Vulnerabilities with Nuclei Scanner Templates
Updated 5h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2019-25152
7.2
HIGH
EXPLOITED
NUCLEI
EPSS 0.27
Abandoned Cart Lite/WooCommerce <5.1.3 & Abandoned Cart Pro/WooComm...
The Abandoned Cart Lite for WooCommerce and Abandoned Cart Pro for WooCommerce plugins for WordPress are vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 5.1.3 and 7.12.0 respectively, due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in user input that will execute on the admin dashboard.
CWE-79
Jun 22, 2023
CVE-2019-25141
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.63
Easy WP SMTP <1.3.9 - Auth Bypass
The Easy WP SMTP plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 1.3.9. This is due to missing capability checks on the admin_init() function, in addition to insufficient input validation. This makes it possible for unauthenticated attackers to modify the plugins settings and arbitrary options on the site that can be used to inject new administrative user accounts.
CWE-862
Jun 07, 2023
CVE-2019-20933
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.94
InfluxDB <1.7.6 - Auth Bypass
InfluxDB before 1.7.6 has an authentication bypass vulnerability in the authenticate function in services/httpd/handler.go because a JWT token may have an empty SharedSecret (aka shared secret).
CWE-287
Nov 19, 2020
CVE-2019-17444
9.8
CRITICAL
NUCLEI
EPSS 0.92
Jfrog Artifactory <6.17.0 - Info Disclosure
Jfrog Artifactory uses default passwords (such as "password") for administrative accounts and does not require users to change them. This may allow unauthorized network-based attackers to completely compromise of Jfrog Artifactory. This issue affects Jfrog Artifactory versions prior to 6.17.0.
CWE-521
Oct 12, 2020
CVE-2019-0230
9.8
CRITICAL
7 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Struts < 2.5.20 - Prototype Pollution
Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
CWE-1321
Sep 14, 2020
CVE-2019-5591
6.5
MEDIUM
KEV
RANSOMWARE
1 PoC
Analysis
NUCLEI
EPSS 0.48
Fortinet Fortios < 6.2.0 - Missing Authentication
A Default Configuration vulnerability in FortiOS may allow an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the LDAP server.
CWE-306
Aug 14, 2020
CVE-2019-6112
6.1
MEDIUM
1 Writeup
NUCLEI
EPSS 0.16
Graphpaperpress Sell Media < 2.4.1 - XSS
A Cross-site scripting (XSS) vulnerability in /inc/class-search.php in the Sell Media plugin v2.4.1 for WordPress allows remote attackers to inject arbitrary web script or HTML via the keyword parameter (aka $search_term or the Search field).
CWE-79
Aug 14, 2020
CVE-2019-17231
6.1
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.00
Mageewp Onetone < 3.0.6 - XSS
includes/theme-functions.php in the OneTone theme through 3.0.6 for WordPress has multiple stored XSS issues.
CWE-79
Apr 03, 2020
CVE-2019-17230
5.3
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.08
OneTone <3.0.6 - Unauthenticated Options Change
includes/theme-functions.php in the OneTone theme through 3.0.6 for WordPress allows unauthenticated options changes.
Apr 03, 2020
CVE-2019-17564
9.8
CRITICAL
EXPLOITED
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Apache Dubbo < 2.5.10 - Insecure Deserialization
Unsafe deserialization occurs within a Dubbo application which has HTTP remoting enabled. An attacker may submit a POST request with a Java object in it to completely compromise a Provider instance of Apache Dubbo, if this instance enables HTTP. This issue affected Apache Dubbo 2.7.0 to 2.7.4, 2.6.0 to 2.6.7, and all 2.5.x versions.
CWE-502
Apr 01, 2020
CVE-2019-16072
9.8
CRITICAL
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.89
NETSAS Enigma NMS <65.0.0 - Command Injection
An OS command injection vulnerability in the discover_and_manage CGI script in NETSAS Enigma NMS 65.0.0 and prior allows an attacker to execute arbitrary code because of improper neutralization of shell metacharacters in the ip_address variable within an snmp_browser action.
CWE-78
Mar 20, 2020
CVE-2019-20504
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.56
Quest Kace Systems Management < 6.4.120822 - OS Command Injection
service/krashrpt.php in Quest KACE K1000 Systems Management Appliance before 6.4 SP3 (6.4.120822) allows a remote attacker to execute code via shell metacharacters in the kuid parameter.
CWE-78
Mar 09, 2020
CVE-2019-19134
6.1
MEDIUM
NUCLEI
EPSS 0.17
Hero Maps Premium <2.2.1 - XSS
The Hero Maps Premium plugin 2.2.1 and prior for WordPress is prone to unauthenticated XSS via the views/dashboard/index.php p parameter because it fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to inject HTML or arbitrary JavaScript within the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based tokens or to launch other attacks.
CWE-79
Feb 26, 2020
CVE-2019-17228
6.5
MEDIUM
EXPLOITED
NUCLEI
EPSS 0.04
Stylemixthemes Motors - Car Dealer, C... - Data Authenticity Bypass
includes/options.php in the motors-car-dealership-classified-listings (aka Motors - Car Dealer & Classified Ads) plugin through 1.4.0 for WordPress allows unauthenticated options changes.
CWE-345
Feb 24, 2020
CVE-2019-19824
8.8
HIGH
EXPLOITED
1 Writeup
NUCLEI
EPSS 0.90
Totolink A3002ru Firmware < 2.0.0 - OS Command Injection
On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, N100RE through 3.4.0, and N302RE 2.0.2.
CWE-78
Jan 27, 2020
CVE-2019-19823
7.5
HIGH
1 Writeup
NUCLEI
EPSS 0.29
Totolink A3002ru Firmware - Insufficiently Protected Credentials
A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) stores cleartext administrative passwords in flash memory and in a file. This affects TOTOLINK A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0; Rutek RTK 11N AP through 2019-12-12; Sapido GR297n through 2019-12-12; CIK TELECOM MESH ROUTER through 2019-12-12; KCTVJEJU Wireless AP through 2019-12-12; Fibergate FGN-R2 through 2019-12-12; Hi-Wifi MAX-C300N through 2019-12-12; HCN MAX-C300N through 2019-12-12; T-broad GN-866ac through 2019-12-12; Coship EMTA AP through 2019-12-12; and IO-Data WN-AC1167R through 2019-12-12.
CWE-522
Jan 27, 2020
CVE-2019-19822
7.5
HIGH
1 Writeup
NUCLEI
EPSS 0.54
Totolink A3002ru Firmware < 2.0.0 - Missing Authentication
A certain router administration interface (that includes Realtek APMIB 0.11f for Boa 0.94.14rc21) allows remote attackers to retrieve the configuration, including sensitive data (usernames and passwords). This affects TOTOLINK A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0; Rutek RTK 11N AP through 2019-12-12; Sapido GR297n through 2019-12-12; CIK TELECOM MESH ROUTER through 2019-12-12; KCTVJEJU Wireless AP through 2019-12-12; Fibergate FGN-R2 through 2019-12-12; Hi-Wifi MAX-C300N through 2019-12-12; HCN MAX-C300N through 2019-12-12; T-broad GN-866ac through 2019-12-12; Coship EMTA AP through 2019-12-12; and IO-Data WN-AC1167R through 2019-12-12.
CWE-306
Jan 27, 2020
CVE-2019-19825
9.8
CRITICAL
EXPLOITED
NUCLEI
EPSS 0.19
Totolink A3002ru Firmware < 2.0.0 - Authentication Bypass
On certain TOTOLINK Realtek SDK based routers, the CAPTCHA text can be retrieved via an {"topicurl":"setting/getSanvas"} POST to the boafrm/formLogin URI, leading to a CAPTCHA bypass. (Also, the CAPTCHA text is not needed once the attacker has determined valid credentials. The attacker can perform router actions via HTTP requests with Basic Authentication.) This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, and N100RE through 3.4.0.
CWE-287
Jan 27, 2020
CVE-2019-19411
3.7
LOW
NUCLEI
EPSS 0.03
USG9500 <V500R001C30SPC100-V500R005C00SPC200 - Info Disclosure
USG9500 with versions of V500R001C30SPC100, V500R001C30SPC200, V500R001C30SPC600, V500R001C60SPC500, V500R005C00SPC100, V500R005C00SPC200 have an information leakage vulnerability. Due to improper processing of the initialization vector used in a specific encryption algorithm, an attacker who gains access to this cryptographic primitive may exploit this vulnerability to cause the value of the confidentiality associated with its use to be diminished.
CWE-665
Jan 21, 2020
CVE-2019-16469
7.5
HIGH
NUCLEI
EPSS 0.71
Adobe Experience Manager <6.6 - Info Disclosure
Adobe Experience Manager versions 6.5, 6.4, 6.3, 6.2, 6.1, and 6.0 have an expression language injection vulnerability. Successful exploitation could lead to sensitive information disclosure.
CWE-917
Jan 15, 2020