· 6 years ago · Nov 07, 2019, 05:08 PM
1#######################################################################################################################################
2=======================================================================================================================================
3Hostname www.njoathkeepers.org ISP Linode, LLC
4Continent North America Flag
5US
6Country United States Country Code US
7Region New Jersey Local time 07 Nov 2019 09:12 EST
8City Newark Postal Code 07175
9IP Address 192.155.88.60 Latitude 40.739
10 Longitude -74.17
11=======================================================================================================================================
12#######################################################################################################################################
13> www.njoathkeepers.org
14Server: 185.93.180.131
15Address: 185.93.180.131#53
16
17Non-authoritative answer:
18Name: www.njoathkeepers.org
19Address: 192.155.88.60
20>
21#######################################################################################################################################
22Domain Name: NJOATHKEEPERS.ORG
23Registry Domain ID: D169964607-LROR
24Registrar WHOIS Server: whois.domain.com
25Registrar URL: www.domain.com
26Updated Date: 2019-10-06T10:53:06Z
27Creation Date: 2013-10-17T12:03:14Z
28Registry Expiry Date: 2020-10-17T12:03:14Z
29Registrar Registration Expiration Date:
30Registrar: Domain.com, LLC
31Registrar IANA ID: 886
32Registrar Abuse Contact Email: compliance@domain-inc.net
33Registrar Abuse Contact Phone: +1.6022262389
34Reseller:
35Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
36Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
37Registrant Organization: Domain Privacy Group
38Registrant State/Province: MA
39Registrant Country: US
40Name Server: NS1.FATCOW.COM
41Name Server: NS2.FATCOW.COM
42DNSSEC: unsigned
43#######################################################################################################################################
44[+] Target : www.njoathkeepers.org
45
46[+] IP Address : 192.155.88.60
47
48[+] Headers :
49
50[+] Server : nginx/1.14.2
51[+] Date : Thu, 07 Nov 2019 14:36:14 GMT
52[+] Content-Type : text/html; charset=UTF-8
53[+] Transfer-Encoding : chunked
54[+] Connection : keep-alive
55[+] Set-Cookie : PHPSESSID=a2bqe5pjeb58bnrt725q074d30; path=/
56[+] Expires : Thu, 19 Nov 1981 08:52:00 GMT
57[+] Cache-Control : no-store, no-cache, must-revalidate, post-check=0, pre-check=0
58[+] Pragma : no-cache
59[+] Link : <http://www.njoathkeepers.org/wp-json/>; rel="https://api.w.org/", <http://www.njoathkeepers.org/>; rel=shortlink
60[+] Content-Encoding : gzip
61
62[+] SSL Certificate Information :
63
64[-] SSL is not Present on Target URL...Skipping...
65
66[+] Whois Lookup :
67
68[+] NIR : None
69[+] ASN Registry : arin
70[+] ASN : 63949
71[+] ASN CIDR : 192.155.88.0/22
72[+] ASN Country Code : US
73[+] ASN Date : 2012-10-22
74[+] ASN Description : LINODE-AP Linode, LLC, US
75[+] cidr : 192.155.80.0/20
76[+] name : LINODE-US
77[+] handle : NET-192-155-80-0-1
78[+] range : 192.155.80.0 - 192.155.95.255
79[+] description : Linode
80[+] country : US
81[+] state : PA
82[+] city : Philadelphia
83[+] address : 249 Arch St
84[+] postal_code : 19106
85[+] emails : ['support@linode.com', 'abuse@linode.com']
86[+] created : 2012-10-22
87[+] updated : 2012-10-22
88
89[+] Crawling Target...
90
91[+] Looking for robots.txt........[ Found ]
92[+] Extracting robots Links.......[ 13 ]
93[+] Looking for sitemap.xml.......[ Not Found ]
94[+] Extracting CSS Links..........[ 9 ]
95[+] Extracting Javascript Links...[ 11 ]
96[+] Extracting Internal Links.....[ 52 ]
97[+] Extracting External Links.....[ 12 ]
98[+] Extracting Images.............[ 7 ]
99
100[+] Total Links Extracted : 104
101
102[+] Dumping Links in /opt/FinalRecon/dumps/www.njoathkeepers.org.dump
103[+] Completed!
104#######################################################################################################################################
105[+] Starting At 2019-11-07 09:36:28.298840
106[+] Collecting Information On: http://www.njoathkeepers.org/
107[#] Status: 200
108--------------------------------------------------
109[#] Web Server Detected: nginx/1.14.2
110[!] X-Frame-Options Headers not detect! target might be vulnerable Click Jacking
111- Server: nginx/1.14.2
112- Date: Thu, 07 Nov 2019 14:36:29 GMT
113- Content-Type: text/html; charset=UTF-8
114- Transfer-Encoding: chunked
115- Connection: keep-alive
116- Set-Cookie: PHPSESSID=3hb6c5a15bh8bqmv9jdsl03dp1; path=/
117- Expires: Thu, 19 Nov 1981 08:52:00 GMT
118- Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
119- Pragma: no-cache
120- Link: <http://www.njoathkeepers.org/wp-json/>; rel="https://api.w.org/", <http://www.njoathkeepers.org/>; rel=shortlink
121- Content-Encoding: gzip
122--------------------------------------------------
123[#] Finding Location..!
124[#] status: success
125[#] country: United States
126[#] countryCode: US
127[#] region: NJ
128[#] regionName: New Jersey
129[#] city: Newark
130[#] zip: 07175
131[#] lat: 40.7357
132[#] lon: -74.1724
133[#] timezone: America/New_York
134[#] isp: Linode, LLC
135[#] org: Linode
136[#] as: AS63949 Linode, LLC
137[#] query: 192.155.88.60
138--------------------------------------------------
139[x] Didn't Detect WAF Presence on: http://www.njoathkeepers.org/
140--------------------------------------------------
141[#] Starting Reverse DNS
142[-] Failed ! Fail
143--------------------------------------------------
144[!] Scanning Open Port
145[#] 80/tcp open http
146[#] 143/tcp open imap
147[#] 465/tcp open smtps
148[#] 587/tcp open submission
149[#] 993/tcp open imaps
150[#] 6667/tcp open irc
151[#] 7777/tcp open cbt
152[#] 8001/tcp open vcom-tunnel
153--------------------------------------------------
154[+] Collecting Information Disclosure!
155[#] Detecting sitemap.xml file
156[-] sitemap.xml file not Found!?
157[#] Detecting robots.txt file
158[!] robots.txt File Found: http://www.njoathkeepers.org//robots.txt
159[#] Detecting GNU Mailman
160[-] GNU Mailman App Not Detected!?
161--------------------------------------------------
162[+] Crawling Url Parameter On: http://www.njoathkeepers.org/
163--------------------------------------------------
164[#] Searching Html Form !
165[-] No Html Form Found!?
166--------------------------------------------------
167[!] Found 44 dom parameter
168[#] http://www.njoathkeepers.org/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.njoathkeepers.org%2F&format=xml
169[#] http://www.njoathkeepers.org/calendar/action~agenda/page_offset~-1/request_format~json/
170[#] http://www.njoathkeepers.org//#
171[#] http://www.njoathkeepers.org/calendar/action~agenda/page_offset~1/request_format~json/
172[#] http://www.njoathkeepers.org//#
173[#] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~21-11-2019/
174[#] http://www.njoathkeepers.org//#
175[#] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=35
176[#] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~19-12-2019/
177[#] http://www.njoathkeepers.org//#
178[#] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=36
179[#] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~16-1-2020/
180[#] http://www.njoathkeepers.org//#
181[#] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=37
182[#] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~20-2-2020/
183[#] http://www.njoathkeepers.org//#
184[#] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=38
185[#] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~19-3-2020/
186[#] http://www.njoathkeepers.org//#
187[#] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=39
188[#] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~16-4-2020/
189[#] http://www.njoathkeepers.org//#
190[#] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=40
191[#] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~21-5-2020/
192[#] http://www.njoathkeepers.org//#
193[#] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=41
194[#] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~18-6-2020/
195[#] http://www.njoathkeepers.org//#
196[#] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=42
197[#] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~16-7-2020/
198[#] http://www.njoathkeepers.org//#
199[#] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=43
200[#] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~20-8-2020/
201[#] http://www.njoathkeepers.org//#
202[#] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=44
203[#] http://www.njoathkeepers.org/calendar/action~agenda/page_offset~-1/request_format~json/
204[#] http://www.njoathkeepers.org//#
205[#] http://www.njoathkeepers.org/calendar/action~agenda/page_offset~1/request_format~json/
206[#] http://www.njoathkeepers.org/?plugin=all-in-one-event-calendar&controller=ai1ec_exporter_controller&action=export_events
207[#] https://www.google.com/calendar/render?cid=http%3A%2F%2Fwww.njoathkeepers.org%2F%3Fplugin%3Dall-in-one-event-calendar%26controller%3Dai1ec_exporter_controller%26action%3Dexport_events%26no_html%3Dtrue%26%26
208[#] http://www.njoathkeepers.org//webcal://www.njoathkeepers.org/?plugin=all-in-one-event-calendar&controller=ai1ec_exporter_controller&action=export_events&no_html=true
209[#] http://www.njoathkeepers.org//webcal://www.njoathkeepers.org/?plugin=all-in-one-event-calendar&controller=ai1ec_exporter_controller&action=export_events&no_html=true
210[#] http://www.njoathkeepers.org/?plugin=all-in-one-event-calendar&controller=ai1ec_exporter_controller&action=export_events&no_html=true
211[#] http://www.njoathkeepers.org/?plugin=all-in-one-event-calendar&controller=ai1ec_exporter_controller&action=export_events&xml=true
212--------------------------------------------------
213[!] 4 Internal Dynamic Parameter Discovered
214[+] http://www.njoathkeepers.org/xmlrpc.php?rsd
215[+] http://www.njoathkeepers.org/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.njoathkeepers.org%2F
216[+] http://www.njoathkeepers.org/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.njoathkeepers.org%2F&format=xml
217[+] https://www.google.com/calendar/render?cid=http%3A%2F%2Fwww.njoathkeepers.org%2F%3Fplugin%3Dall-in-one-event-calendar%26controller%3Dai1ec_exporter_controller%26action%3Dexport_events%26no_html%3Dtrue%26%26
218--------------------------------------------------
219[-] No external Dynamic Paramter Found!?
220--------------------------------------------------
221[!] 36 Internal links Discovered
222[+] http://www.njoathkeepers.org/xmlrpc.php
223[+] http://www.njoathkeepers.org/feed/
224[+] http://www.njoathkeepers.org/comments/feed/
225[+] http://www.njoathkeepers.org/wp-includes/wlwmanifest.xml
226[+] http://www.njoathkeepers.org/
227[+] http://www.njoathkeepers.org/
228[+] http://www.njoathkeepers.org/support-the-nj-oath-keepers/
229[+] http://www.njoathkeepers.org/wp-content/uploads/2018/11/LaVoy-Finicum.png
230[+] http://www.njoathkeepers.org/peoples-petition-against-unlawful-usurpations/
231[+] http://www.njoathkeepers.org/support-the-nj-oath-keepers/
232[+] http://www.njoathkeepers.org/wp-content/uploads/2013/11/NJOK-WMAL-web.jpg
233[+] http://www.njoathkeepers.org/calendar/action~agenda/request_format~json/
234[+] http://www.njoathkeepers.org/calendar/action~oneday/request_format~json/
235[+] http://www.njoathkeepers.org/calendar/action~month/request_format~json/
236[+] http://www.njoathkeepers.org/calendar/action~week/request_format~json/
237[+] http://www.njoathkeepers.org/calendar/action~agenda/exact_date~__DATE__/
238[+] http://www.njoathkeepers.org/calendar/action~agenda/exact_date~__DATE__/
239[+] http://www.njoathkeepers.org/wp-content/uploads/2013/11/007-1.jpg
240[+] http://www.njoathkeepers.org/wp-content/uploads/2013/11/njok-parade-banner.jpg
241[+] http://www.njoathkeepers.org/wp-content/uploads/2013/11/njok-parade-side-car.jpg
242[+] http://www.njoathkeepers.org/peoples-petition-against-unlawful-usurpations/
243[+] http://www.njoathkeepers.org/the-oath/
244[+] http://www.njoathkeepers.org/our-response-to-nj-office-of-homeland-security-and-preparedness/
245[+] http://www.njoathkeepers.org/press-coverage/
246[+] http://www.njoathkeepers.org/nj-oath-keepers-gear/
247[+] http://www.njoathkeepers.org/support-the-nj-oath-keepers/
248[+] http://www.njoathkeepers.org/ny-oath-keepers-2016-awards-dinner/
249[+] http://www.njoathkeepers.org/new-jersey-billboard-project/
250[+] http://www.njoathkeepers.org/oath-keepers-president-responds-to-orlando-shooting/
251[+] http://www.njoathkeepers.org/sanctuary-cities/
252[+] http://www.njoathkeepers.org/login/
253[+] http://www.njoathkeepers.org/timothy-locke/
254[+] http://www.njoathkeepers.org/599-2/
255[+] http://www.njoathkeepers.org/members/
256[+] http://www.njoathkeepers.org/calendar/action~month/request_format~json/
257[+] http://www.njoathkeepers.org/feed/
258--------------------------------------------------
259[!] 13 External links Discovered
260[#] http://gmpg.org/xfn/11
261[#] https://www.oathkeepers.org/who-speaks-for-oath-keepers/
262[#] https://www.anjrpc.org/
263[#] https://cdn.ymaws.com/www.anjrpc.org/resource/resmgr/legal_motions___briefs/anjrpc_v_grewal_nj(p0153639x.pdf
264[#] http://www.njleg.state.nj.us/2018/Bills/S1000/548_I1.HTM
265[#] http://oathkeepers.org
266[#] http://www.meetup.com/Oathkeepers-Bergen-County-NJ/
267[#] http://www.meetup.com/North-Jersey-Oath-Keepers-Meetup/
268[#] https://www.facebook.com/oathkeepersnj/
269[#] http://eepurl.com/bG-YlX
270[#] http://irc.nycpatriot.org
271[#] http://www.dizzain.com/
272[#] https://statcounter.com/
273--------------------------------------------------
274[#] Mapping Subdomain..
275[!] Found 2 Subdomain
276- www.njoathkeepers.org
277- mx.njoathkeepers.org
278--------------------------------------------------
279[!] Done At 2019-11-07 09:37:03.589053
280#######################################################################################################################################
281[i] Scanning Site: http://www.njoathkeepers.org
282
283
284
285B A S I C I N F O
286====================
287
288
289[+] Site Title: New Jersey Oath Keepers
290[+] IP address: 192.155.88.60
291[+] Web Server: nginx/1.14.2
292[+] CMS: WordPress
293[+] Cloudflare: Not Detected
294[+] Robots File: Found
295
296-------------[ contents ]----------------
297User-agent: *
298Disallow: /calendar/action~posterboard/
299Disallow: /calendar/action~agenda/
300Disallow: /calendar/action~oneday/
301Disallow: /calendar/action~month/
302Disallow: /calendar/action~week/
303Disallow: /calendar/action~stream/
304Disallow: /calendar/action~undefined/
305Disallow: /calendar/action~http:/
306Disallow: /calendar/action~default/
307Disallow: /calendar/action~poster/
308Disallow: /calendar/action~*/
309Disallow: /*controller=ai1ec_exporter_controller*
310Disallow: /*/action~*/
311-----------[end of contents]-------------
312
313
314
315W H O I S L O O K U P
316========================
317
318 Domain Name: NJOATHKEEPERS.ORG
319Registry Domain ID: D169964607-LROR
320Registrar WHOIS Server: whois.domain.com
321Registrar URL: www.domain.com
322Updated Date: 2019-10-06T10:53:06Z
323Creation Date: 2013-10-17T12:03:14Z
324Registry Expiry Date: 2020-10-17T12:03:14Z
325Registrar Registration Expiration Date:
326Registrar: Domain.com, LLC
327Registrar IANA ID: 886
328Registrar Abuse Contact Email: compliance@domain-inc.net
329Registrar Abuse Contact Phone: +1.6022262389
330Reseller:
331Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
332Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
333Registrant Organization: Domain Privacy Group
334Registrant State/Province: MA
335Registrant Country: US
336Name Server: NS1.FATCOW.COM
337Name Server: NS2.FATCOW.COM
338DNSSEC: unsigned
339URL of the ICANN Whois Inaccuracy Complaint Form https://www.icann.org/wicf/)
340>>> Last update of WHOIS database: 2019-11-07T14:35:37Z <<<
341
342For more information on Whois status codes, please visit https://icann.org/epp
343
344
345
346
347
348G E O I P L O O K U P
349=========================
350
351[i] IP Address: 192.155.88.60
352[i] Country: United States
353[i] State: New Jersey
354[i] City: Newark
355[i] Latitude: 40.739
356[i] Longitude: -74.1697
357
358
359
360
361H T T P H E A D E R S
362=======================
363
364
365[i] HTTP/1.1 200 OK
366[i] Server: nginx/1.14.2
367[i] Date: Thu, 07 Nov 2019 14:36:40 GMT
368[i] Content-Type: text/html; charset=UTF-8
369[i] Connection: close
370[i] Set-Cookie: PHPSESSID=lckio1q3743a3aomdg2hrpn7u0; path=/
371[i] Expires: Thu, 19 Nov 1981 08:52:00 GMT
372[i] Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
373[i] Pragma: no-cache
374[i] Link: <http://www.njoathkeepers.org/wp-json/>; rel="https://api.w.org/"
375[i] Link: <http://www.njoathkeepers.org/>; rel=shortlink
376
377
378
379
380D N S L O O K U P
381===================
382
383njoathkeepers.org. 3599 IN A 192.155.88.60
384njoathkeepers.org. 3599 IN NS ns1.fatcow.com.
385njoathkeepers.org. 3599 IN NS ns2.fatcow.com.
386njoathkeepers.org. 3599 IN SOA ns1.fatcow.com. dnsadmin.fatcow.com. 2013101732 10800 3600 604800 86400
387njoathkeepers.org. 3599 IN MX 30 mx.njoathkeepers.org.
388njoathkeepers.org. 3599 IN TXT "v=spf1 ip4:38.113.1.0/24 ip4:38.113.20.0/24 ip4:65.254.224.0/19 ?all"
389
390
391
392
393S U B N E T C A L C U L A T I O N
394====================================
395
396Address = 192.155.88.60
397Network = 192.155.88.60 / 32
398Netmask = 255.255.255.255
399Broadcast = not needed on Point-to-Point links
400Wildcard Mask = 0.0.0.0
401Hosts Bits = 0
402Max. Hosts = 1 (2^0 - 0)
403Host Range = { 192.155.88.60 - 192.155.88.60 }
404
405
406
407N M A P P O R T S C A N
408============================
409
410Starting Nmap 7.70 ( https://nmap.org ) at 2019-11-07 14:36 UTC
411Nmap scan report for njoathkeepers.org (192.155.88.60)
412Host is up (0.00049s latency).
413rDNS record for 192.155.88.60: mail.nycpatriot.org
414
415PORT STATE SERVICE
41621/tcp closed ftp
41722/tcp closed ssh
41823/tcp closed telnet
41980/tcp open http
420110/tcp closed pop3
421143/tcp open imap
422443/tcp closed https
4233389/tcp closed ms-wbt-server
424
425Nmap done: 1 IP address (1 host up) scanned in 0.49 seconds
426
427
428
429S U B - D O M A I N F I N D E R
430==================================
431
432
433[i] Total Subdomains Found : 1
434
435[+] Subdomain: mx.njoathkeepers.org
436[-] IP: 65.254.254.50
437#######################################################################################################################################
438Trying "njoathkeepers.org"
439;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 41741
440;; flags: qr rd ra; QUERY: 1, ANSWER: 6, AUTHORITY: 2, ADDITIONAL: 2
441
442;; QUESTION SECTION:
443;njoathkeepers.org. IN ANY
444
445;; ANSWER SECTION:
446njoathkeepers.org. 3600 IN TXT "v=spf1 ip4:38.113.1.0/24 ip4:38.113.20.0/24 ip4:65.254.224.0/19 ?all"
447njoathkeepers.org. 3600 IN MX 30 mx.njoathkeepers.org.
448njoathkeepers.org. 3600 IN SOA ns1.fatcow.com. dnsadmin.fatcow.com. 2013101732 10800 3600 604800 86400
449njoathkeepers.org. 3600 IN A 192.155.88.60
450njoathkeepers.org. 3600 IN NS ns1.fatcow.com.
451njoathkeepers.org. 3600 IN NS ns2.fatcow.com.
452
453;; AUTHORITY SECTION:
454njoathkeepers.org. 3600 IN NS ns1.fatcow.com.
455njoathkeepers.org. 3600 IN NS ns2.fatcow.com.
456
457;; ADDITIONAL SECTION:
458ns1.fatcow.com. 3981 IN A 65.254.254.100
459ns2.fatcow.com. 3981 IN A 65.254.254.101
460
461Received 302 bytes from 2001:18c0:121:6900:724f:b8ff:fefd:5b6a#53 in 166 ms
462######################################################################################################################################
463
464; <<>> DiG 9.11.5-P4-5.1+b1-Debian <<>> +trace njoathkeepers.org any
465;; global options: +cmd
466. 84889 IN NS c.root-servers.net.
467. 84889 IN NS f.root-servers.net.
468. 84889 IN NS e.root-servers.net.
469. 84889 IN NS k.root-servers.net.
470. 84889 IN NS i.root-servers.net.
471. 84889 IN NS m.root-servers.net.
472. 84889 IN NS g.root-servers.net.
473. 84889 IN NS h.root-servers.net.
474. 84889 IN NS a.root-servers.net.
475. 84889 IN NS b.root-servers.net.
476. 84889 IN NS d.root-servers.net.
477. 84889 IN NS l.root-servers.net.
478. 84889 IN NS j.root-servers.net.
479. 84889 IN RRSIG NS 8 0 518400 20191120050000 20191107040000 22545 . HVEN/2UwnDO5vkv2dHiWiq5j2Y9FRJG8E36rfct7QEGQGzIvKHpRXXkp gmyB7P+ovHx1T0d5uLEHYbFrYpWWjfPJ2GkYWqWroDAKtM+0gNFxTwg6 /0nZL5q2vDct+FbcO7Z/X2B+NkT6DK3wbo2FEhH7wU2uR/PL2oHc7KlX cXemUn7Nlsk2DUj1hpgP4seFPjKvr0s0cHszy93aLixB0TKvF7ZtLd1U T6LxrVxbqEyUcm6QoytRRGShT1AGr/5Wj1pvXtCnarslBojVDKsK40Vv Ib8VLZ8z1tie812U/TbWrBYSCDAebObWQu72O7hy0/dyk1iYOL9j90G3 q5Bf3A==
480;; Received 525 bytes from 185.93.180.131#53(185.93.180.131) in 545 ms
481
482org. 172800 IN NS d0.org.afilias-nst.org.
483org. 172800 IN NS b0.org.afilias-nst.org.
484org. 172800 IN NS a0.org.afilias-nst.info.
485org. 172800 IN NS b2.org.afilias-nst.org.
486org. 172800 IN NS a2.org.afilias-nst.info.
487org. 172800 IN NS c0.org.afilias-nst.info.
488org. 86400 IN DS 9795 7 2 3922B31B6F3A4EA92B19EB7B52120F031FD8E05FF0B03BAFCF9F891B FE7FF8E5
489org. 86400 IN DS 9795 7 1 364DFAB3DAF254CAB477B5675B10766DDAA24982
490org. 86400 IN RRSIG DS 8 1 86400 20191120050000 20191107040000 22545 . Az1J3/UVfJC+W0hDBgzBp5gu2PeirCEbHd0gFeFcibpPnzSuG9K+LQU/ V6Cd9MGCd2VrNnrp3D2yCF6jz3KQJmsOe3Xqiyc1tsVmbgBU4AMk+Hm1 GYYSz4s8PFJa20Exnhl4lW2qG/UmSX7OW/8fUkTXjBmWTsKVaLouv4aO xslZ2HjHT5DjFm+YIYtqFS4w42FTQQzRDehVqB8iDyPcWQ9Ce9OL2s4k yl9HjVbolCV3ARyj+NYs/r8r/4i5TNFTqV6UmbeBJ7lg6pbzsjV8EYxS 8o8i7BpEIpBc1X6QEhTmGhgSn8rq+khQWJ+RbFMWS9FK0dOJHmD7Nmgb IE/b+g==
491;; Received 819 bytes from 2001:7fe::53#53(i.root-servers.net) in 40 ms
492
493njoathkeepers.org. 86400 IN NS ns1.fatcow.com.
494njoathkeepers.org. 86400 IN NS ns2.fatcow.com.
495h9p7u7tr2u91d0v0ljs9l1gidnp90u3h.org. 86400 IN NSEC3 1 1 1 D399EAAB H9PAES2EQ3K44BAR1F3TIUO0J45719RJ NS SOA RRSIG DNSKEY NSEC3PARAM
496h9p7u7tr2u91d0v0ljs9l1gidnp90u3h.org. 86400 IN RRSIG NSEC3 7 2 86400 20191128144236 20191107134236 11324 org. ZbKnf/BCxB0NE5OXWwW8nCCriWhxO/Z4MjKSXKl8e8H78jGpjQ2H7J5F W713GWNngBtuDuIlHKrk+pxdN5jnMPyJ5PUXSshkCXgGNnyxxmXno+qB /uYr3JaNkFIZtrsfuQqi8SQULj42qBLc9Tbsb8xroAVyXX6LFJQAjtPi +Xw=
4973hqqbc06kpvbmkokf8buqhr9v8ia63hv.org. 86400 IN NSEC3 1 1 1 D399EAAB 3HR8APDMKOCKDAI9NH1MQ4UIHU4TBUKL
4983hqqbc06kpvbmkokf8buqhr9v8ia63hv.org. 86400 IN RRSIG NSEC3 7 2 86400 20191122152340 20191101142340 11324 org. m5zvCJbohttNENeBc+HC2skrn1j+fhf5+GsH2856nJ0i5QQ5na9jUXp5 ZFCYhUiVcHQHbSrc1DzAYOBiAYsX66WLc27nKRb6MitjXtp7gx1X02ko zvUGEB+bow8xJXXcm40fGwLu8Fqk+5IB82fdvVGBKJPneMWVmCgH7jgL pkg=
499;; Received 577 bytes from 2001:500:e::1#53(a0.org.afilias-nst.info) in 173 ms
500
501;; Connection to 65.254.254.100#53(65.254.254.100) for njoathkeepers.org failed: timed out.
502;; Connection to 65.254.254.100#53(65.254.254.100) for njoathkeepers.org failed: timed out.
503;; connection timed out; no servers could be reached
504;; Connection to 65.254.254.100#53(65.254.254.100) for njoathkeepers.org failed: timed out.
505#######################################################################################################################################
506[*] Performing General Enumeration of Domain: njoathkeepers.org
507[!] Wildcard resolution is enabled on this domain
508[!] It is resolving to 192.155.88.60
509[!] All queries will resolve to this address!!
510[-] DNSSEC is not configured for njoathkeepers.org
511[*] SOA ns1.fatcow.com 65.254.254.100
512[*] NS ns1.fatcow.com 65.254.254.100
513[*] NS ns2.fatcow.com 65.254.254.101
514[*] MX mx.njoathkeepers.org 65.254.254.54
515[*] MX mx.njoathkeepers.org 65.254.254.53
516[*] MX mx.njoathkeepers.org 65.254.254.51
517[*] MX mx.njoathkeepers.org 65.254.254.50
518[*] MX mx.njoathkeepers.org 65.254.254.55
519[*] MX mx.njoathkeepers.org 65.254.254.52
520[*] A njoathkeepers.org 192.155.88.60
521[*] TXT njoathkeepers.org v=spf1 ip4:38.113.1.0/24 ip4:38.113.20.0/24 ip4:65.254.224.0/19 ?all
522[*] Enumerating SRV Records
523[-] No SRV Records Found for njoathkeepers.org
524[+] 0 Records Found
525#######################################################################################################################################
526[*] Processing domain njoathkeepers.org
527[*] Using system resolvers ['185.93.180.131', '194.187.251.67', '38.132.106.139', '192.168.0.1', '2001:18c0:121:6900:724f:b8ff:fefd:5b6a']
528[+] Getting nameservers
529[-] Getting nameservers failed
530[-] Zone transfer failed
531
532[+] TXT records found
533"v=spf1 ip4:38.113.1.0/24 ip4:38.113.20.0/24 ip4:65.254.224.0/19 ?all"
534
535[+] MX records found, added to target list
53630 mx.njoathkeepers.org.
537
538[+] Wildcard domain found - 192.155.88.60
539[*] Scanning njoathkeepers.org for A records
54065.254.248.195 - ftp.njoathkeepers.org
54165.254.248.195 - imap.njoathkeepers.org
54265.254.248.195 - mail.njoathkeepers.org
54365.254.254.54 - mx.njoathkeepers.org
54465.254.254.53 - mx.njoathkeepers.org
54565.254.254.51 - mx.njoathkeepers.org
54665.254.254.50 - mx.njoathkeepers.org
54765.254.254.55 - mx.njoathkeepers.org
54865.254.254.52 - mx.njoathkeepers.org
54965.254.248.195 - pop.njoathkeepers.org
55065.254.248.195 - smtp.njoathkeepers.org
55165.254.254.36 - webmail.njoathkeepers.org
552#######################################################################################################################################
553Parsero scan report for www.njoathkeepers.org
554http://www.njoathkeepers.org/*/action~*/ 404 Not Found
555http://www.njoathkeepers.org/calendar/action~undefined/ 200 OK
556http://www.njoathkeepers.org/calendar/action~default/ 200 OK
557http://www.njoathkeepers.org/*controller=ai1ec_exporter_controller* 404 Not Found
558http://www.njoathkeepers.org/calendar/action~week/ 200 OK
559http://www.njoathkeepers.org/calendar/action~agenda/ 200 OK
560http://www.njoathkeepers.org/calendar/action~*/ 404 Not Found
561http://www.njoathkeepers.org/calendar/action~oneday/ 200 OK
562http://www.njoathkeepers.org/calendar/action~stream/ 200 OK
563http://www.njoathkeepers.org/calendar/action~http:/ 200 OK
564http://www.njoathkeepers.org/calendar/action~poster/ 200 OK
565http://www.njoathkeepers.org/calendar/action~month/ 200 OK
566http://www.njoathkeepers.org/calendar/action~posterboard/ 200 OK
567
568[+] 13 links have been analyzed and 10 of them are available!!!
569#######################################################################################################################################
570Domains still to check: 1
571 Checking if the hostname njoathkeepers.org. given is in fact a domain...
572
573Analyzing domain: njoathkeepers.org.
574 Checking NameServers using system default resolver...
575 IP: 65.254.254.100 (United States)
576 HostName: ns1.fatcow.com Type: NS
577 HostName: ns1.fatcow.com Type: PTR
578 IP: 65.254.254.101 (United States)
579 HostName: ns2.fatcow.com Type: NS
580 HostName: ns2.fatcow.com Type: PTR
581
582 Checking MailServers using system default resolver...
583 IP: 65.254.254.54 (United States)
584 HostName: mx.njoathkeepers.org Type: MX
585 HostName: mail.yourhostingaccount.com Type: PTR
586 IP: 65.254.254.53 (United States)
587 HostName: mx.njoathkeepers.org Type: MX
588 HostName: mail.yourhostingaccount.com Type: PTR
589 IP: 65.254.254.51 (United States)
590 HostName: mx.njoathkeepers.org Type: MX
591 HostName: mail.yourhostingaccount.com Type: PTR
592 IP: 65.254.254.50 (United States)
593 HostName: mx.njoathkeepers.org Type: MX
594 HostName: mail.yourhostingaccount.com Type: PTR
595 IP: 65.254.254.55 (United States)
596 HostName: mx.njoathkeepers.org Type: MX
597 HostName: mail.yourhostingaccount.com Type: PTR
598 IP: 65.254.254.52 (United States)
599 HostName: mx.njoathkeepers.org Type: MX
600 HostName: mail.yourhostingaccount.com Type: PTR
601 WARNING!! This domain has wildcards activated for hostnames resolution. We are checking "www" anyway, but perhaps it doesn't exists!
602
603 Checking the zone transfer for each NS... (if this takes more than 10 seconds, just hit CTRL-C and it will continue. Bug in the libs)
604 No zone transfer found on nameserver 65.254.254.100
605 No zone transfer found on nameserver 65.254.254.101
606
607 Checking SPF record...
608 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 38.113.1.0/24, but only the network IP
609 New IP found: 38.113.1.0
610 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 38.113.20.0/24, but only the network IP
611 New IP found: 38.113.20.0
612 WARNING! SPF record allows an entire network to send mails. Probably an ISP network. We are not going to check the entire network by now: 65.254.224.0/19, but only the network IP
613 New IP found: 65.254.224.0
614
615 Checking 1 most common hostnames using system default resolver...
616 IP: 192.155.88.60 (United States)
617 HostName: www.njoathkeepers.org. Type: A
618
619 Checking with nmap the reverse DNS hostnames of every <ip>/24 netblock using system default resolver...
620 Checking netblock 65.254.254.0
621 Checking netblock 192.155.88.0
622 Checking netblock 65.254.224.0
623 Checking netblock 38.113.1.0
624 Checking netblock 38.113.20.0
625
626 Searching for njoathkeepers.org. emails in Google
627
628 Checking 12 active hosts using nmap... (nmap -sn -n -v -PP -PM -PS80,25 -PA -PY -PU53,40125 -PE --reason <ip> -oA <output_directory>/nmap/<ip>.sn)
629 Host 65.254.254.55 is up (reset ttl 64)
630 Host 65.254.254.54 is up (reset ttl 64)
631 Host 65.254.254.51 is up (reset ttl 64)
632 Host 65.254.254.50 is up (reset ttl 64)
633 Host 65.254.254.53 is up (reset ttl 64)
634 Host 65.254.254.52 is up (reset ttl 64)
635 Host 192.155.88.60 is up (echo-reply ttl 55)
636 Host 65.254.254.100 is up (reset ttl 64)
637 Host 65.254.254.101 is up (reset ttl 64)
638 Host 65.254.224.0 is up (reset ttl 64)
639 Host 38.113.1.0 is up (reset ttl 64)
640 Host 38.113.20.0 is up (reset ttl 64)
641
642 Checking ports on every active host using nmap... (nmap -O --reason --webxml --traceroute -sS -sV -sC -Pn -n -v -F <ip> -oA <output_directory>/nmap/<ip>)
643 Scanning ip 65.254.254.55 (mail.yourhostingaccount.com (PTR)):
644 Scanning ip 65.254.254.54 (mail.yourhostingaccount.com (PTR)):
645 Scanning ip 65.254.254.51 (mail.yourhostingaccount.com (PTR)):
646 Scanning ip 65.254.254.50 (mail.yourhostingaccount.com (PTR)):
647 Scanning ip 65.254.254.53 (mail.yourhostingaccount.com (PTR)):
648 Scanning ip 65.254.254.52 (mail.yourhostingaccount.com (PTR)):
649 Scanning ip 192.155.88.60 (www.njoathkeepers.org.):
650 80/tcp open http syn-ack ttl 52 nginx 1.14.2
651 |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
652 | http-methods:
653 |_ Supported Methods: GET HEAD POST
654 | http-robots.txt: 1 disallowed entry
655 |_/wp-admin/
656 |_http-server-header: nginx/1.14.2
657 |_http-title: Did not follow redirect to http://mtf8.info/
658 |_https-redirect: ERROR: Script execution failed (use -d to debug)
659 143/tcp open imap syn-ack ttl 51 Dovecot imapd
660 |_imap-capabilities: more LOGINDISABLEDA0001 LITERAL+ IDLE IMAP4rev1 capabilities STARTTLS ENABLE SASL-IR Pre-login ID post-login listed have LOGIN-REFERRALS OK
661 |_ssl-date: TLS randomness does not represent time
662 465/tcp open ssl/smtps? syn-ack ttl 55
663 |_smtp-commands: Couldn't establish connection on port 465
664 |_ssl-date: TLS randomness does not represent time
665 587/tcp open smtp syn-ack ttl 52 Postfix smtpd
666 |_smtp-commands: debian, PIPELINING, SIZE 103048576, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
667 |_ssl-date: TLS randomness does not represent time
668 993/tcp open ssl/imaps? syn-ack ttl 53
669 |_ssl-date: TLS randomness does not represent time
670 OS Info: Service Info: Host: debian
671 Scanning ip 65.254.254.100 (ns1.fatcow.com (PTR)):
672 Scanning ip 65.254.254.101 (ns2.fatcow.com (PTR)):
673 Scanning ip 65.254.224.0 ():
674 Scanning ip 38.113.1.0 ():
675 Scanning ip 38.113.20.0 ():
676 WebCrawling domain's web servers... up to 50 max links.
677
678 + URL to crawl: http://www.njoathkeepers.org.
679 + Date: 2019-11-07
680
681 + Crawling URL: http://www.njoathkeepers.org.:
682 + Links:
683 + Crawling http://www.njoathkeepers.org.
684 + Crawling http://www.njoathkeepers.org./ajax.googleapis.com (404 Not Found)
685 + Crawling http://www.njoathkeepers.org./s.w.org (404 Not Found)
686 + Crawling http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/css/ai1ec_parsed_css.css?ver=2.5.38 (404 Not Found)
687 + Crawling http://www.njoathkeepers.org./ajax.googleapis.com/ajax/libs/jqueryui/1.8.2/themes/smoothness/jquery-ui.css?ver=4.9.12 (404 Not Found)
688 + Crawling http://www.njoathkeepers.org./http& (404 Not Found)
689 + Crawling http://www.njoathkeepers.org./webcal& (404 Not Found)
690 + Searching for directories...
691 - Found: http://www.njoathkeepers.org./www.njoathkeepers.org/
692 - Found: http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/
693 - Found: http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/
694 - Found: http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/
695 - Found: http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/public/
696 - Found: http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/
697 - Found: http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/
698 - Found: http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/css/
699 - Found: http://www.njoathkeepers.org./ajax.googleapis.com/
700 - Found: http://www.njoathkeepers.org./ajax.googleapis.com/ajax/
701 - Found: http://www.njoathkeepers.org./ajax.googleapis.com/ajax/libs/
702 - Found: http://www.njoathkeepers.org./ajax.googleapis.com/ajax/libs/jqueryui/
703 - Found: http://www.njoathkeepers.org./ajax.googleapis.com/ajax/libs/jqueryui/1.8.2/
704 - Found: http://www.njoathkeepers.org./ajax.googleapis.com/ajax/libs/jqueryui/1.8.2/themes/
705 - Found: http://www.njoathkeepers.org./ajax.googleapis.com/ajax/libs/jqueryui/1.8.2/themes/smoothness/
706 - Found: http://www.njoathkeepers.org./images/
707 + Searching open folders...
708 - http://www.njoathkeepers.org./www.njoathkeepers.org/ (404 Not Found)
709 - http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/ (404 Not Found)
710 - http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/ (404 Not Found)
711 - http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/ (404 Not Found)
712 - http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/public/ (404 Not Found)
713 - http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/ (404 Not Found)
714 - http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/ (404 Not Found)
715 - http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/css/ (404 Not Found)
716 - http://www.njoathkeepers.org./ajax.googleapis.com/ (404 Not Found)
717 - http://www.njoathkeepers.org./ajax.googleapis.com/ajax/ (404 Not Found)
718 - http://www.njoathkeepers.org./ajax.googleapis.com/ajax/libs/ (404 Not Found)
719 - http://www.njoathkeepers.org./ajax.googleapis.com/ajax/libs/jqueryui/ (404 Not Found)
720 - http://www.njoathkeepers.org./ajax.googleapis.com/ajax/libs/jqueryui/1.8.2/ (404 Not Found)
721 - http://www.njoathkeepers.org./ajax.googleapis.com/ajax/libs/jqueryui/1.8.2/themes/ (404 Not Found)
722 - http://www.njoathkeepers.org./ajax.googleapis.com/ajax/libs/jqueryui/1.8.2/themes/smoothness/ (404 Not Found)
723 - http://www.njoathkeepers.org./images/ (403 Forbidden)
724 + Crawl finished successfully.
725----------------------------------------------------------------------
726Summary of http://http://www.njoathkeepers.org.
727----------------------------------------------------------------------
728+ Links crawled:
729 - http://www.njoathkeepers.org.
730 - http://www.njoathkeepers.org./ajax.googleapis.com (404 Not Found)
731 - http://www.njoathkeepers.org./ajax.googleapis.com/ajax/libs/jqueryui/1.8.2/themes/smoothness/jquery-ui.css?ver=4.9.12 (404 Not Found)
732 - http://www.njoathkeepers.org./http& (404 Not Found)
733 - http://www.njoathkeepers.org./s.w.org (404 Not Found)
734 - http://www.njoathkeepers.org./webcal& (404 Not Found)
735 - http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/css/ai1ec_parsed_css.css?ver=2.5.38 (404 Not Found)
736 Total links crawled: 7
737
738+ Links to files found:
739 - http://www.njoathkeepers.org./images/logo.png
740 Total links to files: 1
741
742+ Externals links found:
743 - http://eepurl.com/bG-YlX
744 - http://gmpg.org/xfn/11
745 - http://irc.nycpatriot.org
746 - http://oathkeepers.org
747 - http://www.dizzain.com/
748 - http://www.meetup.com/North-Jersey-Oath-Keepers-Meetup/
749 - http://www.meetup.com/Oathkeepers-Bergen-County-NJ/
750 - http://www.njleg.state.nj.us/2018/Bills/S1000/548_I1.HTM
751 - http://www.njoathkeepers.org/
752 - http://www.njoathkeepers.org/599-2/
753 - http://www.njoathkeepers.org/calendar/action~agenda/request_format~json/
754 - http://www.njoathkeepers.org/calendar/action~month/request_format~json/
755 - http://www.njoathkeepers.org/calendar/action~oneday/request_format~json/
756 - http://www.njoathkeepers.org/calendar/action~week/request_format~json/
757 - http://www.njoathkeepers.org/comments/feed/
758 - http://www.njoathkeepers.org/feed/
759 - http://www.njoathkeepers.org/login/
760 - http://www.njoathkeepers.org/members/
761 - http://www.njoathkeepers.org/new-jersey-billboard-project/
762 - http://www.njoathkeepers.org/nj-oath-keepers-gear/
763 - http://www.njoathkeepers.org/ny-oath-keepers-2016-awards-dinner/
764 - http://www.njoathkeepers.org/oath-keepers-president-responds-to-orlando-shooting/
765 - http://www.njoathkeepers.org/our-response-to-nj-office-of-homeland-security-and-preparedness/
766 - http://www.njoathkeepers.org/peoples-petition-against-unlawful-usurpations/
767 - http://www.njoathkeepers.org/press-coverage/
768 - http://www.njoathkeepers.org/sanctuary-cities/
769 - http://www.njoathkeepers.org/support-the-nj-oath-keepers/
770 - http://www.njoathkeepers.org/the-oath/
771 - http://www.njoathkeepers.org/timothy-locke/
772 - http://www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/public/js_cache/calendar.js?ver=2.5.38
773 - http://www.njoathkeepers.org/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=5.1.1
774 - http://www.njoathkeepers.org/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=5.1.1
775 - http://www.njoathkeepers.org/wp-content/plugins/email-subscribers/public/css/email-subscribers-public.css
776 - http://www.njoathkeepers.org/wp-content/plugins/email-subscribers/public/js/email-subscribers-public.js
777 - http://www.njoathkeepers.org/wp-content/plugins/login-sidebar-widget/css/style_login_widget.css?ver=4.9.12
778 - http://www.njoathkeepers.org/wp-content/plugins/login-sidebar-widget/js/additional-methods.js?ver=4.9.12
779 - http://www.njoathkeepers.org/wp-content/plugins/login-sidebar-widget/js/jquery.validate.min.js?ver=4.9.12
780 - http://www.njoathkeepers.org/wp-content/plugins/pta-member-directory/includes/css/pta-contact-form.css?ver=4.9.12
781 - http://www.njoathkeepers.org/wp-content/plugins/taskfreak/css/front.css?ver=4.9.12
782 - http://www.njoathkeepers.org/wp-content/plugins/taskfreak/js/front.js?ver=4.9.12
783 - http://www.njoathkeepers.org/wp-content/tablepress-combined.min.css?ver=40
784 - http://www.njoathkeepers.org/wp-content/themes/njoathkeepers/style.css?ver=4.9.12
785 - http://www.njoathkeepers.org/wp-content/uploads/2013/11/007-1-300x189.jpg
786 - http://www.njoathkeepers.org/wp-content/uploads/2013/11/007-1.jpg
787 - http://www.njoathkeepers.org/wp-content/uploads/2013/11/NJOK-WMAL-web-300x221.jpg
788 - http://www.njoathkeepers.org/wp-content/uploads/2013/11/NJOK-WMAL-web.jpg
789 - http://www.njoathkeepers.org/wp-content/uploads/2013/11/njok-parade-banner-300x225.jpg
790 - http://www.njoathkeepers.org/wp-content/uploads/2013/11/njok-parade-banner.jpg
791 - http://www.njoathkeepers.org/wp-content/uploads/2013/11/njok-parade-side-car-300x225.jpg
792 - http://www.njoathkeepers.org/wp-content/uploads/2013/11/njok-parade-side-car.jpg
793 - http://www.njoathkeepers.org/wp-content/uploads/2018/11/LaVoy-Finicum-300x235.png
794 - http://www.njoathkeepers.org/wp-content/uploads/2018/11/LaVoy-Finicum.png
795 - http://www.njoathkeepers.org/wp-includes/js/jquery/jquery-migrate.min.js?ver=1.4.1
796 - http://www.njoathkeepers.org/wp-includes/js/jquery/jquery.js?ver=1.12.4
797 - http://www.njoathkeepers.org/wp-includes/js/jquery/ui/core.min.js?ver=1.11.4
798 - http://www.njoathkeepers.org/wp-includes/js/jquery/ui/datepicker.min.js?ver=1.11.4
799 - http://www.njoathkeepers.org/wp-includes/js/wp-embed.min.js?ver=4.9.12
800 - http://www.njoathkeepers.org/wp-includes/wlwmanifest.xml
801 - http://www.njoathkeepers.org/wp-json/
802 - http://www.njoathkeepers.org/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.njoathkeepers.org%2F
803 - http://www.njoathkeepers.org/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.njoathkeepers.org%2F&
804 - http://www.njoathkeepers.org/xmlrpc.php
805 - http://www.njoathkeepers.org/xmlrpc.php?rsd
806 - https://c.statcounter.com/10740834/0/72d26d45/0/
807 - https://cdn.ymaws.com/www.anjrpc.org/resource/resmgr/legal_motions___briefs/anjrpc_v_grewal_nj(p0153639x.pdf
808 - https://statcounter.com/
809 - https://www.anjrpc.org/
810 - https://www.facebook.com/oathkeepersnj/
811 - https://www.google.com/calendar/render?cid=http&
812 - https://www.oathkeepers.org/who-speaks-for-oath-keepers/
813 Total external links: 70
814
815+ Email addresses found:
816 Total email address found: 0
817
818+ Directories found:
819 - http://www.njoathkeepers.org./ajax.googleapis.com/ (404 Not Found)
820 - http://www.njoathkeepers.org./ajax.googleapis.com/ajax/ (404 Not Found)
821 - http://www.njoathkeepers.org./ajax.googleapis.com/ajax/libs/ (404 Not Found)
822 - http://www.njoathkeepers.org./ajax.googleapis.com/ajax/libs/jqueryui/ (404 Not Found)
823 - http://www.njoathkeepers.org./ajax.googleapis.com/ajax/libs/jqueryui/1.8.2/ (404 Not Found)
824 - http://www.njoathkeepers.org./ajax.googleapis.com/ajax/libs/jqueryui/1.8.2/themes/ (404 Not Found)
825 - http://www.njoathkeepers.org./ajax.googleapis.com/ajax/libs/jqueryui/1.8.2/themes/smoothness/ (404 Not Found)
826 - http://www.njoathkeepers.org./images/ (403 Forbidden)
827 - http://www.njoathkeepers.org./www.njoathkeepers.org/ (404 Not Found)
828 - http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/ (404 Not Found)
829 - http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/ (404 Not Found)
830 - http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/ (404 Not Found)
831 - http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/public/ (404 Not Found)
832 - http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/ (404 Not Found)
833 - http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/ (404 Not Found)
834 - http://www.njoathkeepers.org./www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/css/ (404 Not Found)
835 Total directories: 16
836
837+ Directory indexing found:
838 Total directories with indexing: 0
839
840----------------------------------------------------------------------
841
842--Finished--
843Summary information for domain njoathkeepers.org.
844-----------------------------------------
845
846 Domain Ips Information:
847 IP: 65.254.254.55
848 HostName: mx.njoathkeepers.org Type: MX
849 HostName: mail.yourhostingaccount.com Type: PTR
850 Country: United States
851 Is Active: True (reset ttl 64)
852 IP: 65.254.254.54
853 HostName: mx.njoathkeepers.org Type: MX
854 HostName: mail.yourhostingaccount.com Type: PTR
855 Country: United States
856 Is Active: True (reset ttl 64)
857 IP: 65.254.254.51
858 HostName: mx.njoathkeepers.org Type: MX
859 HostName: mail.yourhostingaccount.com Type: PTR
860 Country: United States
861 Is Active: True (reset ttl 64)
862 IP: 65.254.254.50
863 HostName: mx.njoathkeepers.org Type: MX
864 HostName: mail.yourhostingaccount.com Type: PTR
865 Country: United States
866 Is Active: True (reset ttl 64)
867 IP: 65.254.254.53
868 HostName: mx.njoathkeepers.org Type: MX
869 HostName: mail.yourhostingaccount.com Type: PTR
870 Country: United States
871 Is Active: True (reset ttl 64)
872 IP: 65.254.254.52
873 HostName: mx.njoathkeepers.org Type: MX
874 HostName: mail.yourhostingaccount.com Type: PTR
875 Country: United States
876 Is Active: True (reset ttl 64)
877 IP: 192.155.88.60
878 HostName: www.njoathkeepers.org. Type: A
879 Country: United States
880 Is Active: True (echo-reply ttl 55)
881 Port: 80/tcp open http syn-ack ttl 52 nginx 1.14.2
882 Script Info: |_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
883 Script Info: | http-methods:
884 Script Info: |_ Supported Methods: GET HEAD POST
885 Script Info: | http-robots.txt: 1 disallowed entry
886 Script Info: |_/wp-admin/
887 Script Info: |_http-server-header: nginx/1.14.2
888 Script Info: |_http-title: Did not follow redirect to http://mtf8.info/
889 Script Info: |_https-redirect: ERROR: Script execution failed (use -d to debug)
890 Port: 143/tcp open imap syn-ack ttl 51 Dovecot imapd
891 Script Info: |_imap-capabilities: more LOGINDISABLEDA0001 LITERAL+ IDLE IMAP4rev1 capabilities STARTTLS ENABLE SASL-IR Pre-login ID post-login listed have LOGIN-REFERRALS OK
892 Script Info: |_ssl-date: TLS randomness does not represent time
893 Port: 465/tcp open ssl/smtps? syn-ack ttl 55
894 Script Info: |_smtp-commands: Couldn't establish connection on port 465
895 Script Info: |_ssl-date: TLS randomness does not represent time
896 Port: 587/tcp open smtp syn-ack ttl 52 Postfix smtpd
897 Script Info: |_smtp-commands: debian, PIPELINING, SIZE 103048576, VRFY, ETRN, STARTTLS, ENHANCEDSTATUSCODES, 8BITMIME, DSN,
898 Script Info: |_ssl-date: TLS randomness does not represent time
899 Port: 993/tcp open ssl/imaps? syn-ack ttl 53
900 Script Info: |_ssl-date: TLS randomness does not represent time
901 Os Info: Host: debian
902 IP: 65.254.254.100
903 HostName: ns1.fatcow.com Type: NS
904 HostName: ns1.fatcow.com Type: PTR
905 Country: United States
906 Is Active: True (reset ttl 64)
907 IP: 65.254.254.101
908 HostName: ns2.fatcow.com Type: NS
909 HostName: ns2.fatcow.com Type: PTR
910 Country: United States
911 Is Active: True (reset ttl 64)
912 IP: 65.254.224.0
913 Type: SPF
914 Is Active: True (reset ttl 64)
915 IP: 38.113.1.0
916 Type: SPF
917 Is Active: True (reset ttl 64)
918 IP: 38.113.20.0
919 Type: SPF
920 Is Active: True (reset ttl 64)
921#######################################################################################################################################
922Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-07 09:41 EST
923Nmap scan report for mail.nycpatriot.org (192.155.88.60)
924Host is up (2.2s latency).
925Not shown: 992 closed ports
926PORT STATE SERVICE
92780/tcp open http
928143/tcp open imap
929465/tcp open smtps
930587/tcp open submission
931993/tcp open imaps
9326667/tcp open irc
9337777/tcp open cbt
9348001/tcp open vcom-tunnel
935
936Nmap done: 1 IP address (1 host up) scanned in 9.00 seconds
937#######################################################################################################################################
938Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-07 09:42 EST
939Nmap scan report for mail.nycpatriot.org (192.155.88.60)
940Host is up (0.72s latency).
941Not shown: 11 closed ports, 2 filtered ports
942PORT STATE SERVICE
94368/udp open|filtered dhcpc
944123/udp open ntp
945
946Nmap done: 1 IP address (1 host up) scanned in 12.37 seconds
947#######################################################################################################################################
948http://192.155.88.60 [301 Moved Permanently] Country[UNITED STATES][US], HTTPServer[nginx/1.14.2], IP[192.155.88.60], RedirectLocation[http://mtf8.info/], UncommonHeaders[x-redirect-by], nginx[1.14.2]
949http://mtf8.info/ [200 OK] Country[UNITED STATES][US], Email[mtf8@mtf8.info], HTML5, HTTPServer[nginx/1.14.2], IP[192.155.88.60], JQuery, MetaGenerator[WordPress 5.2.4], Script[text/javascript], Title[mtf8 – There is only fate.], UncommonHeaders[link], WordPress[5.2.4], X-UA-Compatible[IE=edge], nginx[1.14.2]
950#######################################################################################################################################
951
952wig - WebApp Information Gatherer
953
954
955Scanning http://mtf8.info...
956_______________________________ SITE INFO _______________________________
957IP Title
958192.155.88.60 mtf8 – There is only fate.
959
960________________________________ VERSION ________________________________
961Name Versions Type
962WordPress 5.2.4 CMS
963nginx 1.14.2 Platform
964
965______________________________ INTERESTING ______________________________
966URL Note Type
967/readme.html Readme file Interesting
968/robots.txt robots.txt index Interesting
969/test/ Test directory Interesting
970/login/ Login Page Interesting
971
972_________________________________ TOOLS _________________________________
973Name Link Software
974wpscan https://github.com/wpscanteam/wpscan WordPress
975CMSmap https://github.com/Dionach/CMSmap WordPress
976
977_________________________________________________________________________
978Time: 97.5 sec Urls: 252 Fingerprints: 40401
979#######################################################################################################################################
980Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-07 09:46 EST
981NSE: Loaded 163 scripts for scanning.
982NSE: Script Pre-scanning.
983Initiating NSE at 09:46
984Completed NSE at 09:46, 0.00s elapsed
985Initiating NSE at 09:46
986Completed NSE at 09:46, 0.00s elapsed
987Initiating Parallel DNS resolution of 1 host. at 09:46
988Completed Parallel DNS resolution of 1 host. at 09:46, 0.03s elapsed
989Initiating SYN Stealth Scan at 09:46
990Scanning mail.nycpatriot.org (192.155.88.60) [1 port]
991Discovered open port 80/tcp on 192.155.88.60
992Completed SYN Stealth Scan at 09:46, 0.87s elapsed (1 total ports)
993Initiating Service scan at 09:46
994Scanning 1 service on mail.nycpatriot.org (192.155.88.60)
995Completed Service scan at 09:46, 6.98s elapsed (1 service on 1 host)
996Initiating OS detection (try #1) against mail.nycpatriot.org (192.155.88.60)
997Retrying OS detection (try #2) against mail.nycpatriot.org (192.155.88.60)
998Initiating Traceroute at 09:47
999Completed Traceroute at 09:47, 0.81s elapsed
1000Initiating Parallel DNS resolution of 10 hosts. at 09:47
1001Completed Parallel DNS resolution of 10 hosts. at 09:47, 14.02s elapsed
1002NSE: Script scanning 192.155.88.60.
1003Initiating NSE at 09:47
1004Completed NSE at 09:50, 194.33s elapsed
1005Initiating NSE at 09:50
1006Completed NSE at 09:50, 1.95s elapsed
1007Nmap scan report for mail.nycpatriot.org (192.155.88.60)
1008Host is up (0.51s latency).
1009
1010PORT STATE SERVICE VERSION
101180/tcp open http nginx 1.14.2
1012| http-brute:
1013|_ Path "/" does not require authentication
1014|_http-chrono: Request times for /; avg: 2795.00ms; min: 2019.55ms; max: 4051.52ms
1015|_http-csrf: Couldn't find any CSRF vulnerabilities.
1016|_http-date: Thu, 07 Nov 2019 14:47:29 GMT; -1s from local time.
1017|_http-devframework: Couldn't determine the underlying framework or CMS. Try increasing 'httpspider.maxpagecount' value to spider more pages.
1018|_http-dombased-xss: Couldn't find any DOM based XSS.
1019|_http-drupal-enum: Nothing found amongst the top 100 resources,use --script-args number=<number|all> for deeper analysis)
1020|_http-errors: Couldn't find any error pages.
1021|_http-feed: Couldn't find any feeds.
1022|_http-fetch: Please enter the complete path of the directory to save data in.
1023| http-headers:
1024| Server: nginx/1.14.2
1025| Date: Thu, 07 Nov 2019 14:47:58 GMT
1026| Content-Type: text/html; charset=UTF-8
1027| Transfer-Encoding: chunked
1028| Connection: close
1029| X-Redirect-By: WordPress
1030| Location: http://mtf8.info/
1031|
1032|_ (Request type: GET)
1033|_http-jsonp-detection: Couldn't find any JSONP endpoints.
1034| http-methods:
1035|_ Supported Methods: GET HEAD POST
1036|_http-mobileversion-checker: No mobile version detected.
1037|_http-passwd: ERROR: Script execution failed (use -d to debug)
1038| http-php-version: Logo query returned unknown hash 8b5b736aa3e1faddf01c73690842ddcb
1039|_Credits query returned unknown hash 7c7085f6073614bfb8bbeb43b5944d58
1040| http-robots.txt: 1 disallowed entry
1041|_/wp-admin/
1042|_http-security-headers:
1043|_http-server-header: nginx/1.14.2
1044| http-sitemap-generator:
1045| Directory structure:
1046| Longest directory structure:
1047| Depth: 0
1048| Dir: /
1049| Total files found (by extension):
1050|_
1051|_http-stored-xss: Couldn't find any stored XSS vulnerabilities.
1052|_http-title: Did not follow redirect to http://mtf8.info/
1053|_http-userdir-enum: Potential Users: test
1054| http-vhosts:
1055| www.nycpatriot.org : 200
1056|_126 names had status 301
1057|_http-vuln-cve2017-1001000: ERROR: Script execution failed (use -d to debug)
1058| http-waf-detect: IDS/IPS/WAF detected:
1059|_mail.nycpatriot.org:80/?p4yl04d3=<script>alert(document.cookie)</script>
1060| http-wordpress-brute:
1061| Accounts: No valid accounts found
1062| Statistics: Performed 0 guesses in 1 seconds, average tps: 0.0
1063|_ ERROR: The service seems to have failed or is heavily firewalled...
1064| http-wordpress-enum:
1065| Search limited to top 100 themes/plugins
1066| themes
1067| twentysixteen 1.8
1068| twentyseventeen 2.0
1069| plugins
1070|_ akismet 4.1.2
1071| http-wordpress-users:
1072| Username found: mtf8
1073|_Search stopped at ID #25. Increase the upper limit if necessary with 'http-wordpress-users.limit'
1074|_http-xssed: No previously reported XSS vuln.
1075|_https-redirect: ERROR: Script execution failed (use -d to debug)
1076| vulscan: VulDB - https://vuldb.com:
1077| [126525] nginx up to 1.14.0/1.15.5 ngx_http_mp4_module Loop denial of service
1078| [126524] nginx up to 1.14.0/1.15.5 HTTP2 CPU Exhaustion denial of service
1079| [126523] nginx up to 1.14.0/1.15.5 HTTP2 Memory Consumption denial of service
1080|
1081| MITRE CVE - https://cve.mitre.org:
1082| [CVE-2013-2070] http/modules/ngx_http_proxy_module.c in nginx 1.1.4 through 1.2.8 and 1.3.0 through 1.4.0, when proxy_pass is used with untrusted HTTP servers, allows remote attackers to cause a denial of service (crash) and obtain sensitive information from worker process memory via a crafted proxy response, a similar vulnerability to CVE-2013-2028.
1083| [CVE-2012-2089] Buffer overflow in ngx_http_mp4_module.c in the ngx_http_mp4_module module in nginx 1.0.7 through 1.0.14 and 1.1.3 through 1.1.18, when the mp4 directive is used, allows remote attackers to cause a denial of service (memory overwrite) or possibly execute arbitrary code via a crafted MP4 file.
1084| [CVE-2012-1180] Use-after-free vulnerability in nginx before 1.0.14 and 1.1.x before 1.1.17 allows remote HTTP servers to obtain sensitive information from process memory via a crafted backend response, in conjunction with a client request.
1085| [CVE-2013-2028] The ngx_http_parse_chunked function in http/ngx_http_parse.c in nginx 1.3.9 through 1.4.0 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a chunked Transfer-Encoding request with a large chunk size, which triggers an integer signedness error and a stack-based buffer overflow.
1086| [CVE-2011-4963] nginx/Windows 1.3.x before 1.3.1 and 1.2.x before 1.2.1 allows remote attackers to bypass intended access restrictions and access restricted files via (1) a trailing . (dot) or (2) certain "$index_allocation" sequences in a request.
1087| [CVE-2011-4315] Heap-based buffer overflow in compression-pointer processing in core/ngx_resolver.c in nginx before 1.0.10 allows remote resolvers to cause a denial of service (daemon crash) or possibly have unspecified other impact via a long response.
1088|
1089| SecurityFocus - https://www.securityfocus.com/bid/:
1090| [99534] Nginx CVE-2017-7529 Remote Integer Overflow Vulnerability
1091| [93903] Nginx CVE-2016-1247 Remote Privilege Escalation Vulnerability
1092| [91819] Nginx CVE-2016-1000105 Security Bypass Vulnerability
1093| [90967] nginx CVE-2016-4450 Denial of Service Vulnerability
1094| [82230] nginx Multiple Denial of Service Vulnerabilities
1095| [78928] Nginx CVE-2010-2266 Denial-Of-Service Vulnerability
1096| [70025] nginx CVE-2014-3616 SSL Session Fixation Vulnerability
1097| [69111] nginx SMTP Proxy Remote Command Injection Vulnerability
1098| [67507] nginx SPDY Implementation CVE-2014-0088 Arbitrary Code Execution Vulnerability
1099| [66537] nginx SPDY Implementation Heap Based Buffer Overflow Vulnerability
1100| [63814] nginx CVE-2013-4547 URI Processing Security Bypass Vulnerability
1101| [59824] Nginx CVE-2013-2070 Remote Security Vulnerability
1102| [59699] nginx 'ngx_http_parse.c' Stack Buffer Overflow Vulnerability
1103| [59496] nginx 'ngx_http_close_connection()' Remote Integer Overflow Vulnerability
1104| [59323] nginx NULL-Byte Arbitrary Code Execution Vulnerability
1105| [58105] Nginx 'access.log' Insecure File Permissions Vulnerability
1106| [57139] nginx CVE-2011-4968 Man in The Middle Vulnerability
1107| [55920] nginx CVE-2011-4963 Security Bypass Vulnerability
1108| [54331] Nginx Naxsi Module 'nx_extract.py' Script Remote File Disclosure Vulnerability
1109| [52999] nginx 'ngx_http_mp4_module.c' Buffer Overflow Vulnerability
1110| [52578] nginx 'ngx_cpystrn()' Information Disclosure Vulnerability
1111| [50710] nginx DNS Resolver Remote Heap Buffer Overflow Vulnerability
1112| [40760] nginx Remote Source Code Disclosure and Denial of Service Vulnerabilities
1113| [40434] nginx Space String Remote Source Code Disclosure Vulnerability
1114| [40420] nginx Directory Traversal Vulnerability
1115| [37711] nginx Terminal Escape Sequence in Logs Command Injection Vulnerability
1116| [36839] nginx 'ngx_http_process_request_headers()' Remote Buffer Overflow Vulnerability
1117| [36490] nginx WebDAV Multiple Directory Traversal Vulnerabilities
1118| [36438] nginx Proxy DNS Cache Domain Spoofing Vulnerability
1119| [36384] nginx HTTP Request Remote Buffer Overflow Vulnerability
1120|
1121| IBM X-Force - https://exchange.xforce.ibmcloud.com:
1122| [84623] Phusion Passenger gem for Ruby with nginx configuration insecure permissions
1123| [84172] nginx denial of service
1124| [84048] nginx buffer overflow
1125| [83923] nginx ngx_http_close_connection() integer overflow
1126| [83688] nginx null byte code execution
1127| [83103] Naxsi module for Nginx naxsi_unescape_uri() function security bypass
1128| [82319] nginx access.log information disclosure
1129| [80952] nginx SSL spoofing
1130| [77244] nginx and Microsoft Windows request security bypass
1131| [76778] Naxsi module for Nginx nx_extract.py directory traversal
1132| [74831] nginx ngx_http_mp4_module.c buffer overflow
1133| [74191] nginx ngx_cpystrn() information disclosure
1134| [74045] nginx header response information disclosure
1135| [71355] nginx ngx_resolver_copy() buffer overflow
1136| [59370] nginx characters denial of service
1137| [59369] nginx DATA source code disclosure
1138| [59047] nginx space source code disclosure
1139| [58966] nginx unspecified directory traversal
1140| [54025] nginx ngx_http_parse.c denial of service
1141| [53431] nginx WebDAV component directory traversal
1142| [53328] Nginx CRC-32 cached domain name spoofing
1143| [53250] Nginx ngx_http_parse_complex_uri() function code execution
1144|
1145| Exploit-DB - https://www.exploit-db.com:
1146| [26737] nginx 1.3.9/1.4.0 x86 Brute Force Remote Exploit
1147| [25775] Nginx HTTP Server 1.3.9-1.4.0 Chuncked Encoding Stack Buffer Overflow
1148| [25499] nginx 1.3.9-1.4.0 DoS PoC
1149|
1150| OpenVAS (Nessus) - http://www.openvas.org:
1151| [66451] Fedora Core 11 FEDORA-2009-12782 (nginx)
1152| [66450] Fedora Core 10 FEDORA-2009-12775 (nginx)
1153| [66449] Fedora Core 12 FEDORA-2009-12750 (nginx)
1154| [64912] Fedora Core 10 FEDORA-2009-9652 (nginx)
1155| [64911] Fedora Core 11 FEDORA-2009-9630 (nginx)
1156| [64869] Debian Security Advisory DSA 1884-1 (nginx)
1157|
1158| SecurityTracker - https://www.securitytracker.com:
1159| [1028544] nginx Bug Lets Remote Users Deny Service or Obtain Potentially Sensitive Information
1160| [1028519] nginx Stack Overflow Lets Remote Users Execute Arbitrary Code
1161| [1026924] nginx Buffer Overflow in ngx_http_mp4_module Lets Remote Users Execute Arbitrary Code
1162| [1026827] nginx HTTP Response Processing Lets Remote Users Obtain Portions of Memory Contents
1163|
1164| OSVDB - http://www.osvdb.org:
1165| [94864] cPnginx Plugin for cPanel nginx Configuration Manipulation Arbitrary File Access
1166| [93282] nginx proxy_pass Crafted Upstream Proxied Server Response Handling Worker Process Memory Disclosure
1167| [93037] nginx /http/ngx_http_parse.c Worker Process Crafted Request Handling Remote Overflow
1168| [92796] nginx ngx_http_close_connection Function Crafted r->
1169| [92634] nginx ngx_http_request.h zero_in_uri URL Null Byte Handling Remote Code Execution
1170| [90518] nginx Log Directory Permission Weakness Local Information Disclosure
1171| [88910] nginx Proxy Functionality SSL Certificate Validation MitM Spoofing Weakness
1172| [84339] nginx/Windows Multiple Request Sequence Parsing Arbitrary File Access
1173| [83617] Naxsi Module for Nginx naxsi-ui/ nx_extract.py Traversal Arbitrary File Access
1174| [81339] nginx ngx_http_mp4_module Module Atom MP4 File Handling Remote Overflow
1175| [80124] nginx HTTP Header Response Parsing Freed Memory Information Disclosure
1176| [77184] nginx ngx_resolver.c ngx_resolver_copy() Function DNS Response Parsing Remote Overflow
1177| [65531] nginx on Windows URI ::$DATA Append Arbitrary File Access
1178| [65530] nginx Encoded Traversal Sequence Memory Corruption Remote DoS
1179| [65294] nginx on Windows Encoded Space Request Remote Source Disclosure
1180| [63136] nginx on Windows 8.3 Filename Alias Request Access Rules / Authentication Bypass
1181| [62617] nginx Internal DNS Cache Poisoning Weakness
1182| [61779] nginx HTTP Request Escape Sequence Terminal Command Injection
1183| [59278] nginx src/http/ngx_http_parse.c ngx_http_process_request_headers() Function URL Handling NULL Dereference DoS
1184| [58328] nginx WebDAV Multiple Method Traversal Arbitrary File Write
1185| [58128] nginx ngx_http_parse_complex_uri() Function Underflow
1186| [44447] nginx (engine x) msie_refresh Directive Unspecified XSS
1187| [44446] nginx (engine x) ssl_verify_client Directive HTTP/0.9 Protocol Bypass
1188| [44445] nginx (engine x) ngx_http_realip_module satisfy_any Directive Unspecified Access Bypass
1189| [44444] nginx (engine x) X-Accel-Redirect Header Unspecified Traversal
1190| [44443] nginx (engine x) rtsig Method Signal Queue Overflow
1191| [44442] nginx (engine x) Worker Process Millisecond Timers Unspecified Overflow
1192|_
1193Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
1194Aggressive OS guesses: Linux 2.6.32 (95%), Linux 3.1 (94%), Linux 3.2 (94%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), HP P2000 G3 NAS device (93%), ASUS RT-N56U WAP (Linux 3.4) (92%), Linux 3.16 (92%), Linux 2.6.32 - 3.1 (92%), Linux 2.6.39 - 3.2 (92%), Infomir MAG-250 set-top box (92%)
1195No exact OS matches for host (test conditions non-ideal).
1196Uptime guess: 43.239 days (since Wed Sep 25 05:06:02 2019)
1197Network Distance: 11 hops
1198TCP Sequence Prediction: Difficulty=261 (Good luck!)
1199IP ID Sequence Generation: All zeros
1200
1201TRACEROUTE (using port 80/tcp)
1202HOP RTT ADDRESS
12031 342.95 ms 10.253.204.1
12042 343.10 ms 213.184.122.97
12053 463.81 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
12064 463.88 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185)
12075 463.98 ms 62.219.189.14
12086 463.96 ms bzq-179-124-249.cust.bezeqint.net (212.179.124.249)
12097 464.02 ms ae8.cr1-fra2.ip4.gtt.net (46.33.89.237)
12108 636.60 ms et-1-0-31.cr3-nyc3.ip4.gtt.net (89.149.140.186)
12119 636.64 ms et-1-0-31.cr3-nyc3.ip4.gtt.net (89.149.140.186)
121210 636.64 ms ip4.gtt.net (173.205.38.198)
121311 636.59 ms mail.nycpatriot.org (192.155.88.60)
1214
1215NSE: Script Post-scanning.
1216Initiating NSE at 09:50
1217Completed NSE at 09:50, 0.00s elapsed
1218Initiating NSE at 09:50
1219Completed NSE at 09:50, 0.00s elapsed
1220#######################################################################################################################################
1221Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-07 09:50 EST
1222Nmap scan report for mail.nycpatriot.org (192.155.88.60)
1223Host is up (0.46s latency).
1224
1225PORT STATE SERVICE VERSION
1226123/udp open ntp NTP v4 (secondary server)
1227| ntp-info:
1228|_ receive time stamp: 2019-11-07T14:51:21
1229| vulscan: VulDB - https://vuldb.com:
1230| [133843] ntp Port unknown vulnerability
1231| [128043] InfoVista VistaPortal SE 5.1 EditCurrentPresentSpace.jsp Parameter cross site scripting
1232| [128042] InfoVista VistaPortal SE 5.1 EditCurrentPool.jsp Parameter cross site scripting
1233| [128036] InfoVista VistaPortal SE 5.1 EditCurrentPresentSpace.jsp Parameter cross site scripting
1234| [105145] ntp up to 4.2.8p2-RC1/4.3.11 on Big Endian MD5 Key Generator ntp-keygen.c Variable weak encryption
1235| [96331] OpenNTPD up to 6.0 CN Validator weak authentication
1236| [95322] ntpd up to 4.2.8p8 Initial Sync Calculation unknown vulnerability
1237| [89036] Microsoft Windows up to Vista SP2 Print Spooler ntprint.dll PSetupDownloadAndInstallLegacyDriver privilege escalation
1238| [89035] Microsoft Windows up to Vista SP2 Print Spooler ntprint.dll PSetupDownloadAndInstallLegacyDriver memory corruption
1239| [87754] ntpd up to 4.2.8p7 Crypto-NAK Packet valid_NAK denial of service
1240| [87751] ntpd up to 4.2.8p7 Validation ntp_proto.c receive privilege escalation
1241| [60308] UTC Fire & Security GE-MC100-NTP/GPS-ZB Hardcoded Credentials unknown vulnerability
1242| [91177] WebTitan Appliance v3.50.x NTP Server Persistent cross site scripting
1243| [3368] Microsoft Windows up to Vista NNTP Response Heap-based memory corruption
1244| [141110] Cisco NX-OS ntp Packet Flooding denial of service
1245| [139263] Polycom Obihai Obi1022 5.1.11 NTP POST Request command injection
1246| [138862] Terracotta Quartz Scheduler up to 2.3.0 XML Data XMLSchedulingDataProcessor.java initDocumentParser XML External Entity
1247| [136554] Foxit Reader SDK Professsional 5.4.0.1031 Textbox IReader_ContentProvider PDF File memory corruption
1248| [136165] Foxit Reader SDK Professsional 5.4.0.1031 TextBox IReader_ContentProvider PDF File memory corruption
1249| [135088] ntp up to 4.2.8p12 NULL Pointer Dereference denial of service
1250| [131170] D-Link DIR-825 Rev.B 2.10 ntp_sync.cgi POST Request privilege escalation
1251| [129795] NTPsec up to 1.1.2 ntpd ntp_control.c denial of service
1252| [129794] NTPsec up to 1.1.2 ntp_control.c process_control() memory corruption
1253| [129793] NTPsec up to 1.1.2 ntp_control.c read_sysvars memory corruption
1254| [129792] NTPsec up to 1.1.2 ntpd ntp_config.c Request memory corruption
1255| [128241] jco.ir Karma 6.0.0 ContentPlaceHolder1_uxTitle ArchiveNews.aspx Parameter sql injection
1256| [124080] D-Link DIR-816 A2 1.10 B05 /goform/NTPSyncWithHost handler Shell Metacharacter command injection
1257| [122955] btrfsmaintenance up to 0.4.1 evaluate_auto_mountpoint Code Execution
1258| [121557] NeoMutt Message Data nntp.c memory corruption
1259| [121556] NeoMutt newsrc.c nntp_add_group memory corruption
1260| [119727] ntp 4.2.8p11 ntpq/ntpdc Long String Stack-based memory corruption
1261| [118765] Apple iOS up to 11.3.1 FontParser memory corruption
1262| [118715] Apple watchOS up to 4.3.0 FontParser memory corruption
1263| [117884] Foxit Reader 9.0.0.29935 PrintParams memory corruption
1264| [117883] Foxit Reader 9.0.0.29935 PrintParams memory corruption
1265| [114231] ntp 4.2.8p6/4.2.8p7/4.2.8p8/4.2.8p9/4.2.8p10 Symmetric Mode decodearr memory corruption
1266| [114140] ntp up to 4.2.8p11 Protocol Engine Source IP Address denial of service
1267| [114139] ntp up to 4.2.8p11 ntpd Timestamp denial of service
1268| [114138] ntp up to 4.2.8p11 ntpd ctl_getitem Packet denial of service
1269| [114137] ntp up to 4.2.8p6/4.3.91 ntpd Sybil privilege escalation
1270| [111779] Wireshark up to 2.4.3 JSON/XML/NTP/XMPP/GDB epan/tvbparse.c denial of service
1271| [104358] ntp up to 4.2.7 ntpd ntpd/ntp_config.c denial of service
1272| [98857] Apple tvOS up to 10.1 FontParser information disclosure
1273| [98856] Apple tvOS up to 10.1 FontParser memory corruption
1274| [98855] Apple tvOS up to 10.1 FontParser memory corruption
1275| [98854] Apple tvOS up to 10.1 FontParser memory corruption
1276| [98823] Apple watchOS up to 3.1 FontParser Out-of-Bounds information disclosure
1277| [98822] Apple watchOS up to 3.1 FontParser memory corruption
1278| [98821] Apple watchOS up to 3.1 FontParser memory corruption
1279| [98820] Apple watchOS up to 3.1 FontParser memory corruption
1280| [98741] Apple iOS up to 10.2 FontParser Out-of-Bounds information disclosure
1281| [98740] Apple iOS up to 10.2 FontParser memory corruption
1282| [98739] Apple iOS up to 10.2 FontParser memory corruption
1283| [98738] Apple iOS up to 10.2 FontParser memory corruption
1284| [98630] Apple macOS up to 10.12.3 FontParser Out-of-Bounds memory corruption
1285| [98629] Apple macOS up to 10.12.3 FontParser memory corruption
1286| [98628] Apple macOS up to 10.12.3 FontParser memory corruption
1287| [98627] Apple macOS up to 10.12.3 FontParser memory corruption
1288| [98552] ntp up to 4.2.8p9 Timestamp Origin Check spoofing
1289| [98551] ntp up to 4.2.8p9 ntpq Stack-based memory corruption
1290| [98550] ntp up to 4.2.8p9 Legacy MX4200 refclock mx4200_send memory corruption
1291| [98549] ntp up to 4.2.8p9 ctl_put memory corruption
1292| [98548] ntp up to 4.2.8p9 on Windows Data Structure denial of service
1293| [98545] ntp up to 4.2.8p9 Config Directive Segmentation Fault denial of service
1294| [98543] ntp up to 4.2.8p9 Configuration Directive denial of service
1295| [97826] Joomla CMS com_frontpage sql injection
1296| [95890] Apple watchOS up to 3.1.2 FontParser memory corruption
1297| [95889] Apple watchOS up to 3.1.2 FontParser memory corruption
1298| [95334] ntpd up to 4.2.8p8 on Windows UDP Packet denial of service
1299| [95333] ntpd up to 4.2.8p8 NULL Pointer Dereference denial of service
1300| [95332] ntpd up to 4.2.8p8 Control Mode privilege escalation
1301| [95321] ntpd up to 4.2.8p8 Origin Timestamp Protection Bypass privilege escalation
1302| [95320] ntpd up to 4.2.8p8 Source denial of service
1303| [95319] ntpd up to 4.2.8p8 Broadcast Packet denial of service
1304| [95318] ntpd up to 4.2.8p8 Broadcast Mode Replay Prevention denial of service
1305| [95317] ntpd up to 4.2.8p8 Rate Limit spoofing denial of service
1306| [94382] Apple macOS up to 10.12.1 FontParser memory corruption
1307| [94381] Apple macOS up to 10.12.1 FontParser memory corruption
1308| [94255] Apple tvOS up to 10.0 FontParser memory corruption
1309| [94254] Apple tvOS up to 10.0 FontParser memory corruption
1310| [94180] Apple iOS up to 10.1.1 FontParser memory corruption
1311| [94179] Apple iOS up to 10.1.1 FontParser memory corruption
1312| [93993] BusyBox NTP Packet networking/ntpd.c recv_and_process_client_pkt denial of service
1313| [93745] ntpd up to 4.2.8p8/4.3.93 UDP Packet NULL Pointer Dereference denial of service
1314| [93087] Apple watchOS up to 3.0 FontParser User information disclosure
1315| [93076] Apple tvOS up to 10.0 FontParser Out-of-Bounds information disclosure
1316| [93064] Apple macOS 10.12.0 FontParser Out-of-Bounds information disclosure
1317| [93044] Apple iOS up to 10.0.3 FontParser Out-of-Bounds information disclosure
1318| [92853] Oracle Communications Policy Management up to 9.7.3/9.9.1/10.4.1/12.1.1 NTP denial of service
1319| [92127] Apple tvOS up to 9.x FontParser Memory information disclosure
1320| [92108] Apple watchOS up to 2.x FontParser Memory information disclosure
1321| [92076] Apple macOS up to 10.11 FontParser memory corruption
1322| [91998] Apple iOS up to 10 FontParser memory corruption
1323| [91519] Microsoft Internet Explorer 9/10/11 MSHTML HandleStyleComponentProperty memory corruption
1324| [90452] Cisco IOS 15.5(3)S3/15.6(1)S2/15.6(2)S1/15.6(2)T1 NTP Interface Queue denial of service
1325| [88542] Meinberg IMS-LANTIME up to 6.20 NTP Time Server privilege escalation
1326| [88541] Meinberg IMS-LANTIME up to 6.20 NTP Time Server POST Request Stack-Based memory corruption
1327| [88540] Meinberg IMS-LANTIME up to 6.20 NTP Time Server POST Request Stack-Based memory corruption
1328| [87753] ntpd up to 4.2.8p7 Synchronization denial of service
1329| [87752] ntpd up to 4.2.8p7 Autokey denial of service
1330| [87750] ntpd up to 4.2.8p7 MAC denial of service
1331| [82989] ntp 4.2.8 ctl_getitem denial of service
1332| [82988] ntp 4.2.8 MATCH_ASSOC denial of service
1333| [82987] ntp 4.2.8 Trusted Key denial of service
1334| [82986] ntp 4.2.8 unconfig Directive denial of service
1335| [82985] ntp 4.2.8 IPv4 Bogon Packet privilege escalation
1336| [82983] ntp 4.2.8 Ephemeral Association privilege escalation
1337| [82982] ntp 4.2.8 ntpd Client privilege escalation
1338| [82981] ntp 4.2.8 Crypto NAK denial of service
1339| [82723] Cisco IOS/IOS XE ntp Time privilege escalation
1340| [81486] Apple iOS up to 9.2 FontParser memory corruption
1341| [81435] Apple Mac OS X up to 10.11.3 FontParser memory corruption
1342| [80654] ntp 4.2.8p5 ntpq Replay privilege escalation
1343| [80653] ntp 4.2.8p5 ntpq/ntpdc information disclosure
1344| [80652] ntp 4.2.8p5 ntpq Infinite Loop denial of service
1345| [80651] ntp 4.2.8p5 Origin Timestamp privilege escalation
1346| [80650] ntp 4.2.8p5 Authenticated Broadcast Mode privilege escalation
1347| [80649] ntp 4.2.8p5 reslist Command Stack-Based denial of service
1348| [80648] ntp 4.2.8p5 ntpdc NULL Pointer Dereference denial of service
1349| [80647] ntp 4.2.8p5 ntpq privilege escalation
1350| [80645] ntp 4.2.8p5 Key Checker spoofing
1351| [80644] ntp 4.2.8p5 Broadcast privilege escalation
1352| [78936] ntpd up to 4.2.8p5/4.3.78 ntp_crypto.c privilege escalation
1353| [78938] ntpd 4.2.8 sntp denial of service
1354| [78937] ntpd 4.2.8 logconfig Command Crash denial of service
1355| [78859] ntpd 4.2.8 autokey ntp_crypto.c denial of service
1356| [78858] ntpd 4.2.8 autokey ntp_crypto.c denial of service
1357| [78857] ntpd 4.2.8 ntp_crypto.c Extension Field denial of service
1358| [78856] ntpd 4.2.8 decodenetnum denial of service
1359| [78855] ntpd 4.2.8 KoD Packet denial of service
1360| [78854] ntpd 4.2.8 Rate Limit denial of service
1361| [78853] ntpd 4.2.8 Configuration Directive directory traversal
1362| [78852] ntpd 4.2.8 CRYPTO_ASSOC information disclosure
1363| [78851] ntpd 4.2.8 Private Mode Integer denial of service
1364| [78850] ntpd 4.2.8 Password Management Key File Use-After-Free memory corruption
1365| [78849] ntpd 4.2.8 Remote Configuration denial of service
1366| [78848] ntpd 4.2.8 URL Request save_config directory traversal
1367| [78847] ntpd 4.2.8 cookedprint memory corruption
1368| [78846] ntpd 4.2.8 refclock memory corruption
1369| [78845] ntpd 4.2.8 Password Management Heap-based memory corruption
1370| [78844] ntpd 4.2.8 Crypto-NAK Packet Logic privilege escalation
1371| [78808] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
1372| [78807] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
1373| [78806] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
1374| [78805] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
1375| [78804] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
1376| [78803] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
1377| [78802] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
1378| [78801] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
1379| [78800] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
1380| [78799] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
1381| [78798] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
1382| [78797] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
1383| [78745] Apple iOS up to 9.0 FontParser Font File memory corruption
1384| [78744] Apple iOS up to 9.0 FontParser Font File memory corruption
1385| [78743] Apple iOS up to 9.0 FontParser Font File memory corruption
1386| [78742] Apple iOS up to 9.0 FontParser Font File memory corruption
1387| [78741] Apple iOS up to 9.0 FontParser Font File memory corruption
1388| [78740] Apple iOS up to 9.0 FontParser Font File memory corruption
1389| [78739] Apple iOS up to 9.0 FontParser Font File memory corruption
1390| [78738] Apple iOS up to 9.0 FontParser Font File memory corruption
1391| [78737] Apple iOS up to 9.0 FontParser Font File memory corruption
1392| [78736] Apple iOS up to 9.0 FontParser Font File memory corruption
1393| [78735] Apple iOS up to 9.0 FontParser Font File memory corruption
1394| [78734] Apple iOS up to 9.0 FontParser Font File memory corruption
1395| [78200] ntp up to 4.2.7 on Linux/OS X ntpd ntp_io.c spoofing
1396| [78199] ntp up to 4.2.7 ntpd ntp_crypto.c memory corruption
1397| [77314] pfSense up to 2.2.2 services_ntpd.php cross site scripting
1398| [77193] Apple Mac OS X up to 10.10.4 FontParser memory corruption
1399| [77192] Apple Mac OS X up to 10.10.4 FontParser memory corruption
1400| [77191] Apple Mac OS X up to 10.10.4 FontParser memory corruption
1401| [77147] Apple iOS up to 8.4.0 FontParser memory corruption
1402| [77146] Apple iOS up to 8.4.0 FontParser memory corruption
1403| [77145] Apple iOS up to 8.4.0 FontParser memory corruption
1404| [76265] Apple Mac OS X up to 10.10.3 FontParser TrueTypeScaler Font File memory corruption
1405| [75452] Apple Watch OS 1.0 FontParser memory corruption
1406| [74740] Apple MacOS X up to 10.10.2 ntp weak authentication
1407| [74718] Apple MacOS X up to 10.10.2 FontParser memory corruption
1408| [74665] ntpd up to 4.2.8 Symmetric Mode denial of service
1409| [74664] ntpd up to 4.2.8 MAC Checker weak authentication
1410| [74290] Dell Asset Manager GetClientPackage.aspx sql injection
1411| [69165] Red Hat JBoss Enterprise Application Platform 6.3.3 RESTEasy DocumentProvider XML External Entity
1412| [68927] Apple iOS up to 8.1.2 FontParser memory corruption
1413| [68926] Apple iOS up to 8.1.2 FontParser memory corruption
1414| [68879] Apple Mac OS X 10.8.5/10.9.5/10.10/10.10.1 FontParser memory corruption
1415| [68878] Apple Mac OS X 10.8.5/10.9.5/10.10/10.10.1 FontParser memory corruption
1416| [68456] NTP Daemon up to 4.2.7 Random Generator ntp_config.c config_auth weak authentication
1417| [68641] NTP Daemon 4.2.7 PRNG Crash information disclosure
1418| [68640] NTP Daemon 4.2.7 PRNG spoofing
1419| [68457] NTP Daemon up to 4.2.7 Random Generator weak authentication
1420| [68455] NTP Daemon up to 4.2.7 ntp_proto.c receive denial of service
1421| [68454] NTP Daemon up to 4.2.7 configure memory corruption
1422| [68453] NTP Daemon up to 4.2.7 ctl_putdata memory corruption
1423| [68452] NTP Daemon up to 4.2.7 crypto_recv memory corruption
1424| [71475] wEPISDParentPortal 1.0 X.509 Certificate spoofing
1425| [67032] Cisco IOS/IOS XE 15.2/15.4 NTP Service privilege escalation
1426| [11702] NTP Project ntpd 4.2.6 monlist Functionality ntp_request.c query denial of service
1427| [65493] Dlink DSL-2760U sntpcfg.cgi cross site scripting
1428| [10540] Google Chrome 29.0.1547.76 XML Document xmldocumentparser.cpp append memory corruption
1429| [10494] Cisco IOS/IOS XE NTP denial of service
1430| [9806] TRENDnet TEW-812DRU Input Sanitizer setNTP.cgi cross site scripting
1431| [11630] Python 2.6.8/2.7.5/3.3.2 nntplib readline denial of service
1432| [60183] Instantphp lknSupport Search Module cross site scripting
1433| [59298] Instantphp Jobs Pro 1.6.4 search_jobs.html sql injection
1434| [58483] CMU Cyrus IMAP Server up to 2.4.4 nntpd.c split_wildmats memory corruption
1435| [56769] IBM WebSphere Application Server up to 6.1.0.10 getACRWorkElementPtr denial of service
1436| [5339] WebMaster Solutions WmsCms 2.0 printpage.asp Eingabe sql injection
1437| [52232] PaymentProcessorScript PPScript shop.htm sql injection
1438| [51585] TYPO3 mjseventpro 0.2.1 sql injection
1439| [4078] Sun Solaris NTP Mode 7 Request denial of service
1440| [48235] ntp up to 4.2.x ntp_crypto.c crypto_recv memory corruption
1441| [47706] ntp up to 4.2.4p7 ntpq/ntpq.c cookedprint memory corruption
1442| [45910] Goople CMS 1.8.2 frontpage.php sql injection
1443| [45837] Goople CMS up to 1.8.2 frontpage.php sql injection
1444| [45794] NTP up to 4.2.4p4 EVP_VerifyFinal memory corruption
1445| [43343] Alain Barbet Filesys Smbclientparser up to 2.6 SMB Server filesys::smbclientparser memory corruption
1446| [41522] XOOPS Tutoriais Module up to 2.1b printpage.php sql injection
1447| [40320] Agares Media phpAutoVideo 2.21 frontpage_right.php privilege escalation
1448| [40250] Agares Media Arcadem 2.04 frontpage_right.php privilege escalation
1449| [36948] Johntp adsense-deluxe 0.x on WordPress adsense-deluxe.php cross site request forgery
1450| [35867] Free Php Scripts Free Image Hosting up to 2.0 Login frontpage.php privilege escalation
1451| [34928] HP Mercury Performance Center Agent 8.0 magentproc.exe memory corruption
1452| [34504] Uberghey CMS 0.3.1 frontpage.php privilege escalation
1453| [32641] Dan Jensen Travelsized CMS up to 0.4 frontpage.php privilege escalation
1454|
1455| MITRE CVE - https://cve.mitre.org:
1456| [CVE-2013-1997] Multiple buffer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XAllocColorCells, (2) _XkbReadGetDeviceInfoReply, (3) _XkbReadGeomShapes, (4) _XkbReadGetGeometryReply, (5) _XkbReadKeySyms, (6) _XkbReadKeyActions, (7) _XkbReadKeyBehaviors, (8) _XkbReadModifierMap, (9) _XkbReadExplicitComponents, (10) _XkbReadVirtualModMap, (11) _XkbReadGetNamesReply, (12) _XkbReadGetMapReply, (13) _XimXGetReadData, (14) XListFonts, (15) XListExtensions, and (16) XGetFontPath functions.
1457| [CVE-2013-1984] Multiple integer overflows in X.org libXi 1.7.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XGetDeviceControl, (2) XGetFeedbackControl, (3) XGetDeviceDontPropagateList, (4) XGetDeviceMotionEvents, (5) XIGetProperty, (6) XIGetSelectedEvents, (7) XGetDeviceProperties, and (8) XListInputDevices functions.
1458| [CVE-2012-4258] Multiple SQL injection vulnerabilities in MYRE Real Estate Software (2012 Q2) allow remote attackers to execute arbitrary SQL commands via the (1) link_idd parameter to 1_mobile/listings.php or (2) userid parameter to 1_mobile/agentprofile.php.
1459| [CVE-2012-3375] The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083.
1460| [CVE-2012-1288] The UTC Fire & Security GE-MC100-NTP/GPS-ZB Master Clock device uses hardcoded credentials for an administrative account, which makes it easier for remote attackers to obtain access via an HTTP session.
1461| [CVE-2011-4859] The Schneider Electric Quantum Ethernet Module, as used in the Quantum 140NOE771* and 140CPU65* modules, the Premium TSXETY* and TSXP57* modules, the M340 BMXNOE01* and BMXP3420* modules, and the STB DIO STBNIC2212 and STBNIP2* modules, uses hardcoded passwords for the (1) AUTCSE, (2) AUT_CSE, (3) fdrusers, (4) ftpuser, (5) loader, (6) nic2212, (7) nimrohs2212, (8) nip2212, (9) noe77111_v500, (10) ntpupdate, (11) pcfactory, (12) sysdiag, (13) target, (14) test, (15) USER, and (16) webserver accounts, which makes it easier for remote attackers to obtain access via the (a) TELNET, (b) Windriver Debug, or (c) FTP port.
1462| [CVE-2011-3208] Stack-based buffer overflow in the split_wildmats function in nntpd.c in nntpd in Cyrus IMAP Server before 2.3.17 and 2.4.x before 2.4.11 allows remote attackers to execute arbitrary code via a crafted NNTP command.
1463| [CVE-2011-2724] The check_mtab function in client/mount.cifs.c in mount.cifs in smbfs in Samba 3.5.10 and earlier does not properly verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-0547.
1464| [CVE-2011-1313] Double free vulnerability in IBM WebSphere Application Server (WAS) 6.1.0.x before 6.1.0.35 and 7.x before 7.0.0.15 allows remote backend IIOP servers to cause a denial of service (S0C4 ABEND and storage corruption) by rejecting IIOP requests at opportunistic time instants, as demonstrated by requests associated with an ORB_Request::getACRWorkElementPtr function call.
1465| [CVE-2011-1082] fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file descriptors within other epoll data structures without properly checking for (1) closed loops or (2) deep chains, which allows local users to cause a denial of service (deadlock or stack memory consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.
1466| [CVE-2010-4539] The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.
1467| [CVE-2010-3879] FUSE, possibly 2.8.5 and earlier, allows local users to create mtab entries with arbitrary pathnames, and consequently unmount any filesystem, via a symlink attack on the parent directory of the mountpoint of a FUSE filesystem, a different vulnerability than CVE-2010-0789.
1468| [CVE-2010-2896] IBM FileNet Content Manager (CM) 4.0.0, 4.0.1, 4.5.0, and 4.5.1 before FP4 does not properly manage the InheritParentPermissions setting during an upgrade from 3.x, which might allow attackers to bypass intended folder permissions via unspecified vectors.
1469| [CVE-2010-2121] Opera 9.52 allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid (1) news:// or (2) nntp:// URIs.
1470| [CVE-2010-2119] Microsoft Internet Explorer 6.0.2900.2180 allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid nntp:// URIs.
1471| [CVE-2010-2117] Mozilla Firefox 3.0.19, 3.5.x, and 3.6.x allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid (1) news:// or (2) nntp:// URIs.
1472| [CVE-2010-1721] SQL injection vulnerability in the Intellectual Property (aka IProperty or com_iproperty) component 1.5.3 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in an agentproperties action to index.php.
1473| [CVE-2010-1708] Multiple SQL injection vulnerabilities in agentadmin.php in Free Realty allow remote attackers to execute arbitrary SQL commands via the (1) login field (aka agentname parameter) or (2) password field (aka agentpassword parameter).
1474| [CVE-2010-1078] SQL injection vulnerability in archive.php in XlentProjects SphereCMS 1.1 alpha allows remote attackers to execute arbitrary SQL commands via encoded null bytes ("%00") in the view parameter, which bypasses a protection mechanism.
1475| [CVE-2010-0790] sutil/ncpumount.c in ncpumount in ncpfs 2.2.6 produces certain detailed error messages about the results of privileged file-access attempts, which allows local users to determine the existence of arbitrary files via the mountpoint name.
1476| [CVE-2010-0789] fusermount in FUSE before 2.7.5, and 2.8.x before 2.8.2, allows local users to unmount an arbitrary FUSE filesystem share via a symlink attack on a mountpoint.
1477| [CVE-2010-0787] client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file.
1478| [CVE-2010-0547] client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.
1479| [CVE-2010-0340] SQL injection vulnerability in the MJS Event Pro (mjseventpro) extension 0.2.1 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
1480| [CVE-2010-0296] The encode_name macro in misc/mntent_r.c in the GNU C Library (aka glibc or libc6) 2.11.1 and earlier, as used by ncpmount and mount.cifs, does not properly handle newline characters in mountpoint names, which allows local users to cause a denial of service (mtab corruption), or possibly modify mount options and gain privileges, via a crafted mount request.
1481| [CVE-2010-0293] The client logging functionality in chronyd in Chrony before 1.23.1 does not restrict the amount of memory used for storage of client information, which allows remote attackers to cause a denial of service (memory consumption) via spoofed (1) NTP or (2) cmdmon packets.
1482| [CVE-2010-0182] The XMLDocument::load function in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 does not perform the expected nsIContentPolicy checks during loading of content by XML documents, which allows attackers to bypass intended access restrictions via crafted content.
1483| [CVE-2009-4724] SQL injection vulnerability in shop.htm in PaymentProcessorScript.net PPScript allows remote attackers to execute arbitrary SQL commands via the cid parameter.
1484| [CVE-2009-3562] Cross-site scripting (XSS) vulnerability in Xerver HTTP Server 4.32 allows remote attackers to inject arbitrary web script or HTML via the currentPath parameter in a chooseDirectory action.
1485| [CVE-2009-3561] Directory traversal vulnerability in Xerver HTTP Server 4.32 allows remote attackers to read arbitrary files via a full pathname with a drive letter in the currentPath parameter in a chooseDirectory action.
1486| [CVE-2009-2869] Unspecified vulnerability in Cisco IOS 12.2XNA, 12.2XNB, 12.2XNC, 12.2XND, 12.4MD, 12.4T, 12.4XZ, and 12.4YA allows remote attackers to cause a denial of service (device reload) via a crafted NTPv4 packet, aka Bug IDs CSCsu24505 and CSCsv75948.
1487| [CVE-2009-1252] Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.
1488| [CVE-2009-0159] Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.
1489| [CVE-2009-0121] SQL injection vulnerability in frontpage.php in Goople CMS 1.8.2 allows remote attackers to execute arbitrary SQL commands via the password parameter. NOTE: the provenance of this information is unknown
1490| [CVE-2009-0111] SQL injection vulnerability in frontpage.php in Goople CMS 1.8.2 and earlier allows remote attackers to execute arbitrary SQL commands via the username parameter.
1491| [CVE-2009-0021] NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.
1492| [CVE-2008-6982] Cross-site scripting (XSS) vulnerability in index.php in devalcms 1.4a allows remote attackers to inject arbitrary web script or HTML via the currentpath parameter.
1493| [CVE-2008-6865] SQL injection vulnerability in modules.php in the Sectionsnew module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the artid parameter in a printpage action.
1494| [CVE-2008-6728] SQL injection vulnerability in the Sections module in PHP-Nuke, probably before 8.0, allows remote attackers to execute arbitrary SQL commands via the artid parameter in a printpage action to modules.php.
1495| [CVE-2008-6255] Multiple SQL injection vulnerabilities in vBulletin 3.7.4 allow remote authenticated administrators to execute arbitrary SQL commands via the (1) answer parameter to admincp/verify.php, (2) extension parameter in an edit action to admincp/attachmentpermission.php, and the (3) iperm parameter to admincp/image.php.
1496| [CVE-2008-5362] The DefineConstantPool action in the ActionScript 2 virtual machine in Adobe Flash Player 10.x before 10.0.12.36 and 9.x before 9.0.151.0, and Adobe AIR before 1.5, accepts an untrusted input value for a "constant count," which allows remote attackers to read sensitive data from process memory via a crafted PDF file.
1497| [CVE-2008-5361] The ActionScript 2 virtual machine in Adobe Flash Player 10.x before 10.0.12.36 and 9.x before 9.0.151.0, and Adobe AIR before 1.5, does not verify a member element's size when performing (1) DefineConstantPool, (2) ActionJump, (3) ActionPush, (4) ActionTry, and unspecified other actions, which allows remote attackers to read sensitive data from process memory via a crafted PDF file.
1498| [CVE-2008-5066] PHP remote file inclusion vulnerability in upload/admin/frontpage_right.php in Agares Media ThemeSiteScript 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the loadadminpage parameter.
1499| [CVE-2008-4253] The FlexGrid ActiveX control in Microsoft Visual Basic 6.0, Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2, Office FrontPage 2002 SP3, and Office Project 2003 SP3 does not properly handle errors during access to incorrectly initialized objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to corruption of the "system state," aka "FlexGrid Control Memory Corruption Vulnerability."
1500| [CVE-2008-4174] Multiple cross-site scripting (XSS) vulnerabilities in index.php in Dynamic MP3 Lister 2.0.1 allow remote attackers to inject arbitrary web script or HTML via the (1) currentpath, (2) invert, (3) search, and (4) sort parameters.
1501| [CVE-2008-3970] pam_mount 0.10 through 0.45, when luserconf is enabled, does not verify mountpoint and source ownership before mounting a user-defined volume, which allows local users to bypass intended access restrictions via a local mount.
1502| [CVE-2008-3285] The Filesys::SmbClientParser module 2.7 and earlier for Perl allows remote SMB servers to execute arbitrary code via a folder name containing shell metacharacters.
1503| [CVE-2008-2931] The do_change_type function in fs/namespace.c in the Linux kernel before 2.6.22 does not verify that the caller has the CAP_SYS_ADMIN capability, which allows local users to gain privileges or cause a denial of service by modifying the properties of a mountpoint.
1504| [CVE-2008-2913] Directory traversal vulnerability in func.php in Devalcms 1.4a, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the currentpath parameter, in conjunction with certain ... (triple dot) and ..... sequences in the currentfile parameter, to index.php.
1505| [CVE-2008-2751] Multiple cross-site scripting (XSS) vulnerabilities in the Glassfish webadmin interface in Sun Java System Application Server 9.1_01 allow remote attackers to inject arbitrary web script or HTML via the (1) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:jndiProp:JndiNew, (2) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:resTypeProp:resType, (3) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:factoryClassProp:factoryClass, or (4) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:descProp:desc parameter to (a) resourceNode/customResourceNew.jsf
1506| [CVE-2008-2649] Multiple PHP remote file inclusion vulnerabilities in DesktopOnNet 3 Beta allow remote attackers to execute arbitrary PHP code via a URL in the app_path parameter to (1) don3_requiem.don3app/don3_requiem.php and (2) frontpage.don3app/frontpage.php.
1507| [CVE-2008-1351] SQL injection vulnerability in the Tutorials 2.1b module for XOOPS allows remote attackers to execute arbitrary SQL commands via the tid parameter to printpage.php, which is accessible directly or through a printpage action to index.php.
1508| [CVE-2008-1053] Multiple SQL injection vulnerabilities in the Kose_Yazilari module for PHP-Nuke allow remote attackers to execute arbitrary SQL commands via the artid parameter in a (1) viewarticle or (2) printpage action to modules.php.
1509| [CVE-2008-0435] Directory traversal vulnerability in index.php in OZJournals 2.1.1 allows remote attackers to read portions of arbitrary files via a .. (dot dot) in the id parameter in a printpreview action.
1510| [CVE-2008-0074] Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows local users to gain privileges via unknown vectors related to file change notifications in the TPRoot, NNTPFile\Root, or WWWRoot folders.
1511| [CVE-2007-6614] PHP remote file inclusion vulnerability in admin/frontpage_right.php in Agares Media phpAutoVideo 2.21 allows remote attackers to execute arbitrary PHP code via a URL in the loadadminpage parameter, a related issue to CVE-2007-6542.
1512| [CVE-2007-6542] PHP remote file inclusion vulnerability in admin/frontpage_right.php in Arcadem LE 2.04 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the loadadminpage parameter.
1513| [CVE-2007-6499] Unspecified vulnerability in Hosting Controller 6.1 Hot fix 3.3 and earlier allows remote authenticated users to uninstall the FrontPage extensions of an arbitrary account via a request to fp2002/UNINSTAL.asp with a "host id (IIS) value."
1514| [CVE-2007-6455] Multiple cross-site scripting (XSS) vulnerabilities in index.php in Mambo 4.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) Itemid parameter in a com_frontpage option and the (2) option parameter.
1515| [CVE-2007-4841] Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to execute arbitrary commands via a (1) mailto, (2) nntp, (3) news, or (4) snews URI with invalid "%" encoding, related to improper file type handling on Windows XP with Internet Explorer 7 installed, a variant of CVE-2007-3845.
1516| [CVE-2007-4042] Multiple argument injection vulnerabilities in Netscape Navigator 9 allow remote attackers to execute arbitrary commands via a NULL byte (%00) and shell metacharacters in a (1) mailto, (2) nntp, (3) news, (4) snews, or (5) telnet URI, a similar issue to CVE-2007-3670.
1517| [CVE-2007-4041] Multiple argument injection vulnerabilities in Mozilla Firefox 2.0.0.5 and 3.0alpha allow remote attackers to execute arbitrary commands via a NULL byte (%00) and shell metacharacters in a (1) mailto, (2) nntp, (3) news, (4) snews, or (5) telnet URI, a similar issue to CVE-2007-3670.
1518| [CVE-2007-3897] Heap-based buffer overflow in Microsoft Outlook Express 6 and earlier, and Windows Mail for Vista, allows remote Network News Transfer Protocol (NNTP) servers to execute arbitrary code via long NNTP responses that trigger memory corruption.
1519| [CVE-2007-3109] The CERN Image Map Dispatcher (htimage.exe) in Microsoft FrontPage allows remote attackers to determine the existence, and possibly partial contents, of arbitrary files under the web root via a relative pathname in the PATH_INFO.
1520| [CVE-2007-1715] PHP remote file inclusion vulnerability in frontpage.php in Free Image Hosting 2.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the AD_BODY_TEMP parameter. NOTE: the forgot_pass.php vector is already covered by CVE-2006-5670, and the login.php vector overlaps CVE-2006-5763.
1521| [CVE-2007-1560] The clientProcessRequest() function in src/client_side.c in Squid 2.6 before 2.6.STABLE12 allows remote attackers to cause a denial of service (daemon crash) via crafted TRACE requests that trigger an assertion error.
1522| [CVE-2007-0604] Cross-site scripting (XSS) vulnerability in Movable Type (MT) before 3.34 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the MTCommentPreviewIsStatic tag, which can open the "comment entry screen," a different vulnerability than CVE-2007-0231.
1523| [CVE-2007-0446] Stack-based buffer overflow in magentproc.exe for Hewlett-Packard Mercury LoadRunner Agent 8.0 and 8.1, Performance Center Agent 8.0 and 8.1, and Monitor over Firewall 8.1 allows remote attackers to execute arbitrary code via a packet with a long server_ip_name field to TCP port 54345, which triggers the overflow in mchan.dll.
1524| [CVE-2007-0359] PHP remote file inclusion vulnerability in frontpage.php in Uberghey CMS 0.3.1 allows remote attackers to execute arbitrary PHP code via a URL in the setup_folder parameter.
1525| [CVE-2006-7160] The Sandbox.sys driver in Outpost Firewall PRO 4.0, and possibly earlier versions, does not validate arguments to hooked SSDT functions, which allows local users to cause a denial of service (crash) via invalid arguments to the (1) NtAssignProcessToJobObject,, (2) NtCreateKey, (3) NtCreateThread, (4) NtDeleteFile, (5) NtLoadDriver, (6) NtOpenProcess, (7) NtProtectVirtualMemory, (8) NtReplaceKey, (9) NtTerminateProcess, (10) NtTerminateThread, (11) NtUnloadDriver, and (12) NtWriteVirtualMemory functions.
1526| [CVE-2006-6187] Multiple SQL injection vulnerabilities in ClickTech Click Gallery allow remote attackers to execute arbitrary SQL commands via the (1) currentpage or (2) gallery_id parameter to (a) view_gallery.asp, the (3) image_id parameter to (b) download_image.asp, the currentpage or (5) orderby parameter to (c) gallery.asp, or the currentpage parameter to (d) view_recent.asp.
1527| [CVE-2006-5864] Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers. NOTE: this issue can be exploited through other products that use gv such as evince.
1528| [CVE-2006-5182] PHP remote file inclusion vulnerability in frontpage.php in Dan Jensen Travelsized CMS 0.4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the setup_folder parameter.
1529| [CVE-2006-5020] Multiple PHP remote file inclusion vulnerabilities in SolidState 0.4 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the base_path parameter in manager/pages/ scripts including (1) AccountsPage.class.php, (2) AddInvoicePage.class.php, (3) AddIPAddressPage.class.php, (4) AddPaymentPage.class.php, (5) AddTaxRulePage.class.php, (6) AssignDomainPage.class.php, (7) AssignHostingPage.class.php, (8) AssignProductPage.class.php, (9) BillingPage.class.php, (10) BillingPaymentPage.class.php, (11) BrowseAccountsPage.class.php, (12) BrowseInvoicesPage.class.php, (13) ConfigureEditUserPage.class.php, (14) ConfigureNewUserPage.class.php, (15) ConfigureNewUserReceiptPage.class.php, (16) ConfigureUsersPage.class.php, (17) DeleteAccountPage.class.php, (18) DeleteDomainServicePage.class.php, (19) DeleteHostingServicePage.class.php, (20) DeleteInvoicePage.class.php, (21) DeleteProductPage.class.php, (22) DeleteServerPage.class.php, (23) DomainServicesPage.class.php, (24) DomainsPage.class.php, (25) EditAccountPage.class.php, (26) EditDomainPage.class.php, (27) EditDomainServicePage.class.php, (28) EditHostingServicePage.class.php, (29) EditPaymentPage.class.php, (30) EditProductPage.class.php, (31) EditServerPage.class.php, (32) EmailInvoicePage.class.php, (33) ExecuteOrderPage.class.php, (34) ExpiredDomainsPage.class.php, (35) FulfilledOrdersPage.class.php, (36) GenerateInvoicesPage.class.php, (37) HomePage.class.php, (38) InactiveAccountsPage.class.php, (39) IPManagerPage.class.php, (40) LoginPage.class.php, (41) LogPage.class.php, (42) ModulesPage.class.php, (43) NewAccountPage.class.php, (44) NewDomainServicePage.class.php, (45) NewProductPage.class.php, (46) OutstandingInvoicesPage.class.php, (47) PendingAccountsPage.class.php, (48) PendingOrdersPage.class.php, (49) PrintInvoicePage.class.php, (50) ProductsPage.class.php, (51) RegisterDomainPage.class.php, (52) RegisteredDomainsPage.class.php, (53) ServersPage.class.php, (54) ServicesHostingServicesPage.class.php, (55) ServicesNewHostingPage.class.php, (56) ServicesPage.class.php, (57) ServicesWebHostingPage.class.php, (58) SettingsPage.class.php, (59) TaxesPage.class.php, (60) TransferDomainPage.class.php, (61) ViewAccountPage.class.php, (62) ViewDomainServicePage.class.php, (63) ViewHostingServicePage.class.php, (64) ViewInvoicePage.class.php, (65) ViewLogMessagePage.class.php, (66) ViewOrderPage.class.php, (67) ViewProductPage.class.php, (68) ViewServerPage.class.php, (69) WelcomeEmailPage.class.php
1530| [CVE-2006-4286] ** DISPUTED ** PHP remote file inclusion vulnerability in contentpublisher.php in the contentpublisher component (com_contentpublisher) for Mambo allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. NOTE: this issue has been disputed by third parties who state that contentpublisher.php protects against direct request in the most recent version. The original researcher is known to be frequently inaccurate.
1531| [CVE-2006-4103] PHP remote file inclusion vulnerability in article-raw.php in Jason Alexander phNNTP 1.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the file_newsportal parameter.
1532| [CVE-2006-4055] Multiple PHP remote file inclusion vulnerabilities in Olaf Noehring The Search Engine Project (TSEP) 0.942 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the tsep_config[absPath] parameter to (1) include/colorswitch.php, (2) contentimages.class.php, (3) ipfunctions.php, (4) configfunctions.php, (5) printpagedetails.php, or (6) log.class.php. NOTE: the copyright.php vector is already covered by CVE-2006-3993.
1533| [CVE-2006-3628] Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors.
1534| [CVE-2006-3026] Multiple cross-site scripting (XSS) vulnerabilities in ClickGallery 5.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) gallery_id parameter in gallery.asp and (2) parentcurrentpage parameter in view_gallery.asp.
1535| [CVE-2006-2490] Multiple cross-site scripting (XSS) vulnerabilities in Mobotix IP Network Cameras M1 1.9.4.7 and M10 2.0.5.2, and other versions before 2.2.3.18 for M10/D10 and 3.0.3.31 for M22, allow remote attackers to inject arbitrary web script or HTML via URL-encoded values in (1) the query string to help/help, (2) the get_image_info_abspath parameter to control/eventplayer, and (3) the source_ip parameter to events.tar.
1536| [CVE-2006-1662] The frontpage option in Limbo CMS 1.0.4.2 and 1.0.4.1 allows remote attackers to execute arbitrary PHP commands via the Itemid parameter in index.php.
1537| [CVE-2006-1437] UPOINT @1 Event Publisher stores sensitive information under the web document root with insufifcient access control, which allows remote attackers to read private comments via a direct request to eventpublisher.txt.
1538| [CVE-2006-1436] Multiple cross-site scripting (XSS) vulnerabilities in UPOINT @1 Event Publisher allow remote attackers to inject arbitrary web script or HTML via the (1) Event, (2) Description, (3) Time, (4) Website, and (5) Public Remarks fields to (a) eventpublisher_admin.htm and (b) eventpublisher_usersubmit.htm.
1539| [CVE-2006-0375] Advantage Century Telecommunication (ACT) P202S IP Phone 1.01.21 running firmware 1.1.21 on VxWorks uses a hardcoded Network Time Protocol (NTP) server in Taiwan, which could allow remote attackers to provide false time information, block access to time information, or conduct other attacks.
1540| [CVE-2006-0015] Cross-site scripting (XSS) vulnerability in _vti_bin/_vti_adm/fpadmdll.dll in Microsoft FrontPage Server Extensions 2002 and SharePoint Team Services allows remote attackers to inject arbitrary web script or HTML, then leverage the attack to execute arbitrary programs or create new accounts, via the (1) operation, (2) command, and (3) name parameters.
1541| [CVE-2005-4716] Hitachi TP1/Server Base and TP1/NET/Library 2 on IBM AIX allow remote attackers to (1) cause a denial of service (OpenTP1 system outage) via invalid data to a port used by a system-server process, and (2) cause a denial of service (process failure) via invalid data to a port used by any of certain other processes.
1542| [CVE-2005-3356] The mq_open system call in Linux kernel 2.6.9, in certain situations, can decrement a counter twice ("double decrement") as a result of multiple calls to the mntput function when the dentry_open function call fails, which allows local users to cause a denial of service (panic) via unspecified attack vectors.
1543| [CVE-2005-3120] Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.
1544| [CVE-2005-2658] Buffer overflow in utility.cpp in Turquoise SuperStat (turqstat) 2.2.4 and earlier might allow remote NNTP servers to execute arbitrary code via a date with a long month.
1545| [CVE-2005-2428] Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696.
1546| [CVE-2005-1363] Multiple SQL injection vulnerabilities in MetaCart 2.0 for PayFlow allow remote attackers to execute arbitrary commands via (1) intCatalogID, (2) strSubCatalogID, or (3) strSubCatalog_NAME parameter to productsByCategory.asp, (4) curCatalogID, (5) strSubCatalog_NAME, (6) intCatalogID, or (7) page parameter to productsByCategory.asp or (8) intProdID parameter to product.asp.
1547| [CVE-2005-1362] Multiple SQL injection vulnerabilities in MetaCart 2.0 for Paypal allow remote attackers to execute arbitrary SQL commands via the (1) intProdID parameter to product.asp, (2) intCatalogID or (3) strSubCatalogID parameters to productsByCategory.asp, (4) chkText, (5) strText, (6) chkPrice, (7) intPrice, (8) chkCat, or (9) strCat parameters to searchAction.asp.
1548| [CVE-2005-1361] Multiple SQL injection vulnerabilities in MetaCart e-Shop 8.0 allow remote attackers to execute arbitrary SQL commands via the (1) intProdID parameter in product.asp or (2) strCatalog_NAME parameter to productsByCategory.asp.
1549| [CVE-2005-1213] Stack-based buffer overflow in the news reader for Microsoft Outlook Express (MSOE.DLL) 5.5 SP2, 6, and 6 SP1 allows remote malicious NNTP servers to execute arbitrary code via a LIST response with a long second field.
1550| [CVE-2005-0807] Multiple buffer overflows in Cain & Abel before 2.67 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via (1) an IKE packet with a large ID field that is not properly handled by the PSK sniffer filter, (2) the HTTP sniffer filter, or the (3) POP3, (4) SMTP, (5) IMAP, (6) NNTP, or (7) TDS sniffer filters.
1551| [CVE-2005-0785] Cross-site scripting (XSS) vulnerability in usersrecentposts in YaBB 2.0 rc1 allows remote attackers to inject arbitrary web script or HTML via the username parameter.
1552| [CVE-2005-0741] Cross-site scripting (XSS) vulnerability in YaBB.pl for YaBB 2.0 RC1 allows remote attackers to inject arbitrary web script or HTML via the username parameter in a usersrecentposts action.
1553| [CVE-2005-0736] Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.
1554| [CVE-2005-0719] Unknown vulnerability in the systems message queue in HP Tru64 Unix 4.0F PK8 through 5.1B-2/PK4 allows local users to cause a denial of service (process crash) for processes such as nfsstat, pfstat, arp, ogated, rarpd, route, sendmail, srconfig, strsetup, trpt, netstat, and xntpd.
1555| [CVE-2005-0101] Buffer overflow in the socket_getline function in Newspost 2.1.1 and earlier allows remote malicious NNTP servers to execute arbitrary code via a long string without a newline character.
1556| [CVE-2004-2068] fetchnews in leafnode 1.9.47 and earlier allows remote attackers to cause a denial of service (process hang) via an emptry NNTP news article with missing mandatory headers.
1557| [CVE-2004-1719] Multiple cross-site scripting (XSS) vulnerabilities in Merak Webmail Server 5.2.7 allow remote attackers to inject arbitrary web script or HTML via the (1) category, (2) cserver, (3) ext, (4) global, (5) showgroups, (6) or showlite parameters to address.html, or the (7) spage or (8) autoresponder parameters to settings.html, the (9) folder parameter to readmail.html, or the (10) attachmentpage_text_error parameter to attachment.html, (11) folder, (12) ct, or (13) cv parameters to calendar.html, (14) an <img> tag, or (15) the subject of an e-mail message.
1558| [CVE-2004-1610] SalesLogix 6.1 uses client-specified pathnames for writing certain files, which might allow remote authenticated users to create arbitrary files and execute code via the (1) vMME.AttachmentPath or (2) vMME.LibraryPath variables.
1559| [CVE-2004-1316] Heap-based buffer overflow in MSG_UnEscapeSearchUrl in nsNNTPProtocol.cpp for Mozilla 1.7.3 and earlier allows remote attackers to cause a denial of service (application crash) via an NNTP URL (news:) with a trailing '\' (backslash) character, which prevents a string from being NULL terminated.
1560| [CVE-2004-0574] The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows.
1561| [CVE-2003-1266] The (1) FTP, (2) POP3, (3) SMTP, and (4) NNTP servers in EServer 2.92 through 2.97, and possibly 2.98, allow remote attackers to cause a denial of service (crash) via a large amount of data.
1562| [CVE-2003-0824] Unknown vulnerability in the SmartHTML interpreter (shtml.dll) in Microsoft FrontPage Server Extensions 2000 and 2002, and Microsoft SharePoint Team Services 2002, allows remote attackers to cause a denial of service (response failure) via a certain request.
1563| [CVE-2003-0822] Buffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.
1564| [CVE-2003-0744] The fetchnews NNTP client in leafnode 1.9.3 to 1.9.41 allows remote attackers to cause a denial of service (process hang and termination) via certain malformed Usenet news articles that cause fetchnews to hang while waiting for input.
1565| [CVE-2002-2317] Memory leak in the (1) httpd, (2) nntpd, and (3) vpn driver in VelociRaptor 1.0 allows remote attackers to cause a denial of service (memory consumption) via an unknown method.
1566| [CVE-2002-2305] SQL injection vulnerability in agentadmin.php in Immobilier allows remote attackers to execute arbitrary SQL commands via the (1) agentname or (2) agentpassword parameter.
1567| [CVE-2002-2262] Unspecified vulnerability in xntpd of HP-UX 10.20 through 11.11 allows remote attackers to cause a denial of service (hang) via unknown attack vectors.
1568| [CVE-2002-1789] Format string vulnerability in newsx NNTP client before 1.4.8 allows local users to execute arbitrary code via format string specifiers that are not properly handled in a call to the syslog function.
1569| [CVE-2002-1788] Format string vulnerability in the nn_exitmsg function in nn 6.6.0 through 6.6.3 allows remote NNTP servers to execute arbitrary code via format strings in server responses.
1570| [CVE-2002-1718] Microsoft Internet Information Server (IIS) 5.1 may allow remote attackers to view the contents of a Frontpage Server Extension (FPSE) file, as claimed using an HTTP request for colegal.htm that contains .. (dot dot) sequences.
1571| [CVE-2002-0913] Format string vulnerability in log_doit function of Slurp NNTP client 1.1.0 allows a malicious news server to execute arbitrary code on the client via format strings in a server response.
1572| [CVE-2002-0909] Multiple buffer overflows in mnews 1.22 and earlier allow (1) a remote NNTP server to execute arbitrary code via long responses, or local users can gain privileges via long command line arguments (2) -f, (3) -n, (4) -D, (5) -M, or (6) -P, or via long environment variables (7) JNAMES or (8) MAILSERVER.
1573| [CVE-2002-0692] Buffer overflow in SmartHTML Interpreter (shtml.dll) in Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to cause a denial of service (CPU consumption) or run arbitrary code, respectively, via a certain type of web file request.
1574| [CVE-2002-0525] Format string vulnerabilities in (1) inews or (2) rnews for INN 2.2.3 and earlier allow local users and remote malicious NNTP servers to gain privileges via format string specifiers in NTTP responses.
1575| [CVE-2002-0002] Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.
1576| [CVE-2001-1204] Directory traversal vulnerability in phprocketaddin in Total PC Solutions PHP Rocket Add-in for FrontPage 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the page parameter.
1577| [CVE-2001-0764] Buffer overflow in ntping in scotty 2.1.0 allows local users to execute arbitrary code via a long hostname as a command line argument.
1578| [CVE-2001-0543] Memory leak in NNTP service in Windows NT 4.0 and Windows 2000 allows remote attackers to cause a denial of service (memory exhaustion) via a large number of malformed posts.
1579| [CVE-2001-0414] Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long readvar argument.
1580| [CVE-2001-0341] Buffer overflow in Microsoft Visual Studio RAD Support sub-component of FrontPage Server Extensions allows remote attackers to execute arbitrary commands via a long registration request (URL) to fp30reg.dll.
1581| [CVE-2001-0096] FrontPage Server Extensions (FPSE) in IIS 4.0 and 5.0 allows remote attackers to cause a denial of service via a malformed form, aka the "Malformed Web Form Submission" vulnerability.
1582| [CVE-2000-0438] Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter.
1583| [CVE-2000-0431] Cobalt RaQ2 and RaQ3 does not properly set the access permissions and ownership for files that are uploaded via FrontPage, which allows attackers to bypass cgiwrap and modify files.
1584| [CVE-2000-0341] ATRIUM Cassandra NNTP Server 1.10 allows remote attackers to cause a denial of service via a long login name.
1585| [CVE-2000-0256] Buffer overflows in htimage.exe and Imagemap.exe in FrontPage 97 and 98 Server Extensions allow a user to conduct activities that are not otherwise available through the web site, aka the "Server-Side Image Map Components" vulnerability.
1586| [CVE-2000-0153] FrontPage Personal Web Server (PWS) allows remote attackers to read files via a .... (dot dot) attack.
1587| [CVE-2000-0122] Frontpage Server Extensions allows remote attackers to determine the physical path of a virtual directory via a GET request to the htimage.exe CGI program.
1588| [CVE-2000-0114] Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory.
1589| [CVE-1999-1016] Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell.
1590| [CVE-1999-0681] Buffer overflow in Microsoft FrontPage Server Extensions (PWS) 3.0.2.926 on Windows 95, and possibly other versions, allows remote attackers to cause a denial of service via a long URL.
1591| [CVE-2011-3372] imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
1592| [CVE-2009-3563] ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
1593| [CVE-2006-2334] The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent attackers to create files that cannot be accessed through the expected DOS path or prevent access to other similarly named files in the same directory, which prevents those files from being detected or disinfected by certain anti-virus and anti-spyware software.
1594| [CVE-2006-1711] Plone 2.0.5, 2.1.2, and 2.5-beta1 does not restrict access to the (1) changeMemberPortrait, (2) deletePersonalPortrait, and (3) testCurrentPassword methods, which allows remote attackers to modify portraits.
1595| [CVE-2005-2496] The xntpd ntp (ntpd) daemon before 4.2.0b, when run with the -u option and using a string to specify the group, uses the group ID of the user instead of the group, which causes xntpd to run with different privileges than intended.
1596| [CVE-2005-1911] The fetchnews NNTP client in leafnode 1.11.2 and earlier can hang while waiting for input that never arrives, which allows remote NNTP servers to cause a denial of service (news loss).
1597| [CVE-2005-1453] fetchnews in leafnode 1.9.48 to 1.11.1 allows remote NNTP servers to cause a denial of service (crash) by closing the connection while fetchnews is reading (1) an article header or (2) an article body, which also prevents fetchnews from querying other servers.
1598| [CVE-2004-0657] Integer overflow in the NTP daemon (NTPd) before 4.0 causes the NTP server to return the wrong date/time offset when a client requests a date/time that is more than 34 years away from the server's time.
1599| [CVE-2002-0427] Buffer overflows in fpexec in mod_frontpage before 1.6.1 may allow attackers to gain root privileges.
1600| [CVE-2000-0710] The shtml.exe component of Microsoft FrontPage 2000 Server Extensions 1.1 allows remote attackers determine the physical path of the server components by requesting an invalid URL whose name includes a standard DOS device name.
1601| [CVE-2000-0709] The shtml.exe component of Microsoft FrontPage 2000 Server Extensions 1.1 allows remote attackers to cause a denial of service in some components by requesting a URL whose name includes a standard DOS device name.
1602| [CVE-2000-0413] The shtml.exe program in the FrontPage extensions package of IIS 4.0 and 5.0 allows remote attackers to determine the physical path of HTML, HTM, ASP, and SHTML files by requesting a file that does not exist, which generates an error message that reveals the path.
1603| [CVE-1999-1376] Buffer overflow in fpcount.exe in IIS 4.0 with FrontPage Server Extensions allows remote attackers to execute arbitrary commands.
1604| [CVE-1999-1052] Microsoft FrontPage stores form results in a default location in /_private/form_results.txt, which is world-readable and accessible in the document root, which allows remote attackers to read possibly sensitive information submitted by other users.
1605| [CVE-1999-1043] Microsoft Exchange Server 5.5 and 5.0 does not properly handle (1) malformed NNTP data, or (2) malformed SMTP data, which allows remote attackers to cause a denial of service (application error).
1606| [CVE-1999-0386] Microsoft Personal Web Server and FrontPage Personal Web Server in some Windows systems allows a remote attacker to read files on the server by using a nonstandard URL.
1607|
1608| SecurityFocus - https://www.securityfocus.com/bid/:
1609| [104517] NTP CVE-2018-12327 Stack Buffer Overflow Vulnerability
1610| [103351] NTP CVE-2018-7183 Buffer Overflow Vulnerability
1611| [103339] NTP CVE-2018-7185 Denial of Service Vulnerability
1612| [103194] NTP CVE-2018-7170 Incomplete Fix Remote Security Vulnerability
1613| [103192] NTP CVE-2018-7184 Denial of Service Vulnerability
1614| [103191] NTP CVE-2018-7182 Information Disclosure Vulnerability
1615| [97078] NTP CVE-2017-6452 Local Stack Based Buffer Overflow Vulnerability
1616| [97076] NTP CVE-2017-6459 Local Denial of Service Vulnerability
1617| [97074] NTP CVE-2017-6455 Local Denial of Service Vulnerability
1618| [97058] NTP CVE-2017-6451 Local Denial of Service Vulnerability
1619| [97052] NTP CVE-2017-6460 Stack Buffer Overflow Vulnerability
1620| [97051] NTP CVE-2017-6458 Buffer Overflow Vulnerability
1621| [97050] NTP CVE-2017-6464 Denial of Service Vulnerability
1622| [97049] NTP CVE-2017-6463 Denial of Service Vulnerability
1623| [97046] NTP CVE-2016-9042 Denial of Service Vulnerability
1624| [97045] NTP CVE-2017-6462 Local Buffer Overflow Vulnerability
1625| [94455] NTP CVE-2016-7433 Local Denial of Service Vulnerability
1626| [94454] NTP CVE-2016-7431 Denial of Service Vulnerability
1627| [94453] NTP CVE-2016-7429 Local Denial of Service Vulnerability
1628| [94452] NTP CVE-2016-9310 Denial of Service Vulnerability
1629| [94451] NTP CVE-2016-7426 Local Denial of Service Vulnerability
1630| [94450] NTP CVE-2016-9312 Denial of Service Vulnerability
1631| [94448] NTP CVE-2016-7434 Local Denial of Service Vulnerability
1632| [94447] NTP CVE-2016-7427 Denial of Service Vulnerability
1633| [94446] NTP CVE-2016-7428 Denial of Service Vulnerability
1634| [94444] NTP CVE-2016-9311 NULL Pointer Dereference Denial of Service Vulnerability
1635| [92277] BusyBox 'networking/ntpd.c' Remote Denial of Service Vulnerability
1636| [91400] Meinberg NTP Time Server Multiple Privilege Escalation and Buffer Overflow Vulnerabilities
1637| [91180] Foxit Reader 'CPDF_StreamContentParser::~CPDF_StreamContentParser' Memory Corruption Vulnerability
1638| [91010] NTP CVE-2016-4953 Denial of Service Vulnerability
1639| [91009] NTP CVE-2016-4956 Incomplete Fix Denial of Service Vulnerability
1640| [91007] NTP CVE-2016-4955 Denial of Service Vulnerability
1641| [90818] OpenNTPD 'ntpd/constraint.c' Certificate Validation Security Bypass Vulnerability
1642| [88276] NTP CVE-2016-1547 Denial of Service Vulnerability
1643| [88264] NTP CVE-2016-1548 Security Bypass Vulnerability
1644| [88261] NTP CVE-2016-1550 Local Security Bypass Vulnerability
1645| [88226] NTP CVE-2016-2518 Denial of Service Vulnerability
1646| [88219] NTP CVE-2016-1551 Remote Security Vulnerability
1647| [88204] NTP CVE-2016-2519 Denial of Service Vulnerability
1648| [88200] NTP CVE-2016-1549 Remote Security Vulnerability
1649| [88189] NTP CVE-2016-2517 Denial of Service Vulnerability
1650| [88180] NTP CVE-2016-2516 Denial of Service Vulnerability
1651| [88081] Microsoft FrontPage CVE-1999-1052 Information Disclosure Vulnerability
1652| [86089] Microsoft FrontPage CVE-2007-3109 Remote Security Vulnerability
1653| [83193] NTP CVE-2004-0657 Remote Security Vulnerability
1654| [82105] NTP CVE-2015-8139 Security Bypass Vulnerability
1655| [82102] NTP CVE-2015-8140 Security Bypass Vulnerability
1656| [81963] NTP CVE-2015-7973 Security Bypass Vulnerability
1657| [81962] NTP CVE-2015-7978 Denial of Service Vulnerability
1658| [81960] NTP CVE-2015-7974 Symmetric Key Encryption Authentication Security Bypass Vulnerability
1659| [81959] NTP CVE-2015-7975 Local Denial of Service Vulnerability
1660| [81816] NTP CVE-2015-7979 Denial of Service Vulnerability
1661| [81815] NTP CVE-2015-7977 NULL Pointer Dereference Denial of Service Vulnerability
1662| [81814] NTP CVE-2015-8158 Denial of Service Vulnerability
1663| [81811] NTP CVE-2015-8138 Denial of Service Vulnerability
1664| [81552] NTP Cronjob Script CVE-2016-0727 Local Privilege Escalation Vulnerability
1665| [77288] Network Time Protocol 'ntpq.c' Memory Corruption Vulnerability
1666| [77286] NTP CVE-2015-7702 Incomplete Fix Denial of Service Vulnerability
1667| [77285] NTP CVE-2015-7692 Incomplete Fix Denial of Service Vulnerability
1668| [77282] Network Time Protocol 'ntp_control.c' Directory Traversal Vulnerability
1669| [77281] NTP CVE-2015-7701 Denial of Service Vulnerability
1670| [77278] NTP Multiple Arbitrary File Overwrite Vulnerabilities
1671| [77274] NTP CVE-2015-7691 Incomplete Fix Denial of Service Vulnerability
1672| [76476] RETIRED: NTP CVE-2015-5196 Multiple Arbitrary File Overwrite Vulnerabilities
1673| [76475] NTP CVE-2015-5194 Denial of Service Vulnerability
1674| [76474] NTP 'ntpd/ntp_config.c' Remote Denial of Service Vulnerability
1675| [76473] NTP CVE-2015-5219 Denial of Service Vulnerability
1676| [75589] NTP CVE-2015-5146 Denial of Service Vulnerability
1677| [73951] NTP CVE-2015-1798 Man in the Middle Security Bypass Vulnerability
1678| [73950] NTP CVE-2015-1799 Denial of Service Vulnerability
1679| [73713] Mjseventpro CVE-2010-0340 SQL-Injection Vulnerability
1680| [72584] NTP 'ntp_io.c' Authentication Security Bypass Vulnerability
1681| [72583] NTP 'ntp_crypto.c' Information Disclosure Vulnerability
1682| [71969] Network Time Protocol ntpdc Local Buffer Overflow Vulnerability
1683| [65434] Apache Subversion 'mod_dav_svn' Module SVNListParentPath Denial of Service Vulnerability
1684| [64692] NTP 'ntp_request.c' Remote Denial of Service Vulnerability
1685| [62185] Microsoft FrontPage CVE-2013-3137 Information Disclosure Vulnerability
1686| [55561] IFOBS 'regclientprint.jsp' Multiple HTML Injection Vulnerabilities
1687| [54283] Linux Kernel 'fs/eventpoll.c' Local Denial of Service Vulnerability
1688| [52083] UTC Fire & Security GE-MC100-NTP/GPS-ZB Default Credentials Authentication Bypass Vulnerability
1689| [46630] Linux Kernel epoll Subsystem 'eventpoll.c' Multiple Local Denial of Service Vulnerabilities
1690| [45792] HP LoadRunner 'magentproc.exe' Remote Code Execution Vulnerability
1691| [41798] IBM FileNet Content Manager 'InheritParentPermissions' Flag Security Bypass Vulnerability
1692| [39479] Mozilla Firefox/Thunderbird/SeaMonkey 'nsIContentPolicy' Security Bypass Vulnerability
1693| [38309] XlentProjects SphereCMS 'archive.php' SQL Injection Vulnerability
1694| [37781] TYPO3 MJS Event Pro (mjseventpro) Unspecified SQL Injection Vulnerability
1695| [37255] NTP mode 7 MODE_PRIVATE Packet Remote Denial of Service Vulnerability
1696| [36502] Cisco IOS NTPv4 Reply Packet Remote Denial of Service Vulnerability
1697| [36457] Xerver Administration Interface 'currentPath' Parameter Cross Site Scripting Vulnerability
1698| [35017] NTP 'ntpd' Autokey Stack Buffer Overflow Vulnerability
1699| [34481] NTP 'ntpq' Stack Buffer Overflow Vulnerability
1700| [33290] TimeTools NTP Time Server Syslog Monitor Remote Denial of Service Vulnerability
1701| [33135] Goople CMS 'frontpage.php' SQL Injection Vulnerability
1702| [32352] vBulletin 'admincp/attachmentpermission.php' SQL Injection Vulnerability
1703| [31959] Agares Media ThemeSiteScript 'frontpage_right.php' Remote File Include Vulnerability
1704| [30290] SmbClientParser Perl Module Remote Command Execution Vulnerability
1705| [28297] Travelsized CMS 'frontpage.php' and 'index.php' Multiple Input Validation Vulnerabilities
1706| [28230] XOOPS MyTutorials Module 'printpage.php' SQL Injection Vulnerability
1707| [27375] OZ Journals 'printpreview' Local File Disclosure Vulnerability
1708| [26986] Arcadem LE 'frontpage_right.php' Remote File Include Vulnerability
1709| [25908] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability
1710| [22223] Hitachi OpenTP1 Unspecified Remote Denial of Service Vulnerability
1711| [22098] Uberghey Frontpage.PHP Remote File Include Vulnerability
1712| [20321] Travelsized CMS Frontpage.PHP Remote File Include Vulnerability
1713| [20044] Limbo CMS Frontpage Arbitrary File Upload Vulnerability
1714| [19423] phNNTP File_newsportal Remote File Include Vulnerability
1715| [17452] Microsoft FrontPage Server Extensions Cross-Site Scripting Vulnerability
1716| [16902] Limbo CMS Frontpage Arbitrary PHP Command Execution Vulnerability
1717| [15117] Lynx NNTP Article Header Buffer Overflow Vulnerability
1718| [15093] Hitachi OpenTP1 Denial Of Service Vulnerability
1719| [14673] NTPD Insecure Privileges Vulnerability
1720| [13951] Microsoft Outlook Express NNTP Response Parsing Buffer Overflow Vulnerability
1721| [13376] MetaCart E-Shop V-8 IntProdID Parameter Remote SQL Injection Vulnerability
1722| [12756] YaBB Remote UsersRecentPosts Cross-Site Scripting Vulnerability
1723| [12141] Microsoft FrontPage 2000 Internet Publishing Service Provider DAV File Upload Vulnerability
1724| [11412] Microsoft Frontpage Asycpict.DLL JPEG Handling Remote Denial of Service Vulnerabilities
1725| [11379] Microsoft NNTP Component Heap Overflow Vulnerability
1726| [9008] Microsoft FrontPage Server Extensions SmartHTML Interpreter Denial Of Service Vulnerability
1727| [9007] Microsoft FrontPage Server Extensions Remote Debug Buffer Overrun Vulnerability
1728| [6522] EType EServ NNTP Remote Denial Of Service Vulnerability
1729| [6356] HP-UX xntpd Unspecified Denial Of Service Vulnerability
1730| [5804] Microsoft FrontPage Server Extensions SmartHTML Buffer Overflow Vulnerability
1731| [5240] NewsX NNTP SysLog Format String Vulnerability
1732| [5160] Kim Storm NN NNTP Error Message Format String Vulnerability
1733| [4251] Improved mod_frontpage Buffer Overflow Vulnerability
1734| [4084] Microsoft IIS 5.1 Frontpage Server Extensions File Source Disclosure Vulnerability
1735| [4078] Microsoft IIS 5.1 Frontpage Extensions Path Disclosure Information Vulnerability
1736| [3751] Total PC Solutions PHP Rocket Add-in for FrontPage Directory Traversal Vulnerability
1737| [3183] Microsoft Windows NNTP Denial of Service Vulnerability
1738| [2911] Juergen Schoenwaelder scotty ntping Buffer Overflow Vulnerability
1739| [2540] Ntpd Remote Buffer Overflow Vulnerability
1740| [1608] Microsoft FrontPage Server Extensions MS-DOS Device Name Denial Of Service Vulnerability
1741| [1594] Microsoft FrontPage/IIS Cross Site Scripting shtml.dll Vulnerability
1742| [1435] Microsoft FrontPage 2000 Server Extensions Denial Of Service Vulnerability
1743| [1205] Microsoft FrontPage Extensions .pwd File Permissions Vulnerability
1744| [1174] Microsoft Frontpage Server Extensions Path Disclosure Vulnerability
1745| [1156] Cassandra NNTPServer v1.10 Buffer Overflow Vulnerability
1746| [1141] MS Frontpage htimage.exe File Existence Disclosure Vulnerability
1747| [1117] MS Frontpage Image Mapper Buffer Overflow Vulnerability
1748| [1109] MS IIS FrontPage 98 Extensions Buffer Overflow Vulnerability
1749| [1108] MS IIS FrontPage 98 Extensions Filename Obfuscation Vulnerability
1750| [989] Microsoft FrontPage PWS Directory Traversal Vulnerability
1751| [964] MS Frontpage htimage.exe Path Leak Vulnerability
1752| [568] Microsoft FrontPage PWS DoS Vulnerability
1753| [74045] NTP 'ntp-keygen.c' Predictable Random Number Generator Weakness
1754| [71762] NTP 'ntp-keygen.c' Predictable Random Number Generator Weakness
1755| [71757] NTP 'ntp_config.c' Insufficient Entropy Security Weakness
1756| [10980] Microsoft NTP Time Synchronization Spoof Weakness
1757|
1758| IBM X-Force - https://exchange.xforce.ibmcloud.com:
1759| [82317] ownCloud viewer.php and addMountPoint.php cross-site scripting
1760| [52238] Microsoft FrontPage Server Extensions Vital Information Leakage
1761| [36554] Wireshark NTP dissector format string vulnerable Windows version detected
1762| [6730] Microsoft FrontPage Server Extensions Visual Studio RAD Support sub-component buffer overflow
1763| [86041] TRENDnet TEW-812DRU uapply.cgi and setNTP.cgi cross-site request forgery
1764| [82084] IB-NAS5220 and IB-NAS4220-B ntp_name parameter cross-site scripting
1765| [78636] IFOBS regclientprint.jsp cross-site scripting
1766| [76340] MYRE Real Estate Mobile listings.php and agentprofile.php SQL injection
1767| [75403] MYRE Real Estate Mobile listings.php and agentprofile.php SQL injection
1768| [73583] Moodle frontpage security bypass
1769| [70325] Cyrus IMAPd NNTP security bypass
1770| [66589] Linux Kernel eventpoll.c denial of service
1771| [66034] Linux NTP buffer overflow
1772| [65872] Linux Kernel eventpoll.c denial of service
1773| [62765] Plesk Small Business Manager currentPageId SQL injection
1774| [60481] IBM FileNet Content Manager InheritParentPermissions security bypass
1775| [59090] Opera news:// and nntp:// URI denial of service
1776| [59088] Microsoft Internet Explorer nntp:// URIs denial of service
1777| [59086] Mozilla Firefox news:// and nntp:// URI denial of service
1778| [58364] HP LoadRunner Agent magentproc.exe code execution
1779| [57822] Magneto Software SntpGetReply buffer overflow
1780| [54650] NTP mode7 (MODE_PRIVATE) denial of service
1781| [53675] XLink Omni-NFS Enterprise ntpd.exe buffer overflow
1782| [53663] Xerver currentPath directory traversal
1783| [53662] Xerver currentPath cross-site scripting
1784| [53455] Cisco IOS NTPv4 denial of service
1785| [52468] TGS Content Management index.php and frontpage_ception.php SQL injection
1786| [52237] Microsoft FrontPage Server Extensions To Do List Found
1787| [52236] Microsoft FrontPage Server Extensions Machine Name Disclosure
1788| [52235] Microsoft FrontPage Configuration Information Leakage
1789| [52234] Microsoft FrontPage '_vti_cnf' Information Leakage
1790| [50617] NTP ntpd buffer overflow
1791| [50258] Drupal frontpage forms information disclosure
1792| [49838] NTP cookedprint() buffer overflow
1793| [48023] Windows NTP Time Server Syslog Monitor syslog message denial of service
1794| [47773] Goople CMS frontpage.php SQL injection
1795| [47244] Adobe AIR and Adobe Flash Player DefineConstantPool information disclosure
1796| [46174] ThemeSiteScript frontpage_right.php file include
1797| [44940] devalcms currentpath parameter cross-site scripting
1798| [43910] Filesys::SmbClientParser directory command execution
1799| [43418] Avaya Messaging Storage Server date, time and NTP server command execution
1800| [41538] Perlbal ClientProxy.pm denial of service
1801| [41181] tutorials module for XOOPS printpage.php and index.php SQL injection
1802| [40129] Leafnode fetchnews NNTP client denial of service
1803| [39414] WordPress XMLRPC metaWeblog.getRecentPosts function informaiton disclosure
1804| [39266] phpAutoVideo frontpage_right.php file include
1805| [39228] Arcadem LE frontpage_right.php file include
1806| [36811] Microsoft Outlook Express and Windows Mail NNTP response code execution
1807| [34720] Microsoft FrontPage Personal Web Server CERN Image Map Dispatcher buffer overflow
1808| [34719] Microsoft FrontPage CERN Image Map Dispatcher information disclosure
1809| [33124] Squid clientProcessRequest() function denial of service
1810| [32247] RHSA-2006:0393 updates for ntp not installed
1811| [32076] Microsoft Frontpage Extensions directory /_vti_pvt/ present
1812| [31553] Uberghey CMS frontpage.php file include
1813| [29337] Travelsized CMS frontpage.php file include
1814| [28271] phNNTP article-raw.php file include
1815| [27828] Wireshark (Ethereal) NTP dissector format string
1816| [25965] @1 Event Publisher eventpublisher.txt information disclosure
1817| [25537] Microsoft FrontPage Server Extensions HTML cross-site scripting
1818| [22748] Hitachi OpenTP1 denial of service
1819| [22035] NTP incorrect group permissions
1820| [21537] Microsoft FrontPage style tag denial of service
1821| [20830] Microsoft Outlook Express NNTP Response Parsing buffer overflow
1822| [20283] MetaCart e-Shop intProdID and intCatalogID parameters SQL injection
1823| [19186] newsfetch NNTP responses buffer overflow
1824| [18711] Mozilla NNTP buffer overflow
1825| [17739] Microsoft FrontPage and Internet Explorer asycpict.dll JPEG denial of service
1826| [17641] Microsoft Windows NNTP buffer overflow
1827| [15406] NTP integer buffer overflow
1828| [13680] Microsoft FrontPage Server Extensions SmartHTML Interpreter denial of service
1829| [13674] Microsoft FrontPage Server Extensions debug buffer overflow
1830| [11873] Microsoft Internet Explorer, Outlook, and FrontPage shlwapi.dll library denial of service
1831| [10942] Leafnode NNTP server denial of service
1832| [10836] HP-UX xntpd denial of service
1833| [10195] Microsoft FrontPage Server Extensions (FPSE) 2002 SmartHTML Interpreter buffer overflow
1834| [10194] Microsoft FrontPage Server Extensions (FPSE) 2000 SmartHTML Interpreter denial of service
1835| [9583] newsx NNTP client syslog() local format string
1836| [9491] nn NNTP error message format string
1837| [9270] slurp NNTP client syslog() format string
1838| [9226] mnews NNTP response remote buffer overflow
1839| [8800] Microsoft IIS FrontPage Server Extensions and ASP.NET ISAPI filter error handling denial of service
1840| [8733] SNTP time broadcast audit
1841| [8517] NNTP port probe
1842| [8513] SNTP malformed packet
1843| [8411] NTP servers from which the router obtains time are set
1844| [8410] NTP server is enabled on the router
1845| [8400] Apache HTTP Server mod_frontpage buffer overflows
1846| [8362] Microsoft FrontPage form_results.txt is world readable
1847| [7951] Shell metacharacters in NNTP fields
1848| [7795] Microsoft FrontPage Server Extensions (FPSE) "
1849| [7788] Microsoft FrontPage Server Extensions (FPSE) "
1850| [7749] PHP Rocket Add-in for FrontPage "
1851| [7710] NNTP Subject
1852| [6977] Microsoft Windows NT and 2000 NNTP memory leak denial of service
1853| [6735] Scotty ntping buffer overflow could allow the execution of arbitrary code
1854| [6321] Ntpd server readvar control message buffer overflow
1855| [5494] Microsoft FrontPage 98 Server Extensions fpcount.exe CGI can be remotely crashed
1856| [5124] Microsoft FrontPage Server Extensions device name denial of service
1857| [4899] Microsoft FrontPage Extensions shtml.dll multiple access denial of service
1858| [4484] Microsoft FrontPage Server Extensions image mapping components allow remote code execution
1859| [4439] Microsoft FrontPage Server Extensions"
1860| [4410] CASSANDRA NNTP server buffer overflow
1861| [4333] Microsoft FrontPage 98 Server Extensions DVWSSR.DLL file buffer overflow
1862| [4268] Microsoft FrontPage 98 Server Extensions DVWSSR.DLL file could allow remote ASP source retrieval
1863| [3393] Microsoft FrontPage Extensions authors.pwd file could reveal encrypted passwords
1864| [3391] Microsoft FrontPage Extensions service.pwd file could reveal encrypted passwords
1865| [3178] Exchange NNTP server unauthenticated command
1866| [3174] Exchange NNTP server dropped connection
1867| [3117] Microsoft FrontPage long URL buffer overflow
1868| [1223] Microsoft Exchange Server SMTP and NNTP denial of service
1869| [908] Microsoft FrontPage extensions under Unix create world readable password files
1870| [670] NNTP username
1871| [669] NNTP password
1872| [668] NNTP group
1873| [561] Microsoft FrontPage 1.1 allows users to write to executable directories
1874| [438] NNTP daemon
1875| [89] NNTP reading
1876| [88] NNTP posting
1877|
1878| Exploit-DB - https://www.exploit-db.com:
1879| [27620] Microsoft FrontPage Server Extensions Cross-Site Scripting Vulnerability
1880| [25536] MetaCart E-Shop V-8 IntProdID Parameter Remote SQL Injection Vulnerability
1881| [25199] YaBB 2.0 - Remote UsersRecentPosts Cross-Site Scripting Vulnerability
1882| [22124] EType EServ 1.9x NNTP Remote Denial of Service Vulnerability
1883| [20960] Juergen Schoenwaelder scotty 2.1.x ntping Buffer Overflow Vulnerability
1884| [20727] Ntpd Remote Buffer Overflow Vulnerability
1885| [19897] FrontPage 2000,IIS 4.0/5.0 Server Extensions Path Disclosure Vulnerability
1886| [19884] Atrium Software Cassandra NNTP Server 1.10 Buffer Overflow Vulnerability
1887| [19846] MS FrontPage 98 Server Extensions for IIS,MS InterDev 1.0 - Buffer Overflow Vulnerability
1888| [19445] Microsoft FrontPage Personal WebServer 1.0 PWS DoS Vulnerability
1889| [16960] Linux NTP query client 4.2.6p1 - Heap Overflow Vulnerability
1890| [5245] XOOPS Module tutorials (printpage.php) SQL Injection Vulnerability
1891| [3147] Uberghey 0.3.1 (frontpage.php) Remote File Include Vulnerability
1892| [2148] phNNTP <= 1.3 (article-raw.php) Remote File Include Vulnerability
1893| [28809] HP LoadRunner magentproc.exe Overflow
1894| [27894] obotix IP Camera M1 1.9.4 .7/M10 2.0.5 .2 eventplayer get_image_info_abspath Parameter XSS
1895| [24379] Merak Mail Server 7.4.5 attachment.html attachmentpage_text_error Parameter XSS
1896| [19877] FrontPage 98/Personal WebServer 1.0,Personal Web Server 2.0 htimage.exe File Existence Disclosure
1897| [19853] FrontPage 97/98 Server Image Mapper Buffer Overflow
1898| [19845] MS FrontPage 98 Server Extensions for IIS,MS InterDev 1.0 Filename Obfuscation
1899| [19753] ms frontpage personal webserver 1.0/personal web server 4.0 - Directory Traversal
1900| [19605] Linux Kernel fs/eventpoll.c Local Denial of Service
1901| [16379] Microsoft Outlook Express NNTP Response Parsing Buffer Overflow
1902| [16356] Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow
1903| [16285] NTP daemon readvar Buffer Overflow
1904| [15838] OpenClassifieds 1.7.0.3 Chained: Captcha Bypass->SQLi->Persistent XSS on Frontpage
1905| [12204] MagnetoSoft SNTP 4.0.0.7 - ActiveX SntpSendRequest Crash PoC
1906| [12203] MagnetoSoft SNTP 4.0.0.7 - ActiveX SntpGetReply BOF
1907| [9940] ntpd 4.0.99j-k readvar Buffer Overflow
1908| [7683] Goople <= 1.8.2 (frontpage.php) Blind SQL Injection Exploit
1909| [2471] Travelsized CMS <= 0.4 (frontpage.php) Remote File Include Exploit
1910| [1066] MS Outlook Express NNTP Buffer Overflow Exploit (MS05-030)
1911| [578] MS Windows NNTP Service (XPAT) Denial of Service Exploit (MS04-036)
1912| [121] MS Frontpage Server Extensions fp30reg.dll Exploit (MS03-051)
1913|
1914| OpenVAS (Nessus) - http://www.openvas.org:
1915| [902839] Microsoft FrontPage Server Extensions MS-DOS Device Name DoS Vulnerability
1916| [900652] NTP 'ntpd' Autokey Stack Overflow Vulnerability
1917| [900623] NTP Stack Buffer Overflow Vulnerability
1918| [801713] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability (941202)
1919| [800408] NTP EVP_VerifyFinal() Security Bypass Vulnerability
1920| [800407] NTP Version Detection (Linux)
1921| [100399] NTP mode 7 MODE_PRIVATE Packet Remote Denial of Service Vulnerability
1922| [56769] FreeBSD Ports: frontpage -- cross site scripting vulnerability
1923| [10884] NTP read variables
1924| [880846] CentOS Update for ntp CESA-2009:1648 centos4 i386
1925| [880814] CentOS Update for ntp CESA-2009:0046 centos5 i386
1926| [880810] CentOS Update for ntp CESA-2009:1648 centos5 i386
1927| [880762] CentOS Update for ntp CESA-2009:1039 centos5 i386
1928| [880690] CentOS Update for ntp CESA-2009:1651 centos3 i386
1929| [855775] Solaris Update for usr/sbin/ntpq 141396-01
1930| [855676] Solaris Update for ntpq 141911-01
1931| [855649] Solaris Update for ntpq 141910-01
1932| [855628] Solaris Update for usr/sbin/ntpq 141397-01
1933| [855247] Solaris Update for /usr/lib/inet/xntpd and /usr/sbin/ntpdate 109668-07
1934| [855010] Solaris Update for /usr/lib/inet/xntpd and /usr/sbin/ntpdate 109667-07
1935| [835252] HP-UX Update for XNTP HPSBUX02639
1936| [835204] HP-UX Update for XNTP HPSBUX02437
1937| [835161] HP-UX Update for xntpd HPSBUX00232
1938| [835070] HP-UX Update for xntpd(1M) HPSBUX00148
1939| [100608] Windows NT NNTP Component Buffer Overflow
1940| [66662] FreeBSD Security Advisory (FreeBSD-SA-10:02.ntpd.asc)
1941| [66639] Gentoo Security Advisory GLSA 201001-01 (ntp)
1942| [66527] CentOS Security Advisory CESA-2009:1648 (ntp)
1943| [66526] CentOS Security Advisory CESA-2009:1651 (ntp)
1944| [66519] Slackware Advisory SSA:2009-343-01 ntp
1945| [66515] Debian Security Advisory DSA 1948-1 (ntp)
1946| [66511] Fedora Core 10 FEDORA-2009-13121 (ntp)
1947| [66507] Fedora Core 11 FEDORA-2009-13090 (ntp)
1948| [66501] Fedora Core 12 FEDORA-2009-13046 (ntp)
1949| [66368] Mandriva Security Advisory MDVSA-2009:309 (ntp)
1950| [65948] SLES10: Security update for xntp
1951| [65773] SLES10: Security update for xntp
1952| [65666] SLES11: Security update for ntp
1953| [65606] SLES9: Security update for xntp
1954| [65578] SLES9: Security update for xntp
1955| [65238] SLES9: Security update for xntp, xntp-doc
1956| [64225] Fedora Core 11 FEDORA-2009-5674 (ntp)
1957| [64207] FreeBSD Security Advisory (FreeBSD-SA-09:11.ntpd.asc)
1958| [64146] Ubuntu USN-777-1 (ntp)
1959| [64128] Mandrake Security Advisory MDVSA-2009:117 (ntp)
1960| [64116] Slackware Advisory SSA:2009-154-01 ntp
1961| [64114] Gentoo Security Advisory GLSA 200905-08 (ntp)
1962| [64098] Fedora Core 9 FEDORA-2009-5275 (ntp)
1963| [64095] Fedora Core 10 FEDORA-2009-5273 (ntp)
1964| [64050] CentOS Security Advisory CESA-2009:1039 (ntp)
1965| [64046] FreeBSD Ports: ntp
1966| [64032] Debian Security Advisory DSA 1801-1 (ntp)
1967| [63770] Mandrake Security Advisory MDVSA-2009:092 (ntp)
1968| [63743] Gentoo Security Advisory GLSA 200904-05 (ntp)
1969| [63343] CentOS Security Advisory CESA-2009:0046 (ntp)
1970| [63267] Fedora Core 10 FEDORA-2009-0544 (ntp)
1971| [63266] Fedora Core 9 FEDORA-2009-0547 (ntp)
1972| [63242] FreeBSD Security Advisory (FreeBSD-SA-09:03.ntpd.asc)
1973| [63230] Slackware Advisory SSA:2009-014-03 ntp
1974| [63194] Mandrake Security Advisory MDVSA-2009:007 (ntp)
1975| [63163] Ubuntu USN-705-1 (ntp)
1976| [63149] Debian Security Advisory DSA 1702-1 (ntp)
1977| [55233] Debian Security Advisory DSA 801-1 (ntp)
1978| [53863] Debian Security Advisory DSA 045-1 (ntp)
1979| [52235] mozilla -- heap overflow in NNTP handler
1980| [17229] NNTP password overflow
1981| [17228] NNTP message headers overflow
1982| [14773] Identifies services like FTP, SMTP, NNTP...
1983| [10699] IIS FrontPage DoS II
1984| [10585] IIS FrontPage DoS
1985|
1986| SecurityTracker - https://www.securitytracker.com:
1987| [1021533] NTP Signature Validation Flaw Lets Remote Users Bypass Validation Checks
1988| [1015896] Microsoft FrontPage Server Extensions Input Validation Holes Permit Cross-Site Scripting Attacks
1989| [1013420] YaBB Input Validation Error in 'usersrecentposts' Lets Remote Users Conduct Cross-Site Scripting Attacks
1990| [1011762] cPanel Backup and FrontPage Management Bugs Let Remote Authenticated Users View, Edit, and Own Arbitrary Files
1991| [1001816] Microsoft Visual Studio RAD Support Component of FrontPage Lets Remote Users Execute Arbitrary Code on the FrontPage Server
1992| [1026143] Cyrus IMAP Server NNTP Service Lets Remote Users Bypass Authentication
1993| [1026031] Cyrus IMAP Server Buffer Overflow in NNTP Daemon Lets Remote Users Execute Arbitrary Code
1994| [1024934] Subversion SVNParentPath Collection Processing Error Lets Remote Users Execute Arbitrary Code
1995| [1023298] NTP Mode 7 Packet Processing Flaw Lets Remote Users Deny Service
1996| [1022930] Cisco IOS H.323, SIP, NTP, Tunneling, and Encrypted Packet Processing Flaws Let Remote Users Deny Service
1997| [1022243] ntp crypto_recv() Autokey Stack Overflow Lets Remote Users Execute Arbitrary Code
1998| [1022033] ntp Buffer Overflow in ntpq cookedprint() Lets Remote Users Execute Arbitrary Code
1999| [1018786] Microsoft Outlook Express Bug in Processing NNTP Responses Lets Remote Users Execute Arbitrary Code
2000| [1018785] Windows Mail Bug in Parsing NNTP Responses Lets Remote Users Execute Arbitrary Code
2001| [1016679] xntpd '-u' Switch May Cause the Daemon to Run With Incorrect Group Privileges
2002| [1016668] phNNTP Include File Flaw in 'file_newsportal' Parameter Lets Remote Users Execute Arbitrary Code
2003| [1015065] Lynx Buffer Overflow in HTrjis() in Processing NNTP Headers Lets Remote Users Execute Arbitrary Code
2004| [1014200] Microsoft Outlook Express Buffer Overflow in NNTP Response Parser Lets Remote Users Execute Arbitrary Code
2005| [1012726] Mozilla Buffer Overflow in Processing NNTP URLs Lets Remote Users Execute Arbitrary Code
2006| [1011631] Microsoft NNTP Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
2007| [1011250] Microsoft FrontPage Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
2008| [1009336] Network Time Protocol (NTP) Server Integer Overflow May Return the Incorrect Time
2009| [1008147] Microsoft FrontPage Server Extensions Buffer Overflow May Let Remote Users Execute Arbitrary Code
2010| [1005865] Leafnode NNTP News Server Lets Remote Users Deny Service
2011| [1005786] Xntpd Time Daemon on HP-UX May Crash or Degrade
2012| [1005287] Microsoft FrontPage Server Extensions SmartHTML Interpreter Bugs May Let Remote Users Execute Arbitrary Code with System Privileges
2013| [1004266] Cisco BTS 10200 Softswitch Underlying Operating System Contains Network Time Daemon (NTP) Buffer Overflow That May Allow a Remote User to Crash the Device or Execute Arbitrary Code
2014| [1004265] Cisco IP Manager Underlying Operating System Contains Network Time Daemon (NTP) Buffer Overflow That May Allow a Remote User to Crash the Device or Execute Arbitrary Code
2015| [1004264] Cisco Media Gateway Controller (MGC) Product Line Underlying Operating System Contains Network Time Daemon (NTP) Buffer Overflow That May Allow a Remote User to Crash the Device
2016| [1004244] Cisco IOS Systems Contain Network Time Daemon (NTP) Buffer Overflow That May Allow a Remote User to Crash the Device
2017| [1003767] 'mod_frontpage' Module for Apache Web Server Has Buffer Overlow in 'fpexec.c' That Allows Remote Users to Execute Arbitrary Code on the System with Root Privileges
2018| [1003071] PHP Rocket Add-in for FrontPage Discloses Files on the Server to Remote Users
2019| [1002197] Microsoft Windows NNTP Network News Service Has a Memory Leak That Allows Remote Users to Cause the Server to Crash
2020| [1001770] Scotty Tcl Interpreter's ntping Utility Lets Local Users Obtain Root Privileges
2021| [1001237] The Network Time Protocol Daemon (ntpd) Allows Remote Users to Execute Arbitrary Code on the Server - Typically to Gain Root Privileges on the Server
2022|
2023| OSVDB - http://www.osvdb.org:
2024| [52917] Adobe Flash Player ActionScript 2 VM DefineConstantPool Action Crafted PDF File Handling Memory Disclosure
2025| [37179] Free Image Hosting frontpage.php AD_BODY_TEMP Variable Remote
2026| [31138] SolidState ViewAccountPage.class.php base_path Parameter Remote File Inclusion
2027| [30764] ClickGallery view_recent.asp currentpage Parameter SQL Injection
2028| [26417] ClickGallery view_gallery.asp parentcurrentpage Parameter XSS
2029| [3383] Microsoft FrontPage Server Extensions imagemap.exe File Verification
2030| [805] NTP ntpd readvar Variable Remote Overflow
2031| [577] FrontPage Server Extensions Visual Studio RAD Support Overflow
2032| [95804] TRENDnet TEW-812DRU setNTP.cgi Multiple Field Command Injection
2033| [93712] Zavio IP Cameras /opt/cgi/view/param sub_C8C8 Function General.Time.NTP.Server Parameter Remote Command Execution
2034| [92877] Vivotek PT7135 IP Camera farseer.out system.ntp Parameter Remote Command Execution
2035| [91972] GNOME Evolution-Data-Server NNTP Encryption Option Failure Remote Credential Disclosure
2036| [91630] Rosewill RSVA11001 NTP Host Manipulation Remote Command Execution
2037| [91145] Microsoft IE removeChild CHtmlComponentProperty Object Handling Use-after-free Arbitrary Code Execution
2038| [90495] ownCloud /apps/files_external/addMountPoint.php mountpoint Parameter XSS
2039| [90267] Evolution NNTP STARTTLS Encryption Regression Remote Cleartext Credential Disclosure
2040| [90219] Raidsonic Multiple Product /cgi/time/time.cgi ntp_name Parameter XSS
2041| [85705] iFOBS ifobsClient/regclientprint.jsp Multiple Parameter XSS
2042| [83687] Linux Kernel fs/eventpoll.c Local DoS
2043| [83643] Knews Multilingual Newsletters Plugin for WordPress wp-content/plugins/knews/wysiwyg/fontpicker/index.php ff Parameter XSS
2044| [81824] MYRE Real Estate Mobile 1_mobile/agentprofile.php userid Parameter SQL Injection
2045| [81644] WebKit XMLDocumentParser::exitText Function XML Parsing Use-after-free Issue
2046| [78467] WebTitan NTP Server (Display) Module Unspecified XSS
2047| [77996] Contentpapst admin.php Multiple Parameter XSS
2048| [77872] Parallels Plesk Small Business Panel Site Editor (SiteBuilder) Feature /Wizard/Edit/Html currentPageId Parameter SQL Injection
2049| [76829] Calibre calibre-mount-helper Utility Arbitrary Directory / Mountpoint Manipulation
2050| [76338] WebKit XMLDocumentParser::insertErrorMessageBlock Use-after-free Issue
2051| [76336] WebKit XMLDocumentParser::endElementNs / XMLDocumentParser::parseEndElement Use-after-free Issue
2052| [76057] Cyrus IMAP Server NNTP AUTHINFO USER Command Parsing Authentication Bypass Arbitrary Command Execution
2053| [75307] Cyrus IMAP Server map/nntpd.c split_wildmats() Function NNTP Command Parsing Remote Overflow
2054| [73053] Linux Kernel fs/eventpoll.c epoll Data Structure File Descriptor Local DoS
2055| [70332] Apache Subversion Apache HTTP Server mod_dav_svn repos.c walk FunctionSVNParentPath Collection Remote DoS
2056| [69870] Lantern CMS 11-login.asp intPassedLocationID Parameter XSS
2057| [66859] Adobe Reader / Acrobat CoolType.dll maxp Table maxComponentPoints Field Font Handling Overflow
2058| [66448] IBM FileNet Content Manager InheritParentPermissions Security Inheritance Weakness
2059| [66268] InstantPhp Jobs Component for Joomla! index.php detailed_results Parameter SQL Injection
2060| [65465] WMS-CMS printpage.asp Multiple Parameter SQL Injection
2061| [65111] Opera Invalid news / nntp URI IFRAME Element Handling Remote DoS
2062| [65110] Microsoft IE Invalid news / nntp URI IFRAME Element Handling Remote DoS
2063| [65109] Mozilla Firefox Invalid news / nntp URI IFRAME Element Handling Remote DoS
2064| [64437] HP Mercury LoadRunner Agent magentproc.exe Remote Arbitrary Code Execution
2065| [63620] Mozilla Multiple Products XMLDocument::load Function nsIContentPolicy Check Restriction Bypass
2066| [63472] Apple Safari on Mac OS X libFontParser.dylib TType1ParsingContext::SpecialEncoding() Function Arbitrary Code Execution (PWN2OWN)
2067| [62909] ncpfs ncpumount sutil/ncpumount.c Mountpoint Name Local File Disclosure
2068| [60847] NTP ntpd Mode 7 Request Crafted Packet Reply Loop Remote DoS
2069| [60827] e107 e107_admin/frontpage.php Unspecified Parameter XSS
2070| [60349] Etype EServ NNTP Service Large Request Remote DoS
2071| [60142] HP-UX xntpd Unspecified Remote DoS
2072| [58758] Apache River GrantPermission Policy Manipulation Privilege Escalation
2073| [58645] Xerver HTTP Server chooseDirectory Action currentPath Parameter XSS
2074| [58644] Xerver HTTP Server chooseDirectory Action currentPath Parameter Traversal Arbitrary File Access
2075| [58342] Cisco IOS Network Time Protocol (NTP) Crafted Packet Remote DoS
2076| [57478] TGS Content Management cms/frontpage_ception.ph Multiple Parameter SQL Injection
2077| [56015] NTP on Windows SO_EXCLUSIVEADDRUSE Unspecified Issue
2078| [56014] NTP EVP_VerifyFinal() Check Unspecified Issue
2079| [54576] NTP ntpd/ntp_crypto.c crypto_recv() Function Remote Overflow
2080| [54294] eFront studentpage.php / professorpage.php File Upload Arbitrary Code Execution
2081| [53593] NTP ntpq/ntpq.c cookedprint() Function Remote Overflow
2082| [51244] Goople CMS frontpage.php Multiple Parameter SQL Injection
2083| [50015] Easyedit CMS news.php intPageID Parameter SQL Injection
2084| [50014] Easyedit CMS page.php intPageID Parameter SQL Injection
2085| [49921] vBulletin admincp/attachmentpermission.php extension Parameter SQL Injection
2086| [49856] ThemeSiteScript upload/admin/frontpage_right.php loadadminpage Parameter Remote File Inclusion
2087| [47971] DevalCMS index.php currentpath Parameter XSS
2088| [47502] Perl Filesys::SmbClientParser Folder Name Arbitrary Shell Command Injection
2089| [47001] Linux Kernel fs/namespace.c do_change_type Function Mountpoint Manipulation Local Privilege Escalation
2090| [46124] DesktopOnNet frontpage.don3app/frontpage.php app_path Parameter Remote File Inclusion
2091| [45449] ACT P202S IP Phone Hardcoded NTP Server IP Time Subversion
2092| [43913] Perlbal lib/Perlbal/ClientProxy.pm Chunked Upload File Upload Handling Overflow DoS
2093| [42913] Hosting Controller UNINSTAL.asp Crafted Host Header Arbitrary Site Frontpage Extension Manipulation
2094| [42876] Tutorials Module for XOOPS printpage.php tid Parameter SQL Injection
2095| [42058] Microsoft FrontPage CERN Image Map Dispatcher (htimage.exe) Arbitrary File Information Disclosure
2096| [39802] Arcadem LE frontpage_right.php loadadminpage Parameter Remote File Inclusion
2097| [39617] phpAutoVideo admin/frontpage_right.php loadadminpage Parameter Remote File Inclusion
2098| [37631] Microsoft Windows Malformed NNTP Response Remote Memory Corruption
2099| [34367] Squid src/client_side.c clientProcessRequest() function TRACE Request DoS
2100| [33553] Uberghey CMS frontpage.php setup_folder Parameter Remote File Inclusion
2101| [32987] Movable Type MTCommentPreviewIsStatic Tag XSS
2102| [32962] Hitachi OpenTP1 Invalid Data DoS
2103| [31200] SolidState DeleteAccountPage.class.php base_path Parameter Remote File Inclusion
2104| [31193] SolidState BillingPaymentPage.class.php base_path Parameter Remote File Inclusion
2105| [31187] SolidState AddPaymentPage.class.php base_path Parameter Remote File Inclusion
2106| [31119] SolidState NewAccountPage.class.php base_path Parameter Remote File Inclusion
2107| [31104] SolidState EditAccountPage.class.php base_path Parameter Remote File Inclusion
2108| [31103] SolidState EditPaymentPage.class.php base_path Parameter Remote File Inclusion
2109| [30763] ClickGallery gallery.asp currentpage Parameter SQL Injection
2110| [29490] Travelsized CMS frontpage.php setup_folder Parameter Remote File Inclusion
2111| [29098] TSEP printpagedetails.php tsep_config[absPath] Parameter Remote File Inclusion
2112| [28355] Joomla! Frontpage Content Submission Unspecified Injection
2113| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
2114| [28093] contentpublisher for Mambo contentpublisher.php mosConfig_absolute_path Parameter Remote File Inclusion
2115| [27856] phNNTP article-raw.php file_newsportal Parameter Remote File Inclusion
2116| [27369] Wireshark NTP Dissector Format String Flaw
2117| [25761] Microsoft Windows NTDLL.DLL RtlDosPathNameToNtPathName_U API Path Conversion Weakness
2118| [25623] Mobotix IP Network Camera eventplayer get_image_info_abspath Parameter XSS
2119| [24674] Mozilla Multiple Products XPCWrappedNativeScope::SystemIsBeingShutDown compareDocumentPosition Handling Memory Corruption
2120| [24518] Microsoft FrontPage Server Extensions fpadmdll.dll Multiple Parameter XSS
2121| [24237] @1 Event Publisher eventpublisher.txt Direct Request Private Comment Disclosure
2122| [24236] @1 Event Publisher eventpublisher_usersubmit.htm Multiple Parameter XSS
2123| [24235] @1 Event Publisher eventpublisher_admin.htm Multiple Parameter XSS
2124| [22822] Linux Kernel mq_open System Call mntput Function Local DoS
2125| [21038] FUSE fusermount Crafted Mountpoint mtab Corruption DoS
2126| [20143] lmtp2nntp l2_spec() Function Format String
2127| [20142] lmtp2nntp lib_cfg Function Unspecified Issue
2128| [20019] Lynx NNTP HTrjis() Function Remote Overflow
2129| [19428] IBM Lotus Domino CitiPayPro.nsf SubPaymentProcessingFS Src Parameter XSS
2130| [19419] Turquoise SuperStat Date Parser Crafted NNTP Server Response Overflow
2131| [19055] NTP ntpd -u Group Permission Weakness
2132| [17306] Microsoft Outlook Express NNTP LIST Command Remote Overflow
2133| [15975] NTP ntpd Date/Time Request Remote Overflow
2134| [15870] MetaCart product.asp intProdID Parameter SQL Injection
2135| [15596] Oracle Collaboration Suite Email Server Unspecified NNTP DoS
2136| [14827] YaBB2 YaBB.pl usersrecentposts Action username Parameter XSS
2137| [14456] Slurp NNTP Client log_doit Function Format String
2138| [14410] mod_frontpage for Apache HTTP Server fpexec Remote Overflow
2139| [13353] newsfetch NNTP Response Handling Overflow DoS
2140| [12637] Mozilla nsNNTPProtocol.cpp NNTP news:// URI Handling Overflow DoS
2141| [10962] cPanel Frontpage _private Symlink Arbitrary File Permission Modification
2142| [10961] cPanel Frontpage .htaccess Hardlink Arbitrary File Owernship Modification
2143| [10895] Microsoft FrontPage asycpict.dll JPEG Processing DoS
2144| [10697] Microsoft Windows/Exchange NNTP Component Remote Overflow
2145| [10246] Microsoft Exchange Server Malformed NNTP AUTHINFO DoS
2146| [9040] IceWarp WebMail attachment.html attachmentpage_text_error Parameter XSS
2147| [4345] Mnews NNTP Response Remote Overflow
2148| [3968] Microsoft FrontPage Personal Web Server Arbitrary File Access
2149| [3501] Microsoft FrontPage form_results Information Disclosure
2150| [3386] Microsoft FrontPage Server Extensions htimage.exe File Existence Enumeration
2151| [3385] Microsoft FrontPage Server Extensions htimage.exe Remote Path Disclosure
2152| [3384] Microsoft FrontPage htimage.exe Overflow
2153| [3382] Microsoft FrontPage Server Extensions imagemap.exe Remote Path Disclosure
2154| [3381] Microsoft FrontPage imagemap.exe Overflow
2155| [3300] Microsoft FrontPage shtml MS-DOS Device Name DoS
2156| [2952] Microsoft FrontPage Server Extensions (fp30reg.dll) Debug Function Chunked Encoded Request Remote Overflow
2157| [2800] Microsoft FrontPage Server Extensions SmartHTML DoS
2158| [2306] Microsoft FrontPage Server Extensions SmartHTML Interpreter shtml.dll DoS
2159| [1928] Microsoft Windows NNTP Malformed Post DoS
2160| [1879] scotty ntping Hostname Handling Local Overflow
2161| [1304] ATRIUM Cassandra NNTP Server Login Name Remote Overflow
2162| [1135] Microsoft Windows NT Print Spooler Service (spoolss.exe) AddPrintProvider() Function Alternate Print Provider Arbitrary Command Execution
2163| [1032] Microsoft FrontPage PWS GET Request Handling Remote DoS
2164| [694] PHP Rocket for FrontPage phprocketaddin page Parameter Traversal Arbitrary File Access
2165| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
2166| [396] Microsoft FrontPage shtml.exe MS-DOS Device Name Request DoS
2167| [307] Microsoft FrontPage 2000 Server Extensions shtml.exe Path Disclosure
2168| [282] Microsoft FrontPage dvwssr.dll Backdoor and Overflow
2169| [68] Microsoft FrontPage Extensions .pwd File Permissions
2170| [67] Microsoft FrontPage Extension shtml.dll Anonymous Account Information Disclosure
2171|_
2172Too many fingerprints match this host to give specific OS details
2173Network Distance: 12 hops
2174
2175TRACEROUTE (using port 123/udp)
2176HOP RTT ADDRESS
21771 350.71 ms 10.253.204.1
21782 487.94 ms 213.184.122.97
21793 487.88 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
21804 487.93 ms bzq-179-124-185.cust.bezeqint.net (212.179.124.185)
21815 488.01 ms bzq-179-124-153.cust.bezeqint.net (212.179.124.153)
21826 487.97 ms bzq-179-161-218.pop.bezeqint.net (212.179.161.218)
21837 488.05 ms et-1-0-31.cr3-nyc3.ip4.gtt.net (89.149.140.186)
21848 488.07 ms ip4.gtt.net (173.205.38.198)
21859 488.05 ms ip4.gtt.net (173.205.38.198)
218610 488.11 ms 173.255.239.51
218711 295.23 ms 173.255.239.15
218812 516.80 ms mail.nycpatriot.org (192.155.88.60)
2189#######################################################################################################################################
2190Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-07 09:51 EST
2191NSE: [irc-sasl-brute] usernames: Time limit 10m00s exceeded.
2192NSE: [irc-sasl-brute] usernames: Time limit 10m00s exceeded.
2193NSE: [irc-sasl-brute] passwords: Time limit 10m00s exceeded.
2194Nmap scan report for mail.nycpatriot.org (192.155.88.60)
2195Host is up (0.87s latency).
2196
2197PORT STATE SERVICE VERSION
21986667/tcp open irc BitlBee IRCd
2199| irc-botnet-channels:
2200|_ &bitlbee
2201| irc-info:
2202| server: mail.nycpatriot.org
2203| version: BitlBee-3.5.1+20181020+master+80-gc3599e0-git. mail.nycpatriot.org
2204| source ident: nmap
2205| source host: 160.116.0.98
2206|_ error: Closing link: Leaving...
2207| irc-sasl-brute:
2208| Accounts: No valid accounts found
2209|_ Statistics: Performed 77 guesses in 645 seconds, average tps: 0.1
2210| vulscan: VulDB - https://vuldb.com:
2211| [107080] InspIRCd up to 2.0.6 on Debian Incomplete Fix Heap-based memory corruption
2212| [99783] InspIRCd up to 2.0.5/2.0.16 on Debian Underflow memory corruption
2213| [99772] InspIRCd up to 2.0.6 Infinite Loop denial of service
2214| [97949] bitlbee-libpurple up to 3.5.0 File Transfer NULL Pointer Dereference memory corruption
2215| [97919] BitlBee up to 3.4 Transfer Request NULL Pointer Dereference memory corruption
2216| [97918] bitlbee-libpurple up to 3.4 File Transfer NULL Pointer Dereference memory corruption
2217| [97599] nefarious2 Certificate Fingerprint ircd/m_authenticate.c m_authenticate weak authentication
2218| [95510] UnrealIRCd up to 3.2.10.6/4.0.5 Certificate Fingerprint modules/m_sasl.c m_authenticate spoofing
2219| [92211] InspIRCd up to 2.0.22 m_sasl spoofing weak authentication
2220| [82220] InspIRCd up to 2.0.18 DNS PTR Response dns.cpp DNS::GetResult denial of service
2221| [69736] UnrealIRCd 3.2.10/3.2.10.1 NULL Pointer Dereference denial of service
2222| [69730] UnrealIRCd 3.2.10/3.2.10.1 NULL Pointer Dereference denial of service
2223| [65151] Barton ngIRCd up to 20.2 conn.c Handle_Write denial of service
2224| [63901] ngIRCd 20/20.1 channel.c denial of service
2225| [63551] IRCD-Hybrid up to 8.0.5 hostmask.c try_parse_v4_netmask denial of service
2226| [63287] ircd-ratbox up to 2.0.9 NULL Pointer Dereference denial of service
2227| [60508] Inspire Ircd InspIRCd 2.0.5 dns.cpp memory corruption
2228| [53593] UnrealIRCd up to 3.2.8 allow::options::noident memory corruption
2229| [53595] UnrealIRCd 3.2.8.1 privilege escalation
2230| [51984] ngircd 13/14 Crash denial of service
2231| [51739] ircd-ratbox up to 2.0.9 lp Command cache.c denial of service
2232| [51738] ircd-ratbox up to 2.0.9 irc_string.c clean_string memory corruption
2233| [43992] BitlBee up to 1.2.1 unknown vulnerability
2234| [43913] BitlBee up to 1.2.1 privilege escalation
2235| [42107] Inspire Ircd InspIRCd 1.1.17 memory corruption
2236| [40546] ngIRCd 0.10.3/0.11.0-pre1 Crash denial of service
2237| [38399] Universal Ircd ircu 2.10.12.05 Monitoring silence information disclosure
2238| [38392] Universal Ircd ircu 2.10.12.01 Flooding denial of service
2239| [38398] Universal Ircd ircu 2.10.12.05 privilege escalation
2240| [38397] Universal Ircd ircu unknown vulnerability
2241| [38396] Universal Ircd ircu 2.10.12.05 privilege escalation
2242| [38395] Universal Ircd ircu 2.10.12.03/2.10.12.04 unknown vulnerability
2243| [38394] Universal Ircd ircu 2.10.12.01/2.10.12.02/2.10.12.03/2.10.12.04 unknown vulnerability
2244| [38393] Universal Ircd ircu 2.10.12.02/2.10.12.03/2.10.12.04 denial of service
2245| [39786] ngIRCd 0.10.3 irc-channel.c denial of service
2246| [36914] ircd-ratbox 2.2.5 denial of service
2247|
2248| MITRE CVE - https://cve.mitre.org:
2249| [CVE-2013-1747] channel.c in ngIRCd 20 and 20.1 allows remote attackers to cause a denial of service (assertion failure and crash) via a KICK command for a user who is not on the associated channel.
2250| [CVE-2013-0238] The try_parse_v4_netmask function in hostmask.c in IRCD-Hybrid before 8.0.6 does not properly validate masks, which allows remote attackers to cause a denial of service (crash) via a mask that causes a negative number to be parsed.
2251| [CVE-2012-6084] modules/m_capab.c in (1) ircd-ratbox before 3.0.8 and (2) Charybdis before 3.4.2 does not properly support capability negotiation during server handshakes, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a malformed request.
2252| [CVE-2012-1836] Heap-based buffer overflow in dns.cpp in InspIRCd 2.0.5 might allow remote attackers to execute arbitrary code via a crafted DNS query that uses compression.
2253| [CVE-2010-2075] UnrealIRCd 3.2.8.1, as distributed on certain mirror sites from November 2009 through June 2010, contains an externally introduced modification (Trojan Horse) in the DEBUG3_DOLOG_SYSTEM macro, which allows remote attackers to execute arbitrary commands.
2254| [CVE-2010-0303] mystring.c in hybserv in IRCD-Hybrid (aka Hybrid2 IRC Services) 1.9.2 through 1.9.4 allows remote attackers to cause a denial of service (daemon crash) via a ":help \t" private message to the MemoServ service.
2255| [CVE-2010-0300] cache.c in ircd-ratbox before 2.2.9 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a HELP command.
2256| [CVE-2009-4893] Buffer overflow in UnrealIRCd 3.2beta11 through 3.2.8, when allow::options::noident is enabled, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
2257| [CVE-2009-4652] The (1) Conn_GetCipherInfo and (2) Conn_UsesSSL functions in src/ngircd/conn.c in ngIRCd 13 and 14, when SSL/TLS support is present and standalone mode is disabled, allow remote attackers to cause a denial of service (application crash) by sending the MOTD command from another server in the same IRC network, possibly related to an array index error.
2258| [CVE-2009-4016] Integer underflow in the clean_string function in irc_string.c in (1) IRCD-hybrid 7.2.2 and 7.2.3, (2) ircd-ratbox before 2.2.9, and (3) oftc-hybrid before 1.6.8, when flatten_links is disabled, allows remote attackers to execute arbitrary code or cause a denial of service (daemon crash) via a LINKS command.
2259| [CVE-2008-3969] Multiple unspecified vulnerabilities in BitlBee before 1.2.3 allow remote attackers to "overwrite" and "hijack" existing accounts via unknown vectors related to "inconsistent handling of the USTATUS_IDENTIFIED state." NOTE: this issue exists because of an incomplete fix for CVE-2008-3920.
2260| [CVE-2008-3920] Unspecified vulnerability in BitlBee before 1.2.2 allows remote attackers to "recreate" and "hijack" existing accounts via unspecified vectors.
2261| [CVE-2008-1925] Buffer overflow in InspIRCd before 1.1.18, when using the namesx and uhnames modules, allows remote attackers to cause a denial of service (daemon crash) via a large number of channel users with crafted nicknames, idents, and long hostnames.
2262| [CVE-2008-1501] The send_user_mode function in s_user.c in (1) Undernet ircu 2.10.12.12 and earlier, (2) snircd 1.3.4 and earlier, and unspecified other ircu derivatives allows remote attackers to cause a denial of service (daemon crash) via a malformed MODE command.
2263| [CVE-2008-0285] ngIRCd 0.10.x before 0.10.4 and 0.11.0 before 0.11.0-pre2 allows remote attackers to cause a denial of service (crash) via crafted IRC PART message, which triggers an invalid dereference.
2264| [CVE-2007-6062] irc-channel.c in ngIRCd before 0.10.3 allows remote attackers to cause a denial of service (crash) via a JOIN command without a channel argument.
2265| [CVE-2007-2786] Ratbox IRC Daemon (aka ircd-ratbox) 2.2.5 and earlier allows remote attackers to cause a denial of service (resource exhaustion) by making many requests from a single client.
2266| [CVE-2006-1214] UnrealIRCd 3.2.3 allows remote attackers to cause an unspecified denial of service by causing a linked server to send malformed TKL Q:Line commands, as demonstrated by "TKL - q\x08Q *\x08PoC."
2267| [CVE-2005-4624] The m_join function in channel.c for PTnet ircd 1.5 and 1.6 allows remote attackers to cause a denial of service (memory exhaustion that triggers a daemon restart) via a large number of requests to join a "charmed channel" such as PTnet, #PTnoticias and #*.log, which causes ircd to open the channel even though it does not have any valid users.
2268| [CVE-2005-0226] Format string vulnerability in the Log_Resolver function in log.c for ngIRCd 0.8.2 and earlier, when compiled with IDENT, logging to SYSLOG, and with DEBUG enabled, allows remote attackers to execute arbitrary code.
2269| [CVE-2005-0199] Integer underflow in the Lists_MakeMask() function in lists.c in ngIRCd before 0.8.2 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a long MODE line that causes an incorrect length calculation, which leads to a buffer overflow.
2270| [CVE-2004-0679] The IP cloaking feature (cloak.c) in UnrealIRCd 3.2, and possibly other versions, uses a weak hashing scheme to hide IP addresses, which could allow remote attackers to use brute force methods to gain other user's IP addresses.
2271| [CVE-2004-0605] Non-registered IRC users using (1) ircd-hybrid 7.0.1 and earlier, (2) ircd-ratbox 1.5.1 and earlier, or (3) ircd-ratbox 2.0rc6 and earlier do not have a rate-limit imposed, which could allow remote attackers to cause a denial of service by repeatedly making requests, which are slowly dequeued.
2272| [CVE-2003-1377] Buffer overflow in the reverse DNS lookup of Smart IRC Daemon (SIRCD) 0.4.0 and 0.4.4 allows remote attackers to execute arbitrary code via a client with a long hostname.
2273| [CVE-2003-0864] Buffer overflow in m_join in channel.c for IRCnet IRCD 2.10.x to 2.10.3p3 allows remote attackers to cause a denial of service.
2274| [CVE-2003-0478] Format string vulnerability in (1) Bahamut IRCd 1.4.35 and earlier, and other IRC daemons based on Bahamut including (2) digatech 1.2.1, (3) methane 0.1.1, (4) AndromedeIRCd 1.2.3-Release, and (5) ircd-RU, when running in debug mode, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a request containing format strings.
2275| [CVE-2002-1675] Format string vulnerability in the Cio_PrintF function of cio_main.c in Unreal IRCd 3.1.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via format string specifiers.
2276| [CVE-2000-1102] PTlink IRCD 3.5.3 and PTlink Services 1.8.1 allow remote attackers to cause a denial of service (server crash) via "mode +owgscfxeb" and "oper" commands.
2277| [CVE-1999-0255] Buffer overflow in ircd allows arbitrary command execution.
2278|
2279| SecurityFocus - https://www.securityfocus.com/bid/:
2280| [100507] UnrealIRCd CVE-2017-13649 Local Privilege Escalation Vulnerability
2281| [95935] bitlbee-libpurple CVE-2016-10188 Denial of Service Vulnerability
2282| [95932] BitlBee Incomplete Fix CVE-2017-5668 Denial of Service Vulnerability
2283| [95931] BitlBee CVE-2016-10189 Denial of Service Vulnerability
2284| [92763] UnrealIRCd CVE-2016-7144 SSL Certificate Spoofing Vulnerability
2285| [92737] Inspircd SSL Certificate Spoofing Vulnerability
2286| [89590] UnrealIRCd CVE-2002-1675 Denial-Of-Service Vulnerability
2287| [88690] Open Projects Network Ircd CVE-2001-1488 Remote Security Vulnerability
2288| [87457] Ircd CVE-2003-0478 Denial-Of-Service Vulnerability
2289| [79722] InspIRCd 'src/dns.cpp' Denial of Service Vulnerability
2290| [66320] ShadowIRCd 'm_sasl.c' Denial of Service Vulnerability
2291| [63910] UnrealIRCd Unspecified Multiple Denial of Service Vulnerabilities
2292| [62004] ngIRCd CVE-2013-5580 Multiple Denial of Service Vulnerabilities
2293| [58789] ngIRCd CVE-2013-1747 Remote Denial of Service Vulnerability
2294| [57610] IRCD-Hybrid 'try_parse_v4_netmask()' Denial of Service Vulnerability
2295| [57085] ircd-ratbox 'm_capab.c' Denial of Service Vulnerability
2296| [56492] UnrealIRCd Unspecified Denial of Service Vulnerability
2297| [52563] Bitlbee Unauthorized Access Security Bypass Vulnerability
2298| [52561] InspIRCd Heap Memory Corruption Vulnerability
2299| [42077] UnrealIRCd User Authentication Buffer Overflow Vulnerability
2300| [41336] IRCDelphi 'NICK' Parameter Denial of Service Vulnerability
2301| [40820] UnrealIRCd Backdoor Unauthorized Access Vulnerability
2302| [37979] ircd-ratbox 'HELP' Command Denial Of Service Vulnerability
2303| [37978] IRCD-Hybrid and ircd-ratbox 'LINKS' Command Remote Integer Underflow Vulnerability
2304| [37021] ngIRCd SSL/TLS Support MOTD Request Multiple Denial Of Service Vulnerabilities
2305| [31342] BitlBee Unspecified Security Bypass Variant Vulnerability
2306| [30858] BitlBee Unspecified Security Bypass Vulnerability
2307| [28506] InspIRCd Prior to 1.1.18 'namesx' 'uhnames' Modules Multiple Denial Of Service Vulnerabilities
2308| [28413] snircd And ircu 'set_user_mode' Remote Denial of Service Vulnerability
2309| [27318] ngIRCd PART Command Parsing Denial Of Service Vulnerability
2310| [26489] ngIRCd JOIN Command Parsing Denial Of Service Vulnerability
2311| [25285] Universal Ircd Server Multiple Remote Vulnerabilities
2312| [24044] IRCD RatBox Pending Connections Denial Of Service Vulnerability
2313| [17057] UnrealIRCd Remote Denial Of Service Vulnerability
2314| [16089] PTnet IRCD Remote Denial of Service Vulnerability
2315| [12434] ngIRCd Remote Format String Vulnerability
2316| [12397] ngIRCd Remote Buffer Overflow Vulnerability
2317| [10811] Unreal IRCD Multiple Vulnerabilities
2318| [10663] Unreal IRCD Cloak.C IP Address Disclosure Vulnerability
2319| [10572] Multiple ircd Socket Dequeuing Denial of Service Vulnerability
2320| [9177] NeoStats For Unreal IRCD Privilege Escalation Vulnerability
2321| [9097] SIRCD Server Operator Privilege Escalation Vulnerability
2322| [8817] IRCnet IRCD Local Buffer Overflow Vulnerability
2323| [8131] UnrealIRCD OperServ Raw Join Denial Of Service Vulnerability
2324| [8038] Bahamut IRCd Remote Format String Vulnerability
2325| [2233] EFNet ircd Channel Keys Arbitrary Serve Command Vulnerability
2326| [2086] Multiple IRCd DNS Denial of Service Vulnerability
2327| [2008] PTlink IRCD and Services Denial of Service Vulnerability
2328| [581] Ircd hybrid-6 Buffer Overflow Vulnerability
2329|
2330| IBM X-Force - https://exchange.xforce.ibmcloud.com:
2331| [83146] ngIRCd denial of service
2332| [81695] IRCD-Hybrid try_parse_v4_netmask() denial of service
2333| [80890] ircd-ratbox server denial of service
2334| [80001] UnrealIRCd unspecified denial of service
2335| [74183] Bitlbee unix.c privilege escalation
2336| [74157] InspIRCd DNS buffer overflow
2337| [70879] UnrealIRCd unrealircd.conf buffer overflow
2338| [60136] IRCDelphi NICK denial of service
2339| [59444] UnrealIRCd allow::options::noident buffer overflow
2340| [59414] UnrealIRCd DEBUG3_DOLOG_SYSTEM backdoor
2341| [55947] ircd-ratbox HELP command denial of service
2342| [55943] IRCD-Hybrid and ircd-ratbox /links code execution
2343| [54272] ngIRCd SSL/TLS denial of service
2344| [45132] BitlBee multiple unspecified security bypass
2345| [44699] BitlBee unspecified security bypass
2346| [41543] InspIRCd namesx and uhnames modules buffer overflow
2347| [41397] snircd send_user_mode() denial of service
2348| [39727] ngIRCd PART command denial of service
2349| [38562] ngIRCd JOIN command denial of service
2350| [34368] ircd-ratbox unspecified denial of service
2351| [25130] UnrealIRCd server link denial of service
2352| [23928] PTnet IRCD connection denial of service
2353| [19204] ngIRCd Log_Resolver function format string attack
2354| [19143] ngIRCd Lists_MakeMask buffer overflow
2355| [16610] Unreal IRCd information disclosure
2356| [16457] ircd-hybrid and ircd-ratbox parse_client_queued function denial of service
2357| [13974] NeoStats running on Unreal IRCd server allows elevated privileges
2358| [13799] SIRCD set usermode could allow elevated privileges
2359| [13425] IRCd JOIN command buffer overflow
2360| [13408] IRCd m_join buffer overflow
2361| [11409] SIRCD reverse DNS lookup buffer overflow
2362| [8360] Unreal IRCd format string in "
2363| [7283] Open Projects Network IRCd DNS spoofing
2364| [6193] IRCd tkserv buffer overflow
2365| [5721] DreamForge IRCd DNS denial of service
2366| [5589] PTlink IRCd modes denial of service
2367| [4826] Dalnet ircd SUMMON buffer overflow
2368| [4320] Hybrid Ircd m_invite buffer overflow could be used to gain access
2369|
2370| Exploit-DB - https://www.exploit-db.com:
2371| [27407] UnrealIRCd 3.x Remote Denial of Service Vulnerability
2372| [25070] ngIRCd 0.6/0.7/0.8 - Remote Buffer Overflow Vulnerability
2373| [24951] ircd-hybrid 8.0.5 - Denial of Service
2374| [24222] ircd-hybrid 7.0.1,ircd-ratbox 1.5.1/2.0 Socket Dequeuing Denial of Service Vulnerability
2375| [23396] SIRCD Server 0.5.2/0.5.3 Operator Privilege Escalation Vulnerability
2376| [23239] IRCnet IRCD 2.10 Local Buffer Overflow Vulnerability
2377| [22839] methane IRCd 0.1.1 - Remote Format String Vulnerability
2378| [20043] "DALnet Bahamut IRCd 4.6.5 ""SUMMON"" Buffer Overflow Vulnerability"
2379| [19459] Hybrid Ircd 5.0.3 p7 Buffer Overflow Vulnerability
2380| [18011] UnrealIRCd 3.2.8.1 - Local Configuration Stack Overflow
2381| [17181] FiSH-irssi 0.99 - Evil ircd Buffer Overflow
2382| [16922] UnrealIRCD 3.2.8.1 Backdoor Command Execution
2383| [14266] IrcDelphi Daemon Server Denial of Service
2384| [13853] Unreal IRCD 3.2.8.1 - Remote Downloader/Execute Trojan
2385| [5306] snircd <= 1.3.4 (send_user_mode) Denial of Service Vulnerability
2386| [789] ngIRCd <= 0.8.1 - Remote Denial of Service Exploit (2)
2387| [784] ngIRCd <= 0.8.2 - Remote Format String Exploit
2388|
2389| OpenVAS (Nessus) - http://www.openvas.org:
2390| [901126] UnrealIRCd Buffer Overflow Vulnerability
2391| [862144] Fedora Update for ircd-ratbox FEDORA-2010-9312
2392| [862141] Fedora Update for ircd-hybrid FEDORA-2010-9312
2393| [860911] Fedora Update for bitlbee FEDORA-2008-7274
2394| [860327] Fedora Update for bitlbee FEDORA-2008-7712
2395| [860254] Fedora Update for bitlbee FEDORA-2008-7761
2396| [860241] Fedora Update for bitlbee FEDORA-2008-7830
2397| [100856] UnrealIRCd User Authentication Buffer Overflow Vulnerability
2398| [100473] IRCD-Hybrid and ircd-ratbox 'LINKS' Command Remote Integer Underflow Vulnerability
2399| [100472] IRCD-Hybrid and ircd-ratbox 'LINKS' Command Remote Integer Underflow Vulnerability
2400| [100471] ircd-ratbox 'HELP' Command Denial Of Service Vulnerability
2401| [100347] ngIRCd SSL/TLS Support MOTD Request Multiple Denial Of Service Vulnerabilities
2402| [80111] Check for Backdoor in unrealircd
2403| [71371] FreeBSD Ports: inspircd
2404| [71312] Gentoo Security Advisory GLSA 201204-02 (InspIRCd)
2405| [71252] Debian Security Advisory DSA 2448-1 (inspircd)
2406| [69024] Gentoo Security Advisory GLSA 201006-21 (unrealircd)
2407| [66819] FreeBSD Ports: ircd-ratbox
2408| [66773] Debian Security Advisory DSA 1980-1 (ircd-hybrid/ircd-ratbox)
2409| [61680] FreeBSD Ports: bitlbee
2410| [61651] Gentoo Security Advisory GLSA 200809-14 (bitlbee)
2411| [61042] Gentoo Security Advisory GLSA 200805-08 (inspircd)
2412| [60276] Gentoo Security Advisory GLSA 200801-13 (ngircd)
2413| [57807] FreeBSD Ports: sircd
2414| [57806] FreeBSD Ports: sircd
2415| [54826] Gentoo Security Advisory GLSA 200501-40 (ngIRCd)
2416| [52190] FreeBSD Ports: ngircd
2417| [52189] FreeBSD Ports: ngircd
2418|
2419| SecurityTracker - https://www.securitytracker.com:
2420| [1019688] snircd send_user_mode() Validation Flaw Lets Remote Users Deny Service
2421| [1015425] PTnet IRCD Lets Remote Users Consume All Available Memory
2422| [1013079] ngIRCd Format String Flaw in Log_Resolver() Grants Access to Remote Users
2423| [1013047] ngIRCd Buffer Overflow in Lists_MakeMask() Lets Remote Users Deny Service
2424| [1010646] UnrealIRCd Weak IP Cloaking Mechanism Discloses IP Addresses to Remote Users
2425| [1008454] NeoStats May Give UnrealIRCd Remote Users Additional '+T' Usermode Privileges
2426| [1008279] SIRCD May Grant Operator Privileges to Remote Authenticated Users
2427| [1007950] IRCnet IRCD Buffer Overflow in JOIN Command Lets Remote Users Crash the Server
2428| [1007069] Bahamut IRCd Format String Flaw Lets Remote Users Execute Arbitrary Code
2429| [1006155] SIRCD IRC Daemon Buffer Overflow Lets Remote Users Execute Arbitrary Code
2430| [1004802] UnrealIRCd Chat Server May Let Remote Authenticated Users Crash the IRC Service
2431| [1003655] UnrealIRCd Internet Relay Chat (IRC) Server Format String Bug Lets Remote Users Crash the Chat Service
2432| [1003047] SorceryNet IRC Daemon (SorIrcd) Chat Server May Disclose User IP Addresses to Remote Users
2433|
2434| OSVDB - http://www.osvdb.org:
2435| [91836] ngIRCd channel.c KICK Command Handling Remote DoS
2436| [89623] ircd-hybrid hostmask.c:try_parse_v4_netmask() Function Malformed Input Remote DoS
2437| [88840] ircd-ratbox CAPAB Module m_capab.c Server Capability Negotiation Malformed Request Remote DoS
2438| [88838] ShadowIRCd CAPAB Module Server Capability Negotiation Malformed Request Remote DoS
2439| [87286] UnrealIRCd Unspecified Remote DoS
2440| [83430] UnrealIRCd unrealircd.conf File Handling Local Overflow
2441| [80263] InspIRCd dns.cpp ResultIsReady() Function DNS Response Parsing Remote Overflow
2442| [65474] UnrealIRCd User Authorization Remote Overflow
2443| [65445] UnrealIRCd Trojaned Distribution
2444| [62152] ircd-ratbox irc_string.c clean_string Function LINKS Command Remote Underflow
2445| [62151] IRCD-hybrid irc_string.c clean_string Function LINKS Command Remote Underflow
2446| [62150] ircd-ratbox cache.c HELP Command NULL Dereference Remote DoS
2447| [60164] Smart IRC Daemon (SIRCD) Reverse DNS Lookup Long Hostname Remote Code Execution
2448| [59975] ngIRCd src/ngircd/conn.c Multiple Function SSL / TLS Remote DoS
2449| [59299] ircd-RU IRCd DEBUGMODE Functionality Remote Format String
2450| [59251] Dalnet IRCd SERVER Message Remote Overflow
2451| [58940] cs-ircd IRCd DEBUGMODE Functionality Remote Format String
2452| [58939] AndromedeIRCd DEBUGMODE Functionality Remote Format String
2453| [58938] Methane IRCd DEBUGMODE Functionality Remote Format String
2454| [58937] Digatech IRCd DEBUGMODE Functionality Remote Format String
2455| [57067] UnrealIRCd OperServ Raw Channel Join DoS
2456| [47809] BitlBee Account Manipulation Security Bypass
2457| [43977] InspIRCd w/o m_safelist Secret Channel Disclosure
2458| [43976] InspIRCd MAXBUF Unspecified Overflow
2459| [43975] InspIRCd Stripcolor Unspecified Security Issue
2460| [43948] InspIRCd Server-to-server Malformed NICK Remote DoS
2461| [43947] InspIRCd Unspecified Temp File Symlink Issue
2462| [43946] InspIRCd Multiple Unspecified Overflows
2463| [43945] InspIRCd m_timedbans.so Unspecified Issue
2464| [43943] InspIRCd Multiple Unspecified TCP Binding Handling Issues
2465| [43942] InspIRCd IP Packet Handling Oper Flood Remote DoS
2466| [43939] InspIRCd cmd_modules Unspecified Overflow
2467| [43938] InspIRCd Installation Binary Permission Weakness
2468| [43937] InspIRCd Linking Server Password Validation Failure
2469| [43936] InspIRCd MODE / TOPIC Commands Unspecified Issue
2470| [43926] InspIRCd namesx / uhnames Modules Channel Users Handling Remote Overflow DoS
2471| [43614] Undernet snircd s_user.c send_user_mode Function Remote DoS
2472| [40337] ngIRCd Crafted PART Message Invalid Dereference Remote DoS
2473| [39295] ngIRCd irc-channel.c Null channel Argument JOIN Command Remote DoS
2474| [36238] Ratbox IRC Daemon (aka ircd-ratbox) Unspecified Remote DoS
2475| [23778] UnrealIRCd Server Link Crafted Q:lines DoS
2476| [22195] PTnet IRCd Crafted Channel Join Saturation DoS
2477| [21354] UnrealIRCd Cio_PrintF Function Format String Remote DoS
2478| [20200] OpenProjects IRCD Double-reverse DNS Lookup Failure
2479| [16565] IRCnet IRCD s_bsd.c add_local_domain() Function Overflow
2480| [14157] BitlBee http_encode Non-ascii Encoding Overflow
2481| [14156] BitlBee Jabber vCard Handling Code Format String
2482| [14155] BitlBee HTTP Proxy Support Unspecified Security Issue
2483| [14154] BitlBee Nick Handling Code Overflow
2484| [14153] BitlBee Nickname Checking Routine Overflow
2485| [14152] BitlBee Malformed Nickname Local Information Disclosure
2486| [14151] BitlBee meta.c Format String
2487| [13444] ngIRCd Log_Resolver() Format String
2488| [13300] ngIRCd Lists_MakeMask() Remote Overflow DoS
2489| [12050] IRCnet IRCD channel.c m_part() Function Overflow DoS
2490| [12049] IRCnet IRCD res.c proc_answer() Function Overflow
2491| [11813] PTlink IRCD / Services Malformed Mode DoS
2492| [11767] IRCnet IRCD res.c do_query_name() Function Overflow
2493| [11753] IRCnet IRCD m_join Local Overflow
2494| [10047] IRCnet IRCD tkserv.c Unspecified Overflow
2495| [10035] IRCnet IRCD send.c sendto_flog() Function Format String
2496| [9957] IRCnet IRCD send.c sendto_flog() Function Overflow
2497| [8413] IRCnet IRCD tkserv.c Unspecified Overflow
2498| [8234] IRCnet IRCD support.c inetpton() Function Overflow
2499| [7482] UnrealIRCd IP Cloaking Weakness Information Disclosure
2500| [3998] IRCnet IRCD s_user.c m_ison() Function Overflow
2501| [2857] SIRCD Operator Privilege Escalation
2502| [2266] IRCnet IRCD s_bsd.c summon() Function Overflow
2503| [2221] Bahamut IRCd DEBUGMODE Functionality Remote Format String
2504| [2151] IRCnet IRCD mod_socks.c socks_init() Function Overflow
2505| [1476] IRCnet IRCD s_debug.c debugbuf[] Function Overflow
2506| [1441] IRCnet IRCD res.c Unspecified Overflow
2507| [1284] IRCnet IRCD channel.c Unspecified Overflow
2508| [1247] IRCnet IRCD send.c Unspecified Overflow
2509| [830] IRCnet IRCd s_serv.c SERVER Message Remote Overflow
2510| [361] IRCnet IRCD s_service.c Unspecified Overflow
2511| [301] IRCnet IRCD res.c Unspecified Overflow
2512|_
2513Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
2514Aggressive OS guesses: Linux 2.6.32 (95%), Linux 3.1 (94%), Linux 3.2 (94%), AXIS 210A or 211 Network Camera (Linux 2.6.17) (94%), HP P2000 G3 NAS device (93%), ASUS RT-N56U WAP (Linux 3.4) (92%), Linux 3.16 (92%), Linux 2.6.32 - 3.1 (92%), Linux 2.6.39 - 3.2 (92%), Linux 3.1 - 3.2 (92%)
2515No exact OS matches for host (test conditions non-ideal).
2516Network Distance: 12 hops
2517Service Info: Host: :mail.nycpatriot.org
2518
2519TRACEROUTE (using port 6667/tcp)
2520HOP RTT ADDRESS
25211 353.48 ms 10.253.204.1
25222 330.57 ms 213.184.122.97
25233 462.65 ms bzq-82-80-246-9.cablep.bezeqint.net (82.80.246.9)
25244 462.70 ms bzq-219-189-185.dsl.bezeqint.net (62.219.189.185)
25255 462.70 ms bzq-114-65-1.cust.bezeqint.net (192.114.65.1)
25266 462.73 ms bzq-219-189-50.cablep.bezeqint.net (62.219.189.50)
25277 462.80 ms et-1-0-31.cr3-nyc3.ip4.gtt.net (89.149.140.186)
25288 462.79 ms et-1-0-31.cr3-nyc3.ip4.gtt.net (89.149.140.186)
25299 462.77 ms et-1-0-31.cr3-nyc3.ip4.gtt.net (89.149.140.186)
253010 462.82 ms 173.255.239.55
253111 462.80 ms 173.255.239.27
253212 295.60 ms mail.nycpatriot.org (192.155.88.60)
2533#######################################################################################################################################
2534Starting Nmap 7.80 ( https://nmap.org ) at 2019-11-07 11:14 EST
2535NSE: Loaded 47 scripts for scanning.
2536NSE: Script Pre-scanning.
2537Initiating NSE at 11:14
2538Completed NSE at 11:14, 0.00s elapsed
2539Initiating NSE at 11:14
2540Completed NSE at 11:14, 0.00s elapsed
2541Initiating Parallel DNS resolution of 1 host. at 11:14
2542Completed Parallel DNS resolution of 1 host. at 11:14, 0.04s elapsed
2543Initiating UDP Scan at 11:14
2544Scanning mail.nycpatriot.org (192.155.88.60) [15 ports]
2545Discovered open port 123/udp on 192.155.88.60
2546Completed UDP Scan at 11:14, 9.85s elapsed (15 total ports)
2547Initiating Service scan at 11:14
2548Scanning 2 services on mail.nycpatriot.org (192.155.88.60)
2549Completed Service scan at 11:15, 97.59s elapsed (2 services on 1 host)
2550Initiating OS detection (try #1) against mail.nycpatriot.org (192.155.88.60)
2551Retrying OS detection (try #2) against mail.nycpatriot.org (192.155.88.60)
2552Initiating Traceroute at 11:15
2553Completed Traceroute at 11:16, 7.91s elapsed
2554Initiating Parallel DNS resolution of 1 host. at 11:16
2555Completed Parallel DNS resolution of 1 host. at 11:16, 0.00s elapsed
2556NSE: Script scanning 192.155.88.60.
2557Initiating NSE at 11:16
2558Completed NSE at 11:16, 4.99s elapsed
2559Initiating NSE at 11:16
2560Completed NSE at 11:16, 2.23s elapsed
2561Nmap scan report for mail.nycpatriot.org (192.155.88.60)
2562Host is up (0.46s latency).
2563
2564PORT STATE SERVICE VERSION
256553/udp closed domain
256667/udp closed dhcps
256768/udp open|filtered dhcpc
256869/udp closed tftp
256988/udp closed kerberos-sec
2570123/udp open ntp NTP v4 (secondary server)
2571| vulscan: VulDB - https://vuldb.com:
2572| [133843] ntp Port unknown vulnerability
2573| [128043] InfoVista VistaPortal SE 5.1 EditCurrentPresentSpace.jsp Parameter cross site scripting
2574| [128042] InfoVista VistaPortal SE 5.1 EditCurrentPool.jsp Parameter cross site scripting
2575| [128036] InfoVista VistaPortal SE 5.1 EditCurrentPresentSpace.jsp Parameter cross site scripting
2576| [105145] ntp up to 4.2.8p2-RC1/4.3.11 on Big Endian MD5 Key Generator ntp-keygen.c Variable weak encryption
2577| [96331] OpenNTPD up to 6.0 CN Validator weak authentication
2578| [95322] ntpd up to 4.2.8p8 Initial Sync Calculation unknown vulnerability
2579| [89036] Microsoft Windows up to Vista SP2 Print Spooler ntprint.dll PSetupDownloadAndInstallLegacyDriver privilege escalation
2580| [89035] Microsoft Windows up to Vista SP2 Print Spooler ntprint.dll PSetupDownloadAndInstallLegacyDriver memory corruption
2581| [87754] ntpd up to 4.2.8p7 Crypto-NAK Packet valid_NAK denial of service
2582| [87751] ntpd up to 4.2.8p7 Validation ntp_proto.c receive privilege escalation
2583| [60308] UTC Fire & Security GE-MC100-NTP/GPS-ZB Hardcoded Credentials unknown vulnerability
2584| [91177] WebTitan Appliance v3.50.x NTP Server Persistent cross site scripting
2585| [3368] Microsoft Windows up to Vista NNTP Response Heap-based memory corruption
2586| [141110] Cisco NX-OS ntp Packet Flooding denial of service
2587| [139263] Polycom Obihai Obi1022 5.1.11 NTP POST Request command injection
2588| [138862] Terracotta Quartz Scheduler up to 2.3.0 XML Data XMLSchedulingDataProcessor.java initDocumentParser XML External Entity
2589| [136554] Foxit Reader SDK Professsional 5.4.0.1031 Textbox IReader_ContentProvider PDF File memory corruption
2590| [136165] Foxit Reader SDK Professsional 5.4.0.1031 TextBox IReader_ContentProvider PDF File memory corruption
2591| [135088] ntp up to 4.2.8p12 NULL Pointer Dereference denial of service
2592| [131170] D-Link DIR-825 Rev.B 2.10 ntp_sync.cgi POST Request privilege escalation
2593| [129795] NTPsec up to 1.1.2 ntpd ntp_control.c denial of service
2594| [129794] NTPsec up to 1.1.2 ntp_control.c process_control() memory corruption
2595| [129793] NTPsec up to 1.1.2 ntp_control.c read_sysvars memory corruption
2596| [129792] NTPsec up to 1.1.2 ntpd ntp_config.c Request memory corruption
2597| [128241] jco.ir Karma 6.0.0 ContentPlaceHolder1_uxTitle ArchiveNews.aspx Parameter sql injection
2598| [124080] D-Link DIR-816 A2 1.10 B05 /goform/NTPSyncWithHost handler Shell Metacharacter command injection
2599| [122955] btrfsmaintenance up to 0.4.1 evaluate_auto_mountpoint Code Execution
2600| [121557] NeoMutt Message Data nntp.c memory corruption
2601| [121556] NeoMutt newsrc.c nntp_add_group memory corruption
2602| [119727] ntp 4.2.8p11 ntpq/ntpdc Long String Stack-based memory corruption
2603| [118765] Apple iOS up to 11.3.1 FontParser memory corruption
2604| [118715] Apple watchOS up to 4.3.0 FontParser memory corruption
2605| [117884] Foxit Reader 9.0.0.29935 PrintParams memory corruption
2606| [117883] Foxit Reader 9.0.0.29935 PrintParams memory corruption
2607| [114231] ntp 4.2.8p6/4.2.8p7/4.2.8p8/4.2.8p9/4.2.8p10 Symmetric Mode decodearr memory corruption
2608| [114140] ntp up to 4.2.8p11 Protocol Engine Source IP Address denial of service
2609| [114139] ntp up to 4.2.8p11 ntpd Timestamp denial of service
2610| [114138] ntp up to 4.2.8p11 ntpd ctl_getitem Packet denial of service
2611| [114137] ntp up to 4.2.8p6/4.3.91 ntpd Sybil privilege escalation
2612| [111779] Wireshark up to 2.4.3 JSON/XML/NTP/XMPP/GDB epan/tvbparse.c denial of service
2613| [104358] ntp up to 4.2.7 ntpd ntpd/ntp_config.c denial of service
2614| [98857] Apple tvOS up to 10.1 FontParser information disclosure
2615| [98856] Apple tvOS up to 10.1 FontParser memory corruption
2616| [98855] Apple tvOS up to 10.1 FontParser memory corruption
2617| [98854] Apple tvOS up to 10.1 FontParser memory corruption
2618| [98823] Apple watchOS up to 3.1 FontParser Out-of-Bounds information disclosure
2619| [98822] Apple watchOS up to 3.1 FontParser memory corruption
2620| [98821] Apple watchOS up to 3.1 FontParser memory corruption
2621| [98820] Apple watchOS up to 3.1 FontParser memory corruption
2622| [98741] Apple iOS up to 10.2 FontParser Out-of-Bounds information disclosure
2623| [98740] Apple iOS up to 10.2 FontParser memory corruption
2624| [98739] Apple iOS up to 10.2 FontParser memory corruption
2625| [98738] Apple iOS up to 10.2 FontParser memory corruption
2626| [98630] Apple macOS up to 10.12.3 FontParser Out-of-Bounds memory corruption
2627| [98629] Apple macOS up to 10.12.3 FontParser memory corruption
2628| [98628] Apple macOS up to 10.12.3 FontParser memory corruption
2629| [98627] Apple macOS up to 10.12.3 FontParser memory corruption
2630| [98552] ntp up to 4.2.8p9 Timestamp Origin Check spoofing
2631| [98551] ntp up to 4.2.8p9 ntpq Stack-based memory corruption
2632| [98550] ntp up to 4.2.8p9 Legacy MX4200 refclock mx4200_send memory corruption
2633| [98549] ntp up to 4.2.8p9 ctl_put memory corruption
2634| [98548] ntp up to 4.2.8p9 on Windows Data Structure denial of service
2635| [98545] ntp up to 4.2.8p9 Config Directive Segmentation Fault denial of service
2636| [98543] ntp up to 4.2.8p9 Configuration Directive denial of service
2637| [97826] Joomla CMS com_frontpage sql injection
2638| [95890] Apple watchOS up to 3.1.2 FontParser memory corruption
2639| [95889] Apple watchOS up to 3.1.2 FontParser memory corruption
2640| [95334] ntpd up to 4.2.8p8 on Windows UDP Packet denial of service
2641| [95333] ntpd up to 4.2.8p8 NULL Pointer Dereference denial of service
2642| [95332] ntpd up to 4.2.8p8 Control Mode privilege escalation
2643| [95321] ntpd up to 4.2.8p8 Origin Timestamp Protection Bypass privilege escalation
2644| [95320] ntpd up to 4.2.8p8 Source denial of service
2645| [95319] ntpd up to 4.2.8p8 Broadcast Packet denial of service
2646| [95318] ntpd up to 4.2.8p8 Broadcast Mode Replay Prevention denial of service
2647| [95317] ntpd up to 4.2.8p8 Rate Limit spoofing denial of service
2648| [94382] Apple macOS up to 10.12.1 FontParser memory corruption
2649| [94381] Apple macOS up to 10.12.1 FontParser memory corruption
2650| [94255] Apple tvOS up to 10.0 FontParser memory corruption
2651| [94254] Apple tvOS up to 10.0 FontParser memory corruption
2652| [94180] Apple iOS up to 10.1.1 FontParser memory corruption
2653| [94179] Apple iOS up to 10.1.1 FontParser memory corruption
2654| [93993] BusyBox NTP Packet networking/ntpd.c recv_and_process_client_pkt denial of service
2655| [93745] ntpd up to 4.2.8p8/4.3.93 UDP Packet NULL Pointer Dereference denial of service
2656| [93087] Apple watchOS up to 3.0 FontParser User information disclosure
2657| [93076] Apple tvOS up to 10.0 FontParser Out-of-Bounds information disclosure
2658| [93064] Apple macOS 10.12.0 FontParser Out-of-Bounds information disclosure
2659| [93044] Apple iOS up to 10.0.3 FontParser Out-of-Bounds information disclosure
2660| [92853] Oracle Communications Policy Management up to 9.7.3/9.9.1/10.4.1/12.1.1 NTP denial of service
2661| [92127] Apple tvOS up to 9.x FontParser Memory information disclosure
2662| [92108] Apple watchOS up to 2.x FontParser Memory information disclosure
2663| [92076] Apple macOS up to 10.11 FontParser memory corruption
2664| [91998] Apple iOS up to 10 FontParser memory corruption
2665| [91519] Microsoft Internet Explorer 9/10/11 MSHTML HandleStyleComponentProperty memory corruption
2666| [90452] Cisco IOS 15.5(3)S3/15.6(1)S2/15.6(2)S1/15.6(2)T1 NTP Interface Queue denial of service
2667| [88542] Meinberg IMS-LANTIME up to 6.20 NTP Time Server privilege escalation
2668| [88541] Meinberg IMS-LANTIME up to 6.20 NTP Time Server POST Request Stack-Based memory corruption
2669| [88540] Meinberg IMS-LANTIME up to 6.20 NTP Time Server POST Request Stack-Based memory corruption
2670| [87753] ntpd up to 4.2.8p7 Synchronization denial of service
2671| [87752] ntpd up to 4.2.8p7 Autokey denial of service
2672| [87750] ntpd up to 4.2.8p7 MAC denial of service
2673| [82989] ntp 4.2.8 ctl_getitem denial of service
2674| [82988] ntp 4.2.8 MATCH_ASSOC denial of service
2675| [82987] ntp 4.2.8 Trusted Key denial of service
2676| [82986] ntp 4.2.8 unconfig Directive denial of service
2677| [82985] ntp 4.2.8 IPv4 Bogon Packet privilege escalation
2678| [82983] ntp 4.2.8 Ephemeral Association privilege escalation
2679| [82982] ntp 4.2.8 ntpd Client privilege escalation
2680| [82981] ntp 4.2.8 Crypto NAK denial of service
2681| [82723] Cisco IOS/IOS XE ntp Time privilege escalation
2682| [81486] Apple iOS up to 9.2 FontParser memory corruption
2683| [81435] Apple Mac OS X up to 10.11.3 FontParser memory corruption
2684| [80654] ntp 4.2.8p5 ntpq Replay privilege escalation
2685| [80653] ntp 4.2.8p5 ntpq/ntpdc information disclosure
2686| [80652] ntp 4.2.8p5 ntpq Infinite Loop denial of service
2687| [80651] ntp 4.2.8p5 Origin Timestamp privilege escalation
2688| [80650] ntp 4.2.8p5 Authenticated Broadcast Mode privilege escalation
2689| [80649] ntp 4.2.8p5 reslist Command Stack-Based denial of service
2690| [80648] ntp 4.2.8p5 ntpdc NULL Pointer Dereference denial of service
2691| [80647] ntp 4.2.8p5 ntpq privilege escalation
2692| [80645] ntp 4.2.8p5 Key Checker spoofing
2693| [80644] ntp 4.2.8p5 Broadcast privilege escalation
2694| [78936] ntpd up to 4.2.8p5/4.3.78 ntp_crypto.c privilege escalation
2695| [78938] ntpd 4.2.8 sntp denial of service
2696| [78937] ntpd 4.2.8 logconfig Command Crash denial of service
2697| [78859] ntpd 4.2.8 autokey ntp_crypto.c denial of service
2698| [78858] ntpd 4.2.8 autokey ntp_crypto.c denial of service
2699| [78857] ntpd 4.2.8 ntp_crypto.c Extension Field denial of service
2700| [78856] ntpd 4.2.8 decodenetnum denial of service
2701| [78855] ntpd 4.2.8 KoD Packet denial of service
2702| [78854] ntpd 4.2.8 Rate Limit denial of service
2703| [78853] ntpd 4.2.8 Configuration Directive directory traversal
2704| [78852] ntpd 4.2.8 CRYPTO_ASSOC information disclosure
2705| [78851] ntpd 4.2.8 Private Mode Integer denial of service
2706| [78850] ntpd 4.2.8 Password Management Key File Use-After-Free memory corruption
2707| [78849] ntpd 4.2.8 Remote Configuration denial of service
2708| [78848] ntpd 4.2.8 URL Request save_config directory traversal
2709| [78847] ntpd 4.2.8 cookedprint memory corruption
2710| [78846] ntpd 4.2.8 refclock memory corruption
2711| [78845] ntpd 4.2.8 Password Management Heap-based memory corruption
2712| [78844] ntpd 4.2.8 Crypto-NAK Packet Logic privilege escalation
2713| [78808] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
2714| [78807] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
2715| [78806] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
2716| [78805] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
2717| [78804] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
2718| [78803] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
2719| [78802] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
2720| [78801] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
2721| [78800] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
2722| [78799] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
2723| [78798] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
2724| [78797] Apple Mac OS X up to 10.11.0 FontParser Font File memory corruption
2725| [78745] Apple iOS up to 9.0 FontParser Font File memory corruption
2726| [78744] Apple iOS up to 9.0 FontParser Font File memory corruption
2727| [78743] Apple iOS up to 9.0 FontParser Font File memory corruption
2728| [78742] Apple iOS up to 9.0 FontParser Font File memory corruption
2729| [78741] Apple iOS up to 9.0 FontParser Font File memory corruption
2730| [78740] Apple iOS up to 9.0 FontParser Font File memory corruption
2731| [78739] Apple iOS up to 9.0 FontParser Font File memory corruption
2732| [78738] Apple iOS up to 9.0 FontParser Font File memory corruption
2733| [78737] Apple iOS up to 9.0 FontParser Font File memory corruption
2734| [78736] Apple iOS up to 9.0 FontParser Font File memory corruption
2735| [78735] Apple iOS up to 9.0 FontParser Font File memory corruption
2736| [78734] Apple iOS up to 9.0 FontParser Font File memory corruption
2737| [78200] ntp up to 4.2.7 on Linux/OS X ntpd ntp_io.c spoofing
2738| [78199] ntp up to 4.2.7 ntpd ntp_crypto.c memory corruption
2739| [77314] pfSense up to 2.2.2 services_ntpd.php cross site scripting
2740| [77193] Apple Mac OS X up to 10.10.4 FontParser memory corruption
2741| [77192] Apple Mac OS X up to 10.10.4 FontParser memory corruption
2742| [77191] Apple Mac OS X up to 10.10.4 FontParser memory corruption
2743| [77147] Apple iOS up to 8.4.0 FontParser memory corruption
2744| [77146] Apple iOS up to 8.4.0 FontParser memory corruption
2745| [77145] Apple iOS up to 8.4.0 FontParser memory corruption
2746| [76265] Apple Mac OS X up to 10.10.3 FontParser TrueTypeScaler Font File memory corruption
2747| [75452] Apple Watch OS 1.0 FontParser memory corruption
2748| [74740] Apple MacOS X up to 10.10.2 ntp weak authentication
2749| [74718] Apple MacOS X up to 10.10.2 FontParser memory corruption
2750| [74665] ntpd up to 4.2.8 Symmetric Mode denial of service
2751| [74664] ntpd up to 4.2.8 MAC Checker weak authentication
2752| [74290] Dell Asset Manager GetClientPackage.aspx sql injection
2753| [69165] Red Hat JBoss Enterprise Application Platform 6.3.3 RESTEasy DocumentProvider XML External Entity
2754| [68927] Apple iOS up to 8.1.2 FontParser memory corruption
2755| [68926] Apple iOS up to 8.1.2 FontParser memory corruption
2756| [68879] Apple Mac OS X 10.8.5/10.9.5/10.10/10.10.1 FontParser memory corruption
2757| [68878] Apple Mac OS X 10.8.5/10.9.5/10.10/10.10.1 FontParser memory corruption
2758| [68456] NTP Daemon up to 4.2.7 Random Generator ntp_config.c config_auth weak authentication
2759| [68641] NTP Daemon 4.2.7 PRNG Crash information disclosure
2760| [68640] NTP Daemon 4.2.7 PRNG spoofing
2761| [68457] NTP Daemon up to 4.2.7 Random Generator weak authentication
2762| [68455] NTP Daemon up to 4.2.7 ntp_proto.c receive denial of service
2763| [68454] NTP Daemon up to 4.2.7 configure memory corruption
2764| [68453] NTP Daemon up to 4.2.7 ctl_putdata memory corruption
2765| [68452] NTP Daemon up to 4.2.7 crypto_recv memory corruption
2766| [71475] wEPISDParentPortal 1.0 X.509 Certificate spoofing
2767| [67032] Cisco IOS/IOS XE 15.2/15.4 NTP Service privilege escalation
2768| [11702] NTP Project ntpd 4.2.6 monlist Functionality ntp_request.c query denial of service
2769| [65493] Dlink DSL-2760U sntpcfg.cgi cross site scripting
2770| [10540] Google Chrome 29.0.1547.76 XML Document xmldocumentparser.cpp append memory corruption
2771| [10494] Cisco IOS/IOS XE NTP denial of service
2772| [9806] TRENDnet TEW-812DRU Input Sanitizer setNTP.cgi cross site scripting
2773| [11630] Python 2.6.8/2.7.5/3.3.2 nntplib readline denial of service
2774| [60183] Instantphp lknSupport Search Module cross site scripting
2775| [59298] Instantphp Jobs Pro 1.6.4 search_jobs.html sql injection
2776| [58483] CMU Cyrus IMAP Server up to 2.4.4 nntpd.c split_wildmats memory corruption
2777| [56769] IBM WebSphere Application Server up to 6.1.0.10 getACRWorkElementPtr denial of service
2778| [5339] WebMaster Solutions WmsCms 2.0 printpage.asp Eingabe sql injection
2779| [52232] PaymentProcessorScript PPScript shop.htm sql injection
2780| [51585] TYPO3 mjseventpro 0.2.1 sql injection
2781| [4078] Sun Solaris NTP Mode 7 Request denial of service
2782| [48235] ntp up to 4.2.x ntp_crypto.c crypto_recv memory corruption
2783| [47706] ntp up to 4.2.4p7 ntpq/ntpq.c cookedprint memory corruption
2784| [45910] Goople CMS 1.8.2 frontpage.php sql injection
2785| [45837] Goople CMS up to 1.8.2 frontpage.php sql injection
2786| [45794] NTP up to 4.2.4p4 EVP_VerifyFinal memory corruption
2787| [43343] Alain Barbet Filesys Smbclientparser up to 2.6 SMB Server filesys::smbclientparser memory corruption
2788| [41522] XOOPS Tutoriais Module up to 2.1b printpage.php sql injection
2789| [40320] Agares Media phpAutoVideo 2.21 frontpage_right.php privilege escalation
2790| [40250] Agares Media Arcadem 2.04 frontpage_right.php privilege escalation
2791| [36948] Johntp adsense-deluxe 0.x on WordPress adsense-deluxe.php cross site request forgery
2792| [35867] Free Php Scripts Free Image Hosting up to 2.0 Login frontpage.php privilege escalation
2793| [34928] HP Mercury Performance Center Agent 8.0 magentproc.exe memory corruption
2794| [34504] Uberghey CMS 0.3.1 frontpage.php privilege escalation
2795| [32641] Dan Jensen Travelsized CMS up to 0.4 frontpage.php privilege escalation
2796|
2797| MITRE CVE - https://cve.mitre.org:
2798| [CVE-2013-1997] Multiple buffer overflows in X.org libX11 1.5.99.901 (1.6 RC1) and earlier allow X servers to cause a denial of service (crash) and possibly execute arbitrary code via crafted length or index values to the (1) XAllocColorCells, (2) _XkbReadGetDeviceInfoReply, (3) _XkbReadGeomShapes, (4) _XkbReadGetGeometryReply, (5) _XkbReadKeySyms, (6) _XkbReadKeyActions, (7) _XkbReadKeyBehaviors, (8) _XkbReadModifierMap, (9) _XkbReadExplicitComponents, (10) _XkbReadVirtualModMap, (11) _XkbReadGetNamesReply, (12) _XkbReadGetMapReply, (13) _XimXGetReadData, (14) XListFonts, (15) XListExtensions, and (16) XGetFontPath functions.
2799| [CVE-2013-1984] Multiple integer overflows in X.org libXi 1.7.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XGetDeviceControl, (2) XGetFeedbackControl, (3) XGetDeviceDontPropagateList, (4) XGetDeviceMotionEvents, (5) XIGetProperty, (6) XIGetSelectedEvents, (7) XGetDeviceProperties, and (8) XListInputDevices functions.
2800| [CVE-2012-4258] Multiple SQL injection vulnerabilities in MYRE Real Estate Software (2012 Q2) allow remote attackers to execute arbitrary SQL commands via the (1) link_idd parameter to 1_mobile/listings.php or (2) userid parameter to 1_mobile/agentprofile.php.
2801| [CVE-2012-3375] The epoll_ctl system call in fs/eventpoll.c in the Linux kernel before 3.2.24 does not properly handle ELOOP errors in EPOLL_CTL_ADD operations, which allows local users to cause a denial of service (file-descriptor consumption and system crash) via a crafted application that attempts to create a circular epoll dependency. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1083.
2802| [CVE-2012-1288] The UTC Fire & Security GE-MC100-NTP/GPS-ZB Master Clock device uses hardcoded credentials for an administrative account, which makes it easier for remote attackers to obtain access via an HTTP session.
2803| [CVE-2011-4859] The Schneider Electric Quantum Ethernet Module, as used in the Quantum 140NOE771* and 140CPU65* modules, the Premium TSXETY* and TSXP57* modules, the M340 BMXNOE01* and BMXP3420* modules, and the STB DIO STBNIC2212 and STBNIP2* modules, uses hardcoded passwords for the (1) AUTCSE, (2) AUT_CSE, (3) fdrusers, (4) ftpuser, (5) loader, (6) nic2212, (7) nimrohs2212, (8) nip2212, (9) noe77111_v500, (10) ntpupdate, (11) pcfactory, (12) sysdiag, (13) target, (14) test, (15) USER, and (16) webserver accounts, which makes it easier for remote attackers to obtain access via the (a) TELNET, (b) Windriver Debug, or (c) FTP port.
2804| [CVE-2011-3208] Stack-based buffer overflow in the split_wildmats function in nntpd.c in nntpd in Cyrus IMAP Server before 2.3.17 and 2.4.x before 2.4.11 allows remote attackers to execute arbitrary code via a crafted NNTP command.
2805| [CVE-2011-2724] The check_mtab function in client/mount.cifs.c in mount.cifs in smbfs in Samba 3.5.10 and earlier does not properly verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-0547.
2806| [CVE-2011-1313] Double free vulnerability in IBM WebSphere Application Server (WAS) 6.1.0.x before 6.1.0.35 and 7.x before 7.0.0.15 allows remote backend IIOP servers to cause a denial of service (S0C4 ABEND and storage corruption) by rejecting IIOP requests at opportunistic time instants, as demonstrated by requests associated with an ORB_Request::getACRWorkElementPtr function call.
2807| [CVE-2011-1082] fs/eventpoll.c in the Linux kernel before 2.6.38 places epoll file descriptors within other epoll data structures without properly checking for (1) closed loops or (2) deep chains, which allows local users to cause a denial of service (deadlock or stack memory consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.
2808| [CVE-2010-4539] The walk function in repos.c in the mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion before 1.6.15, allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger the walking of SVNParentPath collections.
2809| [CVE-2010-3879] FUSE, possibly 2.8.5 and earlier, allows local users to create mtab entries with arbitrary pathnames, and consequently unmount any filesystem, via a symlink attack on the parent directory of the mountpoint of a FUSE filesystem, a different vulnerability than CVE-2010-0789.
2810| [CVE-2010-2896] IBM FileNet Content Manager (CM) 4.0.0, 4.0.1, 4.5.0, and 4.5.1 before FP4 does not properly manage the InheritParentPermissions setting during an upgrade from 3.x, which might allow attackers to bypass intended folder permissions via unspecified vectors.
2811| [CVE-2010-2121] Opera 9.52 allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid (1) news:// or (2) nntp:// URIs.
2812| [CVE-2010-2119] Microsoft Internet Explorer 6.0.2900.2180 allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid nntp:// URIs.
2813| [CVE-2010-2117] Mozilla Firefox 3.0.19, 3.5.x, and 3.6.x allows remote attackers to cause a denial of service (resource consumption) via JavaScript code containing an infinite loop that creates IFRAME elements for invalid (1) news:// or (2) nntp:// URIs.
2814| [CVE-2010-1721] SQL injection vulnerability in the Intellectual Property (aka IProperty or com_iproperty) component 1.5.3 for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter in an agentproperties action to index.php.
2815| [CVE-2010-1708] Multiple SQL injection vulnerabilities in agentadmin.php in Free Realty allow remote attackers to execute arbitrary SQL commands via the (1) login field (aka agentname parameter) or (2) password field (aka agentpassword parameter).
2816| [CVE-2010-1078] SQL injection vulnerability in archive.php in XlentProjects SphereCMS 1.1 alpha allows remote attackers to execute arbitrary SQL commands via encoded null bytes ("%00") in the view parameter, which bypasses a protection mechanism.
2817| [CVE-2010-0790] sutil/ncpumount.c in ncpumount in ncpfs 2.2.6 produces certain detailed error messages about the results of privileged file-access attempts, which allows local users to determine the existence of arbitrary files via the mountpoint name.
2818| [CVE-2010-0789] fusermount in FUSE before 2.7.5, and 2.8.x before 2.8.2, allows local users to unmount an arbitrary FUSE filesystem share via a symlink attack on a mountpoint.
2819| [CVE-2010-0787] client/mount.cifs.c in mount.cifs in smbfs in Samba 3.0.22, 3.0.28a, 3.2.3, 3.3.2, 3.4.0, and 3.4.5 allows local users to mount a CIFS share on an arbitrary mountpoint, and gain privileges, via a symlink attack on the mountpoint directory file.
2820| [CVE-2010-0547] client/mount.cifs.c in mount.cifs in smbfs in Samba 3.4.5 and earlier does not verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string.
2821| [CVE-2010-0340] SQL injection vulnerability in the MJS Event Pro (mjseventpro) extension 0.2.1 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
2822| [CVE-2010-0296] The encode_name macro in misc/mntent_r.c in the GNU C Library (aka glibc or libc6) 2.11.1 and earlier, as used by ncpmount and mount.cifs, does not properly handle newline characters in mountpoint names, which allows local users to cause a denial of service (mtab corruption), or possibly modify mount options and gain privileges, via a crafted mount request.
2823| [CVE-2010-0293] The client logging functionality in chronyd in Chrony before 1.23.1 does not restrict the amount of memory used for storage of client information, which allows remote attackers to cause a denial of service (memory consumption) via spoofed (1) NTP or (2) cmdmon packets.
2824| [CVE-2010-0182] The XMLDocument::load function in Mozilla Firefox before 3.5.9 and 3.6.x before 3.6.2, Thunderbird before 3.0.4, and SeaMonkey before 2.0.4 does not perform the expected nsIContentPolicy checks during loading of content by XML documents, which allows attackers to bypass intended access restrictions via crafted content.
2825| [CVE-2009-4724] SQL injection vulnerability in shop.htm in PaymentProcessorScript.net PPScript allows remote attackers to execute arbitrary SQL commands via the cid parameter.
2826| [CVE-2009-3562] Cross-site scripting (XSS) vulnerability in Xerver HTTP Server 4.32 allows remote attackers to inject arbitrary web script or HTML via the currentPath parameter in a chooseDirectory action.
2827| [CVE-2009-3561] Directory traversal vulnerability in Xerver HTTP Server 4.32 allows remote attackers to read arbitrary files via a full pathname with a drive letter in the currentPath parameter in a chooseDirectory action.
2828| [CVE-2009-2869] Unspecified vulnerability in Cisco IOS 12.2XNA, 12.2XNB, 12.2XNC, 12.2XND, 12.4MD, 12.4T, 12.4XZ, and 12.4YA allows remote attackers to cause a denial of service (device reload) via a crafted NTPv4 packet, aka Bug IDs CSCsu24505 and CSCsv75948.
2829| [CVE-2009-1252] Stack-based buffer overflow in the crypto_recv function in ntp_crypto.c in ntpd in NTP before 4.2.4p7 and 4.2.5 before 4.2.5p74, when OpenSSL and autokey are enabled, allows remote attackers to execute arbitrary code via a crafted packet containing an extension field.
2830| [CVE-2009-0159] Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.
2831| [CVE-2009-0121] SQL injection vulnerability in frontpage.php in Goople CMS 1.8.2 allows remote attackers to execute arbitrary SQL commands via the password parameter. NOTE: the provenance of this information is unknown
2832| [CVE-2009-0111] SQL injection vulnerability in frontpage.php in Goople CMS 1.8.2 and earlier allows remote attackers to execute arbitrary SQL commands via the username parameter.
2833| [CVE-2009-0021] NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.
2834| [CVE-2008-6982] Cross-site scripting (XSS) vulnerability in index.php in devalcms 1.4a allows remote attackers to inject arbitrary web script or HTML via the currentpath parameter.
2835| [CVE-2008-6865] SQL injection vulnerability in modules.php in the Sectionsnew module for PHP-Nuke allows remote attackers to execute arbitrary SQL commands via the artid parameter in a printpage action.
2836| [CVE-2008-6728] SQL injection vulnerability in the Sections module in PHP-Nuke, probably before 8.0, allows remote attackers to execute arbitrary SQL commands via the artid parameter in a printpage action to modules.php.
2837| [CVE-2008-6255] Multiple SQL injection vulnerabilities in vBulletin 3.7.4 allow remote authenticated administrators to execute arbitrary SQL commands via the (1) answer parameter to admincp/verify.php, (2) extension parameter in an edit action to admincp/attachmentpermission.php, and the (3) iperm parameter to admincp/image.php.
2838| [CVE-2008-5362] The DefineConstantPool action in the ActionScript 2 virtual machine in Adobe Flash Player 10.x before 10.0.12.36 and 9.x before 9.0.151.0, and Adobe AIR before 1.5, accepts an untrusted input value for a "constant count," which allows remote attackers to read sensitive data from process memory via a crafted PDF file.
2839| [CVE-2008-5361] The ActionScript 2 virtual machine in Adobe Flash Player 10.x before 10.0.12.36 and 9.x before 9.0.151.0, and Adobe AIR before 1.5, does not verify a member element's size when performing (1) DefineConstantPool, (2) ActionJump, (3) ActionPush, (4) ActionTry, and unspecified other actions, which allows remote attackers to read sensitive data from process memory via a crafted PDF file.
2840| [CVE-2008-5066] PHP remote file inclusion vulnerability in upload/admin/frontpage_right.php in Agares Media ThemeSiteScript 1.0 allows remote attackers to execute arbitrary PHP code via a URL in the loadadminpage parameter.
2841| [CVE-2008-4253] The FlexGrid ActiveX control in Microsoft Visual Basic 6.0, Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2, Office FrontPage 2002 SP3, and Office Project 2003 SP3 does not properly handle errors during access to incorrectly initialized objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to corruption of the "system state," aka "FlexGrid Control Memory Corruption Vulnerability."
2842| [CVE-2008-4174] Multiple cross-site scripting (XSS) vulnerabilities in index.php in Dynamic MP3 Lister 2.0.1 allow remote attackers to inject arbitrary web script or HTML via the (1) currentpath, (2) invert, (3) search, and (4) sort parameters.
2843| [CVE-2008-3970] pam_mount 0.10 through 0.45, when luserconf is enabled, does not verify mountpoint and source ownership before mounting a user-defined volume, which allows local users to bypass intended access restrictions via a local mount.
2844| [CVE-2008-3285] The Filesys::SmbClientParser module 2.7 and earlier for Perl allows remote SMB servers to execute arbitrary code via a folder name containing shell metacharacters.
2845| [CVE-2008-2931] The do_change_type function in fs/namespace.c in the Linux kernel before 2.6.22 does not verify that the caller has the CAP_SYS_ADMIN capability, which allows local users to gain privileges or cause a denial of service by modifying the properties of a mountpoint.
2846| [CVE-2008-2913] Directory traversal vulnerability in func.php in Devalcms 1.4a, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the currentpath parameter, in conjunction with certain ... (triple dot) and ..... sequences in the currentfile parameter, to index.php.
2847| [CVE-2008-2751] Multiple cross-site scripting (XSS) vulnerabilities in the Glassfish webadmin interface in Sun Java System Application Server 9.1_01 allow remote attackers to inject arbitrary web script or HTML via the (1) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:jndiProp:JndiNew, (2) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:resTypeProp:resType, (3) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:factoryClassProp:factoryClass, or (4) propertyForm:propertyContentPage:propertySheet:propertSectionTextField:descProp:desc parameter to (a) resourceNode/customResourceNew.jsf
2848| [CVE-2008-2649] Multiple PHP remote file inclusion vulnerabilities in DesktopOnNet 3 Beta allow remote attackers to execute arbitrary PHP code via a URL in the app_path parameter to (1) don3_requiem.don3app/don3_requiem.php and (2) frontpage.don3app/frontpage.php.
2849| [CVE-2008-1351] SQL injection vulnerability in the Tutorials 2.1b module for XOOPS allows remote attackers to execute arbitrary SQL commands via the tid parameter to printpage.php, which is accessible directly or through a printpage action to index.php.
2850| [CVE-2008-1053] Multiple SQL injection vulnerabilities in the Kose_Yazilari module for PHP-Nuke allow remote attackers to execute arbitrary SQL commands via the artid parameter in a (1) viewarticle or (2) printpage action to modules.php.
2851| [CVE-2008-0435] Directory traversal vulnerability in index.php in OZJournals 2.1.1 allows remote attackers to read portions of arbitrary files via a .. (dot dot) in the id parameter in a printpreview action.
2852| [CVE-2008-0074] Unspecified vulnerability in Microsoft Internet Information Services (IIS) 5.0 through 7.0 allows local users to gain privileges via unknown vectors related to file change notifications in the TPRoot, NNTPFile\Root, or WWWRoot folders.
2853| [CVE-2007-6614] PHP remote file inclusion vulnerability in admin/frontpage_right.php in Agares Media phpAutoVideo 2.21 allows remote attackers to execute arbitrary PHP code via a URL in the loadadminpage parameter, a related issue to CVE-2007-6542.
2854| [CVE-2007-6542] PHP remote file inclusion vulnerability in admin/frontpage_right.php in Arcadem LE 2.04 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the loadadminpage parameter.
2855| [CVE-2007-6499] Unspecified vulnerability in Hosting Controller 6.1 Hot fix 3.3 and earlier allows remote authenticated users to uninstall the FrontPage extensions of an arbitrary account via a request to fp2002/UNINSTAL.asp with a "host id (IIS) value."
2856| [CVE-2007-6455] Multiple cross-site scripting (XSS) vulnerabilities in index.php in Mambo 4.6.2 allow remote attackers to inject arbitrary web script or HTML via the (1) Itemid parameter in a com_frontpage option and the (2) option parameter.
2857| [CVE-2007-4841] Mozilla Firefox before 2.0.0.8, Thunderbird before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to execute arbitrary commands via a (1) mailto, (2) nntp, (3) news, or (4) snews URI with invalid "%" encoding, related to improper file type handling on Windows XP with Internet Explorer 7 installed, a variant of CVE-2007-3845.
2858| [CVE-2007-4042] Multiple argument injection vulnerabilities in Netscape Navigator 9 allow remote attackers to execute arbitrary commands via a NULL byte (%00) and shell metacharacters in a (1) mailto, (2) nntp, (3) news, (4) snews, or (5) telnet URI, a similar issue to CVE-2007-3670.
2859| [CVE-2007-4041] Multiple argument injection vulnerabilities in Mozilla Firefox 2.0.0.5 and 3.0alpha allow remote attackers to execute arbitrary commands via a NULL byte (%00) and shell metacharacters in a (1) mailto, (2) nntp, (3) news, (4) snews, or (5) telnet URI, a similar issue to CVE-2007-3670.
2860| [CVE-2007-3897] Heap-based buffer overflow in Microsoft Outlook Express 6 and earlier, and Windows Mail for Vista, allows remote Network News Transfer Protocol (NNTP) servers to execute arbitrary code via long NNTP responses that trigger memory corruption.
2861| [CVE-2007-3109] The CERN Image Map Dispatcher (htimage.exe) in Microsoft FrontPage allows remote attackers to determine the existence, and possibly partial contents, of arbitrary files under the web root via a relative pathname in the PATH_INFO.
2862| [CVE-2007-1715] PHP remote file inclusion vulnerability in frontpage.php in Free Image Hosting 2.0 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the AD_BODY_TEMP parameter. NOTE: the forgot_pass.php vector is already covered by CVE-2006-5670, and the login.php vector overlaps CVE-2006-5763.
2863| [CVE-2007-1560] The clientProcessRequest() function in src/client_side.c in Squid 2.6 before 2.6.STABLE12 allows remote attackers to cause a denial of service (daemon crash) via crafted TRACE requests that trigger an assertion error.
2864| [CVE-2007-0604] Cross-site scripting (XSS) vulnerability in Movable Type (MT) before 3.34 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the MTCommentPreviewIsStatic tag, which can open the "comment entry screen," a different vulnerability than CVE-2007-0231.
2865| [CVE-2007-0446] Stack-based buffer overflow in magentproc.exe for Hewlett-Packard Mercury LoadRunner Agent 8.0 and 8.1, Performance Center Agent 8.0 and 8.1, and Monitor over Firewall 8.1 allows remote attackers to execute arbitrary code via a packet with a long server_ip_name field to TCP port 54345, which triggers the overflow in mchan.dll.
2866| [CVE-2007-0359] PHP remote file inclusion vulnerability in frontpage.php in Uberghey CMS 0.3.1 allows remote attackers to execute arbitrary PHP code via a URL in the setup_folder parameter.
2867| [CVE-2006-7160] The Sandbox.sys driver in Outpost Firewall PRO 4.0, and possibly earlier versions, does not validate arguments to hooked SSDT functions, which allows local users to cause a denial of service (crash) via invalid arguments to the (1) NtAssignProcessToJobObject,, (2) NtCreateKey, (3) NtCreateThread, (4) NtDeleteFile, (5) NtLoadDriver, (6) NtOpenProcess, (7) NtProtectVirtualMemory, (8) NtReplaceKey, (9) NtTerminateProcess, (10) NtTerminateThread, (11) NtUnloadDriver, and (12) NtWriteVirtualMemory functions.
2868| [CVE-2006-6187] Multiple SQL injection vulnerabilities in ClickTech Click Gallery allow remote attackers to execute arbitrary SQL commands via the (1) currentpage or (2) gallery_id parameter to (a) view_gallery.asp, the (3) image_id parameter to (b) download_image.asp, the currentpage or (5) orderby parameter to (c) gallery.asp, or the currentpage parameter to (d) view_recent.asp.
2869| [CVE-2006-5864] Stack-based buffer overflow in the ps_gettext function in ps.c for GNU gv 3.6.2, and possibly earlier versions, allows user-assisted attackers to execute arbitrary code via a PostScript (PS) file with certain headers that contain long comments, as demonstrated using the (1) DocumentMedia, (2) DocumentPaperSizes, and possibly (3) PageMedia and (4) PaperSize headers. NOTE: this issue can be exploited through other products that use gv such as evince.
2870| [CVE-2006-5182] PHP remote file inclusion vulnerability in frontpage.php in Dan Jensen Travelsized CMS 0.4 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the setup_folder parameter.
2871| [CVE-2006-5020] Multiple PHP remote file inclusion vulnerabilities in SolidState 0.4 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the base_path parameter in manager/pages/ scripts including (1) AccountsPage.class.php, (2) AddInvoicePage.class.php, (3) AddIPAddressPage.class.php, (4) AddPaymentPage.class.php, (5) AddTaxRulePage.class.php, (6) AssignDomainPage.class.php, (7) AssignHostingPage.class.php, (8) AssignProductPage.class.php, (9) BillingPage.class.php, (10) BillingPaymentPage.class.php, (11) BrowseAccountsPage.class.php, (12) BrowseInvoicesPage.class.php, (13) ConfigureEditUserPage.class.php, (14) ConfigureNewUserPage.class.php, (15) ConfigureNewUserReceiptPage.class.php, (16) ConfigureUsersPage.class.php, (17) DeleteAccountPage.class.php, (18) DeleteDomainServicePage.class.php, (19) DeleteHostingServicePage.class.php, (20) DeleteInvoicePage.class.php, (21) DeleteProductPage.class.php, (22) DeleteServerPage.class.php, (23) DomainServicesPage.class.php, (24) DomainsPage.class.php, (25) EditAccountPage.class.php, (26) EditDomainPage.class.php, (27) EditDomainServicePage.class.php, (28) EditHostingServicePage.class.php, (29) EditPaymentPage.class.php, (30) EditProductPage.class.php, (31) EditServerPage.class.php, (32) EmailInvoicePage.class.php, (33) ExecuteOrderPage.class.php, (34) ExpiredDomainsPage.class.php, (35) FulfilledOrdersPage.class.php, (36) GenerateInvoicesPage.class.php, (37) HomePage.class.php, (38) InactiveAccountsPage.class.php, (39) IPManagerPage.class.php, (40) LoginPage.class.php, (41) LogPage.class.php, (42) ModulesPage.class.php, (43) NewAccountPage.class.php, (44) NewDomainServicePage.class.php, (45) NewProductPage.class.php, (46) OutstandingInvoicesPage.class.php, (47) PendingAccountsPage.class.php, (48) PendingOrdersPage.class.php, (49) PrintInvoicePage.class.php, (50) ProductsPage.class.php, (51) RegisterDomainPage.class.php, (52) RegisteredDomainsPage.class.php, (53) ServersPage.class.php, (54) ServicesHostingServicesPage.class.php, (55) ServicesNewHostingPage.class.php, (56) ServicesPage.class.php, (57) ServicesWebHostingPage.class.php, (58) SettingsPage.class.php, (59) TaxesPage.class.php, (60) TransferDomainPage.class.php, (61) ViewAccountPage.class.php, (62) ViewDomainServicePage.class.php, (63) ViewHostingServicePage.class.php, (64) ViewInvoicePage.class.php, (65) ViewLogMessagePage.class.php, (66) ViewOrderPage.class.php, (67) ViewProductPage.class.php, (68) ViewServerPage.class.php, (69) WelcomeEmailPage.class.php
2872| [CVE-2006-4286] ** DISPUTED ** PHP remote file inclusion vulnerability in contentpublisher.php in the contentpublisher component (com_contentpublisher) for Mambo allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. NOTE: this issue has been disputed by third parties who state that contentpublisher.php protects against direct request in the most recent version. The original researcher is known to be frequently inaccurate.
2873| [CVE-2006-4103] PHP remote file inclusion vulnerability in article-raw.php in Jason Alexander phNNTP 1.3 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the file_newsportal parameter.
2874| [CVE-2006-4055] Multiple PHP remote file inclusion vulnerabilities in Olaf Noehring The Search Engine Project (TSEP) 0.942 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the tsep_config[absPath] parameter to (1) include/colorswitch.php, (2) contentimages.class.php, (3) ipfunctions.php, (4) configfunctions.php, (5) printpagedetails.php, or (6) log.class.php. NOTE: the copyright.php vector is already covered by CVE-2006-3993.
2875| [CVE-2006-3628] Multiple format string vulnerabilities in Wireshark (aka Ethereal) 0.10.x to 0.99.0 allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) ANSI MAP, (2) Checkpoint FW-1, (3) MQ, (4) XML, and (5) NTP dissectors.
2876| [CVE-2006-3026] Multiple cross-site scripting (XSS) vulnerabilities in ClickGallery 5.0 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) gallery_id parameter in gallery.asp and (2) parentcurrentpage parameter in view_gallery.asp.
2877| [CVE-2006-2490] Multiple cross-site scripting (XSS) vulnerabilities in Mobotix IP Network Cameras M1 1.9.4.7 and M10 2.0.5.2, and other versions before 2.2.3.18 for M10/D10 and 3.0.3.31 for M22, allow remote attackers to inject arbitrary web script or HTML via URL-encoded values in (1) the query string to help/help, (2) the get_image_info_abspath parameter to control/eventplayer, and (3) the source_ip parameter to events.tar.
2878| [CVE-2006-1662] The frontpage option in Limbo CMS 1.0.4.2 and 1.0.4.1 allows remote attackers to execute arbitrary PHP commands via the Itemid parameter in index.php.
2879| [CVE-2006-1437] UPOINT @1 Event Publisher stores sensitive information under the web document root with insufifcient access control, which allows remote attackers to read private comments via a direct request to eventpublisher.txt.
2880| [CVE-2006-1436] Multiple cross-site scripting (XSS) vulnerabilities in UPOINT @1 Event Publisher allow remote attackers to inject arbitrary web script or HTML via the (1) Event, (2) Description, (3) Time, (4) Website, and (5) Public Remarks fields to (a) eventpublisher_admin.htm and (b) eventpublisher_usersubmit.htm.
2881| [CVE-2006-0375] Advantage Century Telecommunication (ACT) P202S IP Phone 1.01.21 running firmware 1.1.21 on VxWorks uses a hardcoded Network Time Protocol (NTP) server in Taiwan, which could allow remote attackers to provide false time information, block access to time information, or conduct other attacks.
2882| [CVE-2006-0015] Cross-site scripting (XSS) vulnerability in _vti_bin/_vti_adm/fpadmdll.dll in Microsoft FrontPage Server Extensions 2002 and SharePoint Team Services allows remote attackers to inject arbitrary web script or HTML, then leverage the attack to execute arbitrary programs or create new accounts, via the (1) operation, (2) command, and (3) name parameters.
2883| [CVE-2005-4716] Hitachi TP1/Server Base and TP1/NET/Library 2 on IBM AIX allow remote attackers to (1) cause a denial of service (OpenTP1 system outage) via invalid data to a port used by a system-server process, and (2) cause a denial of service (process failure) via invalid data to a port used by any of certain other processes.
2884| [CVE-2005-3356] The mq_open system call in Linux kernel 2.6.9, in certain situations, can decrement a counter twice ("double decrement") as a result of multiple calls to the mntput function when the dentry_open function call fails, which allows local users to cause a denial of service (panic) via unspecified attack vectors.
2885| [CVE-2005-3120] Stack-based buffer overflow in the HTrjis function in Lynx 2.8.6 and earlier allows remote NNTP servers to execute arbitrary code via certain article headers containing Asian characters that cause Lynx to add extra escape (ESC) characters.
2886| [CVE-2005-2658] Buffer overflow in utility.cpp in Turquoise SuperStat (turqstat) 2.2.4 and earlier might allow remote NNTP servers to execute arbitrary code via a date with a long month.
2887| [CVE-2005-2428] Lotus Domino R5 and R6 WebMail, with "Generate HTML for all fields" enabled, stores sensitive data from names.nsf in hidden form fields, which allows remote attackers to read the HTML source to obtain sensitive information such as (1) the password hash in the HTTPPassword field, (2) the password change date in the HTTPPasswordChangeDate field, (3) the client platform in the ClntPltfrm field, (4) the client machine name in the ClntMachine field, and (5) the client Lotus Domino release in the ClntBld field, a different vulnerability than CVE-2005-2696.
2888| [CVE-2005-1363] Multiple SQL injection vulnerabilities in MetaCart 2.0 for PayFlow allow remote attackers to execute arbitrary commands via (1) intCatalogID, (2) strSubCatalogID, or (3) strSubCatalog_NAME parameter to productsByCategory.asp, (4) curCatalogID, (5) strSubCatalog_NAME, (6) intCatalogID, or (7) page parameter to productsByCategory.asp or (8) intProdID parameter to product.asp.
2889| [CVE-2005-1362] Multiple SQL injection vulnerabilities in MetaCart 2.0 for Paypal allow remote attackers to execute arbitrary SQL commands via the (1) intProdID parameter to product.asp, (2) intCatalogID or (3) strSubCatalogID parameters to productsByCategory.asp, (4) chkText, (5) strText, (6) chkPrice, (7) intPrice, (8) chkCat, or (9) strCat parameters to searchAction.asp.
2890| [CVE-2005-1361] Multiple SQL injection vulnerabilities in MetaCart e-Shop 8.0 allow remote attackers to execute arbitrary SQL commands via the (1) intProdID parameter in product.asp or (2) strCatalog_NAME parameter to productsByCategory.asp.
2891| [CVE-2005-1213] Stack-based buffer overflow in the news reader for Microsoft Outlook Express (MSOE.DLL) 5.5 SP2, 6, and 6 SP1 allows remote malicious NNTP servers to execute arbitrary code via a LIST response with a long second field.
2892| [CVE-2005-0807] Multiple buffer overflows in Cain & Abel before 2.67 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via (1) an IKE packet with a large ID field that is not properly handled by the PSK sniffer filter, (2) the HTTP sniffer filter, or the (3) POP3, (4) SMTP, (5) IMAP, (6) NNTP, or (7) TDS sniffer filters.
2893| [CVE-2005-0785] Cross-site scripting (XSS) vulnerability in usersrecentposts in YaBB 2.0 rc1 allows remote attackers to inject arbitrary web script or HTML via the username parameter.
2894| [CVE-2005-0741] Cross-site scripting (XSS) vulnerability in YaBB.pl for YaBB 2.0 RC1 allows remote attackers to inject arbitrary web script or HTML via the username parameter in a usersrecentposts action.
2895| [CVE-2005-0736] Integer overflow in sys_epoll_wait in eventpoll.c for Linux kernel 2.6 to 2.6.11 allows local users to overwrite kernel memory via a large number of events.
2896| [CVE-2005-0719] Unknown vulnerability in the systems message queue in HP Tru64 Unix 4.0F PK8 through 5.1B-2/PK4 allows local users to cause a denial of service (process crash) for processes such as nfsstat, pfstat, arp, ogated, rarpd, route, sendmail, srconfig, strsetup, trpt, netstat, and xntpd.
2897| [CVE-2005-0101] Buffer overflow in the socket_getline function in Newspost 2.1.1 and earlier allows remote malicious NNTP servers to execute arbitrary code via a long string without a newline character.
2898| [CVE-2004-2068] fetchnews in leafnode 1.9.47 and earlier allows remote attackers to cause a denial of service (process hang) via an emptry NNTP news article with missing mandatory headers.
2899| [CVE-2004-1719] Multiple cross-site scripting (XSS) vulnerabilities in Merak Webmail Server 5.2.7 allow remote attackers to inject arbitrary web script or HTML via the (1) category, (2) cserver, (3) ext, (4) global, (5) showgroups, (6) or showlite parameters to address.html, or the (7) spage or (8) autoresponder parameters to settings.html, the (9) folder parameter to readmail.html, or the (10) attachmentpage_text_error parameter to attachment.html, (11) folder, (12) ct, or (13) cv parameters to calendar.html, (14) an <img> tag, or (15) the subject of an e-mail message.
2900| [CVE-2004-1610] SalesLogix 6.1 uses client-specified pathnames for writing certain files, which might allow remote authenticated users to create arbitrary files and execute code via the (1) vMME.AttachmentPath or (2) vMME.LibraryPath variables.
2901| [CVE-2004-1316] Heap-based buffer overflow in MSG_UnEscapeSearchUrl in nsNNTPProtocol.cpp for Mozilla 1.7.3 and earlier allows remote attackers to cause a denial of service (application crash) via an NNTP URL (news:) with a trailing '\' (backslash) character, which prevents a string from being NULL terminated.
2902| [CVE-2004-0574] The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows.
2903| [CVE-2003-1266] The (1) FTP, (2) POP3, (3) SMTP, and (4) NNTP servers in EServer 2.92 through 2.97, and possibly 2.98, allow remote attackers to cause a denial of service (crash) via a large amount of data.
2904| [CVE-2003-0824] Unknown vulnerability in the SmartHTML interpreter (shtml.dll) in Microsoft FrontPage Server Extensions 2000 and 2002, and Microsoft SharePoint Team Services 2002, allows remote attackers to cause a denial of service (response failure) via a certain request.
2905| [CVE-2003-0822] Buffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request.
2906| [CVE-2003-0744] The fetchnews NNTP client in leafnode 1.9.3 to 1.9.41 allows remote attackers to cause a denial of service (process hang and termination) via certain malformed Usenet news articles that cause fetchnews to hang while waiting for input.
2907| [CVE-2002-2317] Memory leak in the (1) httpd, (2) nntpd, and (3) vpn driver in VelociRaptor 1.0 allows remote attackers to cause a denial of service (memory consumption) via an unknown method.
2908| [CVE-2002-2305] SQL injection vulnerability in agentadmin.php in Immobilier allows remote attackers to execute arbitrary SQL commands via the (1) agentname or (2) agentpassword parameter.
2909| [CVE-2002-2262] Unspecified vulnerability in xntpd of HP-UX 10.20 through 11.11 allows remote attackers to cause a denial of service (hang) via unknown attack vectors.
2910| [CVE-2002-1789] Format string vulnerability in newsx NNTP client before 1.4.8 allows local users to execute arbitrary code via format string specifiers that are not properly handled in a call to the syslog function.
2911| [CVE-2002-1788] Format string vulnerability in the nn_exitmsg function in nn 6.6.0 through 6.6.3 allows remote NNTP servers to execute arbitrary code via format strings in server responses.
2912| [CVE-2002-1718] Microsoft Internet Information Server (IIS) 5.1 may allow remote attackers to view the contents of a Frontpage Server Extension (FPSE) file, as claimed using an HTTP request for colegal.htm that contains .. (dot dot) sequences.
2913| [CVE-2002-0913] Format string vulnerability in log_doit function of Slurp NNTP client 1.1.0 allows a malicious news server to execute arbitrary code on the client via format strings in a server response.
2914| [CVE-2002-0909] Multiple buffer overflows in mnews 1.22 and earlier allow (1) a remote NNTP server to execute arbitrary code via long responses, or local users can gain privileges via long command line arguments (2) -f, (3) -n, (4) -D, (5) -M, or (6) -P, or via long environment variables (7) JNAMES or (8) MAILSERVER.
2915| [CVE-2002-0692] Buffer overflow in SmartHTML Interpreter (shtml.dll) in Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to cause a denial of service (CPU consumption) or run arbitrary code, respectively, via a certain type of web file request.
2916| [CVE-2002-0525] Format string vulnerabilities in (1) inews or (2) rnews for INN 2.2.3 and earlier allow local users and remote malicious NNTP servers to gain privileges via format string specifiers in NTTP responses.
2917| [CVE-2002-0002] Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.
2918| [CVE-2001-1204] Directory traversal vulnerability in phprocketaddin in Total PC Solutions PHP Rocket Add-in for FrontPage 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the page parameter.
2919| [CVE-2001-0764] Buffer overflow in ntping in scotty 2.1.0 allows local users to execute arbitrary code via a long hostname as a command line argument.
2920| [CVE-2001-0543] Memory leak in NNTP service in Windows NT 4.0 and Windows 2000 allows remote attackers to cause a denial of service (memory exhaustion) via a large number of malformed posts.
2921| [CVE-2001-0414] Buffer overflow in ntpd ntp daemon 4.0.99k and earlier (aka xntpd and xntp3) allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long readvar argument.
2922| [CVE-2001-0341] Buffer overflow in Microsoft Visual Studio RAD Support sub-component of FrontPage Server Extensions allows remote attackers to execute arbitrary commands via a long registration request (URL) to fp30reg.dll.
2923| [CVE-2001-0096] FrontPage Server Extensions (FPSE) in IIS 4.0 and 5.0 allows remote attackers to cause a denial of service via a malformed form, aka the "Malformed Web Form Submission" vulnerability.
2924| [CVE-2000-0438] Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter.
2925| [CVE-2000-0431] Cobalt RaQ2 and RaQ3 does not properly set the access permissions and ownership for files that are uploaded via FrontPage, which allows attackers to bypass cgiwrap and modify files.
2926| [CVE-2000-0341] ATRIUM Cassandra NNTP Server 1.10 allows remote attackers to cause a denial of service via a long login name.
2927| [CVE-2000-0256] Buffer overflows in htimage.exe and Imagemap.exe in FrontPage 97 and 98 Server Extensions allow a user to conduct activities that are not otherwise available through the web site, aka the "Server-Side Image Map Components" vulnerability.
2928| [CVE-2000-0153] FrontPage Personal Web Server (PWS) allows remote attackers to read files via a .... (dot dot) attack.
2929| [CVE-2000-0122] Frontpage Server Extensions allows remote attackers to determine the physical path of a virtual directory via a GET request to the htimage.exe CGI program.
2930| [CVE-2000-0114] Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory.
2931| [CVE-1999-1016] Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell.
2932| [CVE-1999-0681] Buffer overflow in Microsoft FrontPage Server Extensions (PWS) 3.0.2.926 on Windows 95, and possibly other versions, allows remote attackers to cause a denial of service via a long URL.
2933| [CVE-2011-3372] imap/nntpd.c in the NNTP server (nntpd) for Cyrus IMAPd 2.4.x before 2.4.12 allows remote attackers to bypass authentication by sending an AUTHINFO USER command without sending an additional AUTHINFO PASS command.
2934| [CVE-2009-3563] ntp_request.c in ntpd in NTP before 4.2.4p8, and 4.2.5, allows remote attackers to cause a denial of service (CPU and bandwidth consumption) by using MODE_PRIVATE to send a spoofed (1) request or (2) response packet that triggers a continuous exchange of MODE_PRIVATE error responses between two NTP daemons.
2935| [CVE-2006-2334] The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent attackers to create files that cannot be accessed through the expected DOS path or prevent access to other similarly named files in the same directory, which prevents those files from being detected or disinfected by certain anti-virus and anti-spyware software.
2936| [CVE-2006-1711] Plone 2.0.5, 2.1.2, and 2.5-beta1 does not restrict access to the (1) changeMemberPortrait, (2) deletePersonalPortrait, and (3) testCurrentPassword methods, which allows remote attackers to modify portraits.
2937| [CVE-2005-2496] The xntpd ntp (ntpd) daemon before 4.2.0b, when run with the -u option and using a string to specify the group, uses the group ID of the user instead of the group, which causes xntpd to run with different privileges than intended.
2938| [CVE-2005-1911] The fetchnews NNTP client in leafnode 1.11.2 and earlier can hang while waiting for input that never arrives, which allows remote NNTP servers to cause a denial of service (news loss).
2939| [CVE-2005-1453] fetchnews in leafnode 1.9.48 to 1.11.1 allows remote NNTP servers to cause a denial of service (crash) by closing the connection while fetchnews is reading (1) an article header or (2) an article body, which also prevents fetchnews from querying other servers.
2940| [CVE-2004-0657] Integer overflow in the NTP daemon (NTPd) before 4.0 causes the NTP server to return the wrong date/time offset when a client requests a date/time that is more than 34 years away from the server's time.
2941| [CVE-2002-0427] Buffer overflows in fpexec in mod_frontpage before 1.6.1 may allow attackers to gain root privileges.
2942| [CVE-2000-0710] The shtml.exe component of Microsoft FrontPage 2000 Server Extensions 1.1 allows remote attackers determine the physical path of the server components by requesting an invalid URL whose name includes a standard DOS device name.
2943| [CVE-2000-0709] The shtml.exe component of Microsoft FrontPage 2000 Server Extensions 1.1 allows remote attackers to cause a denial of service in some components by requesting a URL whose name includes a standard DOS device name.
2944| [CVE-2000-0413] The shtml.exe program in the FrontPage extensions package of IIS 4.0 and 5.0 allows remote attackers to determine the physical path of HTML, HTM, ASP, and SHTML files by requesting a file that does not exist, which generates an error message that reveals the path.
2945| [CVE-1999-1376] Buffer overflow in fpcount.exe in IIS 4.0 with FrontPage Server Extensions allows remote attackers to execute arbitrary commands.
2946| [CVE-1999-1052] Microsoft FrontPage stores form results in a default location in /_private/form_results.txt, which is world-readable and accessible in the document root, which allows remote attackers to read possibly sensitive information submitted by other users.
2947| [CVE-1999-1043] Microsoft Exchange Server 5.5 and 5.0 does not properly handle (1) malformed NNTP data, or (2) malformed SMTP data, which allows remote attackers to cause a denial of service (application error).
2948| [CVE-1999-0386] Microsoft Personal Web Server and FrontPage Personal Web Server in some Windows systems allows a remote attacker to read files on the server by using a nonstandard URL.
2949|
2950| SecurityFocus - https://www.securityfocus.com/bid/:
2951| [104517] NTP CVE-2018-12327 Stack Buffer Overflow Vulnerability
2952| [103351] NTP CVE-2018-7183 Buffer Overflow Vulnerability
2953| [103339] NTP CVE-2018-7185 Denial of Service Vulnerability
2954| [103194] NTP CVE-2018-7170 Incomplete Fix Remote Security Vulnerability
2955| [103192] NTP CVE-2018-7184 Denial of Service Vulnerability
2956| [103191] NTP CVE-2018-7182 Information Disclosure Vulnerability
2957| [97078] NTP CVE-2017-6452 Local Stack Based Buffer Overflow Vulnerability
2958| [97076] NTP CVE-2017-6459 Local Denial of Service Vulnerability
2959| [97074] NTP CVE-2017-6455 Local Denial of Service Vulnerability
2960| [97058] NTP CVE-2017-6451 Local Denial of Service Vulnerability
2961| [97052] NTP CVE-2017-6460 Stack Buffer Overflow Vulnerability
2962| [97051] NTP CVE-2017-6458 Buffer Overflow Vulnerability
2963| [97050] NTP CVE-2017-6464 Denial of Service Vulnerability
2964| [97049] NTP CVE-2017-6463 Denial of Service Vulnerability
2965| [97046] NTP CVE-2016-9042 Denial of Service Vulnerability
2966| [97045] NTP CVE-2017-6462 Local Buffer Overflow Vulnerability
2967| [94455] NTP CVE-2016-7433 Local Denial of Service Vulnerability
2968| [94454] NTP CVE-2016-7431 Denial of Service Vulnerability
2969| [94453] NTP CVE-2016-7429 Local Denial of Service Vulnerability
2970| [94452] NTP CVE-2016-9310 Denial of Service Vulnerability
2971| [94451] NTP CVE-2016-7426 Local Denial of Service Vulnerability
2972| [94450] NTP CVE-2016-9312 Denial of Service Vulnerability
2973| [94448] NTP CVE-2016-7434 Local Denial of Service Vulnerability
2974| [94447] NTP CVE-2016-7427 Denial of Service Vulnerability
2975| [94446] NTP CVE-2016-7428 Denial of Service Vulnerability
2976| [94444] NTP CVE-2016-9311 NULL Pointer Dereference Denial of Service Vulnerability
2977| [92277] BusyBox 'networking/ntpd.c' Remote Denial of Service Vulnerability
2978| [91400] Meinberg NTP Time Server Multiple Privilege Escalation and Buffer Overflow Vulnerabilities
2979| [91180] Foxit Reader 'CPDF_StreamContentParser::~CPDF_StreamContentParser' Memory Corruption Vulnerability
2980| [91010] NTP CVE-2016-4953 Denial of Service Vulnerability
2981| [91009] NTP CVE-2016-4956 Incomplete Fix Denial of Service Vulnerability
2982| [91007] NTP CVE-2016-4955 Denial of Service Vulnerability
2983| [90818] OpenNTPD 'ntpd/constraint.c' Certificate Validation Security Bypass Vulnerability
2984| [88276] NTP CVE-2016-1547 Denial of Service Vulnerability
2985| [88264] NTP CVE-2016-1548 Security Bypass Vulnerability
2986| [88261] NTP CVE-2016-1550 Local Security Bypass Vulnerability
2987| [88226] NTP CVE-2016-2518 Denial of Service Vulnerability
2988| [88219] NTP CVE-2016-1551 Remote Security Vulnerability
2989| [88204] NTP CVE-2016-2519 Denial of Service Vulnerability
2990| [88200] NTP CVE-2016-1549 Remote Security Vulnerability
2991| [88189] NTP CVE-2016-2517 Denial of Service Vulnerability
2992| [88180] NTP CVE-2016-2516 Denial of Service Vulnerability
2993| [88081] Microsoft FrontPage CVE-1999-1052 Information Disclosure Vulnerability
2994| [86089] Microsoft FrontPage CVE-2007-3109 Remote Security Vulnerability
2995| [83193] NTP CVE-2004-0657 Remote Security Vulnerability
2996| [82105] NTP CVE-2015-8139 Security Bypass Vulnerability
2997| [82102] NTP CVE-2015-8140 Security Bypass Vulnerability
2998| [81963] NTP CVE-2015-7973 Security Bypass Vulnerability
2999| [81962] NTP CVE-2015-7978 Denial of Service Vulnerability
3000| [81960] NTP CVE-2015-7974 Symmetric Key Encryption Authentication Security Bypass Vulnerability
3001| [81959] NTP CVE-2015-7975 Local Denial of Service Vulnerability
3002| [81816] NTP CVE-2015-7979 Denial of Service Vulnerability
3003| [81815] NTP CVE-2015-7977 NULL Pointer Dereference Denial of Service Vulnerability
3004| [81814] NTP CVE-2015-8158 Denial of Service Vulnerability
3005| [81811] NTP CVE-2015-8138 Denial of Service Vulnerability
3006| [81552] NTP Cronjob Script CVE-2016-0727 Local Privilege Escalation Vulnerability
3007| [77288] Network Time Protocol 'ntpq.c' Memory Corruption Vulnerability
3008| [77286] NTP CVE-2015-7702 Incomplete Fix Denial of Service Vulnerability
3009| [77285] NTP CVE-2015-7692 Incomplete Fix Denial of Service Vulnerability
3010| [77282] Network Time Protocol 'ntp_control.c' Directory Traversal Vulnerability
3011| [77281] NTP CVE-2015-7701 Denial of Service Vulnerability
3012| [77278] NTP Multiple Arbitrary File Overwrite Vulnerabilities
3013| [77274] NTP CVE-2015-7691 Incomplete Fix Denial of Service Vulnerability
3014| [76476] RETIRED: NTP CVE-2015-5196 Multiple Arbitrary File Overwrite Vulnerabilities
3015| [76475] NTP CVE-2015-5194 Denial of Service Vulnerability
3016| [76474] NTP 'ntpd/ntp_config.c' Remote Denial of Service Vulnerability
3017| [76473] NTP CVE-2015-5219 Denial of Service Vulnerability
3018| [75589] NTP CVE-2015-5146 Denial of Service Vulnerability
3019| [73951] NTP CVE-2015-1798 Man in the Middle Security Bypass Vulnerability
3020| [73950] NTP CVE-2015-1799 Denial of Service Vulnerability
3021| [73713] Mjseventpro CVE-2010-0340 SQL-Injection Vulnerability
3022| [72584] NTP 'ntp_io.c' Authentication Security Bypass Vulnerability
3023| [72583] NTP 'ntp_crypto.c' Information Disclosure Vulnerability
3024| [71969] Network Time Protocol ntpdc Local Buffer Overflow Vulnerability
3025| [65434] Apache Subversion 'mod_dav_svn' Module SVNListParentPath Denial of Service Vulnerability
3026| [64692] NTP 'ntp_request.c' Remote Denial of Service Vulnerability
3027| [62185] Microsoft FrontPage CVE-2013-3137 Information Disclosure Vulnerability
3028| [55561] IFOBS 'regclientprint.jsp' Multiple HTML Injection Vulnerabilities
3029| [54283] Linux Kernel 'fs/eventpoll.c' Local Denial of Service Vulnerability
3030| [52083] UTC Fire & Security GE-MC100-NTP/GPS-ZB Default Credentials Authentication Bypass Vulnerability
3031| [46630] Linux Kernel epoll Subsystem 'eventpoll.c' Multiple Local Denial of Service Vulnerabilities
3032| [45792] HP LoadRunner 'magentproc.exe' Remote Code Execution Vulnerability
3033| [41798] IBM FileNet Content Manager 'InheritParentPermissions' Flag Security Bypass Vulnerability
3034| [39479] Mozilla Firefox/Thunderbird/SeaMonkey 'nsIContentPolicy' Security Bypass Vulnerability
3035| [38309] XlentProjects SphereCMS 'archive.php' SQL Injection Vulnerability
3036| [37781] TYPO3 MJS Event Pro (mjseventpro) Unspecified SQL Injection Vulnerability
3037| [37255] NTP mode 7 MODE_PRIVATE Packet Remote Denial of Service Vulnerability
3038| [36502] Cisco IOS NTPv4 Reply Packet Remote Denial of Service Vulnerability
3039| [36457] Xerver Administration Interface 'currentPath' Parameter Cross Site Scripting Vulnerability
3040| [35017] NTP 'ntpd' Autokey Stack Buffer Overflow Vulnerability
3041| [34481] NTP 'ntpq' Stack Buffer Overflow Vulnerability
3042| [33290] TimeTools NTP Time Server Syslog Monitor Remote Denial of Service Vulnerability
3043| [33135] Goople CMS 'frontpage.php' SQL Injection Vulnerability
3044| [32352] vBulletin 'admincp/attachmentpermission.php' SQL Injection Vulnerability
3045| [31959] Agares Media ThemeSiteScript 'frontpage_right.php' Remote File Include Vulnerability
3046| [30290] SmbClientParser Perl Module Remote Command Execution Vulnerability
3047| [28297] Travelsized CMS 'frontpage.php' and 'index.php' Multiple Input Validation Vulnerabilities
3048| [28230] XOOPS MyTutorials Module 'printpage.php' SQL Injection Vulnerability
3049| [27375] OZ Journals 'printpreview' Local File Disclosure Vulnerability
3050| [26986] Arcadem LE 'frontpage_right.php' Remote File Include Vulnerability
3051| [25908] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability
3052| [22223] Hitachi OpenTP1 Unspecified Remote Denial of Service Vulnerability
3053| [22098] Uberghey Frontpage.PHP Remote File Include Vulnerability
3054| [20321] Travelsized CMS Frontpage.PHP Remote File Include Vulnerability
3055| [20044] Limbo CMS Frontpage Arbitrary File Upload Vulnerability
3056| [19423] phNNTP File_newsportal Remote File Include Vulnerability
3057| [17452] Microsoft FrontPage Server Extensions Cross-Site Scripting Vulnerability
3058| [16902] Limbo CMS Frontpage Arbitrary PHP Command Execution Vulnerability
3059| [15117] Lynx NNTP Article Header Buffer Overflow Vulnerability
3060| [15093] Hitachi OpenTP1 Denial Of Service Vulnerability
3061| [14673] NTPD Insecure Privileges Vulnerability
3062| [13951] Microsoft Outlook Express NNTP Response Parsing Buffer Overflow Vulnerability
3063| [13376] MetaCart E-Shop V-8 IntProdID Parameter Remote SQL Injection Vulnerability
3064| [12756] YaBB Remote UsersRecentPosts Cross-Site Scripting Vulnerability
3065| [12141] Microsoft FrontPage 2000 Internet Publishing Service Provider DAV File Upload Vulnerability
3066| [11412] Microsoft Frontpage Asycpict.DLL JPEG Handling Remote Denial of Service Vulnerabilities
3067| [11379] Microsoft NNTP Component Heap Overflow Vulnerability
3068| [9008] Microsoft FrontPage Server Extensions SmartHTML Interpreter Denial Of Service Vulnerability
3069| [9007] Microsoft FrontPage Server Extensions Remote Debug Buffer Overrun Vulnerability
3070| [6522] EType EServ NNTP Remote Denial Of Service Vulnerability
3071| [6356] HP-UX xntpd Unspecified Denial Of Service Vulnerability
3072| [5804] Microsoft FrontPage Server Extensions SmartHTML Buffer Overflow Vulnerability
3073| [5240] NewsX NNTP SysLog Format String Vulnerability
3074| [5160] Kim Storm NN NNTP Error Message Format String Vulnerability
3075| [4251] Improved mod_frontpage Buffer Overflow Vulnerability
3076| [4084] Microsoft IIS 5.1 Frontpage Server Extensions File Source Disclosure Vulnerability
3077| [4078] Microsoft IIS 5.1 Frontpage Extensions Path Disclosure Information Vulnerability
3078| [3751] Total PC Solutions PHP Rocket Add-in for FrontPage Directory Traversal Vulnerability
3079| [3183] Microsoft Windows NNTP Denial of Service Vulnerability
3080| [2911] Juergen Schoenwaelder scotty ntping Buffer Overflow Vulnerability
3081| [2540] Ntpd Remote Buffer Overflow Vulnerability
3082| [1608] Microsoft FrontPage Server Extensions MS-DOS Device Name Denial Of Service Vulnerability
3083| [1594] Microsoft FrontPage/IIS Cross Site Scripting shtml.dll Vulnerability
3084| [1435] Microsoft FrontPage 2000 Server Extensions Denial Of Service Vulnerability
3085| [1205] Microsoft FrontPage Extensions .pwd File Permissions Vulnerability
3086| [1174] Microsoft Frontpage Server Extensions Path Disclosure Vulnerability
3087| [1156] Cassandra NNTPServer v1.10 Buffer Overflow Vulnerability
3088| [1141] MS Frontpage htimage.exe File Existence Disclosure Vulnerability
3089| [1117] MS Frontpage Image Mapper Buffer Overflow Vulnerability
3090| [1109] MS IIS FrontPage 98 Extensions Buffer Overflow Vulnerability
3091| [1108] MS IIS FrontPage 98 Extensions Filename Obfuscation Vulnerability
3092| [989] Microsoft FrontPage PWS Directory Traversal Vulnerability
3093| [964] MS Frontpage htimage.exe Path Leak Vulnerability
3094| [568] Microsoft FrontPage PWS DoS Vulnerability
3095| [74045] NTP 'ntp-keygen.c' Predictable Random Number Generator Weakness
3096| [71762] NTP 'ntp-keygen.c' Predictable Random Number Generator Weakness
3097| [71757] NTP 'ntp_config.c' Insufficient Entropy Security Weakness
3098| [10980] Microsoft NTP Time Synchronization Spoof Weakness
3099|
3100| IBM X-Force - https://exchange.xforce.ibmcloud.com:
3101| [82317] ownCloud viewer.php and addMountPoint.php cross-site scripting
3102| [52238] Microsoft FrontPage Server Extensions Vital Information Leakage
3103| [36554] Wireshark NTP dissector format string vulnerable Windows version detected
3104| [6730] Microsoft FrontPage Server Extensions Visual Studio RAD Support sub-component buffer overflow
3105| [86041] TRENDnet TEW-812DRU uapply.cgi and setNTP.cgi cross-site request forgery
3106| [82084] IB-NAS5220 and IB-NAS4220-B ntp_name parameter cross-site scripting
3107| [78636] IFOBS regclientprint.jsp cross-site scripting
3108| [76340] MYRE Real Estate Mobile listings.php and agentprofile.php SQL injection
3109| [75403] MYRE Real Estate Mobile listings.php and agentprofile.php SQL injection
3110| [73583] Moodle frontpage security bypass
3111| [70325] Cyrus IMAPd NNTP security bypass
3112| [66589] Linux Kernel eventpoll.c denial of service
3113| [66034] Linux NTP buffer overflow
3114| [65872] Linux Kernel eventpoll.c denial of service
3115| [62765] Plesk Small Business Manager currentPageId SQL injection
3116| [60481] IBM FileNet Content Manager InheritParentPermissions security bypass
3117| [59090] Opera news:// and nntp:// URI denial of service
3118| [59088] Microsoft Internet Explorer nntp:// URIs denial of service
3119| [59086] Mozilla Firefox news:// and nntp:// URI denial of service
3120| [58364] HP LoadRunner Agent magentproc.exe code execution
3121| [57822] Magneto Software SntpGetReply buffer overflow
3122| [54650] NTP mode7 (MODE_PRIVATE) denial of service
3123| [53675] XLink Omni-NFS Enterprise ntpd.exe buffer overflow
3124| [53663] Xerver currentPath directory traversal
3125| [53662] Xerver currentPath cross-site scripting
3126| [53455] Cisco IOS NTPv4 denial of service
3127| [52468] TGS Content Management index.php and frontpage_ception.php SQL injection
3128| [52237] Microsoft FrontPage Server Extensions To Do List Found
3129| [52236] Microsoft FrontPage Server Extensions Machine Name Disclosure
3130| [52235] Microsoft FrontPage Configuration Information Leakage
3131| [52234] Microsoft FrontPage '_vti_cnf' Information Leakage
3132| [50617] NTP ntpd buffer overflow
3133| [50258] Drupal frontpage forms information disclosure
3134| [49838] NTP cookedprint() buffer overflow
3135| [48023] Windows NTP Time Server Syslog Monitor syslog message denial of service
3136| [47773] Goople CMS frontpage.php SQL injection
3137| [47244] Adobe AIR and Adobe Flash Player DefineConstantPool information disclosure
3138| [46174] ThemeSiteScript frontpage_right.php file include
3139| [44940] devalcms currentpath parameter cross-site scripting
3140| [43910] Filesys::SmbClientParser directory command execution
3141| [43418] Avaya Messaging Storage Server date, time and NTP server command execution
3142| [41538] Perlbal ClientProxy.pm denial of service
3143| [41181] tutorials module for XOOPS printpage.php and index.php SQL injection
3144| [40129] Leafnode fetchnews NNTP client denial of service
3145| [39414] WordPress XMLRPC metaWeblog.getRecentPosts function informaiton disclosure
3146| [39266] phpAutoVideo frontpage_right.php file include
3147| [39228] Arcadem LE frontpage_right.php file include
3148| [36811] Microsoft Outlook Express and Windows Mail NNTP response code execution
3149| [34720] Microsoft FrontPage Personal Web Server CERN Image Map Dispatcher buffer overflow
3150| [34719] Microsoft FrontPage CERN Image Map Dispatcher information disclosure
3151| [33124] Squid clientProcessRequest() function denial of service
3152| [32247] RHSA-2006:0393 updates for ntp not installed
3153| [32076] Microsoft Frontpage Extensions directory /_vti_pvt/ present
3154| [31553] Uberghey CMS frontpage.php file include
3155| [29337] Travelsized CMS frontpage.php file include
3156| [28271] phNNTP article-raw.php file include
3157| [27828] Wireshark (Ethereal) NTP dissector format string
3158| [25965] @1 Event Publisher eventpublisher.txt information disclosure
3159| [25537] Microsoft FrontPage Server Extensions HTML cross-site scripting
3160| [22748] Hitachi OpenTP1 denial of service
3161| [22035] NTP incorrect group permissions
3162| [21537] Microsoft FrontPage style tag denial of service
3163| [20830] Microsoft Outlook Express NNTP Response Parsing buffer overflow
3164| [20283] MetaCart e-Shop intProdID and intCatalogID parameters SQL injection
3165| [19186] newsfetch NNTP responses buffer overflow
3166| [18711] Mozilla NNTP buffer overflow
3167| [17739] Microsoft FrontPage and Internet Explorer asycpict.dll JPEG denial of service
3168| [17641] Microsoft Windows NNTP buffer overflow
3169| [15406] NTP integer buffer overflow
3170| [13680] Microsoft FrontPage Server Extensions SmartHTML Interpreter denial of service
3171| [13674] Microsoft FrontPage Server Extensions debug buffer overflow
3172| [11873] Microsoft Internet Explorer, Outlook, and FrontPage shlwapi.dll library denial of service
3173| [10942] Leafnode NNTP server denial of service
3174| [10836] HP-UX xntpd denial of service
3175| [10195] Microsoft FrontPage Server Extensions (FPSE) 2002 SmartHTML Interpreter buffer overflow
3176| [10194] Microsoft FrontPage Server Extensions (FPSE) 2000 SmartHTML Interpreter denial of service
3177| [9583] newsx NNTP client syslog() local format string
3178| [9491] nn NNTP error message format string
3179| [9270] slurp NNTP client syslog() format string
3180| [9226] mnews NNTP response remote buffer overflow
3181| [8800] Microsoft IIS FrontPage Server Extensions and ASP.NET ISAPI filter error handling denial of service
3182| [8733] SNTP time broadcast audit
3183| [8517] NNTP port probe
3184| [8513] SNTP malformed packet
3185| [8411] NTP servers from which the router obtains time are set
3186| [8410] NTP server is enabled on the router
3187| [8400] Apache HTTP Server mod_frontpage buffer overflows
3188| [8362] Microsoft FrontPage form_results.txt is world readable
3189| [7951] Shell metacharacters in NNTP fields
3190| [7795] Microsoft FrontPage Server Extensions (FPSE) "
3191| [7788] Microsoft FrontPage Server Extensions (FPSE) "
3192| [7749] PHP Rocket Add-in for FrontPage "
3193| [7710] NNTP Subject
3194| [6977] Microsoft Windows NT and 2000 NNTP memory leak denial of service
3195| [6735] Scotty ntping buffer overflow could allow the execution of arbitrary code
3196| [6321] Ntpd server readvar control message buffer overflow
3197| [5494] Microsoft FrontPage 98 Server Extensions fpcount.exe CGI can be remotely crashed
3198| [5124] Microsoft FrontPage Server Extensions device name denial of service
3199| [4899] Microsoft FrontPage Extensions shtml.dll multiple access denial of service
3200| [4484] Microsoft FrontPage Server Extensions image mapping components allow remote code execution
3201| [4439] Microsoft FrontPage Server Extensions"
3202| [4410] CASSANDRA NNTP server buffer overflow
3203| [4333] Microsoft FrontPage 98 Server Extensions DVWSSR.DLL file buffer overflow
3204| [4268] Microsoft FrontPage 98 Server Extensions DVWSSR.DLL file could allow remote ASP source retrieval
3205| [3393] Microsoft FrontPage Extensions authors.pwd file could reveal encrypted passwords
3206| [3391] Microsoft FrontPage Extensions service.pwd file could reveal encrypted passwords
3207| [3178] Exchange NNTP server unauthenticated command
3208| [3174] Exchange NNTP server dropped connection
3209| [3117] Microsoft FrontPage long URL buffer overflow
3210| [1223] Microsoft Exchange Server SMTP and NNTP denial of service
3211| [908] Microsoft FrontPage extensions under Unix create world readable password files
3212| [670] NNTP username
3213| [669] NNTP password
3214| [668] NNTP group
3215| [561] Microsoft FrontPage 1.1 allows users to write to executable directories
3216| [438] NNTP daemon
3217| [89] NNTP reading
3218| [88] NNTP posting
3219|
3220| Exploit-DB - https://www.exploit-db.com:
3221| [27620] Microsoft FrontPage Server Extensions Cross-Site Scripting Vulnerability
3222| [25536] MetaCart E-Shop V-8 IntProdID Parameter Remote SQL Injection Vulnerability
3223| [25199] YaBB 2.0 - Remote UsersRecentPosts Cross-Site Scripting Vulnerability
3224| [22124] EType EServ 1.9x NNTP Remote Denial of Service Vulnerability
3225| [20960] Juergen Schoenwaelder scotty 2.1.x ntping Buffer Overflow Vulnerability
3226| [20727] Ntpd Remote Buffer Overflow Vulnerability
3227| [19897] FrontPage 2000,IIS 4.0/5.0 Server Extensions Path Disclosure Vulnerability
3228| [19884] Atrium Software Cassandra NNTP Server 1.10 Buffer Overflow Vulnerability
3229| [19846] MS FrontPage 98 Server Extensions for IIS,MS InterDev 1.0 - Buffer Overflow Vulnerability
3230| [19445] Microsoft FrontPage Personal WebServer 1.0 PWS DoS Vulnerability
3231| [16960] Linux NTP query client 4.2.6p1 - Heap Overflow Vulnerability
3232| [5245] XOOPS Module tutorials (printpage.php) SQL Injection Vulnerability
3233| [3147] Uberghey 0.3.1 (frontpage.php) Remote File Include Vulnerability
3234| [2148] phNNTP <= 1.3 (article-raw.php) Remote File Include Vulnerability
3235| [28809] HP LoadRunner magentproc.exe Overflow
3236| [27894] obotix IP Camera M1 1.9.4 .7/M10 2.0.5 .2 eventplayer get_image_info_abspath Parameter XSS
3237| [24379] Merak Mail Server 7.4.5 attachment.html attachmentpage_text_error Parameter XSS
3238| [19877] FrontPage 98/Personal WebServer 1.0,Personal Web Server 2.0 htimage.exe File Existence Disclosure
3239| [19853] FrontPage 97/98 Server Image Mapper Buffer Overflow
3240| [19845] MS FrontPage 98 Server Extensions for IIS,MS InterDev 1.0 Filename Obfuscation
3241| [19753] ms frontpage personal webserver 1.0/personal web server 4.0 - Directory Traversal
3242| [19605] Linux Kernel fs/eventpoll.c Local Denial of Service
3243| [16379] Microsoft Outlook Express NNTP Response Parsing Buffer Overflow
3244| [16356] Microsoft IIS ISAPI FrontPage fp30reg.dll Chunked Overflow
3245| [16285] NTP daemon readvar Buffer Overflow
3246| [15838] OpenClassifieds 1.7.0.3 Chained: Captcha Bypass->SQLi->Persistent XSS on Frontpage
3247| [12204] MagnetoSoft SNTP 4.0.0.7 - ActiveX SntpSendRequest Crash PoC
3248| [12203] MagnetoSoft SNTP 4.0.0.7 - ActiveX SntpGetReply BOF
3249| [9940] ntpd 4.0.99j-k readvar Buffer Overflow
3250| [7683] Goople <= 1.8.2 (frontpage.php) Blind SQL Injection Exploit
3251| [2471] Travelsized CMS <= 0.4 (frontpage.php) Remote File Include Exploit
3252| [1066] MS Outlook Express NNTP Buffer Overflow Exploit (MS05-030)
3253| [578] MS Windows NNTP Service (XPAT) Denial of Service Exploit (MS04-036)
3254| [121] MS Frontpage Server Extensions fp30reg.dll Exploit (MS03-051)
3255|
3256| OpenVAS (Nessus) - http://www.openvas.org:
3257| [902839] Microsoft FrontPage Server Extensions MS-DOS Device Name DoS Vulnerability
3258| [900652] NTP 'ntpd' Autokey Stack Overflow Vulnerability
3259| [900623] NTP Stack Buffer Overflow Vulnerability
3260| [801713] Microsoft Outlook Express And Windows Mail NNTP Protocol Heap Buffer Overflow Vulnerability (941202)
3261| [800408] NTP EVP_VerifyFinal() Security Bypass Vulnerability
3262| [800407] NTP Version Detection (Linux)
3263| [100399] NTP mode 7 MODE_PRIVATE Packet Remote Denial of Service Vulnerability
3264| [56769] FreeBSD Ports: frontpage -- cross site scripting vulnerability
3265| [10884] NTP read variables
3266| [880846] CentOS Update for ntp CESA-2009:1648 centos4 i386
3267| [880814] CentOS Update for ntp CESA-2009:0046 centos5 i386
3268| [880810] CentOS Update for ntp CESA-2009:1648 centos5 i386
3269| [880762] CentOS Update for ntp CESA-2009:1039 centos5 i386
3270| [880690] CentOS Update for ntp CESA-2009:1651 centos3 i386
3271| [855775] Solaris Update for usr/sbin/ntpq 141396-01
3272| [855676] Solaris Update for ntpq 141911-01
3273| [855649] Solaris Update for ntpq 141910-01
3274| [855628] Solaris Update for usr/sbin/ntpq 141397-01
3275| [855247] Solaris Update for /usr/lib/inet/xntpd and /usr/sbin/ntpdate 109668-07
3276| [855010] Solaris Update for /usr/lib/inet/xntpd and /usr/sbin/ntpdate 109667-07
3277| [835252] HP-UX Update for XNTP HPSBUX02639
3278| [835204] HP-UX Update for XNTP HPSBUX02437
3279| [835161] HP-UX Update for xntpd HPSBUX00232
3280| [835070] HP-UX Update for xntpd(1M) HPSBUX00148
3281| [100608] Windows NT NNTP Component Buffer Overflow
3282| [66662] FreeBSD Security Advisory (FreeBSD-SA-10:02.ntpd.asc)
3283| [66639] Gentoo Security Advisory GLSA 201001-01 (ntp)
3284| [66527] CentOS Security Advisory CESA-2009:1648 (ntp)
3285| [66526] CentOS Security Advisory CESA-2009:1651 (ntp)
3286| [66519] Slackware Advisory SSA:2009-343-01 ntp
3287| [66515] Debian Security Advisory DSA 1948-1 (ntp)
3288| [66511] Fedora Core 10 FEDORA-2009-13121 (ntp)
3289| [66507] Fedora Core 11 FEDORA-2009-13090 (ntp)
3290| [66501] Fedora Core 12 FEDORA-2009-13046 (ntp)
3291| [66368] Mandriva Security Advisory MDVSA-2009:309 (ntp)
3292| [65948] SLES10: Security update for xntp
3293| [65773] SLES10: Security update for xntp
3294| [65666] SLES11: Security update for ntp
3295| [65606] SLES9: Security update for xntp
3296| [65578] SLES9: Security update for xntp
3297| [65238] SLES9: Security update for xntp, xntp-doc
3298| [64225] Fedora Core 11 FEDORA-2009-5674 (ntp)
3299| [64207] FreeBSD Security Advisory (FreeBSD-SA-09:11.ntpd.asc)
3300| [64146] Ubuntu USN-777-1 (ntp)
3301| [64128] Mandrake Security Advisory MDVSA-2009:117 (ntp)
3302| [64116] Slackware Advisory SSA:2009-154-01 ntp
3303| [64114] Gentoo Security Advisory GLSA 200905-08 (ntp)
3304| [64098] Fedora Core 9 FEDORA-2009-5275 (ntp)
3305| [64095] Fedora Core 10 FEDORA-2009-5273 (ntp)
3306| [64050] CentOS Security Advisory CESA-2009:1039 (ntp)
3307| [64046] FreeBSD Ports: ntp
3308| [64032] Debian Security Advisory DSA 1801-1 (ntp)
3309| [63770] Mandrake Security Advisory MDVSA-2009:092 (ntp)
3310| [63743] Gentoo Security Advisory GLSA 200904-05 (ntp)
3311| [63343] CentOS Security Advisory CESA-2009:0046 (ntp)
3312| [63267] Fedora Core 10 FEDORA-2009-0544 (ntp)
3313| [63266] Fedora Core 9 FEDORA-2009-0547 (ntp)
3314| [63242] FreeBSD Security Advisory (FreeBSD-SA-09:03.ntpd.asc)
3315| [63230] Slackware Advisory SSA:2009-014-03 ntp
3316| [63194] Mandrake Security Advisory MDVSA-2009:007 (ntp)
3317| [63163] Ubuntu USN-705-1 (ntp)
3318| [63149] Debian Security Advisory DSA 1702-1 (ntp)
3319| [55233] Debian Security Advisory DSA 801-1 (ntp)
3320| [53863] Debian Security Advisory DSA 045-1 (ntp)
3321| [52235] mozilla -- heap overflow in NNTP handler
3322| [17229] NNTP password overflow
3323| [17228] NNTP message headers overflow
3324| [14773] Identifies services like FTP, SMTP, NNTP...
3325| [10699] IIS FrontPage DoS II
3326| [10585] IIS FrontPage DoS
3327|
3328| SecurityTracker - https://www.securitytracker.com:
3329| [1021533] NTP Signature Validation Flaw Lets Remote Users Bypass Validation Checks
3330| [1015896] Microsoft FrontPage Server Extensions Input Validation Holes Permit Cross-Site Scripting Attacks
3331| [1013420] YaBB Input Validation Error in 'usersrecentposts' Lets Remote Users Conduct Cross-Site Scripting Attacks
3332| [1011762] cPanel Backup and FrontPage Management Bugs Let Remote Authenticated Users View, Edit, and Own Arbitrary Files
3333| [1001816] Microsoft Visual Studio RAD Support Component of FrontPage Lets Remote Users Execute Arbitrary Code on the FrontPage Server
3334| [1026143] Cyrus IMAP Server NNTP Service Lets Remote Users Bypass Authentication
3335| [1026031] Cyrus IMAP Server Buffer Overflow in NNTP Daemon Lets Remote Users Execute Arbitrary Code
3336| [1024934] Subversion SVNParentPath Collection Processing Error Lets Remote Users Execute Arbitrary Code
3337| [1023298] NTP Mode 7 Packet Processing Flaw Lets Remote Users Deny Service
3338| [1022930] Cisco IOS H.323, SIP, NTP, Tunneling, and Encrypted Packet Processing Flaws Let Remote Users Deny Service
3339| [1022243] ntp crypto_recv() Autokey Stack Overflow Lets Remote Users Execute Arbitrary Code
3340| [1022033] ntp Buffer Overflow in ntpq cookedprint() Lets Remote Users Execute Arbitrary Code
3341| [1018786] Microsoft Outlook Express Bug in Processing NNTP Responses Lets Remote Users Execute Arbitrary Code
3342| [1018785] Windows Mail Bug in Parsing NNTP Responses Lets Remote Users Execute Arbitrary Code
3343| [1016679] xntpd '-u' Switch May Cause the Daemon to Run With Incorrect Group Privileges
3344| [1016668] phNNTP Include File Flaw in 'file_newsportal' Parameter Lets Remote Users Execute Arbitrary Code
3345| [1015065] Lynx Buffer Overflow in HTrjis() in Processing NNTP Headers Lets Remote Users Execute Arbitrary Code
3346| [1014200] Microsoft Outlook Express Buffer Overflow in NNTP Response Parser Lets Remote Users Execute Arbitrary Code
3347| [1012726] Mozilla Buffer Overflow in Processing NNTP URLs Lets Remote Users Execute Arbitrary Code
3348| [1011631] Microsoft NNTP Buffer Overflow Lets Remote Users Execute Arbitrary Code With SYSTEM Privileges
3349| [1011250] Microsoft FrontPage Buffer Overflow in WordPerfect Converter Lets Remote Users Execute Arbitrary Code
3350| [1009336] Network Time Protocol (NTP) Server Integer Overflow May Return the Incorrect Time
3351| [1008147] Microsoft FrontPage Server Extensions Buffer Overflow May Let Remote Users Execute Arbitrary Code
3352| [1005865] Leafnode NNTP News Server Lets Remote Users Deny Service
3353| [1005786] Xntpd Time Daemon on HP-UX May Crash or Degrade
3354| [1005287] Microsoft FrontPage Server Extensions SmartHTML Interpreter Bugs May Let Remote Users Execute Arbitrary Code with System Privileges
3355| [1004266] Cisco BTS 10200 Softswitch Underlying Operating System Contains Network Time Daemon (NTP) Buffer Overflow That May Allow a Remote User to Crash the Device or Execute Arbitrary Code
3356| [1004265] Cisco IP Manager Underlying Operating System Contains Network Time Daemon (NTP) Buffer Overflow That May Allow a Remote User to Crash the Device or Execute Arbitrary Code
3357| [1004264] Cisco Media Gateway Controller (MGC) Product Line Underlying Operating System Contains Network Time Daemon (NTP) Buffer Overflow That May Allow a Remote User to Crash the Device
3358| [1004244] Cisco IOS Systems Contain Network Time Daemon (NTP) Buffer Overflow That May Allow a Remote User to Crash the Device
3359| [1003767] 'mod_frontpage' Module for Apache Web Server Has Buffer Overlow in 'fpexec.c' That Allows Remote Users to Execute Arbitrary Code on the System with Root Privileges
3360| [1003071] PHP Rocket Add-in for FrontPage Discloses Files on the Server to Remote Users
3361| [1002197] Microsoft Windows NNTP Network News Service Has a Memory Leak That Allows Remote Users to Cause the Server to Crash
3362| [1001770] Scotty Tcl Interpreter's ntping Utility Lets Local Users Obtain Root Privileges
3363| [1001237] The Network Time Protocol Daemon (ntpd) Allows Remote Users to Execute Arbitrary Code on the Server - Typically to Gain Root Privileges on the Server
3364|
3365| OSVDB - http://www.osvdb.org:
3366| [52917] Adobe Flash Player ActionScript 2 VM DefineConstantPool Action Crafted PDF File Handling Memory Disclosure
3367| [37179] Free Image Hosting frontpage.php AD_BODY_TEMP Variable Remote
3368| [31138] SolidState ViewAccountPage.class.php base_path Parameter Remote File Inclusion
3369| [30764] ClickGallery view_recent.asp currentpage Parameter SQL Injection
3370| [26417] ClickGallery view_gallery.asp parentcurrentpage Parameter XSS
3371| [3383] Microsoft FrontPage Server Extensions imagemap.exe File Verification
3372| [805] NTP ntpd readvar Variable Remote Overflow
3373| [577] FrontPage Server Extensions Visual Studio RAD Support Overflow
3374| [95804] TRENDnet TEW-812DRU setNTP.cgi Multiple Field Command Injection
3375| [93712] Zavio IP Cameras /opt/cgi/view/param sub_C8C8 Function General.Time.NTP.Server Parameter Remote Command Execution
3376| [92877] Vivotek PT7135 IP Camera farseer.out system.ntp Parameter Remote Command Execution
3377| [91972] GNOME Evolution-Data-Server NNTP Encryption Option Failure Remote Credential Disclosure
3378| [91630] Rosewill RSVA11001 NTP Host Manipulation Remote Command Execution
3379| [91145] Microsoft IE removeChild CHtmlComponentProperty Object Handling Use-after-free Arbitrary Code Execution
3380| [90495] ownCloud /apps/files_external/addMountPoint.php mountpoint Parameter XSS
3381| [90267] Evolution NNTP STARTTLS Encryption Regression Remote Cleartext Credential Disclosure
3382| [90219] Raidsonic Multiple Product /cgi/time/time.cgi ntp_name Parameter XSS
3383| [85705] iFOBS ifobsClient/regclientprint.jsp Multiple Parameter XSS
3384| [83687] Linux Kernel fs/eventpoll.c Local DoS
3385| [83643] Knews Multilingual Newsletters Plugin for WordPress wp-content/plugins/knews/wysiwyg/fontpicker/index.php ff Parameter XSS
3386| [81824] MYRE Real Estate Mobile 1_mobile/agentprofile.php userid Parameter SQL Injection
3387| [81644] WebKit XMLDocumentParser::exitText Function XML Parsing Use-after-free Issue
3388| [78467] WebTitan NTP Server (Display) Module Unspecified XSS
3389| [77996] Contentpapst admin.php Multiple Parameter XSS
3390| [77872] Parallels Plesk Small Business Panel Site Editor (SiteBuilder) Feature /Wizard/Edit/Html currentPageId Parameter SQL Injection
3391| [76829] Calibre calibre-mount-helper Utility Arbitrary Directory / Mountpoint Manipulation
3392| [76338] WebKit XMLDocumentParser::insertErrorMessageBlock Use-after-free Issue
3393| [76336] WebKit XMLDocumentParser::endElementNs / XMLDocumentParser::parseEndElement Use-after-free Issue
3394| [76057] Cyrus IMAP Server NNTP AUTHINFO USER Command Parsing Authentication Bypass Arbitrary Command Execution
3395| [75307] Cyrus IMAP Server map/nntpd.c split_wildmats() Function NNTP Command Parsing Remote Overflow
3396| [73053] Linux Kernel fs/eventpoll.c epoll Data Structure File Descriptor Local DoS
3397| [70332] Apache Subversion Apache HTTP Server mod_dav_svn repos.c walk FunctionSVNParentPath Collection Remote DoS
3398| [69870] Lantern CMS 11-login.asp intPassedLocationID Parameter XSS
3399| [66859] Adobe Reader / Acrobat CoolType.dll maxp Table maxComponentPoints Field Font Handling Overflow
3400| [66448] IBM FileNet Content Manager InheritParentPermissions Security Inheritance Weakness
3401| [66268] InstantPhp Jobs Component for Joomla! index.php detailed_results Parameter SQL Injection
3402| [65465] WMS-CMS printpage.asp Multiple Parameter SQL Injection
3403| [65111] Opera Invalid news / nntp URI IFRAME Element Handling Remote DoS
3404| [65110] Microsoft IE Invalid news / nntp URI IFRAME Element Handling Remote DoS
3405| [65109] Mozilla Firefox Invalid news / nntp URI IFRAME Element Handling Remote DoS
3406| [64437] HP Mercury LoadRunner Agent magentproc.exe Remote Arbitrary Code Execution
3407| [63620] Mozilla Multiple Products XMLDocument::load Function nsIContentPolicy Check Restriction Bypass
3408| [63472] Apple Safari on Mac OS X libFontParser.dylib TType1ParsingContext::SpecialEncoding() Function Arbitrary Code Execution (PWN2OWN)
3409| [62909] ncpfs ncpumount sutil/ncpumount.c Mountpoint Name Local File Disclosure
3410| [60847] NTP ntpd Mode 7 Request Crafted Packet Reply Loop Remote DoS
3411| [60827] e107 e107_admin/frontpage.php Unspecified Parameter XSS
3412| [60349] Etype EServ NNTP Service Large Request Remote DoS
3413| [60142] HP-UX xntpd Unspecified Remote DoS
3414| [58758] Apache River GrantPermission Policy Manipulation Privilege Escalation
3415| [58645] Xerver HTTP Server chooseDirectory Action currentPath Parameter XSS
3416| [58644] Xerver HTTP Server chooseDirectory Action currentPath Parameter Traversal Arbitrary File Access
3417| [58342] Cisco IOS Network Time Protocol (NTP) Crafted Packet Remote DoS
3418| [57478] TGS Content Management cms/frontpage_ception.ph Multiple Parameter SQL Injection
3419| [56015] NTP on Windows SO_EXCLUSIVEADDRUSE Unspecified Issue
3420| [56014] NTP EVP_VerifyFinal() Check Unspecified Issue
3421| [54576] NTP ntpd/ntp_crypto.c crypto_recv() Function Remote Overflow
3422| [54294] eFront studentpage.php / professorpage.php File Upload Arbitrary Code Execution
3423| [53593] NTP ntpq/ntpq.c cookedprint() Function Remote Overflow
3424| [51244] Goople CMS frontpage.php Multiple Parameter SQL Injection
3425| [50015] Easyedit CMS news.php intPageID Parameter SQL Injection
3426| [50014] Easyedit CMS page.php intPageID Parameter SQL Injection
3427| [49921] vBulletin admincp/attachmentpermission.php extension Parameter SQL Injection
3428| [49856] ThemeSiteScript upload/admin/frontpage_right.php loadadminpage Parameter Remote File Inclusion
3429| [47971] DevalCMS index.php currentpath Parameter XSS
3430| [47502] Perl Filesys::SmbClientParser Folder Name Arbitrary Shell Command Injection
3431| [47001] Linux Kernel fs/namespace.c do_change_type Function Mountpoint Manipulation Local Privilege Escalation
3432| [46124] DesktopOnNet frontpage.don3app/frontpage.php app_path Parameter Remote File Inclusion
3433| [45449] ACT P202S IP Phone Hardcoded NTP Server IP Time Subversion
3434| [43913] Perlbal lib/Perlbal/ClientProxy.pm Chunked Upload File Upload Handling Overflow DoS
3435| [42913] Hosting Controller UNINSTAL.asp Crafted Host Header Arbitrary Site Frontpage Extension Manipulation
3436| [42876] Tutorials Module for XOOPS printpage.php tid Parameter SQL Injection
3437| [42058] Microsoft FrontPage CERN Image Map Dispatcher (htimage.exe) Arbitrary File Information Disclosure
3438| [39802] Arcadem LE frontpage_right.php loadadminpage Parameter Remote File Inclusion
3439| [39617] phpAutoVideo admin/frontpage_right.php loadadminpage Parameter Remote File Inclusion
3440| [37631] Microsoft Windows Malformed NNTP Response Remote Memory Corruption
3441| [34367] Squid src/client_side.c clientProcessRequest() function TRACE Request DoS
3442| [33553] Uberghey CMS frontpage.php setup_folder Parameter Remote File Inclusion
3443| [32987] Movable Type MTCommentPreviewIsStatic Tag XSS
3444| [32962] Hitachi OpenTP1 Invalid Data DoS
3445| [31200] SolidState DeleteAccountPage.class.php base_path Parameter Remote File Inclusion
3446| [31193] SolidState BillingPaymentPage.class.php base_path Parameter Remote File Inclusion
3447| [31187] SolidState AddPaymentPage.class.php base_path Parameter Remote File Inclusion
3448| [31119] SolidState NewAccountPage.class.php base_path Parameter Remote File Inclusion
3449| [31104] SolidState EditAccountPage.class.php base_path Parameter Remote File Inclusion
3450| [31103] SolidState EditPaymentPage.class.php base_path Parameter Remote File Inclusion
3451| [30763] ClickGallery gallery.asp currentpage Parameter SQL Injection
3452| [29490] Travelsized CMS frontpage.php setup_folder Parameter Remote File Inclusion
3453| [29098] TSEP printpagedetails.php tsep_config[absPath] Parameter Remote File Inclusion
3454| [28355] Joomla! Frontpage Content Submission Unspecified Injection
3455| [28260] Microsoft IIS FrontPage Server Extensions (FPSE) shtml.exe Path Disclosure
3456| [28093] contentpublisher for Mambo contentpublisher.php mosConfig_absolute_path Parameter Remote File Inclusion
3457| [27856] phNNTP article-raw.php file_newsportal Parameter Remote File Inclusion
3458| [27369] Wireshark NTP Dissector Format String Flaw
3459| [25761] Microsoft Windows NTDLL.DLL RtlDosPathNameToNtPathName_U API Path Conversion Weakness
3460| [25623] Mobotix IP Network Camera eventplayer get_image_info_abspath Parameter XSS
3461| [24674] Mozilla Multiple Products XPCWrappedNativeScope::SystemIsBeingShutDown compareDocumentPosition Handling Memory Corruption
3462| [24518] Microsoft FrontPage Server Extensions fpadmdll.dll Multiple Parameter XSS
3463| [24237] @1 Event Publisher eventpublisher.txt Direct Request Private Comment Disclosure
3464| [24236] @1 Event Publisher eventpublisher_usersubmit.htm Multiple Parameter XSS
3465| [24235] @1 Event Publisher eventpublisher_admin.htm Multiple Parameter XSS
3466| [22822] Linux Kernel mq_open System Call mntput Function Local DoS
3467| [21038] FUSE fusermount Crafted Mountpoint mtab Corruption DoS
3468| [20143] lmtp2nntp l2_spec() Function Format String
3469| [20142] lmtp2nntp lib_cfg Function Unspecified Issue
3470| [20019] Lynx NNTP HTrjis() Function Remote Overflow
3471| [19428] IBM Lotus Domino CitiPayPro.nsf SubPaymentProcessingFS Src Parameter XSS
3472| [19419] Turquoise SuperStat Date Parser Crafted NNTP Server Response Overflow
3473| [19055] NTP ntpd -u Group Permission Weakness
3474| [17306] Microsoft Outlook Express NNTP LIST Command Remote Overflow
3475| [15975] NTP ntpd Date/Time Request Remote Overflow
3476| [15870] MetaCart product.asp intProdID Parameter SQL Injection
3477| [15596] Oracle Collaboration Suite Email Server Unspecified NNTP DoS
3478| [14827] YaBB2 YaBB.pl usersrecentposts Action username Parameter XSS
3479| [14456] Slurp NNTP Client log_doit Function Format String
3480| [14410] mod_frontpage for Apache HTTP Server fpexec Remote Overflow
3481| [13353] newsfetch NNTP Response Handling Overflow DoS
3482| [12637] Mozilla nsNNTPProtocol.cpp NNTP news:// URI Handling Overflow DoS
3483| [10962] cPanel Frontpage _private Symlink Arbitrary File Permission Modification
3484| [10961] cPanel Frontpage .htaccess Hardlink Arbitrary File Owernship Modification
3485| [10895] Microsoft FrontPage asycpict.dll JPEG Processing DoS
3486| [10697] Microsoft Windows/Exchange NNTP Component Remote Overflow
3487| [10246] Microsoft Exchange Server Malformed NNTP AUTHINFO DoS
3488| [9040] IceWarp WebMail attachment.html attachmentpage_text_error Parameter XSS
3489| [4345] Mnews NNTP Response Remote Overflow
3490| [3968] Microsoft FrontPage Personal Web Server Arbitrary File Access
3491| [3501] Microsoft FrontPage form_results Information Disclosure
3492| [3386] Microsoft FrontPage Server Extensions htimage.exe File Existence Enumeration
3493| [3385] Microsoft FrontPage Server Extensions htimage.exe Remote Path Disclosure
3494| [3384] Microsoft FrontPage htimage.exe Overflow
3495| [3382] Microsoft FrontPage Server Extensions imagemap.exe Remote Path Disclosure
3496| [3381] Microsoft FrontPage imagemap.exe Overflow
3497| [3300] Microsoft FrontPage shtml MS-DOS Device Name DoS
3498| [2952] Microsoft FrontPage Server Extensions (fp30reg.dll) Debug Function Chunked Encoded Request Remote Overflow
3499| [2800] Microsoft FrontPage Server Extensions SmartHTML DoS
3500| [2306] Microsoft FrontPage Server Extensions SmartHTML Interpreter shtml.dll DoS
3501| [1928] Microsoft Windows NNTP Malformed Post DoS
3502| [1879] scotty ntping Hostname Handling Local Overflow
3503| [1304] ATRIUM Cassandra NNTP Server Login Name Remote Overflow
3504| [1135] Microsoft Windows NT Print Spooler Service (spoolss.exe) AddPrintProvider() Function Alternate Print Provider Arbitrary Command Execution
3505| [1032] Microsoft FrontPage PWS GET Request Handling Remote DoS
3506| [694] PHP Rocket for FrontPage phprocketaddin page Parameter Traversal Arbitrary File Access
3507| [482] Microsoft IIS FrontPage Server Extensions (FPSE) Malformed Form DoS
3508| [396] Microsoft FrontPage shtml.exe MS-DOS Device Name Request DoS
3509| [307] Microsoft FrontPage 2000 Server Extensions shtml.exe Path Disclosure
3510| [282] Microsoft FrontPage dvwssr.dll Backdoor and Overflow
3511| [68] Microsoft FrontPage Extensions .pwd File Permissions
3512| [67] Microsoft FrontPage Extension shtml.dll Anonymous Account Information Disclosure
3513|_
3514137/udp filtered netbios-ns
3515138/udp filtered netbios-dgm
3516139/udp closed netbios-ssn
3517161/udp closed snmp
3518162/udp closed snmptrap
3519389/udp closed ldap
3520500/udp closed isakmp
3521520/udp closed route
35222049/udp closed nfs
3523Too many fingerprints match this host to give specific OS details
3524Network Distance: 12 hops
3525
3526TRACEROUTE (using port 138/udp)
3527HOP RTT ADDRESS
35281 ... 6
35297 577.08 ms 10.253.204.1
35308 577.07 ms 10.253.204.1
35319 577.06 ms 10.253.204.1
353210 577.05 ms 10.253.204.1
353311 577.05 ms 10.253.204.1
353412 577.04 ms 10.253.204.1
353513 ... 14
353615 112.57 ms 10.253.204.1
353716 244.44 ms 10.253.204.1
353817 ... 22
353923 231.32 ms 10.253.204.1
354024 195.14 ms 10.253.204.1
354125 1020.22 ms 10.253.204.1
354226 153.93 ms 10.253.204.1
354327 ... 29
354430 184.67 ms 10.253.204.1
3545
3546NSE: Script Post-scanning.
3547Initiating NSE at 11:16
3548Completed NSE at 11:16, 0.00s elapsed
3549Initiating NSE at 11:16
3550Completed NSE at 11:16, 0.00s elapsed
3551#######################################################################################################################################
3552Hosts
3553=====
3554
3555address mac name os_name os_flavor os_sp purpose info comments
3556------- --- ---- ------- --------- ----- ------- ---- --------
3557192.155.88.60 mail.nycpatriot.org Unknown device
3558
3559Services
3560========
3561
3562host port proto name state info
3563---- ---- ----- ---- ----- ----
3564192.155.88.60 53 udp domain closed
3565192.155.88.60 67 udp dhcps closed
3566192.155.88.60 68 udp dhcpc unknown
3567192.155.88.60 69 udp tftp closed
3568192.155.88.60 88 udp kerberos-sec closed
3569192.155.88.60 123 udp ntp open NTP v4 secondary server
3570192.155.88.60 137 udp netbios-ns filtered
3571192.155.88.60 138 udp netbios-dgm filtered
3572192.155.88.60 139 udp netbios-ssn closed
3573192.155.88.60 161 udp snmp closed
3574192.155.88.60 162 udp snmptrap closed
3575192.155.88.60 389 udp ldap closed
3576192.155.88.60 500 udp isakmp closed
3577192.155.88.60 520 udp route closed
3578192.155.88.60 2049 udp nfs closed
3579#######################################################################################################################################
3580[+] URL: http://www.njoathkeepers.org/
3581[+] Started: Thu Nov 7 09:16:38 2019
3582
3583Interesting Finding(s):
3584
3585[+] http://www.njoathkeepers.org/
3586 | Interesting Entry: Server: nginx/1.14.2
3587 | Found By: Headers (Passive Detection)
3588 | Confidence: 100%
3589
3590[+] http://www.njoathkeepers.org/robots.txt
3591 | Found By: Robots Txt (Aggressive Detection)
3592 | Confidence: 100%
3593
3594[+] http://www.njoathkeepers.org/xmlrpc.php
3595 | Found By: Link Tag (Passive Detection)
3596 | Confidence: 100%
3597 | Confirmed By: Direct Access (Aggressive Detection), 100% confidence
3598 | References:
3599 | - http://codex.wordpress.org/XML-RPC_Pingback_API
3600 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
3601 | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
3602 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
3603 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
3604
3605[+] http://www.njoathkeepers.org/readme.html
3606 | Found By: Direct Access (Aggressive Detection)
3607 | Confidence: 100%
3608
3609[+] http://www.njoathkeepers.org/wp-cron.php
3610 | Found By: Direct Access (Aggressive Detection)
3611 | Confidence: 60%
3612 | References:
3613 | - https://www.iplocation.net/defend-wordpress-from-ddos
3614 | - https://github.com/wpscanteam/wpscan/issues/1299
3615
3616[+] WordPress version 4.9.12 identified (Latest, released on 2019-10-14).
3617 | Detected By: Rss Generator (Passive Detection)
3618 | - http://www.njoathkeepers.org/feed/, <generator>https://wordpress.org/?v=4.9.12</generator>
3619 | - http://www.njoathkeepers.org/comments/feed/, <generator>https://wordpress.org/?v=4.9.12</generator>
3620
3621[+] WordPress theme in use: njoathkeepers
3622 | Location: http://www.njoathkeepers.org/wp-content/themes/njoathkeepers/
3623 | Readme: http://www.njoathkeepers.org/wp-content/themes/njoathkeepers/readme.txt
3624 | Style URL: http://www.njoathkeepers.org/wp-content/themes/njoathkeepers/style.css?ver=4.9.12
3625 | Style Name: njoathkeepers
3626 | Style URI: http://www.dizzain.com/blog/freebies/free-wordpress-theme-drochilli/
3627 | Description: Minimalistic darken WordPress theme with two columns, left-sidebar, fluid width and widget-ready....
3628 | Author: Dizzain Inc.
3629 | Author URI: http://www.dizzain.com/
3630 |
3631 | Detected By: Css Style (Passive Detection)
3632 |
3633 | Version: 3.0 (80% confidence)
3634 | Detected By: Style (Passive Detection)
3635 | - http://www.njoathkeepers.org/wp-content/themes/njoathkeepers/style.css?ver=4.9.12, Match: 'Version: 3.0'
3636
3637[+] Enumerating All Plugins (via Passive Methods)
3638[+] Checking Plugin Versions (via Passive and Aggressive Methods)
3639
3640[i] Plugin(s) Identified:
3641
3642[+] all-in-one-event-calendar
3643 | Location: http://www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/
3644 | Last Updated: 2019-09-30T17:09:00.000Z
3645 | [!] The version is out of date, the latest version is 2.5.44
3646 |
3647 | Detected By: Urls In Homepage (Passive Detection)
3648 |
3649 | Version: 2.5.38 (100% confidence)
3650 | Detected By: Query Parameter (Passive Detection)
3651 | - http://www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/public/themes-ai1ec/vortex/css/ai1ec_parsed_css.css?ver=2.5.38
3652 | Confirmed By:
3653 | Readme - Stable Tag (Aggressive Detection)
3654 | - http://www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/readme.txt
3655 | Translation File (Aggressive Detection)
3656 | - http://www.njoathkeepers.org/wp-content/plugins/all-in-one-event-calendar/language/all-in-one-event-calendar.po, Match: 'n: All-in-One Event Calendar by Time.ly 2.5.38'
3657
3658[+] contact-form-7
3659 | Location: http://www.njoathkeepers.org/wp-content/plugins/contact-form-7/
3660 | Last Updated: 2019-08-04T16:33:00.000Z
3661 | [!] The version is out of date, the latest version is 5.1.4
3662 |
3663 | Detected By: Urls In Homepage (Passive Detection)
3664 |
3665 | Version: 5.1.1 (100% confidence)
3666 | Detected By: Query Parameter (Passive Detection)
3667 | - http://www.njoathkeepers.org/wp-content/plugins/contact-form-7/includes/css/styles.css?ver=5.1.1
3668 | - http://www.njoathkeepers.org/wp-content/plugins/contact-form-7/includes/js/scripts.js?ver=5.1.1
3669 | Confirmed By:
3670 | Readme - Stable Tag (Aggressive Detection)
3671 | - http://www.njoathkeepers.org/wp-content/plugins/contact-form-7/readme.txt
3672 | Readme - ChangeLog Section (Aggressive Detection)
3673 | - http://www.njoathkeepers.org/wp-content/plugins/contact-form-7/readme.txt
3674
3675[+] email-subscribers
3676 | Location: http://www.njoathkeepers.org/wp-content/plugins/email-subscribers/
3677 | Last Updated: 2019-10-23T10:41:00.000Z
3678 | [!] The version is out of date, the latest version is 4.2.4
3679 |
3680 | Detected By: Urls In Homepage (Passive Detection)
3681 |
3682 | Version: 4.0.13 (100% confidence)
3683 | Detected By: Readme - Stable Tag (Aggressive Detection)
3684 | - http://www.njoathkeepers.org/wp-content/plugins/email-subscribers/readme.txt
3685 | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
3686 | - http://www.njoathkeepers.org/wp-content/plugins/email-subscribers/readme.txt
3687
3688[+] login-sidebar-widget
3689 | Location: http://www.njoathkeepers.org/wp-content/plugins/login-sidebar-widget/
3690 | Last Updated: 2019-08-12T16:55:00.000Z
3691 | [!] The version is out of date, the latest version is 6.0.5
3692 |
3693 | Detected By: Urls In Homepage (Passive Detection)
3694 |
3695 | Version: 6.0.1 (100% confidence)
3696 | Detected By: Readme - Stable Tag (Aggressive Detection)
3697 | - http://www.njoathkeepers.org/wp-content/plugins/login-sidebar-widget/readme.txt
3698 | Confirmed By: Readme - ChangeLog Section (Aggressive Detection)
3699 | - http://www.njoathkeepers.org/wp-content/plugins/login-sidebar-widget/readme.txt
3700
3701[+] pta-member-directory
3702 | Location: http://www.njoathkeepers.org/wp-content/plugins/pta-member-directory/
3703 | Latest Version: 1.6.9 (up to date)
3704 | Last Updated: 2017-09-18T01:17:00.000Z
3705 |
3706 | Detected By: Urls In Homepage (Passive Detection)
3707 |
3708 | Version: 1.6.9 (80% confidence)
3709 | Detected By: Readme - Stable Tag (Aggressive Detection)
3710 | - http://www.njoathkeepers.org/wp-content/plugins/pta-member-directory/readme.txt
3711
3712[+] taskfreak
3713 | Location: http://www.njoathkeepers.org/wp-content/plugins/taskfreak/
3714 | Latest Version: 1.0.19 (up to date)
3715 | Last Updated: 2016-08-11T06:51:00.000Z
3716 |
3717 | Detected By: Urls In Homepage (Passive Detection)
3718 |
3719 | Version: 1.0.19 (80% confidence)
3720 | Detected By: Readme - Stable Tag (Aggressive Detection)
3721 | - http://www.njoathkeepers.org/wp-content/plugins/taskfreak/readme.txt
3722
3723[+] Enumerating Config Backups (via Passive and Aggressive Methods)
3724 Checking Config Backups - Time: 00:00:04 <=============> (21 / 21) 100.00% Time: 00:00:04
3725
3726[i] No Config Backups Found.
3727
3728[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
3729[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up.
3730
3731[+] Finished: Thu Nov 7 09:17:12 2019
3732[+] Requests Done: 63
3733[+] Cached Requests: 6
3734[+] Data Sent: 17.648 KB
3735[+] Data Received: 435.985 KB
3736[+] Memory used: 150.457 MB
3737[+] Elapsed time: 00:00:33
3738#######################################################################################################################################
3739[+] URL: http://www.njoathkeepers.org/
3740[+] Started: Thu Nov 7 09:16:43 2019
3741
3742Interesting Finding(s):
3743
3744[+] http://www.njoathkeepers.org/
3745 | Interesting Entry: Server: nginx/1.14.2
3746 | Found By: Headers (Passive Detection)
3747 | Confidence: 100%
3748
3749[+] http://www.njoathkeepers.org/robots.txt
3750 | Found By: Robots Txt (Aggressive Detection)
3751 | Confidence: 100%
3752
3753[+] http://www.njoathkeepers.org/xmlrpc.php
3754 | Found By: Link Tag (Passive Detection)
3755 | Confidence: 100%
3756 | Confirmed By: Direct Access (Aggressive Detection), 100% confidence
3757 | References:
3758 | - http://codex.wordpress.org/XML-RPC_Pingback_API
3759 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
3760 | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
3761 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
3762 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
3763
3764[+] http://www.njoathkeepers.org/readme.html
3765 | Found By: Direct Access (Aggressive Detection)
3766 | Confidence: 100%
3767
3768[+] http://www.njoathkeepers.org/wp-cron.php
3769 | Found By: Direct Access (Aggressive Detection)
3770 | Confidence: 60%
3771 | References:
3772 | - https://www.iplocation.net/defend-wordpress-from-ddos
3773 | - https://github.com/wpscanteam/wpscan/issues/1299
3774
3775[+] WordPress version 4.9.12 identified (Latest, released on 2019-10-14).
3776 | Detected By: Rss Generator (Passive Detection)
3777 | - http://www.njoathkeepers.org/feed/, <generator>https://wordpress.org/?v=4.9.12</generator>
3778 | - http://www.njoathkeepers.org/comments/feed/, <generator>https://wordpress.org/?v=4.9.12</generator>
3779
3780[+] WordPress theme in use: njoathkeepers
3781 | Location: http://www.njoathkeepers.org/wp-content/themes/njoathkeepers/
3782 | Readme: http://www.njoathkeepers.org/wp-content/themes/njoathkeepers/readme.txt
3783 | Style URL: http://www.njoathkeepers.org/wp-content/themes/njoathkeepers/style.css?ver=4.9.12
3784 | Style Name: njoathkeepers
3785 | Style URI: http://www.dizzain.com/blog/freebies/free-wordpress-theme-drochilli/
3786 | Description: Minimalistic darken WordPress theme with two columns, left-sidebar, fluid width and widget-ready....
3787 | Author: Dizzain Inc.
3788 | Author URI: http://www.dizzain.com/
3789 |
3790 | Detected By: Css Style (Passive Detection)
3791 |
3792 | Version: 3.0 (80% confidence)
3793 | Detected By: Style (Passive Detection)
3794 | - http://www.njoathkeepers.org/wp-content/themes/njoathkeepers/style.css?ver=4.9.12, Match: 'Version: 3.0'
3795
3796[+] Enumerating Users (via Passive and Aggressive Methods)
3797 Brute Forcing Author IDs - Time: 00:00:10 <==> (10 / 10) 100.00% Time: 00:00:10
3798
3799[i] User(s) Identified:
3800
3801[+] akosmin
3802 | Detected By: Wp Json Api (Aggressive Detection)
3803 | - http://www.njoathkeepers.org/wp-json/wp/v2/users/?per_page=100&page=1
3804 | Confirmed By:
3805 | Oembed API - Author URL (Aggressive Detection)
3806 | - http://www.njoathkeepers.org/wp-json/oembed/1.0/embed?url=http://www.njoathkeepers.org/&format=json
3807 | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
3808 | Login Error Messages (Aggressive Detection)
3809
3810[+] stepman
3811 | Detected By: Wp Json Api (Aggressive Detection)
3812 | - http://www.njoathkeepers.org/wp-json/wp/v2/users/?per_page=100&page=1
3813 | Confirmed By:
3814 | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
3815 | Login Error Messages (Aggressive Detection)
3816
3817[+] sdickinson
3818 | Detected By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
3819 | Confirmed By: Login Error Messages (Aggressive Detection)
3820
3821[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
3822[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up.
3823
3824[+] Finished: Thu Nov 7 09:17:16 2019
3825[+] Requests Done: 39
3826[+] Cached Requests: 22
3827[+] Data Sent: 12.313 KB
3828[+] Data Received: 216.565 KB
3829[+] Memory used: 136.844 MB
3830[+] Elapsed time: 00:00:33
3831#######################################################################################################################################
3832[+] URL: http://www.njoathkeepers.org/
3833[+] Started: Thu Nov 7 09:27:16 2019
3834
3835Interesting Finding(s):
3836
3837[+] http://www.njoathkeepers.org/
3838 | Interesting Entry: Server: nginx/1.14.2
3839 | Found By: Headers (Passive Detection)
3840 | Confidence: 100%
3841
3842[+] http://www.njoathkeepers.org/robots.txt
3843 | Found By: Robots Txt (Aggressive Detection)
3844 | Confidence: 100%
3845
3846[+] http://www.njoathkeepers.org/xmlrpc.php
3847 | Found By: Link Tag (Passive Detection)
3848 | Confidence: 100%
3849 | Confirmed By: Direct Access (Aggressive Detection), 100% confidence
3850 | References:
3851 | - http://codex.wordpress.org/XML-RPC_Pingback_API
3852 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner
3853 | - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos
3854 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login
3855 | - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access
3856
3857[+] http://www.njoathkeepers.org/readme.html
3858 | Found By: Direct Access (Aggressive Detection)
3859 | Confidence: 100%
3860
3861[+] http://www.njoathkeepers.org/wp-cron.php
3862 | Found By: Direct Access (Aggressive Detection)
3863 | Confidence: 60%
3864 | References:
3865 | - https://www.iplocation.net/defend-wordpress-from-ddos
3866 | - https://github.com/wpscanteam/wpscan/issues/1299
3867
3868[+] WordPress version 4.9.12 identified (Latest, released on 2019-10-14).
3869 | Detected By: Rss Generator (Passive Detection)
3870 | - http://www.njoathkeepers.org/feed/, <generator>https://wordpress.org/?v=4.9.12</generator>
3871 | - http://www.njoathkeepers.org/comments/feed/, <generator>https://wordpress.org/?v=4.9.12</generator>
3872
3873[+] WordPress theme in use: njoathkeepers
3874 | Location: http://www.njoathkeepers.org/wp-content/themes/njoathkeepers/
3875 | Readme: http://www.njoathkeepers.org/wp-content/themes/njoathkeepers/readme.txt
3876 | Style URL: http://www.njoathkeepers.org/wp-content/themes/njoathkeepers/style.css?ver=4.9.12
3877 | Style Name: njoathkeepers
3878 | Style URI: http://www.dizzain.com/blog/freebies/free-wordpress-theme-drochilli/
3879 | Description: Minimalistic darken WordPress theme with two columns, left-sidebar, fluid width and widget-ready....
3880 | Author: Dizzain Inc.
3881 | Author URI: http://www.dizzain.com/
3882 |
3883 | Detected By: Css Style (Passive Detection)
3884 |
3885 | Version: 3.0 (80% confidence)
3886 | Detected By: Style (Passive Detection)
3887 | - http://www.njoathkeepers.org/wp-content/themes/njoathkeepers/style.css?ver=4.9.12, Match: 'Version: 3.0'
3888
3889[+] Enumerating Users (via Passive and Aggressive Methods)
3890 Brute Forcing Author IDs - Time: 00:00:09 <============> (10 / 10) 100.00% Time: 00:00:09
3891
3892[i] User(s) Identified:
3893
3894[+] akosmin
3895 | Detected By: Wp Json Api (Aggressive Detection)
3896 | - http://www.njoathkeepers.org/wp-json/wp/v2/users/?per_page=100&page=1
3897 | Confirmed By:
3898 | Oembed API - Author URL (Aggressive Detection)
3899 | - http://www.njoathkeepers.org/wp-json/oembed/1.0/embed?url=http://www.njoathkeepers.org/&format=json
3900 | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
3901 | Login Error Messages (Aggressive Detection)
3902
3903[+] stepman
3904 | Detected By: Wp Json Api (Aggressive Detection)
3905 | - http://www.njoathkeepers.org/wp-json/wp/v2/users/?per_page=100&page=1
3906 | Confirmed By:
3907 | Author Id Brute Forcing - Author Pattern (Aggressive Detection)
3908 | Login Error Messages (Aggressive Detection)
3909
3910[+] sdickinson
3911 | Detected By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
3912 | Confirmed By: Login Error Messages (Aggressive Detection)
3913
3914[!] No WPVulnDB API Token given, as a result vulnerability data has not been output.
3915[!] You can get a free API token with 50 daily requests by registering at https://wpvulndb.com/users/sign_up.
3916
3917[+] Finished: Thu Nov 7 09:27:52 2019
3918[+] Requests Done: 53
3919[+] Cached Requests: 8
3920[+] Data Sent: 16.32 KB
3921[+] Data Received: 340.748 KB
3922[+] Memory used: 127.832 MB
3923[+] Elapsed time: 00:00:35
3924#######################################################################################################################################
3925[INFO] ------TARGET info------
3926[*] TARGET: http://www.njoathkeepers.org/
3927[*] TARGET IP: 192.155.88.60
3928[INFO] NO load balancer detected for www.njoathkeepers.org...
3929[*] DNS servers: ns1.fatcow.com.
3930[*] TARGET server: nginx/1.14.2
3931[*] CC: US
3932[*] Country: United States
3933[*] RegionCode: NJ
3934[*] RegionName: New Jersey
3935[*] City: Newark
3936[*] ASN: AS63949
3937[*] BGP_PREFIX: 192.155.88.0/22
3938[*] ISP: LINODE-AP Linode, LLC, US
3939[INFO] DNS enumeration:
3940[*] ad.njoathkeepers.org 192.155.88.60
3941[*] admin.njoathkeepers.org 192.155.88.60
3942[*] ads.njoathkeepers.org 192.155.88.60
3943[*] alpha.njoathkeepers.org 192.155.88.60
3944[*] api.njoathkeepers.org 192.155.88.60
3945[*] api-online.njoathkeepers.org 192.155.88.60
3946[*] apolo.njoathkeepers.org 192.155.88.60
3947[*] app.njoathkeepers.org 192.155.88.60
3948[*] beta.njoathkeepers.org 192.155.88.60
3949[*] bi.njoathkeepers.org 192.155.88.60
3950[*] blog.njoathkeepers.org 192.155.88.60
3951[*] cdn.njoathkeepers.org 192.155.88.60
3952[*] events.njoathkeepers.org 192.155.88.60
3953[*] ex.njoathkeepers.org 192.155.88.60
3954[*] files.njoathkeepers.org 192.155.88.60
3955[*] ftp.njoathkeepers.org 65.254.248.195
3956[*] gateway.njoathkeepers.org 192.155.88.60
3957[*] go.njoathkeepers.org 192.155.88.60
3958[*] help.njoathkeepers.org 192.155.88.60
3959[*] ib.njoathkeepers.org 192.155.88.60
3960[*] images.njoathkeepers.org 192.155.88.60
3961[*] internetbanking.njoathkeepers.org 192.155.88.60
3962[*] intranet.njoathkeepers.org 192.155.88.60
3963[*] jobs.njoathkeepers.org 192.155.88.60
3964[*] join.njoathkeepers.org 192.155.88.60
3965[*] live.njoathkeepers.org 192.155.88.60
3966[*] login.njoathkeepers.org 192.155.88.60
3967[*] m.njoathkeepers.org 192.155.88.60
3968[*] mail.njoathkeepers.org 65.254.248.195
3969[*] mail2.njoathkeepers.org 192.155.88.60
3970[*] mobile.njoathkeepers.org 192.155.88.60
3971[*] moodle.njoathkeepers.org 192.155.88.60
3972[*] mx.njoathkeepers.org 65.254.254.53 65.254.254.51 65.254.254.54 65.254.254.55 65.254.254.50 65.254.254.52
3973[*] mx2.njoathkeepers.org 192.155.88.60
3974[*] mx3.njoathkeepers.org 192.155.88.60
3975[*] my.njoathkeepers.org 192.155.88.60
3976[*] new.njoathkeepers.org 192.155.88.60
3977[*] news.njoathkeepers.org 192.155.88.60
3978[*] ns1.njoathkeepers.org 192.155.88.60
3979[*] ns2.njoathkeepers.org 192.155.88.60
3980[*] ns3.njoathkeepers.org 192.155.88.60
3981[*] oauth.njoathkeepers.org 192.155.88.60
3982[*] old.njoathkeepers.org 192.155.88.60
3983[*] one.njoathkeepers.org 192.155.88.60
3984[*] open.njoathkeepers.org 192.155.88.60
3985[*] out.njoathkeepers.org 192.155.88.60
3986[*] outlook.njoathkeepers.org 192.155.88.60
3987[*] portfolio.njoathkeepers.org 192.155.88.60
3988[*] raw.njoathkeepers.org 192.155.88.60
3989[*] repo.njoathkeepers.org 192.155.88.60
3990[*] router.njoathkeepers.org 192.155.88.60
3991[*] search.njoathkeepers.org 192.155.88.60
3992[*] siem.njoathkeepers.org 192.155.88.60
3993[*] slack.njoathkeepers.org 192.155.88.60
3994[*] slackbot.njoathkeepers.org 192.155.88.60
3995[*] snmp.njoathkeepers.org 192.155.88.60
3996[*] stream.njoathkeepers.org 192.155.88.60
3997[*] support.njoathkeepers.org 192.155.88.60
3998[*] syslog.njoathkeepers.org 192.155.88.60
3999[*] tags.njoathkeepers.org 192.155.88.60
4000[*] test.njoathkeepers.org 192.155.88.60
4001[*] upload.njoathkeepers.org 192.155.88.60
4002[*] video.njoathkeepers.org 192.155.88.60
4003[*] vpn.njoathkeepers.org 192.155.88.60
4004[*] webconf.njoathkeepers.org 192.155.88.60
4005[*] webmail.njoathkeepers.org webmail.fatcow.com. 65.254.254.36
4006[*] webportal.njoathkeepers.org 192.155.88.60
4007[*] wiki.njoathkeepers.org 192.155.88.60
4008[*] www2.njoathkeepers.org 192.155.88.60
4009[*] www3.njoathkeepers.org 192.155.88.60
4010[*] zendesk.njoathkeepers.org 192.155.88.60
4011[INFO] Possible abuse mails are:
4012[*] abuse@linode.com
4013[*] abuse@njoathkeepers.org
4014[*] abuse@www.njoathkeepers.org
4015[INFO] NO PAC (Proxy Auto Configuration) file FOUND
4016[ALERT] robots.txt file FOUND in http://www.njoathkeepers.org/robots.txt
4017[INFO] Checking for HTTP status codes recursively from http://www.njoathkeepers.org/robots.txt
4018[INFO] Status code Folders
4019[*] 200 http://www.njoathkeepers.org/calendar/action~agenda/
4020[*] 200 http://www.njoathkeepers.org/calendar/action~default/
4021[*] 200 http://www.njoathkeepers.org/calendar/action~http:/
4022[*] 200 http://www.njoathkeepers.org/calendar/action~month/
4023[*] 200 http://www.njoathkeepers.org/calendar/action~oneday/
4024[*] 200 http://www.njoathkeepers.org/calendar/action~poster/
4025[*] 200 http://www.njoathkeepers.org/calendar/action~posterboard/
4026[*] 200 http://www.njoathkeepers.org/calendar/action~stream/
4027[*] 200 http://www.njoathkeepers.org/calendar/action~undefined/
4028[*] 200 http://www.njoathkeepers.org/calendar/action~week/
4029[INFO] Starting FUZZing in http://www.njoathkeepers.org/FUzZzZzZzZz...
4030[INFO] Status code Folders
4031[ALERT] Look in the source code. It may contain passwords
4032[INFO] Links found from http://www.njoathkeepers.org/ http://192.155.88.60/:
4033[*] http://eepurl.com/bG-YlX
4034[*] http://fb.me/thereisonlyfate
4035[*] http://instagram.com/mtf8_music
4036[*] http://irc.nycpatriot.org/
4037[*] http://mtf8.bandcamp.com/
4038[*] http://mtf8.info/
4039[*] http://mtf8.info/comments/feed/
4040[*] http://mtf8.info/#content
4041[*] http://mtf8.info/feed/
4042[*] http://mtf8.info/feedback/
4043[*] http://mtf8.info/the-music/
4044[*] http://mtf8.info/the-story/
4045[*] http://mtf8.info/wp-json/oembed/1.0/embed?url=http://mtf8.info/
4046[*] http://mtf8.info/wp-json/oembed/1.0/embed?url=http://mtf8.info/&format=xml
4047[*] http://oathkeepers.org/
4048[*] https://cdn.ymaws.com/www.anjrpc.org/resource/resmgr/legal_motions___briefs/anjrpc_v_grewal_nj(p0153639x.pdf
4049[*] https://statcounter.com/
4050[*] https://twitch.tv/mtf8_music
4051[*] https://www.anjrpc.org/
4052[*] https://www.facebook.com/oathkeepersnj/
4053[*] https://www.google.com/calendar/render?cid=http://www.njoathkeepers.org/?plugin=all-in-one-event-calendar&controller=ai1ec_exporter_controller&action=export_events&no_html=true&&
4054[*] https://www.oathkeepers.org/who-speaks-for-oath-keepers/
4055[*] http://twitter.com/mtf8_music
4056[*] http://www.dizzain.com/
4057[*] http://www.meetup.com/North-Jersey-Oath-Keepers-Meetup/
4058[*] http://www.meetup.com/Oathkeepers-Bergen-County-NJ/
4059[*] http://www.njleg.state.nj.us/2018/Bills/S1000/548_I1.HTM
4060[*] http://www.njoathkeepers.org/
4061[*] http://www.njoathkeepers.org/599-2/
4062[*] http://www.njoathkeepers.org/calendar/action~agenda/page_offset~-1/request_format~json/
4063[*] http://www.njoathkeepers.org/calendar/action~agenda/page_offset~1/request_format~json/
4064[*] http://www.njoathkeepers.org/calendar/action~agenda/request_format~json/
4065[*] http://www.njoathkeepers.org/calendar/action~month/request_format~json/
4066[*] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~16-1-2020/
4067[*] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~16-4-2020/
4068[*] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~16-7-2020/
4069[*] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~18-6-2020/
4070[*] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~19-12-2019/
4071[*] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~19-3-2020/
4072[*] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~20-2-2020/
4073[*] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~20-8-2020/
4074[*] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~21-11-2019/
4075[*] http://www.njoathkeepers.org/calendar/action~oneday/exact_date~21-5-2020/
4076[*] http://www.njoathkeepers.org/calendar/action~oneday/request_format~json/
4077[*] http://www.njoathkeepers.org/calendar/action~week/request_format~json/
4078[*] http://www.njoathkeepers.org/comments/feed/
4079[*] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=35
4080[*] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=36
4081[*] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=37
4082[*] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=38
4083[*] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=39
4084[*] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=40
4085[*] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=41
4086[*] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=42
4087[*] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=43
4088[*] http://www.njoathkeepers.org/event/cape-may-county-meeting/?instance_id=44
4089[*] http://www.njoathkeepers.org/feed/
4090[*] http://www.njoathkeepers.org/login/
4091[*] http://www.njoathkeepers.org/members/
4092[*] http://www.njoathkeepers.org/new-jersey-billboard-project/
4093[*] http://www.njoathkeepers.org/nj-oath-keepers-gear/
4094[*] http://www.njoathkeepers.org/ny-oath-keepers-2016-awards-dinner/
4095[*] http://www.njoathkeepers.org/oath-keepers-president-responds-to-orlando-shooting/
4096[*] http://www.njoathkeepers.org/our-response-to-nj-office-of-homeland-security-and-preparedness/
4097[*] http://www.njoathkeepers.org/peoples-petition-against-unlawful-usurpations/
4098[*] http://www.njoathkeepers.org/?plugin=all-in-one-event-calendar&controller=ai1ec_exporter_controller&action=export_events
4099[*] http://www.njoathkeepers.org/?plugin=all-in-one-event-calendar&controller=ai1ec_exporter_controller&action=export_events&no_html=true
4100[*] http://www.njoathkeepers.org/?plugin=all-in-one-event-calendar&controller=ai1ec_exporter_controller&action=export_events&xml=true
4101[*] http://www.njoathkeepers.org/press-coverage/
4102[*] http://www.njoathkeepers.org/sanctuary-cities/
4103[*] http://www.njoathkeepers.org/support-the-nj-oath-keepers/
4104[*] http://www.njoathkeepers.org/the-oath/
4105[*] http://www.njoathkeepers.org/timothy-locke/
4106[*] http://www.njoathkeepers.org/wp-content/uploads/2013/11/007-1.jpg
4107[*] http://www.njoathkeepers.org/wp-content/uploads/2013/11/njok-parade-banner.jpg
4108[*] http://www.njoathkeepers.org/wp-content/uploads/2013/11/njok-parade-side-car.jpg
4109[*] http://www.njoathkeepers.org/wp-content/uploads/2013/11/NJOK-WMAL-web.jpg
4110[*] http://www.njoathkeepers.org/wp-content/uploads/2018/11/LaVoy-Finicum.png
4111[*] http://www.njoathkeepers.org/wp-json/oembed/1.0/embed?url=http://www.njoathkeepers.org/
4112[*] http://www.njoathkeepers.org/wp-json/oembed/1.0/embed?url=http://www.njoathkeepers.org/&format=xml
4113[INFO] GOOGLE has 268 results (0.17 seconds) about http://www.njoathkeepers.org/
4114[INFO] Shodan detected the following opened ports on 192.155.88.60:
4115[*] 1
4116[*] 123
4117[*] 143
4118[*] 25
4119[*] 4
4120[*] 465
4121[*] 587
4122[*] 6667
4123[*] 7777
4124[*] 993
4125[INFO] ------VirusTotal SECTION------
4126[INFO] VirusTotal passive DNS only stores address records. The following domains resolved to the given IP address:
4127[INFO] Latest URLs hosted in this IP address detected by at least one URL scanner or malicious URL dataset:
4128[INFO] Latest files that are not detected by any antivirus solution and were downloaded by VirusTotal from the IP address provided:
4129[INFO] ------Alexa Rank SECTION------
4130[INFO] Percent of Visitors Rank in Country:
4131[INFO] Percent of Search Traffic:
4132[INFO] Percent of Unique Visits:
4133[INFO] Total Sites Linking In:
4134[*] Total Sites
4135[INFO] Useful links related to www.njoathkeepers.org - 192.155.88.60:
4136[*] https://www.virustotal.com/pt/ip-address/192.155.88.60/information/
4137[*] https://www.hybrid-analysis.com/search?host=192.155.88.60
4138[*] https://www.shodan.io/host/192.155.88.60
4139[*] https://www.senderbase.org/lookup/?search_string=192.155.88.60
4140[*] https://www.alienvault.com/open-threat-exchange/ip/192.155.88.60
4141[*] http://pastebin.com/search?q=192.155.88.60
4142[*] http://urlquery.net/search.php?q=192.155.88.60
4143[*] http://www.alexa.com/siteinfo/www.njoathkeepers.org
4144[*] http://www.google.com/safebrowsing/diagnostic?site=www.njoathkeepers.org
4145[*] https://censys.io/ipv4/192.155.88.60
4146[*] https://www.abuseipdb.com/check/192.155.88.60
4147[*] https://urlscan.io/search/#192.155.88.60
4148[*] https://github.com/search?q=192.155.88.60&type=Code
4149[INFO] Useful links related to AS63949 - 192.155.88.0/22:
4150[*] http://www.google.com/safebrowsing/diagnostic?site=AS:63949
4151[*] https://www.senderbase.org/lookup/?search_string=192.155.88.0/22
4152[*] http://bgp.he.net/AS63949
4153[*] https://stat.ripe.net/AS63949
4154[INFO] Date: 07/11/19 | Time: 09:30:36
4155[INFO] Total time: 3 minute(s) and 27 second(s)
4156#######################################################################################################################################
4157[-] Target: http://www.njoathkeepers.org (192.155.88.60)
4158[M] Website Not in HTTPS: http://www.njoathkeepers.org
4159[I] Server: nginx/1.14.2
4160[L] X-Frame-Options: Not Enforced
4161[I] Strict-Transport-Security: Not Enforced
4162[I] X-Content-Security-Policy: Not Enforced
4163[I] X-Content-Type-Options: Not Enforced
4164[L] Robots.txt Found: http://www.njoathkeepers.org/robots.txt
4165[I] CMS Detection: WordPress
4166[I] Wordpress Version: 4.9.12
4167[M] EDB-ID: 47557 "Wordpress 5.2.4 - Cross-Origin Resource Sharing"
4168[M] EDB-ID: 47361 "WordPress 5.2.3 - Cross-Site Host Modification"
4169[M] EDB-ID: 46460-wordpress-5
4170[M] EDB-ID: 46511 "WordPress Core 5.0 - Remote Code Execution"
4171[M] EDB-ID: 46662 "WordPress 5.0.0 - Crop-image Shell Upload (Metasploit)"
4172[I] Wordpress Theme: njoathkeepers
4173[-] WordPress usernames identified:
4174[M] Adam Kosmin
4175[M] Edward Durfee
4176[M] Steven Dickinson
4177[M] akosmin
4178[M] sdickinson
4179[M] stepman
4180[M] XML-RPC services are enabled
4181[M] Website vulnerable to XML-RPC Brute Force Vulnerability
4182[I] Forgotten Password Allows Username Enumeration: http://www.njoathkeepers.org/wp-login.php?action=lostpassword
4183[I] Autocomplete Off Not Found: http://www.njoathkeepers.org/wp-login.php
4184[-] Default WordPress Files:
4185[I] http://www.njoathkeepers.org/license.txt
4186[I] http://www.njoathkeepers.org/readme.html
4187[I] http://www.njoathkeepers.org/wp-content/themes/twentyfifteen/genericons/COPYING.txt
4188[I] http://www.njoathkeepers.org/wp-content/themes/twentyfifteen/genericons/LICENSE.txt
4189[I] http://www.njoathkeepers.org/wp-content/themes/twentyfifteen/readme.txt
4190[I] http://www.njoathkeepers.org/wp-content/themes/twentyfourteen/genericons/COPYING.txt
4191[I] http://www.njoathkeepers.org/wp-content/themes/twentyfourteen/genericons/LICENSE.txt
4192[I] http://www.njoathkeepers.org/wp-content/themes/twentyfourteen/genericons/README.txt
4193[I] http://www.njoathkeepers.org/wp-content/themes/twentyfourteen/readme.txt
4194[I] http://www.njoathkeepers.org/wp-content/themes/twentythirteen/genericons/COPYING.txt
4195[I] http://www.njoathkeepers.org/wp-content/themes/twentythirteen/genericons/LICENSE.txt
4196[I] http://www.njoathkeepers.org/wp-content/themes/twentythirteen/genericons/README.txt
4197[I] http://www.njoathkeepers.org/wp-content/themes/twentythirteen/readme.txt
4198[I] http://www.njoathkeepers.org/wp-content/themes/twentytwelve/readme.txt
4199[I] http://www.njoathkeepers.org/wp-includes/ID3/license.commercial.txt
4200[I] http://www.njoathkeepers.org/wp-includes/ID3/license.txt
4201[I] http://www.njoathkeepers.org/wp-includes/ID3/readme.txt
4202[I] http://www.njoathkeepers.org/wp-includes/images/crystal/license.txt
4203[I] http://www.njoathkeepers.org/wp-includes/js/plupload/license.txt
4204[I] http://www.njoathkeepers.org/wp-includes/js/swfupload/license.txt
4205[I] http://www.njoathkeepers.org/wp-includes/js/tinymce/license.txt
4206[-] Searching Wordpress Plugins ...
4207[I] akismet v4.0.8
4208[M] EDB-ID: 37826 "WordPress 3.4.2 - Multiple Path Disclosure Vulnerabilities"
4209[M] EDB-ID: 37902 "WordPress Plugin Akismet - Multiple Cross-Site Scripting Vulnerabilities"
4210[I] all-in-one-event-calendar v2.5.38
4211[M] EDB-ID: 37075 "WordPress Plugin All-in-One Event Calendar 1.4 - 'agenda-widget-form.php?title' Cross-Site Scripting"
4212[M] EDB-ID: 37076 "WordPress Plugin All-in-One Event Calendar 1.4 - 'box_publish_button.php?button_value' Cross-Site Scripting"
4213[M] EDB-ID: 37077 "WordPress Plugin All-in-One Event Calendar 1.4 - 'save_successful.php?msg' Cross-Site Scripting"
4214[M] EDB-ID: 37078 "WordPress Plugin All-in-One Event Calendar 1.4 - 'agenda-widget.php' Multiple Cross-Site Scripting Vulnerabilities"
4215[I] contact-form-7 v5.1.1
4216[I] email-subscribers v4.0.13
4217[I] feed
4218[M] EDB-ID: 38624 "WordPress Plugin WP Feed - 'nid' SQL Injection"
4219[I] login-sidebar-widget v6.0.1
4220[I] pta-member-directory v1.6.9
4221[I] taskfreak v1.0.19
4222[I] Checking for Directory Listing Enabled ...
4223[-] Date & Time: 07/11/2019 09:29:21
4224[-] Completed in: 0:12:35
4225#######################################################################################################################################
4226 Anonymous JTSEC #OpDomesticTerrorism Full Recon #18