Scan and check your website security before attackers do anything bad. And remember that cyber security is a process. Not a one time test.
Name |
Explanation |
Membership |
API |
---|---|---|---|
Other Web Security Scans | |||
Mida eFramework Rce Vulnerability Scanner (CVE-2020-15920) | If you are using Mida eFramework on your web applications, it is better to check your websites for unauthenticated remote code execution vulnerability that emerged in PDC/ajaxreq.php page. |
No | Yes |
Artica Web Proxy Authentication Bypass Vulnerability Scanner (CVE-2020-17506) | If you are using Artica Web Proxy on your systems, it is better to check your systems for authentication bypass vulnerability that emerged in fw.login.php page. |
No | Yes |
.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability Scanner (CVE-2020-1147) | Vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input. |
No | Yes |
GLPI Bypass Vulnerability Scanner (CVE-2020-11034) | If you are using GLPI on your system, we suggest you to check if it is vulnerable or not. |
No | Yes |
Oracle WebLogic RCE Vulnerability (CVE-2020-14882) Scanner | If you are using Oracle WebLogic Server, it is better to check your system if any vulnerability exists. |
No | Yes |
Atlassian Crowd and Crowd Data Center Vulnerability (CVE-2019-11580) Scanner | If you are using Atlassian Crowd and Crowd Data Center, it is better to check your system if any vulnerability exists. |
No | Yes |
BigIP Rce Vulnerability Scanner (CVE-2020-5902) | If you are using F5 BIG-IP devices, it is better to check your devices for remote code execution vulnerability that emerged in the TMUI component. |
No | Yes |
Path Traversal on Citrix XenMobile Server (CVE-2020-8209) Scanner | If you are using Citrix XenMobile to manage your systems via mobile, it is better to check your system if any vulnerability exists. |
No | Yes |
Citrix ADC and Citrix Gateway Vulnerability (CVE-2020-8193) Scanner | If you are using Citrix ADC and/or Citrix Gateway, it is better to check your system if any vulnerability exists. |
No | Yes |
Alerta Vulnerability (CVE-2020-26214) Scanner | If you are using Alerta, it is better to check your system if any vulnerability exists. |
No | Yes |
Citrix Application Delivery Controller, Citrix Gateway, and Citrix SD-WAN WANOP (CVE-2019-19781) Scanner | If you are using Citrix ADC and/or Citrix Gateway and/or Citrix SD-WAN WANOP, it is better to check your system if any vulnerability exists. |
No | Yes |
Pulse Secure Pulse Connect Secure Vulnerability (CVE-2019-11510) Scanner | If you are using Pulse Secure Pulse Connect Secure, it is better to check your system if any vulnerability exists. |
No | Yes |
Subdomain Takeover Vulnerability Scanner | Subdomain takeovers occur when your subdomain points a webpage that is not exist anymore. Attackers use this to takeover your subdomain. | No | Yes |
Panel Scanner | Almost every application, user interface comes with a user, admin panel. Sometimes panels includes some security vulnerabilities. Wtih our tool, you can check your publicly available panels. |
No | Yes |
Apache Flink Vulnerability (CVE-2020-17519) Scanner | If you are using Apache Flink, it is better to check your system if any vulnerability exists. |
No | Yes |
Microsoft SharePoint Remote Code Execution Vulnerability (CVE-2020-16952) Scanner | If you are using Microsoft SharePoint, it is better to check your system if any vulnerability exists. |
No | Yes |
Joomla Component GMapFP Vulnerability (CVE-2020-23972) Scanner | If you are using Joomla GMapFP, it is better to check your system if any vulnerability exists. |
No | Yes |
Wordpress Scanner | |||
Wordpress Theme Detector | WordPress content management system offers users various paid/free theme options. You can use WordPress Theme Detector tool to identify the name of the theme and to check whether the theme codes has backdoors/vulnerabilities. | No | Yes |
Wordpress Plugin Detector | Did you know that WordPress websites are generally hacked via plugins and themes? You can check the security of your plugin by using our online tools. Update your plugins with vulnerabilities and protect yourself against attacks. | No | Yes |
Wordpress User Detector | You can identify users belonging to a wordpress site by using our online WordPress User Enumeration tool. | No | Yes |
Full Wordpress Scanner | Did you know WordPress is the most frequently used (36% of all websites) and also hacked content management system around the world? You don’t need to worry. You can scan your WordPress website with our online tools to eliminate the risk of hacking. | No | Yes |