The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0c3784e84c3784e84c3784e84c3784e84c3784e84c3784e84
Laravel Telescope enabled at https://47.129.253.163:5011
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d05d98354b5d98354b5d98354b5d98354b5d98354b5d98354b
Laravel Telescope enabled at https://47.129.253.163:8002
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d02a959c422a959c422a959c422a959c422a959c422a959c42
Laravel Telescope enabled at https://47.129.253.163:2023
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d06d90b0516d90b0516d90b0516d90b0516d90b0516d90b051
Laravel Telescope enabled at https://47.129.253.163:10443
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d029959aef29959aef29959aef29959aef29959aef29959aef
Laravel Telescope enabled at https://47.129.253.163:2031
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0dc147596dc147596dc147596dc147596dc147596dc147596
Laravel Telescope enabled at https://47.129.253.163:11443
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0659842296598422965984229659842296598422965984229
Laravel Telescope enabled at https://47.129.253.163:8088
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0dd1eada3dd1eada3dd1eada3dd1eada3dd1eada3dd1eada3
Laravel Telescope enabled at https://47.129.253.163:6732
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d03c05d48d3c05d48d3c05d48d3c05d48d3c05d48d3c05d48d
Laravel Telescope enabled at https://47.129.253.163:3306
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0659842236598422365984223659842236598422365984223
Laravel Telescope enabled at https://47.129.253.163:8082
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0f19df52ff19df52ff19df52ff19df52ff19df52ff19df52f
Laravel Telescope enabled at https://47.129.253.163:7201
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0eb1abda2eb1abda2eb1abda2eb1abda2eb1abda2eb1abda2
Laravel Telescope enabled at https://47.129.253.163:83
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0400ec6d7400ec6d7400ec6d7400ec6d7400ec6d7400ec6d7
Laravel Telescope enabled at https://47.129.253.163:444
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0ef9fd724ef9fd724ef9fd724ef9fd724ef9fd724ef9fd724
Laravel Telescope enabled at https://47.129.253.163:8500
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d00208f7cd0208f7cd0208f7cd0208f7cd0208f7cd0208f7cd
Laravel Telescope enabled at https://47.129.253.163:9443
Fingerprint: 3ae8115d762f12d0c93de2bcc93de2bcc93de2bcc93de2bcc93de2bcc93de2bc
Laravel Telescope enabled at http://47.129.253.163:9443
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0c07849ccc07849ccc07849ccc07849ccc07849ccc07849cc
Laravel Telescope enabled at https://47.129.253.163:5020
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d05d9835415d9835415d9835415d9835415d9835415d983541
Laravel Telescope enabled at https://47.129.253.163:8008
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0c3784e8cc3784e8cc3784e8cc3784e8cc3784e8cc3784e8c
Laravel Telescope enabled at https://47.129.253.163:5019
Fingerprint: 3ae8115d762f12d0779312397793123977931239779312397793123977931239
Laravel Telescope enabled at http://47.129.253.163:5019
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0659842266598422665984226659842266598422665984226
Laravel Telescope enabled at https://47.129.253.163:8087
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d05fa981f35fa981f35fa981f35fa981f35fa981f35fa981f3
Laravel Telescope enabled at https://47.129.253.163:8983
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0eb1abda5eb1abda5eb1abda5eb1abda5eb1abda5eb1abda5
Laravel Telescope enabled at https://47.129.253.163:84
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0f186f2e2f186f2e2f186f2e2f186f2e2f186f2e2f186f2e2
Laravel Telescope enabled at https://47.129.253.163:10000
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d05d9835405d9835405d9835405d9835405d9835405d983540
Laravel Telescope enabled at https://47.129.253.163:8009
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d05d98354d5d98354d5d98354d5d98354d5d98354d5d98354d
Laravel Telescope enabled at https://47.129.253.163:8004
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d05d21b5905d21b5905d21b5905d21b5905d21b5905d21b590
Laravel Telescope enabled at https://47.129.253.163:6638
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d05c9833d65c9833d65c9833d65c9833d65c9833d65c9833d6
Laravel Telescope enabled at https://47.129.253.163:8010
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0659842226598422265984222659842226598422265984222
Laravel Telescope enabled at https://47.129.253.163:8083
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0659842246598422465984224659842246598422465984224
Laravel Telescope enabled at https://47.129.253.163:8085
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d020958c8420958c8420958c8420958c8420958c8420958c84
Laravel Telescope enabled at https://47.129.253.163:2087
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d017a0bb5917a0bb5917a0bb5917a0bb5917a0bb5917a0bb59
Laravel Telescope enabled at https://47.129.253.163
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0eb1abda6eb1abda6eb1abda6eb1abda6eb1abda6eb1abda6
Laravel Telescope enabled at https://47.129.253.163:87
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0c2784d1bc2784d1bc2784d1bc2784d1bc2784d1bc2784d1b
Laravel Telescope enabled at https://47.129.253.163:5009
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0c2784d12c2784d12c2784d12c2784d12c2784d12c2784d12
Laravel Telescope enabled at https://47.129.253.163:5000
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0ed8ee479ed8ee479ed8ee479ed8ee479ed8ee479ed8ee479
Laravel Telescope enabled at https://47.129.253.163:7401
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d05d98354a5d98354a5d98354a5d98354a5d98354a5d98354a
Laravel Telescope enabled at https://47.129.253.163:8003
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0be17d1c8be17d1c8be17d1c8be17d1c8be17d1c8be17d1c8
Laravel Telescope enabled at https://47.129.253.163:27017
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0659842276598422765984227659842276598422765984227
Laravel Telescope enabled at https://47.129.253.163:8086
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0c3784e80c3784e80c3784e80c3784e80c3784e80c3784e80
Laravel Telescope enabled at https://47.129.253.163:5015
The Redis instance is open to the public.
This could result to data leak and code execution.
Severity: medium
Fingerprint: d606b92f1b5fdf185732408f5732408f5732408f5732408f5732408f5732408f
Redis is open with 0 keys in dbs
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0c2784d13c2784d13c2784d13c2784d13c2784d13c2784d13
Laravel Telescope enabled at https://47.129.253.163:5001
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0c3784e81c3784e81c3784e81c3784e81c3784e81c3784e81
Laravel Telescope enabled at https://47.129.253.163:5014
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0998dfc5a998dfc5a998dfc5a998dfc5a998dfc5a998dfc5a
Laravel Telescope enabled at https://47.129.253.163:2333
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d06221bdb16221bdb16221bdb16221bdb16221bdb16221bdb1
Laravel Telescope enabled at https://47.129.253.163:6666
Fingerprint: 3ae8115d762f12d0791c3bec791c3bec791c3bec791c3bec791c3bec791c3bec
Laravel Telescope enabled at http://47.129.253.163:6666
The following SharePoint Server is publicly accessible and has a backdoor installed :
Reference:
Severity: critical
Fingerprint: 7b5c3994b56bbda1210edc2d25b428abfdbdb166b6f282b21b785d73f0b5b19e
Found backdoored SharePoint instance: URL: /_layouts/15/spinstall0.aspx Key: framework20sp1 hmacsha256 auto 9DJXZ29VZ8OV7ZZWSNQ17672V0M5P63IECSMKBXWCI3VLL5TYZAVNHVQ34HMJKGD|HMACSHA256|FOMYBBM37GXLGE85U87HQOX9DCKM2ERRDWGXNJ9K6ZS480QJYIP2BI55W1S9CP1Q|Auto|Framework20SP1
The following SharePoint Server is publicly accessible and has a backdoor installed :
Reference:
Severity: critical
Fingerprint: 7b5c3994b56bbda1210edc2d25b428abfdbdb166b6f282b21b785d73f0b5b19e
Found backdoored SharePoint instance: URL: /_layouts/15/spinstall0.aspx Key: framework20sp1 hmacsha256 auto 9DJXZ29VZ8OV7ZZWSNQ17672V0M5P63IECSMKBXWCI3VLL5TYZAVNHVQ34HMJKGD|HMACSHA256|FOMYBBM37GXLGE85U87HQOX9DCKM2ERRDWGXNJ9K6ZS480QJYIP2BI55W1S9CP1Q|Auto|Framework20SP1
The following SharePoint Server is publicly accessible and has a backdoor installed :
Reference:
Severity: critical
Fingerprint: 7b5c3994b56bbda1210edc2d25b428abfdbdb166b6f282b21b785d73f0b5b19e
Found backdoored SharePoint instance: URL: /_layouts/15/spinstall0.aspx Key: framework20sp1 hmacsha256 auto 9DJXZ29VZ8OV7ZZWSNQ17672V0M5P63IECSMKBXWCI3VLL5TYZAVNHVQ34HMJKGD|HMACSHA256|FOMYBBM37GXLGE85U87HQOX9DCKM2ERRDWGXNJ9K6ZS480QJYIP2BI55W1S9CP1Q|Auto|Framework20SP1
The following SharePoint Server is publicly accessible and has a backdoor installed :
Reference:
Severity: critical
Fingerprint: 7b5c3994b56bbda1210edc2d25b428abfdbdb166b6f282b21b785d73f0b5b19e
Found backdoored SharePoint instance: URL: /_layouts/15/spinstall0.aspx Key: framework20sp1 hmacsha256 auto 9DJXZ29VZ8OV7ZZWSNQ17672V0M5P63IECSMKBXWCI3VLL5TYZAVNHVQ34HMJKGD|HMACSHA256|FOMYBBM37GXLGE85U87HQOX9DCKM2ERRDWGXNJ9K6ZS480QJYIP2BI55W1S9CP1Q|Auto|Framework20SP1
The following SharePoint Server is publicly accessible and has a backdoor installed :
Reference:
Severity: critical
Fingerprint: 7b5c3994b56bbda1210edc2d25b428abfdbdb166b6f282b21b785d73f0b5b19e
Found backdoored SharePoint instance: URL: /_layouts/15/spinstall0.aspx Key: framework20sp1 hmacsha256 auto 9DJXZ29VZ8OV7ZZWSNQ17672V0M5P63IECSMKBXWCI3VLL5TYZAVNHVQ34HMJKGD|HMACSHA256|FOMYBBM37GXLGE85U87HQOX9DCKM2ERRDWGXNJ9K6ZS480QJYIP2BI55W1S9CP1Q|Auto|Framework20SP1
Severity: critical
Fingerprint: 7b5c3994b56bbda1210edc2d25b428ab501f18ef57093d8f7ae4a32b7614c06b
Found backdoored SharePoint instance: URL: /_layouts/15/spinstall0.aspx Key: auto hmacsha256 framework20sp1 QIXGRN6MISP32LSN8T78NLL637ITCR41Y74WKFPGO8LCHUQ1V0TD2U6W9BGVBFYS|HMACSHA256|5FREOKA91DSRME25KHAHS4KE663PDNMY9Y6EC5936DDURNV1A40N2K1USRCMQKVF|Auto|Framework20SP1
The following SharePoint Server is publicly accessible and has a backdoor installed :
Reference:
Severity: critical
Fingerprint: 7b5c3994b56bbda1210edc2d25b428abfdbdb166b6f282b21b785d73f0b5b19e
Found backdoored SharePoint instance: URL: /_layouts/15/spinstall0.aspx Key: framework20sp1 hmacsha256 auto 9DJXZ29VZ8OV7ZZWSNQ17672V0M5P63IECSMKBXWCI3VLL5TYZAVNHVQ34HMJKGD|HMACSHA256|FOMYBBM37GXLGE85U87HQOX9DCKM2ERRDWGXNJ9K6ZS480QJYIP2BI55W1S9CP1Q|Auto|Framework20SP1
Severity: critical
Fingerprint: 7b5c3994b56bbda1210edc2d25b428ab501f18ef57093d8f7ae4a32b7614c06b
Found backdoored SharePoint instance: URL: /_layouts/15/spinstall0.aspx Key: auto hmacsha256 framework20sp1 QIXGRN6MISP32LSN8T78NLL637ITCR41Y74WKFPGO8LCHUQ1V0TD2U6W9BGVBFYS|HMACSHA256|5FREOKA91DSRME25KHAHS4KE663PDNMY9Y6EC5936DDURNV1A40N2K1USRCMQKVF|Auto|Framework20SP1
The following SharePoint Server is publicly accessible and has a backdoor installed :
Reference:
Severity: critical
Fingerprint: 7b5c3994b56bbda1210edc2d25b428ab501f18ef57093d8f7ae4a32b7614c06b
Found backdoored SharePoint instance: URL: /_layouts/15/spinstall0.aspx Key: auto hmacsha256 framework20sp1 QIXGRN6MISP32LSN8T78NLL637ITCR41Y74WKFPGO8LCHUQ1V0TD2U6W9BGVBFYS|HMACSHA256|5FREOKA91DSRME25KHAHS4KE663PDNMY9Y6EC5936DDURNV1A40N2K1USRCMQKVF|Auto|Framework20SP1