WARNING: This plugin will generate false positive and is purely informative:
regreSSHion: RCE in OpenSSH's server, on glibc-based Linux systems (CVE-2024-6387)
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb581e37d9a6fcdf7e36fcdf7e36fcdf7e36fcdf7e3
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.11 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb53ea6237e8f56bf578f56bf578f56bf578f56bf57
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_8.9p1 Ubuntu-3ubuntu0.13 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb581e37d9f0be3b35a0be3b35a0be3b35a0be3b35a
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.14 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb581e37d980ae5d88d0ae5d88d0ae5d88d0ae5d88d
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_9.6p1 Ubuntu-3ubuntu13.13 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
Severity: info
Fingerprint: 3f43e0ebb5dce37ab8b59eb50006c01bfe916ff6fe916ff6fe916ff6fe916ff6
Found potentially vulnerable SSH version: SSH-2.0-OpenSSH_8.7 WARNING, RISK IS ESTIMATED FALSE POSITIVE ARE LIKELY
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a652256f985e6
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = git@github.com:joeappleton18/mums-updated-website.git fetch = +refs/heads/*:refs/remotes/origin/* [pull] rebase = false
Severity: medium
Fingerprint: 2580fa947e78dd08e645819d5d7cc601762a199a2c79b20f9396e3a37d59324b
HTTP/1.1 200 OK Server: nginx/1.20.1 Date: Sat, 06 May 2023 12:30:50 GMT Content-Type: text/html; charset=UTF-8 Transfer-Encoding: chunked Connection: close X-Powered-By: PHP/8.0.13 Page title: Costa Teguise Lanzarote Massage & Sports Treatments [core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = git@github.com:joeappleton18/mums-updated-website.git fetch = +refs/heads/*:refs/remotes/origin/* [pull] rebase = false
The following URL (usually /.git/config) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a652256f985e6
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = git@github.com:joeappleton18/mums-updated-website.git fetch = +refs/heads/*:refs/remotes/origin/* [pull] rebase = false
No description available
Fingerprint: 33fc8a384ee3c2e738e1ea3738e1ea3779186a7b035f9268035f9268577dc52d
Nuclei scan report for tags wordpress, php: wordpress-xmlrpc-listmethods : Wordpress XML-RPC List System Methods by 0ut0fb4nd ------------- wordpress-xmlrpc-file : WordPress xmlrpc by udit_thakkur -------------