Vulnerabilities with Nuclei Scanner Templates
Updated 22m agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2020-5412
6.5
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.92
Spring Cloud Netflix <2.2.4-2.1.6 - SSRF
Spring Cloud Netflix, versions 2.2.x prior to 2.2.4, versions 2.1.x prior to 2.1.6, and older unsupported versions allow applications to use the Hystrix Dashboard proxy.stream endpoint to make requests to any server reachable by the server hosting the dashboard. A malicious user, or attacker, can send a request to other servers that should not be exposed publicly.
CWE-441
Aug 07, 2020
CVE-2020-11984
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.75
Apache HTTP Server - Remote Code Execution
Apache HTTP server 2.4.32 to 2.4.44 mod_proxy_uwsgi info disclosure and possible RCE
CWE-120
Aug 07, 2020
CVE-2020-9036
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.26
Jeedom < 4.0.38 - XSS
Jeedom through 4.0.38 allows XSS.
CWE-79
Aug 05, 2020
CVE-2020-13820
6.1
MEDIUM
NUCLEI
EPSS 0.17
Extremenetworks Extreme Management Center - XSS
Extreme Management Center 8.4.1.24 allows unauthenticated reflected XSS via a parameter in a GET request.
CWE-79
Aug 03, 2020
CVE-2020-15129
6.1
MEDIUM
1 Writeup
NUCLEI
EPSS 0.77
Traefik <1.7.26, 2.2.8, 2.3.0-rc3 - Open Redirect
In Traefik before versions 1.7.26, 2.2.8, and 2.3.0-rc3, there exists a potential open redirect vulnerability in Traefik's handling of the "X-Forwarded-Prefix" header. The Traefik API dashboard component doesn't validate that the value of the header "X-Forwarded-Prefix" is a site relative path and will redirect to any header provided URI. Successful exploitation of an open redirect can be used to entice victims to disclose sensitive information. Active Exploitation of this issue is unlikely as it would require active header injection, however the Traefik team addressed this issue nonetheless to prevent abuse in e.g. cache poisoning scenarios.
CWE-601
Jul 30, 2020
CVE-2020-4463
8.2
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.86
IBM Maximo Asset Management - XXE
IBM Maximo Asset Management 7.6.0.1 and 7.6.0.2 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 181484.
CWE-611
Jul 29, 2020
CVE-2020-11110
5.4
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.54
Grafana <6.7.1 - XSS
Grafana through 6.7.1 allows stored XSS due to insufficient input protection in the originalUrl field, which allows an attacker to inject JavaScript code that will be executed after clicking on Open Original Dashboard after visiting the snapshot.
CWE-79
Jul 27, 2020
CVE-2020-15920
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
Midasolutions Eframework < 2.9.0 - OS Command Injection
There is an OS Command Injection in Mida eFramework through 2.9.0 that allows an attacker to achieve Remote Code Execution (RCE) with administrative (root) privileges. No authentication is required.
CWE-78
Jul 24, 2020
CVE-2020-3452
7.5
HIGH
KEV
28 PoCs
Analysis
NUCLEI
EPSS 0.94
Cisco ASA/FTD - Path Traversal
A vulnerability in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to conduct directory traversal attacks and read sensitive files on a targeted system. The vulnerability is due to a lack of proper input validation of URLs in HTTP requests processed by an affected device. An attacker could exploit this vulnerability by sending a crafted HTTP request containing directory traversal character sequences to an affected device. A successful exploit could allow the attacker to view arbitrary files within the web services file system on the targeted device. The web services file system is enabled when the affected device is configured with either WebVPN or AnyConnect features. This vulnerability cannot be used to obtain access to ASA or FTD system files or underlying operating system (OS) files.
CWE-22
Jul 22, 2020
CVE-2020-15895
6.1
MEDIUM
NUCLEI
EPSS 0.14
Dlink Dir-816l Firmware - XSS
An XSS issue was discovered on D-Link DIR-816L devices 2.x before 1.10b04Beta02. In the file webinc/js/info.php, no output filtration is applied to the RESULT parameter, before it's printed on the webpage.
CWE-79
Jul 22, 2020
CVE-2020-11978
8.8
HIGH
KEV
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Airflow < 1.10.11 - OS Command Injection
An issue was found in Apache Airflow versions 1.10.10 and below. A remote code/command injection vulnerability was discovered in one of the example DAGs shipped with Airflow which would allow any authenticated user to run arbitrary commands as the user running airflow worker/scheduler (depending on the executor in use). If you already have examples disabled by setting load_examples=False in the config then you are not vulnerable.
CWE-78
Jul 17, 2020
CVE-2020-13405
7.5
HIGH
2 PoCs
Analysis
NUCLEI
EPSS 0.52
Microweber <1.1.20 - Info Disclosure
userfiles/modules/users/controller/controller.php in Microweber before 1.1.20 allows an unauthenticated user to disclose the users database via a /modules/ POST request.
CWE-306
Jul 16, 2020
CVE-2020-9496
6.1
MEDIUM
EXPLOITED
9 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Ofbiz - Insecure Deserialization
XML-RPC request are vulnerable to unsafe deserialization and Cross-Site Scripting issues in Apache OFBiz 17.12.03
CWE-502
Jul 15, 2020
CVE-2020-11546
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Superwebmailer < 7.40.0.01550 - Code Injection
SuperWebMailer 7.21.0.01526 is susceptible to a remote code execution vulnerability in the Language parameter of mailingupgrade.php. An unauthenticated remote attacker can exploit this behavior to execute arbitrary PHP code via Code Injection.
CWE-94
Jul 14, 2020
CVE-2020-6287
10.0
CRITICAL
KEV
8 PoCs
Analysis
NUCLEI
EPSS 0.94
SAP NetWeaver AS JAVA - Missing Authentication Check
SAP NetWeaver AS JAVA (LM Configuration Wizard), versions - 7.30, 7.31, 7.40, 7.50, does not perform an authentication check which allows an attacker without prior authentication to execute configuration tasks to perform critical actions against the SAP Java system, including the ability to create an administrative user, and therefore compromising Confidentiality, Integrity and Availability of the system, leading to Missing Authentication Check.
CWE-306
Jul 14, 2020
CVE-2020-15050
7.5
HIGH
1 PoC
Analysis
NUCLEI
EPSS 0.79
Suprema BioStar 2 <2.8.2 - Path Traversal
An issue was discovered in the Video Extension in Suprema BioStar 2 before 2.8.2. Remote attackers can read arbitrary files from the server via Directory Traversal.
CWE-22
Jul 13, 2020
CVE-2020-10987
9.8
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Tenda AC15 AC1900 <15.03.05.19 - RCE
The goform/setUsbUnload endpoint of Tenda AC15 AC1900 version 15.03.05.19 allows remote attackers to execute arbitrary system commands via the deviceName POST parameter.
CWE-78
Jul 13, 2020
CVE-2020-5766
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.39
SRS Simple Hits Counter Plugin <1.0.4 - SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in SRS Simple Hits Counter Plugin for WordPress 1.0.3 and 1.0.4 allows a remote, unauthenticated attacker to determine the value of database fields.
CWE-89
Jul 13, 2020
CVE-2020-8194
6.5
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.81
Citrix ADC & Gateway <13.0-58.30 - Code Injection
Reflected code injection in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows the modification of a file download.
CWE-94
Jul 10, 2020
CVE-2020-8193
6.5
MEDIUM
KEV
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Citrix ADC/Gateway <13.0-58.30 - Info Disclosure
Improper access control in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows unauthenticated access to certain URL endpoints.
CWE-284
Jul 10, 2020