Vulnerabilities with Nuclei Scanner Templates

Updated 2h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,077 results Clear all
CVE-2019-11013 6.5 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.87
Softvelum Nimble Streamer < 3.5.4-9 - Path Traversal
Nimble Streamer 3.0.2-2 through 3.5.4-9 has a ../ directory traversal vulnerability. Successful exploitation could allow an attacker to traverse the file system to access files or directories that are outside of the restricted directory on the remote server.
CWE-22 Aug 22, 2019
CVE-2019-15107 9.8 CRITICAL KEV 49 PoCs Analysis NUCLEI EPSS 0.94
Webmin < 1.920 - OS Command Injection
An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability.
CWE-78 Aug 16, 2019
CVE-2019-14789 6.1 MEDIUM NUCLEI EPSS 0.00
Kunalnagar Custom 404 Pro - XSS
The Custom 404 Pro plugin 3.2.8 for WordPress has XSS via the wp-admin/admin.php?page=c4p-main page parameter.
CWE-79 Aug 15, 2019
CVE-2019-14974 6.1 MEDIUM 2 PoCs Analysis NUCLEI EPSS 0.47
Sugarcrm - XSS
SugarCRM Enterprise 9.0.0 allows mobile/error-not-supported-platform.html?desktop_url= XSS.
CWE-79 Aug 14, 2019
CVE-2019-14530 8.8 HIGH 3 PoCs Analysis NUCLEI EPSS 0.60
OpenEMR <5.0.2 - Info Disclosure
An issue was discovered in custom/ajax_download.php in OpenEMR before 5.0.2 via the fileName parameter. An attacker can download any file (that is readable by the user www-data) from server storage. If the requested file is writable for the www-data user and the directory /var/www/openemr/sites/default/documents/cqm_qrda/ exists, it will be deleted from server.
CWE-22 Aug 13, 2019
CVE-2019-13462 9.1 CRITICAL EXPLOITED NUCLEI EPSS 0.79
Lansweeper < 7.1.117.4 - SQL Injection
Lansweeper before 7.1.117.4 allows unauthenticated SQL injection.
CWE-89 Aug 12, 2019
CVE-2019-14950 6.1 MEDIUM EXPLOITED NUCLEI EPSS 0.05
3CX Live Chat < 8.0.27 - XSS
The wp-live-chat-support plugin before 8.0.27 for WordPress has XSS via the GDPR page.
CWE-79 Aug 12, 2019
CVE-2019-11581 9.8 CRITICAL KEV 4 PoCs Analysis NUCLEI EPSS 0.94
Jira Server/Data Center <7.6.14, <7.13.5, <8.0.3, <8.1.2, <8.2.3 - RCE
There was a server-side template injection vulnerability in Jira Server and Data Center, in the ContactAdministrators and the SendBulkMail actions. An attacker is able to remotely execute code on systems that run a vulnerable version of Jira Server or Data Center. All versions of Jira Server and Data Center from 4.4.0 before 7.6.14, from 7.7.0 before 7.13.5, from 8.0.0 before 8.0.3, from 8.1.0 before 8.1.2, and from 8.2.0 before 8.2.3 are affected by this vulnerability.
CWE-74 Aug 09, 2019
CVE-2019-14312 6.5 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.56
Aptana Jaxer 1.0.3.4547 - Info Disclosure
Aptana Jaxer 1.0.3.4547 is vulnerable to a local file inclusion vulnerability in the wikilite source code viewer. This vulnerability allows a remote attacker to read internal files on the server via a tools/sourceViewer/index.html?filename=../ URI.
CWE-22 Aug 09, 2019
CVE-2019-13101 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.86
Dlink Dir-600m Firmware - Missing Authentication
An issue was discovered on D-Link DIR-600M 3.02, 3.03, 3.04, and 3.06 devices. wan.htm can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify the data fields of the page.
CWE-306 Aug 08, 2019
CVE-2019-14750 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.04
Osticket < 1.10.7 - XSS
An issue was discovered in osTicket before 1.10.7 and 1.12.x before 1.12.1. Stored XSS exists in setup/install.php. It was observed that no input sanitization was provided in the firstname and lastname fields of the application. The insertion of malicious queries in those fields leads to the execution of those queries. This can further lead to cookie stealing or other malicious actions.
CWE-79 Aug 07, 2019
CVE-2019-14696 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.12
Open-School <3.0-2.3 - XSS
Open-School 3.0, and Community Edition 2.3, allows XSS via the osv/index.php?r=students/guardians/create id parameter.
CWE-79 Aug 06, 2019
CVE-2019-0193 7.2 HIGH KEV 5 PoCs Analysis NUCLEI EPSS 0.93
Apache Solr < 7.7.3 - Code Injection
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true.
CWE-94 Aug 01, 2019
CVE-2019-14322 7.5 HIGH 4 PoCs Analysis NUCLEI EPSS 0.90
Pallets Werkzeug <0.15.5 - Path Traversal
In Pallets Werkzeug before 0.15.5, SharedDataMiddleware mishandles drive names (such as C:) in Windows pathnames.
CWE-22 Jul 28, 2019
CVE-2019-2767 7.2 HIGH EXPLOITED NUCLEI EPSS 0.50
Oracle Fusion Middleware - Unauthenticated RCE
Vulnerability in the BI Publisher (formerly XML Publisher) component of Oracle Fusion Middleware (subcomponent: BI Publisher Security). The supported version that is affected are 11.1.1.9.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise BI Publisher (formerly XML Publisher). While the vulnerability is in BI Publisher (formerly XML Publisher), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of BI Publisher (formerly XML Publisher) accessible data as well as unauthorized read access to a subset of BI Publisher (formerly XML Publisher) accessible data. CVSS 3.0 Base Score 7.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N).
Jul 23, 2019
CVE-2019-14206 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.21
Nevma Adaptive Images <0.6.67 - Privilege Escalation
An Arbitrary File Deletion vulnerability in the Nevma Adaptive Images plugin before 0.6.67 for WordPress allows remote attackers to delete arbitrary files via the $REQUEST['adaptive-images-settings'] parameter in adaptive-images-script.php.
CWE-22 Jul 21, 2019
CVE-2019-14205 7.5 HIGH EXPLOITED 1 Writeup NUCLEI EPSS 0.83
Nevma Adaptive Images <0.6.67 - Local File Inclusion
A Local File Inclusion vulnerability in the Nevma Adaptive Images plugin before 0.6.67 for WordPress allows remote attackers to retrieve arbitrary files via the $REQUEST['adaptive-images-settings']['source_file'] parameter in adaptive-images-script.php.
CWE-22 Jul 21, 2019
CVE-2019-12725 9.8 CRITICAL EXPLOITED 10 PoCs Analysis NUCLEI EPSS 0.94
Zeroshell - OS Command Injection
Zeroshell 3.9.0 is prone to a remote command execution vulnerability. Specifically, this issue occurs because the web application mishandles a few HTTP parameters. An unauthenticated attacker can exploit this issue by injecting OS commands inside the vulnerable parameters.
CWE-78 Jul 19, 2019
CVE-2019-1943 4.7 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.18
Cisco Sg200-50 Firmware - Open Redirect
A vulnerability in the web interface of Cisco Small Business 200, 300, and 500 Series Switches software could allow an unauthenticated, remote attacker to redirect a user to a malicious web page. The vulnerability is due to improper input validation of the parameters of an HTTP request. An attacker could exploit this vulnerability by intercepting a user's HTTP request and modifying it into a request that causes the web interface to redirect the user to a specific malicious URL. This type of vulnerability is known as an open redirect attack and is used in phishing attacks that get users to unknowingly visit malicious sites.
CWE-601 Jul 17, 2019
CVE-2019-1010287 6.1 MEDIUM NUCLEI EPSS 0.25
Timesheet Next Gen <1.5.3 - XSS
Timesheet Next Gen 1.5.3 and earlier is affected by: Cross Site Scripting (XSS). The impact is: Allows an attacker to execute arbitrary HTML and JavaScript code via a "redirect" parameter. The component is: Web login form: login.php, lines 40 and 54. The attack vector is: reflected XSS, victim may click the malicious url.
CWE-79 Jul 17, 2019