Vulnerabilities with Nuclei Scanner Templates

Updated 1h ago

Search and track vulnerabilities with real-time exploit intelligence. Cross-reference CVEs against public exploits from ExploitDB, Metasploit, GitHub, and Nuclei — with CVSS and EPSS scoring, CISA KEV monitoring, and AI-powered exploit analysis.

346,432 CVEs tracked 53,633 with exploits 4,859 exploited in wild 1,583 CISA KEV 4,077 Nuclei templates 52,306 vendors 43,872 researchers
4,077 results Clear all
CVE-2019-2729 9.8 CRITICAL EXPLOITED RANSOMWARE 6 PoCs Analysis NUCLEI EPSS 0.94
Oracle Communications Diameter Signal... - Improper Access Control
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0 and 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.0 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
CWE-284 Jun 19, 2019
CVE-2019-7315 7.5 HIGH NUCLEI EPSS 0.66
Genie Access WIP3BVAF WISH IP 3MP IR Auto Focus Bullet Camera <3.x ...
Genie Access WIP3BVAF WISH IP 3MP IR Auto Focus Bullet Camera devices through 3.x are vulnerable to directory traversal via the web interface, as demonstrated by reading /etc/shadow. NOTE: this product is discontinued, and its final firmware version has this vulnerability (4.x versions exist only for other Genie Access products).
CWE-22 Jun 17, 2019
CVE-2019-9881 5.3 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.31
WPGraphQL 0.2.3 - XSS
The createComment mutation in the WPGraphQL 0.2.3 plugin for WordPress allows unauthenticated users to post comments on any article, even when 'allow comment' is disabled.
CWE-306 Jun 10, 2019
CVE-2019-9880 9.1 CRITICAL EXPLOITED 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.73
WPGraphQL <0.2.3 - Info Disclosure
An issue was discovered in the WPGraphQL 0.2.3 plugin for WordPress. By querying the 'users' RootQuery, it is possible, for an unauthenticated attacker, to retrieve all WordPress users details such as email address, role, and username.
CWE-306 Jun 10, 2019
CVE-2019-9879 9.8 CRITICAL EXPLOITED 1 PoC 1 Writeup Analysis NUCLEI EPSS 0.77
WPGraphQL 0.2.3 - RCE
The WPGraphQL 0.2.3 plugin for WordPress allows remote attackers to register a new user with admin privileges, whenever new user registrations are allowed. This is related to the registerUser mutation.
CWE-306 Jun 10, 2019
CVE-2019-12276 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.92
GrandNode 4.40 - Path Traversal
A Path Traversal vulnerability in Controllers/LetsEncryptController.cs in LetsEncryptController in GrandNode 4.40 allows remote, unauthenticated attackers to retrieve arbitrary files on the web server via specially crafted LetsEncrypt/Index?fileName= HTTP requests. A patch for this issue was made on 2019-05-30 in GrandNode 4.40.
CWE-22 Jun 05, 2019
CVE-2019-11370 5.4 MEDIUM EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.08
Carel pCOWeb <B1.2.4 - XSS
Stored XSS was discovered in Carel pCOWeb prior to B1.2.4, as demonstrated by the config/pw_snmp.html "System contact" field.
CWE-79 Jun 03, 2019
CVE-2019-12593 7.5 HIGH EXPLOITED 1 PoC Analysis NUCLEI EPSS 0.78
Icewarp Mail Server < 10.4.4 - Path Traversal
IceWarp Mail Server through 10.4.4 is prone to a local file inclusion vulnerability via webmail/calendar/minimizer/index.php?style=..%5c directory traversal.
CWE-22 Jun 03, 2019
CVE-2019-11580 9.8 CRITICAL KEV RANSOMWARE 4 PoCs Analysis NUCLEI EPSS 0.94
Atlassian Crowd <3.0.5 - RCE
Atlassian Crowd and Crowd Data Center had the pdkinstall development plugin incorrectly enabled in release builds. Attackers who can send unauthenticated or authenticated requests to a Crowd or Crowd Data Center instance can exploit this vulnerability to install arbitrary plugins, which permits remote code execution on systems running a vulnerable version of Crowd or Crowd Data Center. All versions of Crowd from version 2.1.0 before 3.0.5 (the fixed version for 3.0.x), from version 3.1.0 before 3.1.6 (the fixed version for 3.1.x), from version 3.2.0 before 3.2.8 (the fixed version for 3.2.x), from version 3.3.0 before 3.3.5 (the fixed version for 3.3.x), and from version 3.4.0 before 3.4.4 (the fixed version for 3.4.x) are affected by this vulnerability.
Jun 03, 2019
CVE-2019-9874 9.8 CRITICAL KEV NUCLEI EPSS 0.80
Sitecore CMS 7.0-8.2 - Code Injection
Deserialization of Untrusted Data in the Sitecore.Security.AntiCSRF (aka anti CSRF) module in Sitecore CMS 7.0 to 7.2 and Sitecore XP 7.5 to 8.2 allows an unauthenticated attacker to execute arbitrary code by sending a serialized .NET object in the HTTP POST parameter __CSRFTOKEN.
CWE-502 May 31, 2019
CVE-2019-12461 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.61
Webport Web Port - XSS
Web Port 1.19.1 allows XSS via the /log type parameter.
CWE-79 May 30, 2019
CVE-2019-9670 9.8 CRITICAL KEV 9 PoCs Analysis NUCLEI EPSS 0.94
Synacor Zimbra Collaboration Suite <8.7.11p10 - XXE
mailboxd component in Synacor Zimbra Collaboration Suite 8.7.x before 8.7.11p10 has an XML External Entity injection (XXE) vulnerability, as demonstrated by Autodiscover/Autodiscover.xml.
CWE-611 May 29, 2019
CVE-2019-0221 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.19
Apache Tomcat < 7.0.93 - XSS
The SSI printenv command in Apache Tomcat 9.0.0.M1 to 9.0.0.17, 8.5.0 to 8.5.39 and 7.0.0 to 7.0.93 echoes user provided data without escaping and is, therefore, vulnerable to XSS. SSI is disabled by default. The printenv command is intended for debugging and is unlikely to be present in a production website.
CWE-79 May 28, 2019
CVE-2019-12314 9.8 CRITICAL EXPLOITED 2 PoCs Analysis NUCLEI EPSS 0.92
Deltek Maconomy 2.2.5 - Path Traversal
Deltek Maconomy 2.2.5 is prone to local file inclusion via absolute path traversal in the WS.macx1.W_MCS/ PATH_INFO, as demonstrated by a cgi-bin/Maconomy/MaconomyWS.macx1.W_MCS/etc/passwd URI.
CWE-22 May 24, 2019
CVE-2019-8442 7.5 HIGH EXPLOITED NUCLEI EPSS 0.93
Jira <7.13.4, <8.0.4, <8.1.1 - Path Traversal
The CachingResourceDownloadRewriteRule class in Jira before version 7.13.4, and from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to access files in the Jira webroot under the META-INF directory via a lax path access check.
May 22, 2019
CVE-2019-3403 5.3 MEDIUM 2 PoCs Analysis NUCLEI EPSS 0.83
Atlassian Jira < 7.13.3 - Incorrect Authorization
The /rest/api/2/user/picker rest resource in Jira before version 7.13.3, from version 8.0.0 before version 8.0.4, and from version 8.1.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check.
CWE-863 May 22, 2019
CVE-2019-3402 6.1 MEDIUM NUCLEI EPSS 0.03
Atlassian Jira < 7.13.3 - XSS
The ConfigurePortalPages.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the searchOwnerUserName parameter.
CWE-79 May 22, 2019
CVE-2019-3401 5.3 MEDIUM NUCLEI EPSS 0.66
Atlassian Jira < 7.13.3 - Incorrect Authorization
The ManageFilters.jspa resource in Jira before version 7.13.3 and from version 8.0.0 before version 8.1.1 allows remote attackers to enumerate usernames via an incorrect authorisation check.
CWE-863 May 22, 2019
CVE-2019-8937 6.1 MEDIUM 1 PoC Analysis NUCLEI EPSS 0.44
Digitaldruid Hoteldruid - XSS
HotelDruid 2.3.0 has XSS affecting the nsextt, cambia1, mese_fine, origine, and anno parameters in creaprezzi.php, tabella3.php, personalizza.php, and visualizza_tabelle.php.
CWE-79 May 17, 2019
CVE-2019-1821 8.8 HIGH EXPLOITED 5 PoCs Analysis NUCLEI EPSS 0.94
Cisco Prime Infrastructure/EPN Manager - RCE
A vulnerability in the web-based management interface of Cisco Prime Infrastructure (PI) and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to execute code with root-level privileges on the underlying operating system. This vulnerability exist because the software improperly validates user-supplied input. An attacker could exploit this vulnerability by uploading a malicious file to the administrative web interface. A successful exploit could allow the attacker to execute code with root-level privileges on the underlying operating system.
CWE-20 May 16, 2019