Vulnerabilities with Nuclei Scanner Templates
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2020-7318
4.6
MEDIUM
NUCLEI
EPSS 0.13
Mcafee Epolicy Orchestrator < 5.10.9 - XSS
Cross-Site Scripting vulnerability in McAfee ePolicy Orchestrator (ePO) prior to 5.10.9 Update 9 allows administrators to inject arbitrary web script or HTML via multiple parameters where the administrator's entries were not correctly sanitized.
CWE-79
Oct 14, 2020
CVE-2020-26948
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Emby SSRF HTTP Scanner
Emby Server before 4.5.0 allows SSRF via the Items/RemoteSearch/Image ImageURL parameter.
CWE-918
Oct 10, 2020
CVE-2020-26935
9.8
CRITICAL
NUCLEI
EPSS 0.92
phpMyAdmin <4.9.6, <5.0.3 - SQL Injection
An issue was discovered in SearchController in phpMyAdmin before 4.9.6 and 5.x before 5.0.3. A SQL injection vulnerability was discovered in how phpMyAdmin processes SQL statements in the search feature. An attacker could use this flaw to inject malicious SQL in to a query.
CWE-89
Oct 10, 2020
CVE-2020-26919
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.94
NETGEAR JGS516PE <2.6.0.43 - Privilege Escalation
NETGEAR JGS516PE devices before 2.6.0.43 are affected by lack of access control at the function level.
Oct 09, 2020
CVE-2020-26876
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.37
WordPress wp-courses <2.0.27 - Auth Bypass
The wp-courses plugin through 2.0.27 for WordPress allows remote attackers to bypass the intended payment step (for course videos and materials) by using the /wp-json REST API, as exploited in the wild in September 2020. This occurs because show_in_rest is enabled for custom post types (e.g., /wp-json/wp/v2/course and /wp-json/wp/v2/lesson exist).
CWE-306
Oct 07, 2020
CVE-2020-12127
7.5
HIGH
NUCLEI
EPSS 0.18
Wavlink Wn530h4 Firmware - Missing Authentication
An information disclosure vulnerability in the /cgi-bin/ExportAllSettings.sh endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to leak router settings, including cleartext login details, DNS settings, and other sensitive information without authentication.
CWE-306
Oct 02, 2020
CVE-2020-12124
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Wavlink Wn530h4 Firmware - OS Command Injection
A remote command-line injection vulnerability in the /cgi-bin/live_api.cgi endpoint of the WAVLINK WN530H4 M30H4.V5030.190403 allows an attacker to execute arbitrary Linux commands as root without authentication.
CWE-78
Oct 02, 2020
CVE-2020-15227
8.7
HIGH
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Nette <2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 - Code Injection
Nette versions before 2.0.19, 2.1.13, 2.2.10, 2.3.14, 2.4.16, 3.0.6 are vulnerable to an code injection attack by passing specially formed parameters to URL that may possibly leading to RCE. Nette is a PHP/Composer MVC Framework.
CWE-74
Oct 01, 2020
CVE-2020-25200
5.3
MEDIUM
2 PoCs
Analysis
NUCLEI
EPSS 0.57
Pritunl - Information Disclosure
Pritunl 1.29.2145.25 allows attackers to enumerate valid VPN usernames via a series of /auth/session login attempts. Initially, the server will return error 401. However, if the username is valid, then after 20 login attempts, the server will start responding with error 400. Invalid usernames will receive error 401 indefinitely. Note: This has been disputed by the vendor as not a vulnerability. They argue that this is an intended design
CWE-203
Oct 01, 2020
CVE-2020-25223
9.8
CRITICAL
KEV
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Sophos Unified Threat Management < 9.511 - OS Command Injection
A remote code execution vulnerability exists in the WebAdmin of Sophos SG UTM before v9.705 MR5, v9.607 MR7, and v9.511 MR11
CWE-78
Sep 25, 2020
CVE-2020-14179
5.3
MEDIUM
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Atlassian Jira Data Center < 8.5.8 - Information Disclosure
Affected versions of Atlassian Jira Server and Data Center allow remote, unauthenticated attackers to view custom field names and custom SLA names via an Information Disclosure vulnerability in the /secure/QueryComponent!Default.jspa endpoint. The affected versions are before version 8.5.8, and from version 8.6.0 before 8.11.1.
Sep 21, 2020
CVE-2020-14181
5.3
MEDIUM
5 PoCs
Analysis
NUCLEI
EPSS 0.93
Atlassian Data Center < 7.13.6 - Information Disclosure
Affected versions of Atlassian Jira Server and Data Center allow an unauthenticated user to enumerate users via an Information Disclosure vulnerability in the /ViewUserHover.jspa endpoint. The affected versions are before version 7.13.6, from version 8.0.0 before 8.5.7, and from version 8.6.0 before 8.12.0.
CWE-200
Sep 17, 2020
CVE-2020-15148
8.9
HIGH
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Yii 2 <2.0.38 - RCE
Yii 2 (yiisoft/yii2) before version 2.0.38 is vulnerable to remote code execution if the application calls `unserialize()` on arbitrary user input. This is fixed in version 2.0.38. A possible workaround without upgrading is available in the linked advisory.
CWE-502
Sep 15, 2020
CVE-2020-25540
7.5
HIGH
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Thinkadmin - Path Traversal
ThinkAdmin v6 is affected by a directory traversal vulnerability. An unauthorized attacker can read arbitrarily file on a remote server via GET request encode parameter.
CWE-22
Sep 14, 2020
CVE-2020-11991
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.93
Apache Cocoon 2.1.12 - XML Injection
When using the StreamGenerator, the code parse a user-provided XML. A specially crafted XML, including external system entities, could be used to access any file on the server system.
CWE-611
Sep 11, 2020
CVE-2020-2036
8.8
HIGH
NUCLEI
EPSS 0.82
Paloaltonetworks Pan-os < 8.1.16 - XSS
A reflected cross-site scripting (XSS) vulnerability exists in the PAN-OS management web interface. A remote attacker able to convince an administrator with an active authenticated session on the firewall management interface to click on a crafted link to that management web interface could potentially execute arbitrary JavaScript code in the administrator's browser and perform administrative actions. This issue impacts: PAN-OS 8.1 versions earlier than PAN-OS 8.1.16; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9.
CWE-79
Sep 09, 2020
CVE-2020-25213
10.0
CRITICAL
KEV
11 PoCs
Analysis
NUCLEI
EPSS 0.94
WordPress File Manager Unauthenticated Remote Code Execution
The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.
CWE-434
Sep 09, 2020
CVE-2020-23814
6.1
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.01
xxl-job <2.2.0 - XSS
Multiple cross-site scripting (XSS) vulnerabilities in xxl-job v2.2.0 allow remote attackers to inject arbitrary web script or HTML via (1) AppName and (2)AddressList parameter in JobGroupController.java file.
CWE-79
Sep 03, 2020
CVE-2020-24949
8.8
HIGH
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.90
Php-fusion - Privilege Escalation
Privilege escalation in PHP-Fusion 9.03.50 downloads/downloads.php allows an authenticated user (not admin) to send a crafted request to the server and perform remote command execution (RCE).
Sep 03, 2020
CVE-2020-25078
7.5
HIGH
KEV
3 PoCs
Analysis
NUCLEI
EPSS 0.94
D-Link DCS-2530L <1.06.01 - Info Disclosure
An issue was discovered on D-Link DCS-2530L before 1.06.01 Hotfix and DCS-2670L through 2.02 devices. The unauthenticated /config/getuser endpoint allows for remote administrator password disclosure.
Sep 02, 2020