Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #######################################################################################################################################
- =======================================================================================================================================
- Hostname northwestfront.org ISP New Dream Network, LLC
- Continent North America Flag
- US
- Country United States Country Code US
- Region California Local time 11 Feb 2019 12:09 PST
- City Brea Postal Code 92821
- IP Address 208.113.216.34 Latitude 33.929
- Longitude -117.885
- =======================================================================================================================================
- #######################################################################################################################################
- > northwestfront.org
- Server: 38.132.106.139
- Address: 38.132.106.139#53
- Non-authoritative answer:
- Name: northwestfront.org
- Address: 208.113.216.34
- >
- #######################################################################################################################################
- HostIP:208.113.216.34
- HostName:northwestfront.org
- Gathered Inet-whois information for 208.113.216.34
- ---------------------------------------------------------------------------------------------------------------------------------------
- inetnum: 208.82.76.0 - 209.42.191.255
- netname: NON-RIPE-NCC-MANAGED-ADDRESS-BLOCK
- descr: IPv4 address block not managed by the RIPE NCC
- remarks: ------------------------------------------------------
- remarks:
- remarks: For registration information,
- remarks: you can consult the following sources:
- remarks:
- remarks: IANA
- remarks: http://www.iana.org/assignments/ipv4-address-space
- remarks: http://www.iana.org/assignments/iana-ipv4-special-registry
- remarks: http://www.iana.org/assignments/ipv4-recovered-address-space
- remarks:
- remarks: AFRINIC (Africa)
- remarks: http://www.afrinic.net/ whois.afrinic.net
- remarks:
- remarks: APNIC (Asia Pacific)
- remarks: http://www.apnic.net/ whois.apnic.net
- remarks:
- remarks: ARIN (Northern America)
- remarks: http://www.arin.net/ whois.arin.net
- remarks:
- remarks: LACNIC (Latin America and the Carribean)
- remarks: http://www.lacnic.net/ whois.lacnic.net
- remarks:
- remarks: ------------------------------------------------------
- country: EU # Country is really world wide
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- status: ALLOCATED UNSPECIFIED
- mnt-by: RIPE-NCC-HM-MNT
- created: 2019-01-07T10:50:54Z
- last-modified: 2019-01-07T10:50:54Z
- source: RIPE
- role: Internet Assigned Numbers Authority
- address: see http://www.iana.org.
- admin-c: IANA1-RIPE
- tech-c: IANA1-RIPE
- nic-hdl: IANA1-RIPE
- remarks: For more information on IANA services
- remarks: go to IANA web site at http://www.iana.org.
- mnt-by: RIPE-NCC-MNT
- created: 1970-01-01T00:00:00Z
- last-modified: 2001-09-22T09:31:27Z
- source: RIPE # Filtered
- % This query was served by the RIPE Database Query Service version 1.92.6 (ANGUS)
- Gathered Inic-whois information for northwestfront.org
- ---------------------------------------------------------------------------------------------------------------------------------------
- Domain Name: NORTHWESTFRONT.ORG
- Registry Domain ID: D156669153-LROR
- Registrar WHOIS Server: whois.dreamhost.com
- Registrar URL: http://www.dreamhost.com/
- Updated Date: 2018-06-15T07:21:05Z
- Creation Date: 2009-07-17T04:16:48Z
- Registry Expiry Date: 2019-07-17T04:16:48Z
- Registrar Registration Expiration Date:
- Registrar: New Dream Network, LLC dba DreamHost Web Hosting
- Registrar IANA ID: 431
- Registrar Abuse Contact Email: abuse@dreamhost.com
- Registrar Abuse Contact Phone: +213.2719359
- Reseller:
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Registrant Organization: Proxy Protection LLC
- Registrant State/Province: CA
- Registrant Country: US
- Name Server: NS1.DREAMHOST.COM
- Name Server: NS2.DREAMHOST.COM
- Name Server: NS3.DREAMHOST.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form https://www.icann.org/wicf/)
- >>> Last update of WHOIS database: 2019-02-11T20:46:55Z <<<
- #######################################################################################################################################
- [i] Scanning Site: http://northwestfront.org
- B A S I C I N F O
- =======================================================================================================================================
- [+] Site Title:
- [+] IP address: 208.113.216.34
- [+] Web Server: Could Not Detect
- [+] CMS: Could Not Detect
- [+] Cloudflare: Not Detected
- [+] Robots File: Could NOT Find robots.txt!
- W H O I S L O O K U P
- =======================================================================================================================================
- Domain Name: NORTHWESTFRONT.ORG
- Registry Domain ID: D156669153-LROR
- Registrar WHOIS Server: whois.dreamhost.com
- Registrar URL: http://www.dreamhost.com/
- Updated Date: 2018-06-15T07:21:05Z
- Creation Date: 2009-07-17T04:16:48Z
- Registry Expiry Date: 2019-07-17T04:16:48Z
- Registrar Registration Expiration Date:
- Registrar: New Dream Network, LLC dba DreamHost Web Hosting
- Registrar IANA ID: 431
- Registrar Abuse Contact Email: abuse@dreamhost.com
- Registrar Abuse Contact Phone: +213.2719359
- Reseller:
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Registrant Organization: Proxy Protection LLC
- Registrant State/Province: CA
- Registrant Country: US
- Name Server: NS1.DREAMHOST.COM
- Name Server: NS2.DREAMHOST.COM
- Name Server: NS3.DREAMHOST.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form https://www.icann.org/wicf/)
- >>> Last update of WHOIS database: 2019-02-11T20:53:44Z <<<
- For more information on Whois status codes, please visit https://icann.org/epp
- G E O I P L O O K U P
- =======================================================================================================================================
- [i] IP Address: 208.113.216.34
- [i] Country: United States
- [i] State: California
- [i] City: Brea
- [i] Latitude: 33.9291
- [i] Longitude: -117.8845
- H T T P H E A D E R S
- =======================================================================================================================================
- [i] HTTP/1.1 403 Forbidden
- [i] Date: Mon, 11 Feb 2019 20:54:46 GMT
- [i] Vary: Accept-Encoding
- [i] Content-Type: text/html; charset=iso-8859-1
- [i] Connection: close
- D N S L O O K U P
- =======================================================================================================================================
- northwestfront.org. 14399 IN A 208.113.216.34
- northwestfront.org. 14399 IN NS ns1.dreamhost.com.
- northwestfront.org. 14399 IN NS ns2.dreamhost.com.
- northwestfront.org. 14399 IN NS ns3.dreamhost.com.
- northwestfront.org. 14399 IN SOA ns1.dreamhost.com. hostmaster.dreamhost.com. 2019011203 18454 1800 1814400 14400
- S U B N E T C A L C U L A T I O N
- =======================================================================================================================================
- Address = 208.113.216.34
- Network = 208.113.216.34 / 32
- Netmask = 255.255.255.255
- Broadcast = not needed on Point-to-Point links
- Wildcard Mask = 0.0.0.0
- Hosts Bits = 0
- Max. Hosts = 1 (2^0 - 0)
- Host Range = { 208.113.216.34 - 208.113.216.34 }
- N M A P P O R T S C A N
- =======================================================================================================================================
- Starting Nmap 7.40 ( https://nmap.org ) at 2019-02-11 20:54 UTC
- Nmap scan report for northwestfront.org (208.113.216.34)
- Host is up (0.0079s latency).
- rDNS record for 208.113.216.34: apache2-yak.francis-hopkinson.dreamhost.com
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp filtered pop3
- 143/tcp filtered imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.32 seconds
- #######################################################################################################################################
- [?] Enter the target: example( http://domain.com )
- http://northwestfront.org/about/
- [!] IP Address : 208.113.216.34
- [+] Operating System : Ubuntu
- [!] CMS Detected : WordPress
- [?] Would you like to use WPScan? [Y/n] n
- [+] Honeypot Probabilty: 30%
- ---------------------------------------------------------------------------------------------------------------------------------------
- [~] Trying to gather whois information for northwestfront.org
- [+] Whois information found
- [-] Unable to build response, visit https://who.is/whois/northwestfront.org
- ---------------------------------------------------------------------------------------------------------------------------------------
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp filtered pop3
- 143/tcp filtered imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.27 seconds
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] DNS Records
- ns3.dreamhost.com. (66.33.205.230) AS26347 New Dream Network, LLC United States
- ns2.dreamhost.com. (208.97.182.10) AS26347 New Dream Network, LLC United States
- ns1.dreamhost.com. (64.90.62.230) AS26347 New Dream Network, LLC United States
- [+] Host Records (A)
- www.northwestfront.orgHTTP: (apache2-yak.francis-hopkinson.dreamhost.com) (208.113.216.34) AS26347 New Dream Network, LLC United States
- [+] TXT Records
- [+] DNS Map: https://dnsdumpster.com/static/map/northwestfront.org.png
- [>] Initiating 3 intel modules
- [>] Loading Alpha module (1/3)
- [>] Beta module deployed (2/3)
- [>] Gamma module initiated (3/3)
- No emails found
- [+] Hosts found in search engines:
- ---------------------------------------------------------------------------------------------------------------------------------------
- [-] Resolving hostnames IPs...
- 208.113.216.34:www.northwestfront.org
- [+] Virtual hosts:
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- Reversing IP With HackTarget '208.113.216.34'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] barbiesbraidsandfades.com
- [+] breweries.punctuations.in
- [+] chasingopenspaces.com
- [+] chrismiolla.com
- [+] consultdesiree.com
- [+] creatingthenewlam.com
- [+] demaonaroda.2aces.com.br
- [+] dollaraminutewebsites.com
- [+] dollarmusicdownload.com
- [+] element17.com
- [+] hewncreative.com
- [+] iherebuywisely.com
- [+] inflatableadvertisingballoons.com
- [+] letchadhelp.com
- [+] light.pointflair.com
- [+] markephair.com
- [+] mofasme.org
- [+] moifde.com
- [+] moifde.markephair.com
- [+] nofucx.com
- [+] northwestfront.net
- [+] northwestfront.org
- [+] practicegratitude.org
- [+] sexpositivedictionary.com
- [+] sofrevolution.org
- [+] splintergrouptheatre.com
- [+] stephengaucher.com
- [+] work.armandobreceda.com
- [+] world-timelines.com
- [+] www.barbiesbraidsandfades.com
- [+] www.breweries.punctuations.in
- [+] www.element17.com
- [+] www.hewncreative.com
- [+] www.inflatableadvertisingballoons.com
- [+] www.light.pointflair.com
- [+] www.northwestfront.net
- [+] www.northwestfront.org
- [+] www.practicegratitude.org
- [+] www.sofrevolution.org
- [+] www.work.armandobreceda.com
- [+] www.world-timelines.com
- #######################################################################################################################################
- Reverse IP With YouGetSignal '208.113.216.34'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [*] IP: 208.113.216.34
- [*] Domain: 208.113.216.34
- [*] Total Domains: 5
- [+] barrettroadcapital.com
- [+] dollaraminutewebsites.com
- [+] hewncreative.com
- [+] thefashionnovella.com
- [+] www.lekrasa.com
- #######################################################################################################################################
- Geo IP Lookup '208.113.216.34'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] IP Address: 208.113.216.34
- [+] Country: United States
- [+] State: California
- [+] City: Brea
- [+] Latitude: 33.9291
- [+] Longitude: -117.8845
- #######################################################################################################################################
- Whois '208.113.216.34'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] #
- [+] # ARIN WHOIS data and services are subject to the Terms of Use
- [+] # available at: https://www.arin.net/whois_tou.html
- [+] #
- [+] # If you see inaccuracies in the results, please report at
- [+] # https://www.arin.net/resources/whois_reporting/index.html
- [+] #
- [+] # Copyright 1997-2019, American Registry for Internet Numbers, Ltd.
- [+] #
- [+] NetRange: 208.113.128.0 - 208.113.255.255
- [+] CIDR: 208.113.128.0/17
- [+] NetName: DREAMHOST-BLK6
- [+] NetHandle: NET-208-113-128-0-1
- [+] Parent: NET208 (NET-208-0-0-0-0)
- [+] NetType: Direct Allocation
- [+] OriginAS:
- [+] Organization: New Dream Network, LLC (NDN)
- [+] RegDate: 2006-04-12
- [+] Updated: 2012-03-02
- [+] Ref: https://rdap.arin.net/registry/ip/208.113.128.0
- [+] OrgName: New Dream Network, LLC
- [+] OrgId: NDN
- [+] Address: 417 Associated Rd.
- [+] Address: PMB #257
- [+] City: Brea
- [+] StateProv: CA
- [+] PostalCode: 92821
- [+] Country: US
- [+] RegDate: 2001-04-16
- [+] Updated: 2017-01-28
- [+] Comment: Address location was created regardless of geographic location.
- [+] Ref: https://rdap.arin.net/registry/entity/NDN
- [+] OrgNOCHandle: NETOP274-ARIN
- [+] OrgNOCName: NetOPs
- [+] OrgNOCPhone: +1-714-706-4182
- [+] OrgNOCEmail: netops@dreamhost.com
- [+] OrgNOCRef: https://rdap.arin.net/registry/entity/NETOP274-ARIN
- [+] OrgAbuseHandle: DAT5-ARIN
- [+] OrgAbuseName: DreamHost Abuse Team
- [+] OrgAbusePhone: +1-714-706-4182
- [+] OrgAbuseEmail: abuse@dreamhost.com
- [+] OrgAbuseRef: https://rdap.arin.net/registry/entity/DAT5-ARIN
- [+] OrgTechHandle: NETOP274-ARIN
- [+] OrgTechName: NetOPs
- [+] OrgTechPhone: +1-714-706-4182
- [+] OrgTechEmail: netops@dreamhost.com
- [+] OrgTechRef: https://rdap.arin.net/registry/entity/NETOP274-ARIN
- [+] #
- [+] # ARIN WHOIS data and services are subject to the Terms of Use
- [+] # available at: https://www.arin.net/whois_tou.html
- [+] #
- [+] # If you see inaccuracies in the results, please report at
- [+] # https://www.arin.net/resources/whois_reporting/index.html
- [+] #
- [+] # Copyright 1997-2019, American Registry for Internet Numbers, Ltd.
- [+] #
- #######################################################################################################################################
- Show HTTP Header '208.113.216.34'
- ---------------------------------------------------------------------------------------------------------------------------------------
- [+] HTTP/1.1 200 OK
- [+] Date: Mon, 11 Feb 2019 20:57:05 GMT
- [+] Server: Apache
- [+] Last-Modified: Sat, 01 Nov 2014 04:18:40 GMT
- [+] ETag: 304-506c4687e0800
- [+] Accept-Ranges: bytes
- [+] Content-Length: 772
- [+] Content-Type: text/html
- #######################################################################################################################################
- Port Scan '208.113.216.34'
- ---------------------------------------------------------------------------------------------------------------------------------------
- Starting Nmap 7.40 ( https://nmap.org ) at 2019-02-11 20:57 UTC
- Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- Host is up (0.0072s latency).
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 23/tcp filtered telnet
- 80/tcp open http
- 110/tcp filtered pop3
- 143/tcp filtered imap
- 443/tcp open https
- 3389/tcp filtered ms-wbt-server
- Nmap done: 1 IP address (1 host up) scanned in 1.26 seconds
- #######################################################################################################################################
- Traceroute '208.113.216.34'
- ---------------------------------------------------------------------------------------------------------------------------------------
- Start: 2019-02-11T20:57:11+0000
- HOST: web01 Loss% Snt Last Avg Best Wrst StDev
- 1.|-- 45.79.12.202 0.0% 3 0.6 1.2 0.6 2.2 0.9
- 2.|-- 45.79.12.6 0.0% 3 0.9 0.7 0.6 0.9 0.2
- 3.|-- 45.79.12.8 0.0% 3 0.9 0.8 0.8 0.9 0.0
- 4.|-- ae-37.a01.dllstx04.us.bb.gin.ntt.net 0.0% 3 4.0 2.8 2.1 4.0 1.1
- 5.|-- ae-9.r11.dllstx09.us.bb.gin.ntt.net 0.0% 3 39.6 39.5 39.2 39.6 0.3
- 6.|-- ae-0.r22.dllstx09.us.bb.gin.ntt.net 0.0% 3 1.7 2.0 1.4 2.7 0.7
- 7.|-- ae-1.r22.asbnva02.us.bb.gin.ntt.net 0.0% 3 39.1 40.1 39.1 42.1 1.8
- 8.|-- ae-1.r05.asbnva02.us.bb.gin.ntt.net 0.0% 3 39.3 39.3 39.1 39.3 0.1
- 9.|-- ae-0.a03.asbnva02.us.bb.gin.ntt.net 0.0% 3 40.2 39.5 39.1 40.2 0.5
- 10.|-- ae-0.dreamhost.asbnva02.us.bb.gin.ntt.net 0.0% 3 36.2 36.0 35.9 36.2 0.2
- 11.|-- ip-208-113-156-8.dreamhost.com 0.0% 3 41.1 41.2 41.1 41.3 0.1
- 12.|-- ip-208-113-156-14.dreamhost.com 0.0% 3 41.4 39.1 37.9 41.4 2.0
- 13.|-- apache2-yak.francis-hopkinson.dreamhost.com 0.0% 3 39.0 39.0 38.9 39.0 0.1
- #######################################################################################################################################
- Ping '208.113.216.34'
- ---------------------------------------------------------------------------------------------------------------------------------------
- Starting Nping 0.7.70 ( https://nmap.org/nping ) at 2019-02-11 20:57 UTC
- SENT (0.0030s) ICMP [104.237.144.6 > 208.113.216.34 Echo request (type=8/code=0) id=28373 seq=1] IP [ttl=64 id=63972 iplen=28 ]
- RCVD (0.2053s) ICMP [208.113.216.34 > 104.237.144.6 Echo reply (type=0/code=0) id=28373 seq=1] IP [ttl=53 id=47653 iplen=28 ]
- SENT (1.0033s) ICMP [104.237.144.6 > 208.113.216.34 Echo request (type=8/code=0) id=28373 seq=2] IP [ttl=64 id=63972 iplen=28 ]
- RCVD (1.0213s) ICMP [208.113.216.34 > 104.237.144.6 Echo reply (type=0/code=0) id=28373 seq=2] IP [ttl=53 id=47701 iplen=28 ]
- SENT (2.0054s) ICMP [104.237.144.6 > 208.113.216.34 Echo request (type=8/code=0) id=28373 seq=3] IP [ttl=64 id=63972 iplen=28 ]
- RCVD (2.0413s) ICMP [208.113.216.34 > 104.237.144.6 Echo reply (type=0/code=0) id=28373 seq=3] IP [ttl=53 id=47834 iplen=28 ]
- SENT (3.0074s) ICMP [104.237.144.6 > 208.113.216.34 Echo request (type=8/code=0) id=28373 seq=4] IP [ttl=64 id=63972 iplen=28 ]
- RCVD (3.0613s) ICMP [208.113.216.34 > 104.237.144.6 Echo reply (type=0/code=0) id=28373 seq=4] IP [ttl=53 id=47849 iplen=28 ]
- Max rtt: 202.363ms | Min rtt: 17.849ms | Avg rtt: 77.372ms
- Raw packets sent: 4 (112B) | Rcvd: 4 (184B) | Lost: 0 (0.00%)
- Nping done: 1 IP address pinged in 3.06 seconds
- #######################################################################################################################################
- [*] Performing General Enumeration of Domain: northwestfront.org
- [-] DNSSEC is not configured for northwestfront.org
- [*] SOA ns1.dreamhost.com 64.90.62.230
- [*] NS ns1.dreamhost.com 64.90.62.230
- [*] NS ns2.dreamhost.com 208.97.182.10
- [*] NS ns3.dreamhost.com 66.33.205.230
- [-] Could not Resolve MX Records for northwestfront.org
- [*] A northwestfront.org 208.113.216.34
- [*] Enumerating SRV Records
- [-] No SRV Records Found for northwestfront.org
- [+] 0 Records Found
- #######################################################################################################################################
- rocessing domain northwestfront.org
- [*] Using system resolvers ['38.132.106.139', '194.187.251.67', '185.93.180.131', '205.151.67.6', '205.151.67.34', '205.151.67.2', '2001:18c0:ffe0:2::2', '2001:18c0:ffe0:3::2', '2001:18c0:ffe0:1::2']
- [+] Getting nameservers
- 64.90.62.230 - ns1.dreamhost.com
- 208.97.182.10 - ns2.dreamhost.com
- 66.33.205.230 - ns3.dreamhost.com
- [-] Zone transfer failed
- [*] Scanning northwestfront.org for A records
- 208.113.216.34 - northwestfront.org
- 216.58.193.179 - calendar.northwestfront.org
- 216.58.193.179 - docs.northwestfront.org
- 208.113.216.34 - ftp.northwestfront.org
- 216.58.193.179 - sites.northwestfront.org
- 208.113.216.34 - ssh.northwestfront.org
- 216.58.193.179 - start.northwestfront.org
- 208.113.216.34 - www.northwestfront.org
- #######################################################################################################################################
- Ip Address Status Type Domain Name Server
- ---------- ------ ---- ----------- ------
- 216.58.193.179 404 alias calendar.northwestfront.org ghs
- 216.58.193.179 404 host ghs.googlehosted.com ghs
- 216.58.193.179 404 alias docs.northwestfront.org ghs
- 216.58.193.179 404 host ghs.googlehosted.com ghs
- 208.113.216.34 200 host ftp.northwestfront.org
- 208.113.216.34 200 host ssh.northwestfront.org
- 216.58.193.179 404 alias start.northwestfront.org ghs
- 216.58.193.179 404 host ghs.googlehosted.com ghs
- 208.113.216.34 403 host www.northwestfront.org
- #######################################################################################################################################
- www.northwestfront.org 208.113.216.34
- [+] Dns resolving
- Domain name Ip address Name server
- northwestfront.org 208.113.216.34 apache2-yak.francis-hopkinson.dreamhost.com
- Found 1 host(s) for northwestfront.org
- [+] Testing wildcard
- Ok, no wildcard found.
- [+] Scanning for subdomain on northwestfront.org
- [!] Wordlist not specified. I scannig with my internal wordlist...
- Estimated time about 108.71 seconds
- Subdomain Ip address Name server
- calendar.northwestfront.org 216.58.193.179 atl26s15-in-f19.1e100.net
- docs.northwestfront.org 216.58.193.179 atl26s15-in-f19.1e100.net
- ftp.northwestfront.org 208.113.216.34 apache2-yak.francis-hopkinson.dreamhost.com
- ssh.northwestfront.org 208.113.216.34 apache2-yak.francis-hopkinson.dreamhost.com
- start.northwestfront.org 216.58.193.179 atl26s15-in-f19.1e100.net
- www.northwestfront.org 208.113.216.34 apache2-yak.francis-hopkinson.dreamhost.com
- #######################################################################################################################################
- dnsenum VERSION:1.2.4
- ----- northwestfront.org -----
- Host's addresses:
- __________________
- northwestfront.org. 11369 IN A 208.113.216.34
- Name Servers:
- ______________
- ns3.dreamhost.com. 86360 IN A 66.33.205.230
- ns2.dreamhost.com. 86360 IN A 208.97.182.10
- ns1.dreamhost.com. 86398 IN A 64.90.62.230
- Mail (MX) Servers:
- ___________________
- Trying Zone Transfers and getting Bind Versions:
- _________________________________________________
- Trying Zone Transfer for northwestfront.org on ns3.dreamhost.com ...
- Trying Zone Transfer for northwestfront.org on ns2.dreamhost.com ...
- Trying Zone Transfer for northwestfront.org on ns1.dreamhost.com ...
- brute force file not specified, bay.
- #######################################################################################################################################
- Domain Name: NORTHWESTFRONT.ORG
- Registry Domain ID: D156669153-LROR
- Registrar WHOIS Server: whois.dreamhost.com
- Registrar URL: http://www.dreamhost.com/
- Updated Date: 2018-06-15T07:21:05Z
- Creation Date: 2009-07-17T04:16:48Z
- Registry Expiry Date: 2019-07-17T04:16:48Z
- Registrar Registration Expiration Date:
- Registrar: New Dream Network, LLC dba DreamHost Web Hosting
- Registrar IANA ID: 431
- Registrar Abuse Contact Email: abuse@dreamhost.com
- Registrar Abuse Contact Phone: +213.2719359
- Reseller:
- Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
- Registrant Organization: Proxy Protection LLC
- Registrant State/Province: CA
- Registrant Country: US
- Name Server: NS1.DREAMHOST.COM
- Name Server: NS2.DREAMHOST.COM
- Name Server: NS3.DREAMHOST.COM
- DNSSEC: unsigned
- URL of the ICANN Whois Inaccuracy Complaint Form https://www.icann.org/wicf/)
- >>> Last update of WHOIS database: 2019-02-11T20:58:29Z <<<
- #######################################################################################################################################
- ____ _ _ _ _ _____
- / ___| _ _| |__ | (_)___| |_|___ / _ __
- \___ \| | | | '_ \| | / __| __| |_ \| '__|
- ___) | |_| | |_) | | \__ \ |_ ___) | |
- |____/ \__,_|_.__/|_|_|___/\__|____/|_|
- # Coded By Ahmed Aboul-Ela - @aboul3la
- [-] Enumerating subdomains now for northwestfront.org
- [-] verbosity is enabled, will show the subdomains results in realtime
- [-] Searching now in Baidu..
- [-] Searching now in Yahoo..
- [-] Searching now in Google..
- [-] Searching now in Bing..
- [-] Searching now in Ask..
- [-] Searching now in Netcraft..
- [-] Searching now in DNSdumpster..
- [-] Searching now in Virustotal..
- [-] Searching now in ThreatCrowd..
- [-] Searching now in SSL Certificates..
- [-] Searching now in PassiveDNS..
- Virustotal: www.northwestfront.org
- SSL Certificates: www.northwestfront.org
- DNSdumpster: www.northwestfront.org
- [-] Saving results to file: /usr/share/sniper/loot//domains/domains-northwestfront.org.txt
- [-] Total Unique Subdomains Found: 1
- www.northwestfront.org
- #######################################################################################################################################
- www.northwestfront.org,208.113.216.34
- northwestfront.org,208.113.216.34
- ftp.northwestfront.org,208.113.216.34
- ssh.northwestfront.org,208.113.216.34
- calendar.northwestfront.org,172.217.29.51,2607:f8b0:4006:819::2013
- docs.northwestfront.org,172.217.29.51,2607:f8b0:4006:819::2013
- start.northwestfront.org,172.217.29.51,2607:f8b0:4006:819::2013
- #######################################################################################################################################
- ===============================================
- -=Subfinder v1.1.3 github.com/subfinder/subfinder
- ===============================================
- Running Source: Ask
- Running Source: Archive.is
- Running Source: Baidu
- Running Source: Bing
- Running Source: CertDB
- Running Source: CertificateTransparency
- Running Source: Certspotter
- Running Source: Commoncrawl
- Running Source: Crt.sh
- Running Source: Dnsdb
- Running Source: DNSDumpster
- Running Source: DNSTable
- Running Source: Dogpile
- Running Source: Exalead
- Running Source: Findsubdomains
- Running Source: Googleter
- Running Source: Hackertarget
- Running Source: Ipv4Info
- Running Source: PTRArchive
- Running Source: Sitedossier
- Running Source: Threatcrowd
- Running Source: ThreatMiner
- Running Source: WaybackArchive
- Running Source: Yahoo
- Running enumeration on northwestfront.org
- dnsdb: Unexpected return status 503
- waybackarchive: Get https://web.archive.org/cdx/search/cdx?url=*.northwestfront.org/*&output=json&fl=original&collapse=urlkey&page=: net/http: invalid header field value "http://web.archive.org/cdx/search/cdx?url=*.northwestfront.org/*&output=json&fl=original&collapse=urlkey&page=\x00" for key Referer
- baidu: net/http: request canceled (Client.Timeout exceeded while reading body)
- Starting Bruteforcing of northwestfront.org with 9985 words
- Total 9 Unique subdomains found for northwestfront.org
- .northwestfront.org
- calendar.northwestfront.org
- docs.northwestfront.org
- ftp.northwestfront.org
- sites.northwestfront.org
- ssh.northwestfront.org
- start.northwestfront.org
- www.northwestfront.org
- www.northwestfront.org
- #######################################################################################################################################
- [+] northwestfront.org has no SPF record!
- [*] No DMARC record found. Looking for organizational record
- [+] No organizational DMARC record
- [+] Spoofing possible for northwestfront.org!
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 16:16 EST
- Nmap scan report for northwestfront.org (208.113.216.34)
- Host is up (0.15s latency).
- rDNS record for 208.113.216.34: apache2-yak.francis-hopkinson.dreamhost.com
- Not shown: 467 filtered ports, 4 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 21/tcp open ftp
- 22/tcp open ssh
- 80/tcp open http
- 443/tcp open https
- 587/tcp open submission
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 16:16 EST
- Nmap scan report for northwestfront.org (208.113.216.34)
- Host is up (0.20s latency).
- rDNS record for 208.113.216.34: apache2-yak.francis-hopkinson.dreamhost.com
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 16:16 EST
- Nmap scan report for northwestfront.org (208.113.216.34)
- Host is up (0.21s latency).
- rDNS record for 208.113.216.34: apache2-yak.francis-hopkinson.dreamhost.com
- PORT STATE SERVICE VERSION
- 21/tcp open ftp ProFTPD
- Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
- Device type: general purpose
- Running (JUST GUESSING): Linux 4.X|3.X|2.6.X (91%)
- OS CPE: cpe:/o:linux:linux_kernel:4.9 cpe:/o:linux:linux_kernel:3.18 cpe:/o:linux:linux_kernel:2.6
- Aggressive OS guesses: Linux 4.9 (91%), Linux 3.18 (88%), Linux 2.6.18 - 2.6.22 (86%), Linux 3.12 - 4.10 (85%), Linux 3.16 (85%)
- No exact OS matches for host (test conditions non-ideal).
- Network Distance: 17 hops
- TRACEROUTE (using port 21/tcp)
- HOP RTT ADDRESS
- 1 124.92 ms 10.247.200.1
- 2 124.95 ms 190.124.251.129
- 3 124.97 ms 172.16.21.1
- 4 184.97 ms ip4-91-205-233-128.rdns.racklodge.com (91.205.233.128)
- 5 185.53 ms 192.168.7.2
- 6 185.51 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
- 7 185.84 ms core3.t6-2.bbnet2.mia003.pnap.net (69.25.0.67)
- 8 185.56 ms te0-3-0-14.ccr21.mia03.atlas.cogentco.com (38.88.164.137)
- 9 185.88 ms be3400.ccr21.mia01.atlas.cogentco.com (154.54.47.17)
- 10 199.45 ms be3482.ccr41.atl01.atlas.cogentco.com (154.54.24.145)
- 11 210.66 ms 154.54.24.221
- 12 211.22 ms be3084.ccr41.iad02.atlas.cogentco.com (154.54.30.66)
- 13 211.24 ms be3563.rcr51.b037327-0.iad02.atlas.cogentco.com (154.54.25.226)
- 14 210.80 ms 38.122.62.254
- 15 214.27 ms 208.113.156.8
- 16 212.69 ms ip-208-113-156-14.dreamhost.com (208.113.156.14)
- 17 210.70 ms apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 16:27 EST
- Nmap scan report for northwestfront.org (208.113.216.34)
- Host is up (0.21s latency).
- rDNS record for 208.113.216.34: apache2-yak.francis-hopkinson.dreamhost.com
- PORT STATE SERVICE VERSION
- 22/tcp filtered ssh
- Too many fingerprints match this host to give specific OS details
- Network Distance: 17 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 126.43 ms 10.247.200.1
- 2 126.47 ms 190.124.251.129
- 3 126.50 ms 172.16.21.1
- 4 186.61 ms ip4-91-205-233-128.rdns.racklodge.com (91.205.233.128)
- 5 186.97 ms 192.168.7.2
- 6 190.18 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
- 7 187.64 ms 69.25.0.3
- 8 187.20 ms te0-3-0-14.ccr21.mia03.atlas.cogentco.com (38.88.164.137)
- 9 187.20 ms be3401.ccr22.mia01.atlas.cogentco.com (154.54.47.29)
- 10 201.06 ms be3483.ccr42.atl01.atlas.cogentco.com (154.54.28.49)
- 11 210.15 ms 154.54.24.221
- 12 210.64 ms be3084.ccr41.iad02.atlas.cogentco.com (154.54.30.66)
- 13 210.94 ms be3562.rcr51.b037327-0.iad02.atlas.cogentco.com (154.54.24.234)
- 14 210.04 ms 38.122.62.254
- 15 211.96 ms ip-208-113-156-8.dreamhost.com (208.113.156.8)
- 16 212.43 ms ip-208-113-156-14.dreamhost.com (208.113.156.14)
- 17 211.39 ms apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- #######################################################################################################################################
- USER_FILE => /usr/share/brutex/wordlists/simple-users.txt
- RHOSTS => northwestfront.org
- RHOST => northwestfront.org
- [*] 208.113.216.34:22 - SSH - Using malformed packet technique
- [*] 208.113.216.34:22 - SSH - Starting scan
- [-] 208.113.216.34:22 - SSH - User 'admin' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'administrator' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'anonymous' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'backup' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'bee' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'ftp' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'guest' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'GUEST' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'info' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'mail' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'mailadmin' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'msfadmin' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'mysql' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'nobody' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'oracle' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'owaspbwa' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'postfix' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'postgres' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'private' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'proftpd' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'public' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'root' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'superadmin' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'support' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'sys' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'system' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'systemadmin' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'systemadministrator' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'test' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'tomcat' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'user' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'webmaster' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'www-data' on could not connect
- [-] 208.113.216.34:22 - SSH - User 'Fortimanager_Access' on could not connect
- [*] Scanned 1 of 1 hosts (100% complete)
- [*] Auxiliary module execution completed
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://northwestfront.org...
- _____________________ SITE INFO ______________________
- IP Title
- 208.113.216.34 403 Forbidden
- ______________________ VERSION _______________________
- Name Versions Type
- ____________________ INTERESTING _____________________
- URL Note Type
- /readme.html Readme file Interesting
- /install.php Installation file Interesting
- /test.php Test file Interesting
- ______________________________________________________
- Time: 65.9 sec Urls: 598 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 403 Forbidden
- Date: Mon, 11 Feb 2019 21:38:04 GMT
- Vary: Accept-Encoding
- Content-Encoding: gzip
- Content-Length: 20
- Content-Type: text/html; charset=iso-8859-1
- Connection: keep-alive
- HTTP/1.1 403 Forbidden
- Date: Mon, 11 Feb 2019 21:38:05 GMT
- Vary: Accept-Encoding
- Content-Encoding: gzip
- Content-Length: 20
- Content-Type: text/html; charset=iso-8859-1
- Connection: keep-alive
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:08 EST
- Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- Host is up (0.19s latency).
- Not shown: 471 filtered ports, 4 closed ports
- Some closed ports may be reported as filtered due to --defeat-rst-ratelimit
- PORT STATE SERVICE
- 80/tcp open http
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:08 EST
- Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- Host is up (0.14s latency).
- Not shown: 2 filtered ports
- PORT STATE SERVICE
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open ntp
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:08 EST
- Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 67/udp open|filtered dhcps
- |_dhcp-discover: ERROR: Script execution failed (use -d to debug)
- Too many fingerprints match this host to give specific OS details
- Network Distance: 17 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 125.29 ms 10.247.200.1
- 2 126.12 ms 190.124.251.129
- 3 126.17 ms 172.16.21.1
- 4 185.59 ms ip4-91-205-233-128.rdns.racklodge.com (91.205.233.128)
- 5 185.64 ms 192.168.7.2
- 6 186.55 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
- 7 186.62 ms 69.25.0.3
- 8 186.61 ms te0-3-0-14.ccr21.mia03.atlas.cogentco.com (38.88.164.137)
- 9 186.66 ms be3401.ccr22.mia01.atlas.cogentco.com (154.54.47.29)
- 10 200.44 ms be3483.ccr42.atl01.atlas.cogentco.com (154.54.28.49)
- 11 210.26 ms 154.54.24.221
- 12 210.80 ms be3084.ccr41.iad02.atlas.cogentco.com (154.54.30.66)
- 13 211.57 ms be3562.rcr51.b037327-0.iad02.atlas.cogentco.com (154.54.24.234)
- 14 212.28 ms 38.122.62.254
- 15 213.99 ms ip-208-113-156-8.dreamhost.com (208.113.156.8)
- 16 216.84 ms ip-208-113-156-14.dreamhost.com (208.113.156.14)
- 17 213.65 ms apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:10 EST
- Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 68/udp open|filtered dhcpc
- Too many fingerprints match this host to give specific OS details
- Network Distance: 17 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 125.25 ms 10.247.200.1
- 2 125.29 ms 190.124.251.129
- 3 125.49 ms 172.16.21.1
- 4 185.72 ms ip4-91-205-233-128.rdns.racklodge.com (91.205.233.128)
- 5 185.75 ms 192.168.7.2
- 6 185.77 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
- 7 186.15 ms 69.25.0.3
- 8 185.95 ms te0-3-0-14.ccr21.mia03.atlas.cogentco.com (38.88.164.137)
- 9 185.94 ms be3401.ccr22.mia01.atlas.cogentco.com (154.54.47.29)
- 10 199.61 ms be3483.ccr42.atl01.atlas.cogentco.com (154.54.28.49)
- 11 210.27 ms 154.54.24.221
- 12 211.44 ms be3084.ccr41.iad02.atlas.cogentco.com (154.54.30.66)
- 13 211.46 ms be3562.rcr51.b037327-0.iad02.atlas.cogentco.com (154.54.24.234)
- 14 210.58 ms 38.122.62.254
- 15 213.94 ms ip-208-113-156-8.dreamhost.com (208.113.156.8)
- 16 212.71 ms ip-208-113-156-14.dreamhost.com (208.113.156.14)
- 17 212.14 ms apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:12 EST
- Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 69/udp open|filtered tftp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 17 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 125.76 ms 10.247.200.1
- 2 125.81 ms 190.124.251.129
- 3 125.80 ms 172.16.21.1
- 4 186.40 ms ip4-91-205-233-128.rdns.racklodge.com (91.205.233.128)
- 5 186.44 ms 192.168.7.2
- 6 186.47 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
- 7 188.46 ms 69.25.0.3
- 8 186.52 ms te0-3-0-14.ccr21.mia03.atlas.cogentco.com (38.88.164.137)
- 9 186.50 ms be3401.ccr22.mia01.atlas.cogentco.com (154.54.47.29)
- 10 200.49 ms be3483.ccr42.atl01.atlas.cogentco.com (154.54.28.49)
- 11 208.89 ms 154.54.24.221
- 12 210.07 ms be3084.ccr41.iad02.atlas.cogentco.com (154.54.30.66)
- 13 210.03 ms be3562.rcr51.b037327-0.iad02.atlas.cogentco.com (154.54.24.234)
- 14 212.50 ms 38.122.62.254
- 15 213.31 ms ip-208-113-156-8.dreamhost.com (208.113.156.8)
- 16 212.48 ms ip-208-113-156-14.dreamhost.com (208.113.156.14)
- 17 212.06 ms apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- #######################################################################################################################################
- wig - WebApp Information Gatherer
- Scanning http://208.113.216.34...
- _________________ SITE INFO __________________
- IP Title
- 208.113.216.34 Site not found · Drea
- __________________ VERSION ___________________
- Name Versions Type
- ______________________________________________
- Time: 34.5 sec Urls: 598 Fingerprints: 40401
- #######################################################################################################################################
- HTTP/1.1 200 OK
- Date: Mon, 11 Feb 2019 22:15:56 GMT
- Last-Modified: Sat, 01 Nov 2014 04:18:40 GMT
- ETag: "304-506c4687e0800"
- Accept-Ranges: bytes
- Content-Length: 772
- Content-Type: text/html
- Connection: keep-alive
- HTTP/1.1 200 OK
- Date: Mon, 11 Feb 2019 22:15:56 GMT
- Last-Modified: Sat, 01 Nov 2014 04:18:40 GMT
- ETag: "304-506c4687e0800"
- Accept-Ranges: bytes
- Content-Length: 772
- Content-Type: text/html
- Connection: keep-alive
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:16 EST
- Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- Host is up (0.21s latency).
- PORT STATE SERVICE VERSION
- 123/udp open ntp NTP v4 (secondary server)
- | ntp-info:
- |_ receive time stamp: 2019-02-11T22:16:27
- Too many fingerprints match this host to give specific OS details
- Network Distance: 17 hops
- TRACEROUTE (using port 123/udp)
- HOP RTT ADDRESS
- 1 126.32 ms 10.247.200.1
- 2 126.37 ms 190.124.251.129
- 3 126.40 ms 172.16.21.1
- 4 186.34 ms ip4-91-205-233-128.rdns.racklodge.com (91.205.233.128)
- 5 186.75 ms 192.168.7.2
- 6 186.80 ms 63.251.152.229
- 7 187.10 ms core3.t6-2.bbnet2.mia003.pnap.net (69.25.0.67)
- 8 188.39 ms te0-0-0-12.ccr21.mia03.atlas.cogentco.com (38.104.94.97)
- 9 187.10 ms 154.54.47.17
- 10 200.68 ms be3482.ccr41.atl01.atlas.cogentco.com (154.54.24.145)
- 11 208.90 ms be2113.ccr42.dca01.atlas.cogentco.com (154.54.24.221)
- 12 210.68 ms be3084.ccr41.iad02.atlas.cogentco.com (154.54.30.66)
- 13 210.70 ms be3563.rcr51.b037327-0.iad02.atlas.cogentco.com (154.54.25.226)
- 14 211.85 ms 38.122.62.254
- 15 ... 16
- 17 217.18 ms apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:16 EST
- Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- Host is up (0.17s latency).
- PORT STATE SERVICE VERSION
- 161/tcp closed snmp
- 161/udp open|filtered snmp
- Too many fingerprints match this host to give specific OS details
- Network Distance: 17 hops
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 125.55 ms 10.247.200.1
- 2 125.59 ms 190.124.251.129
- 3 125.62 ms 172.16.21.1
- 4 186.27 ms ip4-91-205-233-128.rdns.racklodge.com (91.205.233.128)
- 5 186.30 ms 192.168.7.2
- 6 186.30 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
- 7 186.32 ms 69.25.0.3
- 8 186.33 ms te0-3-0-14.ccr21.mia03.atlas.cogentco.com (38.88.164.137)
- 9 186.33 ms be3401.ccr22.mia01.atlas.cogentco.com (154.54.47.29)
- 10 199.77 ms be3483.ccr42.atl01.atlas.cogentco.com (154.54.28.49)
- 11 210.71 ms 154.54.24.221
- 12 218.95 ms be3084.ccr41.iad02.atlas.cogentco.com (154.54.30.66)
- 13 218.92 ms be3562.rcr51.b037327-0.iad02.atlas.cogentco.com (154.54.24.234)
- 14 211.27 ms 38.122.62.254
- 15 212.89 ms ip-208-113-156-8.dreamhost.com (208.113.156.8)
- 16 212.86 ms ip-208-113-156-14.dreamhost.com (208.113.156.14)
- 17 212.51 ms apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:22 EST
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- Initiating NSE at 17:22
- Completed NSE at 17:22, 0.00s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating NSE at 17:22
- Completed NSE at 17:22, 0.00s elapsed
- Initiating Ping Scan at 17:22
- Scanning 208.113.216.34 [4 ports]
- Completed Ping Scan at 17:22, 0.17s elapsed (1 total hosts)
- Initiating Parallel DNS resolution of 1 host. at 17:22
- Completed Parallel DNS resolution of 1 host. at 17:22, 0.02s elapsed
- Initiating Connect Scan at 17:22
- Scanning apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34) [1000 ports]
- Discovered open port 80/tcp on 208.113.216.34
- Discovered open port 587/tcp on 208.113.216.34
- Discovered open port 22/tcp on 208.113.216.34
- Discovered open port 443/tcp on 208.113.216.34
- Discovered open port 21/tcp on 208.113.216.34
- Discovered open port 5269/tcp on 208.113.216.34
- Discovered open port 5222/tcp on 208.113.216.34
- Completed Connect Scan at 17:22, 10.01s elapsed (1000 total ports)
- Initiating Service scan at 17:22
- Scanning 7 services on apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- Completed Service scan at 17:23, 19.86s elapsed (7 services on 1 host)
- Initiating OS detection (try #1) against apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- Retrying OS detection (try #2) against apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- Initiating Traceroute at 17:23
- Completed Traceroute at 17:23, 0.41s elapsed
- Initiating Parallel DNS resolution of 17 hosts. at 17:23
- Completed Parallel DNS resolution of 17 hosts. at 17:23, 16.50s elapsed
- NSE: Script scanning 208.113.216.34.
- NSE: Starting runlevel 1 (of 2) scan.
- Initiating NSE at 17:23
- Completed NSE at 17:23, 9.77s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating NSE at 17:23
- Completed NSE at 17:23, 0.00s elapsed
- Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- Host is up, received reset ttl 64 (0.19s latency).
- Scanned at 2019-02-11 17:22:35 EST for 63s
- Not shown: 989 filtered ports
- Reason: 989 no-responses
- PORT STATE SERVICE REASON VERSION
- 21/tcp open ftp syn-ack ProFTPD
- 22/tcp open ssh syn-ack OpenSSH 6.6.1p1 Ubuntu 2ubuntu2.10 (Ubuntu Linux; protocol 2.0)
- | ssh-hostkey:
- | 2048 5e:3f:5b:3d:3a:0e:5a:c3:4b:d4:3c:b0:d6:84:09:cc (RSA)
- | ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDX0xx84Eh1Qik2a9e3Wr7Kv4EvSby4ECQuaIaGF6CF6U3NbFKdYo1p+UEaZtGc0l85lpImTqoV6NvaDgcEtQ3sxwYgmXOpQozFX9ValDJmJMnX5p98OEOuOJYx3pLjw4m6Xki7qO6cm4pxHvwCo8O3MGZWulB9uM/jEJTYZBC+x/dtNzw7hF018TLcJajO3Oa9ZDv3BfYtyeKO1Fef4lepO9vTf0xXEE9nc+7BDSnw/c6K0k7lbgxLDY+kFpIUVV7pHptvdiSak79G7bJOA+EbOXH0PKPXpzSIFZ/mhWED2weHlw/2UIyAQrswL+Ct4vyxuJYUaXj74B4ssXsyn2fb
- | 256 d8:77:c4:31:5f:ca:96:9d:69:f4:d0:3f:bc:75:64:2e (ECDSA)
- | ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBGAW1wmsEU0YnUOcUVAYmoy9n4r5Qu6ZEEmhMqDjwHmopNr7SbB6q6XnI2YBVGEm5rTiW7fkAI7TrlCnTeTpBrE=
- | 256 e6:fc:5b:f8:3e:b6:85:1c:4d:20:bc:d4:8f:97:b4:9d (ED25519)
- |_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIINQ45+tKRPtpQTyTbtEQE7PqiR6RJJOLoRZLfSF5Hq2
- 25/tcp closed smtp conn-refused
- 80/tcp open http syn-ack Fortinet FortiGate 50B or FortiWifi 60C or 80C firewall http config
- |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-title: Site not found · DreamHost
- 113/tcp closed ident conn-refused
- 139/tcp closed netbios-ssn conn-refused
- 443/tcp open ssl/http syn-ack Apache httpd
- |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
- | http-methods:
- |_ Supported Methods: GET HEAD POST OPTIONS
- |_http-server-header: Apache
- |_http-title: Site not found · DreamHost
- | ssl-cert: Subject: commonName=sni.dreamhost.com/organizationName=DreamHost/stateOrProvinceName=California/countryName=US
- | Issuer: commonName=sni.dreamhost.com/organizationName=DreamHost/stateOrProvinceName=California/countryName=US
- | Public Key type: rsa
- | Public Key bits: 2048
- | Signature Algorithm: sha256WithRSAEncryption
- | Not valid before: 2015-08-11T18:24:23
- | Not valid after: 2025-08-08T18:24:23
- | MD5: df80 e5e1 75da fd00 a477 23e0 e5d6 2cdd
- | SHA-1: 8b96 6933 27a2 6e1e 520f 8944 76c5 e7a6 de0c 16f4
- | -----BEGIN CERTIFICATE-----
- | MIIDMzCCAhugAwIBAgIFC63A/+4wDQYJKoZIhvcNAQELBQAwUjELMAkGA1UEBhMC
- | VVMxEzARBgNVBAgTCkNhbGlmb3JuaWExEjAQBgNVBAoTCURyZWFtSG9zdDEaMBgG
- | A1UEAxMRc25pLmRyZWFtaG9zdC5jb20wHhcNMTUwODExMTgyNDIzWhcNMjUwODA4
- | MTgyNDIzWjBSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKQ2FsaWZvcm5pYTESMBAG
- | A1UEChMJRHJlYW1Ib3N0MRowGAYDVQQDExFzbmkuZHJlYW1ob3N0LmNvbTCCASIw
- | DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMEh9sgtRCFszuREKT39vltI1TKP
- | +b551pI82eIpoihL+eiNuNRBFaF5CjTOg/KSNRRkoReZ6SES+1Tp800FJ90stxyF
- | zHjQRBqLloD+RpY9ppNN6ZZicpW2t4Tz1SES/Uxd/F3QwQI6TOsvw36bUViQWNIY
- | Hn37aiXJZSESzSk+TtHXfnhGpNMMZ61XhhhiwLld4JTvFAyK1v7caDzCraOeH2BW
- | 2fPVfjuPazsIQxxUgYo4PZUGP7Wmn0Qn3A+pcKoGx4MXTLJFC2ONYFij0uAJwHFI
- | 0rmoyNqDG0n7USH2O4knieeMsW2uK3CqQeBBJ+1x+Wc8ry41x9ZQaR6OAXMCAwEA
- | AaMQMA4wDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAQEApR1q7iTcLuKr
- | vlz3C0AlOl4qW63JqYrxHzswEvN4J2ggzZUOMMgymS0TaKVKNzySGeHfWZcHBRNl
- | Bg1y90GetANqU+b2aDp0udc8c3BPgkOuJQqyGdTb2g+ea3OKohK+DyXej7m3YbQp
- | xEAMpBuiTHLVVayro538KSJDRo3uSfsLxGYmaGTvm1ef1yIcrTdwiznhv+jOzjx/
- | 0pSugUe1EsiT8hn97192OLChE0PJ31EyWdtn4hKUMQyBgDiJUHERxCuJ0JkpjisZ
- | ZYKjhdv54rK02pBwKQL5Z/VOXTBhVb/43QbiqCn12iCox4kNV6ZftUEJwK+trpqd
- | hFsA0wClCg==
- |_-----END CERTIFICATE-----
- |_ssl-date: TLS randomness does not represent time
- 445/tcp closed microsoft-ds conn-refused
- 587/tcp open smtp syn-ack Postfix smtpd
- |_smtp-commands: francis-hopkinson.dreamhost.com, PIPELINING, SIZE 40960000, ETRN, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
- 5222/tcp open jabber syn-ack ejabberd (Protocol 1.0)
- | xmpp-info:
- | STARTTLS Failed
- | info:
- | unknown:
- |
- | capabilities:
- |
- | errors:
- | host-unknown
- | (timeout)
- | stream_id: 3720117678
- | xmpp:
- | lang: en
- | server name: francis-hopkinson.dreamhost.com
- | version: (none)
- | compression_methods:
- |
- | features:
- |
- |_ auth_mechanisms:
- 5269/tcp open jabber syn-ack ejabberd
- | xmpp-info:
- | Ignores server name
- | info:
- | xmpp:
- | version: 1.0
- | capabilities:
- |
- | pre_tls:
- | xmpp:
- |
- | capabilities:
- |
- | features:
- | TLS (required)
- | post_tls:
- | xmpp:
- |
- |_ capabilities:
- Device type: general purpose|WAP|storage-misc|media device
- Running (JUST GUESSING): Linux 2.6.X|4.X|3.X|2.4.X (92%), HP embedded (85%)
- OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:4.9 cpe:/o:linux:linux_kernel:3.18 cpe:/o:linux:linux_kernel:2.4 cpe:/o:linux:linux_kernel:2.6.22 cpe:/h:hp:p2000_g3
- OS fingerprint not ideal because: Didn't receive UDP response. Please try again with -sSU
- Aggressive OS guesses: Linux 2.6.18 - 2.6.22 (92%), Linux 4.9 (87%), Linux 3.18 (86%), OpenWrt 0.9 - 7.09 (Linux 2.4.30 - 2.4.34) (86%), OpenWrt White Russian 0.9 (Linux 2.4.30) (86%), OpenWrt Kamikaze 7.09 (Linux 2.6.22) (86%), HP P2000 G3 NAS device (85%), Linux 2.6.32 (85%), ProVision-ISR security DVR (85%)
- No exact OS matches for host (test conditions non-ideal).
- TCP/IP fingerprint:
- SCAN(V=7.70%E=4%D=2/11%OT=21%CT=25%CU=%PV=N%DS=17%DC=T%G=N%TM=5C61F5EA%P=x86_64-pc-linux-gnu)
- SEQ(SP=106%GCD=1%ISR=10D%TI=Z%CI=Z%II=I%TS=U)
- OPS(O1=M4B3NNSNWA%O2=M4B3NNSNWA%O3=M4B3NWA%O4=M4B3NNSNWA%O5=M4B3NNSNWA%O6=M4B3NNS)
- WIN(W1=7210%W2=7210%W3=7210%W4=7210%W5=7210%W6=7210)
- ECN(R=Y%DF=Y%TG=40%W=7210%O=M4B3NNSNWA%CC=Y%Q=)
- T1(R=Y%DF=Y%TG=40%S=O%A=S+%F=AS%RD=0%Q=)
- T2(R=N)
- T3(R=N)
- T4(R=N)
- T5(R=Y%DF=Y%TG=40%W=0%S=Z%A=S+%F=AR%O=%RD=0%Q=)
- T6(R=Y%DF=Y%TG=40%W=0%S=A%A=Z%F=R%O=%RD=0%Q=)
- T7(R=N)
- U1(R=N)
- IE(R=Y%DFI=N%TG=40%CD=S)
- Network Distance: 17 hops
- TCP Sequence Prediction: Difficulty=262 (Good luck!)
- IP ID Sequence Generation: All zeros
- Service Info: Host: francis-hopkinson.dreamhost.com; OSs: Linux, FortiOS; Device: firewall; CPE: cpe:/o:linux:linux_kernel, cpe:/h:fortinet:fortiwifi:80c
- TRACEROUTE (using proto 1/icmp)
- HOP RTT ADDRESS
- 1 124.36 ms 10.247.200.1
- 2 124.41 ms 190.124.251.129
- 3 124.44 ms 172.16.21.1
- 4 184.45 ms ip4-91-205-233-128.rdns.racklodge.com (91.205.233.128)
- 5 185.31 ms 192.168.7.2
- 6 184.50 ms edge2.xe0-0-14.globalmarket-4.mia007.pnap.net (63.251.152.229)
- 7 185.36 ms 69.25.0.3
- 8 185.35 ms te0-3-0-14.ccr21.mia03.atlas.cogentco.com (38.88.164.137)
- 9 185.30 ms be3401.ccr22.mia01.atlas.cogentco.com (154.54.47.29)
- 10 199.15 ms be3483.ccr42.atl01.atlas.cogentco.com (154.54.28.49)
- 11 211.49 ms 154.54.24.221
- 12 212.21 ms be3084.ccr41.iad02.atlas.cogentco.com (154.54.30.66)
- 13 212.15 ms be3562.rcr51.b037327-0.iad02.atlas.cogentco.com (154.54.24.234)
- 14 212.16 ms 38.122.62.254
- 15 213.53 ms ip-208-113-156-8.dreamhost.com (208.113.156.8)
- 16 213.88 ms ip-208-113-156-14.dreamhost.com (208.113.156.14)
- 17 212.59 ms apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- NSE: Script Post-scanning.
- NSE: Starting runlevel 1 (of 2) scan.
- Initiating NSE at 17:23
- Completed NSE at 17:23, 0.00s elapsed
- NSE: Starting runlevel 2 (of 2) scan.
- Initiating NSE at 17:23
- Completed NSE at 17:23, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 63.36 seconds
- Raw packets sent: 89 (7.040KB) | Rcvd: 45 (3.111KB)
- #######################################################################################################################################
- Starting Nmap 7.70 ( https://nmap.org ) at 2019-02-11 17:23 EST
- NSE: Loaded 148 scripts for scanning.
- NSE: Script Pre-scanning.
- Initiating NSE at 17:23
- Completed NSE at 17:23, 0.00s elapsed
- Initiating NSE at 17:23
- Completed NSE at 17:23, 0.00s elapsed
- Initiating Parallel DNS resolution of 1 host. at 17:23
- Completed Parallel DNS resolution of 1 host. at 17:23, 0.02s elapsed
- Initiating UDP Scan at 17:23
- Scanning apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34) [14 ports]
- Discovered open port 123/udp on 208.113.216.34
- Completed UDP Scan at 17:23, 2.16s elapsed (14 total ports)
- Initiating Service scan at 17:23
- Scanning 12 services on apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- Service scan Timing: About 16.67% done; ETC: 17:33 (0:08:05 remaining)
- Completed Service scan at 17:25, 102.58s elapsed (12 services on 1 host)
- Initiating OS detection (try #1) against apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- Retrying OS detection (try #2) against apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- Initiating Traceroute at 17:25
- Completed Traceroute at 17:25, 7.17s elapsed
- Initiating Parallel DNS resolution of 1 host. at 17:25
- Completed Parallel DNS resolution of 1 host. at 17:25, 0.02s elapsed
- NSE: Script scanning 208.113.216.34.
- Initiating NSE at 17:25
- Completed NSE at 17:25, 16.36s elapsed
- Initiating NSE at 17:25
- Completed NSE at 17:25, 1.02s elapsed
- Nmap scan report for apache2-yak.francis-hopkinson.dreamhost.com (208.113.216.34)
- Host is up (0.17s latency).
- PORT STATE SERVICE VERSION
- 53/udp open|filtered domain
- 67/udp open|filtered dhcps
- 68/udp open|filtered dhcpc
- 69/udp open|filtered tftp
- 88/udp open|filtered kerberos-sec
- 123/udp open ntp NTP v4 (secondary server)
- | ntp-info:
- |_ receive time stamp: 2019-02-11T22:25:36
- 137/udp filtered netbios-ns
- 138/udp filtered netbios-dgm
- 139/udp open|filtered netbios-ssn
- 161/udp open|filtered snmp
- 162/udp open|filtered snmptrap
- 389/udp open|filtered ldap
- 520/udp open|filtered route
- 2049/udp open|filtered nfs
- Too many fingerprints match this host to give specific OS details
- TRACEROUTE (using port 137/udp)
- HOP RTT ADDRESS
- 1 127.94 ms 10.247.200.1
- 2 ... 3
- 4 125.22 ms 10.247.200.1
- 5 126.43 ms 10.247.200.1
- 6 126.42 ms 10.247.200.1
- 7 126.41 ms 10.247.200.1
- 8 126.40 ms 10.247.200.1
- 9 126.39 ms 10.247.200.1
- 10 126.41 ms 10.247.200.1
- 11 ... 18
- 19 125.12 ms 10.247.200.1
- 20 127.48 ms 10.247.200.1
- 21 ... 27
- 28 124.88 ms 10.247.200.1
- 29 ...
- 30 123.53 ms 10.247.200.1
- NSE: Script Post-scanning.
- Initiating NSE at 17:25
- Completed NSE at 17:25, 0.00s elapsed
- Initiating NSE at 17:25
- Completed NSE at 17:25, 0.00s elapsed
- Read data files from: /usr/bin/../share/nmap
- OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- Nmap done: 1 IP address (1 host up) scanned in 134.80 seconds
- Raw packets sent: 134 (11.582KB) | Rcvd: 33 (3.738KB)
- #######################################################################################################################################
- [-] Date & Time: 11/02/2019 15:50:53
- [I] Threads: 5
- [-] Target: http://northwestfront.org/about (208.113.216.34)
- [M] Website Not in HTTPS: http://northwestfront.org/about
- [L] X-Frame-Options: Not Enforced
- [I] Strict-Transport-Security: Not Enforced
- [I] X-Content-Security-Policy: Not Enforced
- [I] X-Content-Type-Options: Not Enforced
- [L] No Robots.txt Found
- [I] CMS Detection: WordPress
- [I] Wordpress Theme: nwf
- [M] XML-RPC services are enabled
- [I] Autocomplete Off Not Found: http://northwestfront.org/about/wp-login.php
- [-] Default WordPress Files:
- [-] Searching Wordpress Plugins ...
- [I] "+plugin+"
- [I] $plugin
- [I] 1-flash-gallery
- [M] EDB-ID: 17801 "WordPress Plugin 1 Flash Gallery 1.30 < 1.5.7a - Arbitrary File Upload (Metasploit)"
- [I] 1-jquery-photo-gallery-slideshow-flash
- [M] EDB-ID: 36382 "WordPress Plugin 1-jquery-photo-gallery-Slideshow-flash 1.01 - Cross-Site Scripting"
- [I] 2-click-socialmedia-buttons
- [M] EDB-ID: 37178 "WordPress Plugin 2 Click Social Media Buttons 0.32.2 - Multiple Cross-Site Scripting Vulnerabilities"
- [I] Calendar
- [M] EDB-ID: 21715 "WordPress Plugin spider Calendar - Multiple Vulnerabilities"
- [I] Calendar-Script
- [M] EDB-ID: 38018 "WordPress Plugin PHP Event Calendar - 'cid' SQL Injection"
- [I] Enigma2.php?boarddir=http:
- [I] FlagEm
- [M] EDB-ID: 38674 "WordPress Plugin FlagEm - 'cID' Cross-Site Scripting"
- [I] Lead-Octopus-Power
- [M] EDB-ID: 39269 "WordPress Plugin Lead Octopus Power - 'id' SQL Injection"
- [I] Premium_Gallery_Manager
- [M] EDB-ID: 34538 "WordPress Plugin Premium Gallery Manager - Configuration Access"
- [M] EDB-ID: 39111 "WordPress Plugin Premium Gallery Manager - Arbitrary File Upload"
- [I] Tevolution
- [M] EDB-ID: 40976 "WordPress Plugin Slider Templatic Tevolution < 2.3.6 - Arbitrary File Upload"
- [I] a-gallery
- [M] EDB-ID: 17872 "Multiple WordPress Plugins - 'timthumb.php' File Upload"
- [I] a-to-z-category-listing
- [M] EDB-ID: 17809 "WordPress Plugin A to Z Category Listing 1.3 - SQL Injection"
- [I] abtest
- [M] EDB-ID: 39577 "WordPress Plugin Abtest - Local File Inclusion"
- [I] accept-signups
- [M] EDB-ID: 35136 "WordPress Plugin Accept Signups 0.1 - 'email' Cross-Site Scripting"
- [I] acf-frontend-display
- [I] ad-wizz
- [M] EDB-ID: 35561 "WordPress Plugin WPwizz AdWizz Plugin 1.0 - 'link' Cross-Site Scripting"
- [I] admin_panel.php?wp_footnotes_current_settings[post_footnotes]=<
- /bin/sh: 1: lt: not found
- /bin/sh: 1: [&=/]: not found
- [I] admin_panel.php?wp_footnotes_current_settings[pre_footnotes]=<
- /bin/sh: 1: lt: not found
- /bin/sh: 1: [&=/]: not found
- [I] adminimize
- [M] EDB-ID: 36325 "WordPress Plugin Adminimize 1.7.21 - 'page' Cross-Site Scripting"
- [I] adrotate
- [M] EDB-ID: 17888 "WordPress Plugin AdRotate 3.6.5 - SQL Injection"
- [M] EDB-ID: 18114 "WordPress Plugin AdRotate 3.6.6 - SQL Injection"
- [M] EDB-ID: 31834 "WordPress Plugin AdRotate 3.9.4 - 'clicktracker.ph?track' SQL Injection"
- [I] ads-box
- [M] EDB-ID: 38060 "WordPress Plugin Ads Box - 'count' SQL Injection"
- [I] advanced-dewplayer
- [M] EDB-ID: 38936 "WordPress Plugin Advanced Dewplayer - 'download-file.php' Script Directory Traversal"
- [I] advanced-text-widget
- [M] EDB-ID: 36324 "WordPress Plugin Advanced Text Widget 2.0 - 'page' Cross-Site Scripting"
- [I] advanced-uploader
- [M] EDB-ID: 38867 "WordPress Plugin Advanced uploader 2.10 - Multiple Vulnerabilities"
- [I] advertizer
- [M] EDB-ID: 17750 "WordPress Plugin Advertizer 1.0 - SQL Injection"
- [I] age-verification
- [M] EDB-ID: 18350 "WordPress Plugin Age Verification 0.4 - Open Redirect"
- [M] EDB-ID: 36540 "WordPress Plugin Age Verification 0.4 - 'redirect_to' Open Redirection"
- [I] ajax-category-dropdown
- [M] EDB-ID: 17207 "WordPress Plugin Ajax Category Dropdown 0.1.5 - Multiple Vulnerabilities"
- [I] ajax-store-locator-wordpress_0
- [M] EDB-ID: 35493 "WordPress Plugin Ajax Store Locator 1.2 - Arbitrary File Download"
- [I] ajaxgallery
- [M] EDB-ID: 17686 "WordPress Plugin Ajax Gallery 3.0 - SQL Injection"
- [I] akismet
- [M] EDB-ID: 37826 "WordPress 3.4.2 - Multiple Path Disclosure Vulnerabilities"
- [M] EDB-ID: 37902 "WordPress Plugin Akismet - Multiple Cross-Site Scripting Vulnerabilities"
- [I] alert-before-your-post
- [M] EDB-ID: 36323 "WordPress Plugin Alert Before Your Post - 'name' Cross-Site Scripting"
- [I] all-in-one-event-calendar
- [M] EDB-ID: 37075 "WordPress Plugin All-in-One Event Calendar 1.4 - 'agenda-widget-form.php?title' Cross-Site Scripting"
- [M] EDB-ID: 37076 "WordPress Plugin All-in-One Event Calendar 1.4 - 'box_publish_button.php?button_value' Cross-Site Scripting"
- [M] EDB-ID: 37077 "WordPress Plugin All-in-One Event Calendar 1.4 - 'save_successful.php?msg' Cross-Site Scripting"
- [M] EDB-ID: 37078 "WordPress Plugin All-in-One Event Calendar 1.4 - 'agenda-widget.php' Multiple Cross-Site Scripting Vulnerabilities"
- [I] all-in-one-wp-security-and-firewall
- [M] EDB-ID: 34854 "WordPress Plugin All In One WP Security & Firewall 3.8.3 - Persistent Cross-Site Scripting"
- [I] all-video-gallery
- [M] EDB-ID: 22427 "WordPress Plugin All Video Gallery 1.1 - SQL Injection"
- [I] allow-php-in-posts-and-pages
- [M] EDB-ID: 17688 "WordPress Plugin Allow PHP in Posts and Pages 2.0.0.RC1 - SQL Injection"
- [I] allwebmenus-wordpress-menu-plugin
- [M] EDB-ID: 17861 "WordPress Plugin AllWebMenus 1.1.3 - Remote File Inclusion"
- [M] EDB-ID: 18407 "WordPress Plugin AllWebMenus < 1.1.9 Menu Plugin - Arbitrary File Upload"
- [I] alo-easymail
- [I] annonces
- [M] EDB-ID: 17863 "WordPress Plugin Annonces 1.2.0.0 - Remote File Inclusion"
- [I] answer-my-question
- [M] EDB-ID: 40771 "WordPress Plugin Answer My Question 1.3 - SQL Injection"
- [I] appointment-booking-calendar
- [M] EDB-ID: 39309 "WordPress Plugin Booking Calendar Contact Form 1.1.23 - SQL Injection"
- [M] EDB-ID: 39319 "WordPress Plugin Booking Calendar Contact Form 1.1.23 - Shortcode SQL Injection"
- [M] EDB-ID: 39341 "WordPress Plugin Booking Calendar Contact Form 1.1.24 - Multiple Vulnerabilities"
- [M] EDB-ID: 39342 "WordPress Plugin Booking Calendar Contact Form 1.1.24 - addslashes SQL Injection"
- [I] aspose-doc-exporter
- [M] EDB-ID: 36559 "WordPress Plugin aspose-doc-exporter 1.0 - Arbitrary File Download"
- [I] asset-manager
- [M] EDB-ID: 18993 "WordPress Plugin Asset Manager 0.2 - Arbitrary File Upload"
- [I] audio
- [M] EDB-ID: 35258 "WordPress Plugin Audio 0.5.1 - 'showfile' Cross-Site Scripting"
- [I] audio-player
- [M] EDB-ID: 38300 "WordPress Plugin Audio Player - 'playerID' Cross-Site Scripting"
- [I] auto-attachments
- [I] aviary-image-editor-add-on-for-gravity-forms
- [M] EDB-ID: 37275 "WordPress Plugin Aviary Image Editor Addon For Gravity Forms 3.0 Beta - Arbitrary File Upload"
- [I] backwpup
- [M] EDB-ID: 35400 "WordPress Plugin BackWPup 1.4 - Multiple Information Disclosure Vulnerabilities"
- [I] baggage-freight
- [M] EDB-ID: 46061 "WordPress Plugin Baggage Freight Shipping Australia 0.1.0 - Arbitrary File Upload"
- [I] baggage_shipping
- [I] bbpress
- [M] EDB-ID: 22396 "WordPress Plugin bbPress - Multiple Vulnerabilities"
- [I] bezahlcode-generator
- [M] EDB-ID: 35286 "WordPress Plugin BezahlCode Generator 1.0 - 'gen_name' Cross-Site Scripting"
- [I] booking
- [M] EDB-ID: 27399 "WordPress Plugin Booking Calendar 4.1.4 - Cross-Site Request Forgery"
- [I] booking-calendar-contact-form
- [M] EDB-ID: 37003 "WordPress Plugin Booking Calendar Contact Form 1.0.2 - Multiple Vulnerabilities"
- [I] bookx
- [M] EDB-ID: 39251 "WordPress Plugin BookX 1.7 - 'bookx_export.php' Local File Inclusion"
- [I] brandfolder
- [M] EDB-ID: 39591 "WordPress Plugin Brandfolder 3.0 - Local/Remote File Inclusion"
- [I] cac-featured-content
- [I] candidate-application-form
- [M] EDB-ID: 37754 "WordPress Plugin Candidate Application Form 1.0 - Arbitrary File Download"
- [I] catalog
- [M] EDB-ID: 25724 "WordPress Plugin Spider Catalog 1.4.6 - Multiple Vulnerabilities"
- [M] EDB-ID: 38639 "WordPress Plugin miniBB - SQL Injection / Multiple Cross-Site Scripting Vulnerabilities"
- [I] category-grid-view-gallery
- [M] EDB-ID: 38625 "WordPress Plugin Category Grid View Gallery - 'ID' Cross-Site Scripting"
- [I] category-list-portfolio-page
- [I] cevhershare
- [M] EDB-ID: 17891 "WordPress Plugin CevherShare 2.0 - SQL Injection"
- [I] cforms
- [M] EDB-ID: 34946 "WordPress Plugin cformsII 11.5/13.1 - 'lib_ajax.php' Multiple Cross-Site Scripting Vulnerabilities"
- [I] cforms2
- [M] EDB-ID: 35879 "WordPress Plugin Cforms 14.7 - Remote Code Execution"
- [I] chenpress
- [M] EDB-ID: 37522 "WordPress Plugin chenpress - Arbitrary File Upload"
- [I] church-admin
- [M] EDB-ID: 37483 "WordPress Plugin church_admin - 'id' Cross-Site Scripting"
- [I] cimy-counter
- [M] EDB-ID: 14057 "WordPress Plugin Cimy Counter - Full Path Disclosure / Redirector / Cross-Site Scripting / HTTP Response Spitting"
- [M] EDB-ID: 34195 "WordPress Plugin Cimy Counter 0.9.4 - HTTP Response Splitting / Cross-Site Scripting"
- [I] clickdesk-live-support-chat
- [M] EDB-ID: 36338 "WordPress Plugin ClickDesk Live Support 2.0 - 'cdwidget' Cross-Site Scripting"
- [I] cloudsafe365-for-wp
- [M] EDB-ID: 37681 "WordPress Plugin Cloudsafe365 - 'file' Remote File Disclosure"
- [I] cm-download-manager
- [M] EDB-ID: 35324 "WordPress Plugin CM Download Manager 2.0.0 - Code Injection"
- [I] cms-pack
- [I] cnhk-slideshow
- [M] EDB-ID: 39190 "WordPress Plugin cnhk-Slideshow - Arbitrary File Upload"
- [I] comicpress-manager
- [M] EDB-ID: 35393 "WordPress Plugin ComicPress Manager 1.4.9 - 'lang' Cross-Site Scripting"
- [I] comment-rating
- [M] EDB-ID: 16221 "WordPress Plugin Comment Rating 2.9.23 - Multiple Vulnerabilities"
- [M] EDB-ID: 24552 "WordPress Plugin Comment Rating 2.9.32 - Multiple Vulnerabilities"
- [M] EDB-ID: 36487 "WordPress Plugin Comment Rating 2.9.20 - 'path' Cross-Site Scripting"
- [I] community-events
- [M] EDB-ID: 17798 "WordPress Plugin Community Events 1.2.1 - SQL Injection"
- [I] complete-gallery-manager
- [M] EDB-ID: 28377 "WordPress Plugin Complete Gallery Manager 3.3.3 - Arbitrary File Upload"
- [I] contact-form-generator
- [M] EDB-ID: 38086 "WordPress Plugin Contact Form Generator 2.0.1 - Multiple Cross-Site Request Forgery Vulnerabilities"
- [I] contact-form-wordpress
- [M] EDB-ID: 17980 "WordPress Plugin Contact Form 2.7.5 - SQL Injection"
- [I] contus-hd-flv-player
- [M] EDB-ID: 17678 "WordPress Plugin Contus HD FLV Player 1.3 - SQL Injection"
- [M] EDB-ID: 37377 "WordPress Plugin HD FLV Player - 'uploadVideo.php' Arbitrary File Upload"
- [I] contus-video-gallery
- [M] EDB-ID: 34161 "WordPress Plugin Video Gallery 2.5 - Multiple Vulnerabilities"
- [I] contus-video-galleryversion-10
- [M] EDB-ID: 37373 "WordPress Plugin Contus Video Gallery - 'upload1.php' Arbitrary File Upload"
- [I] copyright-licensing-tools
- [M] EDB-ID: 17749 "WordPress Plugin iCopyright(R) Article Tools 1.1.4 - SQL Injection"
- [I] count-per-day
- [M] EDB-ID: 17857 "WordPress Plugin Count per Day 2.17 - SQL Injection"
- [M] EDB-ID: 18355 "WordPress Plugin Count Per Day - Multiple Vulnerabilities"
- [M] EDB-ID: 20862 "WordPress Plugin Count Per Day 3.2.3 - Cross-Site Scripting"
- [I] couponer
- [M] EDB-ID: 17759 "WordPress Plugin Couponer 1.2 - SQL Injection"
- [I] cp-polls
- [M] EDB-ID: 39513 "WordPress Plugin CP Polls 1.0.8 - Multiple Vulnerabilities"
- [I] cp-reservation-calendar
- [M] EDB-ID: 38187 "WordPress Plugin CP Reservation Calendar 1.1.6 - SQL Injection"
- [I] cpl
- [M] EDB-ID: 11458 "WordPress Plugin Copperleaf Photolog 0.16 - SQL Injection"
- [I] crawlrate-tracker
- [M] EDB-ID: 17755 "WordPress Plugin Crawl Rate Tracker 2.0.2 - SQL Injection"
- [I] crayon-syntax-highlighter
- [M] EDB-ID: 37946 "WordPress Plugin Crayon Syntax Highlighter - 'wp_load' Remote File Inclusion"
- [I] custom-background
- [M] EDB-ID: 39135 "WordPress Theme Felici - 'Uploadify.php' Arbitrary File Upload"
- [I] custom-content-type-manager
- [M] EDB-ID: 19058 "WordPress Plugin Custom Content Type Manager 0.9.5.13-pl - Arbitrary File Upload"
- [I] custom-tables
- [M] EDB-ID: 37482 "WordPress Plugin custom tables - 'key' Cross-Site Scripting"
- [I] cysteme-finder
- [M] EDB-ID: 40295 "WordPress Plugin CYSTEME Finder 1.3 - Arbitrary File Disclosure/Arbitrary File Upload"
- [I] daily-maui-photo-widget
- [M] EDB-ID: 35673 "WordPress Plugin Daily Maui Photo Widget 0.2 - Multiple Cross-Site Scripting Vulnerabilities"
- [I] db-backup
- [M] EDB-ID: 35378 "WordPress Plugin DB Backup - Arbitrary File Download"
- [I] disclosure-policy-plugin
- [M] EDB-ID: 17865 "WordPress Plugin Disclosure Policy 1.0 - Remote File Inclusion"
- [I] dm-albums
- [M] EDB-ID: 9043 "Adobe Flash Selection.SetSelection - Use-After-Free"
- [M] EDB-ID: 9048 "Adobe Flash TextField.replaceText - Use-After-Free"
- [I] dmsguestbook
- [I] downloads-manager
- [M] EDB-ID: 6127 "Pixel Studio 2.17 - Denial of Service (PoC)"
- [I] dp-thumbnail
- [I] drag-drop-file-uploader
- [M] EDB-ID: 19057 "WordPress Plugin drag and drop file upload 0.1 - Arbitrary File Upload"
- [I] dukapress
- [M] EDB-ID: 35346 "WordPress Plugin DukaPress 2.5.2 - Directory Traversal"
- [I] duplicator
- [M] EDB-ID: 38676 "WordPress Plugin Duplicator - Cross-Site Scripting"
- [M] EDB-ID: 44288 "WordPress Plugin Duplicator 1.2.32 - Cross-Site Scripting"
- [I] dzs-videogallery
- [M] EDB-ID: 29834 "WordPress Plugin dzs-videogallery - Arbitrary File Upload"
- [M] EDB-ID: 30063 "WordPress Plugin DZS Video Gallery 3.1.3 - Remote File Disclosure / Local File Disclosure"
- [M] EDB-ID: 39250 "WordPress Plugin DZS-VideoGallery - Cross-Site Scripting / Command Injection"
- [M] EDB-ID: 39553 "WordPress Plugin DZS Videogallery < 8.60 - Multiple Vulnerabilities"
- [I] dzs-zoomsounds
- [M] EDB-ID: 37166 "WordPress Plugin dzs-zoomsounds 2.0 - Arbitrary File Upload"
- [I] easy-contact-form-lite
- [M] EDB-ID: 17680 "WordPress Plugin Easy Contact Form Lite 1.0.7 - SQL Injection"
- [I] easy-contact-forms-exporter
- [M] EDB-ID: 19013 "WordPress Plugin Easy Contact Forms Export 1.1.0 - Information Disclosure"
- [I] ebook-download
- [M] EDB-ID: 39575 "WordPress Plugin eBook Download 1.1 - Directory Traversal"
- [I] eco-annu
- [M] EDB-ID: 38019 "WordPress Plugin Eco-annu - 'eid' SQL Injection"
- [I] editormonkey
- [M] EDB-ID: 17284 "WordPress Plugin EditorMonkey 2.5 - 'FCKeditor' Arbitrary File Upload"
- [I] email-newsletter
- [M] EDB-ID: 37356 "WordPress Plugin Email NewsLetter 8.0 - 'option' Information Disclosure"
- [I] evarisk
- [M] EDB-ID: 17738 "WordPress Plugin Evarisk 5.1.3.6 - SQL Injection"
- [M] EDB-ID: 37399 "WordPress Plugin Evarisk - 'uploadPhotoApres.php' Arbitrary File Upload"
- [I] event-registration
- [M] EDB-ID: 17751 "WordPress Plugin Event Registration 5.4.3 - SQL Injection"
- [I] eventify
- [M] EDB-ID: 17794 "WordPress Plugin Eventify - Simple Events 1.7.f SQL Injection"
- [I] extend-wordpress
- [I] facebook-opengraph-meta-plugin
- [M] EDB-ID: 17773 "WordPress Plugin Facebook Opengraph Meta 1.0 - SQL Injection"
- [I] fbgorilla
- [M] EDB-ID: 39283 "WordPress Plugin FB Gorilla - 'game_play.php' SQL Injection"
- [I] fbpromotions
- [M] EDB-ID: 17737 "WordPress Plugin Facebook Promotions 1.3.3 - SQL Injection"
- [I] fcchat
- [M] EDB-ID: 35289 "WordPress Plugin FCChat Widget 2.1.7 - 'path' Cross-Site Scripting"
- [M] EDB-ID: 37370 "WordPress Plugin FCChat Widget 2.2.x - 'upload.php' Arbitrary File Upload"
- [I] feature-slideshow
- [M] EDB-ID: 35285 "WordPress Plugin Feature Slideshow 1.0.6 - 'src' Cross-Site Scripting"
- [I] featurific-for-wordpress
- [M] EDB-ID: 36339 "WordPress Plugin Featurific For WordPress 1.6.2 - 'snum' Cross-Site Scripting"
- [I] feed
- [M] EDB-ID: 38624 "WordPress Plugin WP Feed - 'nid' SQL Injection"
- [I] feedlist
- [M] EDB-ID: 34973 "WordPress Plugin FeedList 2.61.01 - 'handler_image.php' Cross-Site Scripting"
- [I] feedweb
- [M] EDB-ID: 38414 "WordPress Plugin Feedweb - 'wp_post_id' Cross-Site Scripting"
- [I] fgallery
- [M] EDB-ID: 4993 "GitList 0.6.0 - Argument Injection (Metasploit)"
- [I] file-groups
- [M] EDB-ID: 17677 "WordPress Plugin File Groups 1.1.2 - SQL Injection"
- [I] filedownload
- [M] EDB-ID: 17858 "WordPress Plugin Filedownload 0.1 - 'download.php' Remote File Disclosure"
- [I] finder
- [M] EDB-ID: 37677 "WordPress Plugin Finder - 'order' Cross-Site Scripting"
- [I] firestats
- [M] EDB-ID: 14308 "WordPress Plugin Firestats - Remote Configuration File Download"
- [M] EDB-ID: 33367 "WordPress Plugin Firestats 1.0.2 - Multiple Cross-Site Scripting / Authentication Bypass Vulnerabilities (1)"
- [M] EDB-ID: 33368 "WordPress Plugin Firestats 1.0.2 - Multiple Cross-Site Scripting / Authentication Bypass Vulnerabilities (2)"
- [I] flash-album-gallery
- [M] EDB-ID: 16947 "WordPress Plugin GRAND Flash Album Gallery 0.55 - Multiple Vulnerabilities"
- [M] EDB-ID: 36383 "WordPress Plugin flash-album-gallery - 'facebook.php' Cross-Site Scripting"
- [M] EDB-ID: 36434 "WordPress Plugin GRAND FlAGallery 1.57 - 'flagshow.php' Cross-Site Scripting"
- [M] EDB-ID: 36444 "WordPress Plugin flash-album-gallery - 'flagshow.php' Cross-Site Scripting"
- [I] flexible-custom-post-type
- [M] EDB-ID: 36317 "WordPress Plugin Flexible Custom Post Type - 'id' Cross-Site Scripting"
- [I] flipbook
- [M] EDB-ID: 37452 "WordPress Plugin Flip Book - 'PHP.php' Arbitrary File Upload"
- [I] font-uploader
- [M] EDB-ID: 18994 "WordPress Plugin Font Uploader 1.2.4 - Arbitrary File Upload"
- [I] formcraft
- [M] EDB-ID: 30002 "WordPress Plugin Formcraft - SQL Injection"
- [I] forum-server
- [M] EDB-ID: 16235 "WordPress Plugin Forum Server 1.6.5 - SQL Injection"
- [M] EDB-ID: 17828 "WordPress Plugin Forum Server 1.7 - SQL Injection"
- [I] foxypress
- [M] EDB-ID: 18991 "WordPress Plugin Foxypress 0.4.1.1 < 0.4.2.1 - Arbitrary File Upload"
- [M] EDB-ID: 22374 "WordPress Plugin foxypress 0.4.2.5 - Multiple Vulnerabilities"
- [I] front-end-upload
- [M] EDB-ID: 19008 "WordPress Plugin Front End Upload 0.5.3 - Arbitrary File Upload"
- [I] front-file-manager
- [M] EDB-ID: 19012 "WordPress Plugin Front File Manager 0.1 - Arbitrary File Upload"
- [I] fs-real-estate-plugin
- [M] EDB-ID: 22071 "WordPress Plugin FireStorm Professional Real Estate 2.06.01 - SQL Injection"
- [I] gallery-images
- [M] EDB-ID: 34524 "WordPress Plugin Huge-IT Image Gallery 1.0.1 - (Authenticated) SQL Injection"
- [M] EDB-ID: 39807 "WordPress Plugin Huge-IT Image Gallery 1.8.9 - Multiple Vulnerabilities"
- [I] gallery-plugin
- [M] EDB-ID: 18998 "WordPress Plugin Gallery 3.06 - Arbitrary File Upload"
- [M] EDB-ID: 38209 "WordPress Plugin Gallery - 'filename_1' Arbitrary File Access"
- [I] gd-star-rating
- [M] EDB-ID: 17973 "WordPress Plugin GD Star Rating 1.9.10 - SQL Injection"
- [M] EDB-ID: 35373 "WordPress Plugin GD Star Rating 1.9.7 - 'wpfn' Cross-Site Scripting"
- [M] EDB-ID: 35835 "WordPress Plugin GD Star Rating - 'votes' SQL Injection"
- [I] gift-voucher
- [M] EDB-ID: 45255 "WordPress Plugin Gift Voucher 1.0.5 - (Authenticated) 'template_id' SQL Injection"
- [I] global-content-blocks
- [M] EDB-ID: 17687 "WordPress Plugin Global Content Blocks 1.2 - SQL Injection"
- [I] global-flash-galleries
- [M] EDB-ID: 39059 "WordPress Plugin Global Flash Gallery - 'swfupload.php' Arbitrary File Upload"
- [I] google-document-embedder
- [M] EDB-ID: 35371 "WordPress Plugin Google Document Embedder 2.5.14 - SQL Injection"
- [M] EDB-ID: 35447 "WordPress Plugin Google Document Embedder 2.5.16 - 'mysql_real_escpae_string' Bypass SQL Injection"
- [I] google-mp3-audio-player
- [M] EDB-ID: 35460 "WordPress Plugin CodeArt Google MP3 Player - File Disclosure Download"
- [I] grapefile
- [M] EDB-ID: 17760 "WordPress Plugin grapefile 1.1 - Arbitrary File Upload"
- [I] gwolle-gb
- [M] EDB-ID: 38861 "WordPress Plugin Gwolle Guestbook 1.5.3 - Remote File Inclusion"
- [I] hb-audio-gallery-lite
- [M] EDB-ID: 39589 "WordPress Plugin HB Audio Gallery Lite 1.0.0 - Arbitrary File Download"
- [I] hd-webplayer
- [M] EDB-ID: 20918 "WordPress Plugin HD Webplayer 1.1 - SQL Injection"
- [I] history-collection
- [M] EDB-ID: 37254 "WordPress Plugin History Collection 1.1.1 - Arbitrary File Download"
- [I] hitasoft_player
- [M] EDB-ID: 38012 "WordPress Plugin FLV Player - 'id' SQL Injection"
- [I] html5avmanager
- [M] EDB-ID: 18990 "WordPress Plugin HTML5 AV Manager 0.2.7 - Arbitrary File Upload"
- [I] i-dump-iphone-to-wordpress-photo-uploader
- [M] EDB-ID: 36691 "WordPress Plugin Windows Desktop and iPhone Photo Uploader - Arbitrary File Upload"
- [I] iframe-admin-pages
- [M] EDB-ID: 37179 "WordPress Plugin iFrame Admin Pages 0.1 - 'main_page.php' Cross-Site Scripting"
- [I] igit-posts-slider-widget
- [M] EDB-ID: 35392 "WordPress Plugin IGIT Posts Slider Widget 1.0 - 'src' Cross-Site Scripting"
- [I] image-export
- [M] EDB-ID: 39584 "WordPress Plugin Image Export 1.1.0 - Arbitrary File Disclosure"
- [I] image-gallery-with-slideshow
- [M] EDB-ID: 17761 "WordPress Plugin image Gallery with Slideshow 1.5 - Multiple Vulnerabilities"
- [I] imdb-widget
- [M] EDB-ID: 39621 "WordPress Plugin IMDb Profile Widget 1.0.8 - Local File Inclusion"
- [I] inboundio-marketing
- [M] EDB-ID: 36478 "WordPress Plugin InBoundio Marketing 1.0 - Arbitrary File Upload"
- [I] indeed-membership-pro
- [I] inline-gallery
- [M] EDB-ID: 35418 "WordPress Plugin Inline Gallery 0.3.9 - 'do' Cross-Site Scripting"
- [I] insert-php
- [M] EDB-ID: 41308 "WordPress Plugin Insert PHP 3.3.1 - PHP Code Injection"
- [I] invit0r
- [M] EDB-ID: 37403 "WordPress Plugin Invit0r - 'ofc_upload_image.php' Arbitrary File Upload"
- [I] ip-logger
- [M] EDB-ID: 17673 "WordPress Plugin IP-Logger 3.0 - SQL Injection"
- [I] is-human
- [M] EDB-ID: 17299 "WordPress Plugin Is-human 1.4.2 - Remote Command Execution"
- [I] islidex
- [I] iwant-one-ihave-one
- [M] EDB-ID: 16236 "WordPress Plugin IWantOneButton 3.0.1 - Multiple Vulnerabilities"
- [I] jetpack
- [M] EDB-ID: 18126 "WordPress Plugin jetpack - 'sharedaddy.php' ID SQL Injection"
- [I] jibu-pro
- [M] EDB-ID: 45305 "WordPress Plugin Jibu Pro 1.7 - Cross-Site Scripting"
- [I] joliprint
- [M] EDB-ID: 37176 "WordPress Plugin PDF & Print Button Joliprint 1.3.0 - Multiple Cross-Site Scripting Vulnerabilities"
- [I] jquery-mega-menu
- [M] EDB-ID: 16250 "WordPress Plugin jQuery Mega Menu 1.0 - Local File Inclusion"
- [I] jrss-widget
- [M] EDB-ID: 34977 "WordPress Plugin jRSS Widget 1.1.1 - 'url' Information Disclosure"
- [I] js-appointment
- [M] EDB-ID: 17724 "WordPress Plugin Js-appointment 1.5 - SQL Injection"
- [I] jtrt-responsive-tables
- [M] EDB-ID: 43110 "WordPress Plugin JTRT Responsive Tables 4.1 - SQL Injection"
- [I] kino-gallery
- [I] kish-guest-posting
- [I] kittycatfish
- [M] EDB-ID: 41919 "WordPress Plugin KittyCatfish 2.2 - SQL Injection"
- [I] knews
- [M] EDB-ID: 37484 "WordPress Plugin Knews Multilingual Newsletters - Cross-Site Scripting"
- [I] knr-author-list-widget
- [M] EDB-ID: 17791 "WordPress Plugin KNR Author List Widget 2.0.0 - SQL Injection"
- [I] lanoba-social-plugin
- [M] EDB-ID: 36326 "WordPress Plugin Lanoba Social 1.0 - 'action' Cross-Site Scripting"
- [I] lazy-content-slider
- [M] EDB-ID: 40070 "WordPress Plugin Lazy Content Slider 3.4 - Cross-Site Request Forgery (Add Catetory)"
- [I] lazy-seo
- [M] EDB-ID: 28452 "WordPress Plugin Lazy SEO 1.1.9 - Arbitrary File Upload"
- [I] lazyest-gallery
- [M] EDB-ID: 35435 "WordPress Plugin Lazyest Gallery 1.0.26 - 'image' Cross-Site Scripting"
- [I] lb-mixed-slideshow
- [M] EDB-ID: 37418 "WordPress Plugin LB Mixed Slideshow - 'upload.php' Arbitrary File Upload"
- [I] leaguemanager
- [M] EDB-ID: 24789 "WordPress Plugin LeagueManager 3.8 - SQL Injection"
- [I] leenkme
- [I] levelfourstorefront
- [M] EDB-ID: 38158 "WordPress Plugin Shopping Cart for WordPress - '/wp-content/plugins/levelfourstorefront/scripts/administration/exportsubscribers.php? reqID' SQL Injection"
- [M] EDB-ID: 38159 "WordPress Plugin Shopping Cart for WordPress - '/wp-content/plugins/levelfourstorefront/scripts/administration/backup.php?reqID' SQL Injection"
- [M] EDB-ID: 38160 "WordPress Plugin Shopping Cart for WordPress - '/wp-content/plugins/levelfourstorefront/scripts/administration/exportaccounts.php?reqID' SQL Injection"
- [I] like-dislike-counter-for-posts-pages-and-comments
- [M] EDB-ID: 34553 "WordPress Plugin Like Dislike Counter 1.2.3 - SQL Injection"
- [I] link-library
- [M] EDB-ID: 17887 "WordPress Plugin Link Library 5.2.1 - SQL Injection"
- [I] lisl-last-image-slider
- [I] livesig
- [M] EDB-ID: 17864 "WordPress Plugin Livesig 0.4 - Remote File Inclusion"
- [I] localize-my-post
- [M] EDB-ID: 45439 "WordPress Plugin Localize My Post 1.0 - Local File Inclusion"
- [I] mac-dock-gallery
- [M] EDB-ID: 19056 "WordPress Plugin Mac Photo Gallery 2.7 - Arbitrary File Upload"
- [I] madebymilk
- [M] EDB-ID: 38041 "WordPress Theme Madebymilk - 'id' SQL Injection"
- [I] mail-masta
- [M] EDB-ID: 40290 "WordPress Plugin Mail Masta 1.0 - Local File Inclusion"
- [M] EDB-ID: 41438 "WordPress Plugin Mail Masta 1.0 - SQL Injection"
- [I] mailz
- [M] EDB-ID: 17866 "WordPress Plugin Mailing List 1.3.2 - Remote File Inclusion"
- [M] EDB-ID: 18276 "WordPress Plugin Mailing List - Arbitrary File Download"
- [I] media-library-categories
- [M] EDB-ID: 17628 "WordPress Plugin Media Library Categories 1.0.6 - SQL Injection"
- [I] meenews
- [M] EDB-ID: 36340 "WordPress Plugin NewsLetter Meenews 5.1 - 'idnews' Cross-Site Scripting"
- [I] membership-simplified-for-oap-members-only
- [M] EDB-ID: 41622 "Wordpress Plugin Membership Simplified 1.58 - Arbitrary File Download"
- [I] mingle-forum
- [M] EDB-ID: 15943 "WordPress Plugin mingle forum 1.0.26 - Multiple Vulnerabilities"
- [M] EDB-ID: 17894 "WordPress Plugin Mingle Forum 1.0.31 - SQL Injection"
- [I] mm-forms-community
- [M] EDB-ID: 17725 "WordPress Plugin MM Forms Community 1.2.3 - SQL Injection"
- [M] EDB-ID: 18997 "WordPress Plugin MM Forms Community 2.2.6 - Arbitrary File Upload"
- [I] monsters-editor-10-for-wp-super-edit
- [M] EDB-ID: 37654 "WordPress Plugin Monsters Editor for WP Super Edit - Arbitrary File Upload"
- [I] mukioplayer-for-wordpress
- [M] EDB-ID: 38755 "WordPress Plugin mukioplayer4wp - 'cid' SQL Injection"
- [I] myflash
- [M] EDB-ID: 3828 "Microsoft Windows Kernel - 'NtGdiStretchBlt' Pool Buffer Overflow (MS15-097)"
- [I] mystat
- [M] EDB-ID: 17740 "WordPress Plugin mySTAT 2.6 - SQL Injection"
- [I] nextgen-gallery
- [M] EDB-ID: 12098 "WordPress Plugin NextGEN Gallery 1.5.1 - Cross-Site Scripting"
- [M] EDB-ID: 38178 "WordPress Plugin NextGEN Gallery - 'test-head' Cross-Site Scripting"
- [M] EDB-ID: 39100 "WordPress Plugin NextGEN Gallery - 'jqueryFileTree.php' Directory Traversal"
- [I] nextgen-smooth-gallery
- [M] EDB-ID: 14541 "WordPress Plugin NextGEN Smooth Gallery 0.12 - Blind SQL Injection"
- [I] ocim-mp3
- [M] EDB-ID: 39498 "WordPress Plugin Ocim MP3 - SQL Injection"
- [I] odihost-newsletter-plugin
- [M] EDB-ID: 17681 "WordPress Plugin OdiHost NewsLetter 1.0 - SQL Injection"
- [I] old-post-spinner
- [M] EDB-ID: 16251 "WordPress Plugin OPS Old Post Spinner 2.2.1 - Local File Inclusion"
- [I] olimometer
- [M] EDB-ID: 40804 "WordPress Plugin Olimometer 2.56 - SQL Injection"
- [I] omni-secure-files
- [M] EDB-ID: 19009 "WordPress Plugin Omni Secure Files 0.1.13 - Arbitrary File Upload"
- [I] oqey-gallery
- [M] EDB-ID: 17779 "WordPress Plugin oQey Gallery 0.4.8 - SQL Injection"
- [M] EDB-ID: 35288 "WordPress Plugin oQey-Gallery 0.2 - 'tbpv_domain' Cross-Site Scripting"
- [I] oqey-headers
- [M] EDB-ID: 17730 "WordPress Plugin oQey Headers 0.3 - SQL Injection"
- [I] page-flip-image-gallery
- [M] EDB-ID: 30084 "WordPress Plugin page-flip-image-gallery - Arbitrary File Upload"
- [M] EDB-ID: 7543 "Linux Kernel 2.6.x - 'rds_recvmsg()' Local Information Disclosure"
- [I] paid-downloads
- [M] EDB-ID: 17797 "WordPress Plugin Paid Downloads 2.01 - SQL Injection"
- [M] EDB-ID: 36135 "WordPress Plugin Auctions 1.8.8 - 'wpa_id' SQL Injection"
- [I] participants-database
- [I] pay-with-tweet.php
- [M] EDB-ID: 18330 "WordPress Plugin Pay with Tweet 1.1 - Multiple Vulnerabilities"
- [I] paypal-currency-converter-basic-for-woocommerce
- [M] EDB-ID: 37253 "WordPress Plugin Paypal Currency Converter Basic For WooCommerce - File Read"
- [I] peugeot-music-plugin
- [M] EDB-ID: 44737 "WordPress Plugin Peugeot Music - Arbitrary File Upload"
- [I] photocart-link
- [M] EDB-ID: 39623 "WordPress Plugin Photocart Link 1.6 - Local File Inclusion"
- [I] photoracer
- [M] EDB-ID: 17720 "WordPress Plugin Photoracer 1.0 - SQL Injection"
- [M] EDB-ID: 17731 "WordPress Plugin Photoracer 1.0 - Multiple Vulnerabilities"
- [M] EDB-ID: 8961 "WordPress Plugin Photoracer 1.0 - 'id' SQL Injection"
- [I] photosmash-galleries
- [M] EDB-ID: 35429 "WordPress Plugin PhotoSmash Galleries 1.0.x - 'action' Cross-Site Scripting"
- [M] EDB-ID: 38872 "WordPress Plugin PhotoSmash Galleries - 'bwbps-uploader.php' Arbitrary File Upload"
- [I] php_speedy_wp
- [I] phpfreechat
- [M] EDB-ID: 37485 "WordPress Plugin PHPFreeChat - 'url' Cross-Site Scripting"
- [I] pica-photo-gallery
- [M] EDB-ID: 19016 "WordPress Plugin PICA Photo Gallery 1.0 - Remote File Disclosure"
- [M] EDB-ID: 19055 "WordPress Plugin Pica Photo Gallery 1.0 - Arbitrary File Upload"
- [I] pictpress
- [M] EDB-ID: 4695 "Karaoke Video Creator 2.2.8 - Denial of Service"
- [I] picturesurf-gallery
- [M] EDB-ID: 37371 "WordPress Plugin Picturesurf Gallery - 'upload.php' Arbitrary File Upload"
- [I] placester
- [M] EDB-ID: 35562 "WordPress Plugin Placester 0.1 - 'ajax_action' Cross-Site Scripting"
- [I] player
- [M] EDB-ID: 38458 "WordPress Plugin Spider Video Player - 'theme' SQL Injection"
- [I] plg_novana
- [I] plugin-dir
- [M] EDB-ID: 22853 "WordPress Plugin Facebook Survey 1.0 - SQL Injection"
- [I] plugin-newsletter
- [M] EDB-ID: 19018 "WordPress Plugin NewsLetter 1.5 - Remote File Disclosure"
- [I] podpress
- [M] EDB-ID: 38376 "WordPress Plugin podPress - 'playerID' Cross-Site Scripting"
- [I] portable-phpmyadmin
- [M] EDB-ID: 23356 "WordPress Plugin Portable phpMyAdmin - Authentication Bypass"
- [I] post-highlights
- [M] EDB-ID: 17790 "WordPress Plugin post highlights 2.2 - SQL Injection"
- [I] post-recommendations-for-wordpress
- [M] EDB-ID: 37506 "WordPress Plugin Post Recommendations - 'abspath' Remote File Inclusion"
- [I] powerhouse-museum-collection-image-grid
- [M] EDB-ID: 35287 "WordPress Plugin Powerhouse Museum Collection Image Grid 0.9.1.1 - 'tbpv_username' Cross-Site Scripting"
- [I] premium_gallery_manager
- [I] pretty-link
- [M] EDB-ID: 36233 "WordPress Plugin Pretty Link 1.4.56 - Multiple Cross-Site Scripting Vulnerabilities"
- [M] EDB-ID: 36408 "WordPress Plugin Pretty Link 1.5.2 - 'pretty-bar.php' Cross-Site Scripting"
- [M] EDB-ID: 37196 "WordPress Plugin Pretty Link Lite 1.5.2 - SQL Injection / Cross-Site Scripting"
- [M] EDB-ID: 38324 "WordPress Plugin Pretty Link - Cross-Site Scripting"
- [I] profiles
- [M] EDB-ID: 17739 "WordPress Plugin Profiles 2.0 RC1 - SQL Injection"
- [I] proplayer
- [M] EDB-ID: 17616 "WordPress Plugin ProPlayer 4.7.7 - SQL Injection"
- [M] EDB-ID: 25605 "WordPress Plugin ProPlayer 4.7.9.1 - SQL Injection"
- [I] pure-html
- [M] EDB-ID: 17758 "WordPress Plugin PureHTML 1.0.0 - SQL Injection"
- [I] q-and-a-focus-plus-faq
- [M] EDB-ID: 39806 "WordPress Plugin Q and A (Focus Plus) FAQ 1.3.9.7 - Multiple Vulnerabilities"
- [I] radykal-fancy-gallery
- [M] EDB-ID: 19398 "WordPress Plugin Fancy Gallery 1.2.4 - Arbitrary File Upload"
- [I] rating-widget
- [I] rb-agency
- [M] EDB-ID: 40333 "WordPress Plugin RB Agency 2.4.7 - Local File Disclosure"
- [I] rbxgallery
- [M] EDB-ID: 19019 "WordPress Plugin RBX Gallery 2.1 - Arbitrary File Upload"
- [I] real3d-flipbook
- [M] EDB-ID: 40055 "WordPress Plugin Real3D FlipBook - Multiple Vulnerabilities"
- [I] really-easy-slider
- [I] really-simple-guest-post
- [M] EDB-ID: 37209 "WordPress Plugin Really Simple Guest Post 1.0.6 - Local File Inclusion"
- [I] recent-backups
- [M] EDB-ID: 37752 "WordPress Plugin Recent Backups 0.7 - Arbitrary File Download"
- [I] recipe
- [M] EDB-ID: 31228 "WordPress Plugin Recipes Blog - 'id' SQL Injection"
- [I] reciply
- [M] EDB-ID: 35265 "WordPress Plugin Recip.ly 1.1.7 - 'uploadImage.php' Arbitrary File Upload"
- [I] reflex-gallery
- [M] EDB-ID: 36374 "WordPress Plugin Reflex Gallery 3.1.3 - Arbitrary File Upload"
- [I] rekt-slideshow
- [I] related-sites
- [M] EDB-ID: 9054 "Adobe Flash TextField.tabIndex Setter - Use-After-Free"
- [I] relocate-upload
- [M] EDB-ID: 17869 "WordPress Plugin Relocate Upload 0.14 - Remote File Inclusion"
- [I] rent-a-car
- [I] resume-submissions-job-postings
- [M] EDB-ID: 19791 "WordPress Plugin Resume Submissions & Job Postings 2.5.1 - Unrestricted Arbitrary File Upload"
- [I] rich-widget
- [M] EDB-ID: 37653 "WordPress Plugin Rich Widget - Arbitrary File Upload"
- [I] ripe-hd-player
- [M] EDB-ID: 24229 "WordPress Plugin Ripe HD FLV Player - SQL Injection"
- [I] robotcpa
- [M] EDB-ID: 37252 "WordPress Plugin RobotCPA V5 - Local File Inclusion"
- [I] rss-feed-reader
- [M] EDB-ID: 35261 "WordPress Plugin RSS Feed Reader 0.1 - 'rss_url' Cross-Site Scripting"
- [I] s3bubble-amazon-s3-html-5-video-with-adverts
- [M] EDB-ID: 37494 "WordPress Plugin S3Bubble Cloud Video With Adverts & Analytics 0.7 - Arbitrary File Download"
- [I] scormcloud
- [M] EDB-ID: 17793 "WordPress Plugin SCORM Cloud 1.0.6.6 - SQL Injection"
- [I] se-html5-album-audio-player
- [M] EDB-ID: 37274 "WordPress Plugin SE HTML5 Album Audio Player 1.1.0 - Directory Traversal"
- [I] search-autocomplete
- [M] EDB-ID: 17767 "WordPress Plugin SearchAutocomplete 1.0.8 - SQL Injection"
- [I] securimage-wp
- [M] EDB-ID: 38510 "WordPress Plugin Securimage-WP - 'siwp_test.php' Cross-Site Scripting"
- [I] sell-downloads
- [M] EDB-ID: 38868 "WordPress Plugin Sell Download 1.0.16 - Local File Disclosure"
- [I] sendit
- [M] EDB-ID: 17716 "WordPress Plugin SendIt 1.5.9 - Blind SQL Injection"
- [I] seo-automatic-seo-tools
- [M] EDB-ID: 34975 "WordPress Plugin SEO Tools 3.0 - 'file' Directory Traversal"
- [I] seo-watcher
- [M] EDB-ID: 38782 "WordPress Plugin SEO Watcher - 'ofc_upload_image.php' Arbitrary PHP Code Execution"
- [I] sermon-browser
- [M] EDB-ID: 17214 "WordPress Plugin SermonBrowser 0.43 - SQL Injection"
- [M] EDB-ID: 35657 "WordPress Plugin Sermon Browser 0.43 - Cross-Site Scripting / SQL Injection"
- [I] sexy-contact-form
- [M] EDB-ID: 34922 "WordPress Plugin Creative Contact Form 0.9.7 - Arbitrary File Upload"
- [M] EDB-ID: 35057 "WordPress Plugin 0.9.7 / Joomla! Component 2.0.0 Creative Contact Form - Arbitrary File Upload"
- [I] sf-booking
- [M] EDB-ID: 43475 "WordPress Plugin Service Finder Booking < 3.2 - Local File Disclosure"
- [I] sfbrowser
- [M] EDB-ID: 19054 "WordPress Plugin SfBrowser 1.4.5 - Arbitrary File Upload"
- [I] sfwd-lms
- [I] sh-slideshow
- [M] EDB-ID: 17748 "WordPress Plugin SH Slideshow 3.1.4 - SQL Injection"
- [I] sharebar
- [M] EDB-ID: 37201 "WordPress Plugin Sharebar 1.2.1 - SQL Injection / Cross-Site Scripting"
- [I] si-contact-form
- [M] EDB-ID: 36050 "WordPress Plugin Fast Secure Contact Form 3.0.3.1 - 'index.php' Cross-Site Scripting"
- [I] simple-ads-manager
- [M] EDB-ID: 36613 "WordPress Plugin Simple Ads Manager - Multiple SQL Injections"
- [M] EDB-ID: 36614 "WordPress Plugin Simple Ads Manager 2.5.94 - Arbitrary File Upload"
- [M] EDB-ID: 36615 "WordPress Plugin Simple Ads Manager - Information Disclosure"
- [M] EDB-ID: 39133 "WordPress Plugin Simple Ads Manager 2.9.4.116 - SQL Injection"
- [I] simple-download-button-shortcode
- [M] EDB-ID: 19020 "WordPress Plugin Simple Download Button ShortCode 1.0 - Remote File Disclosure"
- [I] simple-fields
- [M] EDB-ID: 44425 "WordPress Plugin Simple Fields 0.2 - 0.3.5 - Local/Remote File Inclusion / Remote Code Execution"
- [I] simple-forum
- [I] site-editor
- [M] EDB-ID: 44340 "Wordpress Plugin Site Editor 1.1.1 - Local File Inclusion"
- [I] site-import
- [M] EDB-ID: 39558 "WordPress Plugin Site Import 1.0.1 - Local/Remote File Inclusion"
- [I] skysa-official
- [M] EDB-ID: 36363 "WordPress Plugin Skysa App Bar - 'idnews' Cross-Site Scripting"
- [I] slider-image
- [M] EDB-ID: 37361 "WordPress Plugin Huge-IT Slider 2.7.5 - Multiple Vulnerabilities"
- [I] slideshow-gallery-2
- [M] EDB-ID: 36631 "WordPress Plugin Slideshow Gallery 1.1.x - 'border' Cross-Site Scripting"
- [I] slideshow-jquery-image-gallery
- [M] EDB-ID: 37948 "WordPress Plugin Slideshow - Multiple Cross-Site Scripting Vulnerabilities"
- [I] smart-flv
- [M] EDB-ID: 38331 "WordPress Plugin Smart Flv - 'jwplayer.swf' Multiple Cross-Site Scripting Vulnerabilities"
- [I] smart-google-code-inserter
- [I] sniplets
- [M] EDB-ID: 5194 "Wansview 1.0.2 - Denial of Service (PoC)"
- [I] social-discussions
- [M] EDB-ID: 22158 "WordPress Plugin social discussions 6.1.1 - Multiple Vulnerabilities"
- [I] social-slider-2
- [M] EDB-ID: 17617 "WordPress Plugin Social Slider 5.6.5 - SQL Injection"
- [I] socialfit
- [M] EDB-ID: 37481 "WordPress Plugin SocialFit - 'msg' Cross-Site Scripting"
- [I] sodahead-polls
- [I] sp-client-document-manager
- [M] EDB-ID: 35313 "WordPress Plugin SP Client Document Manager 2.4.1 - SQL Injection"
- [M] EDB-ID: 36576 "WordPress Plugin SP Project & Document Manager 2.5.3 - Blind SQL Injection"
- [I] spicy-blogroll
- [M] EDB-ID: 26804 "WordPress Plugin Spicy Blogroll - Local File Inclusion"
- [I] spider-event-calendar
- [M] EDB-ID: 25723 "WordPress Plugin Spider Event Calendar 1.3.0 - Multiple Vulnerabilities"
- [I] spiffy
- [M] EDB-ID: 38441 "WordPress Plugin Spiffy XSPF Player - 'playlist_id' SQL Injection"
- [I] st_newsletter
- [M] EDB-ID: 31096 "WordPress Plugin ShiftThis NewsLetter - SQL Injection"
- [M] EDB-ID: 6777 "Free Download Manager 2.5 Build 758 - Remote Control Server Buffer Overflow (Metasploit)"
- [I] store-locator-le
- [M] EDB-ID: 18989 "WordPress Plugin Google Maps via Store Locator 2.7.1 < 3.0.1 - Multiple Vulnerabilities"
- [I] taggator
- [I] taggedalbums
- [M] EDB-ID: 38023 "WordPress Plugin Tagged Albums - 'id' SQL Injection"
- [I] tagninja
- [M] EDB-ID: 35300 "WordPress Plugin TagNinja 1.0 - 'id' Cross-Site Scripting"
- [I] tera-charts
- [M] EDB-ID: 39256 "WordPress Plugin Tera Charts (tera-charts) - '/charts/treemap.php?fn' Directory Traversal"
- [M] EDB-ID: 39257 "WordPress Plugin Tera Charts (tera-charts) - '/charts/zoomabletreemap.php?fn' Directory Traversal"
- [I] the-welcomizer
- [M] EDB-ID: 36445 "WordPress Plugin The Welcomizer 1.3.9.4 - 'twiz-index.php' Cross-Site Scripting"
- [I] thecartpress
- [M] EDB-ID: 17860 "WordPress Plugin TheCartPress 1.1.1 - Remote File Inclusion"
- [M] EDB-ID: 36481 "WordPress Plugin TheCartPress 1.6 - 'OptionsPostsList.php' Cross-Site Scripting"
- [M] EDB-ID: 38869 "WordPress Plugin TheCartPress 1.4.7 - Multiple Vulnerabilities"
- [I] thinkun-remind
- [M] EDB-ID: 19021 "WordPress Plugin Thinkun Remind 1.1.3 - Remote File Disclosure"
- [I] tinymce-thumbnail-gallery
- [M] EDB-ID: 19022 "WordPress Plugin TinyMCE Thumbnail Gallery 1.0.7 - Remote File Disclosure"
- [I] topquark
- [M] EDB-ID: 19053 "WordPress Plugin Top Quark Architecture 2.10 - Arbitrary File Upload"
- [I] track-that-stat
- [M] EDB-ID: 37204 "WordPress Plugin Track That Stat 1.0.8 - Cross-Site Scripting"
- [I] trafficanalyzer
- [M] EDB-ID: 38439 "WordPress Plugin Traffic Analyzer - 'aoid' Cross-Site Scripting"
- [I] tune-library
- [M] EDB-ID: 17816 "WordPress Plugin Tune Library 2.17 - SQL Injection"
- [I] ucan-post
- [M] EDB-ID: 18390 "WordPress Plugin ucan post 1.0.09 - Persistent Cross-Site Scripting"
- [I] ultimate-product-catalogue
- [M] EDB-ID: 36823 "WordPress Plugin Ultimate Product Catalogue - SQL Injection (1)"
- [M] EDB-ID: 36824 "WordPress Plugin Ultimate Product Catalogue - SQL Injection (2)"
- [M] EDB-ID: 36907 "WordPress Plugin Ultimate Product Catalogue 3.1.2 - Multiple Persistent Cross-Site Scripting / Cross-Site Request Forgery / Arbitrary File Upload Vulnerabilities"
- [M] EDB-ID: 39974 "WordPress Plugin Ultimate Product Catalog 3.8.1 - Privilege Escalation"
- [M] EDB-ID: 40012 "WordPress Plugin Ultimate Product Catalog 3.8.6 - Arbitrary File Upload"
- [M] EDB-ID: 40174 "WordPress Plugin Ultimate Product Catalog 3.9.8 - do_shortcode via ajax Blind SQL Injection"
- [I] ungallery
- [M] EDB-ID: 17704 "WordPress Plugin UnGallery 1.5.8 - Local File Disclosure"
- [I] uploader
- [M] EDB-ID: 35255 "WordPress Plugin Uploader 1.0 - 'num' Cross-Site Scripting"
- [M] EDB-ID: 38163 "WordPress Plugin Uploader - Arbitrary File Upload"
- [M] EDB-ID: 38355 "WordPress Plugin Uploader - 'blog' Cross-Site Scripting"
- [I] uploadify-integration
- [M] EDB-ID: 37070 "WordPress Plugin Uploadify Integration 0.9.6 - Multiple Cross-Site Scripting Vulnerabilities"
- [I] uploads
- [I] upm-polls
- [M] EDB-ID: 17627 "WordPress Plugin UPM Polls 1.0.3 - SQL Injection"
- [I] user-avatar
- [I] user-meta
- [M] EDB-ID: 19052 "WordPress Plugin User Meta 1.1.1 - Arbitrary File Upload"
- [I] userpro
- [M] EDB-ID: 46083 "Wordpress Plugin UserPro < 4.9.21 - User Registration Privilege Escalation"
- [I] users-ultra
- [I] verve-meta-boxes
- [I] videowhisper-live-streaming-integration
- [M] EDB-ID: 31986 "WordPress Plugin VideoWhisper 4.27.3 - Multiple Vulnerabilities"
- [I] videowhisper-video-conference-integration
- [M] EDB-ID: 36617 "WordPress Plugin VideoWhisper Video Presentation 3.31.17 - Arbitrary File Upload"
- [M] EDB-ID: 36618 "WordPress Plugin VideoWhisper Video Conference Integration 4.91.8 - Arbitrary File Upload"
- [I] videowhisper-video-presentation
- [M] EDB-ID: 17771 "WordPress Plugin VideoWhisper Video Presentation 1.1 - SQL Injection"
- [M] EDB-ID: 37357 "WordPress Plugin VideoWhisper Video Presentation 3.17 - 'vw_upload.php' Arbitrary File Upload"
- [I] vk-gallery
- [I] vodpod-video-gallery
- [M] EDB-ID: 34976 "WordPress Plugin Vodpod Video Gallery 3.1.5 - 'vodpod_gallery_thumbs.php' Cross-Site Scripting"
- [I] wassup
- [I] webinar_plugin
- [M] EDB-ID: 22300 "WordPress Plugin Easy Webinar - Blind SQL Injection"
- [I] webplayer
- [I] website-contact-form-with-file-upload
- [M] EDB-ID: 36952 "WordPress Plugin N-Media Website Contact Form with File Upload 1.5 - Local File Inclusion"
- [I] website-faq
- [M] EDB-ID: 19400 "WordPress Plugin Website FAQ 1.0 - SQL Injection"
- [I] wechat-broadcast
- [M] EDB-ID: 45438 "WordPress Plugin Wechat Broadcast 1.2.0 - Local File Inclusion"
- [I] woocommerce
- [M] EDB-ID: 43196 "WordPress Plugin WooCommerce 2.0/3.0 - Directory Traversal"
- [I] woopra
- [M] EDB-ID: 38783 "WordPress Plugin Woopra Analytics - 'ofc_upload_image.php' Arbitrary PHP Code Execution"
- [I] wordpress-donation-plugin-with-goals-and-paypal-ipn-by-nonprofitcmsorg
- [M] EDB-ID: 17763 "Microsoft Edge 44.17763.1.0 - NULL Pointer Dereference"
- [I] wordpress-member-private-conversation
- [M] EDB-ID: 37353 "WordPress Plugin Nmedia WordPress Member Conversation 1.35.0 - 'doupload.php' Arbitrary File Upload"
- [I] wordpress-processing-embed
- [M] EDB-ID: 35066 "WordPress Plugin Processing Embed 0.5 - 'pluginurl' Cross-Site Scripting"
- [I] wordtube
- [M] EDB-ID: 3825 "GoodiWare GoodReader iPhone - '.XLS' Denial of Service"
- [I] work-the-flow-file-upload
- [M] EDB-ID: 36640 "WordPress Plugin Work The Flow File Upload 2.5.2 - Arbitrary File Upload"
- [I] wp-adserve
- [I] wp-audio-gallery-playlist
- [M] EDB-ID: 17756 "WordPress Plugin Audio Gallery Playlist 0.12 - SQL Injection"
- [I] wp-automatic
- [M] EDB-ID: 19187 "WordPress Plugin Automatic 2.0.3 - SQL Injection"
- [I] wp-autosuggest
- [M] EDB-ID: 45977 "WordPress Plugin AutoSuggest 0.24 - 'wpas_keys' SQL Injection"
- [I] wp-autoyoutube
- [M] EDB-ID: 18353 "WordPress Plugin wp-autoyoutube - Blind SQL Injection"
- [I] wp-bannerize
- [M] EDB-ID: 17764 "WordPress Plugin Bannerize 2.8.6 - SQL Injection"
- [M] EDB-ID: 17906 "WordPress Plugin Bannerize 2.8.7 - SQL Injection"
- [M] EDB-ID: 36193 "WordPress Plugin WP Bannerize 2.8.7 - 'ajax_sorter.php' SQL Injection"
- [I] wp-banners-lite
- [M] EDB-ID: 38410 "WordPress Plugin Banners Lite - 'wpbanners_show.php' HTML Injection"
- [I] wp-booking-calendar
- [M] EDB-ID: 44769 "Wordpress Plugin Booking Calendar 3.0.0 - SQL Injection / Cross-Site Scripting"
- [I] wp-business-intelligence
- [M] EDB-ID: 36600 "WordPress Plugin Business Intelligence - SQL Injection (Metasploit)"
- [I] wp-business-intelligence-lite
- [I] wp-cal
- [M] EDB-ID: 4992 "Sun xVM VirtualBox 2.2 < 3.0.2 r49928 - Local Host Reboot (Denial of Service) (PoC)"
- [I] wp-comment-remix
- [I] wp-content
- [M] EDB-ID: 37123 "WordPress Plugin WPsc MijnPress - 'rwflush' Cross-Site Scripting"
- [I] wp-copysafe-pdf
- [M] EDB-ID: 39254 "WordPress Plugin CopySafe PDF Protection - Arbitrary File Upload"
- [I] wp-cumulus
- [M] EDB-ID: 10228 "WordPress Plugin WP-Cumulus 1.20 - Full Path Disclosure / Cross-Site Scripting"
- [M] EDB-ID: 33371 "WordPress Plugin WP-Cumulus 1.x - 'tagcloud.swf' Cross-Site Scripting"
- [I] wp-custom-pages
- [M] EDB-ID: 17119 "WordPress Plugin Custom Pages 0.5.0.1 - Local File Inclusion"
- [I] wp-ds-faq
- [M] EDB-ID: 17683 "WordPress Plugin DS FAQ 1.3.2 - SQL Injection"
- [I] wp-e-commerce
- [M] EDB-ID: 36018 "WordPress Plugin WP E-Commerce 3.8.6 - 'cart_messages[]' Cross-Site Scripting"
- [I] wp-easycart
- [M] EDB-ID: 35730 "WordPress Plugin Shopping Cart 3.0.4 - Unrestricted Arbitrary File Upload"
- [I] wp-ecommerce-shop-styling
- [M] EDB-ID: 37530 "WordPress Plugin WP E-Commerce Shop Styling 2.5 - Arbitrary File Download"
- [I] wp-events-calendar
- [M] EDB-ID: 44785 "WordPress Plugin Events Calendar - SQL Injection"
- [I] wp-featured-post-with-thumbnail
- [M] EDB-ID: 35262 "WordPress Plugin WP Featured Post with Thumbnail 3.0 - 'src' Cross-Site Scripting"
- [I] wp-filebase
- [M] EDB-ID: 17808 "WordPress Plugin WP-Filebase Download Manager 0.2.9 - SQL Injection"
- [I] wp-filemanager
- [M] EDB-ID: 25440 "WordPress Plugin wp-FileManager - Arbitrary File Download"
- [M] EDB-ID: 38515 "WordPress Plugin wp-FileManager - 'path' Arbitrary File Download"
- [M] EDB-ID: 4844 "STDU Explorer 1.0.201 - 'dwmapi.dll' DLL Loading Arbitrary Code Execution"
- [I] wp-footnotes
- [M] EDB-ID: 31092 "WordPress Plugin WP-Footnotes 2.2 - Multiple Remote Vulnerabilities"
- [I] wp-forum
- [M] EDB-ID: 7738 "WordPress Plugin WP-Forum 1.7.8 - SQL Injection"
- [I] wp-glossary
- [M] EDB-ID: 18055 "WordPress Plugin Glossary - SQL Injection"
- [I] wp-google-drive
- [M] EDB-ID: 44435 "WordPress Plugin Google Drive 2.2 - Remote Code Execution"
- [I] wp-gpx-maps
- [M] EDB-ID: 19050 "WordPress Plugin wp-gpx-map 1.1.21 - Arbitrary File Upload"
- [I] wp-imagezoom
- [M] EDB-ID: 37243 "WordPress Plugin Wp-ImageZoom 1.1.0 - Multiple Vulnerabilities"
- [M] EDB-ID: 37419 "WordPress Plugin Wp-ImageZoom - 'file' Remote File Disclosure"
- [M] EDB-ID: 38063 "WordPress Theme Wp-ImageZoom - 'id' SQL Injection"
- [I] wp-livephp
- [M] EDB-ID: 36483 "WordPress Plugin WP Live.php 1.2.1 - 's' Cross-Site Scripting"
- [I] wp-lytebox
- [I] wp-marketplace
- [I] wp-menu-creator
- [M] EDB-ID: 17689 "WordPress Plugin Menu Creator 1.1.7 - SQL Injection"
- [I] wp-mobile-detector
- [M] EDB-ID: 39891 "WordPress Plugin WP Mobile Detector 3.5 - Arbitrary File Upload"
- [I] wp-people
- [M] EDB-ID: 31230 "WordPress Plugin wp-people 2.0 - 'wp-people-popup.php' SQL Injection"
- [I] wp-polls
- [M] EDB-ID: 10256 "WordPress Plugin WP-Polls 2.x - Incorrect Flood Filter"
- [I] wp-property
- [M] EDB-ID: 18987 "WordPress Plugin WP-Property 1.35.0 - Arbitrary File Upload"
- [I] wp-publication-archive
- [M] EDB-ID: 35263 "WordPress Plugin WP Publication Archive 2.0.1 - 'file' Information Disclosure"
- [I] wp-realty
- [M] EDB-ID: 29021 "WordPress Plugin Realty - Blind SQL Injection"
- [M] EDB-ID: 38808 "WordPress Plugin WP-Realty - 'listing_id' SQL Injection"
- [M] EDB-ID: 39109 "WordPress Plugin Relevanssi - 'category_name' SQL Injection"
- [I] wp-responsive-thumbnail-slider
- [M] EDB-ID: 45099 "WordPress Plugin Responsive Thumbnail Slider - Arbitrary File Upload (Metasploit)"
- [I] wp-safe-search
- [M] EDB-ID: 35067 "WordPress Plugin Safe Search - 'v1' Cross-Site Scripting"
- [I] wp-shopping-cart
- [M] EDB-ID: 6867 "Apple Mac OSX Software Update - Command Execution (Metasploit)"
- [I] wp-source-control
- [M] EDB-ID: 39287 "WordPress Plugin WP Content Source Control - 'download.php' Directory Traversal"
- [I] wp-spamfree
- [M] EDB-ID: 17970 "WordPress Plugin WP-SpamFree Spam Plugin - SQL Injection"
- [I] wp-starsratebox
- [M] EDB-ID: 35634 "WordPress Plugin WP-StarsRateBox 1.1 - 'j' SQL Injection"
- [I] wp-stats-dashboard
- [I] wp-support-plus-responsive-ticket-system
- [M] EDB-ID: 34589 "SCO UnixWare < 7.1.4 p534589 - 'pkgadd' Local Privilege Escalation"
- [I] wp-survey-and-quiz-tool
- [M] EDB-ID: 34974 "WordPress Plugin WP Survey And Quiz Tool 1.2.1 - Cross-Site Scripting"
- [I] wp-swimteam
- [M] EDB-ID: 37601 "WordPress Plugin Swim Team 1.44.10777 - Arbitrary File Download"
- [I] wp-symposium
- [M] EDB-ID: 17679 "WordPress Plugin Symposium 0.64 - SQL Injection"
- [M] EDB-ID: 35505 "WordPress Plugin Symposium 14.10 - SQL Injection"
- [M] EDB-ID: 35543 "WordPress Plugin WP Symposium 14.11 - Arbitrary File Upload"
- [M] EDB-ID: 37822 "WordPress Plugin WP Symposium 15.1 - Blind SQL Injection"
- [M] EDB-ID: 37824 "WordPress Plugin WP Symposium 15.1 - 'get_album_item.php' SQL Injection"
- [I] wp-syntax
- [M] EDB-ID: 9431 "Adobe Photoshop CC / Bridge CC - '.iff' Parsing Memory Corruption"
- [I] wp-table
- [M] EDB-ID: 3824 "Office^2 iPhone - '.XLS' Denial of Service"
- [I] wp-table-reloaded
- [M] EDB-ID: 38251 "WordPress Plugin WP-Table Reloaded - 'id' Cross-Site Scripting"
- [I] wp-twitter-feed
- [M] EDB-ID: 35084 "WordPress Plugin Twitter Feed - 'url' Cross-Site Scripting"
- [I] wp-whois
- [M] EDB-ID: 36488 "WordPress Plugin WHOIS 1.4.2 3 - 'domain' Cross-Site Scripting"
- [I] wp-with-spritz
- [M] EDB-ID: 44544 "WordPress Plugin WP with Spritz 1.0 - Remote File Inclusion"
- [I] wpSS
- [M] EDB-ID: 39279 "WordPress Plugin wpSS - 'ss_handler.php' SQL Injection"
- [M] EDB-ID: 5486 "PHP < 5.3.6 'OpenSSL' Extension - 'openssl_encrypt' Plaintext Data Memory Leak Denial of Service"
- [I] wp_rokintroscroller
- [M] EDB-ID: 38767 "WordPress Plugin RokIntroScroller - 'thumb.php' Multiple Vulnerabilities"
- [I] wp_rokmicronews
- [M] EDB-ID: 38768 "WordPress Plugin RokMicroNews - 'thumb.php' Multiple Vulnerabilities"
- [I] wp_roknewspager
- [M] EDB-ID: 38756 "WordPress Plugin RokNewsPager - 'thumb.php' Multiple Vulnerabilities"
- [I] wp_rokstories
- [M] EDB-ID: 38757 "WordPress Plugin RokStories - 'thumb.php' Multiple Vulnerabilities"
- [I] wpeasystats
- [M] EDB-ID: 17862 "WordPress Plugin WPEasyStats 1.8 - Remote File Inclusion"
- [I] wpforum
- [M] EDB-ID: 17684 "WordPress Plugin Forum 1.7.8 - SQL Injection"
- [I] wpmarketplace
- [M] EDB-ID: 18988 "WordPress Plugin Marketplace Plugin 1.5.0 < 1.6.1 - Arbitrary File Upload"
- [I] wpsite-background-takeover
- [M] EDB-ID: 44417 "WordPress Plugin Background Takeover < 4.1.4 - Directory Traversal"
- [I] wpstorecart
- [M] EDB-ID: 19023 "ActivePDF Toolkit < 8.1.0.19023 - Multiple Memory Corruptions"
- [I] wptf-image-gallery
- [M] EDB-ID: 37751 "WordPress Plugin WPTF Image Gallery 1.03 - Arbitrary File Download"
- [I] wptouch
- [M] EDB-ID: 18039 "WordPress Plugin wptouch - SQL Injection"
- [I] x7host-videox7-ugc-plugin
- [M] EDB-ID: 35257 "WordPress Plugin Videox7 UGC 2.5.3.2 - 'listid' Cross-Site Scripting"
- [M] EDB-ID: 35264 "WordPress Plugin Featured Content 0.0.1 - 'listid' Cross-Site Scripting"
- [I] xcloner-backup-and-restore
- [M] EDB-ID: 16246 "Joomla! Component com_xcloner-backupandrestore - Remote Command Execution"
- [I] xerte-online
- [M] EDB-ID: 38157 "WordPress Plugin Xerte Online - 'save.php' Arbitrary File Upload"
- [I] xml-and-csv-import-in-article-content
- [M] EDB-ID: 39576 "WordPress Plugin Import CSV 1.0 - Directory Traversal"
- [I] xorbin-analog-flash-clock
- [M] EDB-ID: 38608 "WordPress Plugin Xorbin Analog Flash Clock - 'widgetUrl' Cross-Site Scripting"
- [I] xorbin-digital-flash-clock
- [M] EDB-ID: 38621 "WordPress Plugin Xorbin Digital Flash Clock - 'widgetUrl' Cross-Site Scripting"
- [I] yolink-search
- [M] EDB-ID: 17757 "WordPress Plugin yolink Search 1.1.4 - SQL Injection"
- [I] yousaytoo-auto-publishing-plugin
- [M] EDB-ID: 36620 "WordPress Plugin YouSayToo auto-publishing 1.0 - 'submit' Cross-Site Scripting"
- [I] yt-audio-streaming-audio-from-youtube
- [M] EDB-ID: 35394 "WordPress Plugin YT-Audio 1.7 - 'v' Cross-Site Scripting"
- [I] zarzadzanie_kontem
- [M] EDB-ID: 38050 "WordPress Plugin Zarzadzonie Kontem - 'ajaxfilemanager.php' Script Arbitrary File Upload"
- [I] zingiri-forum
- [M] EDB-ID: 38101 "WordPress Plugin Zingiri Forums - 'language' Local File Inclusion"
- [I] zingiri-web-shop
- [M] EDB-ID: 17867 "WordPress Plugin Zingiri Web Shop 2.2.0 - Remote File Inclusion"
- [M] EDB-ID: 37406 "WordPress Plugin Zingiri Web Shop 2.4.3 - 'uploadfilexd.php' Arbitrary File Upload"
- [M] EDB-ID: 38046 "WordPress Plugin Zingiri Web Shop - 'path' Arbitrary File Upload"
- [I] zotpress
- [M] EDB-ID: 17778 "WordPress Plugin Zotpress 4.4 - SQL Injection"
- [I] Checking for Directory Listing Enabled ...
- [-] Date & Time: 11/02/2019 16:10:05
- [-] Completed in: 0:19:12
- #######################################################################################################################################
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Target IP: 208.113.216.34
- + Target Hostname: 208.113.216.34
- + Target Port: 80
- + Start Time: 2019-02-11 16:00:02 (GMT-5)
- ---------------------------------------------------------------------------------------------------------------------------------------
- + Server: No banner retrieved
- + Server leaks inodes via ETags, header found with file /, fields: 0x304 0x506c4687e0800
- + The anti-clickjacking X-Frame-Options header is not present.
- + The X-XSS-Protection header is not defined. This header can hint to the user agent to protect against some forms of XSS
- + The X-Content-Type-Options header is not set. This could allow the user agent to render the content of the site in a different fashion to the MIME type
- + No CGI Directories found (use '-C all' to force check all possible dirs)
- + Uncommon header 'x-squid-error' found, with contents: ERR_INVALID_URL 0
- + Allowed HTTP Methods: GET, HEAD, POST, OPTIONS
- + 7535 requests: 0 error(s) and 6 item(s) reported on remote host
- + End Time: 2019-02-11 16:45:43 (GMT-5) (2741 seconds)
- ---------------------------------------------------------------------------------------------------------------------------------------
- #######################################################################################################################################
- Anonymous JTSEC #OpDomesticTerrorism Full Recon #5
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement