3.2.12 - Info Disclosure
LionWiki before 3.2.12 allows an unauthenticated user to read files as the web server user via crafted string in the index.php f1 variable, aka Local File Inclusion. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
Nov 16, 2020
CVE-2020-13638 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.92
Rconfig < 3.9.7 - Improper Privilege Management
lib/crud/userprocess.php in rConfig 3.9.x before 3.9.7 has an authentication bypass, leading to administrator account creation. This issue has been fixed in 3.9.7.
CWE-269 Nov 13, 2020
CVE-2020-27481 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.58
Good Layers LMS Plugin <= 2.1.4 - SQL Injection
An unauthenticated SQL Injection vulnerability in Good Layers LMS Plugin <= 2.1.4 exists due to the usage of "wp_ajax_nopriv" call in WordPress, which allows any unauthenticated user to get access to the function "gdlr_lms_cancel_booking" where POST Parameter "id" was sent straight into SQL query without sanitization.
CWE-89 Nov 12, 2020
CVE-2020-13927 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.94
Apache Airflow < 1.10.11 - Missing Authentication
The previous default setting for Airflow's Experimental API was to allow all API requests without authentication, but this poses security risks to users who miss this fact. From Airflow 1.10.11 the default has been changed to deny all requests by default and is documented at https://airflow.apache.org/docs/1.10.11/security.html#api-authentication. Note this change fixes it for new installs but existing users need to change their config to default `[api]auth_backend = airflow.api.auth.backend.deny_all` as mentioned in the Updating Guide: https://github.com/apache/airflow/blob/1.10.11/UPDATING.md#experimental-api-will-deny-all-request-by-default
CWE-306 Nov 10, 2020
CVE-2020-28351 6.1 MEDIUM 2 PoCs Analysis NUCLEI EPSS 0.09
Mitel Shoretel Firmware - XSS
The conferencing component on Mitel ShoreTel 19.46.1802.0 devices could allow an unauthenticated attacker to conduct a reflected cross-site scripting (XSS) attack (via the PATH_INFO to index.php) due to insufficient validation for the time_zone object in the HOME_MEETING& page.
CWE-79 Nov 09, 2020
CVE-2020-26214 9.1 CRITICAL 1 Writeup NUCLEI EPSS 0.89
Alerta < 7.5.7 - Authentication Bypass
In Alerta before version 8.1.0, users may be able to bypass LDAP authentication if they provide an empty password when Alerta server is configure to use LDAP as the authorization provider. Only deployments where LDAP servers are configured to allow unauthenticated authentication mechanism for anonymous authorization are affected. A fix has been implemented in version 8.1.0 that returns HTTP 401 Unauthorized response for any authentication attempts where the password field is empty. As a workaround LDAP administrators can disallow unauthenticated bind requests by clients.
CWE-287 Nov 06, 2020