The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
A JSON configuration file has been found at config.json
.
It may contains application configuration such as credentials.
False positive might happen when hitting a JSON API endpoint.
Fingerprint: b18befd9dd6536ad3355122ccd9007f5f15e03beac13c0f37d41c17a06df3f2d
{ "app_version" : "111", "web_version" : "161", "web_version_code" : "1.6.1", "app_version_code" : "1.1.1", "removed_directories" : [ ] }
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: medium
Fingerprint: 5f32cf5d6962f09ca629b8b1a629b8b1375cdd9f088d02dd2dc82407c0ef161a
Found 34 files trough .DS_Store spidering: /.editorconfig /.env /.env.example /.git /.gitattributes /.gitignore /.htaccess /.idea /.rnd /.styleci.yml /app /artisan /bootstrap /composer.json /composer.lock /composer.phar /config /database /index.php /installation /package-lock.json /package.json /php.ini /phpunit.xml /public /README.md /resources /routes /server.php /storage /test.txt /tests /vendor /webpack.mix.js
Severity: medium
Fingerprint: 5f32cf5d6962f09cccd847a3ccd847a39b366cb5a45e133fecd4d749247e04c8
Found 43 files trough .DS_Store spidering: /.editorconfig /.env /.env.example /.git /.gitattributes /.gitignore /.htaccess /.idea /.rnd /.styleci.yml /app /app/Console /app/CPU /app/Exceptions /app/Http /app/Library /app/Mail /app/Model /app/Providers /app/User.php /artisan /bootstrap /composer.json /composer.lock /composer.phar /config /database /index.php /installation /package-lock.json /package.json /php.ini /phpunit.xml /public /README.md /resources /routes /server.php /storage /test.txt /tests /vendor /webpack.mix.js
Severity: high
Fingerprint: 5f32cf5d6962f09c3b95ca2b3b95ca2bafb92dad6eff3af77467718196af47a5
Found 58 files trough .DS_Store spidering: /.editorconfig /.env /.env.example /.git /.gitattributes /.gitignore /.htaccess /.idea /.rnd /.styleci.yml /app /app/Console /app/CPU /app/Exceptions /app/Http /app/Library /app/Mail /app/Model /app/Providers /app/User.php /artisan /bootstrap /composer.json /composer.lock /composer.phar /config /database /index.php /installation /installation/activate_install_routes.txt /installation/activate_update_routes.txt /installation/backup /installation/backup/database.sql /installation/backup/database_v6.0.sql /installation/backup/database_v7.0.sql /installation/backup/database_v7.1.sql /installation/backup/database_v8.0.sql /installation/backup/database_v9.0.sql /installation/backup/public.zip /package-lock.json /package.json /php.ini /phpunit.xml /public /public/assets /public/assets/back-end /public/assets/back-end/vendor /public/assets/back-end/vendor/fontawesome-free /public/assets/back-end/vendor/fontawesome-free/svgs /README.md /resources /routes /server.php /storage /test.txt /tests /vendor /webpack.mix.js
A JSON configuration file has been found at config.json
.
It may contains application configuration such as credentials.
False positive might happen when hitting a JSON API endpoint.
Fingerprint: b18befd9dd6536ad3355122cfb970c24c86207defd6e899235725cec5401d1b7
{ "app_version" : "114", "web_version" : "164", "web_version_code" : "1.6.4", "app_version_code" : "1.1.4", "removed_directories" : [ ] }
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following URL (usually /.git/config
) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522e33df41b
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://gitlab.com/ferchichinabil/artisell.git fetch = +refs/heads/*:refs/remotes/origin/*
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: medium
Fingerprint: 5f32cf5d6962f09ca629b8b1a629b8b1375cdd9f088d02dd2dc82407c0ef161a
Found 34 files trough .DS_Store spidering: /.editorconfig /.env /.env.example /.git /.gitattributes /.gitignore /.htaccess /.idea /.rnd /.styleci.yml /app /artisan /bootstrap /composer.json /composer.lock /composer.phar /config /database /index.php /installation /package-lock.json /package.json /php.ini /phpunit.xml /public /README.md /resources /routes /server.php /storage /test.txt /tests /vendor /webpack.mix.js
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following URL (usually /.git/config
) is publicly accessible and is leaking source code and repository configuration.
Severity: medium
Fingerprint: 2580fa947178c88602b1737db148c044b81b03713d63bb82370a6522c37d5872
[core] repositoryformatversion = 0 filemode = true bare = false logallrefupdates = true [remote "origin"] url = https://gitlab.com/ferchichinabil/mydemolive.git fetch = +refs/heads/*:refs/remotes/origin/*
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
The following CloudPanel instance is publicly accessible and looks out-dated :
It is critical to update to a safe version as soon as possible since it could lead to RCE ( Remote Code Execution ). Those vulnerabilities are currently used in ransomware campaign and could damage your network.
Reference:
Severity: critical
Fingerprint: 8bb944476a146f564acb1065676cae8c22dc3d2e6a7521e86a7521e86a7521e8
Found vulnerable CloudPanel: Affected by CVE-2023-35885 Affected by CVE-2023-36630 Affected by CVE-2023-33747
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: low
Fingerprint: 5f32cf5d6962f09cc169dbbec169dbbe5dc414c71e5e205a9238b6b7dfd2c6a0
Found 15 files trough .DS_Store spidering: /plugins /plugins/affiliate /plugins/image-optimizer /plugins/offload /plugins/offload/aws /uploads /uploads/cache /uploads/cache/altumcode.com /uploads/favicon /uploads/logo /uploads/logo/altumcode.com /uploads/offline_payment_proofs /uploads/opengraph /uploads/qr_codes /uploads/qr_codes/logo
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: medium
Fingerprint: 5f32cf5d6962f09c20f30ab920f30ab944926ee45c50475838dd0f9e57fbed69
Found 67 files trough .DS_Store spidering: /.htaccess /app /app/controllers /app/controllers/Account.php /app/controllers/AccountDelete.php /app/controllers/AccountLogs.php /app/controllers/AccountPayments.php /app/controllers/AccountPlan.php /app/controllers/ActivateUser.php /app/controllers/admin /app/controllers/admin-api /app/controllers/Cron.php /app/controllers/Dashboard.php /app/controllers/DashboardAjaxLightweight.php /app/controllers/DashboardAjaxNormal.php /app/controllers/GoalsAjax.php /app/controllers/Heatmap.php /app/controllers/Heatmaps.php /app/controllers/HeatmapsAjax.php /app/controllers/Help.php /app/controllers/Index.php /app/controllers/Invoice.php /app/controllers/Login.php /app/controllers/Logout.php /app/controllers/LostPassword.php /app/controllers/NotFound.php /app/controllers/Page.php /app/controllers/Pages.php /app/controllers/Pay.php /app/controllers/PayThankYou.php /app/controllers/Pixel.php /app/controllers/PixelTrack.php /app/controllers/Plan.php /app/controllers/Realtime.php /app/controllers/Register.php /app/controllers/Replay.php /app/controllers/Replays.php /app/controllers/ReplaysAjax.php /app/controllers/ResendActivation.php /app/controllers/ResetPassword.php /app/controllers/SessionAjax.php /app/controllers/Sitemap.php /app/controllers/Team.php /app/controllers/Teams.php /app/controllers/TeamsAjax.php /app/controllers/TeamsAssociationsAjax.php /app/controllers/Visitor.php /app/controllers/Visitors.php /app/controllers/VisitorsAjax.php /app/controllers/Websites.php /app/controllers/WebsitesAjax.php /app/core /app/helpers /app/includes /app/init.php /app/languages /app/languages/admin /app/middlewares /app/models /app/traits /config.php /debug.log /index.php /plugins /plugins/affiliate /uploads /uploads/opengraph
.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: medium
Fingerprint: 5f32cf5d6962f09ca629b8b1a629b8b1375cdd9f088d02dd2dc82407c0ef161a
Found 34 files trough .DS_Store spidering: /.editorconfig /.env /.env.example /.git /.gitattributes /.gitignore /.htaccess /.idea /.rnd /.styleci.yml /app /artisan /bootstrap /composer.json /composer.lock /composer.phar /config /database /index.php /installation /package-lock.json /package.json /php.ini /phpunit.xml /public /README.md /resources /routes /server.php /storage /test.txt /tests /vendor /webpack.mix.js
Severity: medium
Fingerprint: 5f32cf5d6962f09cccd847a3ccd847a39b366cb5a45e133fecd4d749247e04c8
Found 43 files trough .DS_Store spidering: /.editorconfig /.env /.env.example /.git /.gitattributes /.gitignore /.htaccess /.idea /.rnd /.styleci.yml /app /app/Console /app/CPU /app/Exceptions /app/Http /app/Library /app/Mail /app/Model /app/Providers /app/User.php /artisan /bootstrap /composer.json /composer.lock /composer.phar /config /database /index.php /installation /package-lock.json /package.json /php.ini /phpunit.xml /public /README.md /resources /routes /server.php /storage /test.txt /tests /vendor /webpack.mix.js
Open service 38.242.233.4:22
2024-12-17 20:01
alphamarket.mydemolive.xyz 4 artisell.mydemolive.xyz 3 market.mydemolive.xyz 2 myqrgenerator.online 2 analytics66.eu 2 app.mydemolive.xyz 2 frontmaket.mydemolive.xyz 2 safenow.online 1 eurokitchens.mydemolive.xyz 1 accfinance.pro 1 dev.mydemolive.xyz 1 wallet.easybilling.pro 1 furnito.mydemolive.xyz 1 franceinf.com 1 wecando.store 1 beta.itshosting.eu 1 online.groceryfood.store 1 pay.wedidit.store 1 syshelp24.online 1 3dsp.impfinance.pro 1 alphastore.mydemolive.xyz 1 mydemolive.xyz 1 school.mydemolive.xyz 1 tubemp7.com 1 schoolmanager.mydemolive.xyz 1 safemeline.online 1 boitenor.mydemolive.xyz 1 startwin.live 1 windefender.pro 1 impofinance.pro 1 pay.mydemolive.xyz 1 helperme.online 1 s2.mydemolive.xyz 1 syshelp24.xyz 1 az2.co 1 startwin.xyz 1 aaber.mydemolive.xyz 1 3ds.wedidit.store 1 impotslow.com 1 samaschool.mydemolive.xyz 1 postbmail.com 1 lamaisondefrance.online 1 3ds.impfinance.pro 1 worlde.be 1 wedidit.pro 1 lamaisondefrance.store 1 worlde.lu 1 impotonline.com 1 www.myqrgenerator.online 1 www.analytics66.eu 1 makeqrmenu.com 1 europeankitchens.mydemolive.xyz 1 www.makeqrmenu.com 1 www.worlde.lu 1 impots-gou-fr.com 1