Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Processing http://www.tta.gob.ni ...
- [+] Detecting Joomla Version
- [++] Joomla 1.5
- [+] Core Joomla Vulnerability
- [++] Joomla! 1.5 Beta 2 - 'Search' Remote Code Execution
- EDB : https://www.exploit-db.com/exploits/4212/
- Joomla! 1.5 Beta1/Beta2/RC1 - SQL Injection
- CVE : CVE-2007-4781
- EDB : https://www.exploit-db.com/exploits/4350/
- Joomla! 1.5.x - (Token) Remote Admin Change Password
- CVE : CVE-2008-3681
- EDB : https://www.exploit-db.com/exploits/6234/
- Joomla! 1.5.x - Cross-Site Scripting / Information Disclosure
- CVE: CVE-2011-4909
- EDB : https://www.exploit-db.com/exploits/33061/
- Joomla! 1.5.x - 404 Error Page Cross-Site Scripting
- EDB : https://www.exploit-db.com/exploits/33378/
- Joomla! 1.5.12 - read/exec Remote files
- EDB : https://www.exploit-db.com/exploits/11263/
- Joomla! 1.5.12 - connect back Exploit
- EDB : https://www.exploit-db.com/exploits/11262/
- Joomla! Plugin 'tinybrowser' 1.5.12 - Arbitrary File Upload / Code Execution (Metasploit)
- CVE : CVE-2011-4908
- EDB : https://www.exploit-db.com/exploits/9926/
- Joomla! 1.5 - URL Redirecting
- EDB : https://www.exploit-db.com/exploits/14722/
- Joomla! 1.5.x - SQL Error Information Disclosure
- EDB : https://www.exploit-db.com/exploits/34955/
- Joomla! - Spam Mail Relay
- EDB : https://www.exploit-db.com/exploits/15979/
- Joomla! 1.5/1.6 - JFilterInput Cross-Site Scripting Bypass
- EDB : https://www.exploit-db.com/exploits/16091/
- Joomla! < 1.7.0 - Multiple Cross-Site Scripting Vulnerabilities
- EDB : https://www.exploit-db.com/exploits/36176/
- Joomla! 1.5 < 3.4.5 - Object Injection Remote Command Execution
- CVE : CVE-2015-8562
- EDB : https://www.exploit-db.com/exploits/38977/
- Joomla! 1.0 < 3.4.5 - Object Injection 'x-forwarded-for' Header Remote Code Execution
- CVE : CVE-2015-8562 , CVE-2015-8566
- EDB : https://www.exploit-db.com/exploits/39033/
- Joomla! 1.5.0 Beta - 'pcltar.php' Remote File Inclusion
- CVE : CVE-2007-2199
- EDB : https://www.exploit-db.com/exploits/3781/
- Joomla! Component xstandard editor 1.5.8 - Local Directory Traversal
- CVE : CVE-2009-0113
- EDB : https://www.exploit-db.com/exploits/7691/
- [+] Checking apache info/status files
- [++] Readable info/status files are not found
- [+] admin finder
- [++] Admin page : http://www.tta.gob.ni/administrator/
- [+] Checking robots.txt existing
- [++] robots.txt is not found
- [+] Finding common backup files name
- [++] Backup files are not found
- [+] Finding common log files name
- [++] error log is not found
- [+] Checking sensitive config.php.x file
- [++] Readable config file is found
- config file path : http://www.tta.gob.ni/configuration.php-dist
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement