Vulnerabilities with Nuclei Scanner Templates

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,468 CVEs tracked 53,663 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,324 vendors 43,878 researchers
4,077 results Clear all
CVE-2020-8191 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.91
Citrix ADC/Gateway <13.0-58.30 - XSS
Improper input validation in Citrix ADC and Citrix Gateway versions before 13.0-58.30, 12.1-57.18, 12.0-63.21, 11.1-64.14 and 10.5-70.18 and Citrix SDWAN WAN-OP versions before 11.1.1a, 11.0.3d and 10.2.7 allows reflected Cross Site Scripting (XSS).
CWE-79 Jul 10, 2020
CVE-2020-9376 7.5 HIGH 1 PoC Analysis NUCLEI EPSS 0.93
Dlink Dir-610 Firmware - Injection
D-Link DIR-610 devices allow Information Disclosure via SERVICES=DEVICE.ACCOUNT%0AAUTHORIZED_GROUP=1 to getcfg.php. NOTE: This vulnerability only affects products that are no longer supported by the maintainer
CWE-74 Jul 09, 2020
CVE-2020-15505 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.94
MobileIron MDM Hessian-Based Java Deserialization RCE
A remote code execution vulnerability in MobileIron Core & Connector versions 10.3.0.3 and earlier, 10.4.0.0, 10.4.0.1, 10.4.0.2, 10.4.0.3, 10.5.1.0, 10.5.2.0 and 10.6.0.0; and Sentry versions 9.7.2 and earlier, and 9.8.0; and Monitor and Reporting Database (RDB) version 2.0.0.1 and earlier that allows remote attackers to execute arbitrary code via unspecified vectors.
CWE-706 Jul 07, 2020
CVE-2020-8163 8.8 HIGH 5 PoCs Analysis NUCLEI EPSS 0.91
Rails <5.0.1 - Code Injection
The is a code injection vulnerability in versions of Rails prior to 5.0.1 that wouldallow an attacker who controlled the `locals` argument of a `render` call to perform a RCE.
CWE-94 Jul 02, 2020
CVE-2020-15081 5.3 MEDIUM 1 Writeup NUCLEI EPSS 0.10
PrestaShop <1.7.6.6 - Info Disclosure
In PrestaShop from version 1.5.0.0 and before 1.7.6.6, there is information exposure in the upload directory. The problem is fixed in version 1.7.6.6. A possible workaround is to add an empty index.php file in the upload directory.
CWE-548 Jul 02, 2020
CVE-2020-14092 9.8 CRITICAL NUCLEI EPSS 0.80
Ithemes Paypal Pro < 1.1.65 - SQL Injection
The CodePeople Payment Form for PayPal Pro plugin before 1.1.65 for WordPress allows SQL Injection.
CWE-89 Jul 02, 2020
CVE-2020-15500 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.15
Tileservergl < 3.0.0 - XSS
An issue was discovered in server.js in TileServer GL through 3.0.0. The content of the key GET parameter is reflected unsanitized in an HTTP response for the application's main page, causing reflected XSS.
CWE-79 Jul 01, 2020
CVE-2020-5902 9.8 CRITICAL KEV RANSOMWARE 65 PoCs Analysis NUCLEI EPSS 0.94
BIG-IP <15.2 - RCE
In BIG-IP versions 15.0.0-15.1.0.3, 14.1.0-14.1.2.5, 13.1.0-13.1.3.3, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.1, the Traffic Management User Interface (TMUI), also referred to as the Configuration utility, has a Remote Code Execution (RCE) vulnerability in undisclosed pages.
CWE-22 Jul 01, 2020
CVE-2020-9483 7.5 HIGH 2 PoCs Analysis NUCLEI EPSS 0.94
Apache Skywalking < 6.6.0 - SQL Injection
**Resolved** When use H2/MySQL/TiDB as Apache SkyWalking storage, the metadata query through GraphQL protocol, there is a SQL injection vulnerability, which allows to access unpexcted data. Apache SkyWalking 6.0.0 to 6.6.0, 7.0.0 H2/MySQL/TiDB storage implementations don't use the appropriate way to set SQL parameters.
CWE-89 Jun 30, 2020
CVE-2020-15415 9.8 CRITICAL KEV 1 Writeup NUCLEI EPSS 0.93
DrayTek Vigor3900/Vigor2960/Vigor300B <1.5.1 - RCE
On DrayTek Vigor3900, Vigor2960, and Vigor300B devices before 1.5.1, cgi-bin/mainfunction.cgi/cvmcfgupload allows remote command execution via shell metacharacters in a filename when the text/x-python-script content type is used, a different issue than CVE-2020-14472.
CWE-78 Jun 30, 2020
CVE-2020-14413 6.1 MEDIUM NUCLEI EPSS 0.16
Nedi - XSS
NeDi 1.9C is vulnerable to XSS because of an incorrect implementation of sanitize() in inc/libmisc.php. This function attempts to escape the SCRIPT tag from user-controllable values, but can be easily bypassed, as demonstrated by an onerror attribute of an IMG element as a Devices-Config.php?sta= value.
CWE-79 Jun 29, 2020
CVE-2020-9047 6.8 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.18
Johnsoncontrols Exacqvision Enterpris... - Signature Verification Bypass
A vulnerability exists that could allow the execution of unauthorized code or operating system commands on systems running exacqVision Web Service versions 20.06.3.0 and prior and exacqVision Enterprise Manager versions 20.06.4.0 and prior. An attacker with administrative privileges could potentially download and run a malicious executable that could allow OS command injection on the system.
CWE-347 Jun 26, 2020
CVE-2020-13700 7.5 HIGH 1 Writeup NUCLEI EPSS 0.90
Acf TO Rest API < 3.1.0 - IDOR
An issue was discovered in the acf-to-rest-api plugin through 3.1.0 for WordPress. It allows an insecure direct object reference via permalinks manipulation, as demonstrated by a wp-json/acf/v3/options/ request that reads sensitive information in the wp_options table, such as the login and pass values.
CWE-639 Jun 24, 2020
CVE-2020-13483 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.26
Bitrix24 <20.0.0 - XSS
The Web Application Firewall in Bitrix24 through 20.0.0 allows XSS via the items[ITEMS][ID] parameter to the components/bitrix/mobileapp.list/ajax.php/ URI.
CWE-79 Jun 24, 2020
CVE-2020-9480 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Apache Spark < 2.4.5 - Missing Authentication
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared key. This can be leveraged to execute shell commands on the host machine. This does not affect Spark clusters using other resource managers (YARN, Mesos, etc).
CWE-306 Jun 23, 2020
CVE-2020-13158 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.91
Artica Proxy <4.30.000000 - Path Traversal
Artica Proxy before 4.30.000000 Community Edition allows Directory Traversal via the fw.progrss.details.php popup parameter.
CWE-22 Jun 22, 2020
CVE-2020-13640 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.74
Gvectors Wpdiscuz < 5.3.5 - SQL Injection
A SQL injection issue in the gVectors wpDiscuz plugin 5.3.5 and earlier for WordPress allows remote attackers to execute arbitrary SQL commands via the order parameter of a wpdLoadMoreComments request. (No 7.x versions are affected.)
CWE-89 Jun 18, 2020
CVE-2020-14408 6.1 MEDIUM NUCLEI EPSS 0.02
Agentejo Cockpit - XSS
An issue was discovered in Agentejo Cockpit 0.10.2. Insufficient sanitization of the to parameter in the /auth/login route allows for injection of arbitrary JavaScript code into a web page's content, creating a Reflected XSS attack vector.
CWE-79 Jun 17, 2020
CVE-2020-13851 8.8 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Pandora FMS Events Remote Command Execution
Artica Pandora FMS 7.44 allows remote command execution via the events feature.
CWE-78 Jun 11, 2020
CVE-2020-11798 5.3 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.78
Mitel Micollab Audio, Web & Video Conferencing - Path Traversal
A Directory Traversal vulnerability in the web conference component of Mitel MiCollab AWV before 8.1.2.4 and 9.x before 9.1.3 could allow an attacker to access arbitrary files from restricted directories of the server via a crafted URL, due to insufficient access validation. A successful exploit could allow an attacker to access sensitive information from the restricted directories.
CWE-22 Jun 10, 2020