Advertisement
GhostSecCanada

#OpChildSafety EXPLOITS FOR TEENSEX.COM

Jul 13th, 2020
972
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.25 KB | None | 0 0
  1. Owned By highwebmedia.com
  2. 68.169.79.212
  3. teensex.com
  4. "title": "TeenSex.com - Free Teen Sex Cams & Teen Sex Videos",
  5. "status_code": 200,
  6. "status_line": "200 OK",
  7. "headers": {
  8. "unknown": [
  9. {
  10. "key": "date",
  11. "value": "Tue, 07 Jul 2020 19:05:15 GMT"
  12. }
  13. ],
  14. "x_powered_by": "PHP/7.2.19-0ubuntu0.18.04.2",
  15. "vary": "Accept-Encoding",
  16. "server": "Apache/2.4.29 (Ubuntu)",
  17. "content_type": "text/html; charset=UTF-8", "access_control_allow_origin": "*"
  18. },
  19. "body_sha256": "cfef88192b4ec484e14e287ff32febce4d5405fcae4aa2b84f125102bac16d96", "metadata": {
  20. "product": "httpd",
  21. "version": "2.4.29",
  22. "description": "Apache httpd 2.4.29",
  23. "manufacturer": "Apache"
  24. }
  25. }
  26. } "ports": [
  27. 993,
  28. 995,
  29. 587,
  30. 110,
  31. 143,
  32. 80,
  33. 25,
  34. 443
  35. ],
  36. "protocols": [
  37. "80/http",
  38. "993/imaps",
  39. "995/pop3s",
  40. "25/smtp",
  41. "110/pop3",
  42. "143/imap",
  43. "443/https",
  44. "587/smtp"
  45. ],
  46. "metadata": {
  47. "os": "Ubuntu",
  48.  
  49.  
  50. teensex.com (68.169.79.212)
  51. Host is up, received user-set (0.089s latency).
  52. Scanned at 2020-07-13 02:22:55 CST for 29s
  53. Not shown: 992 filtered ports
  54. Reason: 991 no-responses and 1 host-unreach
  55. PORT STATE SERVICE REASON VERSION
  56.  
  57. 80/tcp open http syn-ack Apache httpd 2.4.29
  58. |_http-server-header: Apache/2.4.29 (Ubuntu)
  59. | [55782] Apache HTTP Server mod_deflate Module Aborted Connection DoS
  60. | [55553] Apache HTTP Server mod_proxy Module mod_proxy_http.c stream_reqbody_cl Function CPU Consumption DoS
  61. | [55059] Apache APR-util strmatch/apr_strmatch.c apr_strmatch_precompile Function Crafted Input Remote DoS | [55058] Apache APR-util apr_brigade_vprintf Function Crafted Input Off-by-one Remote DoS
  62. | [55057] Apache APR-util xml/apr_xml.c apr_xml_* Interface Expat XML Parser Crafted XML Document Remote DoS
  63. | [55056] Apache Tomcat Cross-application TLD File Manipulation
  64. | [55055] Apache Tomcat Illegal URL Encoded Password Request Username Enumeration
  65. | [55054] Apache Tomcat Java AJP Connector mod_jk Load Balancing Worker Malformed Header Remote DoS
  66. | [55053] Apache Tomcat Crafted Request Security Restraint Bypass Arbitrary Content Access
  67. | [54733] Apache HTTP Server AllowOverride Directive .htaccess Options Bypass
  68. | [54713] razorCMS Security Manager apache User Account Unspecified File Permission Weakness Issue
  69. | [54589] Apache Jserv Nonexistent JSP Request XSS
  70. | [54122] Apache Struts s:a / s:url Tag href Element XSS
  71.  
  72.  
  73. 110/tcp open pop3 syn-ack Dovecot pop3d
  74. 143/tcp open imap syn-ack Dovecot imapd (Ubuntu)
  75. [96172] Dovecot POP3 Service Terminated LIST Command Remote DoS
  76. | [93525] Dovecot IMAP APPEND Command Malformed Parameter Parsing Remote DoS
  77. | [93004] Dovecot with Exim sender_address Parameter Remote Command Execution
  78. | [88058] Dovecot lib-storage/mail-search.c Multiple Keyword Search Handling Remote DoS
  79. | [77185] Dovecot SSL Certificate Common Name Field MitM Spoofing Weakness
  80. | [74515] Dovecot script-login chroot Configuration Setting Traversal Arbitrary File Access
  81. | [74514] Dovecot script-login User / Group Configuration Settings Remote Access Restriction Bypass
  82. | [72495] Dovecot lib-mail/message-header-parser.c Mail Header Name NULL Character Handling Remote DoS
  83.  
  84. 443/tcp open ssl/ssl syn-ack Apache httpd (SSL-only mode)
  85. |_http-server-header: Apache/2.4.29 (Ubuntu)
  86. [75211] Debian GNU/Linux apache 2 cross-site scripting
  87. [20897] PHP w/ Apache 2 SAPI virtual() Function Unspecified INI Setting Disclosure
  88.  
  89. 587/tcp open smtp syn-ack Postfix smtpd
  90. | [94034] Linux Kernel Broadcom B43 Wireless Driver b43_request_firmware Function fwpostfix modprobe Parameter Format String Local Privilege Escalation
  91. | [78567] Postfix Admin backup.php Unspecified SQL Injection
  92. | [78566] Postfix Admin functions.inc.php pacrypt() Function Unspecified SQL Injection
  93. | [78565] Postfix Admin create-domain.php Unspecified SQL Injection
  94. | [78564] Postfix Admin Unspecified XSS
  95. | [78563] Postfix Admin edit-alias.php Unspecified XSS
  96. | [78562] Postfix Admin create-alias.php Unspecified XSS
  97. | [78561] Postfix Admin create-domain.php Unspecified XSS
  98. | [78560] Postfix Admin templates/edit-vacation.php domain Parameter XSS
  99. | [78559] Postfix Admin templates/menu.php domain Parameter XSS
  100. | [72259] Postfix SMTP Cyrus SASL Authentication Context Data Reuse Memory Corruption
  101. | [71021] Postfix STARTTLS Arbitrary Plaintext Command Injection
  102.  
  103. 993/tcp open ssl/imap syn-ack Dovecot imapd (Ubuntu)
  104. 995/tcp open ssl/pop3 syn-ack Dovecot pop3d
  105. | [4918] IPOP3D, Buffer overflow attack
  106. | [1560] IPOP3D, user login successful
  107. | [1559] IPOP3D user login to remote host successful
  108. | [1525] IPOP3D, user logout
  109. | [1524] IPOP3D, user auto-logout
  110. | [1523] IPOP3D, user login failure
  111. | [1522] IPOP3D, brute force attack
  112. | [1521] IPOP3D, user kiss of death logout
  113. | [418] pop3d mktemp creates insecure temporary files
  114. 8888/tcp closed sun-answerbook conn-refused
  115.  
  116. USSR LOGIN
  117.  
  118. http://cams.teensex.com/auth/login/
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement