The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
                                        
                                        Fingerprint: 3ae8115d762f12d03c1efc2c3c1efc2c3c1efc2c3c1efc2c3c1efc2c3c1efc2c
Laravel Telescope enabled at https://3.136.87.119:3152
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
                                        
                                        Fingerprint: 3ae8115d762f12d0cd8c2c69cd8c2c69cd8c2c69cd8c2c69cd8c2c69cd8c2c69
Laravel Telescope enabled at https://3.136.87.119:4578
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
                                        
                                        Fingerprint: 3ae8115d762f12d084df84e684df84e684df84e684df84e684df84e684df84e6
Laravel Telescope enabled at https://3.136.87.119:7617
No description available
                                        
                                        Fingerprint: 33fc8a384ee3c2e7663e82b9663e82b98b47797d1d2248261d2248261d224826
Nuclei scan report for tags wordpress, php, nginx: wordpress-xmlrpc-listmethods : Wordpress XML-RPC List System Methods by 0ut0fb4nd -------------
                                        
                                        Fingerprint: 33fc8a384ee3c2e7663e82b9663e82b98b47797d1d2248261d224826df44c810
Nuclei scan report for tags wordpress, php, nginx: wordpress-xmlrpc-listmethods : Wordpress XML-RPC List System Methods by 0ut0fb4nd ------------- wp-license-file : WordPress license file disclosure by yashgoti ------------- wordpress-xmlrpc-file : WordPress xmlrpc by udit_thakkur -------------
No description available
                                        
                                        Fingerprint: 33fc8a384ee3c2e738e1ea3738e1ea37009ef99b22f1e08844969c8825d7956b
Nuclei scan report for tags wordpress, php: CVE-2017-5487 : WordPress Core < 4.7.1 - Username Enumeration by Manas_Harsh,daffainfo ------------- wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request. wordpress-xmlrpc-listmethods : Wordpress XML-RPC List System Methods by 0ut0fb4nd ------------- wp-license-file : WordPress license file disclosure by yashgoti ------------- wordpress-xmlrpc-file : WordPress xmlrpc by udit_thakkur -------------
                                        
                                        Fingerprint: 33fc8a384ee3c2e738e1ea3738e1ea37009ef99b22f1e08844969c8844969c88
Nuclei scan report for tags wordpress, php: CVE-2017-5487 : WordPress Core < 4.7.1 - Username Enumeration by Manas_Harsh,daffainfo ------------- wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.