Vulnerabilities with Nuclei Scanner Templates
Updated 2h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2020-11529
6.1
MEDIUM
1 Writeup
NUCLEI
EPSS 0.71
Grav < 1.6.31 - Open Redirect
Common/Grav.php in Grav before 1.7 has an Open Redirect. This is partially fixed in 1.6.23 and still present in 1.6.x.
CWE-601
Apr 04, 2020
CVE-2020-11450
7.5
HIGH
NUCLEI
EPSS 0.90
Microstrategy Web <10.4 - Info Disclosure
Microstrategy Web 10.4 exposes the JVM configuration, CPU architecture, installation folder, and other information through the URL /MicroStrategyWS/happyaxis.jsp. An attacker could use this vulnerability to learn more about the environment the application is running in. This issue has been mitigated in all versions of the product 11.0 and higher.
Apr 02, 2020
CVE-2020-1943
6.1
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.84
Apache Ofbiz < 16.11.07 - XSS
Data sent with contentId to /control/stream is not sanitized, allowing XSS attacks in Apache OFBiz 16.11.01 to 16.11.07.
CWE-79
Apr 01, 2020
CVE-2020-11455
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.94
Limesurvey < 4.1.11 - Path Traversal
LimeSurvey before 4.1.12+200324 contains a path traversal vulnerability in application/controllers/admin/LimeSurveyFileManager.php.
CWE-22
Apr 01, 2020
CVE-2020-11441
6.1
MEDIUM
NUCLEI
EPSS 0.01
Phpmyadmin - Injection
phpMyAdmin 5.0.2 allows CRLF injection, as demonstrated by %0D%0Astring%0D%0A inputs to login form fields causing CRLF sequences to be reflected on an error page. NOTE: the vendor states "I don't see anything specifically exploitable.
CWE-74
Mar 31, 2020
CVE-2020-5284
4.4
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.83
Zeit Next.js < 9.3.2 - Path Traversal
Next.js versions before 9.3.2 have a directory traversal vulnerability. Attackers could craft special requests to access files in the dist directory (.next). This does not affect files outside of the dist directory (.next). In general, the dist directory only holds build assets unless your application intentionally stores other assets under this directory. This issue is fixed in version 9.3.2.
CWE-22
Mar 30, 2020
CVE-2020-5722
9.8
CRITICAL
KEV
2 PoCs
Analysis
NUCLEI
EPSS 0.93
Grandstream UCM6200 <1.0.19.20 - SQL Injection
The HTTP interface of the Grandstream UCM6200 series is vulnerable to an unauthenticated remote SQL injection via crafted HTTP request. An attacker can use this vulnerability to execute shell commands as root on versions before 1.0.19.20 or inject HTML in password recovery emails in versions before 1.0.20.17.
CWE-89
Mar 23, 2020
CVE-2020-8497
5.3
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.22
Artica Pandora FMS <7.42 - Info Disclosure
In Artica Pandora FMS through 7.42, an unauthenticated attacker can read the chat history. The file is in JSON format and it contains user names, user IDs, private messages, and timestamps.
CWE-306
Mar 23, 2020
CVE-2020-7961
9.8
CRITICAL
KEV
16 PoCs
Analysis
NUCLEI
EPSS 0.94
Liferay Portal <7.2.1 CE GA2 - Code Injection
Deserialization of Untrusted Data in Liferay Portal prior to 7.2.1 CE GA2 allows remote attackers to execute arbitrary code via JSON web services (JSONWS).
CWE-502
Mar 20, 2020
CVE-2020-9425
7.5
HIGH
NUCLEI
EPSS 0.49
rConfig <3.9.4 - Info Disclosure
An issue was discovered in includes/head.inc.php in rConfig before 3.9.4. An unauthenticated attacker can retrieve saved cleartext credentials via a GET request to settings.php. Because the application was not exiting after a redirect is applied, the rest of the page still executed, resulting in the disclosure of cleartext credentials in the response.
CWE-670
Mar 20, 2020
CVE-2020-9344
6.1
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.40
Atlassian Subversion Application Lifecycle Management < 8.8.2 - XSS
Subversion ALM for the enterprise before 8.8.2 allows reflected XSS at multiple locations.
CWE-79
Mar 20, 2020
CVE-2020-5847
9.8
CRITICAL
KEV
3 PoCs
Analysis
NUCLEI
EPSS 0.94
Unraid <6.8.0 - RCE
Unraid through 6.8.0 allows Remote Code Execution.
Mar 16, 2020
CVE-2020-7943
7.5
HIGH
NUCLEI
EPSS 0.65
Puppet Server <6.9.2 & 5.3.12 - Info Disclosure
Puppet Server and PuppetDB provide useful performance and debugging information via their metrics API endpoints. For PuppetDB this may contain things like hostnames. Puppet Server reports resource names and titles for defined types (which may contain sensitive information) as well as function names and class names. Previously, these endpoints were open to the local network. PE 2018.1.13 & 2019.5.0, Puppet Server 6.9.2 & 5.3.12, and PuppetDB 6.9.1 & 5.2.13 disable trapperkeeper-metrics /v1 metrics API and only allows /v2 access on localhost by default. This affects software versions: Puppet Enterprise 2018.1.x stream prior to 2018.1.13 Puppet Enterprise prior to 2019.5.0 Puppet Server prior to 6.9.2 Puppet Server prior to 5.3.12 PuppetDB prior to 6.9.1 PuppetDB prior to 5.2.13 Resolved in: Puppet Enterprise 2018.1.13 Puppet Enterprise 2019.5.0 Puppet Server 6.9.2 Puppet Server 5.3.12 PuppetDB 6.9.1 PuppetDB 5.2.13
CWE-276
Mar 11, 2020
CVE-2020-6207
9.8
CRITICAL
KEV
4 PoCs
Analysis
NUCLEI
EPSS 0.94
SAP Solution Manager 7.2 - Auth Bypass
SAP Solution Manager (User Experience Monitoring), version- 7.2, due to Missing Authentication Check does not perform any authentication for a service resulting in complete compromise of all SMDAgents connected to the Solution Manager.
CWE-306
Mar 10, 2020
CVE-2020-2140
6.1
MEDIUM
NUCLEI
EPSS 0.45
Jenkins Audit Trail < 3.2 - XSS
Jenkins Audit Trail Plugin 3.2 and earlier does not escape the error message for the URL Patterns field form validation, resulting in a reflected cross-site scripting vulnerability.
CWE-79
Mar 09, 2020
CVE-2020-5405
6.5
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.88
Spring Cloud Config <2.2.2 & <2.1.7 - Path Traversal
Spring Cloud Config, versions 2.2.x prior to 2.2.2, versions 2.1.x prior to 2.1.7, and older unsupported versions allow applications to serve arbitrary configuration files through the spring-cloud-config-server module. A malicious user, or attacker, can send a request using a specially crafted URL that can lead a directory traversal attack.
CWE-22
Mar 05, 2020
CVE-2020-9054
9.8
CRITICAL
KEV
1 PoC
Analysis
NUCLEI
EPSS 0.94
Zyxel Nas326 Firmware < 5.21\(aazf.7\)c0 - OS Command Injection
Multiple ZyXEL network-attached storage (NAS) devices running firmware version 5.21 contain a pre-authentication command injection vulnerability, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable device. ZyXEL NAS devices achieve authentication by using the weblogin.cgi CGI executable. This program fails to properly sanitize the username parameter that is passed to it. If the username parameter contains certain characters, it can allow command injection with the privileges of the web server that runs on the ZyXEL device. Although the web server does not run as the root user, ZyXEL devices include a setuid utility that can be leveraged to run any command with root privileges. As such, it should be assumed that exploitation of this vulnerability can lead to remote code execution with root privileges. By sending a specially-crafted HTTP POST or GET request to a vulnerable ZyXEL device, a remote, unauthenticated attacker may be able to execute arbitrary code on the device. This may happen by directly connecting to a device if it is directly exposed to an attacker. However, there are ways to trigger such crafted requests even if an attacker does not have direct connectivity to a vulnerable devices. For example, simply visiting a website can result in the compromise of any ZyXEL device that is reachable from the client system. Affected products include: NAS326 before firmware V5.21(AAZF.7)C0 NAS520 before firmware V5.21(AASZ.3)C0 NAS540 before firmware V5.21(AATB.4)C0 NAS542 before firmware V5.21(ABAG.4)C0 ZyXEL has made firmware updates available for NAS326, NAS520, NAS540, and NAS542 devices. Affected models that are end-of-support: NSA210, NSA220, NSA220+, NSA221, NSA310, NSA310S, NSA320, NSA320S, NSA325 and NSA325v2
CWE-78
Mar 04, 2020
CVE-2020-9757
9.8
CRITICAL
EXPLOITED
2 Writeups
NUCLEI
EPSS 0.94
Craftcms Craft Cms < 3.3.0 - Injection
The SEOmatic component before 3.3.0 for Craft CMS allows Server-Side Template Injection that leads to RCE via malformed data to the metacontainers controller.
CWE-74
Mar 04, 2020
CVE-2020-9548
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.58
Fasterxml Jackson-databind < 2.7.9.7 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core).
CWE-502
Mar 02, 2020
CVE-2020-9547
9.8
CRITICAL
EXPLOITED
3 PoCs
Analysis
NUCLEI
EPSS 0.38
Fasterxml Jackson-databind < 2.7.9.7 - Insecure Deserialization
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap).
CWE-502
Mar 02, 2020