Vulnerabilities with Nuclei Scanner Templates

Updated 4h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,468 CVEs tracked 53,663 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,324 vendors 43,878 researchers
4,077 results Clear all
CVE-2020-12800 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
Wordpress Drag and Drop Multi File Uploader RCE
The drag-and-drop-multiple-file-upload-contact-form-7 plugin before 1.3.3.3 for WordPress allows Unrestricted File Upload and remote code execution by setting supported_type to php% and uploading a .php% file.
CWE-434 Jun 08, 2020
CVE-2020-11975 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.88
Apache Unomi - RCE
Apache Unomi allows conditions to use OGNL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process.
Jun 05, 2020
CVE-2020-10549 9.8 CRITICAL 1 Writeup NUCLEI EPSS 0.93
rConfig <3.9.4 - SQL Injection
rConfig 3.9.4 and previous versions has unauthenticated snippets.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
CWE-89 Jun 04, 2020
CVE-2020-10548 9.8 CRITICAL EXPLOITED 1 Writeup NUCLEI EPSS 0.93
rConfig <3.9.4 - SQL Injection
rConfig 3.9.4 and previous versions has unauthenticated devices.inc.php SQL injection. Because, by default, nodes' passwords are stored in cleartext, this vulnerability leads to lateral movement, granting an attacker access to monitored network devices.
CWE-89 Jun 04, 2020
CVE-2020-13379 8.2 HIGH EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Grafana 3.0.1-7.0.1 - SSRF
The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the network that Grafana is running on. Furthermore, passing invalid URL objects could be used for DOS'ing Grafana via SegFault.
CWE-918 Jun 03, 2020
CVE-2020-5410 7.5 HIGH KEV 5 PoCs Analysis NUCLEI EPSS 0.94
Spring Cloud Config <2.2.3 & <2.1.9 - Path Traversal
Spring Cloud Config, versions 2.2.x prior to 2.2.3, versions 2.1.x prior to 2.1.9, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead to a directory traversal attack.
CWE-22 Jun 02, 2020
CVE-2020-1956 8.8 HIGH KEV 1 PoC Analysis NUCLEI EPSS 0.94
Apache Kylin < 2.3.2 - OS Command Injection
Apache Kylin 2.3.0, and releases up to 2.6.5 and 3.0.1 has some restful apis which will concatenate os command with the user input string, a user is likely to be able to execute any os command without any protection or validation.
CWE-78 May 22, 2020
CVE-2020-13258 6.1 MEDIUM NUCLEI EPSS 0.01
Contentful <2020-05-21 - XSS
Contentful through 2020-05-21 for Python allows reflected XSS, as demonstrated by the api parameter to the-example-app.py.
CWE-79 May 21, 2020
CVE-2020-9484 7.0 HIGH 20 PoCs Analysis NUCLEI EPSS 0.93
Apache Tomcat < 7.0.108 - Insecure Deserialization
When using Apache Tomcat versions 10.0.0-M1 to 10.0.0-M4, 9.0.0.M1 to 9.0.34, 8.5.0 to 8.5.54 and 7.0.0 to 7.0.103 if a) an attacker is able to control the contents and name of a file on the server; and b) the server is configured to use the PersistenceManager with a FileStore; and c) the PersistenceManager is configured with sessionAttributeValueClassNameFilter="null" (the default unless a SecurityManager is used) or a sufficiently lax filter to allow the attacker provided object to be deserialized; and d) the attacker knows the relative file path from the storage location used by FileStore to the file the attacker has control over; then, using a specifically crafted request, the attacker will be able to trigger remote code execution via deserialization of the file under their control. Note that all of conditions a) to d) must be true for the attack to succeed.
CWE-502 May 20, 2020
CVE-2020-13167 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.93
Netsweeper <6.4.3 - RCE
Netsweeper through 6.4.3 allows unauthenticated remote code execution because webadmin/tools/unixlogin.php (with certain Referer headers) launches a command line with client-supplied parameters, and allows injection of shell metacharacters.
CWE-78 May 19, 2020
CVE-2020-12256 5.4 MEDIUM NUCLEI EPSS 0.55
Rconfig - XSS
rConfig 3.9.4 is vulnerable to reflected XSS. The devicemgmnt.php file improperly validates user input. An attacker can exploit this by crafting arbitrary JavaScript in the deviceId GET parameter to devicemgmnt.php.
CWE-79 May 18, 2020
CVE-2020-12259 5.4 MEDIUM NUCLEI EPSS 0.68
Rconfig - XSS
rConfig 3.9.4 is vulnerable to reflected XSS. The configDevice.php file improperly validates user input. An attacker can exploit this vulnerability by crafting arbitrary JavaScript in the rid GET parameter of devicemgmnt.php.
CWE-79 May 18, 2020
CVE-2020-13125 6.5 MEDIUM EXPLOITED NUCLEI EPSS 0.11
Ultimate Addons for Elementor <1.24.2 - Privilege Escalation
An issue was discovered in the "Ultimate Addons for Elementor" plugin before 1.24.2 for WordPress, as exploited in the wild in May 2020 in conjunction with CVE-2020-13126. Unauthenticated attackers can create users with the Subscriber role even if registration is disabled.
May 17, 2020
CVE-2020-13121 6.1 MEDIUM NUCLEI EPSS 0.03
Submitty <20.04.01 - Open Redirect
Submitty through 20.04.01 has an open redirect via authentication/login?old= during an invalid login attempt.
CWE-601 May 16, 2020
CVE-2020-12832 9.8 CRITICAL EXPLOITED NUCLEI EPSS 0.72
WordPress Plugin Simple File List <4.2.8 - Info Disclosure
WordPress Plugin Simple File List before 4.2.8 is prone to a vulnerability that lets attackers delete arbitrary files because the application fails to properly verify user-supplied input.
CWE-22 May 13, 2020
CVE-2020-9315 7.5 HIGH NUCLEI EPSS 0.88
Oracle Iplanet Web Server < 7.0.27 - Missing Authentication
** PRODUCT NOT SUPPORTED WHEN ASSIGNED ** Oracle iPlanet Web Server 7.0.x has Incorrect Access Control for admingui/version URIs in the Administration console, as demonstrated by unauthenticated read access to encryption keys. NOTE: a related support policy can be found in the www.oracle.com references attached to this CVE.
CWE-306 May 10, 2020
CVE-2020-9314 4.8 MEDIUM EXPLOITED NUCLEI EPSS 0.12
Oracle Iplanet Web Server < 7.0.27 - XSS
** PRODUCT NOT SUPPORTED WHEN ASSIGNED ** Oracle iPlanet Web Server 7.0.x allows image injection in the Administration console via the productNameSrc parameter to an admingui URI. This issue exists because of an incomplete fix for CVE-2012-0516. NOTE: a related support policy can be found in the www.oracle.com references attached to this CVE.
CWE-79 May 10, 2020
CVE-2020-11530 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.93
Idangero Chop Slider - SQL Injection
A blind SQL injection vulnerability is present in Chop Slider 3, a WordPress plugin. The vulnerability is introduced in the id GET parameter supplied to get_script/index.php, and allows an attacker to execute arbitrary SQL queries in the context of the WP database user.
CWE-89 May 08, 2020
CVE-2020-12720 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.94
vBulletin <5.5.6pl1, <5.6.0pl1, <5.6.1pl1 - Privilege Escalation
vBulletin before 5.5.6pl1, 5.6.0 before 5.6.0pl1, and 5.6.1 before 5.6.1pl1 has incorrect access control.
CWE-306 May 08, 2020
CVE-2020-4427 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.93
IBM Data Risk Manager < 2.0.6.1 - Authentication Bypass
IBM Data Risk Manager 2.0.1, 2.0.2, 2.0.3, 2.0.4, 2.0.5, and 2.0.6 could allow a remote attacker to bypass security restrictions when configured with SAML authentication. By sending a specially crafted HTTP request, an attacker could exploit this vulnerability to bypass the authentication process and gain full administrative access to the system. IBM X-Force ID: 180532.
CWE-287 May 07, 2020