This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ | |
| Generated from Nuclei template: CVE-2018-12296 | |
| Name: Seagate NAS OS 4.3.15.1 - Server Information Disclosure | |
| Severity: HIGH | |
| Author: princechaddha | |
| Description: Seagate NAS OS version 4.3.15.1 has insufficient access control which allows attackers to obtain information about the NAS without authentication via empty POST requests in /api/external/7.0/system.Sy | |
| """ | |
| def check_CVE_2018_12296(target_url, timeout=10, proxy=None, oob_domain=None): | |
| """Check: Seagate NAS OS 4.3.15.1 - Server Information Disclosure""" | |
| results = { |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ | |
| Generated from Nuclei template: CVE-2013-5528 | |
| Name: Cisco Unified Communications Manager 7/8/9 - Directory Traversal | |
| Severity: MEDIUM | |
| Author: daffainfo | |
| Description: A directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal | |
| """ | |
| def check_CVE_2013_5528(target_url, timeout=10, proxy=None, oob_domain=None): | |
| """Check: Cisco Unified Communications Manager 7/8/9 - Directory Traversal""" | |
| results = { |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ | |
| Generated from Nuclei template: CNVD-2021-26422 | |
| Name: eYouMail - Remote Code Execution | |
| Severity: CRITICAL | |
| Author: daffainfo | |
| Description: eYouMail is susceptible to a remote code execution vulnerability. | |
| """ | |
| def check_CNVD_2021_26422(target_url, timeout=10, proxy=None, oob_domain=None): | |
| """Check: eYouMail - Remote Code Execution""" | |
| results = { |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ | |
| Generated from Nuclei template: cgi-printenv | |
| Name: Test CGI Script - Detect | |
| Severity: MEDIUM | |
| Author: emadshanab | |
| Description: Test CGI script was detected. Response page returned by this CGI script exposes a list of server environment variables. | |
| """ | |
| def check_cgi_printenv(target_url, timeout=10, proxy=None, oob_domain=None): | |
| """Check: Test CGI Script - Detect""" | |
| results = { |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ | |
| Generated from Nuclei template: aws-ec2-status | |
| Name: Amazon EC2 Status | |
| Severity: INFO | |
| Author: DhiyaneshDk | |
| Description: | |
| """ | |
| def check_aws_ec2_status(target_url, timeout=10, proxy=None, oob_domain=None): | |
| """Check: Amazon EC2 Status""" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ | |
| Generated from Nuclei template: amministrazione-aperta-lfi | |
| Name: WordPress Amministrazione Aperta 3.7.3 - Local File Inclusion | |
| Severity: HIGH | |
| Author: daffainfo,Splint3r7 | |
| Description: WordPress Amministrazione Aperta 3.7.3 is vulnerable to local file inclusion. | |
| """ | |
| def check_amministrazione_aperta_lfi(target_url, timeout=10, proxy=None, oob_domain=None): | |
| """Check: WordPress Amministrazione Aperta 3.7.3 - Local File Inclusion""" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| """ | |
| Generated from Nuclei template: ad-widget-lfi | |
| Name: WordPress Ad Widget 2.11.0 - Local File Inclusion | |
| Severity: HIGH | |
| Author: 0x_Akoko | |
| Description: WordPress Ad Widget 2.11.0 is vulnerable to local file inclusion. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. | |
| """ | |
| def check_ad_widget_lfi(target_url, timeout=10, proxy=None, oob_domain=None): | |
| """Check: WordPress Ad Widget 2.11.0 - Local File Inclusion""" |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| # $OpenBSD: sshd_config,v 1.101 2017/03/14 07:19:07 djm Exp $ | |
| # This is the sshd server system-wide configuration file. See | |
| # sshd_config(5) for more information. | |
| # This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin | |
| # The strategy used for options in the default sshd_config shipped with | |
| # OpenSSH is to specify options with their default value where | |
| # possible, but leave them commented. Uncommented options override the |