The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d03448038e3448038e3448038e3448038e3448038e3448038e
Laravel Telescope enabled at https://99.79.32.71:9303
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0bbbba21bbbbba21bbbbba21bbbbba21bbbbba21bbbbba21b
Laravel Telescope enabled at https://99.79.32.71:5180
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0dc1ce7bfdc1ce7bfdc1ce7bfdc1ce7bfdc1ce7bfdc1ce7bf
Laravel Telescope enabled at https://99.79.32.71:6277
The application has Laravel development panel enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 3ae8115d762f12d0a35e78f9a35e78f9a35e78f9a35e78f9a35e78f9a35e78f9
Laravel Telescope enabled at https://99.79.32.71:9890
No description available
Fingerprint: 33fc8a384ee3c2e738e1ea3738e1ea37009ef99b22f1e08844969c8844969c88
Nuclei scan report for tags wordpress, php: CVE-2017-5487 : WordPress Core < 4.7.1 - Username Enumeration by Manas_Harsh,daffainfo ------------- wp-includes/rest-api/endpoints/class-wp-rest-users-controller.php in the REST API implementation in WordPress 4.7 before 4.7.1 does not properly restrict listings of post authors, which allows remote attackers to obtain sensitive information via a wp-json/wp/v2/users request.