Host 139.162.126.185
Japan
Akamai Technologies, Inc.
  • Git configuration and history exposed
    First seen 2023-01-14 12:34
    Last seen 2023-01-22 20:00
    Open for 8 days
    • Severity: high
      Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a652266866565

      [core]
      	repositoryformatversion = 0
      	filemode = true
      	bare = false
      	logallrefupdates = true
      [remote "origin"]
      	fetch = +refs/heads/*:refs/remotes/origin/*
      	url = ssh://meizhi@git.local.com:29418/qipai.git
      [branch "master"]
      	remote = origin
      	merge = refs/heads/master
      
      Found on 2023-01-14 12:34
      267 Bytes
  • Leak detected by NucleiPlugin
    First seen 2021-06-25 04:09
    Last seen 2021-07-01 15:02
    Open for 6 days
    • Fingerprint: 33fc8a384ee3c2e738e1ea3738e1ea37009ef99b22f1e08844969c8844969c88

      Nuclei scan report for tags wordpress, php:
      
      CVE-2017-5487 : WordPress Core < 4.7.1 - Username Enumeration by Manas_Harsh,daffainfo
      -------------
      wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.
      
      
      Found on 2021-06-25 04:09
Domain summary
No record