Advertisement
Guest User

Anonymous JTSEC #OpDomesticTerrorism Full Recon #5

a guest
Feb 11th, 2019
4,255
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 113.73 KB | None | 0 0
  1. #######################################################################################################################################
  2. =======================================================================================================================================
  3. Hostname northwestfront.org ISP New Dream Network, LLC
  4. Continent North America Flag
  5. US
  6. Country United States Country Code US
  7. Region California Local time 11 Feb 2019 12:09 PST
  8. City Brea Postal Code 92821
  9. IP Address 208.113.216.34 Latitude 33.929
  10. Longitude -117.885
  11. =======================================================================================================================================
  12. #######################################################################################################################################
  13. > northwestfront.org
  14. Server: 38.132.106.139
  15. Address: 38.132.106.139#53
  16.  
  17. Non-authoritative answer:
  18. Name: northwestfront.org
  19. Address: 208.113.216.34
  20. >
  21. #######################################################################################################################################
  22. HostIP:208.113.216.34
  23. HostName:northwestfront.org
  24.  
  25. Gathered Inet-whois information for 208.113.216.34
  26. ---------------------------------------------------------------------------------------------------------------------------------------
  27.  
  28.  
  29. inetnum: 208.82.76.0 - 209.42.191.255
  30. netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
  31. descr: IPv4 address block not managed by the RIPE NCC
  32. remarks: ------------------------------------------------------
  33. remarks:
  34. remarks: For registration information,
  35. remarks: you can consult the following sources:
  36. remarks:
  37. remarks: IANA
  38. remarks: http://www.iana.org/assignments/ipv4-address-space
  39. remarks: http://www.iana.org/assignments/iana-ipv4-special-registry
  40. remarks: http://www.iana.org/assignments/ipv4-recovered-address-space
  41. remarks:
  42. remarks: AFRINIC (Africa)
  43. remarks: http://www.afrinic.net/ whois.afrinic.net
  44. remarks:
  45. remarks: APNIC (Asia Pacific)
  46. remarks: http://www.apnic.net/ whois.apnic.net
  47. remarks:
  48. remarks: ARIN (Northern America)
  49. remarks: http://www.arin.net/ whois.arin.net
  50. remarks:
  51. remarks: LACNIC (Latin America and the Carribean)
  52. remarks: http://www.lacnic.net/ whois.lacnic.net
  53. remarks:
  54. remarks: ------------------------------------------------------
  55. country: EU # Country is really world wide
  56. admin-c: IANA1-RIPE
  57. tech-c: IANA1-RIPE
  58. status: ALLOCATED UNSPECIFIED
  59. mnt-by: RIPE-NCC-HM-MNT
  60. created: 2019-01-07T10:50:54Z
  61. last-modified: 2019-01-07T10:50:54Z
  62. source: RIPE
  63.  
  64. role: Internet Assigned Numbers Authority
  65. address: see http://www.iana.org.
  66. admin-c: IANA1-RIPE
  67. tech-c: IANA1-RIPE
  68. nic-hdl: IANA1-RIPE
  69. remarks: For more information on IANA services
  70. remarks: go to IANA web site at http://www.iana.org.
  71. mnt-by: RIPE-NCC-MNT
  72. created: 1970-01-01T00:00:00Z
  73. last-modified: 2001-09-22T09:31:27Z
  74. source: RIPE # Filtered
  75.  
  76. % This query was served by the RIPE Database Query Service version 1.92.6 (ANGUS)
  77.  
  78.  
  79.  
  80. Gathered Inic-whois information for northwestfront.org
  81. ---------------------------------------------------------------------------------------------------------------------------------------
  82. Domain Name: NORTHWESTFRONT.ORG
  83. Registry Domain ID: D156669153-LROR
  84. Registrar WHOIS Server: whois.dreamhost.com
  85. Registrar URL: http://www.dreamhost.com/
  86. Updated Date: 2018-06-15T07:21:05Z
  87. Creation Date: 2009-07-17T04:16:48Z
  88. Registry Expiry Date: 2019-07-17T04:16:48Z
  89. Registrar Registration Expiration Date:
  90. Registrar: New Dream Network, LLC dba DreamHost Web Hosting
  91. Registrar IANA ID: 431
  92. Registrar Abuse Contact Email: abuse@dreamhost.com
  93. Registrar Abuse Contact Phone: +213.2719359
  94. Reseller:
  95. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  96. Registrant Organization: Proxy Protection LLC
  97. Registrant State/Province: CA
  98. Registrant Country: US
  99. Name Server: NS1.DREAMHOST.COM
  100. Name Server: NS2.DREAMHOST.COM
  101. Name Server: NS3.DREAMHOST.COM
  102. DNSSEC: unsigned
  103. URL of the ICANN Whois Inaccuracy Complaint Form https://www.icann.org/wicf/)
  104. >>> Last update of WHOIS database: 2019-02-11T20:46:55Z <<<
  105. #######################################################################################################################################
  106. [i] Scanning Site: http://northwestfront.org
  107.  
  108.  
  109.  
  110. B A S I C I N F O
  111. =======================================================================================================================================
  112.  
  113.  
  114. [+] Site Title:
  115. [+] IP address: 208.113.216.34
  116. [+] Web Server: Could Not Detect
  117. [+] CMS: Could Not Detect
  118. [+] Cloudflare: Not Detected
  119. [+] Robots File: Could NOT Find robots.txt!
  120.  
  121.  
  122.  
  123.  
  124. W H O I S L O O K U P
  125. =======================================================================================================================================
  126.  
  127. Domain Name: NORTHWESTFRONT.ORG
  128. Registry Domain ID: D156669153-LROR
  129. Registrar WHOIS Server: whois.dreamhost.com
  130. Registrar URL: http://www.dreamhost.com/
  131. Updated Date: 2018-06-15T07:21:05Z
  132. Creation Date: 2009-07-17T04:16:48Z
  133. Registry Expiry Date: 2019-07-17T04:16:48Z
  134. Registrar Registration Expiration Date:
  135. Registrar: New Dream Network, LLC dba DreamHost Web Hosting
  136. Registrar IANA ID: 431
  137. Registrar Abuse Contact Email: abuse@dreamhost.com
  138. Registrar Abuse Contact Phone: +213.2719359
  139. Reseller:
  140. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  141. Registrant Organization: Proxy Protection LLC
  142. Registrant State/Province: CA
  143. Registrant Country: US
  144. Name Server: NS1.DREAMHOST.COM
  145. Name Server: NS2.DREAMHOST.COM
  146. Name Server: NS3.DREAMHOST.COM
  147. DNSSEC: unsigned
  148. URL of the ICANN Whois Inaccuracy Complaint Form https://www.icann.org/wicf/)
  149. >>> Last update of WHOIS database: 2019-02-11T20:53:44Z <<<
  150.  
  151. For more information on Whois status codes, please visit https://icann.org/epp
  152.  
  153.  
  154.  
  155.  
  156.  
  157. G E O I P L O O K U P
  158. =======================================================================================================================================
  159.  
  160. [i] IP Address: 208.113.216.34
  161. [i] Country: United States
  162. [i] State: California
  163. [i] City: Brea
  164. [i] Latitude: 33.9291
  165. [i] Longitude: -117.8845
  166.  
  167.  
  168.  
  169.  
  170. H T T P H E A D E R S
  171. =======================================================================================================================================
  172.  
  173.  
  174. [i] HTTP/1.1 403 Forbidden
  175. [i] Date: Mon, 11 Feb 2019 20:54:46 GMT
  176. [i] Vary: Accept-Encoding
  177. [i] Content-Type: text/html; charset=iso-8859-1
  178. [i] Connection: close
  179.  
  180.  
  181.  
  182.  
  183. D N S L O O K U P
  184. =======================================================================================================================================
  185.  
  186. northwestfront.org. 14399 IN A 208.113.216.34
  187. northwestfront.org. 14399 IN NS ns1.dreamhost.com.
  188. northwestfront.org. 14399 IN NS ns2.dreamhost.com.
  189. northwestfront.org. 14399 IN NS ns3.dreamhost.com.
  190. northwestfront.org. 14399 IN SOA ns1.dreamhost.com. hostmaster.dreamhost.com. 2019011203 18454 1800 1814400 14400
  191.  
  192.  
  193.  
  194.  
  195. S U B N E T C A L C U L A T I O N
  196. =======================================================================================================================================
  197.  
  198. Address = 208.113.216.34
  199. Network = 208.113.216.34 / 32
  200. Netmask = 255.255.255.255
  201. Broadcast = not needed on Point-to-Point links
  202. Wildcard Mask = 0.0.0.0
  203. Hosts Bits = 0
  204. Max. Hosts = 1 (2^0 - 0)
  205. Host Range = { 208.113.216.34 - 208.113.216.34 }
  206.  
  207.  
  208.  
  209. N M A P P O R T S C A N
  210. =======================================================================================================================================
  211.  
  212.  
  213. Starting Nmap 7.40 ( https://nmap.org ) at 2019-02-11 20:54 UTC
  214. Nmap scan report for northwestfront.org (208.113.216.34)
  215. Host is up (0.0079s latency).
  216. rDNS record for 208.113.216.34: apache2-yak.francis-hopkinson.dreamhost.com
  217. PORT STATE SERVICE
  218. 21/tcp open ftp
  219. 22/tcp open ssh
  220. 23/tcp filtered telnet
  221. 80/tcp open http
  222. 110/tcp filtered pop3
  223. 143/tcp filtered imap
  224. 443/tcp open https
  225. 3389/tcp filtered ms-wbt-server
  226.  
  227. Nmap done: 1 IP address (1 host up) scanned in 1.32 seconds
  228. #######################################################################################################################################
  229. [?] Enter the target: example( http://domain.com )
  230. http://northwestfront.org/about/
  231. [!] IP Address : 208.113.216.34
  232. [+] Operating System : Ubuntu
  233. [!] CMS Detected : WordPress
  234. [?] Would you like to use WPScan? [Y/n] n
  235. [+] Honeypot Probabilty: 30%
  236. ---------------------------------------------------------------------------------------------------------------------------------------
  237. [~] Trying to gather whois information for northwestfront.org
  238. [+] Whois information found
  239. [-] Unable to build response, visit https://who.is/whois/northwestfront.org
  240. ---------------------------------------------------------------------------------------------------------------------------------------
  241. PORT STATE SERVICE
  242. 21/tcp open ftp
  243. 22/tcp open ssh
  244. 23/tcp filtered telnet
  245. 80/tcp open http
  246. 110/tcp filtered pop3
  247. 143/tcp filtered imap
  248. 443/tcp open https
  249. 3389/tcp filtered ms-wbt-server
  250. Nmap done: 1 IP address (1 host up) scanned in 1.27 seconds
  251. ---------------------------------------------------------------------------------------------------------------------------------------
  252.  
  253. [+] DNS Records
  254. ns3.dreamhost.com. (66.33.205.230) AS26347 New Dream Network, LLC United States
  255. ns2.dreamhost.com. (208.97.182.10) AS26347 New Dream Network, LLC United States
  256. ns1.dreamhost.com. (64.90.62.230) AS26347 New Dream Network, LLC United States
  257.  
  258. [+] Host Records (A)
  259. www.northwestfront.orgHTTP: (apache2-yak.francis-hopkinson.dreamhost.com) (208.113.216.34) AS26347 New Dream Network, LLC United States
  260.  
  261. [+] TXT Records
  262.  
  263. [+] DNS Map: https://dnsdumpster.com/static/map/northwestfront.org.png
  264.  
  265. [>] Initiating 3 intel modules
  266. [>] Loading Alpha module (1/3)
  267. [>] Beta module deployed (2/3)
  268. [>] Gamma module initiated (3/3)
  269. No emails found
  270.  
  271. [+] Hosts found in search engines:
  272. ---------------------------------------------------------------------------------------------------------------------------------------
  273. [-] Resolving hostnames IPs...
  274. 208.113.216.34:www.northwestfront.org
  275. [+] Virtual hosts:
  276. ---------------------------------------------------------------------------------------------------------------------------------------
  277. #######################################################################################################################################
  278. Reversing IP With HackTarget '208.113.216.34'
  279. ---------------------------------------------------------------------------------------------------------------------------------------
  280.  
  281. [+] barbiesbraidsandfades.com
  282. [+] breweries.punctuations.in
  283. [+] chasingopenspaces.com
  284. [+] chrismiolla.com
  285. [+] consultdesiree.com
  286. [+] creatingthenewlam.com
  287. [+] demaonaroda.2aces.com.br
  288. [+] dollaraminutewebsites.com
  289. [+] dollarmusicdownload.com
  290. [+] element17.com
  291. [+] hewncreative.com
  292. [+] iherebuywisely.com
  293. [+] inflatableadvertisingballoons.com
  294. [+] letchadhelp.com
  295. [+] light.pointflair.com
  296. [+] markephair.com
  297. [+] mofasme.org
  298. [+] moifde.com
  299. [+] moifde.markephair.com
  300. [+] nofucx.com
  301. [+] northwestfront.net
  302. [+] northwestfront.org
  303. [+] practicegratitude.org
  304. [+] sexpositivedictionary.com
  305. [+] sofrevolution.org
  306. [+] splintergrouptheatre.com
  307. [+] stephengaucher.com
  308. [+] work.armandobreceda.com
  309. [+] world-timelines.com
  310. [+] www.barbiesbraidsandfades.com
  311. [+] www.breweries.punctuations.in
  312. [+] www.element17.com
  313. [+] www.hewncreative.com
  314. [+] www.inflatableadvertisingballoons.com
  315. [+] www.light.pointflair.com
  316. [+] www.northwestfront.net
  317. [+] www.northwestfront.org
  318. [+] www.practicegratitude.org
  319. [+] www.sofrevolution.org
  320. [+] www.work.armandobreceda.com
  321. [+] www.world-timelines.com
  322. #######################################################################################################################################
  323. Reverse IP With YouGetSignal '208.113.216.34'
  324. ---------------------------------------------------------------------------------------------------------------------------------------
  325.  
  326. [*] IP: 208.113.216.34
  327. [*] Domain: 208.113.216.34
  328. [*] Total Domains: 5
  329.  
  330. [+] barrettroadcapital.com
  331. [+] dollaraminutewebsites.com
  332. [+] hewncreative.com
  333. [+] thefashionnovella.com
  334. [+] www.lekrasa.com
  335. #######################################################################################################################################
  336. Geo IP Lookup '208.113.216.34'
  337. ---------------------------------------------------------------------------------------------------------------------------------------
  338.  
  339. [+] IP Address: 208.113.216.34
  340. [+] Country: United States
  341. [+] State: California
  342. [+] City: Brea
  343. [+] Latitude: 33.9291
  344. [+] Longitude: -117.8845
  345. #######################################################################################################################################
  346. Whois '208.113.216.34'
  347. ---------------------------------------------------------------------------------------------------------------------------------------
  348.  
  349. [+] #
  350. [+] # ARIN WHOIS data and services are subject to the Terms of Use
  351. [+] # available at: https://www.arin.net/whois_tou.html
  352. [+] #
  353. [+] # If you see inaccuracies in the results, please report at
  354. [+] # https://www.arin.net/resources/whois_reporting/index.html
  355. [+] #
  356. [+] # Copyright 1997-2019, American Registry for Internet Numbers, Ltd.
  357. [+] #
  358. [+] NetRange: 208.113.128.0 - 208.113.255.255
  359. [+] CIDR: 208.113.128.0/17
  360. [+] NetName: DREAMHOST-BLK6
  361. [+] NetHandle: NET-208-113-128-0-1
  362. [+] Parent: NET208 (NET-208-0-0-0-0)
  363. [+] NetType: Direct Allocation
  364. [+] OriginAS:
  365. [+] Organization: New Dream Network, LLC (NDN)
  366. [+] RegDate: 2006-04-12
  367. [+] Updated: 2012-03-02
  368. [+] Ref: https://rdap.arin.net/registry/ip/208.113.128.0
  369. [+] OrgName: New Dream Network, LLC
  370. [+] OrgId: NDN
  371. [+] Address: 417 Associated Rd.
  372. [+] Address: PMB #257
  373. [+] City: Brea
  374. [+] StateProv: CA
  375. [+] PostalCode: 92821
  376. [+] Country: US
  377. [+] RegDate: 2001-04-16
  378. [+] Updated: 2017-01-28
  379. [+] Comment: Address location was created regardless of geographic location.
  380. [+] Ref: https://rdap.arin.net/registry/entity/NDN
  381. [+] OrgNOCHandle: NETOP274-ARIN
  382. [+] OrgNOCName: NetOPs
  383. [+] OrgNOCPhone: +1-714-706-4182
  384. [+] OrgNOCEmail: netops@dreamhost.com
  385. [+] OrgNOCRef: https://rdap.arin.net/registry/entity/NETOP274-ARIN
  386. [+] OrgAbuseHandle: DAT5-ARIN
  387. [+] OrgAbuseName: DreamHost Abuse Team
  388. [+] OrgAbusePhone: +1-714-706-4182
  389. [+] OrgAbuseEmail: abuse@dreamhost.com
  390. [+] OrgAbuseRef: https://rdap.arin.net/registry/entity/DAT5-ARIN
  391. [+] OrgTechHandle: NETOP274-ARIN
  392. [+] OrgTechName: NetOPs
  393. [+] OrgTechPhone: +1-714-706-4182
  394. [+] OrgTechEmail: netops@dreamhost.com
  395. [+] OrgTechRef: https://rdap.arin.net/registry/entity/NETOP274-ARIN
  396. [+] #
  397. [+] # ARIN WHOIS data and services are subject to the Terms of Use
  398. [+] # available at: https://www.arin.net/whois_tou.html
  399. [+] #
  400. [+] # If you see inaccuracies in the results, please report at
  401. [+] # https://www.arin.net/resources/whois_reporting/index.html
  402. [+] #
  403. [+] # Copyright 1997-2019, American Registry for Internet Numbers, Ltd.
  404. [+] #
  405. #######################################################################################################################################
  406. Show HTTP Header '208.113.216.34'
  407. ---------------------------------------------------------------------------------------------------------------------------------------
  408.  
  409. [+] HTTP/1.1 200 OK
  410. [+] Date: Mon, 11 Feb 2019 20:57:05 GMT
  411. [+] Server: Apache
  412. [+] Last-Modified: Sat, 01 Nov 2014 04:18:40 GMT
  413. [+] ETag: 304-506c4687e0800
  414. [+] Accept-Ranges: bytes
  415. [+] Content-Length: 772
  416. [+] Content-Type: text/html
  417. #######################################################################################################################################
  418. Port Scan '208.113.216.34'
  419. ---------------------------------------------------------------------------------------------------------------------------------------
  420.  
  421.  
  422. Starting Nmap 7.40 ( https://nmap.org ) at 2019-02-11 20:57 UTC
  423. Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  424. Host is up (0.0072s latency).
  425. PORT STATE SERVICE
  426. 21/tcp open ftp
  427. 22/tcp open ssh
  428. 23/tcp filtered telnet
  429. 80/tcp open http
  430. 110/tcp filtered pop3
  431. 143/tcp filtered imap
  432. 443/tcp open https
  433. 3389/tcp filtered ms-wbt-server
  434.  
  435. Nmap done: 1 IP address (1 host up) scanned in 1.26 seconds
  436. #######################################################################################################################################
  437. Traceroute '208.113.216.34'
  438. ---------------------------------------------------------------------------------------------------------------------------------------
  439.  
  440. Start: 2019-02-11T20:57:11+0000
  441. HOST: web01 Loss% Snt Last Avg Best Wrst StDev
  442. 1.|-- 45.79.12.202 0.0% 3 0.6 1.2 0.6 2.2 0.9
  443. 2.|-- 45.79.12.6 0.0% 3 0.9 0.7 0.6 0.9 0.2
  444. 3.|-- 45.79.12.8 0.0% 3 0.9 0.8 0.8 0.9 0.0
  445. 4.|-- ae-37.a01.dllstx04.us.bb.gin.ntt.net 0.0% 3 4.0 2.8 2.1 4.0 1.1
  446. 5.|-- ae-9.r11.dllstx09.us.bb.gin.ntt.net 0.0% 3 39.6 39.5 39.2 39.6 0.3
  447. 6.|-- ae-0.r22.dllstx09.us.bb.gin.ntt.net 0.0% 3 1.7 2.0 1.4 2.7 0.7
  448. 7.|-- ae-1.r22.asbnva02.us.bb.gin.ntt.net 0.0% 3 39.1 40.1 39.1 42.1 1.8
  449. 8.|-- ae-1.r05.asbnva02.us.bb.gin.ntt.net 0.0% 3 39.3 39.3 39.1 39.3 0.1
  450. 9.|-- ae-0.a03.asbnva02.us.bb.gin.ntt.net 0.0% 3 40.2 39.5 39.1 40.2 0.5
  451. 10.|-- ae-0.dreamhost.asbnva02.us.bb.gin.ntt.net 0.0% 3 36.2 36.0 35.9 36.2 0.2
  452. 11.|-- ip-208-113-156-8.dreamhost.com 0.0% 3 41.1 41.2 41.1 41.3 0.1
  453. 12.|-- ip-208-113-156-14.dreamhost.com 0.0% 3 41.4 39.1 37.9 41.4 2.0
  454. 13.|-- apache2-yak.francis-hopkinson.dreamhost.com 0.0% 3 39.0 39.0 38.9 39.0 0.1
  455. #######################################################################################################################################
  456. Ping '208.113.216.34'
  457. ---------------------------------------------------------------------------------------------------------------------------------------
  458.  
  459. Starting Nping 0.7.70 ( https://nmap.org/nping ) at 2019-02-11 20:57 UTC
  460. SENT (0.0030s) ICMP [104.237.144.6 > 208.113.216.34 Echo request (type=8/code=0) id=28373 seq=1] IP [ttl=64 id=63972 iplen=28 ]
  461. RCVD (0.2053s) ICMP [208.113.216.34 > 104.237.144.6 Echo reply (type=0/code=0) id=28373 seq=1] IP [ttl=53 id=47653 iplen=28 ]
  462. SENT (1.0033s) ICMP [104.237.144.6 > 208.113.216.34 Echo request (type=8/code=0) id=28373 seq=2] IP [ttl=64 id=63972 iplen=28 ]
  463. RCVD (1.0213s) ICMP [208.113.216.34 > 104.237.144.6 Echo reply (type=0/code=0) id=28373 seq=2] IP [ttl=53 id=47701 iplen=28 ]
  464. SENT (2.0054s) ICMP [104.237.144.6 > 208.113.216.34 Echo request (type=8/code=0) id=28373 seq=3] IP [ttl=64 id=63972 iplen=28 ]
  465. RCVD (2.0413s) ICMP [208.113.216.34 > 104.237.144.6 Echo reply (type=0/code=0) id=28373 seq=3] IP [ttl=53 id=47834 iplen=28 ]
  466. SENT (3.0074s) ICMP [104.237.144.6 > 208.113.216.34 Echo request (type=8/code=0) id=28373 seq=4] IP [ttl=64 id=63972 iplen=28 ]
  467. RCVD (3.0613s) ICMP [208.113.216.34 > 104.237.144.6 Echo reply (type=0/code=0) id=28373 seq=4] IP [ttl=53 id=47849 iplen=28 ]
  468.  
  469. Max rtt: 202.363ms | Min rtt: 17.849ms | Avg rtt: 77.372ms
  470. Raw packets sent: 4 (112B) | Rcvd: 4 (184B) | Lost: 0 (0.00%)
  471. Nping done: 1 IP address pinged in 3.06 seconds
  472. #######################################################################################################################################
  473. [*] Performing General Enumeration of Domain: northwestfront.org
  474. [-] DNSSEC is not configured for northwestfront.org
  475. [*] SOA ns1.dreamhost.com 64.90.62.230
  476. [*] NS ns1.dreamhost.com 64.90.62.230
  477. [*] NS ns2.dreamhost.com 208.97.182.10
  478. [*] NS ns3.dreamhost.com 66.33.205.230
  479. [-] Could not Resolve MX Records for northwestfront.org
  480. [*] A northwestfront.org 208.113.216.34
  481. [*] Enumerating SRV Records
  482. [-] No SRV Records Found for northwestfront.org
  483. [+] 0 Records Found
  484. #######################################################################################################################################
  485. rocessing domain northwestfront.org
  486. [*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '205.151.67.6', '205.151.67.34', '205.151.67.2', '2001:18c0:ffe0:2::2', '2001:18c0:ffe0:3::2', '2001:18c0:ffe0:1::2']
  487. [+] Getting nameservers
  488. 64.90.62.230 - ns1.dreamhost.com
  489. 208.97.182.10 - ns2.dreamhost.com
  490. 66.33.205.230 - ns3.dreamhost.com
  491. [-] Zone transfer failed
  492.  
  493. [*] Scanning northwestfront.org for A records
  494. 208.113.216.34 - northwestfront.org
  495. 216.58.193.179 - calendar.northwestfront.org
  496. 216.58.193.179 - docs.northwestfront.org
  497. 208.113.216.34 - ftp.northwestfront.org
  498. 216.58.193.179 - sites.northwestfront.org
  499. 208.113.216.34 - ssh.northwestfront.org
  500. 216.58.193.179 - start.northwestfront.org
  501. 208.113.216.34 - www.northwestfront.org
  502. #######################################################################################################################################
  503. Ip Address Status Type Domain Name Server
  504. ---------- ------ ---- ----------- ------
  505. 216.58.193.179 404 alias calendar.northwestfront.org ghs
  506. 216.58.193.179 404 host ghs.googlehosted.com ghs
  507. 216.58.193.179 404 alias docs.northwestfront.org ghs
  508. 216.58.193.179 404 host ghs.googlehosted.com ghs
  509. 208.113.216.34 200 host ftp.northwestfront.org
  510. 208.113.216.34 200 host ssh.northwestfront.org
  511. 216.58.193.179 404 alias start.northwestfront.org ghs
  512. 216.58.193.179 404 host ghs.googlehosted.com ghs
  513. 208.113.216.34 403 host www.northwestfront.org
  514. #######################################################################################################################################
  515. www.northwestfront.org 208.113.216.34
  516. [+] Dns resolving
  517. Domain name Ip address Name server
  518. northwestfront.org 208.113.216.34 apache2-yak.francis-hopkinson.dreamhost.com
  519. Found 1 host(s) for northwestfront.org
  520. [+] Testing wildcard
  521. Ok, no wildcard found.
  522.  
  523. [+] Scanning for subdomain on northwestfront.org
  524. [!] Wordlist not specified. I scannig with my internal wordlist...
  525. Estimated time about 108.71 seconds
  526.  
  527. Subdomain Ip address Name server
  528.  
  529. calendar.northwestfront.org 216.58.193.179 atl26s15-in-f19.1e100.net
  530. docs.northwestfront.org 216.58.193.179 atl26s15-in-f19.1e100.net
  531. ftp.northwestfront.org 208.113.216.34 apache2-yak.francis-hopkinson.dreamhost.com
  532. ssh.northwestfront.org 208.113.216.34 apache2-yak.francis-hopkinson.dreamhost.com
  533. start.northwestfront.org 216.58.193.179 atl26s15-in-f19.1e100.net
  534. www.northwestfront.org 208.113.216.34 apache2-yak.francis-hopkinson.dreamhost.com
  535. #######################################################################################################################################
  536. dnsenum VERSION:1.2.4
  537.  
  538. ----- northwestfront.org -----
  539.  
  540.  
  541. Host's addresses:
  542. __________________
  543.  
  544. northwestfront.org. 11369 IN A 208.113.216.34
  545.  
  546.  
  547. Name Servers:
  548. ______________
  549.  
  550. ns3.dreamhost.com. 86360 IN A 66.33.205.230
  551. ns2.dreamhost.com. 86360 IN A 208.97.182.10
  552. ns1.dreamhost.com. 86398 IN A 64.90.62.230
  553.  
  554.  
  555. Mail (MX) Servers:
  556. ___________________
  557.  
  558.  
  559.  
  560. Trying Zone Transfers and getting Bind Versions:
  561. _________________________________________________
  562.  
  563.  
  564. Trying Zone Transfer for northwestfront.org on ns3.dreamhost.com ...
  565.  
  566. Trying Zone Transfer for northwestfront.org on ns2.dreamhost.com ...
  567.  
  568. Trying Zone Transfer for northwestfront.org on ns1.dreamhost.com ...
  569.  
  570. brute force file not specified, bay.
  571. #######################################################################################################################################
  572. Domain Name: NORTHWESTFRONT.ORG
  573. Registry Domain ID: D156669153-LROR
  574. Registrar WHOIS Server: whois.dreamhost.com
  575. Registrar URL: http://www.dreamhost.com/
  576. Updated Date: 2018-06-15T07:21:05Z
  577. Creation Date: 2009-07-17T04:16:48Z
  578. Registry Expiry Date: 2019-07-17T04:16:48Z
  579. Registrar Registration Expiration Date:
  580. Registrar: New Dream Network, LLC dba DreamHost Web Hosting
  581. Registrar IANA ID: 431
  582. Registrar Abuse Contact Email: abuse@dreamhost.com
  583. Registrar Abuse Contact Phone: +213.2719359
  584. Reseller:
  585. Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
  586. Registrant Organization: Proxy Protection LLC
  587. Registrant State/Province: CA
  588. Registrant Country: US
  589. Name Server: NS1.DREAMHOST.COM
  590. Name Server: NS2.DREAMHOST.COM
  591. Name Server: NS3.DREAMHOST.COM
  592. DNSSEC: unsigned
  593. URL of the ICANN Whois Inaccuracy Complaint Form https://www.icann.org/wicf/)
  594. >>> Last update of WHOIS database: 2019-02-11T20:58:29Z <<<
  595. #######################################################################################################################################
  596.  
  597. ____ _ _ _ _ _____
  598. / ___| _ _| |__ | (_)___| |_|___ / _ __
  599. \___ \| | | | '_ \| | / __| __| |_ \| '__|
  600. ___) | |_| | |_) | | \__ \ |_ ___) | |
  601. |____/ \__,_|_.__/|_|_|___/\__|____/|_|
  602.  
  603. # Coded By Ahmed Aboul-Ela - @aboul3la
  604.  
  605. [-] Enumerating subdomains now for northwestfront.org
  606. [-] verbosity is enabled, will show the subdomains results in realtime
  607. [-] Searching now in Baidu..
  608. [-] Searching now in Yahoo..
  609. [-] Searching now in Google..
  610. [-] Searching now in Bing..
  611. [-] Searching now in Ask..
  612. [-] Searching now in Netcraft..
  613. [-] Searching now in DNSdumpster..
  614. [-] Searching now in Virustotal..
  615. [-] Searching now in ThreatCrowd..
  616. [-] Searching now in SSL Certificates..
  617. [-] Searching now in PassiveDNS..
  618. Virustotal: www.northwestfront.org
  619. SSL Certificates: www.northwestfront.org
  620. DNSdumpster: www.northwestfront.org
  621. [-] Saving results to file: /usr/share/sniper/loot//domains/domains-northwestfront.org.txt
  622. [-] Total Unique Subdomains Found: 1
  623. www.northwestfront.org
  624. #######################################################################################################################################
  625. www.northwestfront.org,208.113.216.34
  626. northwestfront.org,208.113.216.34
  627. ftp.northwestfront.org,208.113.216.34
  628. ssh.northwestfront.org,208.113.216.34
  629. calendar.northwestfront.org,172.217.29.51,2607:f8b0:4006:819::2013
  630. docs.northwestfront.org,172.217.29.51,2607:f8b0:4006:819::2013
  631. start.northwestfront.org,172.217.29.51,2607:f8b0:4006:819::2013
  632. #######################################################################################################################################
  633. ===============================================
  634. -=Subfinder v1.1.3 github.com/subfinder/subfinder
  635. ===============================================
  636.  
  637.  
  638. Running Source: Ask
  639. Running Source: Archive.is
  640. Running Source: Baidu
  641. Running Source: Bing
  642. Running Source: CertDB
  643. Running Source: CertificateTransparency
  644. Running Source: Certspotter
  645. Running Source: Commoncrawl
  646. Running Source: Crt.sh
  647. Running Source: Dnsdb
  648. Running Source: DNSDumpster
  649. Running Source: DNSTable
  650. Running Source: Dogpile
  651. Running Source: Exalead
  652. Running Source: Findsubdomains
  653. Running Source: Googleter
  654. Running Source: Hackertarget
  655. Running Source: Ipv4Info
  656. Running Source: PTRArchive
  657. Running Source: Sitedossier
  658. Running Source: Threatcrowd
  659. Running Source: ThreatMiner
  660. Running Source: WaybackArchive
  661. Running Source: Yahoo
  662.  
  663. Running enumeration on northwestfront.org
  664.  
  665. dnsdb: Unexpected return status 503
  666.  
  667. waybackarchive: Get https://web.archive.org/cdx/search/cdx?url=*.northwestfront.org/*&output=json&fl=original&collapse=urlkey&page=: net/http: invalid header field value "http://web.archive.org/cdx/search/cdx?url=*.northwestfront.org/*&output=json&fl=original&collapse=urlkey&page=\x00" for key Referer
  668.  
  669. baidu: net/http: request canceled (Client.Timeout exceeded while reading body)
  670.  
  671.  
  672. Starting Bruteforcing of northwestfront.org with 9985 words
  673.  
  674. Total 9 Unique subdomains found for northwestfront.org
  675.  
  676. .northwestfront.org
  677. calendar.northwestfront.org
  678. docs.northwestfront.org
  679. ftp.northwestfront.org
  680. sites.northwestfront.org
  681. ssh.northwestfront.org
  682. start.northwestfront.org
  683. www.northwestfront.org
  684. www.northwestfront.org
  685. #######################################################################################################################################
  686. [+] northwestfront.org has no SPF record!
  687. [*] No DMARC record found. Looking for organizational record
  688. [+] No organizational DMARC record
  689. [+] Spoofing possible for northwestfront.org!
  690. #######################################################################################################################################
  691. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 16:16 EST
  692. Nmap scan report for northwestfront.org (208.113.216.34)
  693. Host is up (0.15s latency).
  694. rDNS record for 208.113.216.34: apache2-yak.francis-hopkinson.dreamhost.com
  695. Not shown: 467 filtered ports, 4 closed ports
  696. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  697. PORT STATE SERVICE
  698. 21/tcp open ftp
  699. 22/tcp open ssh
  700. 80/tcp open http
  701. 443/tcp open https
  702. 587/tcp open submission
  703. #######################################################################################################################################
  704. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 16:16 EST
  705. Nmap scan report for northwestfront.org (208.113.216.34)
  706. Host is up (0.20s latency).
  707. rDNS record for 208.113.216.34: apache2-yak.francis-hopkinson.dreamhost.com
  708. Not shown: 2 filtered ports
  709. PORT STATE SERVICE
  710. 53/udp open|filtered domain
  711. 67/udp open|filtered dhcps
  712. 68/udp open|filtered dhcpc
  713. 69/udp open|filtered tftp
  714. 88/udp open|filtered kerberos-sec
  715. 123/udp open ntp
  716. 139/udp open|filtered netbios-ssn
  717. 161/udp open|filtered snmp
  718. 162/udp open|filtered snmptrap
  719. 389/udp open|filtered ldap
  720. 520/udp open|filtered route
  721. 2049/udp open|filtered nfs
  722. #######################################################################################################################################
  723. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 16:16 EST
  724. Nmap scan report for northwestfront.org (208.113.216.34)
  725. Host is up (0.21s latency).
  726. rDNS record for 208.113.216.34: apache2-yak.francis-hopkinson.dreamhost.com
  727.  
  728. PORT STATE SERVICE VERSION
  729. 21/tcp open ftp ProFTPD
  730. Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
  731. Device type: general purpose
  732. Running (JUST GUESSING): Linux 4.X|3.X|2.6.X (91%)
  733. OS CPE: cpe:/o:linux:linux_kernel:4.9 cpe:/o:linux:linux_kernel:3.18 cpe:/o:linux:linux_kernel:2.6
  734. Aggressive OS guesses: Linux 4.9 (91%), Linux 3.18 (88%), Linux 2.6.18 - 2.6.22 (86%), Linux 3.12 - 4.10 (85%), Linux 3.16 (85%)
  735. No exact OS matches for host (test conditions non-ideal).
  736. Network Distance: 17 hops
  737.  
  738. TRACEROUTE (using port 21/tcp)
  739. HOP RTT ADDRESS
  740. 1 124.92 ms 10.247.200.1
  741. 2 124.95 ms 190.124.251.129
  742. 3 124.97 ms 172.16.21.1
  743. 4 184.97 ms ip4-91-205-233-128.rdns.racklodge.com (91.205.233.128)
  744. 5 185.53 ms 192.168.7.2
  745. 6 185.51 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
  746. 7 185.84 ms core3.t6-2.bbnet2.mia003.pnap.net (69.25.0.67)
  747. 8 185.56 ms te0-3-0-14.ccr21.mia03.atlas.cogentco.com (38.88.164.137)
  748. 9 185.88 ms be3400.ccr21.mia01.atlas.cogentco.com (154.54.47.17)
  749. 10 199.45 ms be3482.ccr41.atl01.atlas.cogentco.com (154.54.24.145)
  750. 11 210.66 ms 154.54.24.221
  751. 12 211.22 ms be3084.ccr41.iad02.atlas.cogentco.com (154.54.30.66)
  752. 13 211.24 ms be3563.rcr51.b037327-0.iad02.atlas.cogentco.com (154.54.25.226)
  753. 14 210.80 ms 38.122.62.254
  754. 15 214.27 ms 208.113.156.8
  755. 16 212.69 ms ip-208-113-156-14.dreamhost.com (208.113.156.14)
  756. 17 210.70 ms apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  757. #######################################################################################################################################
  758. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 16:27 EST
  759. Nmap scan report for northwestfront.org (208.113.216.34)
  760. Host is up (0.21s latency).
  761. rDNS record for 208.113.216.34: apache2-yak.francis-hopkinson.dreamhost.com
  762.  
  763. PORT STATE SERVICE VERSION
  764. 22/tcp filtered ssh
  765. Too many fingerprints match this host to give specific OS details
  766. Network Distance: 17 hops
  767.  
  768. TRACEROUTE (using proto 1/icmp)
  769. HOP RTT ADDRESS
  770. 1 126.43 ms 10.247.200.1
  771. 2 126.47 ms 190.124.251.129
  772. 3 126.50 ms 172.16.21.1
  773. 4 186.61 ms ip4-91-205-233-128.rdns.racklodge.com (91.205.233.128)
  774. 5 186.97 ms 192.168.7.2
  775. 6 190.18 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
  776. 7 187.64 ms 69.25.0.3
  777. 8 187.20 ms te0-3-0-14.ccr21.mia03.atlas.cogentco.com (38.88.164.137)
  778. 9 187.20 ms be3401.ccr22.mia01.atlas.cogentco.com (154.54.47.29)
  779. 10 201.06 ms be3483.ccr42.atl01.atlas.cogentco.com (154.54.28.49)
  780. 11 210.15 ms 154.54.24.221
  781. 12 210.64 ms be3084.ccr41.iad02.atlas.cogentco.com (154.54.30.66)
  782. 13 210.94 ms be3562.rcr51.b037327-0.iad02.atlas.cogentco.com (154.54.24.234)
  783. 14 210.04 ms 38.122.62.254
  784. 15 211.96 ms ip-208-113-156-8.dreamhost.com (208.113.156.8)
  785. 16 212.43 ms ip-208-113-156-14.dreamhost.com (208.113.156.14)
  786. 17 211.39 ms apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  787. #######################################################################################################################################
  788. USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
  789. RHOSTS => northwestfront.org
  790. RHOST => northwestfront.org
  791. [*] 208.113.216.34:22 - SSH - Using malformed packet technique
  792. [*] 208.113.216.34:22 - SSH - Starting scan
  793. [-] 208.113.216.34:22 - SSH - User 'admin' on could not connect
  794. [-] 208.113.216.34:22 - SSH - User 'administrator' on could not connect
  795. [-] 208.113.216.34:22 - SSH - User 'anonymous' on could not connect
  796. [-] 208.113.216.34:22 - SSH - User 'backup' on could not connect
  797. [-] 208.113.216.34:22 - SSH - User 'bee' on could not connect
  798. [-] 208.113.216.34:22 - SSH - User 'ftp' on could not connect
  799. [-] 208.113.216.34:22 - SSH - User 'guest' on could not connect
  800. [-] 208.113.216.34:22 - SSH - User 'GUEST' on could not connect
  801. [-] 208.113.216.34:22 - SSH - User 'info' on could not connect
  802. [-] 208.113.216.34:22 - SSH - User 'mail' on could not connect
  803. [-] 208.113.216.34:22 - SSH - User 'mailadmin' on could not connect
  804. [-] 208.113.216.34:22 - SSH - User 'msfadmin' on could not connect
  805. [-] 208.113.216.34:22 - SSH - User 'mysql' on could not connect
  806. [-] 208.113.216.34:22 - SSH - User 'nobody' on could not connect
  807. [-] 208.113.216.34:22 - SSH - User 'oracle' on could not connect
  808. [-] 208.113.216.34:22 - SSH - User 'owaspbwa' on could not connect
  809. [-] 208.113.216.34:22 - SSH - User 'postfix' on could not connect
  810. [-] 208.113.216.34:22 - SSH - User 'postgres' on could not connect
  811. [-] 208.113.216.34:22 - SSH - User 'private' on could not connect
  812. [-] 208.113.216.34:22 - SSH - User 'proftpd' on could not connect
  813. [-] 208.113.216.34:22 - SSH - User 'public' on could not connect
  814. [-] 208.113.216.34:22 - SSH - User 'root' on could not connect
  815. [-] 208.113.216.34:22 - SSH - User 'superadmin' on could not connect
  816. [-] 208.113.216.34:22 - SSH - User 'support' on could not connect
  817. [-] 208.113.216.34:22 - SSH - User 'sys' on could not connect
  818. [-] 208.113.216.34:22 - SSH - User 'system' on could not connect
  819. [-] 208.113.216.34:22 - SSH - User 'systemadmin' on could not connect
  820. [-] 208.113.216.34:22 - SSH - User 'systemadministrator' on could not connect
  821. [-] 208.113.216.34:22 - SSH - User 'test' on could not connect
  822. [-] 208.113.216.34:22 - SSH - User 'tomcat' on could not connect
  823. [-] 208.113.216.34:22 - SSH - User 'user' on could not connect
  824. [-] 208.113.216.34:22 - SSH - User 'webmaster' on could not connect
  825. [-] 208.113.216.34:22 - SSH - User 'www-data' on could not connect
  826. [-] 208.113.216.34:22 - SSH - User 'Fortimanager_Access' on could not connect
  827. [*] Scanned 1 of 1 hosts (100% complete)
  828. [*] Auxiliary module execution completed
  829. #######################################################################################################################################
  830. wig - WebApp Information Gatherer
  831.  
  832.  
  833. Scanning http://northwestfront.org...
  834. _____________________ SITE INFO ______________________
  835. IP Title
  836. 208.113.216.34 403 Forbidden
  837.  
  838. ______________________ VERSION _______________________
  839. Name Versions Type
  840.  
  841. ____________________ INTERESTING _____________________
  842. URL Note Type
  843. /readme.html Readme file Interesting
  844. /install.php Installation file Interesting
  845. /test.php Test file Interesting
  846.  
  847. ______________________________________________________
  848. Time: 65.9 sec Urls: 598 Fingerprints: 40401
  849. #######################################################################################################################################
  850. HTTP/1.1 403 Forbidden
  851. Date: Mon, 11 Feb 2019 21:38:04 GMT
  852. Vary: Accept-Encoding
  853. Content-Encoding: gzip
  854. Content-Length: 20
  855. Content-Type: text/html; charset=iso-8859-1
  856. Connection: keep-alive
  857.  
  858. HTTP/1.1 403 Forbidden
  859. Date: Mon, 11 Feb 2019 21:38:05 GMT
  860. Vary: Accept-Encoding
  861. Content-Encoding: gzip
  862. Content-Length: 20
  863. Content-Type: text/html; charset=iso-8859-1
  864. Connection: keep-alive
  865. #######################################################################################################################################
  866. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:08 EST
  867. Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  868. Host is up (0.19s latency).
  869. Not shown: 471 filtered ports, 4 closed ports
  870. Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
  871. PORT STATE SERVICE
  872. 80/tcp open http
  873. #######################################################################################################################################
  874. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:08 EST
  875. Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  876. Host is up (0.14s latency).
  877. Not shown: 2 filtered ports
  878. PORT STATE SERVICE
  879. 53/udp open|filtered domain
  880. 67/udp open|filtered dhcps
  881. 68/udp open|filtered dhcpc
  882. 69/udp open|filtered tftp
  883. 88/udp open|filtered kerberos-sec
  884. 123/udp open ntp
  885. 139/udp open|filtered netbios-ssn
  886. 161/udp open|filtered snmp
  887. 162/udp open|filtered snmptrap
  888. 389/udp open|filtered ldap
  889. 520/udp open|filtered route
  890. 2049/udp open|filtered nfs
  891. #######################################################################################################################################
  892. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:08 EST
  893. Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  894. Host is up (0.21s latency).
  895.  
  896. PORT STATE SERVICE VERSION
  897. 67/udp open|filtered dhcps
  898. |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
  899. Too many fingerprints match this host to give specific OS details
  900. Network Distance: 17 hops
  901.  
  902. TRACEROUTE (using proto 1/icmp)
  903. HOP RTT ADDRESS
  904. 1 125.29 ms 10.247.200.1
  905. 2 126.12 ms 190.124.251.129
  906. 3 126.17 ms 172.16.21.1
  907. 4 185.59 ms ip4-91-205-233-128.rdns.racklodge.com (91.205.233.128)
  908. 5 185.64 ms 192.168.7.2
  909. 6 186.55 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
  910. 7 186.62 ms 69.25.0.3
  911. 8 186.61 ms te0-3-0-14.ccr21.mia03.atlas.cogentco.com (38.88.164.137)
  912. 9 186.66 ms be3401.ccr22.mia01.atlas.cogentco.com (154.54.47.29)
  913. 10 200.44 ms be3483.ccr42.atl01.atlas.cogentco.com (154.54.28.49)
  914. 11 210.26 ms 154.54.24.221
  915. 12 210.80 ms be3084.ccr41.iad02.atlas.cogentco.com (154.54.30.66)
  916. 13 211.57 ms be3562.rcr51.b037327-0.iad02.atlas.cogentco.com (154.54.24.234)
  917. 14 212.28 ms 38.122.62.254
  918. 15 213.99 ms ip-208-113-156-8.dreamhost.com (208.113.156.8)
  919. 16 216.84 ms ip-208-113-156-14.dreamhost.com (208.113.156.14)
  920. 17 213.65 ms apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  921. #######################################################################################################################################
  922. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:10 EST
  923. Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  924. Host is up (0.21s latency).
  925.  
  926. PORT STATE SERVICE VERSION
  927. 68/udp open|filtered dhcpc
  928. Too many fingerprints match this host to give specific OS details
  929. Network Distance: 17 hops
  930.  
  931. TRACEROUTE (using proto 1/icmp)
  932. HOP RTT ADDRESS
  933. 1 125.25 ms 10.247.200.1
  934. 2 125.29 ms 190.124.251.129
  935. 3 125.49 ms 172.16.21.1
  936. 4 185.72 ms ip4-91-205-233-128.rdns.racklodge.com (91.205.233.128)
  937. 5 185.75 ms 192.168.7.2
  938. 6 185.77 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
  939. 7 186.15 ms 69.25.0.3
  940. 8 185.95 ms te0-3-0-14.ccr21.mia03.atlas.cogentco.com (38.88.164.137)
  941. 9 185.94 ms be3401.ccr22.mia01.atlas.cogentco.com (154.54.47.29)
  942. 10 199.61 ms be3483.ccr42.atl01.atlas.cogentco.com (154.54.28.49)
  943. 11 210.27 ms 154.54.24.221
  944. 12 211.44 ms be3084.ccr41.iad02.atlas.cogentco.com (154.54.30.66)
  945. 13 211.46 ms be3562.rcr51.b037327-0.iad02.atlas.cogentco.com (154.54.24.234)
  946. 14 210.58 ms 38.122.62.254
  947. 15 213.94 ms ip-208-113-156-8.dreamhost.com (208.113.156.8)
  948. 16 212.71 ms ip-208-113-156-14.dreamhost.com (208.113.156.14)
  949. 17 212.14 ms apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  950. #######################################################################################################################################
  951. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:12 EST
  952. Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  953. Host is up (0.21s latency).
  954.  
  955. PORT STATE SERVICE VERSION
  956. 69/udp open|filtered tftp
  957. Too many fingerprints match this host to give specific OS details
  958. Network Distance: 17 hops
  959.  
  960. TRACEROUTE (using proto 1/icmp)
  961. HOP RTT ADDRESS
  962. 1 125.76 ms 10.247.200.1
  963. 2 125.81 ms 190.124.251.129
  964. 3 125.80 ms 172.16.21.1
  965. 4 186.40 ms ip4-91-205-233-128.rdns.racklodge.com (91.205.233.128)
  966. 5 186.44 ms 192.168.7.2
  967. 6 186.47 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
  968. 7 188.46 ms 69.25.0.3
  969. 8 186.52 ms te0-3-0-14.ccr21.mia03.atlas.cogentco.com (38.88.164.137)
  970. 9 186.50 ms be3401.ccr22.mia01.atlas.cogentco.com (154.54.47.29)
  971. 10 200.49 ms be3483.ccr42.atl01.atlas.cogentco.com (154.54.28.49)
  972. 11 208.89 ms 154.54.24.221
  973. 12 210.07 ms be3084.ccr41.iad02.atlas.cogentco.com (154.54.30.66)
  974. 13 210.03 ms be3562.rcr51.b037327-0.iad02.atlas.cogentco.com (154.54.24.234)
  975. 14 212.50 ms 38.122.62.254
  976. 15 213.31 ms ip-208-113-156-8.dreamhost.com (208.113.156.8)
  977. 16 212.48 ms ip-208-113-156-14.dreamhost.com (208.113.156.14)
  978. 17 212.06 ms apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  979. #######################################################################################################################################
  980. wig - WebApp Information Gatherer
  981.  
  982.  
  983. Scanning http://208.113.216.34...
  984. _________________ SITE INFO __________________
  985. IP Title
  986. 208.113.216.34 Site not found &middot; Drea
  987.  
  988. __________________ VERSION ___________________
  989. Name Versions Type
  990.  
  991. ______________________________________________
  992. Time: 34.5 sec Urls: 598 Fingerprints: 40401
  993. #######################################################################################################################################
  994. HTTP/1.1 200 OK
  995. Date: Mon, 11 Feb 2019 22:15:56 GMT
  996. Last-Modified: Sat, 01 Nov 2014 04:18:40 GMT
  997. ETag: "304-506c4687e0800"
  998. Accept-Ranges: bytes
  999. Content-Length: 772
  1000. Content-Type: text/html
  1001. Connection: keep-alive
  1002.  
  1003. HTTP/1.1 200 OK
  1004. Date: Mon, 11 Feb 2019 22:15:56 GMT
  1005. Last-Modified: Sat, 01 Nov 2014 04:18:40 GMT
  1006. ETag: "304-506c4687e0800"
  1007. Accept-Ranges: bytes
  1008. Content-Length: 772
  1009. Content-Type: text/html
  1010. Connection: keep-alive
  1011. #######################################################################################################################################
  1012. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:16 EST
  1013. Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  1014. Host is up (0.21s latency).
  1015.  
  1016. PORT STATE SERVICE VERSION
  1017. 123/udp open ntp NTP v4 (secondary server)
  1018. | ntp-info:
  1019. |_ receive time stamp: 2019-02-11T22:16:27
  1020. Too many fingerprints match this host to give specific OS details
  1021. Network Distance: 17 hops
  1022.  
  1023. TRACEROUTE (using port 123/udp)
  1024. HOP RTT ADDRESS
  1025. 1 126.32 ms 10.247.200.1
  1026. 2 126.37 ms 190.124.251.129
  1027. 3 126.40 ms 172.16.21.1
  1028. 4 186.34 ms ip4-91-205-233-128.rdns.racklodge.com (91.205.233.128)
  1029. 5 186.75 ms 192.168.7.2
  1030. 6 186.80 ms 63.251.152.229
  1031. 7 187.10 ms core3.t6-2.bbnet2.mia003.pnap.net (69.25.0.67)
  1032. 8 188.39 ms te0-0-0-12.ccr21.mia03.atlas.cogentco.com (38.104.94.97)
  1033. 9 187.10 ms 154.54.47.17
  1034. 10 200.68 ms be3482.ccr41.atl01.atlas.cogentco.com (154.54.24.145)
  1035. 11 208.90 ms be2113.ccr42.dca01.atlas.cogentco.com (154.54.24.221)
  1036. 12 210.68 ms be3084.ccr41.iad02.atlas.cogentco.com (154.54.30.66)
  1037. 13 210.70 ms be3563.rcr51.b037327-0.iad02.atlas.cogentco.com (154.54.25.226)
  1038. 14 211.85 ms 38.122.62.254
  1039. 15 ... 16
  1040. 17 217.18 ms apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  1041. #######################################################################################################################################
  1042. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:16 EST
  1043. Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  1044. Host is up (0.17s latency).
  1045.  
  1046. PORT STATE SERVICE VERSION
  1047. 161/tcp closed snmp
  1048. 161/udp open|filtered snmp
  1049. Too many fingerprints match this host to give specific OS details
  1050. Network Distance: 17 hops
  1051.  
  1052. TRACEROUTE (using proto 1/icmp)
  1053. HOP RTT ADDRESS
  1054. 1 125.55 ms 10.247.200.1
  1055. 2 125.59 ms 190.124.251.129
  1056. 3 125.62 ms 172.16.21.1
  1057. 4 186.27 ms ip4-91-205-233-128.rdns.racklodge.com (91.205.233.128)
  1058. 5 186.30 ms 192.168.7.2
  1059. 6 186.30 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
  1060. 7 186.32 ms 69.25.0.3
  1061. 8 186.33 ms te0-3-0-14.ccr21.mia03.atlas.cogentco.com (38.88.164.137)
  1062. 9 186.33 ms be3401.ccr22.mia01.atlas.cogentco.com (154.54.47.29)
  1063. 10 199.77 ms be3483.ccr42.atl01.atlas.cogentco.com (154.54.28.49)
  1064. 11 210.71 ms 154.54.24.221
  1065. 12 218.95 ms be3084.ccr41.iad02.atlas.cogentco.com (154.54.30.66)
  1066. 13 218.92 ms be3562.rcr51.b037327-0.iad02.atlas.cogentco.com (154.54.24.234)
  1067. 14 211.27 ms 38.122.62.254
  1068. 15 212.89 ms ip-208-113-156-8.dreamhost.com (208.113.156.8)
  1069. 16 212.86 ms ip-208-113-156-14.dreamhost.com (208.113.156.14)
  1070. 17 212.51 ms apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  1071. #######################################################################################################################################
  1072. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:22 EST
  1073. NSE: Loaded 148 scripts for scanning.
  1074. NSE: Script Pre-scanning.
  1075. NSE: Starting runlevel 1 (of 2) scan.
  1076. Initiating NSE at 17:22
  1077. Completed NSE at 17:22, 0.00s elapsed
  1078. NSE: Starting runlevel 2 (of 2) scan.
  1079. Initiating NSE at 17:22
  1080. Completed NSE at 17:22, 0.00s elapsed
  1081. Initiating Ping Scan at 17:22
  1082. Scanning 208.113.216.34 [4 ports]
  1083. Completed Ping Scan at 17:22, 0.17s elapsed (1 total hosts)
  1084. Initiating Parallel DNS resolution of 1 host. at 17:22
  1085. Completed Parallel DNS resolution of 1 host. at 17:22, 0.02s elapsed
  1086. Initiating Connect Scan at 17:22
  1087. Scanning apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34) [1000 ports]
  1088. Discovered open port 80/tcp on 208.113.216.34
  1089. Discovered open port 587/tcp on 208.113.216.34
  1090. Discovered open port 22/tcp on 208.113.216.34
  1091. Discovered open port 443/tcp on 208.113.216.34
  1092. Discovered open port 21/tcp on 208.113.216.34
  1093. Discovered open port 5269/tcp on 208.113.216.34
  1094. Discovered open port 5222/tcp on 208.113.216.34
  1095. Completed Connect Scan at 17:22, 10.01s elapsed (1000 total ports)
  1096. Initiating Service scan at 17:22
  1097. Scanning 7 services on apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  1098. Completed Service scan at 17:23, 19.86s elapsed (7 services on 1 host)
  1099. Initiating OS detection (try #1) against apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  1100. Retrying OS detection (try #2) against apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  1101. Initiating Traceroute at 17:23
  1102. Completed Traceroute at 17:23, 0.41s elapsed
  1103. Initiating Parallel DNS resolution of 17 hosts. at 17:23
  1104. Completed Parallel DNS resolution of 17 hosts. at 17:23, 16.50s elapsed
  1105. NSE: Script scanning 208.113.216.34.
  1106. NSE: Starting runlevel 1 (of 2) scan.
  1107. Initiating NSE at 17:23
  1108. Completed NSE at 17:23, 9.77s elapsed
  1109. NSE: Starting runlevel 2 (of 2) scan.
  1110. Initiating NSE at 17:23
  1111. Completed NSE at 17:23, 0.00s elapsed
  1112. Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  1113. Host is up, received reset ttl 64 (0.19s latency).
  1114. Scanned at 2019-02-11 17:22:35 EST for 63s
  1115. Not shown: 989 filtered ports
  1116. Reason: 989 no-responses
  1117. PORT STATE SERVICE REASON VERSION
  1118. 21/tcp open ftp syn-ack ProFTPD
  1119. 22/tcp open ssh syn-ack OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.10 (Ubuntu Linux; protocol 2.0)
  1120. | ssh-hostkey:
  1121. | 2048 5e:3f:5b:3d:3a:0e:5a:c3:4b:d4:3c:b0:d6:84:09:cc (RSA)
  1122. | ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDX0xx84Eh1Qik2a9e3Wr7Kv4EvSby4ECQuaIaGF6CF6U3NbFKdYo1p+UEaZtGc0l85lpImTqoV6NvaDgcEtQ3sxwYgmXOpQozFX9ValDJmJMnX5p98OEOuOJYx3pLjw4m6Xki7qO6cm4pxHvwCo8O3MGZWulB9uM/jEJTYZBC+x/dtNzw7hF018TLcJajO3Oa9ZDv3BfYtyeKO1Fef4lepO9vTf0xXEE9nc+7BDSnw/c6K0k7lbgxLDY+kFpIUVV7pHptvdiSak79G7bJOA+EbOXH0PKPXpzSIFZ/mhWED2weHlw/2UIyAQrswL+Ct4vyxuJYUaXj74B4ssXsyn2fb
  1123. | 256 d8:77:c4:31:5f:ca:96:9d:69:f4:d0:3f:bc:75:64:2e (ECDSA)
  1124. | ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGAW1wmsEU0YnUOcUVAYmoy9n4r5Qu6ZEEmhMqDjwHmopNr7SbB6q6XnI2YBVGEm5rTiW7fkAI7TrlCnTeTpBrE=
  1125. | 256 e6:fc:5b:f8:3e:b6:85:1c:4d:20:bc:d4:8f:97:b4:9d (ED25519)
  1126. |_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIINQ45+tKRPtpQTyTbtEQE7PqiR6RJJOLoRZLfSF5Hq2
  1127. 25/tcp closed smtp conn-refused
  1128. 80/tcp open http syn-ack Fortinet FortiGate 50B or FortiWifi 60C or 80C firewall http config
  1129. |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
  1130. | http-methods:
  1131. |_ Supported Methods: GET HEAD POST OPTIONS
  1132. |_http-title: Site not found &middot; DreamHost
  1133. 113/tcp closed ident conn-refused
  1134. 139/tcp closed netbios-ssn conn-refused
  1135. 443/tcp open ssl/http syn-ack Apache httpd
  1136. |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
  1137. | http-methods:
  1138. |_ Supported Methods: GET HEAD POST OPTIONS
  1139. |_http-server-header: Apache
  1140. |_http-title: Site not found &middot; DreamHost
  1141. | ssl-cert: Subject: commonName=sni.dreamhost.com/organizationName=DreamHost/stateOrProvinceName=California/countryName=US
  1142. | Issuer: commonName=sni.dreamhost.com/organizationName=DreamHost/stateOrProvinceName=California/countryName=US
  1143. | Public Key type: rsa
  1144. | Public Key bits: 2048
  1145. | Signature Algorithm: sha256WithRSAEncryption
  1146. | Not valid before: 2015-08-11T18:24:23
  1147. | Not valid after: 2025-08-08T18:24:23
  1148. | MD5: df80 e5e1 75da fd00 a477 23e0 e5d6 2cdd
  1149. | SHA-1: 8b96 6933 27a2 6e1e 520f 8944 76c5 e7a6 de0c 16f4
  1150. | -----BEGIN CERTIFICATE-----
  1151. | MIIDMzCCAhugAwIBAgIFC63A/+4wDQYJKoZIhvcNAQELBQAwUjELMAkGA1UEBhMC
  1152. | VVMxEzARBgNVBAgTCkNhbGlmb3JuaWExEjAQBgNVBAoTCURyZWFtSG9zdDEaMBgG
  1153. | A1UEAxMRc25pLmRyZWFtaG9zdC5jb20wHhcNMTUwODExMTgyNDIzWhcNMjUwODA4
  1154. | MTgyNDIzWjBSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTESMBAG
  1155. | A1UEChMJRHJlYW1Ib3N0MRowGAYDVQQDExFzbmkuZHJlYW1ob3N0LmNvbTCCASIw
  1156. | DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMEh9sgtRCFszuREKT39vltI1TKP
  1157. | +b551pI82eIpoihL+eiNuNRBFaF5CjTOg/KSNRRkoReZ6SES+1Tp800FJ90stxyF
  1158. | zHjQRBqLloD+RpY9ppNN6ZZicpW2t4Tz1SES/Uxd/F3QwQI6TOsvw36bUViQWNIY
  1159. | Hn37aiXJZSESzSk+TtHXfnhGpNMMZ61XhhhiwLld4JTvFAyK1v7caDzCraOeH2BW
  1160. | 2fPVfjuPazsIQxxUgYo4PZUGP7Wmn0Qn3A+pcKoGx4MXTLJFC2ONYFij0uAJwHFI
  1161. | 0rmoyNqDG0n7USH2O4knieeMsW2uK3CqQeBBJ+1x+Wc8ry41x9ZQaR6OAXMCAwEA
  1162. | AaMQMA4wDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAQEApR1q7iTcLuKr
  1163. | vlz3C0AlOl4qW63JqYrxHzswEvN4J2ggzZUOMMgymS0TaKVKNzySGeHfWZcHBRNl
  1164. | Bg1y90GetANqU+b2aDp0udc8c3BPgkOuJQqyGdTb2g+ea3OKohK+DyXej7m3YbQp
  1165. | xEAMpBuiTHLVVayro538KSJDRo3uSfsLxGYmaGTvm1ef1yIcrTdwiznhv+jOzjx/
  1166. | 0pSugUe1EsiT8hn97192OLChE0PJ31EyWdtn4hKUMQyBgDiJUHERxCuJ0JkpjisZ
  1167. | ZYKjhdv54rK02pBwKQL5Z/VOXTBhVb/43QbiqCn12iCox4kNV6ZftUEJwK+trpqd
  1168. | hFsA0wClCg==
  1169. |_-----END CERTIFICATE-----
  1170. |_ssl-date: TLS randomness does not represent time
  1171. 445/tcp closed microsoft-ds conn-refused
  1172. 587/tcp open smtp syn-ack Postfix smtpd
  1173. |_smtp-commands: francis-hopkinson.dreamhost.com, PIPELINING, SIZE 40960000, ETRN, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
  1174. 5222/tcp open jabber syn-ack ejabberd (Protocol 1.0)
  1175. | xmpp-info:
  1176. | STARTTLS Failed
  1177. | info:
  1178. | unknown:
  1179. |
  1180. | capabilities:
  1181. |
  1182. | errors:
  1183. | host-unknown
  1184. | (timeout)
  1185. | stream_id: 3720117678
  1186. | xmpp:
  1187. | lang: en
  1188. | server name: francis-hopkinson.dreamhost.com
  1189. | version: (none)
  1190. | compression_methods:
  1191. |
  1192. | features:
  1193. |
  1194. |_ auth_mechanisms:
  1195. 5269/tcp open jabber syn-ack ejabberd
  1196. | xmpp-info:
  1197. | Ignores server name
  1198. | info:
  1199. | xmpp:
  1200. | version: 1.0
  1201. | capabilities:
  1202. |
  1203. | pre_tls:
  1204. | xmpp:
  1205. |
  1206. | capabilities:
  1207. |
  1208. | features:
  1209. | TLS (required)
  1210. | post_tls:
  1211. | xmpp:
  1212. |
  1213. |_ capabilities:
  1214. Device type: general purpose|WAP|storage-misc|media device
  1215. Running (JUST GUESSING): Linux 2.6.X|4.X|3.X|2.4.X (92%), HP embedded (85%)
  1216. OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:4.9 cpe:/o:linux:linux_kernel:3.18 cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:hp:p2000_g3
  1217. OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
  1218. Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (92%), Linux 4.9 (87%), Linux 3.18 (86%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (86%), OpenWrt White Russian 0.9 (Linux 2.4.30) (86%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (86%), HP P2000 G3 NAS device (85%), Linux 2.6.32 (85%), ProVision-ISR security DVR (85%)
  1219. No exact OS matches for host (test conditions non-ideal).
  1220. TCP/IP fingerprint:
  1221. SCAN(V=7.70%E=4%D=2/11%OT=21%CT=25%CU=%PV=N%DS=17%DC=T%G=N%TM=5C61F5EA%P=x86_64-pc-linux-gnu)
  1222. SEQ(SP=106%GCD=1%ISR=10D%TI=Z%CI=Z%II=I%TS=U)
  1223. OPS(O1=M4B3NNSNWA%O2=M4B3NNSNWA%O3=M4B3NWA%O4=M4B3NNSNWA%O5=M4B3NNSNWA%O6=M4B3NNS)
  1224. WIN(W1=7210%W2=7210%W3=7210%W4=7210%W5=7210%W6=7210)
  1225. ECN(R=Y%DF=Y%TG=40%W=7210%O=M4B3NNSNWA%CC=Y%Q=)
  1226. T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
  1227. T2(R=N)
  1228. T3(R=N)
  1229. T4(R=N)
  1230. T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
  1231. T6(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
  1232. T7(R=N)
  1233. U1(R=N)
  1234. IE(R=Y%DFI=N%TG=40%CD=S)
  1235.  
  1236. Network Distance: 17 hops
  1237. TCP Sequence Prediction: Difficulty=262 (Good luck!)
  1238. IP ID Sequence Generation: All zeros
  1239. Service Info: Host: francis-hopkinson.dreamhost.com; OSs: Linux, FortiOS; Device: firewall; CPE: cpe:/o:linux:linux_kernel, cpe:/h:fortinet:fortiwifi:80c
  1240.  
  1241. TRACEROUTE (using proto 1/icmp)
  1242. HOP RTT ADDRESS
  1243. 1 124.36 ms 10.247.200.1
  1244. 2 124.41 ms 190.124.251.129
  1245. 3 124.44 ms 172.16.21.1
  1246. 4 184.45 ms ip4-91-205-233-128.rdns.racklodge.com (91.205.233.128)
  1247. 5 185.31 ms 192.168.7.2
  1248. 6 184.50 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
  1249. 7 185.36 ms 69.25.0.3
  1250. 8 185.35 ms te0-3-0-14.ccr21.mia03.atlas.cogentco.com (38.88.164.137)
  1251. 9 185.30 ms be3401.ccr22.mia01.atlas.cogentco.com (154.54.47.29)
  1252. 10 199.15 ms be3483.ccr42.atl01.atlas.cogentco.com (154.54.28.49)
  1253. 11 211.49 ms 154.54.24.221
  1254. 12 212.21 ms be3084.ccr41.iad02.atlas.cogentco.com (154.54.30.66)
  1255. 13 212.15 ms be3562.rcr51.b037327-0.iad02.atlas.cogentco.com (154.54.24.234)
  1256. 14 212.16 ms 38.122.62.254
  1257. 15 213.53 ms ip-208-113-156-8.dreamhost.com (208.113.156.8)
  1258. 16 213.88 ms ip-208-113-156-14.dreamhost.com (208.113.156.14)
  1259. 17 212.59 ms apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  1260.  
  1261. NSE: Script Post-scanning.
  1262. NSE: Starting runlevel 1 (of 2) scan.
  1263. Initiating NSE at 17:23
  1264. Completed NSE at 17:23, 0.00s elapsed
  1265. NSE: Starting runlevel 2 (of 2) scan.
  1266. Initiating NSE at 17:23
  1267. Completed NSE at 17:23, 0.00s elapsed
  1268. Read data files from: /usr/bin/../share/nmap
  1269. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1270. Nmap done: 1 IP address (1 host up) scanned in 63.36 seconds
  1271. Raw packets sent: 89 (7.040KB) | Rcvd: 45 (3.111KB)
  1272. #######################################################################################################################################
  1273. Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:23 EST
  1274. NSE: Loaded 148 scripts for scanning.
  1275. NSE: Script Pre-scanning.
  1276. Initiating NSE at 17:23
  1277. Completed NSE at 17:23, 0.00s elapsed
  1278. Initiating NSE at 17:23
  1279. Completed NSE at 17:23, 0.00s elapsed
  1280. Initiating Parallel DNS resolution of 1 host. at 17:23
  1281. Completed Parallel DNS resolution of 1 host. at 17:23, 0.02s elapsed
  1282. Initiating UDP Scan at 17:23
  1283. Scanning apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34) [14 ports]
  1284. Discovered open port 123/udp on 208.113.216.34
  1285. Completed UDP Scan at 17:23, 2.16s elapsed (14 total ports)
  1286. Initiating Service scan at 17:23
  1287. Scanning 12 services on apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  1288. Service scan Timing: About 16.67% done; ETC: 17:33 (0:08:05 remaining)
  1289. Completed Service scan at 17:25, 102.58s elapsed (12 services on 1 host)
  1290. Initiating OS detection (try #1) against apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  1291. Retrying OS detection (try #2) against apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  1292. Initiating Traceroute at 17:25
  1293. Completed Traceroute at 17:25, 7.17s elapsed
  1294. Initiating Parallel DNS resolution of 1 host. at 17:25
  1295. Completed Parallel DNS resolution of 1 host. at 17:25, 0.02s elapsed
  1296. NSE: Script scanning 208.113.216.34.
  1297. Initiating NSE at 17:25
  1298. Completed NSE at 17:25, 16.36s elapsed
  1299. Initiating NSE at 17:25
  1300. Completed NSE at 17:25, 1.02s elapsed
  1301. Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
  1302. Host is up (0.17s latency).
  1303.  
  1304. PORT STATE SERVICE VERSION
  1305. 53/udp open|filtered domain
  1306. 67/udp open|filtered dhcps
  1307. 68/udp open|filtered dhcpc
  1308. 69/udp open|filtered tftp
  1309. 88/udp open|filtered kerberos-sec
  1310. 123/udp open ntp NTP v4 (secondary server)
  1311. | ntp-info:
  1312. |_ receive time stamp: 2019-02-11T22:25:36
  1313. 137/udp filtered netbios-ns
  1314. 138/udp filtered netbios-dgm
  1315. 139/udp open|filtered netbios-ssn
  1316. 161/udp open|filtered snmp
  1317. 162/udp open|filtered snmptrap
  1318. 389/udp open|filtered ldap
  1319. 520/udp open|filtered route
  1320. 2049/udp open|filtered nfs
  1321. Too many fingerprints match this host to give specific OS details
  1322.  
  1323. TRACEROUTE (using port 137/udp)
  1324. HOP RTT ADDRESS
  1325. 1 127.94 ms 10.247.200.1
  1326. 2 ... 3
  1327. 4 125.22 ms 10.247.200.1
  1328. 5 126.43 ms 10.247.200.1
  1329. 6 126.42 ms 10.247.200.1
  1330. 7 126.41 ms 10.247.200.1
  1331. 8 126.40 ms 10.247.200.1
  1332. 9 126.39 ms 10.247.200.1
  1333. 10 126.41 ms 10.247.200.1
  1334. 11 ... 18
  1335. 19 125.12 ms 10.247.200.1
  1336. 20 127.48 ms 10.247.200.1
  1337. 21 ... 27
  1338. 28 124.88 ms 10.247.200.1
  1339. 29 ...
  1340. 30 123.53 ms 10.247.200.1
  1341.  
  1342. NSE: Script Post-scanning.
  1343. Initiating NSE at 17:25
  1344. Completed NSE at 17:25, 0.00s elapsed
  1345. Initiating NSE at 17:25
  1346. Completed NSE at 17:25, 0.00s elapsed
  1347. Read data files from: /usr/bin/../share/nmap
  1348. OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
  1349. Nmap done: 1 IP address (1 host up) scanned in 134.80 seconds
  1350. Raw packets sent: 134 (11.582KB) | Rcvd: 33 (3.738KB)
  1351. #######################################################################################################################################
  1352. [-] Date & Time: 11/02/2019 15:50:53
  1353. [I] Threads: 5
  1354. [-] Target: http://northwestfront.org/about (208.113.216.34)
  1355. [M] Website Not in HTTPS: http://northwestfront.org/about
  1356. [L] X-Frame-Options: Not Enforced
  1357. [I] Strict-Transport-Security: Not Enforced
  1358. [I] X-Content-Security-Policy: Not Enforced
  1359. [I] X-Content-Type-Options: Not Enforced
  1360. [L] No Robots.txt Found
  1361. [I] CMS Detection: WordPress
  1362. [I] Wordpress Theme: nwf
  1363. [M] XML-RPC services are enabled
  1364. [I] Autocomplete Off Not Found: http://northwestfront.org/about/wp-login.php
  1365. [-] Default WordPress Files:
  1366. [-] Searching Wordpress Plugins ...
  1367. [I] "+plugin+"
  1368. [I] $plugin
  1369. [I] 1-flash-gallery
  1370. [M] EDB-ID: 17801 "WordPress Plugin 1 Flash Gallery 1.30 < 1.5.7a - Arbitrary File Upload (Metasploit)"
  1371. [I] 1-jquery-photo-gallery-slideshow-flash
  1372. [M] EDB-ID: 36382 "WordPress Plugin 1-jquery-photo-gallery-Slideshow-flash 1.01 - Cross-Site Scripting"
  1373. [I] 2-click-socialmedia-buttons
  1374. [M] EDB-ID: 37178 "WordPress Plugin 2 Click Social Media Buttons 0.32.2 - Multiple Cross-Site Scripting Vulnerabilities"
  1375. [I] Calendar
  1376. [M] EDB-ID: 21715 "WordPress Plugin spider Calendar - Multiple Vulnerabilities"
  1377. [I] Calendar-Script
  1378. [M] EDB-ID: 38018 "WordPress Plugin PHP Event Calendar - 'cid' SQL Injection"
  1379. [I] Enigma2.php?boarddir=http:
  1380. [I] FlagEm
  1381. [M] EDB-ID: 38674 "WordPress Plugin FlagEm - 'cID' Cross-Site Scripting"
  1382. [I] Lead-Octopus-Power
  1383. [M] EDB-ID: 39269 "WordPress Plugin Lead Octopus Power - 'id' SQL Injection"
  1384. [I] Premium_Gallery_Manager
  1385. [M] EDB-ID: 34538 "WordPress Plugin Premium Gallery Manager - Configuration Access"
  1386. [M] EDB-ID: 39111 "WordPress Plugin Premium Gallery Manager - Arbitrary File Upload"
  1387. [I] Tevolution
  1388. [M] EDB-ID: 40976 "WordPress Plugin Slider Templatic Tevolution < 2.3.6 - Arbitrary File Upload"
  1389. [I] a-gallery
  1390. [M] EDB-ID: 17872 "Multiple WordPress Plugins - 'timthumb.php' File Upload"
  1391. [I] a-to-z-category-listing
  1392. [M] EDB-ID: 17809 "WordPress Plugin A to Z Category Listing 1.3 - SQL Injection"
  1393. [I] abtest
  1394. [M] EDB-ID: 39577 "WordPress Plugin Abtest - Local File Inclusion"
  1395. [I] accept-signups
  1396. [M] EDB-ID: 35136 "WordPress Plugin Accept Signups 0.1 - 'email' Cross-Site Scripting"
  1397. [I] acf-frontend-display
  1398. [I] ad-wizz
  1399. [M] EDB-ID: 35561 "WordPress Plugin WPwizz AdWizz Plugin 1.0 - 'link' Cross-Site Scripting"
  1400. [I] admin_panel.php?wp_footnotes_current_settings[post_footnotes]=&lt;
  1401. /bin/sh: 1: lt: not found
  1402. /bin/sh: 1: [&=/]: not found
  1403. [I] admin_panel.php?wp_footnotes_current_settings[pre_footnotes]=&lt;
  1404. /bin/sh: 1: lt: not found
  1405. /bin/sh: 1: [&=/]: not found
  1406. [I] adminimize
  1407. [M] EDB-ID: 36325 "WordPress Plugin Adminimize 1.7.21 - 'page' Cross-Site Scripting"
  1408. [I] adrotate
  1409. [M] EDB-ID: 17888 "WordPress Plugin AdRotate 3.6.5 - SQL Injection"
  1410. [M] EDB-ID: 18114 "WordPress Plugin AdRotate 3.6.6 - SQL Injection"
  1411. [M] EDB-ID: 31834 "WordPress Plugin AdRotate 3.9.4 - 'clicktracker.ph?track' SQL Injection"
  1412. [I] ads-box
  1413. [M] EDB-ID: 38060 "WordPress Plugin Ads Box - 'count' SQL Injection"
  1414. [I] advanced-dewplayer
  1415. [M] EDB-ID: 38936 "WordPress Plugin Advanced Dewplayer - 'download-file.php' Script Directory Traversal"
  1416. [I] advanced-text-widget
  1417. [M] EDB-ID: 36324 "WordPress Plugin Advanced Text Widget 2.0 - 'page' Cross-Site Scripting"
  1418. [I] advanced-uploader
  1419. [M] EDB-ID: 38867 "WordPress Plugin Advanced uploader 2.10 - Multiple Vulnerabilities"
  1420. [I] advertizer
  1421. [M] EDB-ID: 17750 "WordPress Plugin Advertizer 1.0 - SQL Injection"
  1422. [I] age-verification
  1423. [M] EDB-ID: 18350 "WordPress Plugin Age Verification 0.4 - Open Redirect"
  1424. [M] EDB-ID: 36540 "WordPress Plugin Age Verification 0.4 - 'redirect_to' Open Redirection"
  1425. [I] ajax-category-dropdown
  1426. [M] EDB-ID: 17207 "WordPress Plugin Ajax Category Dropdown 0.1.5 - Multiple Vulnerabilities"
  1427. [I] ajax-store-locator-wordpress_0
  1428. [M] EDB-ID: 35493 "WordPress Plugin Ajax Store Locator 1.2 - Arbitrary File Download"
  1429. [I] ajaxgallery
  1430. [M] EDB-ID: 17686 "WordPress Plugin Ajax Gallery 3.0 - SQL Injection"
  1431. [I] akismet
  1432. [M] EDB-ID: 37826 "WordPress 3.4.2 - Multiple Path Disclosure Vulnerabilities"
  1433. [M] EDB-ID: 37902 "WordPress Plugin Akismet - Multiple Cross-Site Scripting Vulnerabilities"
  1434. [I] alert-before-your-post
  1435. [M] EDB-ID: 36323 "WordPress Plugin Alert Before Your Post - 'name' Cross-Site Scripting"
  1436. [I] all-in-one-event-calendar
  1437. [M] EDB-ID: 37075 "WordPress Plugin All-in-One Event Calendar 1.4 - 'agenda-widget-form.php?title' Cross-Site Scripting"
  1438. [M] EDB-ID: 37076 "WordPress Plugin All-in-One Event Calendar 1.4 - 'box_publish_button.php?button_value' Cross-Site Scripting"
  1439. [M] EDB-ID: 37077 "WordPress Plugin All-in-One Event Calendar 1.4 - 'save_successful.php?msg' Cross-Site Scripting"
  1440. [M] EDB-ID: 37078 "WordPress Plugin All-in-One Event Calendar 1.4 - 'agenda-widget.php' Multiple Cross-Site Scripting Vulnerabilities"
  1441. [I] all-in-one-wp-security-and-firewall
  1442. [M] EDB-ID: 34854 "WordPress Plugin All In One WP Security & Firewall 3.8.3 - Persistent Cross-Site Scripting"
  1443. [I] all-video-gallery
  1444. [M] EDB-ID: 22427 "WordPress Plugin All Video Gallery 1.1 - SQL Injection"
  1445. [I] allow-php-in-posts-and-pages
  1446. [M] EDB-ID: 17688 "WordPress Plugin Allow PHP in Posts and Pages 2.0.0.RC1 - SQL Injection"
  1447. [I] allwebmenus-wordpress-menu-plugin
  1448. [M] EDB-ID: 17861 "WordPress Plugin AllWebMenus 1.1.3 - Remote File Inclusion"
  1449. [M] EDB-ID: 18407 "WordPress Plugin AllWebMenus < 1.1.9 Menu Plugin - Arbitrary File Upload"
  1450. [I] alo-easymail
  1451. [I] annonces
  1452. [M] EDB-ID: 17863 "WordPress Plugin Annonces 1.2.0.0 - Remote File Inclusion"
  1453. [I] answer-my-question
  1454. [M] EDB-ID: 40771 "WordPress Plugin Answer My Question 1.3 - SQL Injection"
  1455. [I] appointment-booking-calendar
  1456. [M] EDB-ID: 39309 "WordPress Plugin Booking Calendar Contact Form 1.1.23 - SQL Injection"
  1457. [M] EDB-ID: 39319 "WordPress Plugin Booking Calendar Contact Form 1.1.23 - Shortcode SQL Injection"
  1458. [M] EDB-ID: 39341 "WordPress Plugin Booking Calendar Contact Form 1.1.24 - Multiple Vulnerabilities"
  1459. [M] EDB-ID: 39342 "WordPress Plugin Booking Calendar Contact Form 1.1.24 - addslashes SQL Injection"
  1460. [I] aspose-doc-exporter
  1461. [M] EDB-ID: 36559 "WordPress Plugin aspose-doc-exporter 1.0 - Arbitrary File Download"
  1462. [I] asset-manager
  1463. [M] EDB-ID: 18993 "WordPress Plugin Asset Manager 0.2 - Arbitrary File Upload"
  1464. [I] audio
  1465. [M] EDB-ID: 35258 "WordPress Plugin Audio 0.5.1 - 'showfile' Cross-Site Scripting"
  1466. [I] audio-player
  1467. [M] EDB-ID: 38300 "WordPress Plugin Audio Player - 'playerID' Cross-Site Scripting"
  1468. [I] auto-attachments
  1469. [I] aviary-image-editor-add-on-for-gravity-forms
  1470. [M] EDB-ID: 37275 "WordPress Plugin Aviary Image Editor Addon For Gravity Forms 3.0 Beta - Arbitrary File Upload"
  1471. [I] backwpup
  1472. [M] EDB-ID: 35400 "WordPress Plugin BackWPup 1.4 - Multiple Information Disclosure Vulnerabilities"
  1473. [I] baggage-freight
  1474. [M] EDB-ID: 46061 "WordPress Plugin Baggage Freight Shipping Australia 0.1.0 - Arbitrary File Upload"
  1475. [I] baggage_shipping
  1476. [I] bbpress
  1477. [M] EDB-ID: 22396 "WordPress Plugin bbPress - Multiple Vulnerabilities"
  1478. [I] bezahlcode-generator
  1479. [M] EDB-ID: 35286 "WordPress Plugin BezahlCode Generator 1.0 - 'gen_name' Cross-Site Scripting"
  1480. [I] booking
  1481. [M] EDB-ID: 27399 "WordPress Plugin Booking Calendar 4.1.4 - Cross-Site Request Forgery"
  1482. [I] booking-calendar-contact-form
  1483. [M] EDB-ID: 37003 "WordPress Plugin Booking Calendar Contact Form 1.0.2 - Multiple Vulnerabilities"
  1484. [I] bookx
  1485. [M] EDB-ID: 39251 "WordPress Plugin BookX 1.7 - 'bookx_export.php' Local File Inclusion"
  1486. [I] brandfolder
  1487. [M] EDB-ID: 39591 "WordPress Plugin Brandfolder 3.0 - Local/Remote File Inclusion"
  1488. [I] cac-featured-content
  1489. [I] candidate-application-form
  1490. [M] EDB-ID: 37754 "WordPress Plugin Candidate Application Form 1.0 - Arbitrary File Download"
  1491. [I] catalog
  1492. [M] EDB-ID: 25724 "WordPress Plugin Spider Catalog 1.4.6 - Multiple Vulnerabilities"
  1493. [M] EDB-ID: 38639 "WordPress Plugin miniBB - SQL Injection / Multiple Cross-Site Scripting Vulnerabilities"
  1494. [I] category-grid-view-gallery
  1495. [M] EDB-ID: 38625 "WordPress Plugin Category Grid View Gallery - 'ID' Cross-Site Scripting"
  1496. [I] category-list-portfolio-page
  1497. [I] cevhershare
  1498. [M] EDB-ID: 17891 "WordPress Plugin CevherShare 2.0 - SQL Injection"
  1499. [I] cforms
  1500. [M] EDB-ID: 34946 "WordPress Plugin cformsII 11.5/13.1 - 'lib_ajax.php' Multiple Cross-Site Scripting Vulnerabilities"
  1501. [I] cforms2
  1502. [M] EDB-ID: 35879 "WordPress Plugin Cforms 14.7 - Remote Code Execution"
  1503. [I] chenpress
  1504. [M] EDB-ID: 37522 "WordPress Plugin chenpress - Arbitrary File Upload"
  1505. [I] church-admin
  1506. [M] EDB-ID: 37483 "WordPress Plugin church_admin - 'id' Cross-Site Scripting"
  1507. [I] cimy-counter
  1508. [M] EDB-ID: 14057 "WordPress Plugin Cimy Counter - Full Path Disclosure / Redirector / Cross-Site Scripting / HTTP Response Spitting"
  1509. [M] EDB-ID: 34195 "WordPress Plugin Cimy Counter 0.9.4 - HTTP Response Splitting / Cross-Site Scripting"
  1510. [I] clickdesk-live-support-chat
  1511. [M] EDB-ID: 36338 "WordPress Plugin ClickDesk Live Support 2.0 - 'cdwidget' Cross-Site Scripting"
  1512. [I] cloudsafe365-for-wp
  1513. [M] EDB-ID: 37681 "WordPress Plugin Cloudsafe365 - 'file' Remote File Disclosure"
  1514. [I] cm-download-manager
  1515. [M] EDB-ID: 35324 "WordPress Plugin CM Download Manager 2.0.0 - Code Injection"
  1516. [I] cms-pack
  1517. [I] cnhk-slideshow
  1518. [M] EDB-ID: 39190 "WordPress Plugin cnhk-Slideshow - Arbitrary File Upload"
  1519. [I] comicpress-manager
  1520. [M] EDB-ID: 35393 "WordPress Plugin ComicPress Manager 1.4.9 - 'lang' Cross-Site Scripting"
  1521. [I] comment-rating
  1522. [M] EDB-ID: 16221 "WordPress Plugin Comment Rating 2.9.23 - Multiple Vulnerabilities"
  1523. [M] EDB-ID: 24552 "WordPress Plugin Comment Rating 2.9.32 - Multiple Vulnerabilities"
  1524. [M] EDB-ID: 36487 "WordPress Plugin Comment Rating 2.9.20 - 'path' Cross-Site Scripting"
  1525. [I] community-events
  1526. [M] EDB-ID: 17798 "WordPress Plugin Community Events 1.2.1 - SQL Injection"
  1527. [I] complete-gallery-manager
  1528. [M] EDB-ID: 28377 "WordPress Plugin Complete Gallery Manager 3.3.3 - Arbitrary File Upload"
  1529. [I] contact-form-generator
  1530. [M] EDB-ID: 38086 "WordPress Plugin Contact Form Generator 2.0.1 - Multiple Cross-Site Request Forgery Vulnerabilities"
  1531. [I] contact-form-wordpress
  1532. [M] EDB-ID: 17980 "WordPress Plugin Contact Form 2.7.5 - SQL Injection"
  1533. [I] contus-hd-flv-player
  1534. [M] EDB-ID: 17678 "WordPress Plugin Contus HD FLV Player 1.3 - SQL Injection"
  1535. [M] EDB-ID: 37377 "WordPress Plugin HD FLV Player - 'uploadVideo.php' Arbitrary File Upload"
  1536. [I] contus-video-gallery
  1537. [M] EDB-ID: 34161 "WordPress Plugin Video Gallery 2.5 - Multiple Vulnerabilities"
  1538. [I] contus-video-galleryversion-10
  1539. [M] EDB-ID: 37373 "WordPress Plugin Contus Video Gallery - 'upload1.php' Arbitrary File Upload"
  1540. [I] copyright-licensing-tools
  1541. [M] EDB-ID: 17749 "WordPress Plugin iCopyright(R) Article Tools 1.1.4 - SQL Injection"
  1542. [I] count-per-day
  1543. [M] EDB-ID: 17857 "WordPress Plugin Count per Day 2.17 - SQL Injection"
  1544. [M] EDB-ID: 18355 "WordPress Plugin Count Per Day - Multiple Vulnerabilities"
  1545. [M] EDB-ID: 20862 "WordPress Plugin Count Per Day 3.2.3 - Cross-Site Scripting"
  1546. [I] couponer
  1547. [M] EDB-ID: 17759 "WordPress Plugin Couponer 1.2 - SQL Injection"
  1548. [I] cp-polls
  1549. [M] EDB-ID: 39513 "WordPress Plugin CP Polls 1.0.8 - Multiple Vulnerabilities"
  1550. [I] cp-reservation-calendar
  1551. [M] EDB-ID: 38187 "WordPress Plugin CP Reservation Calendar 1.1.6 - SQL Injection"
  1552. [I] cpl
  1553. [M] EDB-ID: 11458 "WordPress Plugin Copperleaf Photolog 0.16 - SQL Injection"
  1554. [I] crawlrate-tracker
  1555. [M] EDB-ID: 17755 "WordPress Plugin Crawl Rate Tracker 2.0.2 - SQL Injection"
  1556. [I] crayon-syntax-highlighter
  1557. [M] EDB-ID: 37946 "WordPress Plugin Crayon Syntax Highlighter - 'wp_load' Remote File Inclusion"
  1558. [I] custom-background
  1559. [M] EDB-ID: 39135 "WordPress Theme Felici - 'Uploadify.php' Arbitrary File Upload"
  1560. [I] custom-content-type-manager
  1561. [M] EDB-ID: 19058 "WordPress Plugin Custom Content Type Manager 0.9.5.13-pl - Arbitrary File Upload"
  1562. [I] custom-tables
  1563. [M] EDB-ID: 37482 "WordPress Plugin custom tables - 'key' Cross-Site Scripting"
  1564. [I] cysteme-finder
  1565. [M] EDB-ID: 40295 "WordPress Plugin CYSTEME Finder 1.3 - Arbitrary File Disclosure/Arbitrary File Upload"
  1566. [I] daily-maui-photo-widget
  1567. [M] EDB-ID: 35673 "WordPress Plugin Daily Maui Photo Widget 0.2 - Multiple Cross-Site Scripting Vulnerabilities"
  1568. [I] db-backup
  1569. [M] EDB-ID: 35378 "WordPress Plugin DB Backup - Arbitrary File Download"
  1570. [I] disclosure-policy-plugin
  1571. [M] EDB-ID: 17865 "WordPress Plugin Disclosure Policy 1.0 - Remote File Inclusion"
  1572. [I] dm-albums
  1573. [M] EDB-ID: 9043 "Adobe Flash Selection.SetSelection - Use-After-Free"
  1574. [M] EDB-ID: 9048 "Adobe Flash TextField.replaceText - Use-After-Free"
  1575. [I] dmsguestbook
  1576. [I] downloads-manager
  1577. [M] EDB-ID: 6127 "Pixel Studio 2.17 - Denial of Service (PoC)"
  1578. [I] dp-thumbnail
  1579. [I] drag-drop-file-uploader
  1580. [M] EDB-ID: 19057 "WordPress Plugin drag and drop file upload 0.1 - Arbitrary File Upload"
  1581. [I] dukapress
  1582. [M] EDB-ID: 35346 "WordPress Plugin DukaPress 2.5.2 - Directory Traversal"
  1583. [I] duplicator
  1584. [M] EDB-ID: 38676 "WordPress Plugin Duplicator - Cross-Site Scripting"
  1585. [M] EDB-ID: 44288 "WordPress Plugin Duplicator 1.2.32 - Cross-Site Scripting"
  1586. [I] dzs-videogallery
  1587. [M] EDB-ID: 29834 "WordPress Plugin dzs-videogallery - Arbitrary File Upload"
  1588. [M] EDB-ID: 30063 "WordPress Plugin DZS Video Gallery 3.1.3 - Remote File Disclosure / Local File Disclosure"
  1589. [M] EDB-ID: 39250 "WordPress Plugin DZS-VideoGallery - Cross-Site Scripting / Command Injection"
  1590. [M] EDB-ID: 39553 "WordPress Plugin DZS Videogallery < 8.60 - Multiple Vulnerabilities"
  1591. [I] dzs-zoomsounds
  1592. [M] EDB-ID: 37166 "WordPress Plugin dzs-zoomsounds 2.0 - Arbitrary File Upload"
  1593. [I] easy-contact-form-lite
  1594. [M] EDB-ID: 17680 "WordPress Plugin Easy Contact Form Lite 1.0.7 - SQL Injection"
  1595. [I] easy-contact-forms-exporter
  1596. [M] EDB-ID: 19013 "WordPress Plugin Easy Contact Forms Export 1.1.0 - Information Disclosure"
  1597. [I] ebook-download
  1598. [M] EDB-ID: 39575 "WordPress Plugin eBook Download 1.1 - Directory Traversal"
  1599. [I] eco-annu
  1600. [M] EDB-ID: 38019 "WordPress Plugin Eco-annu - 'eid' SQL Injection"
  1601. [I] editormonkey
  1602. [M] EDB-ID: 17284 "WordPress Plugin EditorMonkey 2.5 - 'FCKeditor' Arbitrary File Upload"
  1603. [I] email-newsletter
  1604. [M] EDB-ID: 37356 "WordPress Plugin Email NewsLetter 8.0 - 'option' Information Disclosure"
  1605. [I] evarisk
  1606. [M] EDB-ID: 17738 "WordPress Plugin Evarisk 5.1.3.6 - SQL Injection"
  1607. [M] EDB-ID: 37399 "WordPress Plugin Evarisk - 'uploadPhotoApres.php' Arbitrary File Upload"
  1608. [I] event-registration
  1609. [M] EDB-ID: 17751 "WordPress Plugin Event Registration 5.4.3 - SQL Injection"
  1610. [I] eventify
  1611. [M] EDB-ID: 17794 "WordPress Plugin Eventify - Simple Events 1.7.f SQL Injection"
  1612. [I] extend-wordpress
  1613. [I] facebook-opengraph-meta-plugin
  1614. [M] EDB-ID: 17773 "WordPress Plugin Facebook Opengraph Meta 1.0 - SQL Injection"
  1615. [I] fbgorilla
  1616. [M] EDB-ID: 39283 "WordPress Plugin FB Gorilla - 'game_play.php' SQL Injection"
  1617. [I] fbpromotions
  1618. [M] EDB-ID: 17737 "WordPress Plugin Facebook Promotions 1.3.3 - SQL Injection"
  1619. [I] fcchat
  1620. [M] EDB-ID: 35289 "WordPress Plugin FCChat Widget 2.1.7 - 'path' Cross-Site Scripting"
  1621. [M] EDB-ID: 37370 "WordPress Plugin FCChat Widget 2.2.x - 'upload.php' Arbitrary File Upload"
  1622. [I] feature-slideshow
  1623. [M] EDB-ID: 35285 "WordPress Plugin Feature Slideshow 1.0.6 - 'src' Cross-Site Scripting"
  1624. [I] featurific-for-wordpress
  1625. [M] EDB-ID: 36339 "WordPress Plugin Featurific For WordPress 1.6.2 - 'snum' Cross-Site Scripting"
  1626. [I] feed
  1627. [M] EDB-ID: 38624 "WordPress Plugin WP Feed - 'nid' SQL Injection"
  1628. [I] feedlist
  1629. [M] EDB-ID: 34973 "WordPress Plugin FeedList 2.61.01 - 'handler_image.php' Cross-Site Scripting"
  1630. [I] feedweb
  1631. [M] EDB-ID: 38414 "WordPress Plugin Feedweb - 'wp_post_id' Cross-Site Scripting"
  1632. [I] fgallery
  1633. [M] EDB-ID: 4993 "GitList 0.6.0 - Argument Injection (Metasploit)"
  1634. [I] file-groups
  1635. [M] EDB-ID: 17677 "WordPress Plugin File Groups 1.1.2 - SQL Injection"
  1636. [I] filedownload
  1637. [M] EDB-ID: 17858 "WordPress Plugin Filedownload 0.1 - 'download.php' Remote File Disclosure"
  1638. [I] finder
  1639. [M] EDB-ID: 37677 "WordPress Plugin Finder - 'order' Cross-Site Scripting"
  1640. [I] firestats
  1641. [M] EDB-ID: 14308 "WordPress Plugin Firestats - Remote Configuration File Download"
  1642. [M] EDB-ID: 33367 "WordPress Plugin Firestats 1.0.2 - Multiple Cross-Site Scripting / Authentication Bypass Vulnerabilities (1)"
  1643. [M] EDB-ID: 33368 "WordPress Plugin Firestats 1.0.2 - Multiple Cross-Site Scripting / Authentication Bypass Vulnerabilities (2)"
  1644. [I] flash-album-gallery
  1645. [M] EDB-ID: 16947 "WordPress Plugin GRAND Flash Album Gallery 0.55 - Multiple Vulnerabilities"
  1646. [M] EDB-ID: 36383 "WordPress Plugin flash-album-gallery - 'facebook.php' Cross-Site Scripting"
  1647. [M] EDB-ID: 36434 "WordPress Plugin GRAND FlAGallery 1.57 - 'flagshow.php' Cross-Site Scripting"
  1648. [M] EDB-ID: 36444 "WordPress Plugin flash-album-gallery - 'flagshow.php' Cross-Site Scripting"
  1649. [I] flexible-custom-post-type
  1650. [M] EDB-ID: 36317 "WordPress Plugin Flexible Custom Post Type - 'id' Cross-Site Scripting"
  1651. [I] flipbook
  1652. [M] EDB-ID: 37452 "WordPress Plugin Flip Book - 'PHP.php' Arbitrary File Upload"
  1653. [I] font-uploader
  1654. [M] EDB-ID: 18994 "WordPress Plugin Font Uploader 1.2.4 - Arbitrary File Upload"
  1655. [I] formcraft
  1656. [M] EDB-ID: 30002 "WordPress Plugin Formcraft - SQL Injection"
  1657. [I] forum-server
  1658. [M] EDB-ID: 16235 "WordPress Plugin Forum Server 1.6.5 - SQL Injection"
  1659. [M] EDB-ID: 17828 "WordPress Plugin Forum Server 1.7 - SQL Injection"
  1660. [I] foxypress
  1661. [M] EDB-ID: 18991 "WordPress Plugin Foxypress 0.4.1.1 < 0.4.2.1 - Arbitrary File Upload"
  1662. [M] EDB-ID: 22374 "WordPress Plugin foxypress 0.4.2.5 - Multiple Vulnerabilities"
  1663. [I] front-end-upload
  1664. [M] EDB-ID: 19008 "WordPress Plugin Front End Upload 0.5.3 - Arbitrary File Upload"
  1665. [I] front-file-manager
  1666. [M] EDB-ID: 19012 "WordPress Plugin Front File Manager 0.1 - Arbitrary File Upload"
  1667. [I] fs-real-estate-plugin
  1668. [M] EDB-ID: 22071 "WordPress Plugin FireStorm Professional Real Estate 2.06.01 - SQL Injection"
  1669. [I] gallery-images
  1670. [M] EDB-ID: 34524 "WordPress Plugin Huge-IT Image Gallery 1.0.1 - (Authenticated) SQL Injection"
  1671. [M] EDB-ID: 39807 "WordPress Plugin Huge-IT Image Gallery 1.8.9 - Multiple Vulnerabilities"
  1672. [I] gallery-plugin
  1673. [M] EDB-ID: 18998 "WordPress Plugin Gallery 3.06 - Arbitrary File Upload"
  1674. [M] EDB-ID: 38209 "WordPress Plugin Gallery - 'filename_1' Arbitrary File Access"
  1675. [I] gd-star-rating
  1676. [M] EDB-ID: 17973 "WordPress Plugin GD Star Rating 1.9.10 - SQL Injection"
  1677. [M] EDB-ID: 35373 "WordPress Plugin GD Star Rating 1.9.7 - 'wpfn' Cross-Site Scripting"
  1678. [M] EDB-ID: 35835 "WordPress Plugin GD Star Rating - 'votes' SQL Injection"
  1679. [I] gift-voucher
  1680. [M] EDB-ID: 45255 "WordPress Plugin Gift Voucher 1.0.5 - (Authenticated) 'template_id' SQL Injection"
  1681. [I] global-content-blocks
  1682. [M] EDB-ID: 17687 "WordPress Plugin Global Content Blocks 1.2 - SQL Injection"
  1683. [I] global-flash-galleries
  1684. [M] EDB-ID: 39059 "WordPress Plugin Global Flash Gallery - 'swfupload.php' Arbitrary File Upload"
  1685. [I] google-document-embedder
  1686. [M] EDB-ID: 35371 "WordPress Plugin Google Document Embedder 2.5.14 - SQL Injection"
  1687. [M] EDB-ID: 35447 "WordPress Plugin Google Document Embedder 2.5.16 - 'mysql_real_escpae_string' Bypass SQL Injection"
  1688. [I] google-mp3-audio-player
  1689. [M] EDB-ID: 35460 "WordPress Plugin CodeArt Google MP3 Player - File Disclosure Download"
  1690. [I] grapefile
  1691. [M] EDB-ID: 17760 "WordPress Plugin grapefile 1.1 - Arbitrary File Upload"
  1692. [I] gwolle-gb
  1693. [M] EDB-ID: 38861 "WordPress Plugin Gwolle Guestbook 1.5.3 - Remote File Inclusion"
  1694. [I] hb-audio-gallery-lite
  1695. [M] EDB-ID: 39589 "WordPress Plugin HB Audio Gallery Lite 1.0.0 - Arbitrary File Download"
  1696. [I] hd-webplayer
  1697. [M] EDB-ID: 20918 "WordPress Plugin HD Webplayer 1.1 - SQL Injection"
  1698. [I] history-collection
  1699. [M] EDB-ID: 37254 "WordPress Plugin History Collection 1.1.1 - Arbitrary File Download"
  1700. [I] hitasoft_player
  1701. [M] EDB-ID: 38012 "WordPress Plugin FLV Player - 'id' SQL Injection"
  1702. [I] html5avmanager
  1703. [M] EDB-ID: 18990 "WordPress Plugin HTML5 AV Manager 0.2.7 - Arbitrary File Upload"
  1704. [I] i-dump-iphone-to-wordpress-photo-uploader
  1705. [M] EDB-ID: 36691 "WordPress Plugin Windows Desktop and iPhone Photo Uploader - Arbitrary File Upload"
  1706. [I] iframe-admin-pages
  1707. [M] EDB-ID: 37179 "WordPress Plugin iFrame Admin Pages 0.1 - 'main_page.php' Cross-Site Scripting"
  1708. [I] igit-posts-slider-widget
  1709. [M] EDB-ID: 35392 "WordPress Plugin IGIT Posts Slider Widget 1.0 - 'src' Cross-Site Scripting"
  1710. [I] image-export
  1711. [M] EDB-ID: 39584 "WordPress Plugin Image Export 1.1.0 - Arbitrary File Disclosure"
  1712. [I] image-gallery-with-slideshow
  1713. [M] EDB-ID: 17761 "WordPress Plugin image Gallery with Slideshow 1.5 - Multiple Vulnerabilities"
  1714. [I] imdb-widget
  1715. [M] EDB-ID: 39621 "WordPress Plugin IMDb Profile Widget 1.0.8 - Local File Inclusion"
  1716. [I] inboundio-marketing
  1717. [M] EDB-ID: 36478 "WordPress Plugin InBoundio Marketing 1.0 - Arbitrary File Upload"
  1718. [I] indeed-membership-pro
  1719. [I] inline-gallery
  1720. [M] EDB-ID: 35418 "WordPress Plugin Inline Gallery 0.3.9 - 'do' Cross-Site Scripting"
  1721. [I] insert-php
  1722. [M] EDB-ID: 41308 "WordPress Plugin Insert PHP 3.3.1 - PHP Code Injection"
  1723. [I] invit0r
  1724. [M] EDB-ID: 37403 "WordPress Plugin Invit0r - 'ofc_upload_image.php' Arbitrary File Upload"
  1725. [I] ip-logger
  1726. [M] EDB-ID: 17673 "WordPress Plugin IP-Logger 3.0 - SQL Injection"
  1727. [I] is-human
  1728. [M] EDB-ID: 17299 "WordPress Plugin Is-human 1.4.2 - Remote Command Execution"
  1729. [I] islidex
  1730. [I] iwant-one-ihave-one
  1731. [M] EDB-ID: 16236 "WordPress Plugin IWantOneButton 3.0.1 - Multiple Vulnerabilities"
  1732. [I] jetpack
  1733. [M] EDB-ID: 18126 "WordPress Plugin jetpack - 'sharedaddy.php' ID SQL Injection"
  1734. [I] jibu-pro
  1735. [M] EDB-ID: 45305 "WordPress Plugin Jibu Pro 1.7 - Cross-Site Scripting"
  1736. [I] joliprint
  1737. [M] EDB-ID: 37176 "WordPress Plugin PDF & Print Button Joliprint 1.3.0 - Multiple Cross-Site Scripting Vulnerabilities"
  1738. [I] jquery-mega-menu
  1739. [M] EDB-ID: 16250 "WordPress Plugin jQuery Mega Menu 1.0 - Local File Inclusion"
  1740. [I] jrss-widget
  1741. [M] EDB-ID: 34977 "WordPress Plugin jRSS Widget 1.1.1 - 'url' Information Disclosure"
  1742. [I] js-appointment
  1743. [M] EDB-ID: 17724 "WordPress Plugin Js-appointment 1.5 - SQL Injection"
  1744. [I] jtrt-responsive-tables
  1745. [M] EDB-ID: 43110 "WordPress Plugin JTRT Responsive Tables 4.1 - SQL Injection"
  1746. [I] kino-gallery
  1747. [I] kish-guest-posting
  1748. [I] kittycatfish
  1749. [M] EDB-ID: 41919 "WordPress Plugin KittyCatfish 2.2 - SQL Injection"
  1750. [I] knews
  1751. [M] EDB-ID: 37484 "WordPress Plugin Knews Multilingual Newsletters - Cross-Site Scripting"
  1752. [I] knr-author-list-widget
  1753. [M] EDB-ID: 17791 "WordPress Plugin KNR Author List Widget 2.0.0 - SQL Injection"
  1754. [I] lanoba-social-plugin
  1755. [M] EDB-ID: 36326 "WordPress Plugin Lanoba Social 1.0 - 'action' Cross-Site Scripting"
  1756. [I] lazy-content-slider
  1757. [M] EDB-ID: 40070 "WordPress Plugin Lazy Content Slider 3.4 - Cross-Site Request Forgery (Add Catetory)"
  1758. [I] lazy-seo
  1759. [M] EDB-ID: 28452 "WordPress Plugin Lazy SEO 1.1.9 - Arbitrary File Upload"
  1760. [I] lazyest-gallery
  1761. [M] EDB-ID: 35435 "WordPress Plugin Lazyest Gallery 1.0.26 - 'image' Cross-Site Scripting"
  1762. [I] lb-mixed-slideshow
  1763. [M] EDB-ID: 37418 "WordPress Plugin LB Mixed Slideshow - 'upload.php' Arbitrary File Upload"
  1764. [I] leaguemanager
  1765. [M] EDB-ID: 24789 "WordPress Plugin LeagueManager 3.8 - SQL Injection"
  1766. [I] leenkme
  1767. [I] levelfourstorefront
  1768. [M] EDB-ID: 38158 "WordPress Plugin Shopping Cart for WordPress - '/wp-content/plugins/levelfourstorefront/scripts/administration/exportsubscribers.php? reqID' SQL Injection"
  1769. [M] EDB-ID: 38159 "WordPress Plugin Shopping Cart for WordPress - '/wp-content/plugins/levelfourstorefront/scripts/administration/backup.php?reqID' SQL Injection"
  1770. [M] EDB-ID: 38160 "WordPress Plugin Shopping Cart for WordPress - '/wp-content/plugins/levelfourstorefront/scripts/administration/exportaccounts.php?reqID' SQL Injection"
  1771. [I] like-dislike-counter-for-posts-pages-and-comments
  1772. [M] EDB-ID: 34553 "WordPress Plugin Like Dislike Counter 1.2.3 - SQL Injection"
  1773. [I] link-library
  1774. [M] EDB-ID: 17887 "WordPress Plugin Link Library 5.2.1 - SQL Injection"
  1775. [I] lisl-last-image-slider
  1776. [I] livesig
  1777. [M] EDB-ID: 17864 "WordPress Plugin Livesig 0.4 - Remote File Inclusion"
  1778. [I] localize-my-post
  1779. [M] EDB-ID: 45439 "WordPress Plugin Localize My Post 1.0 - Local File Inclusion"
  1780. [I] mac-dock-gallery
  1781. [M] EDB-ID: 19056 "WordPress Plugin Mac Photo Gallery 2.7 - Arbitrary File Upload"
  1782. [I] madebymilk
  1783. [M] EDB-ID: 38041 "WordPress Theme Madebymilk - 'id' SQL Injection"
  1784. [I] mail-masta
  1785. [M] EDB-ID: 40290 "WordPress Plugin Mail Masta 1.0 - Local File Inclusion"
  1786. [M] EDB-ID: 41438 "WordPress Plugin Mail Masta 1.0 - SQL Injection"
  1787. [I] mailz
  1788. [M] EDB-ID: 17866 "WordPress Plugin Mailing List 1.3.2 - Remote File Inclusion"
  1789. [M] EDB-ID: 18276 "WordPress Plugin Mailing List - Arbitrary File Download"
  1790. [I] media-library-categories
  1791. [M] EDB-ID: 17628 "WordPress Plugin Media Library Categories 1.0.6 - SQL Injection"
  1792. [I] meenews
  1793. [M] EDB-ID: 36340 "WordPress Plugin NewsLetter Meenews 5.1 - 'idnews' Cross-Site Scripting"
  1794. [I] membership-simplified-for-oap-members-only
  1795. [M] EDB-ID: 41622 "Wordpress Plugin Membership Simplified 1.58 - Arbitrary File Download"
  1796. [I] mingle-forum
  1797. [M] EDB-ID: 15943 "WordPress Plugin mingle forum 1.0.26 - Multiple Vulnerabilities"
  1798. [M] EDB-ID: 17894 "WordPress Plugin Mingle Forum 1.0.31 - SQL Injection"
  1799. [I] mm-forms-community
  1800. [M] EDB-ID: 17725 "WordPress Plugin MM Forms Community 1.2.3 - SQL Injection"
  1801. [M] EDB-ID: 18997 "WordPress Plugin MM Forms Community 2.2.6 - Arbitrary File Upload"
  1802. [I] monsters-editor-10-for-wp-super-edit
  1803. [M] EDB-ID: 37654 "WordPress Plugin Monsters Editor for WP Super Edit - Arbitrary File Upload"
  1804. [I] mukioplayer-for-wordpress
  1805. [M] EDB-ID: 38755 "WordPress Plugin mukioplayer4wp - 'cid' SQL Injection"
  1806. [I] myflash
  1807. [M] EDB-ID: 3828 "Microsoft Windows Kernel - 'NtGdiStretchBlt' Pool Buffer Overflow (MS15-097)"
  1808. [I] mystat
  1809. [M] EDB-ID: 17740 "WordPress Plugin mySTAT 2.6 - SQL Injection"
  1810. [I] nextgen-gallery
  1811. [M] EDB-ID: 12098 "WordPress Plugin NextGEN Gallery 1.5.1 - Cross-Site Scripting"
  1812. [M] EDB-ID: 38178 "WordPress Plugin NextGEN Gallery - 'test-head' Cross-Site Scripting"
  1813. [M] EDB-ID: 39100 "WordPress Plugin NextGEN Gallery - 'jqueryFileTree.php' Directory Traversal"
  1814. [I] nextgen-smooth-gallery
  1815. [M] EDB-ID: 14541 "WordPress Plugin NextGEN Smooth Gallery 0.12 - Blind SQL Injection"
  1816. [I] ocim-mp3
  1817. [M] EDB-ID: 39498 "WordPress Plugin Ocim MP3 - SQL Injection"
  1818. [I] odihost-newsletter-plugin
  1819. [M] EDB-ID: 17681 "WordPress Plugin OdiHost NewsLetter 1.0 - SQL Injection"
  1820. [I] old-post-spinner
  1821. [M] EDB-ID: 16251 "WordPress Plugin OPS Old Post Spinner 2.2.1 - Local File Inclusion"
  1822. [I] olimometer
  1823. [M] EDB-ID: 40804 "WordPress Plugin Olimometer 2.56 - SQL Injection"
  1824. [I] omni-secure-files
  1825. [M] EDB-ID: 19009 "WordPress Plugin Omni Secure Files 0.1.13 - Arbitrary File Upload"
  1826. [I] oqey-gallery
  1827. [M] EDB-ID: 17779 "WordPress Plugin oQey Gallery 0.4.8 - SQL Injection"
  1828. [M] EDB-ID: 35288 "WordPress Plugin oQey-Gallery 0.2 - 'tbpv_domain' Cross-Site Scripting"
  1829. [I] oqey-headers
  1830. [M] EDB-ID: 17730 "WordPress Plugin oQey Headers 0.3 - SQL Injection"
  1831. [I] page-flip-image-gallery
  1832. [M] EDB-ID: 30084 "WordPress Plugin page-flip-image-gallery - Arbitrary File Upload"
  1833. [M] EDB-ID: 7543 "Linux Kernel 2.6.x - 'rds_recvmsg()' Local Information Disclosure"
  1834. [I] paid-downloads
  1835. [M] EDB-ID: 17797 "WordPress Plugin Paid Downloads 2.01 - SQL Injection"
  1836. [M] EDB-ID: 36135 "WordPress Plugin Auctions 1.8.8 - 'wpa_id' SQL Injection"
  1837. [I] participants-database
  1838. [I] pay-with-tweet.php
  1839. [M] EDB-ID: 18330 "WordPress Plugin Pay with Tweet 1.1 - Multiple Vulnerabilities"
  1840. [I] paypal-currency-converter-basic-for-woocommerce
  1841. [M] EDB-ID: 37253 "WordPress Plugin Paypal Currency Converter Basic For WooCommerce - File Read"
  1842. [I] peugeot-music-plugin
  1843. [M] EDB-ID: 44737 "WordPress Plugin Peugeot Music - Arbitrary File Upload"
  1844. [I] photocart-link
  1845. [M] EDB-ID: 39623 "WordPress Plugin Photocart Link 1.6 - Local File Inclusion"
  1846. [I] photoracer
  1847. [M] EDB-ID: 17720 "WordPress Plugin Photoracer 1.0 - SQL Injection"
  1848. [M] EDB-ID: 17731 "WordPress Plugin Photoracer 1.0 - Multiple Vulnerabilities"
  1849. [M] EDB-ID: 8961 "WordPress Plugin Photoracer 1.0 - 'id' SQL Injection"
  1850. [I] photosmash-galleries
  1851. [M] EDB-ID: 35429 "WordPress Plugin PhotoSmash Galleries 1.0.x - 'action' Cross-Site Scripting"
  1852. [M] EDB-ID: 38872 "WordPress Plugin PhotoSmash Galleries - 'bwbps-uploader.php' Arbitrary File Upload"
  1853. [I] php_speedy_wp
  1854. [I] phpfreechat
  1855. [M] EDB-ID: 37485 "WordPress Plugin PHPFreeChat - 'url' Cross-Site Scripting"
  1856. [I] pica-photo-gallery
  1857. [M] EDB-ID: 19016 "WordPress Plugin PICA Photo Gallery 1.0 - Remote File Disclosure"
  1858. [M] EDB-ID: 19055 "WordPress Plugin Pica Photo Gallery 1.0 - Arbitrary File Upload"
  1859. [I] pictpress
  1860. [M] EDB-ID: 4695 "Karaoke Video Creator 2.2.8 - Denial of Service"
  1861. [I] picturesurf-gallery
  1862. [M] EDB-ID: 37371 "WordPress Plugin Picturesurf Gallery - 'upload.php' Arbitrary File Upload"
  1863. [I] placester
  1864. [M] EDB-ID: 35562 "WordPress Plugin Placester 0.1 - 'ajax_action' Cross-Site Scripting"
  1865. [I] player
  1866. [M] EDB-ID: 38458 "WordPress Plugin Spider Video Player - 'theme' SQL Injection"
  1867. [I] plg_novana
  1868. [I] plugin-dir
  1869. [M] EDB-ID: 22853 "WordPress Plugin Facebook Survey 1.0 - SQL Injection"
  1870. [I] plugin-newsletter
  1871. [M] EDB-ID: 19018 "WordPress Plugin NewsLetter 1.5 - Remote File Disclosure"
  1872. [I] podpress
  1873. [M] EDB-ID: 38376 "WordPress Plugin podPress - 'playerID' Cross-Site Scripting"
  1874. [I] portable-phpmyadmin
  1875. [M] EDB-ID: 23356 "WordPress Plugin Portable phpMyAdmin - Authentication Bypass"
  1876. [I] post-highlights
  1877. [M] EDB-ID: 17790 "WordPress Plugin post highlights 2.2 - SQL Injection"
  1878. [I] post-recommendations-for-wordpress
  1879. [M] EDB-ID: 37506 "WordPress Plugin Post Recommendations - 'abspath' Remote File Inclusion"
  1880. [I] powerhouse-museum-collection-image-grid
  1881. [M] EDB-ID: 35287 "WordPress Plugin Powerhouse Museum Collection Image Grid 0.9.1.1 - 'tbpv_username' Cross-Site Scripting"
  1882. [I] premium_gallery_manager
  1883. [I] pretty-link
  1884. [M] EDB-ID: 36233 "WordPress Plugin Pretty Link 1.4.56 - Multiple Cross-Site Scripting Vulnerabilities"
  1885. [M] EDB-ID: 36408 "WordPress Plugin Pretty Link 1.5.2 - 'pretty-bar.php' Cross-Site Scripting"
  1886. [M] EDB-ID: 37196 "WordPress Plugin Pretty Link Lite 1.5.2 - SQL Injection / Cross-Site Scripting"
  1887. [M] EDB-ID: 38324 "WordPress Plugin Pretty Link - Cross-Site Scripting"
  1888. [I] profiles
  1889. [M] EDB-ID: 17739 "WordPress Plugin Profiles 2.0 RC1 - SQL Injection"
  1890. [I] proplayer
  1891. [M] EDB-ID: 17616 "WordPress Plugin ProPlayer 4.7.7 - SQL Injection"
  1892. [M] EDB-ID: 25605 "WordPress Plugin ProPlayer 4.7.9.1 - SQL Injection"
  1893. [I] pure-html
  1894. [M] EDB-ID: 17758 "WordPress Plugin PureHTML 1.0.0 - SQL Injection"
  1895. [I] q-and-a-focus-plus-faq
  1896. [M] EDB-ID: 39806 "WordPress Plugin Q and A (Focus Plus) FAQ 1.3.9.7 - Multiple Vulnerabilities"
  1897. [I] radykal-fancy-gallery
  1898. [M] EDB-ID: 19398 "WordPress Plugin Fancy Gallery 1.2.4 - Arbitrary File Upload"
  1899. [I] rating-widget
  1900. [I] rb-agency
  1901. [M] EDB-ID: 40333 "WordPress Plugin RB Agency 2.4.7 - Local File Disclosure"
  1902. [I] rbxgallery
  1903. [M] EDB-ID: 19019 "WordPress Plugin RBX Gallery 2.1 - Arbitrary File Upload"
  1904. [I] real3d-flipbook
  1905. [M] EDB-ID: 40055 "WordPress Plugin Real3D FlipBook - Multiple Vulnerabilities"
  1906. [I] really-easy-slider
  1907. [I] really-simple-guest-post
  1908. [M] EDB-ID: 37209 "WordPress Plugin Really Simple Guest Post 1.0.6 - Local File Inclusion"
  1909. [I] recent-backups
  1910. [M] EDB-ID: 37752 "WordPress Plugin Recent Backups 0.7 - Arbitrary File Download"
  1911. [I] recipe
  1912. [M] EDB-ID: 31228 "WordPress Plugin Recipes Blog - 'id' SQL Injection"
  1913. [I] reciply
  1914. [M] EDB-ID: 35265 "WordPress Plugin Recip.ly 1.1.7 - 'uploadImage.php' Arbitrary File Upload"
  1915. [I] reflex-gallery
  1916. [M] EDB-ID: 36374 "WordPress Plugin Reflex Gallery 3.1.3 - Arbitrary File Upload"
  1917. [I] rekt-slideshow
  1918. [I] related-sites
  1919. [M] EDB-ID: 9054 "Adobe Flash TextField.tabIndex Setter - Use-After-Free"
  1920. [I] relocate-upload
  1921. [M] EDB-ID: 17869 "WordPress Plugin Relocate Upload 0.14 - Remote File Inclusion"
  1922. [I] rent-a-car
  1923. [I] resume-submissions-job-postings
  1924. [M] EDB-ID: 19791 "WordPress Plugin Resume Submissions & Job Postings 2.5.1 - Unrestricted Arbitrary File Upload"
  1925. [I] rich-widget
  1926. [M] EDB-ID: 37653 "WordPress Plugin Rich Widget - Arbitrary File Upload"
  1927. [I] ripe-hd-player
  1928. [M] EDB-ID: 24229 "WordPress Plugin Ripe HD FLV Player - SQL Injection"
  1929. [I] robotcpa
  1930. [M] EDB-ID: 37252 "WordPress Plugin RobotCPA V5 - Local File Inclusion"
  1931. [I] rss-feed-reader
  1932. [M] EDB-ID: 35261 "WordPress Plugin RSS Feed Reader 0.1 - 'rss_url' Cross-Site Scripting"
  1933. [I] s3bubble-amazon-s3-html-5-video-with-adverts
  1934. [M] EDB-ID: 37494 "WordPress Plugin S3Bubble Cloud Video With Adverts & Analytics 0.7 - Arbitrary File Download"
  1935. [I] scormcloud
  1936. [M] EDB-ID: 17793 "WordPress Plugin SCORM Cloud 1.0.6.6 - SQL Injection"
  1937. [I] se-html5-album-audio-player
  1938. [M] EDB-ID: 37274 "WordPress Plugin SE HTML5 Album Audio Player 1.1.0 - Directory Traversal"
  1939. [I] search-autocomplete
  1940. [M] EDB-ID: 17767 "WordPress Plugin SearchAutocomplete 1.0.8 - SQL Injection"
  1941. [I] securimage-wp
  1942. [M] EDB-ID: 38510 "WordPress Plugin Securimage-WP - 'siwp_test.php' Cross-Site Scripting"
  1943. [I] sell-downloads
  1944. [M] EDB-ID: 38868 "WordPress Plugin Sell Download 1.0.16 - Local File Disclosure"
  1945. [I] sendit
  1946. [M] EDB-ID: 17716 "WordPress Plugin SendIt 1.5.9 - Blind SQL Injection"
  1947. [I] seo-automatic-seo-tools
  1948. [M] EDB-ID: 34975 "WordPress Plugin SEO Tools 3.0 - 'file' Directory Traversal"
  1949. [I] seo-watcher
  1950. [M] EDB-ID: 38782 "WordPress Plugin SEO Watcher - 'ofc_upload_image.php' Arbitrary PHP Code Execution"
  1951. [I] sermon-browser
  1952. [M] EDB-ID: 17214 "WordPress Plugin SermonBrowser 0.43 - SQL Injection"
  1953. [M] EDB-ID: 35657 "WordPress Plugin Sermon Browser 0.43 - Cross-Site Scripting / SQL Injection"
  1954. [I] sexy-contact-form
  1955. [M] EDB-ID: 34922 "WordPress Plugin Creative Contact Form 0.9.7 - Arbitrary File Upload"
  1956. [M] EDB-ID: 35057 "WordPress Plugin 0.9.7 / Joomla! Component 2.0.0 Creative Contact Form - Arbitrary File Upload"
  1957. [I] sf-booking
  1958. [M] EDB-ID: 43475 "WordPress Plugin Service Finder Booking < 3.2 - Local File Disclosure"
  1959. [I] sfbrowser
  1960. [M] EDB-ID: 19054 "WordPress Plugin SfBrowser 1.4.5 - Arbitrary File Upload"
  1961. [I] sfwd-lms
  1962. [I] sh-slideshow
  1963. [M] EDB-ID: 17748 "WordPress Plugin SH Slideshow 3.1.4 - SQL Injection"
  1964. [I] sharebar
  1965. [M] EDB-ID: 37201 "WordPress Plugin Sharebar 1.2.1 - SQL Injection / Cross-Site Scripting"
  1966. [I] si-contact-form
  1967. [M] EDB-ID: 36050 "WordPress Plugin Fast Secure Contact Form 3.0.3.1 - 'index.php' Cross-Site Scripting"
  1968. [I] simple-ads-manager
  1969. [M] EDB-ID: 36613 "WordPress Plugin Simple Ads Manager - Multiple SQL Injections"
  1970. [M] EDB-ID: 36614 "WordPress Plugin Simple Ads Manager 2.5.94 - Arbitrary File Upload"
  1971. [M] EDB-ID: 36615 "WordPress Plugin Simple Ads Manager - Information Disclosure"
  1972. [M] EDB-ID: 39133 "WordPress Plugin Simple Ads Manager 2.9.4.116 - SQL Injection"
  1973. [I] simple-download-button-shortcode
  1974. [M] EDB-ID: 19020 "WordPress Plugin Simple Download Button ShortCode 1.0 - Remote File Disclosure"
  1975. [I] simple-fields
  1976. [M] EDB-ID: 44425 "WordPress Plugin Simple Fields 0.2 - 0.3.5 - Local/Remote File Inclusion / Remote Code Execution"
  1977. [I] simple-forum
  1978. [I] site-editor
  1979. [M] EDB-ID: 44340 "Wordpress Plugin Site Editor 1.1.1 - Local File Inclusion"
  1980. [I] site-import
  1981. [M] EDB-ID: 39558 "WordPress Plugin Site Import 1.0.1 - Local/Remote File Inclusion"
  1982. [I] skysa-official
  1983. [M] EDB-ID: 36363 "WordPress Plugin Skysa App Bar - 'idnews' Cross-Site Scripting"
  1984. [I] slider-image
  1985. [M] EDB-ID: 37361 "WordPress Plugin Huge-IT Slider 2.7.5 - Multiple Vulnerabilities"
  1986. [I] slideshow-gallery-2
  1987. [M] EDB-ID: 36631 "WordPress Plugin Slideshow Gallery 1.1.x - 'border' Cross-Site Scripting"
  1988. [I] slideshow-jquery-image-gallery
  1989. [M] EDB-ID: 37948 "WordPress Plugin Slideshow - Multiple Cross-Site Scripting Vulnerabilities"
  1990. [I] smart-flv
  1991. [M] EDB-ID: 38331 "WordPress Plugin Smart Flv - 'jwplayer.swf' Multiple Cross-Site Scripting Vulnerabilities"
  1992. [I] smart-google-code-inserter
  1993. [I] sniplets
  1994. [M] EDB-ID: 5194 "Wansview 1.0.2 - Denial of Service (PoC)"
  1995. [I] social-discussions
  1996. [M] EDB-ID: 22158 "WordPress Plugin social discussions 6.1.1 - Multiple Vulnerabilities"
  1997. [I] social-slider-2
  1998. [M] EDB-ID: 17617 "WordPress Plugin Social Slider 5.6.5 - SQL Injection"
  1999. [I] socialfit
  2000. [M] EDB-ID: 37481 "WordPress Plugin SocialFit - 'msg' Cross-Site Scripting"
  2001. [I] sodahead-polls
  2002. [I] sp-client-document-manager
  2003. [M] EDB-ID: 35313 "WordPress Plugin SP Client Document Manager 2.4.1 - SQL Injection"
  2004. [M] EDB-ID: 36576 "WordPress Plugin SP Project & Document Manager 2.5.3 - Blind SQL Injection"
  2005. [I] spicy-blogroll
  2006. [M] EDB-ID: 26804 "WordPress Plugin Spicy Blogroll - Local File Inclusion"
  2007. [I] spider-event-calendar
  2008. [M] EDB-ID: 25723 "WordPress Plugin Spider Event Calendar 1.3.0 - Multiple Vulnerabilities"
  2009. [I] spiffy
  2010. [M] EDB-ID: 38441 "WordPress Plugin Spiffy XSPF Player - 'playlist_id' SQL Injection"
  2011. [I] st_newsletter
  2012. [M] EDB-ID: 31096 "WordPress Plugin ShiftThis NewsLetter - SQL Injection"
  2013. [M] EDB-ID: 6777 "Free Download Manager 2.5 Build 758 - Remote Control Server Buffer Overflow (Metasploit)"
  2014. [I] store-locator-le
  2015. [M] EDB-ID: 18989 "WordPress Plugin Google Maps via Store Locator 2.7.1 < 3.0.1 - Multiple Vulnerabilities"
  2016. [I] taggator
  2017. [I] taggedalbums
  2018. [M] EDB-ID: 38023 "WordPress Plugin Tagged Albums - 'id' SQL Injection"
  2019. [I] tagninja
  2020. [M] EDB-ID: 35300 "WordPress Plugin TagNinja 1.0 - 'id' Cross-Site Scripting"
  2021. [I] tera-charts
  2022. [M] EDB-ID: 39256 "WordPress Plugin Tera Charts (tera-charts) - '/charts/treemap.php?fn' Directory Traversal"
  2023. [M] EDB-ID: 39257 "WordPress Plugin Tera Charts (tera-charts) - '/charts/zoomabletreemap.php?fn' Directory Traversal"
  2024. [I] the-welcomizer
  2025. [M] EDB-ID: 36445 "WordPress Plugin The Welcomizer 1.3.9.4 - 'twiz-index.php' Cross-Site Scripting"
  2026. [I] thecartpress
  2027. [M] EDB-ID: 17860 "WordPress Plugin TheCartPress 1.1.1 - Remote File Inclusion"
  2028. [M] EDB-ID: 36481 "WordPress Plugin TheCartPress 1.6 - 'OptionsPostsList.php' Cross-Site Scripting"
  2029. [M] EDB-ID: 38869 "WordPress Plugin TheCartPress 1.4.7 - Multiple Vulnerabilities"
  2030. [I] thinkun-remind
  2031. [M] EDB-ID: 19021 "WordPress Plugin Thinkun Remind 1.1.3 - Remote File Disclosure"
  2032. [I] tinymce-thumbnail-gallery
  2033. [M] EDB-ID: 19022 "WordPress Plugin TinyMCE Thumbnail Gallery 1.0.7 - Remote File Disclosure"
  2034. [I] topquark
  2035. [M] EDB-ID: 19053 "WordPress Plugin Top Quark Architecture 2.10 - Arbitrary File Upload"
  2036. [I] track-that-stat
  2037. [M] EDB-ID: 37204 "WordPress Plugin Track That Stat 1.0.8 - Cross-Site Scripting"
  2038. [I] trafficanalyzer
  2039. [M] EDB-ID: 38439 "WordPress Plugin Traffic Analyzer - 'aoid' Cross-Site Scripting"
  2040. [I] tune-library
  2041. [M] EDB-ID: 17816 "WordPress Plugin Tune Library 2.17 - SQL Injection"
  2042. [I] ucan-post
  2043. [M] EDB-ID: 18390 "WordPress Plugin ucan post 1.0.09 - Persistent Cross-Site Scripting"
  2044. [I] ultimate-product-catalogue
  2045. [M] EDB-ID: 36823 "WordPress Plugin Ultimate Product Catalogue - SQL Injection (1)"
  2046. [M] EDB-ID: 36824 "WordPress Plugin Ultimate Product Catalogue - SQL Injection (2)"
  2047. [M] EDB-ID: 36907 "WordPress Plugin Ultimate Product Catalogue 3.1.2 - Multiple Persistent Cross-Site Scripting / Cross-Site Request Forgery / Arbitrary File Upload Vulnerabilities"
  2048. [M] EDB-ID: 39974 "WordPress Plugin Ultimate Product Catalog 3.8.1 - Privilege Escalation"
  2049. [M] EDB-ID: 40012 "WordPress Plugin Ultimate Product Catalog 3.8.6 - Arbitrary File Upload"
  2050. [M] EDB-ID: 40174 "WordPress Plugin Ultimate Product Catalog 3.9.8 - do_shortcode via ajax Blind SQL Injection"
  2051. [I] ungallery
  2052. [M] EDB-ID: 17704 "WordPress Plugin UnGallery 1.5.8 - Local File Disclosure"
  2053. [I] uploader
  2054. [M] EDB-ID: 35255 "WordPress Plugin Uploader 1.0 - 'num' Cross-Site Scripting"
  2055. [M] EDB-ID: 38163 "WordPress Plugin Uploader - Arbitrary File Upload"
  2056. [M] EDB-ID: 38355 "WordPress Plugin Uploader - 'blog' Cross-Site Scripting"
  2057. [I] uploadify-integration
  2058. [M] EDB-ID: 37070 "WordPress Plugin Uploadify Integration 0.9.6 - Multiple Cross-Site Scripting Vulnerabilities"
  2059. [I] uploads
  2060. [I] upm-polls
  2061. [M] EDB-ID: 17627 "WordPress Plugin UPM Polls 1.0.3 - SQL Injection"
  2062. [I] user-avatar
  2063. [I] user-meta
  2064. [M] EDB-ID: 19052 "WordPress Plugin User Meta 1.1.1 - Arbitrary File Upload"
  2065. [I] userpro
  2066. [M] EDB-ID: 46083 "Wordpress Plugin UserPro < 4.9.21 - User Registration Privilege Escalation"
  2067. [I] users-ultra
  2068. [I] verve-meta-boxes
  2069. [I] videowhisper-live-streaming-integration
  2070. [M] EDB-ID: 31986 "WordPress Plugin VideoWhisper 4.27.3 - Multiple Vulnerabilities"
  2071. [I] videowhisper-video-conference-integration
  2072. [M] EDB-ID: 36617 "WordPress Plugin VideoWhisper Video Presentation 3.31.17 - Arbitrary File Upload"
  2073. [M] EDB-ID: 36618 "WordPress Plugin VideoWhisper Video Conference Integration 4.91.8 - Arbitrary File Upload"
  2074. [I] videowhisper-video-presentation
  2075. [M] EDB-ID: 17771 "WordPress Plugin VideoWhisper Video Presentation 1.1 - SQL Injection"
  2076. [M] EDB-ID: 37357 "WordPress Plugin VideoWhisper Video Presentation 3.17 - 'vw_upload.php' Arbitrary File Upload"
  2077. [I] vk-gallery
  2078. [I] vodpod-video-gallery
  2079. [M] EDB-ID: 34976 "WordPress Plugin Vodpod Video Gallery 3.1.5 - 'vodpod_gallery_thumbs.php' Cross-Site Scripting"
  2080. [I] wassup
  2081. [I] webinar_plugin
  2082. [M] EDB-ID: 22300 "WordPress Plugin Easy Webinar - Blind SQL Injection"
  2083. [I] webplayer
  2084. [I] website-contact-form-with-file-upload
  2085. [M] EDB-ID: 36952 "WordPress Plugin N-Media Website Contact Form with File Upload 1.5 - Local File Inclusion"
  2086. [I] website-faq
  2087. [M] EDB-ID: 19400 "WordPress Plugin Website FAQ 1.0 - SQL Injection"
  2088. [I] wechat-broadcast
  2089. [M] EDB-ID: 45438 "WordPress Plugin Wechat Broadcast 1.2.0 - Local File Inclusion"
  2090. [I] woocommerce
  2091. [M] EDB-ID: 43196 "WordPress Plugin WooCommerce 2.0/3.0 - Directory Traversal"
  2092. [I] woopra
  2093. [M] EDB-ID: 38783 "WordPress Plugin Woopra Analytics - 'ofc_upload_image.php' Arbitrary PHP Code Execution"
  2094. [I] wordpress-donation-plugin-with-goals-and-paypal-ipn-by-nonprofitcmsorg
  2095. [M] EDB-ID: 17763 "Microsoft Edge 44.17763.1.0 - NULL Pointer Dereference"
  2096. [I] wordpress-member-private-conversation
  2097. [M] EDB-ID: 37353 "WordPress Plugin Nmedia WordPress Member Conversation 1.35.0 - 'doupload.php' Arbitrary File Upload"
  2098. [I] wordpress-processing-embed
  2099. [M] EDB-ID: 35066 "WordPress Plugin Processing Embed 0.5 - 'pluginurl' Cross-Site Scripting"
  2100. [I] wordtube
  2101. [M] EDB-ID: 3825 "GoodiWare GoodReader iPhone - '.XLS' Denial of Service"
  2102. [I] work-the-flow-file-upload
  2103. [M] EDB-ID: 36640 "WordPress Plugin Work The Flow File Upload 2.5.2 - Arbitrary File Upload"
  2104. [I] wp-adserve
  2105. [I] wp-audio-gallery-playlist
  2106. [M] EDB-ID: 17756 "WordPress Plugin Audio Gallery Playlist 0.12 - SQL Injection"
  2107. [I] wp-automatic
  2108. [M] EDB-ID: 19187 "WordPress Plugin Automatic 2.0.3 - SQL Injection"
  2109. [I] wp-autosuggest
  2110. [M] EDB-ID: 45977 "WordPress Plugin AutoSuggest 0.24 - 'wpas_keys' SQL Injection"
  2111. [I] wp-autoyoutube
  2112. [M] EDB-ID: 18353 "WordPress Plugin wp-autoyoutube - Blind SQL Injection"
  2113. [I] wp-bannerize
  2114. [M] EDB-ID: 17764 "WordPress Plugin Bannerize 2.8.6 - SQL Injection"
  2115. [M] EDB-ID: 17906 "WordPress Plugin Bannerize 2.8.7 - SQL Injection"
  2116. [M] EDB-ID: 36193 "WordPress Plugin WP Bannerize 2.8.7 - 'ajax_sorter.php' SQL Injection"
  2117. [I] wp-banners-lite
  2118. [M] EDB-ID: 38410 "WordPress Plugin Banners Lite - 'wpbanners_show.php' HTML Injection"
  2119. [I] wp-booking-calendar
  2120. [M] EDB-ID: 44769 "Wordpress Plugin Booking Calendar 3.0.0 - SQL Injection / Cross-Site Scripting"
  2121. [I] wp-business-intelligence
  2122. [M] EDB-ID: 36600 "WordPress Plugin Business Intelligence - SQL Injection (Metasploit)"
  2123. [I] wp-business-intelligence-lite
  2124. [I] wp-cal
  2125. [M] EDB-ID: 4992 "Sun xVM VirtualBox 2.2 < 3.0.2 r49928 - Local Host Reboot (Denial of Service) (PoC)"
  2126. [I] wp-comment-remix
  2127. [I] wp-content
  2128. [M] EDB-ID: 37123 "WordPress Plugin WPsc MijnPress - 'rwflush' Cross-Site Scripting"
  2129. [I] wp-copysafe-pdf
  2130. [M] EDB-ID: 39254 "WordPress Plugin CopySafe PDF Protection - Arbitrary File Upload"
  2131. [I] wp-cumulus
  2132. [M] EDB-ID: 10228 "WordPress Plugin WP-Cumulus 1.20 - Full Path Disclosure / Cross-Site Scripting"
  2133. [M] EDB-ID: 33371 "WordPress Plugin WP-Cumulus 1.x - 'tagcloud.swf' Cross-Site Scripting"
  2134. [I] wp-custom-pages
  2135. [M] EDB-ID: 17119 "WordPress Plugin Custom Pages 0.5.0.1 - Local File Inclusion"
  2136. [I] wp-ds-faq
  2137. [M] EDB-ID: 17683 "WordPress Plugin DS FAQ 1.3.2 - SQL Injection"
  2138. [I] wp-e-commerce
  2139. [M] EDB-ID: 36018 "WordPress Plugin WP E-Commerce 3.8.6 - 'cart_messages[]' Cross-Site Scripting"
  2140. [I] wp-easycart
  2141. [M] EDB-ID: 35730 "WordPress Plugin Shopping Cart 3.0.4 - Unrestricted Arbitrary File Upload"
  2142. [I] wp-ecommerce-shop-styling
  2143. [M] EDB-ID: 37530 "WordPress Plugin WP E-Commerce Shop Styling 2.5 - Arbitrary File Download"
  2144. [I] wp-events-calendar
  2145. [M] EDB-ID: 44785 "WordPress Plugin Events Calendar - SQL Injection"
  2146. [I] wp-featured-post-with-thumbnail
  2147. [M] EDB-ID: 35262 "WordPress Plugin WP Featured Post with Thumbnail 3.0 - 'src' Cross-Site Scripting"
  2148. [I] wp-filebase
  2149. [M] EDB-ID: 17808 "WordPress Plugin WP-Filebase Download Manager 0.2.9 - SQL Injection"
  2150. [I] wp-filemanager
  2151. [M] EDB-ID: 25440 "WordPress Plugin wp-FileManager - Arbitrary File Download"
  2152. [M] EDB-ID: 38515 "WordPress Plugin wp-FileManager - 'path' Arbitrary File Download"
  2153. [M] EDB-ID: 4844 "STDU Explorer 1.0.201 - 'dwmapi.dll' DLL Loading Arbitrary Code Execution"
  2154. [I] wp-footnotes
  2155. [M] EDB-ID: 31092 "WordPress Plugin WP-Footnotes 2.2 - Multiple Remote Vulnerabilities"
  2156. [I] wp-forum
  2157. [M] EDB-ID: 7738 "WordPress Plugin WP-Forum 1.7.8 - SQL Injection"
  2158. [I] wp-glossary
  2159. [M] EDB-ID: 18055 "WordPress Plugin Glossary - SQL Injection"
  2160. [I] wp-google-drive
  2161. [M] EDB-ID: 44435 "WordPress Plugin Google Drive 2.2 - Remote Code Execution"
  2162. [I] wp-gpx-maps
  2163. [M] EDB-ID: 19050 "WordPress Plugin wp-gpx-map 1.1.21 - Arbitrary File Upload"
  2164. [I] wp-imagezoom
  2165. [M] EDB-ID: 37243 "WordPress Plugin Wp-ImageZoom 1.1.0 - Multiple Vulnerabilities"
  2166. [M] EDB-ID: 37419 "WordPress Plugin Wp-ImageZoom - 'file' Remote File Disclosure"
  2167. [M] EDB-ID: 38063 "WordPress Theme Wp-ImageZoom - 'id' SQL Injection"
  2168. [I] wp-livephp
  2169. [M] EDB-ID: 36483 "WordPress Plugin WP Live.php 1.2.1 - 's' Cross-Site Scripting"
  2170. [I] wp-lytebox
  2171. [I] wp-marketplace
  2172. [I] wp-menu-creator
  2173. [M] EDB-ID: 17689 "WordPress Plugin Menu Creator 1.1.7 - SQL Injection"
  2174. [I] wp-mobile-detector
  2175. [M] EDB-ID: 39891 "WordPress Plugin WP Mobile Detector 3.5 - Arbitrary File Upload"
  2176. [I] wp-people
  2177. [M] EDB-ID: 31230 "WordPress Plugin wp-people 2.0 - 'wp-people-popup.php' SQL Injection"
  2178. [I] wp-polls
  2179. [M] EDB-ID: 10256 "WordPress Plugin WP-Polls 2.x - Incorrect Flood Filter"
  2180. [I] wp-property
  2181. [M] EDB-ID: 18987 "WordPress Plugin WP-Property 1.35.0 - Arbitrary File Upload"
  2182. [I] wp-publication-archive
  2183. [M] EDB-ID: 35263 "WordPress Plugin WP Publication Archive 2.0.1 - 'file' Information Disclosure"
  2184. [I] wp-realty
  2185. [M] EDB-ID: 29021 "WordPress Plugin Realty - Blind SQL Injection"
  2186. [M] EDB-ID: 38808 "WordPress Plugin WP-Realty - 'listing_id' SQL Injection"
  2187. [M] EDB-ID: 39109 "WordPress Plugin Relevanssi - 'category_name' SQL Injection"
  2188. [I] wp-responsive-thumbnail-slider
  2189. [M] EDB-ID: 45099 "WordPress Plugin Responsive Thumbnail Slider - Arbitrary File Upload (Metasploit)"
  2190. [I] wp-safe-search
  2191. [M] EDB-ID: 35067 "WordPress Plugin Safe Search - 'v1' Cross-Site Scripting"
  2192. [I] wp-shopping-cart
  2193. [M] EDB-ID: 6867 "Apple Mac OSX Software Update - Command Execution (Metasploit)"
  2194. [I] wp-source-control
  2195. [M] EDB-ID: 39287 "WordPress Plugin WP Content Source Control - 'download.php' Directory Traversal"
  2196. [I] wp-spamfree
  2197. [M] EDB-ID: 17970 "WordPress Plugin WP-SpamFree Spam Plugin - SQL Injection"
  2198. [I] wp-starsratebox
  2199. [M] EDB-ID: 35634 "WordPress Plugin WP-StarsRateBox 1.1 - 'j' SQL Injection"
  2200. [I] wp-stats-dashboard
  2201. [I] wp-support-plus-responsive-ticket-system
  2202. [M] EDB-ID: 34589 "SCO UnixWare < 7.1.4 p534589 - 'pkgadd' Local Privilege Escalation"
  2203. [I] wp-survey-and-quiz-tool
  2204. [M] EDB-ID: 34974 "WordPress Plugin WP Survey And Quiz Tool 1.2.1 - Cross-Site Scripting"
  2205. [I] wp-swimteam
  2206. [M] EDB-ID: 37601 "WordPress Plugin Swim Team 1.44.10777 - Arbitrary File Download"
  2207. [I] wp-symposium
  2208. [M] EDB-ID: 17679 "WordPress Plugin Symposium 0.64 - SQL Injection"
  2209. [M] EDB-ID: 35505 "WordPress Plugin Symposium 14.10 - SQL Injection"
  2210. [M] EDB-ID: 35543 "WordPress Plugin WP Symposium 14.11 - Arbitrary File Upload"
  2211. [M] EDB-ID: 37822 "WordPress Plugin WP Symposium 15.1 - Blind SQL Injection"
  2212. [M] EDB-ID: 37824 "WordPress Plugin WP Symposium 15.1 - 'get_album_item.php' SQL Injection"
  2213. [I] wp-syntax
  2214. [M] EDB-ID: 9431 "Adobe Photoshop CC / Bridge CC - '.iff' Parsing Memory Corruption"
  2215. [I] wp-table
  2216. [M] EDB-ID: 3824 "Office^2 iPhone - '.XLS' Denial of Service"
  2217. [I] wp-table-reloaded
  2218. [M] EDB-ID: 38251 "WordPress Plugin WP-Table Reloaded - 'id' Cross-Site Scripting"
  2219. [I] wp-twitter-feed
  2220. [M] EDB-ID: 35084 "WordPress Plugin Twitter Feed - 'url' Cross-Site Scripting"
  2221. [I] wp-whois
  2222. [M] EDB-ID: 36488 "WordPress Plugin WHOIS 1.4.2 3 - 'domain' Cross-Site Scripting"
  2223. [I] wp-with-spritz
  2224. [M] EDB-ID: 44544 "WordPress Plugin WP with Spritz 1.0 - Remote File Inclusion"
  2225. [I] wpSS
  2226. [M] EDB-ID: 39279 "WordPress Plugin wpSS - 'ss_handler.php' SQL Injection"
  2227. [M] EDB-ID: 5486 "PHP < 5.3.6 'OpenSSL' Extension - 'openssl_encrypt' Plaintext Data Memory Leak Denial of Service"
  2228. [I] wp_rokintroscroller
  2229. [M] EDB-ID: 38767 "WordPress Plugin RokIntroScroller - 'thumb.php' Multiple Vulnerabilities"
  2230. [I] wp_rokmicronews
  2231. [M] EDB-ID: 38768 "WordPress Plugin RokMicroNews - 'thumb.php' Multiple Vulnerabilities"
  2232. [I] wp_roknewspager
  2233. [M] EDB-ID: 38756 "WordPress Plugin RokNewsPager - 'thumb.php' Multiple Vulnerabilities"
  2234. [I] wp_rokstories
  2235. [M] EDB-ID: 38757 "WordPress Plugin RokStories - 'thumb.php' Multiple Vulnerabilities"
  2236. [I] wpeasystats
  2237. [M] EDB-ID: 17862 "WordPress Plugin WPEasyStats 1.8 - Remote File Inclusion"
  2238. [I] wpforum
  2239. [M] EDB-ID: 17684 "WordPress Plugin Forum 1.7.8 - SQL Injection"
  2240. [I] wpmarketplace
  2241. [M] EDB-ID: 18988 "WordPress Plugin Marketplace Plugin 1.5.0 < 1.6.1 - Arbitrary File Upload"
  2242. [I] wpsite-background-takeover
  2243. [M] EDB-ID: 44417 "WordPress Plugin Background Takeover < 4.1.4 - Directory Traversal"
  2244. [I] wpstorecart
  2245. [M] EDB-ID: 19023 "ActivePDF Toolkit < 8.1.0.19023 - Multiple Memory Corruptions"
  2246. [I] wptf-image-gallery
  2247. [M] EDB-ID: 37751 "WordPress Plugin WPTF Image Gallery 1.03 - Arbitrary File Download"
  2248. [I] wptouch
  2249. [M] EDB-ID: 18039 "WordPress Plugin wptouch - SQL Injection"
  2250. [I] x7host-videox7-ugc-plugin
  2251. [M] EDB-ID: 35257 "WordPress Plugin Videox7 UGC 2.5.3.2 - 'listid' Cross-Site Scripting"
  2252. [M] EDB-ID: 35264 "WordPress Plugin Featured Content 0.0.1 - 'listid' Cross-Site Scripting"
  2253. [I] xcloner-backup-and-restore
  2254. [M] EDB-ID: 16246 "Joomla! Component com_xcloner-backupandrestore - Remote Command Execution"
  2255. [I] xerte-online
  2256. [M] EDB-ID: 38157 "WordPress Plugin Xerte Online - 'save.php' Arbitrary File Upload"
  2257. [I] xml-and-csv-import-in-article-content
  2258. [M] EDB-ID: 39576 "WordPress Plugin Import CSV 1.0 - Directory Traversal"
  2259. [I] xorbin-analog-flash-clock
  2260. [M] EDB-ID: 38608 "WordPress Plugin Xorbin Analog Flash Clock - 'widgetUrl' Cross-Site Scripting"
  2261. [I] xorbin-digital-flash-clock
  2262. [M] EDB-ID: 38621 "WordPress Plugin Xorbin Digital Flash Clock - 'widgetUrl' Cross-Site Scripting"
  2263. [I] yolink-search
  2264. [M] EDB-ID: 17757 "WordPress Plugin yolink Search 1.1.4 - SQL Injection"
  2265. [I] yousaytoo-auto-publishing-plugin
  2266. [M] EDB-ID: 36620 "WordPress Plugin YouSayToo auto-publishing 1.0 - 'submit' Cross-Site Scripting"
  2267. [I] yt-audio-streaming-audio-from-youtube
  2268. [M] EDB-ID: 35394 "WordPress Plugin YT-Audio 1.7 - 'v' Cross-Site Scripting"
  2269. [I] zarzadzanie_kontem
  2270. [M] EDB-ID: 38050 "WordPress Plugin Zarzadzonie Kontem - 'ajaxfilemanager.php' Script Arbitrary File Upload"
  2271. [I] zingiri-forum
  2272. [M] EDB-ID: 38101 "WordPress Plugin Zingiri Forums - 'language' Local File Inclusion"
  2273. [I] zingiri-web-shop
  2274. [M] EDB-ID: 17867 "WordPress Plugin Zingiri Web Shop 2.2.0 - Remote File Inclusion"
  2275. [M] EDB-ID: 37406 "WordPress Plugin Zingiri Web Shop 2.4.3 - 'uploadfilexd.php' Arbitrary File Upload"
  2276. [M] EDB-ID: 38046 "WordPress Plugin Zingiri Web Shop - 'path' Arbitrary File Upload"
  2277. [I] zotpress
  2278. [M] EDB-ID: 17778 "WordPress Plugin Zotpress 4.4 - SQL Injection"
  2279. [I] Checking for Directory Listing Enabled ...
  2280. [-] Date & Time: 11/02/2019 16:10:05
  2281. [-] Completed in: 0:19:12
  2282. #######################################################################################################################################
  2283. ---------------------------------------------------------------------------------------------------------------------------------------
  2284. + Target IP: 208.113.216.34
  2285. + Target Hostname: 208.113.216.34
  2286. + Target Port: 80
  2287. + Start Time: 2019-02-11 16:00:02 (GMT-5)
  2288. ---------------------------------------------------------------------------------------------------------------------------------------
  2289. + Server: No banner retrieved
  2290. + Server leaks inodes via ETags, header found with file /, fields: 0x304 0x506c4687e0800
  2291. + The anti-clickjacking X-Frame-Options header is not present.
  2292. + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
  2293. + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
  2294. + No CGI Directories found (use '-C all' to force check all possible dirs)
  2295. + Uncommon header 'x-squid-error' found, with contents: ERR_INVALID_URL 0
  2296. + Allowed HTTP Methods: GET, HEAD, POST, OPTIONS
  2297. + 7535 requests: 0 error(s) and 6 item(s) reported on remote host
  2298. + End Time: 2019-02-11 16:45:43 (GMT-5) (2741 seconds)
  2299. ---------------------------------------------------------------------------------------------------------------------------------------
  2300. #######################################################################################################################################
  2301. Anonymous JTSEC #OpDomesticTerrorism Full Recon #5
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement