Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2000-0114 PoC — Frontpage Server Extensions 安全漏洞

Source
Associated Vulnerability
Title:Frontpage Server Extensions 安全漏洞 (CVE-2000-0114)
Description:Frontpage Server Extensions存在安全漏洞。远程攻击者借助/_vti_bin/ 中shtml.dll的RPC POST请求确定匿名账户的名称。
Description
Python script to scan for CVE-2000-0114 vulnerability in Frontpage Server Extensions. Automates subdomain enumeration and vulnerability scanning using subfinder and nuclei. For educational and professional use in cybersecurity assessments.
Readme
# Frontpage Server Extensions Vulnerability Scanner

This Python script automates the process of scanning for the CVE-2000-0114 vulnerability in Microsoft Frontpage Server Extensions. It's designed to help security professionals and system administrators identify potentially vulnerable subdomains.

## Features

- Subdomain enumeration using subfinder
- Vulnerability scanning using nuclei with a specific CVE-2000-0114 template
- User-friendly command-line interface
- Automatic cleanup of temporary files

## Prerequisites

- Python 3.x
- subfinder (for subdomain enumeration)
- nuclei (for vulnerability scanning)
- Nuclei templates (specifically the CVE-2000-0114 template)

## Installation


1. Copy the python script
2. Go to your terminal and use any text editor and past the script
3. If using nano, command "nano frontpage-server-extensions-vulnerability-scanner.py"
4. After pasting the script press ctrl+x it will ask to confirm press enter
5. Give permissions command "chmod 777 frontpage-server-extensions-vulnerability-scanner.py"
6. Run with this command "./frontpage-server-extensions-vulnerability-scanner.py"


Follow the prompts to enter the domain you wish to scan.

## Disclaimer

This tool is for educational and professional use only. Always ensure you have permission to scan the target domain. Unauthorized scanning may be illegal.

## Author

Josekutty Kunnelthazhe Binu
- LinkedIn: [Josekutty Kunnelthazhe Binu](https://www.linkedin.com/in/josekutty-kunnelthazhe-binu-9b484429b/)

File Snapshot

[4.0K] /data/pocs/075755fa3ee29cfb82957082518398eb9c202826 ├── [3.1K] frontpage-server-extensions-vulnerability-scanner.py ├── [1.5K] README.md ├── [118K] Screenshot 2024-07-11 013133.png ├── [248K] Screenshot 2024-07-11 020556.png └── [ 1] screenshots.png 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.