Skip to content

Instantly share code, notes, and snippets.

View siberkampus's full-sized avatar

Muhammed Çelik siberkampus

View GitHub Profile
"""
Generated from Nuclei template: CVE-2018-12296
Name: Seagate NAS OS 4.3.15.1 - Server Information Disclosure
Severity: HIGH
Author: princechaddha
Description: Seagate NAS OS version 4.3.15.1 has insufficient access control which allows attackers to obtain information about the NAS without authentication via empty POST requests in /api/external/7.0/system.Sy
"""
def check_CVE_2018_12296(target_url, timeout=10, proxy=None, oob_domain=None):
"""Check: Seagate NAS OS 4.3.15.1 - Server Information Disclosure"""
results = {
"""
Generated from Nuclei template: CVE-2013-5528
Name: Cisco Unified Communications Manager 7/8/9 - Directory Traversal
Severity: MEDIUM
Author: daffainfo
Description: A directory traversal vulnerability in the Tomcat administrative web interface in Cisco Unified Communications Manager allows remote authenticated users to read arbitrary files via directory traversal
"""
def check_CVE_2013_5528(target_url, timeout=10, proxy=None, oob_domain=None):
"""Check: Cisco Unified Communications Manager 7/8/9 - Directory Traversal"""
results = {
"""
Generated from Nuclei template: CNVD-2021-26422
Name: eYouMail - Remote Code Execution
Severity: CRITICAL
Author: daffainfo
Description: eYouMail is susceptible to a remote code execution vulnerability.
"""
def check_CNVD_2021_26422(target_url, timeout=10, proxy=None, oob_domain=None):
"""Check: eYouMail - Remote Code Execution"""
results = {
"""
Generated from Nuclei template: cgi-printenv
Name: Test CGI Script - Detect
Severity: MEDIUM
Author: emadshanab
Description: Test CGI script was detected. Response page returned by this CGI script exposes a list of server environment variables.
"""
def check_cgi_printenv(target_url, timeout=10, proxy=None, oob_domain=None):
"""Check: Test CGI Script - Detect"""
results = {
"""
Generated from Nuclei template: aws-ec2-status
Name: Amazon EC2 Status
Severity: INFO
Author: DhiyaneshDk
Description:
"""
def check_aws_ec2_status(target_url, timeout=10, proxy=None, oob_domain=None):
"""Check: Amazon EC2 Status"""
"""
Generated from Nuclei template: amministrazione-aperta-lfi
Name: WordPress Amministrazione Aperta 3.7.3 - Local File Inclusion
Severity: HIGH
Author: daffainfo,Splint3r7
Description: WordPress Amministrazione Aperta 3.7.3 is vulnerable to local file inclusion.
"""
def check_amministrazione_aperta_lfi(target_url, timeout=10, proxy=None, oob_domain=None):
"""Check: WordPress Amministrazione Aperta 3.7.3 - Local File Inclusion"""
"""
Generated from Nuclei template: ad-widget-lfi
Name: WordPress Ad Widget 2.11.0 - Local File Inclusion
Severity: HIGH
Author: 0x_Akoko
Description: WordPress Ad Widget 2.11.0 is vulnerable to local file inclusion. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks.
"""
def check_ad_widget_lfi(target_url, timeout=10, proxy=None, oob_domain=None):
"""Check: WordPress Ad Widget 2.11.0 - Local File Inclusion"""
# $OpenBSD: sshd_config,v 1.101 2017/03/14 07:19:07 djm Exp $
# This is the sshd server system-wide configuration file. See
# sshd_config(5) for more information.
# This sshd was compiled with PATH=/usr/bin:/bin:/usr/sbin:/sbin
# The strategy used for options in the default sshd_config shipped with
# OpenSSH is to specify options with their default value where
# possible, but leave them commented. Uncommented options override the