{"uuid": "6e5a8ab6-af04-4d85-aea9-87780f1fd8f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "title": "nmap nse script to guess the version of SharePoint", "description": "Nmap script to detect a Microsoft SharePoint instance version.\n\nUsage:\n\n```bash\n$ nmap -p 443 --script ms-sharepoint-version.nse example.com\nStarting Nmap 7.94SVN ( https://nmap.org ) at 2025-07-21 17:33 CEST\nNmap scan report for example.com (127.0.0.1)\nHost is up (0.030s latency).\n\nPORT    STATE SERVICE\n443/tcp open  https\n| ms-sharepoint-version: \n|   16.0.10376: \n|     product: SharePoint Server 2019  SharePoint Server 2019 MUI/language patch\n|     build: 16.0.10376\n|_    release_date: July 2021\n\nNmap done: 1 IP address (1 host up) scanned in 0.81 seconds\n```\n\nMore information:\n[https://github.com/righel/ms-sharepoint-version-nse](https://github.com/righel/ms-sharepoint-version-nse)", "description_format": "markdown", "vulnerability": "CVE-2025-53770", "creation_timestamp": "2025-07-21T16:01:09.961535+00:00", "timestamp": "2025-07-21T16:02:25.928522+00:00", "related_vulnerabilities": [], "meta": [{"tags": ["vulnerability:information=annotation"]}, {"ref": ["https://github.com/righel/ms-sharepoint-version-nse"]}], "author": {"login": "sync_user", "name": "sync_user", "uuid": "4f29edb9-4c4b-44ca-b041-9b050656b6ae"}}
