Vulnerabilities with Nuclei Scanner Templates

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
4,077 results Clear all
CVE-2020-7318 4.6 MEDIUM NUCLEI EPSS 0.13
Mcafee Epolicy Orchestrator < 5.10.9 - XSS
Cross-Site Scripting vulnerability in McAfee ePolicy Orchestrator (ePO) prior to 5.10.9 Update 9 allows administrators to inject arbitrary web script or HTML via multiple parameters where the administrator's entries were not correctly sanitized.
CWE-79 Oct 14, 2020
CVE-2020-26948 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Emby SSRF HTTP Scanner
Emby Server before 4.5.0 allows SSRF via the Items/RemoteSearch/Image ImageURL parameter.
CWE-918 Oct 10, 2020
CVE-2020-26935 9.8 CRITICAL NUCLEI EPSS 0.92
phpMyAdmin <4.9.6, <5.0.3 - SQL Injection
An issue was discovered in SearchController in phpMyAdmin before 4.9.6 and 5.x before 5.0.3. A SQL injection vulnerability was discovered in how phpMyAdmin processes SQL statements in the search feature. An attacker could use this flaw to inject malicious SQL in to a query.
CWE-89 Oct 10, 2020
CVE-2020-26919 9.8 CRITICAL KEV NUCLEI EPSS 0.94
NETGEAR JGS516PE <2.6.0.43 - Privilege Escalation
NETGEAR JGS516PE devices before 2.6.0.43 are affected by lack of access control at the function level.
Oct 09, 2020
CVE-2020-26876 7.5 HIGH EXPLOITED NUCLEI EPSS 0.37
WordPress wp-courses <2.0.27 - Auth Bypass
The wp-courses plugin through 2.0.27 for WordPress allows remote attackers to bypass the intended payment step (for course videos and materials) by using the /wp-json REST API, as exploited in the wild in September 2020. This occurs because show_in_rest is enabled for custom post types (e.g., /wp-json/wp/v2/course and /wp-json/wp/v2/lesson exist).
CWE-306 Oct 07, 2020
CVE-2020-12127 7.5 HIGH NUCLEI EPSS 0.18
Wavlink Wn530h4 Firmware - Missing Authentication
An information disclosure vulnerability in the /cgi-bin/ExportAllSettings.sh endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to leak router settings, including cleartext login details, DNS settings, and other sensitive information without authentication.
CWE-306 Oct 02, 2020
CVE-2020-12124 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Wavlink Wn530h4 Firmware - OS Command Injection
A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary Linux commands as root without authentication.
CWE-78 Oct 02, 2020
CVE-2020-15227 8.7 HIGH EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.94
Nette <2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 - Code Injection
Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework.
CWE-74 Oct 01, 2020
CVE-2020-25200 5.3 MEDIUM 2 PoCs Analysis NUCLEI EPSS 0.57
Pritunl - Information Disclosure
Pritunl 1.29.2145.25 allows attackers to enumerate valid VPN usernames via a series of /auth/session login attempts. Initially, the server will return error 401. However, if the username is valid, then after 20 login attempts, the server will start responding with error 400. Invalid usernames will receive error 401 indefinitely. Note: This has been disputed by the vendor as not a vulnerability. They argue that this is an intended design
CWE-203 Oct 01, 2020
CVE-2020-25223 9.8 CRITICAL KEV 3 PoCs Analysis NUCLEI EPSS 0.94
Sophos Unified Threat Management < 9.511 - OS Command Injection
A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11
CWE-78 Sep 25, 2020
CVE-2020-14179 5.3 MEDIUM 2 PoCs Analysis NUCLEI EPSS 0.93
Atlassian Jira Data Center < 8.5.8 - Information Disclosure
Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint. The affected versions are before version 8.5.8, and from version 8.6.0 before 8.11.1.
Sep 21, 2020
CVE-2020-14181 5.3 MEDIUM 5 PoCs Analysis NUCLEI EPSS 0.93
Atlassian Data Center < 7.13.6 - Information Disclosure
Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the /ViewUserHover.jspa endpoint. The affected versions are before version 7.13.6, from version 8.0.0 before 8.5.7, and from version 8.6.0 before 8.12.0.
CWE-200 Sep 17, 2020
CVE-2020-15148 8.9 HIGH 2 PoCs Analysis NUCLEI EPSS 0.93
Yii 2 <2.0.38 - RCE
Yii 2 (yiisoft/yii2) before version 2.0.38 is vulnerable to remote code execution if the application calls `unserialize()` on arbitrary user input. This is fixed in version 2.0.38. A possible workaround without upgrading is available in the linked advisory.
CWE-502 Sep 15, 2020
CVE-2020-25540 7.5 HIGH EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.94
Thinkadmin - Path Traversal
ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter.
CWE-22 Sep 14, 2020
CVE-2020-11991 7.5 HIGH EXPLOITED NUCLEI EPSS 0.93
Apache Cocoon 2.1.12 - XML Injection
When using the StreamGenerator, the code parse a user-provided XML. A specially crafted XML, including external system entities, could be used to access any file on the server system.
CWE-611 Sep 11, 2020
CVE-2020-2036 8.8 HIGH NUCLEI EPSS 0.82
Paloaltonetworks Pan-os < 8.1.16 - XSS
A reflected cross-site scripting (XSS) vulnerability exists in the PAN-OS management web interface. A remote attacker able to convince an administrator with an active authenticated session on the firewall management interface to click on a crafted link to that management web interface could potentially execute arbitrary JavaScript code in the administrator's browser and perform administrative actions. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9.
CWE-79 Sep 09, 2020
CVE-2020-25213 10.0 CRITICAL KEV 11 PoCs Analysis NUCLEI EPSS 0.94
WordPress File Manager Unauthenticated Remote Code Execution
The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.
CWE-434 Sep 09, 2020
CVE-2020-23814 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.01
xxl-job <2.2.0 - XSS
Multiple cross-site scripting (XSS) vulnerabilities in xxl-job v2.2.0 allow remote attackers to inject arbitrary web script or HTML via (1) AppName and (2)AddressList parameter in JobGroupController.java file.
CWE-79 Sep 03, 2020
CVE-2020-24949 8.8 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.90
Php-fusion - Privilege Escalation
Privilege escalation in PHP-Fusion 9.03.50 downloads/downloads.php allows an authenticated user (not admin) to send a crafted request to the server and perform remote command execution (RCE).
Sep 03, 2020
CVE-2020-25078 7.5 HIGH KEV 3 PoCs Analysis NUCLEI EPSS 0.94
D-Link DCS-2530L <1.06.01 - Info Disclosure
An issue was discovered on D-Link DCS-2530L before 1.06.01 Hotfix and DCS-2670L through 2.02 devices. The unauthenticated /config/getuser endpoint allows for remote administrator password disclosure.
Sep 02, 2020