Vulnerabilities with Nuclei Scanner Templates
Updated 1h agoSearch and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.
4,077 results
Clear all
CVE-2019-2729
9.8
CRITICAL
EXPLOITED
RANSOMWARE
6 PoCs
Analysis
NUCLEI
EPSS 0.94
Oracle Communications Diameter Signal... - Improper Access Control
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CWE-284
Jun 19, 2019
CVE-2019-7315
7.5
HIGH
NUCLEI
EPSS 0.66
Genie Access WIP3BVAF WISH IP 3MP IR Auto Focus Bullet Camera <3.x ...
Genie Access WIP3BVAF WISH IP 3MP IR Auto Focus Bullet Camera devices through 3.x are vulnerable to directory traversal via the web interface, as demonstrated by reading /etc/shadow. NOTE: this product is discontinued, and its final firmware version has this vulnerability (4.x versions exist only for other Genie Access products).
CWE-22
Jun 17, 2019
CVE-2019-9881
5.3
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.31
WPGraphQL 0.2.3 - XSS
The createComment mutation in the WPGraphQL 0.2.3 plugin for WordPress allows unauthenticated users to post comments on any article, even when 'allow comment' is disabled.
CWE-306
Jun 10, 2019
CVE-2019-9880
9.1
CRITICAL
EXPLOITED
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.73
WPGraphQL <0.2.3 - Info Disclosure
An issue was discovered in the WPGraphQL 0.2.3 plugin for WordPress. By querying the 'users' RootQuery, it is possible, for an unauthenticated attacker, to retrieve all WordPress users details such as email address, role, and username.
CWE-306
Jun 10, 2019
CVE-2019-9879
9.8
CRITICAL
EXPLOITED
1 PoC
1 Writeup
Analysis
NUCLEI
EPSS 0.77
WPGraphQL 0.2.3 - RCE
The WPGraphQL 0.2.3 plugin for WordPress allows remote attackers to register a new user with admin privileges, whenever new user registrations are allowed. This is related to the registerUser mutation.
CWE-306
Jun 10, 2019
CVE-2019-12276
7.5
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.92
GrandNode 4.40 - Path Traversal
A Path Traversal vulnerability in Controllers/LetsEncryptController.cs in LetsEncryptController in GrandNode 4.40 allows remote, unauthenticated attackers to retrieve arbitrary files on the web server via specially crafted LetsEncrypt/Index?fileName= HTTP requests. A patch for this issue was made on 2019-05-30 in GrandNode 4.40.
CWE-22
Jun 05, 2019
CVE-2019-11370
5.4
MEDIUM
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.08
Carel pCOWeb <B1.2.4 - XSS
Stored XSS was discovered in Carel pCOWeb prior to B1.2.4, as demonstrated by the config/pw_snmp.html "System contact" field.
CWE-79
Jun 03, 2019
CVE-2019-12593
7.5
HIGH
EXPLOITED
1 PoC
Analysis
NUCLEI
EPSS 0.78
Icewarp Mail Server < 10.4.4 - Path Traversal
IceWarp Mail Server through 10.4.4 is prone to a local file inclusion vulnerability via webmail/calendar/minimizer/index.php?style=..%5c directory traversal.
CWE-22
Jun 03, 2019
CVE-2019-11580
9.8
CRITICAL
KEV
RANSOMWARE
4 PoCs
Analysis
NUCLEI
EPSS 0.94
Atlassian Crowd <3.0.5 - RCE
Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x), from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.
Jun 03, 2019
CVE-2019-9874
9.8
CRITICAL
KEV
NUCLEI
EPSS 0.80
Sitecore CMS 7.0-8.2 - Code Injection
Deserialization of Untrusted Data in the Sitecore.Security.AntiCSRF (aka anti CSRF) module in Sitecore CMS 7.0 to 7.2 and Sitecore XP 7.5 to 8.2 allows an unauthenticated attacker to execute arbitrary code by sending a serialized .NET object in the HTTP POST parameter __CSRFTOKEN.
CWE-502
May 31, 2019
CVE-2019-12461
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.61
Webport Web Port - XSS
Web Port 1.19.1 allows XSS via the /log type parameter.
CWE-79
May 30, 2019
CVE-2019-9670
9.8
CRITICAL
KEV
9 PoCs
Analysis
NUCLEI
EPSS 0.94
Synacor Zimbra Collaboration Suite <8.7.11p10 - XXE
mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10 has an XML External Entity injection (XXE) vulnerability, as demonstrated by Autodiscover/Autodiscover.xml.
CWE-611
May 29, 2019
CVE-2019-0221
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.19
Apache Tomcat < 7.0.93 - XSS
The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website.
CWE-79
May 28, 2019
CVE-2019-12314
9.8
CRITICAL
EXPLOITED
2 PoCs
Analysis
NUCLEI
EPSS 0.92
Deltek Maconomy 2.2.5 - Path Traversal
Deltek Maconomy 2.2.5 is prone to local file inclusion via absolute path traversal in the WS.macx1.W_MCS/ PATH_INFO, as demonstrated by a cgi-bin/Maconomy/MaconomyWS.macx1.W_MCS/etc/passwd URI.
CWE-22
May 24, 2019
CVE-2019-8442
7.5
HIGH
EXPLOITED
NUCLEI
EPSS 0.93
Jira <7.13.4, <8.0.4, <8.1.1 - Path Traversal
The CachingResourceDownloadRewriteRule class in Jira before version 7.13.4, and from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to access files in the Jira webroot under the META-INF directory via a lax path access check.
May 22, 2019
CVE-2019-3403
5.3
MEDIUM
2 PoCs
Analysis
NUCLEI
EPSS 0.83
Atlassian Jira < 7.13.3 - Incorrect Authorization
The /rest/api/2/user/picker rest resource in Jira before version 7.13.3, from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check.
CWE-863
May 22, 2019
CVE-2019-3402
6.1
MEDIUM
NUCLEI
EPSS 0.03
Atlassian Jira < 7.13.3 - XSS
The ConfigurePortalPages.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the searchOwnerUserName parameter.
CWE-79
May 22, 2019
CVE-2019-3401
5.3
MEDIUM
NUCLEI
EPSS 0.66
Atlassian Jira < 7.13.3 - Incorrect Authorization
The ManageFilters.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check.
CWE-863
May 22, 2019
CVE-2019-8937
6.1
MEDIUM
1 PoC
Analysis
NUCLEI
EPSS 0.44
Digitaldruid Hoteldruid - XSS
HotelDruid 2.3.0 has XSS affecting the nsextt, cambia1, mese_fine, origine, and anno parameters in creaprezzi.php, tabella3.php, personalizza.php, and visualizza_tabelle.php.
CWE-79
May 17, 2019
CVE-2019-1821
8.8
HIGH
EXPLOITED
5 PoCs
Analysis
NUCLEI
EPSS 0.94
Cisco Prime Infrastructure/EPN Manager - RCE
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the attacker to execute code with root-level privileges on the underlying operating system.
CWE-20
May 16, 2019