Thanks to visit codestin.com
Credit goes to github.com

Skip to content

rxerium/CVE-2025-10035

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 
 
 

Repository files navigation

CVE-2025-10035

How does this detection method work?

Detects vulnerable GoAnywhere MFT instances by extracting version numbers from the login page and matching against affected version ranges.

How do I run this script?

  1. Download Nuclei from here
  2. Copy the template to your local system
  3. Run the following command: nuclei -u https://yourHost.com -t template.yaml

Example Output

Screenshot 2025-09-20 at 08 35 24

References

Disclaimer

Use at your own risk, I will not be responsible for illegal activities you conduct on infrastructure you do not own or have permission to scan.

Share This Project


Contact

Feel free to reach out via Signal if you have any questions.

About

Detection for CVE-2025-10035

Topics

Resources

License

Stars

Watchers

Forks