As enterprises grow, security risk multiplies. ProjectDiscovery harnesses the power of Nuclei to validate real threats, cut false positives, and accelerate triage - enabling security teams to focus on what matters.
Trusted by 100k+ security professionals
Enterprise performance, reliability, and scale
Automate security workflows, integrate with your tech stack, and fix real vulnerabilities - fast.
Blazing fast vulnerability scanning
Get actionable results in minutes, not weeks.
Cloud Integrations
Real-time cloud monitoring. Supports multi services polling.
SOC II Type 2
Enterprise-grade platform that meets the highest bar for security and confidentiality.
Alerting
Get notified when critical exploits are detected in your stack.
Ticketing
Connect ticketing systems to manage issues when new vulnerabilities are found.
Jason Ferguson
Senior Director of Security Operations
ConnectWise
Customer success stories
Discover how organizations are using ProjectDiscovery to strengthen their security posture, streamline operations, and reduce vulnerability remediation time.
Scan times reduced from 2 days to 15 minutes for 10,000 assets
Dramatically reduce scanning times, tools, and resources
Consolidate scattered scanning tools into a single, precise, customizable framework for modern teams.
Engineer hours saved
Per vulnerability - automated workflows reduce triage.
100h
Scan results in under an hour
Scan large attack surfaces and get exposure insights in minutes.
60m
Instant retest
Verify remediations on-demand and retest in real time.
1s
Faster than Nuclei CLI
Gain instant visibility into your tech stack as your team deploys.
35x
Critical
Trending exploit alert
We've scanned your infrastructure for Ingress -Nginx Controller - Remote Code Execution
A recent trending exploit was announced, and we proactively scanned your infrastructure with the CVE-2025-1974 Nuclei template.
Date:4/19/2025
CVSS: 9.8
Total assets scanned:789 assets
33 vulnerable hosts detected
Description: A security issue was discovered in ingress-nginx where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller
Enterprise-grade visibility at every layer
From fixed IPs to audit logs and real-time detection, get the tools to operate securely at scale.
Regression testing
Ensure issues remain in the past - identify recurring gaps before they become threats.
Realtime auto-scan
Automatically scan your infrastructure when new Nuclei templates are released.
Fixed scan IP
Easily whitelist our cloud scanners with dedicated, consistent, trusted IPs.
Audit logs
No blind spots. Every critical event logged, exportable, and SIEM-ready.
Subsidiary discovery
Uncover every domain. Subsidiaries, brands, and assets - automatically monitored.
Advanced reporting
Actionable reporting to track security scores, spot trends, and measure remediation - so you can manage your attack surface with confidence.
Enterprise support
Get responsive help when you need it - plus expert guidance from the team behind Nuclei.
Faster detection. Faster protection.
How ProjectDiscovery responds to critical vulnerabilities faster than legacy scanners.
CVSS | 9.8
IngressNightmare
Unauthenticated remote code execution (RCE) on the Ingress NGINX controller pod.
A Nuclei template for external scanning was released, allowing detection of CVE-2025-1974 from outside target networks.
External scanning available
Rapid7 releases Cluster Scanner plugin
Rapid7 launched the Kubernetes Cluster Scanner plugin with checks for CVE-2025-1974, enabling customers to validate patch status across their clusters.
Tenable releases Nessus plugin #233656
Tenable published a direct remote check plugin for Nessus, allowing automated scanning for CVE-2025-1974 on target systems.