Vulnerabilities with Nuclei Scanner Templates

Updated 22m ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,453 CVEs tracked 53,634 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,330 vendors 43,881 researchers
4,077 results Clear all
CVE-2020-5412 6.5 MEDIUM EXPLOITED NUCLEI EPSS 0.92
Spring Cloud Netflix <2.2.4-2.1.6 - SSRF
Spring Cloud Netflix, versions 2.2.x prior to 2.2.4, versions 2.1.x prior to 2.1.6, and older unsupported versions allow applications to use the Hystrix Dashboard proxy.stream endpoint to make requests to any server reachable by the server hosting the dashboard. A malicious user, or attacker, can send a request to other servers that should not be exposed publicly.
CWE-441 Aug 07, 2020
CVE-2020-11984 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.75
Apache HTTP Server - Remote Code Execution
Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE
CWE-120 Aug 07, 2020
CVE-2020-9036 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.26
Jeedom < 4.0.38 - XSS
Jeedom through 4.0.38 allows XSS.
CWE-79 Aug 05, 2020
CVE-2020-13820 6.1 MEDIUM NUCLEI EPSS 0.17
Extremenetworks Extreme Management Center - XSS
Extreme Management Center 8.4.1.24 allows unauthenticated reflected XSS via a parameter in a GET request.
CWE-79 Aug 03, 2020
CVE-2020-15129 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.77
Traefik <1.7.26, 2.2.8, 2.3.0-rc3 - Open Redirect
In Traefik before versions 1.7.26, 2.2.8, and 2.3.0-rc3, there exists a potential open redirect vulnerability in Traefik's handling of the "X-Forwarded-Prefix" header. The Traefik API dashboard component doesn't validate that the value of the header "X-Forwarded-Prefix" is a site relative path and will redirect to any header provided URI. Successful exploitation of an open redirect can be used to entice victims to disclose sensitive information. Active Exploitation of this issue is unlikely as it would require active header injection, however the Traefik team addressed this issue nonetheless to prevent abuse in e.g. cache poisoning scenarios.
CWE-601 Jul 30, 2020
CVE-2020-4463 8.2 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.86
IBM Maximo Asset Management - XXE
IBM Maximo Asset Management 7.6.0.1 and 7.6.0.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 181484.
CWE-611 Jul 29, 2020
CVE-2020-11110 5.4 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.54
Grafana <6.7.1 - XSS
Grafana through 6.7.1 allows stored XSS due to insufficient input protection in the originalUrl field, which allows an attacker to inject JavaScript code that will be executed after clicking on Open Original Dashboard after visiting the snapshot.
CWE-79 Jul 27, 2020
CVE-2020-15920 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Midasolutions Eframework < 2.9.0 - OS Command Injection
There is an OS Command Injection in Mida eFramework through 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. No authentication is required.
CWE-78 Jul 24, 2020
CVE-2020-3452 7.5 HIGH KEV 28 PoCs Analysis NUCLEI EPSS 0.94
Cisco ASA/FTD - Path Traversal
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of URLs in HTTP requests processed by an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device. The web services file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability cannot be used to obtain access to ASA or FTD system files or underlying operating system (OS) files.
CWE-22 Jul 22, 2020
CVE-2020-15895 6.1 MEDIUM NUCLEI EPSS 0.14
Dlink Dir-816l Firmware - XSS
An XSS issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. In the file webinc/js/info.php, no output filtration is applied to the RESULT parameter, before it's printed on the webpage.
CWE-79 Jul 22, 2020
CVE-2020-11978 8.8 HIGH KEV 3 PoCs Analysis NUCLEI EPSS 0.94
Apache Airflow < 1.10.11 - OS Command Injection
An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable.
CWE-78 Jul 17, 2020
CVE-2020-13405 7.5 HIGH 2 PoCs Analysis NUCLEI EPSS 0.52
Microweber <1.1.20 - Info Disclosure
userfiles/modules/users/controller/controller.php in Microweber before 1.1.20 allows an unauthenticated user to disclose the users database via a /modules/ POST request.
CWE-306 Jul 16, 2020
CVE-2020-9496 6.1 MEDIUM EXPLOITED 9 PoCs Analysis NUCLEI EPSS 0.94
Apache Ofbiz - Insecure Deserialization
XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scripting issues in Apache OFBiz 17.12.03
CWE-502 Jul 15, 2020
CVE-2020-11546 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Superwebmailer < 7.40.0.01550 - Code Injection
SuperWebMailer 7.21.0.01526 is susceptible to a remote code execution vulnerability in the Language parameter of mailingupgrade.php. An unauthenticated remote attacker can exploit this behavior to execute arbitrary PHP code via Code Injection.
CWE-94 Jul 14, 2020
CVE-2020-6287 10.0 CRITICAL KEV 8 PoCs Analysis NUCLEI EPSS 0.94
SAP NetWeaver AS JAVA - Missing Authentication Check
SAP NetWeaver AS JAVA (LM Configuration Wizard), versions - 7.30, 7.31, 7.40, 7.50, does not perform an authentication check which allows an attacker without prior authentication to execute configuration tasks to perform critical actions against the SAP Java system, including the ability to create an administrative user, and therefore compromising Confidentiality, Integrity and Availability of the system, leading to Missing Authentication Check.
CWE-306 Jul 14, 2020
CVE-2020-15050 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.79
Suprema BioStar 2 <2.8.2 - Path Traversal
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
CWE-22 Jul 13, 2020
CVE-2020-10987 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.94
Tenda AC15 AC1900 <15.03.05.19 - RCE
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
CWE-78 Jul 13, 2020
CVE-2020-5766 7.5 HIGH EXPLOITED NUCLEI EPSS 0.39
SRS Simple Hits Counter Plugin <1.0.4 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in SRS Simple Hits Counter Plugin for WordPress 1.0.3 and 1.0.4 allows a remote, unauthenticated attacker to determine the value of database fields.
CWE-89 Jul 13, 2020
CVE-2020-8194 6.5 MEDIUM EXPLOITED NUCLEI EPSS 0.81
Citrix ADC & Gateway <13.0-58.30 - Code Injection
Reflected code injection in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows the modification of a file download.
CWE-94 Jul 10, 2020
CVE-2020-8193 6.5 MEDIUM KEV 5 PoCs Analysis NUCLEI EPSS 0.94
Citrix ADC/Gateway <13.0-58.30 - Info Disclosure
Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows unauthenticated access to certain URL endpoints.
CWE-284 Jul 10, 2020