Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [+] FireWall Detector
- [++] Firewall not detected
- [+] Detecting Joomla Version
- [++] Joomla 2.5
- [+] Core Joomla Vulnerability
- [++] Joomla! 'redirect.php' SQL Injection Vulnerability
- EDB : https://www.exploit-db.com/exploits/36913/
- Joomla! 2.5.0 < 2.5.1 - Time Based SQL Injection
- EDB : https://www.exploit-db.com/exploits/18618/
- Joomla! 'highlight.php' PHP Object Injection
- CVE : CVE-2013-1453
- EDB : https://www.exploit-db.com/exploits/24551/
- Joomla! 'remember.php' PHP Object Injection
- CVE : CVE-2013-3242
- EDB : https://www.exploit-db.com/exploits/25087/
- Joomla! 1.5 < 3.4.5 - Object Injection Remote Command Execution
- CVE : CVE-2015-8562
- EDB : https://www.exploit-db.com/exploits/38977/
- Joomla! 1.0 < 3.4.5 - Object Injection 'x-forwarded-for' Header Remote Code Execution
- CVE : CVE-2015-8562 , CVE-2015-8566
- EDB : https://www.exploit-db.com/exploits/39033/
- Joomla! Core Remote Privilege Escalation Vulnerability
- CVE : CVE-2016-9838
- EDB : https://www.exploit-db.com/exploits/41157/
- Joomla! 1.6/1.7/2.5 privilege escalation vulnerability
- CVE : CVE-2012-1563
- EDB : https://www.exploit-db.com/exploits/41156/
- Joomla! Component Akeeba Kickstart - Unserialize Remote Code Execution
- CVE : CVE-2014-7228
- EDB : https://www.exploit-db.com/exploits/35033/
- Joomla! 'media.php' Arbitrary File Upload Vulnerability
- CVE : CVE-2013-5576
- EDB : https://www.exploit-db.com/exploits/27610/
- Joomla! Clickjacking Security Bypass Vulnerability
- CVE : CVE-2012-5827
- https://developer.joomla.org/security/news/543-20121101-core-clickjacking.html
- https://developer.joomla.org/security/news/544-20121102-core-clickjacking.html
- Joomla! Highlighter Plugin Unspecified Cross-Site Scripting Vulnerability
- CVE : CVE-2013-3267
- https://developer.joomla.org/security/86-20130407-core-xss-vulnerability.html
- Joomla! Security Bypass Vulnerability
- CVE : CVE-2013-3056
- http://www.securityfocus.com/bid/59490/info
- Joomla! Information Disclosure Vulnerability
- CVE : CVE-2013-3057
- http://www.securityfocus.com/bid/59489
- http://developer.joomla.org/security/82-20130402-core-information-disclosure.html
- Joomla! Unspecified Cross-Site Scripting Vulnerability
- CVE : CVE-2013-3058
- http://www.securityfocus.com/bid/59483
- http://developer.joomla.org/security/81-20130403-core-xss-vulnerability.html
- Joomla! Unspecified Cross-Site Scripting Vulnerability
- CVE : CVE-2013-3059
- https://developer.joomla.org/security/80-20130405-core-xss-vulnerability.html
- Joomla! Core Authentication Bypass Vulnerability
- CVE :CVE-2014-6632
- http://developer.joomla.org/security/594-20140902-core-unauthorised-logins.html
- Joomla! Core Remote Denial of Service Vulnerability
- CVE : CVE-2014-7229
- https://developer.joomla.org/security/596-20140904-core-denial-of-service.html
- PHPMailer Remote Code Execution Vulnerability
- CVE : CVE-2016-10033
- https://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection
- https://github.com/opsxcq/exploit-CVE-2016-10033
- EDB : https://www.exploit-db.com/exploits/40969/
- PPHPMailer Incomplete Fix Remote Code Execution Vulnerability
- CVE : CVE-2016-10045
- https://www.rapid7.com/db/modules/exploit/multi/http/phpmailer_arg_injection
- EDB : https://www.exploit-db.com/exploits/40969/
- [+] Checking apache info/status files
- [++] Readable info/status files are not found
- [+] admin finder
- [++] Admin page : https://ace.nd.edu/administrator/
- [+] Checking robots.txt existing
- [++] robots.txt is found
- path : https://ace.nd.edu/robots.txt
- Interesting path found from robots.txt
- https://ace.nd.edu/joomla/administrator/
- https://ace.nd.edu/administrator/
- https://ace.nd.edu/bin/
- https://ace.nd.edu/cache/
- https://ace.nd.edu/cli/
- https://ace.nd.edu/components/
- https://ace.nd.edu/includes/
- https://ace.nd.edu/installation/
- https://ace.nd.edu/language/
- https://ace.nd.edu/layouts/
- https://ace.nd.edu/libraries/
- https://ace.nd.edu/logs/
- https://ace.nd.edu/modules/
- https://ace.nd.edu/plugins/
- https://ace.nd.edu/tmp/
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement