Vulnerabilities with Nuclei Scanner Templates

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,468 CVEs tracked 53,663 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,324 vendors 43,878 researchers
4,077 results Clear all
CVE-2020-11529 6.1 MEDIUM 1 Writeup NUCLEI EPSS 0.71
Grav < 1.6.31 - Open Redirect
Common/Grav.php in Grav before 1.7 has an Open Redirect. This is partially fixed in 1.6.23 and still present in 1.6.x.
CWE-601 Apr 04, 2020
CVE-2020-11450 7.5 HIGH NUCLEI EPSS 0.90
Microstrategy Web <10.4 - Info Disclosure
Microstrategy Web 10.4 exposes the JVM configuration, CPU architecture, installation folder, and other information through the URL /MicroStrategyWS/happyaxis.jsp. An attacker could use this vulnerability to learn more about the environment the application is running in. This issue has been mitigated in all versions of the product 11.0 and higher.
Apr 02, 2020
CVE-2020-1943 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.84
Apache Ofbiz < 16.11.07 - XSS
Data sent with contentId to /control/stream is not sanitized, allowing XSS attacks in Apache OFBiz 16.11.01 to 16.11.07.
CWE-79 Apr 01, 2020
CVE-2020-11455 9.8 CRITICAL EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.94
Limesurvey < 4.1.11 - Path Traversal
LimeSurvey before 4.1.12+200324 contains a path traversal vulnerability in application/controllers/admin/LimeSurveyFileManager.php.
CWE-22 Apr 01, 2020
CVE-2020-11441 6.1 MEDIUM NUCLEI EPSS 0.01
Phpmyadmin - Injection
phpMyAdmin 5.0.2 allows CRLF injection, as demonstrated by %0D%0Astring%0D%0A inputs to login form fields causing CRLF sequences to be reflected on an error page. NOTE: the vendor states "I don't see anything specifically exploitable.
CWE-74 Mar 31, 2020
CVE-2020-5284 4.4 MEDIUM EXPLOITED NUCLEI EPSS 0.83
Zeit Next.js < 9.3.2 - Path Traversal
Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2.
CWE-22 Mar 30, 2020
CVE-2020-5722 9.8 CRITICAL KEV 2 PoCs Analysis NUCLEI EPSS 0.93
Grandstream UCM6200 <1.0.19.20 - SQL Injection
The HTTP interface of the Grandstream UCM6200 series is vulnerable to an unauthenticated remote SQL injection via crafted HTTP request. An attacker can use this vulnerability to execute shell commands as root on versions before 1.0.19.20 or inject HTML in password recovery emails in versions before 1.0.20.17.
CWE-89 Mar 23, 2020
CVE-2020-8497 5.3 MEDIUM EXPLOITED NUCLEI EPSS 0.22
Artica Pandora FMS <7.42 - Info Disclosure
In Artica Pandora FMS through 7.42, an unauthenticated attacker can read the chat history. The file is in JSON format and it contains user names, user IDs, private messages, and timestamps.
CWE-306 Mar 23, 2020
CVE-2020-7961 9.8 CRITICAL KEV 16 PoCs Analysis NUCLEI EPSS 0.94
Liferay Portal <7.2.1 CE GA2 - Code Injection
Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS).
CWE-502 Mar 20, 2020
CVE-2020-9425 7.5 HIGH NUCLEI EPSS 0.49
rConfig <3.9.4 - Info Disclosure
An issue was discovered in includes/head.inc.php in rConfig before 3.9.4. An unauthenticated attacker can retrieve saved cleartext credentials via a GET request to settings.php. Because the application was not exiting after a redirect is applied, the rest of the page still executed, resulting in the disclosure of cleartext credentials in the response.
CWE-670 Mar 20, 2020
CVE-2020-9344 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.40
Atlassian Subversion Application Lifecycle Management < 8.8.2 - XSS
Subversion ALM for the enterprise before 8.8.2 allows reflected XSS at multiple locations.
CWE-79 Mar 20, 2020
CVE-2020-5847 9.8 CRITICAL KEV 3 PoCs Analysis NUCLEI EPSS 0.94
Unraid <6.8.0 - RCE
Unraid through 6.8.0 allows Remote Code Execution.
Mar 16, 2020
CVE-2020-7943 7.5 HIGH NUCLEI EPSS 0.65
Puppet Server <6.9.2 & 5.3.12 - Info Disclosure
Puppet Server and PuppetDB provide useful performance and debugging information via their metrics API endpoints. For PuppetDB this may contain things like hostnames. Puppet Server reports resource names and titles for defined types (which may contain sensitive information) as well as function names and class names. Previously, these endpoints were open to the local network. PE 2018.1.13 & 2019.5.0, Puppet Server 6.9.2 & 5.3.12, and PuppetDB 6.9.1 & 5.2.13 disable trapperkeeper-metrics /v1 metrics API and only allows /v2 access on localhost by default. This affects software versions: Puppet Enterprise 2018.1.x stream prior to 2018.1.13 Puppet Enterprise prior to 2019.5.0 Puppet Server prior to 6.9.2 Puppet Server prior to 5.3.12 PuppetDB prior to 6.9.1 PuppetDB prior to 5.2.13 Resolved in: Puppet Enterprise 2018.1.13 Puppet Enterprise 2019.5.0 Puppet Server 6.9.2 Puppet Server 5.3.12 PuppetDB 6.9.1 PuppetDB 5.2.13
CWE-276 Mar 11, 2020
CVE-2020-6207 9.8 CRITICAL KEV 4 PoCs Analysis NUCLEI EPSS 0.94
SAP Solution Manager 7.2 - Auth Bypass
SAP Solution Manager (User Experience Monitoring), version- 7.2, due to Missing Authentication Check does not perform any authentication for a service resulting in complete compromise of all SMDAgents connected to the Solution Manager.
CWE-306 Mar 10, 2020
CVE-2020-2140 6.1 MEDIUM NUCLEI EPSS 0.45
Jenkins Audit Trail < 3.2 - XSS
Jenkins Audit Trail Plugin 3.2 and earlier does not escape the error message for the URL Patterns field form validation, resulting in a reflected cross-site scripting vulnerability.
CWE-79 Mar 09, 2020
CVE-2020-5405 6.5 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.88
Spring Cloud Config <2.2.2 & <2.1.7 - Path Traversal
Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.
CWE-22 Mar 05, 2020
CVE-2020-9054 9.8 CRITICAL KEV 1 PoC Analysis NUCLEI EPSS 0.94
Zyxel Nas326 Firmware < 5.21\(aazf.7\)c0 - OS Command Injection
Multiple ZyXEL network-attached storage (NAS) devices running firmware version 5.21 contain a pre-authentication command injection vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable device. ZyXEL NAS devices achieve authentication by using the weblogin.cgi CGI executable. This program fails to properly sanitize the username parameter that is passed to it. If the username parameter contains certain characters, it can allow command injection with the privileges of the web server that runs on the ZyXEL device. Although the web server does not run as the root user, ZyXEL devices include a setuid utility that can be leveraged to run any command with root privileges. As such, it should be assumed that exploitation of this vulnerability can lead to remote code execution with root privileges. By sending a specially-crafted HTTP POST or GET request to a vulnerable ZyXEL device, a remote, unauthenticated attacker may be able to execute arbitrary code on the device. This may happen by directly connecting to a device if it is directly exposed to an attacker. However, there are ways to trigger such crafted requests even if an attacker does not have direct connectivity to a vulnerable devices. For example, simply visiting a website can result in the compromise of any ZyXEL device that is reachable from the client system. Affected products include: NAS326 before firmware V5.21(AAZF.7)C0 NAS520 before firmware V5.21(AASZ.3)C0 NAS540 before firmware V5.21(AATB.4)C0 NAS542 before firmware V5.21(ABAG.4)C0 ZyXEL has made firmware updates available for NAS326, NAS520, NAS540, and NAS542 devices. Affected models that are end-of-support: NSA210, NSA220, NSA220+, NSA221, NSA310, NSA310S, NSA320, NSA320S, NSA325 and NSA325v2
CWE-78 Mar 04, 2020
CVE-2020-9757 9.8 CRITICAL EXPLOITED 2 Writeups NUCLEI EPSS 0.94
Craftcms Craft Cms < 3.3.0 - Injection
The SEOmatic component before 3.3.0 for Craft CMS allows Server-Side Template Injection that leads to RCE via malformed data to the metacontainers controller.
CWE-74 Mar 04, 2020
CVE-2020-9548 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.58
Fasterxml Jackson-databind < 2.7.9.7 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).
CWE-502 Mar 02, 2020
CVE-2020-9547 9.8 CRITICAL EXPLOITED 3 PoCs Analysis NUCLEI EPSS 0.38
Fasterxml Jackson-databind < 2.7.9.7 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
CWE-502 Mar 02, 2020