🔐 Login Required

Security scanning requires domain ownership verification.

Please login and register your domain in the "Domains" tab in the sidebar to verify ownership.

Nuclei-based Latest CVE Vulnerability Auto Detection

Testing Tool: Nuclei by ProjectDiscovery - Industry standard vulnerability scanner providing fast template-based scanning

Test Purpose:
• Detect newly published CVE vulnerabilities from 2024-2025
• Check recently disclosed zero-day and 1-day vulnerabilities
• Discover misconfigurations and default setting vulnerabilities
• Detect exposed panels, debug pages, and backup files
• Check subdomain takeover possibilities
• Detect sensitive information exposure (API keys, tokens, environment variables)

Testing Method:
Template-based: Utilizes YAML templates specialized for 2024-2025 latest vulnerabilities
Non-intrusive: Verifies vulnerability signatures without actual attacks
Scope: Single URL target (no deep crawling)
Priority: Scans Critical, High first, then Medium, Low sequentially
Duration: Approximately 30 seconds to 3 minutes (varies by template count)
Domain Verification: Only verified domains can be scanned

Latest Vulnerability Coverage:
• Major RCE vulnerabilities like Log4Shell, Spring4Shell
• Latest WordPress, Joomla, Drupal plugin vulnerabilities
• Apache, Nginx, IIS web server misconfigurations
• Git, SVN, ENV file exposure
• GraphQL, REST API endpoint vulnerabilities
• Cloud service (AWS, Azure, GCP) misconfigurations
Grade Score Criteria
A+ 90~100 0 Critical/High, 0 Medium
No 2024-2025 CVE detected
No exposed directories/debug/sensitive files
Good security headers/banner exposure (minimal information)
A 80~89 High ≤1, Medium ≤1
No direct recent CVE exposure (requires bypass/conditions)
Minor configuration warnings (informational level)
Good patch/configuration management
B 70~79 High ≤2 or Medium ≤3
Some configuration/banner exposure exists
Protected admin endpoints exist (difficult to bypass)
Patch delay tendency (delayed security release adoption)
C 60~69 High ≥3 or multiple Medium
Sensitive files/backups/indexing exposure found
Old version components detectable (banner/meta info)
Systematic improvement needed in patch/configuration management
D 50~59 Critical ≥1 or low-difficulty High exploitation
Recent (2024-2025) CVE direct impact estimated
Risky endpoints/files accessible without authentication
Build/log/environment sensitive information exposure
F 0~49 Multiple Critical/High simultaneously
Massive unpatched/widespread exposure of latest CVE
Lack of basic security configuration (missing defense headers/access control)
Complete absence of security guardrails
No Results Yet

Run a test to see the latest vulnerability scan results.

No Results Yet

Run a test to see the Raw JSON data.

Sign in to view test history.

Sign in to manage domains.